ALT-BU-2019-3554-1
Branch c8.1 update bulletin.
Closed vulnerabilities
BDU:2019-00923
Уязвимость LBMPDM диссектора анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-00924
Уязвимость MMSE диссектора анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-00925
Уязвимость CoAP диссектора анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-00926
Уязвимость реализаций спецификации передачи данных в промышленных сетях OPC UA, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-00959
Уязвимость компонента IxVeriWave анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01253
Уязвимость в программе-анализаторе трафика Wireshark, связанная с ошибкой управления ресурсами, позволяющая вызвать отказ в обслуживании
BDU:2019-01258
Уязвимость программы-анализатора трафика Wireshark, связанная с разыменованием указателя NULL, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01272
Уязвимость программы-анализатора трафика Wireshark, связанная с чтением за пределами границ в памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01273
Уязвимость программы-анализатора трафика Wireshark, связанная с чтением за пределами границ в памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01351
Уязвимость диссектора RPCAP (epan/dissectors/packet-rpcap.c) анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01550
Уязвимость в диссекторе для протокола 6LoWPAN программы-анализатора сетевого трафика Wireshark, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01551
Уязвимость в диссекторе для протокола P_MUL программы-анализатора сетевого трафика Wireshark, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01558
Уязвимость диссектора RTSE программы-анализатора трафика Wireshark, связанная с чтением за границами буфера памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01559
Уязвимость диссектора ISAKMP программы-анализатора трафика Wireshark, связанная с разыменованием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01573
Уязвимость компонента TCAP диссектора анализатора трафика компьютерных сетей Wireshark, связанная с разыменованием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01574
Уязвимость компонента ASN.1 BER диссектора анализатора трафика компьютерных сетей Wireshark, связанная с выходом операции за границы памяти, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2017-11406
In Wireshark 2.2.0 to 2.2.7 and 2.0.0 to 2.0.13, the DOCSIS dissector could go into an infinite loop. This was addressed in plugins/docsis/packet-docsis.c by rejecting invalid Frame Control parameter values.
- 99903
- 99903
- 1038966
- 1038966
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13797
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13797
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=250216263c3a3f2c651e80d9c6b3dc0adc53dc2c
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=250216263c3a3f2c651e80d9c6b3dc0adc53dc2c
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2017-36.html
- https://www.wireshark.org/security/wnpa-sec-2017-36.html
Modified: 2024-11-21
CVE-2017-11407
In Wireshark 2.2.0 to 2.2.7 and 2.0.0 to 2.0.13, the MQ dissector could crash. This was addressed in epan/dissectors/packet-mq.c by validating the fragment length before a reassembly attempt.
- 99910
- 99910
- 1038966
- 1038966
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13792
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13792
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4e54dae7f0d7840836ee6d5ce1e688f152ab2978
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4e54dae7f0d7840836ee6d5ce1e688f152ab2978
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2017-35.html
- https://www.wireshark.org/security/wnpa-sec-2017-35.html
Modified: 2024-11-21
CVE-2017-11408
In Wireshark 2.2.0 to 2.2.7 and 2.0.0 to 2.0.13, the AMQP dissector could crash. This was addressed in epan/dissectors/packet-amqp.c by checking for successful list dissection.
- 99894
- 99894
- 1038966
- 1038966
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13780
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13780
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a102c172b0b2fe231fdb49f4f6694603f5b93b0c
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a102c172b0b2fe231fdb49f4f6694603f5b93b0c
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=e57c86ef8e3b57b7f90c224f6053d1eacf20e1ba
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=e57c86ef8e3b57b7f90c224f6053d1eacf20e1ba
- [debian-lts-announce] 20171231 [SECURITY] [DLA 1226-1] wireshark security update
- [debian-lts-announce] 20171231 [SECURITY] [DLA 1226-1] wireshark security update
- DSA-4060
- DSA-4060
- https://www.wireshark.org/security/wnpa-sec-2017-34.html
- https://www.wireshark.org/security/wnpa-sec-2017-34.html
Modified: 2024-11-21
CVE-2017-11410
In Wireshark through 2.0.13 and 2.2.x through 2.2.7, the WBXML dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wbxml.c by adding validation of the relationships between indexes and lengths. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-7702.
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13796
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13796
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=3c7168cc5f044b4da8747d35da0b2b204dabf398
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=3c7168cc5f044b4da8747d35da0b2b204dabf398
- https://www.wireshark.org/security/wnpa-sec-2017-13.html
- https://www.wireshark.org/security/wnpa-sec-2017-13.html
Modified: 2024-11-21
CVE-2017-11411
In Wireshark through 2.0.13 and 2.2.x through 2.2.7, the openSAFETY dissector could crash or exhaust system memory. This was addressed in epan/dissectors/packet-opensafety.c by adding length validation. NOTE: this vulnerability exists because of an incomplete fix for CVE-2017-9350.
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13755
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13755
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a83a324acdfc07a0ca8b65e6ebaba3374ab19c76
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a83a324acdfc07a0ca8b65e6ebaba3374ab19c76
- https://www.wireshark.org/security/wnpa-sec-2017-28.html
- https://www.wireshark.org/security/wnpa-sec-2017-28.html
Modified: 2024-11-21
CVE-2017-13764
In Wireshark 2.4.0, the Modbus dissector could crash with a NULL pointer dereference. This was addressed in epan/dissectors/packet-mbtcp.c by adding length validation.
- 100545
- 100545
- 1039254
- 1039254
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13925
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13925
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b87ffbd12bddf64582c0a6e082b462744474de94
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b87ffbd12bddf64582c0a6e082b462744474de94
- https://www.wireshark.org/security/wnpa-sec-2017-40.html
- https://www.wireshark.org/security/wnpa-sec-2017-40.html
Modified: 2024-11-21
CVE-2017-13765
In Wireshark 2.4.0, 2.2.0 to 2.2.8, and 2.0.0 to 2.0.14, the IrCOMM dissector has a buffer over-read and application crash. This was addressed in plugins/irda/packet-ircomm.c by adding length validation.
- 100551
- 100551
- 1039254
- 1039254
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13929
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13929
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=94666d4357096fc45e3bcad3d9414a14f0831bc8
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=94666d4357096fc45e3bcad3d9414a14f0831bc8
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2017-41.html
- https://www.wireshark.org/security/wnpa-sec-2017-41.html
Modified: 2024-11-21
CVE-2017-13766
In Wireshark 2.4.0 and 2.2.0 to 2.2.8, the Profinet I/O dissector could crash with an out-of-bounds write. This was addressed in plugins/profinet/packet-dcerpc-pn-io.c by adding string validation.
- 100542
- 100542
- 1039254
- 1039254
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13847
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13847
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2096bc1e5078732543e0a3ee115a2ce520a72bbc
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2096bc1e5078732543e0a3ee115a2ce520a72bbc
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=af7b093ca528516c14247acb545046199d30843e
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=af7b093ca528516c14247acb545046199d30843e
- DSA-4060
- DSA-4060
- https://www.wireshark.org/security/wnpa-sec-2017-39.html
- https://www.wireshark.org/security/wnpa-sec-2017-39.html
Modified: 2024-11-21
CVE-2017-13767
In Wireshark 2.4.0, 2.2.0 to 2.2.8, and 2.0.0 to 2.0.14, the MSDP dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-msdp.c by adding length validation.
- 100549
- 100549
- 1039254
- 1039254
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13933
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13933
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6f18ace2a2683418a9368a8dfd92da6bd8213e15
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6f18ace2a2683418a9368a8dfd92da6bd8213e15
- https://www.wireshark.org/security/wnpa-sec-2017-38.html
- https://www.wireshark.org/security/wnpa-sec-2017-38.html
Modified: 2024-11-21
CVE-2017-15189
In Wireshark 2.4.0 to 2.4.1, the DOCSIS dissector could go into an infinite loop. This was addressed in plugins/docsis/packet-docsis.c by adding decrements.
- 101228
- 101228
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14080
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14080
- https://code.wireshark.org/review/23663
- https://code.wireshark.org/review/23663
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=625bab309d9dd21db2d8ae2aa3511810d32842a8
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=625bab309d9dd21db2d8ae2aa3511810d32842a8
- https://www.wireshark.org/security/wnpa-sec-2017-46.html
- https://www.wireshark.org/security/wnpa-sec-2017-46.html
Modified: 2024-11-21
CVE-2017-15190
In Wireshark 2.4.0 to 2.4.1, the RTSP dissector could crash. This was addressed in epan/dissectors/packet-rtsp.c by correcting the scope of a variable.
- 101229
- 101229
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14077
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14077
- https://code.wireshark.org/review/23635
- https://code.wireshark.org/review/23635
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=e27870eaa6efa1c2dac08aa41a67fe9f0839e6e0
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=e27870eaa6efa1c2dac08aa41a67fe9f0839e6e0
- https://www.wireshark.org/security/wnpa-sec-2017-45.html
- https://www.wireshark.org/security/wnpa-sec-2017-45.html
Modified: 2024-11-21
CVE-2017-15191
In Wireshark 2.4.0 to 2.4.1, 2.2.0 to 2.2.9, and 2.0.0 to 2.0.15, the DMP dissector could crash. This was addressed in epan/dissectors/packet-dmp.c by validating a string length.
- 101227
- 101227
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14068
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14068
- https://code.wireshark.org/review/23591
- https://code.wireshark.org/review/23591
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8dbb21dfde14221dab09b6b9c7719b9067c1f06e
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8dbb21dfde14221dab09b6b9c7719b9067c1f06e
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2017-44.html
- https://www.wireshark.org/security/wnpa-sec-2017-44.html
Modified: 2024-11-21
CVE-2017-15192
In Wireshark 2.4.0 to 2.4.1 and 2.2.0 to 2.2.9, the BT ATT dissector could crash. This was addressed in epan/dissectors/packet-btatt.c by considering a case where not all of the BTATT packets have the same encapsulation level.
- 101235
- 101235
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14049
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14049
- https://code.wireshark.org/review/23470
- https://code.wireshark.org/review/23470
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=3689dc1db36037436b1616715f9a3f888fc9a0f6
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=3689dc1db36037436b1616715f9a3f888fc9a0f6
- https://www.wireshark.org/security/wnpa-sec-2017-42.html
- https://www.wireshark.org/security/wnpa-sec-2017-42.html
Modified: 2024-11-21
CVE-2017-15193
In Wireshark 2.4.0 to 2.4.1 and 2.2.0 to 2.2.9, the MBIM dissector could crash or exhaust system memory. This was addressed in epan/dissectors/packet-mbim.c by changing the memory-allocation approach.
- 101240
- 101240
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14056
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14056
- https://code.wireshark.org/review/23537
- https://code.wireshark.org/review/23537
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=afb9ff7982971aba6e42472de0db4c1bedfc641b
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=afb9ff7982971aba6e42472de0db4c1bedfc641b
- https://www.wireshark.org/security/wnpa-sec-2017-43.html
- https://www.wireshark.org/security/wnpa-sec-2017-43.html
Modified: 2024-11-21
CVE-2017-17083
In Wireshark 2.4.0 to 2.4.2 and 2.2.0 to 2.2.10, the NetBIOS dissector could crash. This was addressed in epan/dissectors/packet-netbios.c by ensuring that write operations are bounded by the beginning of a buffer.
- 102029
- 102029
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14249
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14249
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=79768d63d14fbce6bf7fb4d4a1c86be0c5205eb3
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=79768d63d14fbce6bf7fb4d4a1c86be0c5205eb3
- [debian-lts-announce] 20171231 [SECURITY] [DLA 1226-1] wireshark security update
- [debian-lts-announce] 20171231 [SECURITY] [DLA 1226-1] wireshark security update
- DSA-4060
- DSA-4060
- https://www.wireshark.org/security/wnpa-sec-2017-48.html
- https://www.wireshark.org/security/wnpa-sec-2017-48.html
Modified: 2024-11-21
CVE-2017-17084
In Wireshark 2.4.0 to 2.4.2 and 2.2.0 to 2.2.10, the IWARP_MPA dissector could crash. This was addressed in epan/dissectors/packet-iwarp-mpa.c by validating a ULPDU length.
- 102030
- 102030
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14236
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14236
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8502fe94ef9e431860921507e1a351c5e3f5c634
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8502fe94ef9e431860921507e1a351c5e3f5c634
- [debian-lts-announce] 20171231 [SECURITY] [DLA 1226-1] wireshark security update
- [debian-lts-announce] 20171231 [SECURITY] [DLA 1226-1] wireshark security update
- DSA-4060
- DSA-4060
- https://www.wireshark.org/security/wnpa-sec-2017-47.html
- https://www.wireshark.org/security/wnpa-sec-2017-47.html
Modified: 2024-11-21
CVE-2017-17085
In Wireshark 2.4.0 to 2.4.2 and 2.2.0 to 2.2.10, the CIP Safety dissector could crash. This was addressed in epan/dissectors/packet-cipsafety.c by validating the packet length.
- 102071
- 102071
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14250
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14250
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f5939debe96e3c3953c6020818f1fbb80eb83ce8
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f5939debe96e3c3953c6020818f1fbb80eb83ce8
- [debian-lts-announce] 20171231 [SECURITY] [DLA 1226-1] wireshark security update
- [debian-lts-announce] 20171231 [SECURITY] [DLA 1226-1] wireshark security update
- DSA-4060
- DSA-4060
- 43233
- 43233
- https://www.wireshark.org/security/wnpa-sec-2017-49.html
- https://www.wireshark.org/security/wnpa-sec-2017-49.html
Modified: 2024-11-21
CVE-2017-7700
In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the NetScaler file parser could go into an infinite loop, triggered by a malformed capture file. This was addressed in wiretap/netscaler.c by ensuring a nonzero record size.
