ALT-BU-2019-3810-1
Branch sisyphus update bulletin.
Package kernel-image-std-def updated to version 4.19.58-alt1 for branch sisyphus in task 234329.
Closed vulnerabilities
BDU:2020-01891
Уязвимость функции ptrace_link ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии
Modified: 2025-04-03
CVE-2019-13272
In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.
- http://packetstormsecurity.com/files/153663/Linux-PTRACE_TRACEME-Broken-Permission-Object-Lifetime-Handling.html
- http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html
- http://packetstormsecurity.com/files/154957/Linux-Polkit-pkexec-Helper-PTRACE_TRACEME-Local-Root.html
- http://packetstormsecurity.com/files/156929/Linux-PTRACE_TRACEME-Local-Root.html
- http://packetstormsecurity.com/files/165051/Linux-Kernel-5.1.x-PTRACE_TRACEME-pkexec-Local-Privilege-Escalation.html
- RHSA-2019:2405
- RHSA-2019:2411
- RHSA-2019:2809
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1903
- https://bugzilla.redhat.com/show_bug.cgi?id=1730895
- https://bugzilla.suse.com/show_bug.cgi?id=1140671
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6994eefb0053799d2e07cd140df6c2ea106c41ee
- https://github.com/torvalds/linux/commit/6994eefb0053799d2e07cd140df6c2ea106c41ee
- [debian-lts-announce] 20190723 [SECURITY] [DLA 1862-1] linux security update
- [debian-lts-announce] 20190723 [SECURITY] [DLA 1863-1] linux-4.9 security update
- FEDORA-2019-a95015e60f
- 20190722 [SECURITY] [DSA 4484-1] linux security update
- 20190722 [slackware-security] Slackware 14.2 kernel (SSA:2019-202-01)
- https://security.netapp.com/advisory/ntap-20190806-0001/
- https://support.f5.com/csp/article/K91025336
- https://support.f5.com/csp/article/K91025336?utm_source=f5support&%3Butm_medium=RSS
- USN-4093-1
- USN-4094-1
- USN-4095-1
- USN-4117-1
- USN-4118-1
- DSA-4484
- http://packetstormsecurity.com/files/153663/Linux-PTRACE_TRACEME-Broken-Permission-Object-Lifetime-Handling.html
- DSA-4484
- USN-4118-1
- USN-4117-1
- USN-4095-1
- USN-4094-1
- USN-4093-1
- https://support.f5.com/csp/article/K91025336?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K91025336
- https://security.netapp.com/advisory/ntap-20190806-0001/
- 20190722 [slackware-security] Slackware 14.2 kernel (SSA:2019-202-01)
- 20190722 [SECURITY] [DSA 4484-1] linux security update
- FEDORA-2019-a95015e60f
- [debian-lts-announce] 20190723 [SECURITY] [DLA 1863-1] linux-4.9 security update
- [debian-lts-announce] 20190723 [SECURITY] [DLA 1862-1] linux security update
- https://github.com/torvalds/linux/commit/6994eefb0053799d2e07cd140df6c2ea106c41ee
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6994eefb0053799d2e07cd140df6c2ea106c41ee
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17
- https://bugzilla.suse.com/show_bug.cgi?id=1140671
- https://bugzilla.redhat.com/show_bug.cgi?id=1730895
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1903
- RHSA-2019:2809
- RHSA-2019:2411
- RHSA-2019:2405
- http://packetstormsecurity.com/files/165051/Linux-Kernel-5.1.x-PTRACE_TRACEME-pkexec-Local-Privilege-Escalation.html
- http://packetstormsecurity.com/files/156929/Linux-PTRACE_TRACEME-Local-Root.html
- http://packetstormsecurity.com/files/154957/Linux-Polkit-pkexec-Helper-PTRACE_TRACEME-Local-Root.html
- http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html
- http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
Package kernel-image-un-def updated to version 5.1.17-alt1 for branch sisyphus in task 234333.
