ALT-BU-2019-3837-1
Branch c8.1 update bulletin.
Package kernel-image-std-4.9 updated to version 4.9.186-alt0.M80C.1 for branch c8.1 in task 234980.
Closed vulnerabilities
Modified: 2025-02-11
BDU:2019-02927
Уязвимость функции mwifiex_update_bss_desc_with_ie ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии, вызвать отказ в обслуживании или выполнить произвольный код
Modified: 2024-11-21
CVE-2019-3846
A flaw that allowed an attacker to corrupt memory and possibly escalate privileges was found in the mwifiex kernel module while connecting to a malicious wireless network.
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
- http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html
- http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
- https://access.redhat.com/errata/RHSA-2019:2703
- https://access.redhat.com/errata/RHSA-2019:2741
- https://access.redhat.com/errata/RHSA-2019:3055
- https://access.redhat.com/errata/RHSA-2019:3076
- https://access.redhat.com/errata/RHSA-2019:3089
- https://access.redhat.com/errata/RHSA-2020:0174
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3846
- https://lists.debian.org/debian-lts-announce/2019/06/msg00010.html
- https://lists.debian.org/debian-lts-announce/2019/06/msg00011.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
- https://seclists.org/bugtraq/2019/Jul/33
- https://seclists.org/bugtraq/2019/Jun/26
- https://seclists.org/oss-sec/2019/q2/133
- https://security.netapp.com/advisory/ntap-20190710-0002/
- https://usn.ubuntu.com/4093-1/
- https://usn.ubuntu.com/4094-1/
- https://usn.ubuntu.com/4095-1/
- https://usn.ubuntu.com/4095-2/
- https://usn.ubuntu.com/4117-1/
- https://usn.ubuntu.com/4118-1/
- https://www.debian.org/security/2019/dsa-4465
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00039.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00040.html
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00048.html
- http://packetstormsecurity.com/files/153702/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html
- http://packetstormsecurity.com/files/154951/Kernel-Live-Patch-Security-Notice-LSN-0058-1.html
- https://access.redhat.com/errata/RHSA-2019:2703
- https://access.redhat.com/errata/RHSA-2019:2741
- https://access.redhat.com/errata/RHSA-2019:3055
- https://access.redhat.com/errata/RHSA-2019:3076
- https://access.redhat.com/errata/RHSA-2019:3089
- https://access.redhat.com/errata/RHSA-2020:0174
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3846
- https://lists.debian.org/debian-lts-announce/2019/06/msg00010.html
- https://lists.debian.org/debian-lts-announce/2019/06/msg00011.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/J36BIJTKEPUOZKJNHQBUZA47RQONUKOI/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KLGWJKLMTBBB53D5QLS4HOY2EH246WBE/
- https://seclists.org/bugtraq/2019/Jul/33
- https://seclists.org/bugtraq/2019/Jun/26
- https://seclists.org/oss-sec/2019/q2/133
- https://security.netapp.com/advisory/ntap-20190710-0002/
- https://usn.ubuntu.com/4093-1/
- https://usn.ubuntu.com/4094-1/
- https://usn.ubuntu.com/4095-1/
- https://usn.ubuntu.com/4095-2/
- https://usn.ubuntu.com/4117-1/
- https://usn.ubuntu.com/4118-1/
- https://www.debian.org/security/2019/dsa-4465
Closed vulnerabilities
Modified: 2023-11-21
BDU:2020-04792
Уязвимость универсальной системы мониторинга Zabbix, связанная с ошибками управления генерацией кода, позволяющая нарушителю выполнить произвольный код
Modified: 2025-03-05
BDU:2023-01711
Уязвимость универсальной системы мониторинга Zabbix, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю оказать воздействие на целостность данных
Modified: 2025-01-29
BDU:2023-02341
Уязвимость реализации сценариев api_jsonrpc.php и index.php универсальной системы мониторинга Zabbix, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Modified: 2024-11-21
CVE-2016-10742
Zabbix before 2.2.21rc1, 3.x before 3.0.13rc1, 3.1.x and 3.2.x before 3.2.10rc1, and 3.3.x and 3.4.x before 3.4.4rc1 allows open redirect via the request parameter.