- 97631
- 97631
- 1038262
- 1038262
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13478
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13478
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8fc0af859de4993951a915ad735be350221f3f53
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8fc0af859de4993951a915ad735be350221f3f53
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- GLSA-201706-12
- GLSA-201706-12
- https://www.wireshark.org/security/wnpa-sec-2017-14.html
- https://www.wireshark.org/security/wnpa-sec-2017-14.html
Modified: 2024-11-21
CVE-2017-7701
In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the BGP dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-bgp.c by using a different integer data type.
- 97632
- 97632
- 1038262
- 1038262
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13557
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13557
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=fa31f69b407436d0946f84baa0acdcc50962bf7a
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=fa31f69b407436d0946f84baa0acdcc50962bf7a
- GLSA-201706-12
- GLSA-201706-12
- https://www.wireshark.org/security/wnpa-sec-2017-16.html
- https://www.wireshark.org/security/wnpa-sec-2017-16.html
Modified: 2024-11-21
CVE-2017-7702
In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the WBXML dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wbxml.c by adding length validation.
- 97633
- 97633
- 1038262
- 1038262
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13477
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13477
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2f322f66cbcca2fefdaa630494f9d6c97eb659b7
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2f322f66cbcca2fefdaa630494f9d6c97eb659b7
- GLSA-201706-12
- GLSA-201706-12
- https://www.wireshark.org/security/wnpa-sec-2017-13.html
- https://www.wireshark.org/security/wnpa-sec-2017-13.html
Modified: 2024-11-21
CVE-2017-7703
In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the IMAP dissector could crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-imap.c by calculating a line's end correctly.
- 97636
- 97636
- 1038262
- 1038262
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13466
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13466
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=671e32820ab29d41d712cc8a472eab9b672684d9
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=671e32820ab29d41d712cc8a472eab9b672684d9
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- GLSA-201706-12
- GLSA-201706-12
- https://www.wireshark.org/security/wnpa-sec-2017-12.html
- https://www.wireshark.org/security/wnpa-sec-2017-12.html
Modified: 2024-11-21
CVE-2017-7704
In Wireshark 2.2.0 to 2.2.5, the DOF dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-dof.c by using a different integer data type and adjusting a return value.
- 97634
- 97634
- 1038262
- 1038262
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13453
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13453
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6032b0fe5fc1176ab77e03e20765f95fbd21b19e
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6032b0fe5fc1176ab77e03e20765f95fbd21b19e
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=da53a90b6895e47e03c5de05edf84bd99d535fd8
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=da53a90b6895e47e03c5de05edf84bd99d535fd8
- GLSA-201706-12
- GLSA-201706-12
- https://www.wireshark.org/security/wnpa-sec-2017-17.html
- https://www.wireshark.org/security/wnpa-sec-2017-17.html
Modified: 2024-11-21
CVE-2017-7705
In Wireshark 2.2.0 to 2.2.5 and 2.0.0 to 2.0.11, the RPC over RDMA dissector could go into an infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-rpcrdma.c by correctly checking for going beyond the maximum offset.
- 97630
- 97630
- 1038262
- 1038262
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13558
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13558
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=08d392bbecc8fb666bf979e70a34536007b83ea2
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=08d392bbecc8fb666bf979e70a34536007b83ea2
- GLSA-201706-12
- GLSA-201706-12
- https://www.wireshark.org/security/wnpa-sec-2017-15.html
- https://www.wireshark.org/security/wnpa-sec-2017-15.html
Modified: 2024-11-21
CVE-2017-9343
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the MSNIP dissector misuses a NULL pointer. This was addressed in epan/dissectors/packet-msnip.c by validating an IPv4 address.
- 98797
- 98797
- 1038612
- 1038612
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1678
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1678
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13725
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13725
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=27556320b41904716b9c9f73ef8f4fe705d1e669
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=27556320b41904716b9c9f73ef8f4fe705d1e669
- https://www.wireshark.org/security/wnpa-sec-2017-30.html
- https://www.wireshark.org/security/wnpa-sec-2017-30.html
Modified: 2024-11-21
CVE-2017-9344
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the Bluetooth L2CAP dissector could divide by zero. This was addressed in epan/dissectors/packet-btl2cap.c by validating an interval value.
- 98796
- 98796
- 1038612
- 1038612
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1539
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1539
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13701
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13701
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6308ae03d82a29a2e3d75e1c325c8a9f6c44dcdf
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6308ae03d82a29a2e3d75e1c325c8a9f6c44dcdf
- [debian-lts-announce] 20190325 [SECURITY] [DLA 1729-1] wireshark security update
- [debian-lts-announce] 20190325 [SECURITY] [DLA 1729-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2017-29.html
- https://www.wireshark.org/security/wnpa-sec-2017-29.html
Modified: 2024-11-21
CVE-2017-9345
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the DNS dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-dns.c by trying to detect self-referencing pointers.
- 98798
- 98798
- 1038612
- 1038612
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1206
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1206
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13633
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13633
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=e280c9b637327a65d132bfe72d917b87e6844eb5
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=e280c9b637327a65d132bfe72d917b87e6844eb5
- https://www.wireshark.org/security/wnpa-sec-2017-26.html
- https://www.wireshark.org/security/wnpa-sec-2017-26.html
Modified: 2024-11-21
CVE-2017-9346
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the SoulSeek dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-slsk.c by making loop bounds more explicit.
- 98799
- 98799
- 1038612
- 1038612
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1200
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1200
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13631
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13631
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6c0bd15bd46a95c5b7dce02fe23c594429bb6c7e
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6c0bd15bd46a95c5b7dce02fe23c594429bb6c7e
- https://www.wireshark.org/security/wnpa-sec-2017-25.html
- https://www.wireshark.org/security/wnpa-sec-2017-25.html
Modified: 2024-11-21
CVE-2017-9347
In Wireshark 2.2.0 to 2.2.6, the ROS dissector could crash with a NULL pointer dereference. This was addressed in epan/dissectors/asn1/ros/packet-ros-template.c by validating an OID.
- 98800
- 98800
- 1038612
- 1038612
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1216
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1216
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13637
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13637
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=278e52f26e7e1a23f8d2e8ed98693328c992bdce
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=278e52f26e7e1a23f8d2e8ed98693328c992bdce
- 42124
- 42124
- https://www.wireshark.org/security/wnpa-sec-2017-31.html
- https://www.wireshark.org/security/wnpa-sec-2017-31.html
Modified: 2024-11-21
CVE-2017-9348
In Wireshark 2.2.0 to 2.2.6, the DOF dissector could read past the end of a buffer. This was addressed in epan/dissectors/packet-dof.c by validating a size value.
- 98801
- 98801
- 1038612
- 1038612
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1151
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1151
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13608
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13608
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=7fe55f96672b7bf2b4ceb9ae039a0f43eddd3151
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=7fe55f96672b7bf2b4ceb9ae039a0f43eddd3151
- https://www.wireshark.org/security/wnpa-sec-2017-23.html
- https://www.wireshark.org/security/wnpa-sec-2017-23.html
Modified: 2024-11-21
CVE-2017-9349
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the DICOM dissector has an infinite loop. This was addressed in epan/dissectors/packet-dcm.c by validating a length value.
- 98803
- 98803
- 1038612
- 1038612
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1329
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1329
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13685
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13685
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=cb1b6494c44c9e939d9e2554de6b812de395e3f9
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=cb1b6494c44c9e939d9e2554de6b812de395e3f9
- [debian-lts-announce] 20190325 [SECURITY] [DLA 1729-1] wireshark security update
- [debian-lts-announce] 20190325 [SECURITY] [DLA 1729-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2017-27.html
- https://www.wireshark.org/security/wnpa-sec-2017-27.html
Modified: 2024-11-21
CVE-2017-9350
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the openSAFETY dissector could crash or exhaust system memory. This was addressed in epan/dissectors/packet-opensafety.c by checking for a negative length.
- 98806
- 98806
- 1038612
- 1038612
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1212
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1212
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13649
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13649
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=dbc7cb0bbdd501fa96e0cb98668f6d6bf17ac4e6
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=dbc7cb0bbdd501fa96e0cb98668f6d6bf17ac4e6
- https://www.wireshark.org/security/wnpa-sec-2017-28.html
- https://www.wireshark.org/security/wnpa-sec-2017-28.html
Modified: 2024-11-21
CVE-2017-9351
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the DHCP dissector could read past the end of a buffer. This was addressed in epan/dissectors/packet-bootp.c by extracting the Vendor Class Identifier more carefully.
- 98808
- 98808
- 1038612
- 1038612
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1153
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1153
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1183
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1183
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13609
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13609
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13628
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13628
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a6e033c14da13bd5f72dfe07a347586517639d12
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a6e033c14da13bd5f72dfe07a347586517639d12
- https://www.wireshark.org/security/wnpa-sec-2017-24.html
- https://www.wireshark.org/security/wnpa-sec-2017-24.html
Modified: 2024-11-21
CVE-2017-9352
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the Bazaar dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-bzr.c by ensuring that backwards parsing cannot occur.
- 98804
- 98804
- 1038612
- 1038612
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13599
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13599
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8c5e0cee278ff0678b0ebf4b9c2a614974b4029a
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8c5e0cee278ff0678b0ebf4b9c2a614974b4029a
- https://www.wireshark.org/security/wnpa-sec-2017-22.html
- https://www.wireshark.org/security/wnpa-sec-2017-22.html
Modified: 2024-11-21
CVE-2017-9353
In Wireshark 2.2.0 to 2.2.6, the IPv6 dissector could crash. This was addressed in epan/dissectors/packet-ipv6.c by validating an IPv6 address.
- 98805
- 98805
- 1038612
- 1038612
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1303
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1303
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13675
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13675
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=40b2d475c2ad550c1a0f536d5eb30f2a7404c4f0
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=40b2d475c2ad550c1a0f536d5eb30f2a7404c4f0
- 42123
- 42123
- https://www.wireshark.org/security/wnpa-sec-2017-33.html
- https://www.wireshark.org/security/wnpa-sec-2017-33.html
Modified: 2024-11-21
CVE-2017-9354
In Wireshark 2.2.0 to 2.2.6 and 2.0.0 to 2.0.12, the RGMP dissector could crash. This was addressed in epan/dissectors/packet-rgmp.c by validating an IPv4 address.