Closed vulnerabilities
BDU:2019-03087
Уязвимость драйвера sound/usb/line6/pcm.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-01891
Уязвимость функции ptrace_link ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии
Modified: 2025-04-03
CVE-2019-13272
In the Linux kernel before 5.1.17, ptrace_link in kernel/ptrace.c mishandles the recording of the credentials of a process that wants to create a ptrace relationship, which allows local users to obtain root access by leveraging certain scenarios with a parent-child process relationship, where a parent drops privileges and calls execve (potentially allowing control by an attacker). One contributing factor is an object lifetime issue (which can also cause a panic). Another contributing factor is incorrect marking of a ptrace relationship as privileged, which is exploitable through (for example) Polkit's pkexec helper with PTRACE_TRACEME. NOTE: SELinux deny_ptrace might be a usable workaround in some environments.
- http://packetstormsecurity.com/files/153663/Linux-PTRACE_TRACEME-Broken-Permission-Object-Lifetime-Handling.html
- http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html
- http://packetstormsecurity.com/files/154957/Linux-Polkit-pkexec-Helper-PTRACE_TRACEME-Local-Root.html
- http://packetstormsecurity.com/files/156929/Linux-PTRACE_TRACEME-Local-Root.html
- http://packetstormsecurity.com/files/165051/Linux-Kernel-5.1.x-PTRACE_TRACEME-pkexec-Local-Privilege-Escalation.html
- RHSA-2019:2405
- RHSA-2019:2411
- RHSA-2019:2809
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1903
- https://bugzilla.redhat.com/show_bug.cgi?id=1730895
- https://bugzilla.suse.com/show_bug.cgi?id=1140671
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6994eefb0053799d2e07cd140df6c2ea106c41ee
- https://github.com/torvalds/linux/commit/6994eefb0053799d2e07cd140df6c2ea106c41ee
- [debian-lts-announce] 20190723 [SECURITY] [DLA 1862-1] linux security update
- [debian-lts-announce] 20190723 [SECURITY] [DLA 1863-1] linux-4.9 security update
- FEDORA-2019-a95015e60f
- 20190722 [SECURITY] [DSA 4484-1] linux security update
- 20190722 [slackware-security] Slackware 14.2 kernel (SSA:2019-202-01)
- https://security.netapp.com/advisory/ntap-20190806-0001/
- https://support.f5.com/csp/article/K91025336
- https://support.f5.com/csp/article/K91025336?utm_source=f5support&%3Butm_medium=RSS
- USN-4093-1
- USN-4094-1
- USN-4095-1
- USN-4117-1
- USN-4118-1
- DSA-4484
- http://packetstormsecurity.com/files/153663/Linux-PTRACE_TRACEME-Broken-Permission-Object-Lifetime-Handling.html
- DSA-4484
- USN-4118-1
- USN-4117-1
- USN-4095-1
- USN-4094-1
- USN-4093-1
- https://support.f5.com/csp/article/K91025336?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K91025336
- https://security.netapp.com/advisory/ntap-20190806-0001/
- 20190722 [slackware-security] Slackware 14.2 kernel (SSA:2019-202-01)
- 20190722 [SECURITY] [DSA 4484-1] linux security update
- FEDORA-2019-a95015e60f
- [debian-lts-announce] 20190723 [SECURITY] [DLA 1863-1] linux-4.9 security update
- [debian-lts-announce] 20190723 [SECURITY] [DLA 1862-1] linux security update
- https://github.com/torvalds/linux/commit/6994eefb0053799d2e07cd140df6c2ea106c41ee
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6994eefb0053799d2e07cd140df6c2ea106c41ee
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17
- https://bugzilla.suse.com/show_bug.cgi?id=1140671
- https://bugzilla.redhat.com/show_bug.cgi?id=1730895
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1903
- RHSA-2019:2809
- RHSA-2019:2411
- RHSA-2019:2405
- http://packetstormsecurity.com/files/165051/Linux-Kernel-5.1.x-PTRACE_TRACEME-pkexec-Local-Privilege-Escalation.html
- http://packetstormsecurity.com/files/156929/Linux-PTRACE_TRACEME-Local-Root.html
- http://packetstormsecurity.com/files/154957/Linux-Polkit-pkexec-Helper-PTRACE_TRACEME-Local-Root.html
- http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html
- http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
Modified: 2024-11-21
CVE-2019-15221
An issue was discovered in the Linux kernel before 5.1.17. There is a NULL pointer dereference caused by a malicious USB device in the sound/usb/line6/pcm.c driver.
- openSUSE-SU-2019:2173
- openSUSE-SU-2019:2173
- openSUSE-SU-2019:2181
- openSUSE-SU-2019:2181
- [oss-security] 20190820 Linux kernel: multiple vulnerabilities in the USB subsystem x2
- [oss-security] 20190820 Linux kernel: multiple vulnerabilities in the USB subsystem x2
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.17
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3450121997ce872eb7f1248417225827ea249710
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3450121997ce872eb7f1248417225827ea249710
- [debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update
- [debian-lts-announce] 20190914 [SECURITY] [DLA 1919-1] linux-4.9 security update
- [debian-lts-announce] 20190915 [SECURITY] [DLA 1919-2] linux-4.9 security update
- [debian-lts-announce] 20190915 [SECURITY] [DLA 1919-2] linux-4.9 security update
- [debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update
- [debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update
- https://security.netapp.com/advisory/ntap-20190905-0002/
- https://security.netapp.com/advisory/ntap-20190905-0002/
- https://syzkaller.appspot.com/bug?id=240f09164db2c3d3af33a117c713dc7650dc29d6
- https://syzkaller.appspot.com/bug?id=240f09164db2c3d3af33a117c713dc7650dc29d6
- USN-4115-1
- USN-4115-1
- USN-4118-1
- USN-4118-1
- USN-4147-1
- USN-4147-1
- USN-4286-1
- USN-4286-1
- USN-4286-2
- USN-4286-2
Closed vulnerabilities
BDU:2020-02113
Уязвимость виртуальной обучающей среды moodle, связанная с недостатками контроля доступа, позволяющая нарушителю оказать воздействие на целостность защищаемой информации
Modified: 2024-11-21
CVE-2019-10186
A flaw was found in moodle before versions 3.7.1, 3.6.5, 3.5.7. A sesskey (CSRF) token was not being utilised by the XML loading/unloading admin tool.
Modified: 2024-11-21
CVE-2019-10187
A flaw was found in moodle before versions 3.7.1, 3.6.5, 3.5.7. Users with permission to delete entries from a glossary were able to delete entries from other glossaries they did not have direct access to.
Modified: 2024-11-21
CVE-2019-10188
A flaw was found in moodle before versions 3.7.1, 3.6.5, 3.5.7. Teachers in a quiz group could modify group overrides for other groups in the same quiz.
Modified: 2024-11-21
CVE-2019-10189
A flaw was found in moodle before versions 3.7.1, 3.6.5, 3.5.7. Teachers in an assignment group could modify group overrides for other groups in the same assignment.
Package thunderbird updated to version 60.8.0-alt1 for branch sisyphus in task 234350.