- 98802
- 98802
- 1038612
- 1038612
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1243
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=1243
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13646
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13646
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=3a77395e651acd81eb41ffd8fbdbf711e1133d76
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=3a77395e651acd81eb41ffd8fbdbf711e1133d76
- https://www.wireshark.org/security/wnpa-sec-2017-32.html
- https://www.wireshark.org/security/wnpa-sec-2017-32.html
Modified: 2024-11-21
CVE-2018-11354
In Wireshark 2.6.0, the IEEE 1905.1a dissector could crash. This was addressed in epan/dissectors/packet-ieee1905.c by making a certain correction to string handling.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104308
- 104308
- 1041036
- 1041036
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14647
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14647
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=cb517a4a434387e74a2f75ebb106ee3c3893251c
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=cb517a4a434387e74a2f75ebb106ee3c3893251c
- https://www.wireshark.org/security/wnpa-sec-2018-26.html
- https://www.wireshark.org/security/wnpa-sec-2018-26.html
Modified: 2024-11-21
CVE-2018-11355
In Wireshark 2.6.0, the RTCP dissector could crash. This was addressed in epan/dissectors/packet-rtcp.c by avoiding a buffer overflow for packet status chunks.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104308
- 104308
- 1041036
- 1041036
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14673
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14673
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=99d27a5fd2c540f837154aca3b3647f5ccfa0c33
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=99d27a5fd2c540f837154aca3b3647f5ccfa0c33
- https://www.wireshark.org/security/wnpa-sec-2018-27.html
- https://www.wireshark.org/security/wnpa-sec-2018-27.html
Modified: 2024-11-21
CVE-2018-11356
In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the DNS dissector could crash. This was addressed in epan/dissectors/packet-dns.c by avoiding a NULL pointer dereference for an empty name in an SRV record.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104308
- 104308
- 1041036
- 1041036
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14681
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14681
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4425716ddba99374749bd033d9bc0f4add2fb973
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4425716ddba99374749bd033d9bc0f4add2fb973
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-29.html
- https://www.wireshark.org/security/wnpa-sec-2018-29.html
Modified: 2024-11-21
CVE-2018-11357
In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the LTP dissector and other dissectors could consume excessive memory. This was addressed in epan/tvbuff.c by rejecting negative lengths.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104308
- 104308
- 1041036
- 1041036
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14678
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14678
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=ab8a33ef083b9732c89117747a83a905a676faf6
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=ab8a33ef083b9732c89117747a83a905a676faf6
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-28.html
- https://www.wireshark.org/security/wnpa-sec-2018-28.html
Modified: 2024-11-21
CVE-2018-11358
In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the Q.931 dissector could crash. This was addressed in epan/dissectors/packet-q931.c by avoiding a use-after-free after a malformed packet prevented certain cleanup.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104308
- 104308
- 1041036
- 1041036
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14689
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14689
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=ccb1ac3c8cec47fbbbf2e80ced80644005c65252
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=ccb1ac3c8cec47fbbbf2e80ced80644005c65252
- [debian-lts-announce] 20180528 [SECURITY] [DLA 1388-1] wireshark security update
- [debian-lts-announce] 20180528 [SECURITY] [DLA 1388-1] wireshark security update
- DSA-4217
- DSA-4217
- https://www.wireshark.org/security/wnpa-sec-2018-31.html
- https://www.wireshark.org/security/wnpa-sec-2018-31.html
Modified: 2024-11-21
CVE-2018-11359
In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the RRC dissector and other dissectors could crash. This was addressed in epan/proto.c by avoiding a NULL pointer dereference.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104308
- 104308
- 1041036
- 1041036
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14703
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14703
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=beaebe91b14564fb9f86f0726bab09927872721b
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=beaebe91b14564fb9f86f0726bab09927872721b
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-33.html
- https://www.wireshark.org/security/wnpa-sec-2018-33.html
Modified: 2024-11-21
CVE-2018-11360
In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the GSM A DTAP dissector could crash. This was addressed in epan/dissectors/packet-gsm_a_dtap.c by fixing an off-by-one error that caused a buffer overflow.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104308
- 104308
- 1041036
- 1041036
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14688
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14688
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a55b36c51f83a7b9680824e8ee3a6ce8429ab24b
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a55b36c51f83a7b9680824e8ee3a6ce8429ab24b
- DSA-4217
- DSA-4217
- https://www.wireshark.org/security/wnpa-sec-2018-30.html
- https://www.wireshark.org/security/wnpa-sec-2018-30.html
Modified: 2024-11-21
CVE-2018-11361
In Wireshark 2.6.0, the IEEE 802.11 protocol dissector could crash. This was addressed in epan/crypt/dot11decrypt.c by avoiding a buffer overflow during FTE processing in Dot11DecryptTDLSDeriveKey.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104308
- 104308
- 1041036
- 1041036
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14686
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14686
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=1b52f9929238ce3948ec924ae4f9456b5e9df558
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=1b52f9929238ce3948ec924ae4f9456b5e9df558
- https://www.wireshark.org/security/wnpa-sec-2018-32.html
- https://www.wireshark.org/security/wnpa-sec-2018-32.html
Modified: 2024-11-21
CVE-2018-11362
In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the LDSS dissector could crash. This was addressed in epan/dissectors/packet-ldss.c by avoiding a buffer over-read upon encountering a missing '\0' character.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104308
- 104308
- 1041036
- 1041036
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14615
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14615
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f177008b04a530640de835ca878892e58b826d58
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f177008b04a530640de835ca878892e58b826d58
- [debian-lts-announce] 20180528 [SECURITY] [DLA 1388-1] wireshark security update
- [debian-lts-announce] 20180528 [SECURITY] [DLA 1388-1] wireshark security update
- DSA-4217
- DSA-4217
- https://www.wireshark.org/security/wnpa-sec-2018-25.html
- https://www.wireshark.org/security/wnpa-sec-2018-25.html
Modified: 2024-11-21
CVE-2018-12086
Buffer overflow in OPC UA applications allows remote attackers to trigger a stack overflow with carefully structured requests.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 105538
- 105538
- 1041909
- 1041909
- https://opcfoundation-onlineapplications.org/faq/SecurityBulletins/OPC_Foundation_Security_Bulletin_CVE-2018-12086.pdf
- https://opcfoundation-onlineapplications.org/faq/SecurityBulletins/OPC_Foundation_Security_Bulletin_CVE-2018-12086.pdf
- DSA-4359
- DSA-4359
Modified: 2024-11-21
CVE-2018-14339
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the MMSE dissector could go into an infinite loop. This was addressed in epan/proto.c by adding offset and length validation.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104847
- 104847
- 1041608
- 1041608
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14738
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14738
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=3b77c0a596a8071aebc1de71e3f79e5e15e919ca
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=3b77c0a596a8071aebc1de71e3f79e5e15e919ca
- [debian-lts-announce] 20180729 [SECURITY] [DLA 1451-1] wireshark security update
- [debian-lts-announce] 20180729 [SECURITY] [DLA 1451-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-38.html
- https://www.wireshark.org/security/wnpa-sec-2018-38.html
Modified: 2024-11-21
CVE-2018-14340
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, dissectors that support zlib decompression could crash. This was addressed in epan/tvbuff_zlib.c by rejecting negative lengths to avoid a buffer over-read.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104847
- 104847
- 1041608
- 1041608
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14675
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14675
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=672d882a53f96730e4ef1e5b1639c585823b0df8
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=672d882a53f96730e4ef1e5b1639c585823b0df8
- [debian-lts-announce] 20180729 [SECURITY] [DLA 1451-1] wireshark security update
- [debian-lts-announce] 20180729 [SECURITY] [DLA 1451-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-36.html
- https://www.wireshark.org/security/wnpa-sec-2018-36.html
Modified: 2024-11-21
CVE-2018-14341
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the DICOM dissector could go into a large or infinite loop. This was addressed in epan/dissectors/packet-dcm.c by preventing an offset overflow.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104847
- 104847
- 1041608
- 1041608
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14742
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14742
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2e716c32be6aa20e1813b0002878853e71f8b2f4
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2e716c32be6aa20e1813b0002878853e71f8b2f4
- [debian-lts-announce] 20180729 [SECURITY] [DLA 1451-1] wireshark security update
- [debian-lts-announce] 20180729 [SECURITY] [DLA 1451-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-39.html
- https://www.wireshark.org/security/wnpa-sec-2018-39.html
Modified: 2024-11-21
CVE-2018-14342
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the BGP protocol dissector could go into a large loop. This was addressed in epan/dissectors/packet-bgp.c by validating Path Attribute lengths.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104847
- 104847
- 1041608
- 1041608
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13741
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13741
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=36af43dbb7673495948cd65d0346e8b9812b941c
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=36af43dbb7673495948cd65d0346e8b9812b941c
- [debian-lts-announce] 20180729 [SECURITY] [DLA 1451-1] wireshark security update
- [debian-lts-announce] 20180729 [SECURITY] [DLA 1451-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-34.html
- https://www.wireshark.org/security/wnpa-sec-2018-34.html
Modified: 2024-11-21
CVE-2018-14343
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the ASN.1 BER dissector could crash. This was addressed in epan/dissectors/packet-ber.c by ensuring that length values do not exceed the maximum signed integer.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104847
- 104847
- 1041608
- 1041608
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14682
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14682
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9402f2f80c6bc7d25178a0875c5a1f5ee36361db
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9402f2f80c6bc7d25178a0875c5a1f5ee36361db
- [debian-lts-announce] 20180729 [SECURITY] [DLA 1451-1] wireshark security update
- [debian-lts-announce] 20180729 [SECURITY] [DLA 1451-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-37.html
- https://www.wireshark.org/security/wnpa-sec-2018-37.html
Modified: 2024-11-21
CVE-2018-14344
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the ISMP dissector could crash. This was addressed in epan/dissectors/packet-ismp.c by validating the IPX address length to avoid a buffer over-read.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104847
- 104847
- 1041608
- 1041608
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14672
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14672
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4f7153685b39a164aea09ba7f96ebb648b8328ae
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4f7153685b39a164aea09ba7f96ebb648b8328ae
- https://www.wireshark.org/security/wnpa-sec-2018-35.html
- https://www.wireshark.org/security/wnpa-sec-2018-35.html
Modified: 2024-11-21
CVE-2018-14367
In Wireshark 2.6.0 to 2.6.1 and 2.4.0 to 2.4.7, the CoAP protocol dissector could crash. This was addressed in epan/dissectors/packet-coap.c by properly checking for a NULL condition.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104847
- 104847
- 1041608
- 1041608
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14966
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14966
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=81ce5fcb3e37a0aaeb7532f7a2a09366f16fa310
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=81ce5fcb3e37a0aaeb7532f7a2a09366f16fa310
- https://www.wireshark.org/security/wnpa-sec-2018-42.html
- https://www.wireshark.org/security/wnpa-sec-2018-42.html
Modified: 2024-11-21
CVE-2018-14368
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the Bazaar protocol dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-bzr.c by properly handling items that are too long.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104847
- 104847
- 1041608
- 1041608
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14841
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14841
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6c44312f465014eb409d766a9828b7f101f6251c
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6c44312f465014eb409d766a9828b7f101f6251c
- [debian-lts-announce] 20180729 [SECURITY] [DLA 1451-1] wireshark security update
- [debian-lts-announce] 20180729 [SECURITY] [DLA 1451-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-40.html
- https://www.wireshark.org/security/wnpa-sec-2018-40.html
Modified: 2024-11-21
CVE-2018-14369
In Wireshark 2.6.0 to 2.6.1, 2.4.0 to 2.4.7, and 2.2.0 to 2.2.15, the HTTP2 dissector could crash. This was addressed in epan/dissectors/packet-http2.c by verifying that header data was found before proceeding to header decompression.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104847
- 104847
- 1041608
- 1041608
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14869
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14869
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=038cd225bfa54e2a7ade4043118796334920a61e
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=038cd225bfa54e2a7ade4043118796334920a61e
- [debian-lts-announce] 20180729 [SECURITY] [DLA 1451-1] wireshark security update
- [debian-lts-announce] 20180729 [SECURITY] [DLA 1451-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-41.html
- https://www.wireshark.org/security/wnpa-sec-2018-41.html
Modified: 2024-11-21
CVE-2018-14370
In Wireshark 2.6.0 to 2.6.1 and 2.4.0 to 2.4.7, the IEEE 802.11 protocol dissector could crash. This was addressed in epan/crypt/airpdcap.c via bounds checking that prevents a buffer over-read.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104847
- 104847
- 1041608
- 1041608
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14686
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14686
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b1446124eebc3ea5591d18e719c2a5cff3630638
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b1446124eebc3ea5591d18e719c2a5cff3630638
- https://www.wireshark.org/security/wnpa-sec-2018-43.html
- https://www.wireshark.org/security/wnpa-sec-2018-43.html
Modified: 2024-11-21
CVE-2018-14438
In Wireshark through 2.6.2, the create_app_running_mutex function in wsutil/file_util.c calls SetSecurityDescriptorDacl to set a NULL DACL, which allows attackers to modify the access control arbitrarily.
Modified: 2024-11-21
CVE-2018-16056
In Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8, and 2.2.0 to 2.2.16, the Bluetooth Attribute Protocol dissector could crash. This was addressed in epan/dissectors/packet-btatt.c by verifying that a dissector for a specific UUID exists.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 105174
- 105174
- 1041609
- 1041609
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14994
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14994
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f98fbce64cb230e94a2cafc410a3cedad657b485
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f98fbce64cb230e94a2cafc410a3cedad657b485
- DSA-4315
- DSA-4315
- https://www.wireshark.org/security/wnpa-sec-2018-45.html
- https://www.wireshark.org/security/wnpa-sec-2018-45.html
Modified: 2024-11-21
CVE-2018-16057
In Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8, and 2.2.0 to 2.2.16, the Radiotap dissector could crash. This was addressed in epan/dissectors/packet-ieee80211-radiotap-iter.c by validating iterator operations.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 105174
- 105174
- 1041609
- 1041609
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15022
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15022
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=bbf46eb46ae38392af8e6cd288795f0def50a621
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=bbf46eb46ae38392af8e6cd288795f0def50a621
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- DSA-4315
- DSA-4315
- https://www.wireshark.org/security/wnpa-sec-2018-46.html
- https://www.wireshark.org/security/wnpa-sec-2018-46.html
Modified: 2024-11-21
CVE-2018-16058
In Wireshark 2.6.0 to 2.6.2, 2.4.0 to 2.4.8, and 2.2.0 to 2.2.16, the Bluetooth AVDTP dissector could crash. This was addressed in epan/dissectors/packet-btavdtp.c by properly initializing a data structure.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 105174
- 105174
- 1041609
- 1041609
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14884
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14884
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c48d6a6d60c5c9111838a945966b6cb8750777be
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c48d6a6d60c5c9111838a945966b6cb8750777be
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- DSA-4315
- DSA-4315
- https://www.wireshark.org/security/wnpa-sec-2018-44.html
- https://www.wireshark.org/security/wnpa-sec-2018-44.html
Modified: 2024-11-21
CVE-2018-18225
In Wireshark 2.6.0 to 2.6.3, the CoAP dissector could crash. This was addressed in epan/dissectors/packet-coap.c by ensuring that the piv length is correctly computed.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 105583
- 105583
- 1041909
- 1041909
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15172
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15172
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b2bbd9fdf209911d94b23cc33f4daccbceb7fa8a
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b2bbd9fdf209911d94b23cc33f4daccbceb7fa8a
- DSA-4359
- DSA-4359
- https://www.wireshark.org/security/wnpa-sec-2018-49.html
- https://www.wireshark.org/security/wnpa-sec-2018-49.html
Modified: 2024-11-21
CVE-2018-18226
In Wireshark 2.6.0 to 2.6.3, the Steam IHS Discovery dissector could consume system memory. This was addressed in epan/dissectors/packet-steam-ihs-discovery.c by changing the memory-management approach.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 105583
- 105583
- 1041909
- 1041909
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15171
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15171
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6e920ddc3cad2886ef07ca1a8e50e2a5c50986f7
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6e920ddc3cad2886ef07ca1a8e50e2a5c50986f7
- DSA-4359
- DSA-4359
- https://www.wireshark.org/security/wnpa-sec-2018-48.html
- https://www.wireshark.org/security/wnpa-sec-2018-48.html
Modified: 2024-11-21
CVE-2018-18227
In Wireshark 2.6.0 to 2.6.3 and 2.4.0 to 2.4.9, the MS-WSP protocol dissector could crash. This was addressed in epan/dissectors/packet-mswsp.c by properly handling NULL return values.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 105583
- 105583
- 1041909
- 1041909
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15119
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15119
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=d443be449a52f95df5754adc39e1f3472fec2f03
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=d443be449a52f95df5754adc39e1f3472fec2f03
- DSA-4359
- DSA-4359
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.wireshark.org/security/wnpa-sec-2018-47.html
- https://www.wireshark.org/security/wnpa-sec-2018-47.html
Modified: 2024-11-21
CVE-2018-19622
In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the MMSE dissector could go into an infinite loop. This was addressed in epan/dissectors/packet-mmse.c by preventing length overflows.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 106051
- 106051
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15250
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15250
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=3b7555d32d11862f0e500ec466ad6bfe54190076
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=3b7555d32d11862f0e500ec466ad6bfe54190076
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- DSA-4359
- DSA-4359
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.wireshark.org/security/wnpa-sec-2018-54.html
- https://www.wireshark.org/security/wnpa-sec-2018-54.html
Modified: 2024-11-21
CVE-2018-19623
In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the LBMPDM dissector could crash. In addition, a remote attacker could write arbitrary data to any memory locations before the packet-scoped memory. This was addressed in epan/dissectors/packet-lbmpdm.c by disallowing certain negative values.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 106051
- 106051
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15132
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15132
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9c8645ec7b28e4d7193962ecd2a418613bf6a84f
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9c8645ec7b28e4d7193962ecd2a418613bf6a84f
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- DSA-4359
- DSA-4359
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.wireshark.org/security/wnpa-sec-2018-53.html
- https://www.wireshark.org/security/wnpa-sec-2018-53.html
Modified: 2024-11-21
CVE-2018-19624
In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the PVFS dissector could crash. This was addressed in epan/dissectors/packet-pvfs2.c by preventing a NULL pointer dereference.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 106051
- 106051
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15280
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15280
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=3e319db1107b08fc3be804b6d449143ec9aa0dec
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=3e319db1107b08fc3be804b6d449143ec9aa0dec
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- DSA-4359
- DSA-4359
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.wireshark.org/security/wnpa-sec-2018-56.html
- https://www.wireshark.org/security/wnpa-sec-2018-56.html
Modified: 2024-11-21
CVE-2018-19625
In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the dissection engine could crash. This was addressed in epan/tvbuff_composite.c by preventing a heap-based buffer over-read.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 106051
- 106051
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14466
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14466
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=dc4d209f39132a4ae05675a11609176ae9705cfc
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=dc4d209f39132a4ae05675a11609176ae9705cfc
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- DSA-4359
- DSA-4359
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.wireshark.org/security/wnpa-sec-2018-51.html
- https://www.wireshark.org/security/wnpa-sec-2018-51.html
Modified: 2024-11-21
CVE-2018-19626
In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the DCOM dissector could crash. This was addressed in epan/dissectors/packet-dcom.c by adding '\0' termination.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 106051
- 106051
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15130
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15130
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c5a65115ebab55cfd5ce0a855c2256e01cab6449
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c5a65115ebab55cfd5ce0a855c2256e01cab6449
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- DSA-4359
- DSA-4359
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.wireshark.org/security/wnpa-sec-2018-52.html
- https://www.wireshark.org/security/wnpa-sec-2018-52.html
Modified: 2024-11-21
CVE-2018-19627
In Wireshark 2.6.0 to 2.6.4 and 2.4.0 to 2.4.10, the IxVeriWave file parser could crash. This was addressed in wiretap/vwr.c by adjusting a buffer boundary.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 106051
- 106051
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15279
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15279
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=bdc33cfaecb1b4cf2c114ed9015713ddf8569a60
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=bdc33cfaecb1b4cf2c114ed9015713ddf8569a60
- DSA-4359
- DSA-4359
- 45951
- 45951
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.wireshark.org/security/wnpa-sec-2018-55.html
- https://www.wireshark.org/security/wnpa-sec-2018-55.html
Modified: 2024-11-21
CVE-2018-19628
In Wireshark 2.6.0 to 2.6.4, the ZigBee ZCL dissector could crash. This was addressed in epan/dissectors/packet-zbee-zcl-lighting.c by preventing a divide-by-zero error.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 106051
- 106051
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15281
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15281
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=212b18825d9b668cda23d334c48867dfa66b2b36
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=212b18825d9b668cda23d334c48867dfa66b2b36
- DSA-4359
- DSA-4359
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.wireshark.org/security/wnpa-sec-2018-57.html
- https://www.wireshark.org/security/wnpa-sec-2018-57.html
Modified: 2024-11-21
CVE-2018-5334
In Wireshark 2.4.0 to 2.4.3 and 2.2.0 to 2.2.11, the IxVeriWave file parser could crash. This was addressed in wiretap/vwr.c by correcting the signature timestamp bounds checks.
- 102499
- 102499
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14297
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14297
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=dc308c05ba0673460fe80873b22d296880ee996d
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=dc308c05ba0673460fe80873b22d296880ee996d
- [debian-lts-announce] 20180126 [SECURITY] [DLA 1258-1] wireshark security update
- [debian-lts-announce] 20180126 [SECURITY] [DLA 1258-1] wireshark security update
- DSA-4101
- DSA-4101
- https://www.wireshark.org/security/wnpa-sec-2018-03.html
- https://www.wireshark.org/security/wnpa-sec-2018-03.html
Modified: 2024-11-21
CVE-2018-5335
In Wireshark 2.4.0 to 2.4.3 and 2.2.0 to 2.2.11, the WCP dissector could crash. This was addressed in epan/dissectors/packet-wcp.c by validating the available buffer length.
- 102500
- 102500
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14251
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14251
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=086b87376b988c555484349aa115d6e08ac6db07
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=086b87376b988c555484349aa115d6e08ac6db07
- [debian-lts-announce] 20180126 [SECURITY] [DLA 1258-1] wireshark security update
- [debian-lts-announce] 20180126 [SECURITY] [DLA 1258-1] wireshark security update
- DSA-4101
- DSA-4101
- https://www.wireshark.org/security/wnpa-sec-2018-04.html
- https://www.wireshark.org/security/wnpa-sec-2018-04.html
Modified: 2024-11-21
CVE-2018-5336
In Wireshark 2.4.0 to 2.4.3 and 2.2.0 to 2.2.11, the JSON, XML, NTP, XMPP, and GDB dissectors could crash. This was addressed in epan/tvbparse.c by limiting the recursion depth.
- 102504
- 102504
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14253
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14253
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4f4c95cf46ba6adbd10b09747e10742801bc706b
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4f4c95cf46ba6adbd10b09747e10742801bc706b
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f6702e49a9720d173246668495eece6d77eca5b0
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f6702e49a9720d173246668495eece6d77eca5b0
- [debian-lts-announce] 20180126 [SECURITY] [DLA 1258-1] wireshark security update
- [debian-lts-announce] 20180126 [SECURITY] [DLA 1258-1] wireshark security update
- DSA-4101
- DSA-4101
- https://www.wireshark.org/security/wnpa-sec-2018-01.html
- https://www.wireshark.org/security/wnpa-sec-2018-01.html
Modified: 2024-11-21
CVE-2018-7320
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, the SIGCOMP protocol dissector could crash. This was addressed in epan/dissectors/packet-sigcomp.c by validating operand offsets.
- 103160
- 103160
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14398
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14398
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=015e3399390b8b5cfbfcfcda30589983ab6cc129
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=015e3399390b8b5cfbfcfcda30589983ab6cc129
- DSA-4217
- DSA-4217
- https://www.wireshark.org/security/wnpa-sec-2018-10.html
- https://www.wireshark.org/security/wnpa-sec-2018-10.html
Modified: 2024-11-21
CVE-2018-7321
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-thrift.c had a large loop that was addressed by not proceeding with dissection after encountering an unexpected type.
- 103158
- 103158
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14379
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14379
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c784d551ad50864de1035ce54e72837301cf6aca
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c784d551ad50864de1035ce54e72837301cf6aca
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
Modified: 2024-11-21
CVE-2018-7322
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-dcm.c had an infinite loop that was addressed by checking for integer wraparound.
- 103158
- 103158
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14411
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14411
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=afc780e2c796e971bb7d164103f4f0d10d3c25b5
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=afc780e2c796e971bb7d164103f4f0d10d3c25b5
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
Modified: 2024-11-21
CVE-2018-7323
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-wccp.c had a large loop that was addressed by ensuring that a calculated length was monotonically increasing.
- 103158
- 103158
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14412
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14412
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4f9199ea8cff56c6704e9828c3d80360b27c4565
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4f9199ea8cff56c6704e9828c3d80360b27c4565
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=5d45b69b590cabc5127282d1ade3bca1598e5f5c
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=5d45b69b590cabc5127282d1ade3bca1598e5f5c
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
Modified: 2024-11-21
CVE-2018-7324
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-sccp.c had an infinite loop that was addressed by using a correct integer data type.
- 103158
- 103158
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14413
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14413
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9e7695bbee18525eaa6d12b32230313ae8a36a81
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9e7695bbee18525eaa6d12b32230313ae8a36a81
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
Modified: 2024-11-21
CVE-2018-7325
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-rpki-rtr.c had an infinite loop that was addressed by validating a length field.
- 103158
- 103158
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14414
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14414
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=7be234d06ea39ab6a88115ae41d71060f1f15e3c
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=7be234d06ea39ab6a88115ae41d71060f1f15e3c
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
Modified: 2024-11-21
CVE-2018-7326
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-lltd.c had an infinite loop that was addressed by using a correct integer data type.
- 103158
- 103158
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14419
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14419
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=293b999425e998d6cde0d9149648e421ea7687d0
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=293b999425e998d6cde0d9149648e421ea7687d0
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
Modified: 2024-11-21
CVE-2018-7327
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-openflow_v6.c had an infinite loop that was addressed by validating property lengths.
- 103158
- 103158
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14420
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14420
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=563989f888e51258edb9a27db56124bdc33c9afe
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=563989f888e51258edb9a27db56124bdc33c9afe
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
Modified: 2024-11-21
CVE-2018-7328
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-usb.c had an infinite loop that was addressed by rejecting short frame header lengths.
- 103158
- 103158
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14421
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14421
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=69d09028c956f6e049145485ce9b3e2858789b2b
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=69d09028c956f6e049145485ce9b3e2858789b2b
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
Modified: 2024-11-21
CVE-2018-7329
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-s7comm.c had an infinite loop that was addressed by correcting off-by-one errors.
- 103158
- 103158
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14423
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14423
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=d8a0cbc4f2979e0b1cadbe79f0b8b4ecb92477be
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=d8a0cbc4f2979e0b1cadbe79f0b8b4ecb92477be
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
Modified: 2024-11-21
CVE-2018-7330
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-thread.c had an infinite loop that was addressed by using a correct integer data type.
- 103158
- 103158
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14428
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14428
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8ad0c5b3683a17d9e2e16bbf25869140fd5c1c66
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8ad0c5b3683a17d9e2e16bbf25869140fd5c1c66
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
Modified: 2024-11-21
CVE-2018-7331
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-ber.c had an infinite loop that was addressed by validating a length.
- 103158
- 103158
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14444
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14444
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=157712b2f5f89b19ef2497ea89c5938eb29529da
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=157712b2f5f89b19ef2497ea89c5938eb29529da
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
Modified: 2024-11-21
CVE-2018-7332
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-reload.c had an infinite loop that was addressed by validating a length.
- 103158
- 103158
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14445
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14445
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=1ab0585098c7ce20f3afceb6730427cc2a1e98ea
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=1ab0585098c7ce20f3afceb6730427cc2a1e98ea
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
Modified: 2024-11-21
CVE-2018-7333
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, epan/dissectors/packet-rpcrdma.c had an infinite loop that was addressed by validating a chunk size.
- 103158
- 103158
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14449
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14449
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=bd6313181317bfe83842b27650b65f3c2b8d5dc9
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=bd6313181317bfe83842b27650b65f3c2b8d5dc9
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
- https://www.wireshark.org/security/wnpa-sec-2018-06.html
Modified: 2024-11-21
CVE-2018-7334
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, the UMTS MAC dissector could crash. This was addressed in epan/dissectors/packet-umts_mac.c by rejecting a certain reserved value.
- 103162
- 103162
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14339
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14339
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8ed705e1227d3d582e3f0de435bba606d053d686
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=8ed705e1227d3d582e3f0de435bba606d053d686
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- DSA-4217
- DSA-4217
- https://www.wireshark.org/security/wnpa-sec-2018-07.html
- https://www.wireshark.org/security/wnpa-sec-2018-07.html
Modified: 2024-11-21
CVE-2018-7335
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, the IEEE 802.11 dissector could crash. This was addressed in epan/crypt/airpdcap.c by rejecting lengths that are too small.
- 103165
- 103165
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14442
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14442
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a2901dcf45c9f1b07abfbf2a0b0cd654371d72a4
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a2901dcf45c9f1b07abfbf2a0b0cd654371d72a4
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- DSA-4217
- DSA-4217
- https://www.wireshark.org/security/wnpa-sec-2018-05.html
- https://www.wireshark.org/security/wnpa-sec-2018-05.html
Modified: 2024-11-21
CVE-2018-7336
In Wireshark 2.4.0 to 2.4.4 and 2.2.0 to 2.2.12, the FCP protocol dissector could crash. This was addressed in epan/dissectors/packet-fcp.c by checking for a NULL pointer.
- 103166
- 103166
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14374
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14374
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b56f598f1bc04f5d00f13b38c713763928cedb7c
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b56f598f1bc04f5d00f13b38c713763928cedb7c
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-09.html
- https://www.wireshark.org/security/wnpa-sec-2018-09.html
Modified: 2024-11-21
CVE-2018-7337
In Wireshark 2.4.0 to 2.4.4, the DOCSIS protocol dissector could crash. This was addressed in plugins/docsis/packet-docsis.c by removing the recursive algorithm that had been used for concatenated PDUs.
- 103164
- 103164
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14446
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14446
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=511a8b0b546d25413e289dc5a7d3a455a33994c2
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=511a8b0b546d25413e289dc5a7d3a455a33994c2
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-08.html
- https://www.wireshark.org/security/wnpa-sec-2018-08.html
Modified: 2024-11-21
CVE-2018-7417
In Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the IPMI dissector could crash. This was addressed in epan/dissectors/packet-ipmi-picmg.c by adding support for crafted packets that lack an IPMI header.
- 103156
- 103156
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14409
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14409
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=81216a176b25dd8a616e11808a951e141a467009
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=81216a176b25dd8a616e11808a951e141a467009
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-12.html
- https://www.wireshark.org/security/wnpa-sec-2018-12.html
Modified: 2024-11-21
CVE-2018-7418
In Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the SIGCOMP dissector could crash. This was addressed in epan/dissectors/packet-sigcomp.c by correcting the extraction of the length value.
- 103157
- 103157
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14410
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14410
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=29d920b8309905dda11ad397596fe8aafc9b4bf7
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=29d920b8309905dda11ad397596fe8aafc9b4bf7
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-13.html
- https://www.wireshark.org/security/wnpa-sec-2018-13.html
Modified: 2024-11-21
CVE-2018-7419
In Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the NBAP dissector could crash. This was addressed in epan/dissectors/asn1/nbap/nbap.cnf by ensuring DCH ID initialization.