Closed vulnerabilities
BDU:2019-02851
Уязвимость браузеров Firefox, Firefox ESR, почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2019-02932
Уязвимость реализации сетевого протокола HTTP/2 браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-02933
Уязвимость браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, связанная с недостатками разграничения доступа, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-02934
Уязвимость плагина NPAPI браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, позволяющая нарушителю осуществить межсайтовую подделку запросов
BDU:2019-02935
Уязвимость компонента document.domain браузеров Firefox ESR, Firefox и почтового клиента Thunderbird, позволяющая нарушителю осуществить межсайтовую сценарную атаку
BDU:2019-03614
Уязвимость почтового клиента Thunderbird и браузеров Firefox и Firefox ESR, связанная с неправильным синтаксическим анализом содержимого страницы или интерпретацией введенных пользователем данных, позволяющая нарушителю выполнить произвольный код
BDU:2019-03615
Уязвимость почтового клиента Thunderbird и браузеров Firefox и Firefox ESR, связанная с ошибками экранирования символа каретки("^"), позволяющая нарушителю нарушить целостность данных
BDU:2019-03616
Уязвимость библиотеки служб сетевой безопасности (NSS) почтового клиента Thunderbird и браузеров Firefox и Firefox ESR, позволяющая нарушителю получить несанкционированный доступ к информации
BDU:2019-04642
Уязвимость функции формирования открытых ключей p256-ECDH браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00723
Уязвимость веб-браузеров Firefox, Firefox ESR и программы для работы с электронной почтой Thunderbird, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным
Modified: 2024-11-21
CVE-2019-11709
Mozilla developers and community members reported memory safety bugs present in Firefox 67 and Firefox ESR 60.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1547266%2C1540759%2C1548822%2C1550498%2C1515052%2C1539219%2C1547757%2C1550498%2C1533522
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1547266%2C1540759%2C1548822%2C1550498%2C1515052%2C1539219%2C1547757%2C1550498%2C1533522
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- GLSA-201908-12
- GLSA-201908-12
- GLSA-201908-20
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
Modified: 2024-11-21
CVE-2019-11711
When an inner window is reused, it does not consider the use of document.domain for cross-origin protections. If pages on different subdomains ever cooperatively use document.domain, then either page can abuse this to inject script into arbitrary pages on the other subdomain, even those that did not use document.domain to relax their origin security. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- https://bugzilla.mozilla.org/show_bug.cgi?id=1552541
- https://bugzilla.mozilla.org/show_bug.cgi?id=1552541
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- GLSA-201908-12
- GLSA-201908-12
- GLSA-201908-20
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
Modified: 2024-11-21
CVE-2019-11712
POST requests made by NPAPI plugins, such as Flash, that receive a status 308 redirect response can bypass CORS requirements. This can allow an attacker to perform Cross-Site Request Forgery (CSRF) attacks. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- https://bugzilla.mozilla.org/show_bug.cgi?id=1543804
- https://bugzilla.mozilla.org/show_bug.cgi?id=1543804
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- GLSA-201908-12
- GLSA-201908-12
- GLSA-201908-20
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
Modified: 2024-11-21
CVE-2019-11713
A use-after-free vulnerability can occur in HTTP/2 when a cached HTTP/2 stream is closed while still in use, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- https://bugzilla.mozilla.org/show_bug.cgi?id=1528481
- https://bugzilla.mozilla.org/show_bug.cgi?id=1528481
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- GLSA-201908-12
- GLSA-201908-12
- GLSA-201908-20
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
Modified: 2024-11-21
CVE-2019-11715
Due to an error while parsing page content, it is possible for properly sanitized user input to be misinterpreted and lead to XSS hazards on web sites in certain circumstances. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- https://bugzilla.mozilla.org/show_bug.cgi?id=1555523
- https://bugzilla.mozilla.org/show_bug.cgi?id=1555523
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- GLSA-201908-12
- GLSA-201908-12
- GLSA-201908-20
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
Modified: 2024-11-21
CVE-2019-11717
A vulnerability exists where the caret ("^") character is improperly escaped constructing some URIs due to it being used as a separator, allowing for possible spoofing of origin attributes. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- https://bugzilla.mozilla.org/show_bug.cgi?id=1548306
- https://bugzilla.mozilla.org/show_bug.cgi?id=1548306