- 103159
- 103159
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14443
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14443
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=bebd3a1f50b0a27738d8d3da5b33c1b392eb7273
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=bebd3a1f50b0a27738d8d3da5b33c1b392eb7273
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- DSA-4217
- DSA-4217
- https://www.wireshark.org/security/wnpa-sec-2018-14.html
- https://www.wireshark.org/security/wnpa-sec-2018-14.html
Modified: 2024-11-21
CVE-2018-7420
In Wireshark 2.2.0 to 2.2.12 and 2.4.0 to 2.4.4, the pcapng file parser could crash. This was addressed in wiretap/pcapng.c by adding a block-size check for sysdig event blocks.
- 103163
- 103163
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14403
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14403
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=129e41f9f63885ad8224ef413c2860788fb9e849
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=129e41f9f63885ad8224ef413c2860788fb9e849
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20180418 [SECURITY] [DLA 1353-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-11.html
- https://www.wireshark.org/security/wnpa-sec-2018-11.html
Modified: 2024-11-21
CVE-2019-5716
In Wireshark 2.6.0 to 2.6.5, the 6LoWPAN dissector could crash. This was addressed in epan/dissectors/packet-6lowpan.c by avoiding use of a TVB before its creation.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 106482
- 106482
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15217
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15217
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2b2eea1793dbff813896e1ae9dff1bedb39ee010
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2b2eea1793dbff813896e1ae9dff1bedb39ee010
- [debian-lts-announce] 20190128 [SECURITY] [DLA 1645-1] wireshark security update
- [debian-lts-announce] 20190128 [SECURITY] [DLA 1645-1] wireshark security update
- 20190324 [SECURITY] [DSA 4416-1] wireshark security update
- 20190324 [SECURITY] [DSA 4416-1] wireshark security update
- DSA-4416
- DSA-4416
- https://www.wireshark.org/security/wnpa-sec-2019-01.html
- https://www.wireshark.org/security/wnpa-sec-2019-01.html
Modified: 2024-11-21
CVE-2019-5717
In Wireshark 2.6.0 to 2.6.5 and 2.4.0 to 2.4.11, the P_MUL dissector could crash. This was addressed in epan/dissectors/packet-p_mul.c by rejecting the invalid sequence number of zero.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 106482
- 106482
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15337
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15337
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=bf9272a92f3df1e4ccfaad434e123222ae5313f7
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=bf9272a92f3df1e4ccfaad434e123222ae5313f7
- [debian-lts-announce] 20190128 [SECURITY] [DLA 1645-1] wireshark security update
- [debian-lts-announce] 20190128 [SECURITY] [DLA 1645-1] wireshark security update
- 20190324 [SECURITY] [DSA 4416-1] wireshark security update
- 20190324 [SECURITY] [DSA 4416-1] wireshark security update
- DSA-4416
- DSA-4416
- https://www.wireshark.org/security/wnpa-sec-2019-02.html
- https://www.wireshark.org/security/wnpa-sec-2019-02.html
Modified: 2024-11-21
CVE-2019-5718
In Wireshark 2.6.0 to 2.6.5 and 2.4.0 to 2.4.11, the RTSE dissector and other ASN.1 dissectors could crash. This was addressed in epan/charsets.c by adding a get_t61_string length check.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 106482
- 106482
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15373
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15373
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=cd09cb5cfb673beca3cce20b1d6a9bc67a134ae1
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=cd09cb5cfb673beca3cce20b1d6a9bc67a134ae1
- 20190324 [SECURITY] [DSA 4416-1] wireshark security update
- 20190324 [SECURITY] [DSA 4416-1] wireshark security update
- DSA-4416
- DSA-4416
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.wireshark.org/security/wnpa-sec-2019-03.html
- https://www.wireshark.org/security/wnpa-sec-2019-03.html
Modified: 2024-11-21
CVE-2019-5719
In Wireshark 2.6.0 to 2.6.5 and 2.4.0 to 2.4.11, the ISAKMP dissector could crash. This was addressed in epan/dissectors/packet-isakmp.c by properly handling the case of a missing decryption data block.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15374
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15374
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b5b02f2a9b8772d8814096f86c60a32889d61f2c
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=b5b02f2a9b8772d8814096f86c60a32889d61f2c
- [debian-lts-announce] 20190128 [SECURITY] [DLA 1645-1] wireshark security update
- [debian-lts-announce] 20190128 [SECURITY] [DLA 1645-1] wireshark security update
- 20190324 [SECURITY] [DSA 4416-1] wireshark security update
- 20190324 [SECURITY] [DSA 4416-1] wireshark security update
- DSA-4416
- DSA-4416
- https://www.wireshark.org/security/wnpa-sec-2019-04.html
- https://www.wireshark.org/security/wnpa-sec-2019-04.html
Modified: 2024-11-21
CVE-2019-9208
In Wireshark 2.4.0 to 2.4.12 and 2.6.0 to 2.6.6, the TCAP dissector could crash. This was addressed in epan/dissectors/asn1/tcap/tcap.cnf by avoiding NULL pointer dereferences.
- openSUSE-SU-2019:1108
- openSUSE-SU-2019:1390
- openSUSE-SU-2020:0362
- 107203
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15464
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=3d1b8004ed3a07422ca5d4e4ee8097150b934fd2
- 20190324 [SECURITY] [DSA 4416-1] wireshark security update
- USN-3986-1
- DSA-4416
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.wireshark.org/security/wnpa-sec-2019-07.html
- openSUSE-SU-2019:1108
- https://www.wireshark.org/security/wnpa-sec-2019-07.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- DSA-4416
- USN-3986-1
- 20190324 [SECURITY] [DSA 4416-1] wireshark security update
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=3d1b8004ed3a07422ca5d4e4ee8097150b934fd2
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15464
- 107203
- openSUSE-SU-2020:0362
- openSUSE-SU-2019:1390
Modified: 2024-11-21
CVE-2019-9209
In Wireshark 2.4.0 to 2.4.12 and 2.6.0 to 2.6.6, the ASN.1 BER and related dissectors could crash. This was addressed in epan/dissectors/packet-ber.c by preventing a buffer overflow associated with excessive digits in time values.
- openSUSE-SU-2019:1108
- openSUSE-SU-2019:1390
- openSUSE-SU-2020:0362
- 107203
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15447
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f8fbe9f934d65b2694fa74622e5eb2e1dc8cd20b
- [debian-lts-announce] 20190325 [SECURITY] [DLA 1729-1] wireshark security update
- 20190324 [SECURITY] [DSA 4416-1] wireshark security update
- USN-3986-1
- DSA-4416
- https://www.wireshark.org/security/wnpa-sec-2019-06.html
- openSUSE-SU-2019:1108
- https://www.wireshark.org/security/wnpa-sec-2019-06.html
- DSA-4416
- USN-3986-1
- 20190324 [SECURITY] [DSA 4416-1] wireshark security update
- [debian-lts-announce] 20190325 [SECURITY] [DLA 1729-1] wireshark security update
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f8fbe9f934d65b2694fa74622e5eb2e1dc8cd20b
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15447
- 107203
- openSUSE-SU-2020:0362
- openSUSE-SU-2019:1390
Modified: 2024-11-21
CVE-2019-9214
In Wireshark 2.4.0 to 2.4.12 and 2.6.0 to 2.6.6, the RPCAP dissector could crash. This was addressed in epan/dissectors/packet-rpcap.c by avoiding an attempted dereference of a NULL conversation.
- openSUSE-SU-2019:1108
- openSUSE-SU-2019:1390
- openSUSE-SU-2020:0362
- 107203
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15536
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c557bb0910be271e49563756411a690a1bc53ce5
- 20190324 [SECURITY] [DSA 4416-1] wireshark security update
- USN-3986-1
- DSA-4416
- https://www.wireshark.org/security/wnpa-sec-2019-08.html
- openSUSE-SU-2019:1108
- https://www.wireshark.org/security/wnpa-sec-2019-08.html
- DSA-4416
- USN-3986-1
- 20190324 [SECURITY] [DSA 4416-1] wireshark security update
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=c557bb0910be271e49563756411a690a1bc53ce5
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15536
- 107203
- openSUSE-SU-2020:0362
- openSUSE-SU-2019:1390
Closed bugs
отсутствует devel пакет
Package kernel-image-un-def updated to version 4.19.27-alt0.M80P.1 for branch c8.1 in task 224041.
Closed vulnerabilities
BDU:2019-00067
Уязвимость функции mincore () ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2019-00432
Уязвимость функции map_write() ("kernel/user_namespace.c") ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2019-00570
Уязвимость функции proc_pid_stack ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2019-01052
Уязвимость функции vcpu_scan_ioapic ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01061
Уязвимость функций connect() и close() ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2019-01062
Уязвимость функции crypto_report_one() ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2019-01069
Уязвимость функции handle_rx() ядра операционной системы Linux, позволяющая нарушителю вызвать повреждение памяти ядра
BDU:2019-01183
Уязвимость реализации протокола SCTP ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии
BDU:2019-01341
Уязвимость сервера NFS ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01343
Уязвимость функции cdrom_ioctl_drive_status() операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2019-01346
Уязвимость функции kvm_ioctl_create_device ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01352
Уязвимость подсистемы виртуализации Kernel-based Virtual Machine (KVM) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2019-01406
Уязвимость драйвера интерфейса управления платформой IPMI ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01409
Уязвимость функции hso_get_config_data ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01738
Уязвимость функции chap_server_compute_md5() реализации протокола ISCSI ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании или получить доступ к защищаемой информации
BDU:2019-02380
Уязвимость функции __usb_get_extra_descriptor подсистемы USB ядра операционных систем Linux, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации
BDU:2019-02381
Уязвимость ядра операционных систем Linux, связанная со смещением указателя за пределы допустимых значений, позволяющая нарушителю реализовать атаки по побочным каналам
BDU:2019-02782
Уязвимость функции hid_debug_events_read () ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-02783
Уязвимость в реализации системного вызова mremap() ядра операционной системы Linux, позволяющая нарушителю получить доступ к физической странице
BDU:2019-03067
Уязвимость функции ipddp_ioctl ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2019-03124
Уязвимость механизма проверки BPF ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии
BDU:2019-03248
Уязвимость подсистемы виртуализации Kernel-based Virtual Machine (KVM) ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии или вызвать отказ в обслуживании
BDU:2019-03298
Уязвимость функции usb_audio_probe ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2019-03459
Уязвимость функции fd_locked_ioctl ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2019-03996
Уязвимость ядра операционной системы Linux, связанная с отсутствием защиты служебных данных, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2020-00620
Уязвимость компонента userfaultfd ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на целостность защищаемой информации
BDU:2020-00735
Уязвимость функции xenvif_set_hash_mapping гипервизора Xen, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность
BDU:2020-00842
Уязвимость в функции can_can_gw_rcv in net/can/gw.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-01474
Уязвимость функции build_audio_procunit ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2021-01410
Уязвимость буфера сокета SCTP ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01416
Уязвимость подсистемы виртуализации Kernel-based Virtual Machine (KVM) в файле arch/arm64/kvm/guest.c ядра операционной системы Linux, позволяющая нарушителю нарушить целостность данных, а также вызвать отказ в обслуживании
BDU:2021-01437
Уязвимость функции cdrom_ioctl_select_disc (drivers/cdrom/cdrom.c) ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2022-03207
Уязвимость компонента TCP Pace Handler функции tcp_internal_pacing в файле net/ipv4/tcp_output.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-10940
The cdrom_ioctl_media_changed function in drivers/cdrom/cdrom.c in the Linux kernel before 4.16.6 allows local attackers to use a incorrect bounds check in the CDROM driver CDROM_MEDIA_CHANGED ioctl to read out kernel memory.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9de4ee40547fd315d4a0ed1dd15a2fa3559ad707
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9de4ee40547fd315d4a0ed1dd15a2fa3559ad707
- 104154
- 104154
- RHSA-2018:2948
- RHSA-2018:2948
- RHSA-2018:3083
- RHSA-2018:3083
- RHSA-2018:3096
- RHSA-2018:3096
- https://github.com/torvalds/linux/commit/9de4ee40547fd315d4a0ed1dd15a2fa3559ad707
- https://github.com/torvalds/linux/commit/9de4ee40547fd315d4a0ed1dd15a2fa3559ad707
- [debian-lts-announce] 20180601 [SECURITY] [DLA 1392-1] linux security update
- [debian-lts-announce] 20180601 [SECURITY] [DLA 1392-1] linux security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update
- [debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update
- [debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update
- [debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package
- [debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package
- USN-3676-1
- USN-3676-1
- USN-3676-2
- USN-3676-2
- USN-3695-1
- USN-3695-1
- USN-3695-2
- USN-3695-2
- USN-3754-1
- USN-3754-1
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.16.6
- https://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.16.6
Modified: 2024-11-21
CVE-2018-14625
A flaw was found in the Linux Kernel where an attacker may be able to have an uncontrolled read to kernel-memory from within a vm guest. A race condition between connect() and close() function may allow an attacker using the AF_VSOCK protocol to gather a 4 byte information leak or possibly intercept or corrupt AF_VSOCK messages destined to other clients.
- RHSA-2019:2029
- RHSA-2019:2043
- RHSA-2019:4154
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14625
- [debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update
- https://syzkaller.appspot.com/bug?extid=bd391451452fb0b93039
- USN-3871-1
- USN-3871-3
- USN-3871-4
- USN-3871-5
- USN-3872-1
- USN-3878-1
- USN-3878-2
- RHSA-2019:2029
- USN-3878-2
- USN-3878-1
- USN-3872-1
- USN-3871-5
- USN-3871-4
- USN-3871-3
- USN-3871-1
- https://syzkaller.appspot.com/bug?extid=bd391451452fb0b93039
- [debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14625
- RHSA-2019:4154
- RHSA-2019:2043
Modified: 2024-11-21
CVE-2018-14633
A security flaw was found in the chap_server_compute_md5() function in the ISCSI target code in the Linux kernel in a way an authentication request from an ISCSI initiator is processed. An unauthenticated remote attacker can cause a stack buffer overflow and smash up to 17 bytes of the stack. The attack requires the iSCSI target to be enabled on the victim host. Depending on how the target's code was built (i.e. depending on a compiler, compile flags and hardware architecture) an attack may lead to a system crash and thus to a denial-of-service or possibly to a non-authorized access to data exported by an iSCSI target. Due to the nature of the flaw, privilege escalation cannot be fully ruled out, although we believe it is highly unlikely. Kernel versions 4.18.x, 4.14.x and 3.10.x are believed to be vulnerable.
- 105388
- RHSA-2018:3651
- RHSA-2018:3666
- RHSA-2019:1946
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14633
- https://git.kernel.org/pub/scm/linux/kernel/git/mkp/scsi.git/commit/?h=4.19/scsi-fixes&id=1816494330a83f2a064499d8ed2797045641f92c
- https://git.kernel.org/pub/scm/linux/kernel/git/mkp/scsi.git/commit/?h=4.19/scsi-fixes&id=8c39e2699f8acb2e29782a834e56306da24937fe
- [debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
- https://seclists.org/oss-sec/2018/q3/270
- USN-3775-1
- USN-3775-2
- USN-3776-1
- USN-3776-2
- USN-3777-1
- USN-3777-2
- USN-3777-3
- USN-3779-1
- DSA-4308
- 105388
- DSA-4308
- USN-3779-1
- USN-3777-3
- USN-3777-2
- USN-3777-1
- USN-3776-2
- USN-3776-1
- USN-3775-2
- USN-3775-1
- https://seclists.org/oss-sec/2018/q3/270
- [debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
- https://git.kernel.org/pub/scm/linux/kernel/git/mkp/scsi.git/commit/?h=4.19/scsi-fixes&id=8c39e2699f8acb2e29782a834e56306da24937fe
- https://git.kernel.org/pub/scm/linux/kernel/git/mkp/scsi.git/commit/?h=4.19/scsi-fixes&id=1816494330a83f2a064499d8ed2797045641f92c
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-14633
- RHSA-2019:1946
- RHSA-2018:3666
- RHSA-2018:3651
Modified: 2024-11-21
CVE-2018-15471
An issue was discovered in xenvif_set_hash_mapping in drivers/net/xen-netback/hash.c in the Linux kernel through 4.18.1, as used in Xen through 4.11.x and other products. The Linux netback driver allows frontends to control mapping of requests to request queues. When processing a request to set or change this mapping, some input validation (e.g., for an integer overflow) was missing or flawed, leading to OOB access in hash handling. A malicious or buggy frontend may cause the (usually privileged) backend to make out of bounds memory accesses, potentially resulting in one or more of privilege escalation, Denial of Service (DoS), or information leaks.
- http://xenbits.xen.org/xsa/advisory-270.html
- http://xenbits.xen.org/xsa/advisory-270.html
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1607
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1607
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- USN-3819-1
- USN-3819-1
- USN-3820-1
- USN-3820-1
- USN-3820-2
- USN-3820-2
- USN-3820-3
- USN-3820-3
- DSA-4313
- DSA-4313
Modified: 2024-11-21
CVE-2018-16658
An issue was discovered in the Linux kernel before 4.18.6. An information leak in cdrom_ioctl_drive_status in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8f3fafc9c2f0ece10832c25f7ffcb07c97a32ad4
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8f3fafc9c2f0ece10832c25f7ffcb07c97a32ad4
- 105334
- 105334
- RHSA-2019:2029
- RHSA-2019:2029
- RHSA-2019:2043
- RHSA-2019:2043
- RHSA-2019:4154
- RHSA-2019:4154
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.6
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.6
- https://github.com/torvalds/linux/commit/8f3fafc9c2f0ece10832c25f7ffcb07c97a32ad4
- https://github.com/torvalds/linux/commit/8f3fafc9c2f0ece10832c25f7ffcb07c97a32ad4
- [debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
- [debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
- USN-3797-1
- USN-3797-1
- USN-3797-2
- USN-3797-2
- USN-3820-1
- USN-3820-1
- USN-3820-2
- USN-3820-2
- USN-3820-3
- USN-3820-3
- USN-3822-1
- USN-3822-1
- USN-3822-2
- USN-3822-2
- DSA-4308
- DSA-4308
Modified: 2024-11-21
CVE-2018-16880
A flaw was found in the Linux kernel's handle_rx() function in the [vhost_net] driver. A malicious virtual guest, under specific conditions, can trigger an out-of-bounds write in a kmalloc-8 slab on a virtual host which may lead to a kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out. Versions from v4.16 and newer are vulnerable.
- openSUSE-SU-2019:1404
- openSUSE-SU-2019:1404
- 106735
- 106735
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16880
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16880
- https://support.f5.com/csp/article/K03593314
- https://support.f5.com/csp/article/K03593314
- USN-3903-1
- USN-3903-1
- USN-3903-2
- USN-3903-2
Modified: 2024-11-21
CVE-2018-16882
A use-after-free issue was found in the way the Linux kernel's KVM hypervisor processed posted interrupts when nested(=1) virtualization is enabled. In nested_get_vmcs12_pages(), in case of an error while processing posted interrupt address, it unmaps the 'pi_desc_page' without resetting 'pi_desc' descriptor address, which is later used in pi_test_and_clear_on(). A guest user/process could use this flaw to crash the host kernel resulting in DoS or potentially gain privileged access to a system. Kernel versions before 4.14.91 and before 4.19.13 are vulnerable.
- 106254
- 106254
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16882
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16882
- https://lwn.net/Articles/775720/
- https://lwn.net/Articles/775720/
- https://lwn.net/Articles/775721/
- https://lwn.net/Articles/775721/
- https://marc.info/?l=kvm&m=154514994222809&w=2
- https://marc.info/?l=kvm&m=154514994222809&w=2
- https://support.f5.com/csp/article/K80557033
- https://support.f5.com/csp/article/K80557033
- USN-3871-1
- USN-3871-1
- USN-3871-3
- USN-3871-3
- USN-3871-4
- USN-3871-4
- USN-3871-5
- USN-3871-5
- USN-3872-1
- USN-3872-1
- USN-3878-1
- USN-3878-1
- USN-3878-2
- USN-3878-2
Modified: 2024-11-21
CVE-2018-16884
A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.
- 106253
- 106253
- RHSA-2019:1873
- RHSA-2019:1873
- RHSA-2019:1891
- RHSA-2019:1891
- RHSA-2019:2696
- RHSA-2019:2696
- RHSA-2019:2730
- RHSA-2019:2730
- RHSA-2019:3309
- RHSA-2019:3309
- RHSA-2019:3517
- RHSA-2019:3517
- RHSA-2020:0204
- RHSA-2020:0204
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16884
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16884
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- [debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update
- [debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update
- https://patchwork.kernel.org/cover/10733767/
- https://patchwork.kernel.org/cover/10733767/
- https://patchwork.kernel.org/patch/10733769/
- https://patchwork.kernel.org/patch/10733769/
- https://support.f5.com/csp/article/K21430012
- https://support.f5.com/csp/article/K21430012
- USN-3932-1
- USN-3932-1
- USN-3932-2
- USN-3932-2
- USN-3980-1
- USN-3980-1
- USN-3980-2
- USN-3980-2
- USN-3981-1
- USN-3981-1
- USN-3981-2
- USN-3981-2
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
Modified: 2024-11-21
CVE-2018-17972
An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.
- openSUSE-SU-2019:1407
- openSUSE-SU-2019:1407
- 105525
- 105525
- RHSA-2019:0512
- RHSA-2019:0512
- RHSA-2019:0514
- RHSA-2019:0514
- RHSA-2019:0831
- RHSA-2019:0831
- RHSA-2019:2473
- RHSA-2019:2473
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- https://marc.info/?l=linux-fsdevel&m=153806242024956&w=2
- https://marc.info/?l=linux-fsdevel&m=153806242024956&w=2
- https://support.f5.com/csp/article/K27673650?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K27673650?utm_source=f5support&%3Butm_medium=RSS
- USN-3821-1
- USN-3821-1
- USN-3821-2
- USN-3821-2
- USN-3832-1
- USN-3832-1
- USN-3835-1
- USN-3835-1
- USN-3871-1
- USN-3871-1
- USN-3871-3
- USN-3871-3
- USN-3871-4
- USN-3871-4
- USN-3871-5
- USN-3871-5
- USN-3880-1
- USN-3880-1
- USN-3880-2
- USN-3880-2
Modified: 2024-11-21
CVE-2018-18021
arch/arm64/kvm/guest.c in KVM in the Linux kernel before 4.18.12 on the arm64 platform mishandles the KVM_SET_ON_REG ioctl. This is exploitable by attackers who can create virtual machines. An attacker can arbitrarily redirect the hypervisor flow of control (with full register control). An attacker can also cause a denial of service (hypervisor panic) via an illegal exception return. This occurs because of insufficient restrictions on userspace access to the core register file, and because PSTATE.M validation does not prevent unintended execution modes.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2a3f93459d689d990b3ecfbe782fec89b97d3279
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2a3f93459d689d990b3ecfbe782fec89b97d3279
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d26c25a9d19b5976b319af528886f89cf455692d
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d26c25a9d19b5976b319af528886f89cf455692d
- 105550
- 105550
- RHSA-2018:3656
- RHSA-2018:3656
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.12
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.12
- https://github.com/torvalds/linux/commit/2a3f93459d689d990b3ecfbe782fec89b97d3279
- https://github.com/torvalds/linux/commit/2a3f93459d689d990b3ecfbe782fec89b97d3279
- https://github.com/torvalds/linux/commit/d26c25a9d19b5976b319af528886f89cf455692d
- https://github.com/torvalds/linux/commit/d26c25a9d19b5976b319af528886f89cf455692d
- USN-3821-1
- USN-3821-1
- USN-3821-2
- USN-3821-2
- USN-3931-1
- USN-3931-1
- USN-3931-2
- USN-3931-2
- DSA-4313
- DSA-4313
- https://www.openwall.com/lists/oss-security/2018/10/02/2
- https://www.openwall.com/lists/oss-security/2018/10/02/2
Modified: 2024-11-21
CVE-2018-18281
Since Linux kernel version 3.2, the mremap() syscall performs TLB flushes after dropping pagetable locks. If a syscall such as ftruncate() removes entries from the pagetables of a task that is in the middle of mremap(), a stale TLB entry can remain for a short time that permits access to a physical page after it has been released back to the page allocator and reused. This is fixed in the following kernel versions: 4.9.135, 4.14.78, 4.18.16, 4.19.
- http://packetstormsecurity.com/files/150001/Linux-mremap-TLB-Flush-Too-Late.html
- http://packetstormsecurity.com/files/150001/Linux-mremap-TLB-Flush-Too-Late.html
- [oss-security] 20181029 Linux kernel: TLB flush happens too late on mremap (CVE-2018-18281; fixed in 4.9.135, 4.14.78, 4.18.16, 4.19)
- [oss-security] 20181029 Linux kernel: TLB flush happens too late on mremap (CVE-2018-18281; fixed in 4.9.135, 4.14.78, 4.18.16, 4.19)
- 105761
- 105761
- 106503
- 106503
- RHSA-2019:0831
- RHSA-2019:0831
- RHSA-2019:2029
- RHSA-2019:2029
- RHSA-2019:2043
- RHSA-2019:2043
- RHSA-2020:0036
- RHSA-2020:0036
- RHSA-2020:0100
- RHSA-2020:0100
- RHSA-2020:0103
- RHSA-2020:0103
- RHSA-2020:0179
- RHSA-2020:0179
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1695
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1695
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.78
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.78
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.16
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.16
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.135
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.135
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=eb66ae030829605d61fbef1909ce310e29f78821
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=eb66ae030829605d61fbef1909ce310e29f78821
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- USN-3832-1
- USN-3832-1
- USN-3835-1
- USN-3835-1
- USN-3871-1
- USN-3871-1
- USN-3871-3
- USN-3871-3
- USN-3871-4
- USN-3871-4
- USN-3871-5
- USN-3871-5
- USN-3880-1
- USN-3880-1
- USN-3880-2
- USN-3880-2
Modified: 2024-11-21
CVE-2018-18397
The userfaultfd implementation in the Linux kernel before 4.19.7 mishandles access control for certain UFFDIO_ ioctl calls, as demonstrated by allowing local users to write data into holes in a tmpfs file (if the user has read-only access to that file, and that file contains holes), related to fs/userfaultfd.c and mm/userfaultfd.c.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=29ec90660d68bbdd69507c1c8b4e33aa299278b1
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=29ec90660d68bbdd69507c1c8b4e33aa299278b1
- RHBA-2019:0327
- RHBA-2019:0327
- RHSA-2019:0163
- RHSA-2019:0163
- RHSA-2019:0202
- RHSA-2019:0202
- RHSA-2019:0324
- RHSA-2019:0324
- RHSA-2019:0831
- RHSA-2019:0831
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1700
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1700
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.87
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.87
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.7
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.7
- https://github.com/torvalds/linux/commit/29ec90660d68bbdd69507c1c8b4e33aa299278b1
- https://github.com/torvalds/linux/commit/29ec90660d68bbdd69507c1c8b4e33aa299278b1
- USN-3901-1
- USN-3901-1
- USN-3901-2
- USN-3901-2
- USN-3903-1
- USN-3903-1
- USN-3903-2
- USN-3903-2
Modified: 2024-11-21
CVE-2018-18445
In the Linux kernel 4.14.x, 4.15.x, 4.16.x, 4.17.x, and 4.18.x before 4.18.13, faulty computation of numeric bounds in the BPF verifier permits out-of-bounds memory accesses because adjust_scalar_min_max_vals in kernel/bpf/verifier.c mishandles 32-bit right shifts.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b799207e1e1816b09e7a5920fbb2d5fcf6edd681
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b799207e1e1816b09e7a5920fbb2d5fcf6edd681
- RHSA-2019:0512
- RHSA-2019:0512
- RHSA-2019:0514
- RHSA-2019:0514
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1686
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1686
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.75
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.75
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.13
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.13
- https://github.com/torvalds/linux/commit/b799207e1e1816b09e7a5920fbb2d5fcf6edd681
- https://github.com/torvalds/linux/commit/b799207e1e1816b09e7a5920fbb2d5fcf6edd681
- https://support.f5.com/csp/article/K38456756
- https://support.f5.com/csp/article/K38456756
- USN-3832-1
- USN-3832-1
- USN-3835-1
- USN-3835-1
- USN-3847-1
- USN-3847-1
- USN-3847-2
- USN-3847-2
- USN-3847-3
- USN-3847-3
Modified: 2024-11-21
CVE-2018-18710
An issue was discovered in the Linux kernel through 4.19. An information leak in cdrom_ioctl_select_disc in drivers/cdrom/cdrom.c could be used by local attackers to read kernel memory because a cast from unsigned long to int interferes with bounds checking. This is similar to CVE-2018-10940 and CVE-2018-16658.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276
- 106041
- 106041
- https://github.com/torvalds/linux/commit/e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276
- https://github.com/torvalds/linux/commit/e4f3aa2e1e67bb48dfbaaf1cad59013d5a5bc276
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- USN-3846-1
- USN-3846-1
- USN-3847-1
- USN-3847-1
- USN-3847-2
- USN-3847-2
- USN-3847-3
- USN-3847-3
- USN-3848-1
- USN-3848-1
- USN-3848-2
- USN-3848-2
- USN-3849-1
- USN-3849-1
- USN-3849-2
- USN-3849-2
Modified: 2024-11-21
CVE-2018-18955
In the Linux kernel 4.15.x through 4.19.x before 4.19.2, map_write() in kernel/user_namespace.c allows privilege escalation because it mishandles nested user namespaces with more than 5 UID or GID ranges. A user who has CAP_SYS_ADMIN in an affected user namespace can bypass access controls on resources outside the namespace, as demonstrated by reading /etc/shadow. This occurs because an ID transformation takes place properly for the namespaced-to-kernel direction but not for the kernel-to-namespaced direction.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d2f007dbe7e4c9583eea6eb04d60001e85c6f1bd
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d2f007dbe7e4c9583eea6eb04d60001e85c6f1bd
- 105941
- 105941
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1712
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1712
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.19
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.19
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.2
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.2
- https://github.com/torvalds/linux/commit/d2f007dbe7e4c9583eea6eb04d60001e85c6f1bd
- https://github.com/torvalds/linux/commit/d2f007dbe7e4c9583eea6eb04d60001e85c6f1bd
- https://security.netapp.com/advisory/ntap-20190416-0003/
- https://security.netapp.com/advisory/ntap-20190416-0003/
- https://support.f5.com/csp/article/K39103040
- https://support.f5.com/csp/article/K39103040
- USN-3832-1
- USN-3832-1
- USN-3833-1
- USN-3833-1
- USN-3835-1
- USN-3835-1
- USN-3836-1
- USN-3836-1
- USN-3836-2
- USN-3836-2
- 45886
- 45886
- 45915
- 45915
Modified: 2024-11-21
CVE-2018-19406
kvm_pv_send_ipi in arch/x86/kvm/lapic.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where the apic map is uninitialized.