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- GLSA-201908-12
- GLSA-201908-12
- GLSA-201908-20
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
Modified: 2024-11-21
CVE-2019-11719
When importing a curve25519 private key in PKCS#8format with leading 0x00 bytes, it is possible to trigger an out-of-bounds read in the Network Security Services (NSS) library. This could lead to information disclosure. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- RHSA-2019:1951
- RHSA-2019:1951
- https://bugzilla.mozilla.org/show_bug.cgi?id=1540541
- https://bugzilla.mozilla.org/show_bug.cgi?id=1540541
- [debian-lts-announce] 20200929 [SECURITY] [DLA 2388-1] nss security update
- [debian-lts-announce] 20200929 [SECURITY] [DLA 2388-1] nss security update
- GLSA-201908-12
- GLSA-201908-12
- GLSA-201908-20
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
Modified: 2024-11-21
CVE-2019-11729
Empty or malformed p256-ECDH public keys may trigger a segmentation fault due values being improperly sanitized before being copied into memory and used. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- RHSA-2019:1951
- RHSA-2019:1951
- RHSA-2019:4190
- RHSA-2019:4190
- https://bugzilla.mozilla.org/show_bug.cgi?id=1515342
- https://bugzilla.mozilla.org/show_bug.cgi?id=1515342
- [debian-lts-announce] 20200929 [SECURITY] [DLA 2388-1] nss security update
- [debian-lts-announce] 20200929 [SECURITY] [DLA 2388-1] nss security update
- GLSA-201908-12
- GLSA-201908-12
- GLSA-201908-20
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
Modified: 2024-11-21
CVE-2019-11730
A vulnerability exists where if a user opens a locally saved HTML file, this file can use file: URIs to access other files in the same directory or sub-directories if the names are known or guessed. The Fetch API can then be used to read the contents of any files stored in these directories and they may uploaded to a server. It was demonstrated that in combination with a popular Android messaging app, if a malicious HTML attachment is sent to a user and they opened that attachment in Firefox, due to that app's predictable pattern for locally-saved file names, it is possible to read attachments the victim received from other correspondents. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2249
- openSUSE-SU-2019:2248
- openSUSE-SU-2019:2248
- https://bugzilla.mozilla.org/show_bug.cgi?id=1558299
- https://bugzilla.mozilla.org/show_bug.cgi?id=1558299
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- GLSA-201908-12
- GLSA-201908-12
- GLSA-201908-20
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
Modified: 2024-11-21
CVE-2019-9811
As part of a winning Pwn2Own entry, a researcher demonstrated a sandbox escape by installing a malicious language pack and then opening a browser feature that used the compromised translation. This vulnerability affects Firefox ESR < 60.8, Firefox < 68, and Thunderbird < 60.8.
- openSUSE-SU-2019:1811
- openSUSE-SU-2019:1813
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:2260
- https://bugzilla.mozilla.org/show_bug.cgi?id=1538007
- https://bugzilla.mozilla.org/show_bug.cgi?id=1539598
- https://bugzilla.mozilla.org/show_bug.cgi?id=1563327
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- GLSA-201908-12
- GLSA-201908-20
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- openSUSE-SU-2019:1811
- https://www.mozilla.org/security/advisories/mfsa2019-23/
- https://www.mozilla.org/security/advisories/mfsa2019-22/
- https://www.mozilla.org/security/advisories/mfsa2019-21/
- GLSA-201908-20
- GLSA-201908-12
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1870-1] thunderbird security update
- [debian-lts-announce] 20190802 [SECURITY] [DLA 1869-1] firefox-esr security update
- https://bugzilla.mozilla.org/show_bug.cgi?id=1563327
- https://bugzilla.mozilla.org/show_bug.cgi?id=1539598
- https://bugzilla.mozilla.org/show_bug.cgi?id=1538007
- openSUSE-SU-2019:2260
- openSUSE-SU-2019:2251
- openSUSE-SU-2019:1990
- openSUSE-SU-2019:1813
Package appstream-data-generator updated to version 20190712-alt1 for branch sisyphus in task 234381.
Closed bugs
Не берёт значков из дополнительных пакетов
Показывает несвободные лицензии у firefox и chromium
Closed bugs
gresistor: missing requires on python2.7(gtk.glade)
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-13068
public/app/features/panel/panel_ctrl.ts in Grafana before 6.2.5 allows HTML Injection in panel drilldown links (via the Title or url field).
- http://packetstormsecurity.com/files/171500/Grafana-6.2.4-HTML-Injection.html
- http://packetstormsecurity.com/files/171500/Grafana-6.2.4-HTML-Injection.html
- https://github.com/grafana/grafana/issues/17718
- https://github.com/grafana/grafana/issues/17718
- https://github.com/grafana/grafana/releases/tag/v6.2.5
- https://github.com/grafana/grafana/releases/tag/v6.2.5
- https://security.netapp.com/advisory/ntap-20190710-0001/
- https://security.netapp.com/advisory/ntap-20190710-0001/