Modified: 2024-11-21
CVE-2018-19407
The vcpu_scan_ioapic function in arch/x86/kvm/x86.c in the Linux kernel through 4.19.2 allows local users to cause a denial of service (NULL pointer dereference and BUG) via crafted system calls that reach a situation where ioapic is uninitialized.
- 105987
- 105987
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- https://lkml.org/lkml/2018/11/20/580
- https://lkml.org/lkml/2018/11/20/580
- USN-3871-1
- USN-3871-1
- USN-3871-3
- USN-3871-3
- USN-3871-4
- USN-3871-4
- USN-3871-5
- USN-3871-5
- USN-3872-1
- USN-3872-1
- USN-3878-1
- USN-3878-1
- USN-3878-2
- USN-3878-2
- USN-3879-1
- USN-3879-1
- USN-3879-2
- USN-3879-2
Modified: 2024-11-21
CVE-2018-19824
In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.
- 106109
- 106109
- RHSA-2019:2703
- RHSA-2019:2703
- https://bugzilla.suse.com/show_bug.cgi?id=1118152
- https://bugzilla.suse.com/show_bug.cgi?id=1118152
- https://git.kernel.org/pub/scm/linux/kernel/git/tiwai/sound.git/commit/?id=5f8cf712582617d523120df67d392059eaf2fc4b
- https://git.kernel.org/pub/scm/linux/kernel/git/tiwai/sound.git/commit/?id=5f8cf712582617d523120df67d392059eaf2fc4b
- https://github.com/torvalds/linux/commit/5f8cf712582617d523120df67d392059eaf2fc4b
- https://github.com/torvalds/linux/commit/5f8cf712582617d523120df67d392059eaf2fc4b
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- [debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update
- [debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update
- https://support.f5.com/csp/article/K98155950
- https://support.f5.com/csp/article/K98155950
- USN-3879-1
- USN-3879-1
- USN-3879-2
- USN-3879-2
- USN-3930-1
- USN-3930-1
- USN-3930-2
- USN-3930-2
- USN-3931-1
- USN-3931-1
- USN-3931-2
- USN-3931-2
- USN-3933-1
- USN-3933-1
- USN-3933-2
- USN-3933-2
Modified: 2024-11-21
CVE-2018-19854
An issue was discovered in the Linux kernel before 4.19.3. crypto_report_one() and related functions in crypto/crypto_user.c (the crypto user configuration API) do not fully initialize structures that are copied to userspace, potentially leaking sensitive memory to user programs. NOTE: this is a CVE-2013-2547 regression but with easier exploitability because the attacker does not need a capability (however, the system must have the CONFIG_CRYPTO_USER kconfig option).
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f43f39958beb206b53292801e216d9b8a660f087
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f43f39958beb206b53292801e216d9b8a660f087
- RHSA-2019:3309
- RHSA-2019:3309
- RHSA-2019:3517
- RHSA-2019:3517
- https://github.com/torvalds/linux/commit/f43f39958beb206b53292801e216d9b8a660f087
- https://github.com/torvalds/linux/commit/f43f39958beb206b53292801e216d9b8a660f087
- https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.3
- https://kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.3
- USN-3872-1
- USN-3872-1
- USN-3878-1
- USN-3878-1
- USN-3878-2
- USN-3878-2
- USN-3901-1
- USN-3901-1
- USN-3901-2
- USN-3901-2
Modified: 2024-11-21
CVE-2018-19985
The function hso_get_config_data in drivers/net/usb/hso.c in the Linux kernel through 4.19.8 reads if_num from the USB device (as a u8) and uses it to index a small array, resulting in an object out-of-bounds (OOB) read that potentially allows arbitrary read in the kernel address space.
- http://lists.opensuse.org/opensuse-security-announce/2019-01/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2019-01/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00007.html
- http://packetstormsecurity.com/files/151420/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- http://packetstormsecurity.com/files/151420/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- RHSA-2019:3309
- RHSA-2019:3309
- RHSA-2019:3517
- RHSA-2019:3517
- https://hexhive.epfl.ch/projects/perifuzz/
- https://hexhive.epfl.ch/projects/perifuzz/
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- [debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update
- [debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update
- https://seclists.org/bugtraq/2019/Jan/52
- https://seclists.org/bugtraq/2019/Jan/52
- https://security.netapp.com/advisory/ntap-20190404-0002/
- https://security.netapp.com/advisory/ntap-20190404-0002/
- USN-4115-1
- USN-4115-1
- USN-4118-1
- USN-4118-1
Modified: 2024-11-21
CVE-2018-20169
An issue was discovered in the Linux kernel before 4.19.9. The USB subsystem mishandles size checks during the reading of an extra descriptor, related to __usb_get_extra_descriptor in drivers/usb/core/usb.c.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=704620afc70cf47abb9d6a1a57f3825d2bca49cf
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=704620afc70cf47abb9d6a1a57f3825d2bca49cf
- RHSA-2019:3309
- RHSA-2019:3309
- RHSA-2019:3517
- RHSA-2019:3517
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.9
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.9
- https://github.com/torvalds/linux/commit/704620afc70cf47abb9d6a1a57f3825d2bca49cf
- https://github.com/torvalds/linux/commit/704620afc70cf47abb9d6a1a57f3825d2bca49cf
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- [debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update
- [debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update
- USN-3879-1
- USN-3879-1
- USN-3879-2
- USN-3879-2
- USN-4094-1
- USN-4094-1
- USN-4118-1
- USN-4118-1
Modified: 2024-11-21
CVE-2018-20511
An issue was discovered in the Linux kernel before 4.18.11. The ipddp_ioctl function in drivers/net/appletalk/ipddp.c allows local users to obtain sensitive kernel address information by leveraging CAP_NET_ADMIN to read the ipddp_route dev and next fields via an SIOCFINDIPDDPRT ioctl call.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9824dfae5741275473a23a7ed5756c7b6efacc9d
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=9824dfae5741275473a23a7ed5756c7b6efacc9d
- 106347
- 106347
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.11
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.11
- https://github.com/torvalds/linux/commit/9824dfae5741275473a23a7ed5756c7b6efacc9d
- https://github.com/torvalds/linux/commit/9824dfae5741275473a23a7ed5756c7b6efacc9d
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- https://lkml.org/lkml/2018/9/27/480
- https://lkml.org/lkml/2018/9/27/480
- USN-4094-1
- USN-4094-1
- USN-4118-1
- USN-4118-1
Modified: 2024-11-21
CVE-2018-7755
An issue was discovered in the fd_locked_ioctl function in drivers/block/floppy.c in the Linux kernel through 4.15.7. The floppy driver will copy a kernel pointer to user memory in response to the FDGETPRM ioctl. An attacker can send the FDGETPRM ioctl and use the obtained kernel pointer to discover the location of kernel code and data and bypass kernel security protections such as KASLR.
- RHSA-2019:2029
- RHSA-2019:2029
- RHSA-2019:2043
- RHSA-2019:2043
- [debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
- [debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
- https://lkml.org/lkml/2018/3/7/1116
- https://lkml.org/lkml/2018/3/7/1116
- USN-3695-1
- USN-3695-1
- USN-3695-2
- USN-3695-2
- USN-3696-1
- USN-3696-1
- USN-3696-2
- USN-3696-2
- USN-3697-1
- USN-3697-1
- USN-3697-2
- USN-3697-2
- USN-3698-1
- USN-3698-1
- USN-3698-2
- USN-3698-2
- DSA-4308
- DSA-4308
Modified: 2024-11-21
CVE-2019-15927
An issue was discovered in the Linux kernel before 4.20.2. An out-of-bounds access exists in the function build_audio_procunit in the file sound/usb/mixer.c.
- openSUSE-SU-2019:2173
- openSUSE-SU-2019:2173
- openSUSE-SU-2019:2181
- openSUSE-SU-2019:2181
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.2
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.2
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f4351a199cc120ff9d59e06d02e8657d08e6cc46
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f4351a199cc120ff9d59e06d02e8657d08e6cc46
- https://security.netapp.com/advisory/ntap-20191004-0001/
- https://security.netapp.com/advisory/ntap-20191004-0001/
Modified: 2024-11-21
CVE-2019-3701
An issue was discovered in can_can_gw_rcv in net/can/gw.c in the Linux kernel through 4.19.13. The CAN frame modification rules allow bitwise logical operations that can be also applied to the can_dlc field. The privileged user "root" with CAP_NET_ADMIN can create a CAN frame modification rule that makes the data length code a higher value than the available CAN frame data size. In combination with a configured checksum calculation where the result is stored relatively to the end of the data (e.g. cgw_csum_xor_rel) the tail of the skb (e.g. frag_list pointer in skb_shared_info) can be rewritten which finally can cause a system crash. Because of a missing check, the CAN drivers may write arbitrary content beyond the data registers in the CAN controller's I/O memory when processing can-gw manipulated outgoing frames.
- openSUSE-SU-2020:0543
- openSUSE-SU-2020:0543
- 106443
- 106443
- https://bugzilla.suse.com/show_bug.cgi?id=1120386
- https://bugzilla.suse.com/show_bug.cgi?id=1120386
- https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=0aaa81377c5a01f686bcdb8c7a6929a7bf330c68
- https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=0aaa81377c5a01f686bcdb8c7a6929a7bf330c68
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- [debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update
- [debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update
- https://marc.info/?l=linux-netdev&m=154651842302479&w=2
- https://marc.info/?l=linux-netdev&m=154651842302479&w=2
- https://marc.info/?l=linux-netdev&m=154661373531512&w=2
- https://marc.info/?l=linux-netdev&m=154661373531512&w=2
- https://support.f5.com/csp/article/K17957133
- https://support.f5.com/csp/article/K17957133
- USN-3932-1
- USN-3932-1
- USN-3932-2
- USN-3932-2
- USN-4115-1
- USN-4115-1
- USN-4118-1
- USN-4118-1
Modified: 2024-11-21
CVE-2019-3819
A flaw was found in the Linux kernel in the function hid_debug_events_read() in drivers/hid/hid-debug.c file which may enter an infinite loop with certain parameters passed from a userspace. A local privileged user ("root") can cause a system lock up and a denial of service. Versions from v4.18 and newer are vulnerable.
- openSUSE-SU-2019:1193
- openSUSE-SU-2019:1193
- 106730
- 106730
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3819
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3819
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- [debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update
- [debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update
- USN-3932-1
- USN-3932-1
- USN-3932-2
- USN-3932-2
- USN-4115-1
- USN-4115-1
- USN-4118-1
- USN-4118-1
Modified: 2024-11-21
CVE-2019-3874
The SCTP socket buffer used by a userspace application is not accounted by the cgroups subsystem. An attacker can use this flaw to cause a denial of service attack. Kernel 3.10.x and 4.18.x branches are believed to be vulnerable.
- RHSA-2019:3309
- RHSA-2019:3309
- RHSA-2019:3517
- RHSA-2019:3517
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3874
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3874
- [debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update
- [debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update
- https://security.netapp.com/advisory/ntap-20190411-0003/
- https://security.netapp.com/advisory/ntap-20190411-0003/
- USN-3979-1
- USN-3979-1
- USN-3980-1
- USN-3980-1
- USN-3980-2
- USN-3980-2
- USN-3981-1
- USN-3981-1
- USN-3981-2
- USN-3981-2
- USN-3982-1
- USN-3982-1
- USN-3982-2
- USN-3982-2
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
Modified: 2024-11-21
CVE-2019-5489
The mincore() implementation in mm/mincore.c in the Linux kernel through 4.19.13 allowed local attackers to observe page cache access patterns of other processes on the same system, potentially allowing sniffing of secret information. (Fixing this affects the output of the fincore program.) Limited remote exploitation may be possible, as demonstrated by latency differences in accessing public files from an Apache HTTP Server.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=574823bfab82d9d8fa47f422778043fbb4b4f50e
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=574823bfab82d9d8fa47f422778043fbb4b4f50e
- openSUSE-SU-2019:1479
- openSUSE-SU-2019:1479
- openSUSE-SU-2019:1570
- openSUSE-SU-2019:1570
- openSUSE-SU-2019:1579
- openSUSE-SU-2019:1579
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-pagecache-en
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20200115-01-pagecache-en
- 106478
- 106478
- RHSA-2019:2029
- RHSA-2019:2029
- RHSA-2019:2043
- RHSA-2019:2043
- RHSA-2019:2473
- RHSA-2019:2473
- RHSA-2019:2808
- RHSA-2019:2808
- RHSA-2019:2809
- RHSA-2019:2809
- RHSA-2019:2837
- RHSA-2019:2837
- RHSA-2019:3309
- RHSA-2019:3309
- RHSA-2019:3517
- RHSA-2019:3517
- RHSA-2019:3967
- RHSA-2019:3967
- RHSA-2019:4056
- RHSA-2019:4056
- RHSA-2019:4057
- RHSA-2019:4057
- RHSA-2019:4058
- RHSA-2019:4058
- RHSA-2019:4159
- RHSA-2019:4159
- RHSA-2019:4164
- RHSA-2019:4164
- RHSA-2019:4255
- RHSA-2019:4255
- RHSA-2020:0204
- RHSA-2020:0204
- https://arxiv.org/abs/1901.01161
- https://arxiv.org/abs/1901.01161
- https://bugzilla.suse.com/show_bug.cgi?id=1120843
- https://bugzilla.suse.com/show_bug.cgi?id=1120843
- https://github.com/torvalds/linux/commit/574823bfab82d9d8fa47f422778043fbb4b4f50e
- https://github.com/torvalds/linux/commit/574823bfab82d9d8fa47f422778043fbb4b4f50e
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1823-1] linux security update
- [debian-lts-announce] 20190617 [SECURITY] [DLA 1823-1] linux security update
- [debian-lts-announce] 20190618 [SECURITY] [DLA 1824-1] linux-4.9 security update
- [debian-lts-announce] 20190618 [SECURITY] [DLA 1824-1] linux-4.9 security update
- 20190618 [SECURITY] [DSA 4465-1] linux security update
- 20190618 [SECURITY] [DSA 4465-1] linux security update
- https://security.netapp.com/advisory/ntap-20190307-0001/
- https://security.netapp.com/advisory/ntap-20190307-0001/
- DSA-4465
- DSA-4465
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.theregister.co.uk/2019/01/05/boffins_beat_page_cache/
- https://www.theregister.co.uk/2019/01/05/boffins_beat_page_cache/
Modified: 2024-11-21
CVE-2019-6974
In the Linux kernel before 4.20.8, kvm_ioctl_create_device in virt/kvm/kvm_main.c mishandles reference counting because of a race condition, leading to a use-after-free.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cfa39381173d5f969daf43582c95ad679189cbc9
- 107127
- RHBA-2019:0959
- RHSA-2019:0818
- RHSA-2019:0833
- RHSA-2019:2809
- RHSA-2019:3967
- RHSA-2020:0103
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1765
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.99
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.21
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.8
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.156
- https://github.com/torvalds/linux/commit/cfa39381173d5f969daf43582c95ad679189cbc9
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- [debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update
- https://support.f5.com/csp/article/K11186236
- https://support.f5.com/csp/article/K11186236?utm_source=f5support&%3Butm_medium=RSS
- USN-3930-1
- USN-3930-2
- USN-3931-1
- USN-3931-2
- USN-3932-1
- USN-3932-2
- USN-3933-1
- USN-3933-2
- 46388
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cfa39381173d5f969daf43582c95ad679189cbc9
- 46388
- USN-3933-2
- USN-3933-1
- USN-3932-2
- USN-3932-1
- USN-3931-2
- USN-3931-1
- USN-3930-2
- USN-3930-1
- https://support.f5.com/csp/article/K11186236?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K11186236
- [debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- https://github.com/torvalds/linux/commit/cfa39381173d5f969daf43582c95ad679189cbc9
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.156
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.8
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.21
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.99
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1765
- RHSA-2020:0103
- RHSA-2019:3967
- RHSA-2019:2809
- RHSA-2019:0833
- RHSA-2019:0818
- RHBA-2019:0959
- 107127
Modified: 2024-11-21
CVE-2019-7221
The KVM implementation in the Linux kernel through 4.20.5 has a Use-after-Free.
- SUSE-SA-2019:0203-1
- http://packetstormsecurity.com/files/151713/KVM-VMX-Preemption-Timer-Use-After-Free.html
- http://www.openwall.com/lists/oss-security/2019/02/18/2
- RHBA-2019:0959
- RHSA-2019:0818
- RHSA-2019:0833
- RHSA-2019:3967
- RHSA-2019:4058
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1760
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ecec76885bcfe3294685dc363fd1273df0d5d65f
- https://github.com/torvalds/linux/commits/master/arch/x86/kvm
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- [debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update
- FEDORA-2019-164946aa7f
- FEDORA-2019-3da64f3e61
- https://security.netapp.com/advisory/ntap-20190404-0002/
- https://support.f5.com/csp/article/K08413011
- USN-3930-1
- USN-3930-2
- USN-3931-1
- USN-3931-2
- USN-3932-1
- USN-3932-2
- SUSE-SA-2019:0203-1
- USN-3932-2
- USN-3932-1
- USN-3931-2
- USN-3931-1
- USN-3930-2
- USN-3930-1
- https://support.f5.com/csp/article/K08413011
- https://security.netapp.com/advisory/ntap-20190404-0002/
- FEDORA-2019-3da64f3e61
- FEDORA-2019-164946aa7f
- [debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- https://github.com/torvalds/linux/commits/master/arch/x86/kvm
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ecec76885bcfe3294685dc363fd1273df0d5d65f
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1760
- RHSA-2019:4058
- RHSA-2019:3967
- RHSA-2019:0833
- RHSA-2019:0818
- RHBA-2019:0959
- http://www.openwall.com/lists/oss-security/2019/02/18/2
- http://packetstormsecurity.com/files/151713/KVM-VMX-Preemption-Timer-Use-After-Free.html
Modified: 2024-11-21
CVE-2019-7222
The KVM implementation in the Linux kernel through 4.20.5 has an Information Leak.
- SUSE-SA-2019:0203-1
- http://packetstormsecurity.com/files/151712/KVM-kvm_inject_page_fault-Uninitialized-Memory-Leak.html
- [oss-security] Linux kernel: three KVM bugs (CVE-2019-6974, CVE-2019-7221, CVE-2019-7222)
- 106963
- RHSA-2019:2029
- RHSA-2019:2043
- RHSA-2019:3309
- RHSA-2019:3517
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1759
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=353c0956a618a07ba4bbe7ad00ff29fe70e8412a
- https://github.com/torvalds/linux/commits/master/arch/x86/kvm
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- [debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update
- FEDORA-2019-164946aa7f
- FEDORA-2019-3da64f3e61
- https://security.netapp.com/advisory/ntap-20190404-0002/
- USN-3930-1
- USN-3930-2
- USN-3931-1
- USN-3931-2
- USN-3932-1
- USN-3932-2
- USN-3933-1
- USN-3933-2
- SUSE-SA-2019:0203-1
- USN-3933-2
- USN-3933-1
- USN-3932-2
- USN-3932-1
- USN-3931-2
- USN-3931-1
- USN-3930-2
- USN-3930-1
- https://security.netapp.com/advisory/ntap-20190404-0002/
- FEDORA-2019-3da64f3e61
- FEDORA-2019-164946aa7f
- [debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- https://github.com/torvalds/linux/commits/master/arch/x86/kvm
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=353c0956a618a07ba4bbe7ad00ff29fe70e8412a
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1759
- RHSA-2019:3517
- RHSA-2019:3309
- RHSA-2019:2043
- RHSA-2019:2029
- 106963
- [oss-security] Linux kernel: three KVM bugs (CVE-2019-6974, CVE-2019-7221, CVE-2019-7222)
- http://packetstormsecurity.com/files/151712/KVM-kvm_inject_page_fault-Uninitialized-Memory-Leak.html
Modified: 2024-11-21
CVE-2019-7308
kernel/bpf/verifier.c in the Linux kernel before 4.20.6 performs undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=979d63d50c0c0f7bc537bf821e056cc9fe5abd38
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d3bd7413e0ca40b60cf60d4003246d067cafdeda
- openSUSE-SU-2019:1193
- 106827
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1711
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.6
- https://github.com/torvalds/linux/commit/979d63d50c0c0f7bc537bf821e056cc9fe5abd38
- https://github.com/torvalds/linux/commit/d3bd7413e0ca40b60cf60d4003246d067cafdeda
- https://support.f5.com/csp/article/K43030517
- https://support.f5.com/csp/article/K43030517?utm_source=f5support&%3Butm_medium=RSS
- USN-3930-1
- USN-3930-2
- USN-3931-1
- USN-3931-2
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=979d63d50c0c0f7bc537bf821e056cc9fe5abd38
- USN-3931-2
- USN-3931-1
- USN-3930-2
- USN-3930-1
- https://support.f5.com/csp/article/K43030517?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K43030517
- https://github.com/torvalds/linux/commit/d3bd7413e0ca40b60cf60d4003246d067cafdeda
- https://github.com/torvalds/linux/commit/979d63d50c0c0f7bc537bf821e056cc9fe5abd38
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.6
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1711
- 106827
- openSUSE-SU-2019:1193
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d3bd7413e0ca40b60cf60d4003246d067cafdeda
Modified: 2024-11-21
CVE-2019-8956
In the Linux Kernel before versions 4.20.8 and 4.19.21 a use-after-free error in the "sctp_sendmsg()" function (net/sctp/socket.c) when handling SCTP_SENDALL flag can be exploited to corrupt memory.
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.21
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.8
- https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/commit/?id=ba59fb0273076637f0add4311faa990a5eec27c0
- https://secuniaresearch.flexerasoftware.com/secunia_research/2019-5/
- https://support.f5.com/csp/article/K12671141
- USN-3930-1
- USN-3930-2
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.21
- USN-3930-2
- USN-3930-1
- https://support.f5.com/csp/article/K12671141
- https://secuniaresearch.flexerasoftware.com/secunia_research/2019-5/
- https://git.kernel.org/cgit/linux/kernel/git/stable/linux-stable.git/commit/?id=ba59fb0273076637f0add4311faa990a5eec27c0
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.8
Modified: 2024-11-21
CVE-2019-9003
In the Linux kernel before 4.20.5, attackers can trigger a drivers/char/ipmi/ipmi_msghandler.c use-after-free and OOPS by arranging for certain simultaneous execution of the code, as demonstrated by a "service ipmievd restart" loop.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=77f8269606bf95fcb232ee86f6da80886f1dfae8
- openSUSE-SU-2019:1404
- 107145
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.5
- https://github.com/torvalds/linux/commit/77f8269606bf95fcb232ee86f6da80886f1dfae8
- https://security.netapp.com/advisory/ntap-20190327-0002/
- USN-3930-1
- USN-3930-2
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=77f8269606bf95fcb232ee86f6da80886f1dfae8
- USN-3930-2
- USN-3930-1
- https://security.netapp.com/advisory/ntap-20190327-0002/
- https://github.com/torvalds/linux/commit/77f8269606bf95fcb232ee86f6da80886f1dfae8
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.5
- 107145
- openSUSE-SU-2019:1404
Modified: 2024-11-21
CVE-2022-1678
An issue was discovered in the Linux Kernel from 4.18 to 4.19, an improper update of sock reference in TCP pacing can lead to memory/netns leak, which can be used by remote clients.
- https://anas.openanolis.cn/cves/detail/CVE-2022-1678
- https://anas.openanolis.cn/cves/detail/CVE-2022-1678
- https://anas.openanolis.cn/errata/detail/ANSA-2022:0143
- https://anas.openanolis.cn/errata/detail/ANSA-2022:0143
- https://bugzilla.openanolis.cn/show_bug.cgi?id=61
- https://bugzilla.openanolis.cn/show_bug.cgi?id=61
- https://gitee.com/anolis/cloud-kernel/commit/bed537da691b
- https://gitee.com/anolis/cloud-kernel/commit/bed537da691b
- https://github.com/torvalds/linux/commit/0a70f118475e037732557796accd0878a00fc25a
- https://github.com/torvalds/linux/commit/0a70f118475e037732557796accd0878a00fc25a
- https://lore.kernel.org/all/20200602080425.93712-1-kerneljasonxing%40gmail.com/
- https://lore.kernel.org/all/20200602080425.93712-1-kerneljasonxing%40gmail.com/
- https://security.netapp.com/advisory/ntap-20220715-0001/
- https://security.netapp.com/advisory/ntap-20220715-0001/