- https://lists.debian.org/debian-lts-announce/2019/03/msg00010.html
- https://lists.debian.org/debian-lts-announce/2020/11/msg00039.html
- https://support.zabbix.com/browse/ZBX-10272
- https://support.zabbix.com/browse/ZBX-13133
- https://lists.debian.org/debian-lts-announce/2019/03/msg00010.html
- https://lists.debian.org/debian-lts-announce/2020/11/msg00039.html
- https://support.zabbix.com/browse/ZBX-10272
- https://support.zabbix.com/browse/ZBX-13133
Modified: 2024-11-21
CVE-2019-15132
Zabbix through 4.4.0alpha1 allows User Enumeration. With login requests, it is possible to enumerate application usernames based on the variability of server responses (e.g., the "Login name or password is incorrect" and "No permissions for system access" messages, or just blocking for a number of seconds). This affects both api_jsonrpc.php and index.php.
- https://lists.debian.org/debian-lts-announce/2021/04/msg00018.html
- https://lists.debian.org/debian-lts-announce/2023/04/msg00013.html
- https://support.zabbix.com/browse/ZBX-16532
- https://lists.debian.org/debian-lts-announce/2021/04/msg00018.html
- https://lists.debian.org/debian-lts-announce/2023/04/msg00013.html
- https://support.zabbix.com/browse/ZBX-16532
Modified: 2024-11-21
CVE-2020-11800
Zabbix Server 2.2.x and 3.0.x before 3.0.31, and 3.2 allows remote attackers to execute arbitrary code.
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2020/11/msg00039.html
- https://support.zabbix.com/browse/DEV-1538
- https://support.zabbix.com/browse/ZBX-17600
- https://support.zabbix.com/browse/ZBXSEC-30
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2020/11/msg00039.html
- https://support.zabbix.com/browse/DEV-1538
- https://support.zabbix.com/browse/ZBX-17600
- https://support.zabbix.com/browse/ZBXSEC-30
Modified: 2024-11-21
CVE-2020-15803
Zabbix before 3.0.32rc1, 4.x before 4.0.22rc1, 4.1.x through 4.4.x before 4.4.10rc1, and 5.x before 5.0.2rc1 allows stored XSS in the URL Widget.
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2020/08/msg00007.html
- https://lists.debian.org/debian-lts-announce/2021/04/msg00018.html
- https://lists.debian.org/debian-lts-announce/2023/04/msg00013.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZHHIUYIVA5GZYLKW6A5G6HRELPOBZFE/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TIRIMOXH6GSBAANDCB3ANLJK4CRLWRXT/
- https://support.zabbix.com/browse/ZBX-18057
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2020/08/msg00007.html
- https://lists.debian.org/debian-lts-announce/2021/04/msg00018.html
- https://lists.debian.org/debian-lts-announce/2023/04/msg00013.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZHHIUYIVA5GZYLKW6A5G6HRELPOBZFE/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TIRIMOXH6GSBAANDCB3ANLJK4CRLWRXT/
- https://support.zabbix.com/browse/ZBX-18057
Modified: 2025-11-03
CVE-2022-35229
An authenticated user can create a link with reflected Javascript code inside it for the discovery page and send it to other users. The payload can be executed only with a known CSRF token value of the victim, which is changed periodically and is difficult to predict.
- https://lists.debian.org/debian-lts-announce/2023/04/msg00013.html
- https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html
- https://support.zabbix.com/browse/ZBX-21306
- https://lists.debian.org/debian-lts-announce/2023/04/msg00013.html
- https://lists.debian.org/debian-lts-announce/2023/08/msg00027.html
- https://lists.debian.org/debian-lts-announce/2024/10/msg00000.html
- https://support.zabbix.com/browse/ZBX-21306
Closed bugs
Нестандартный пусть до загружаемых модулей
[FR] ручка для отключения java
Некорректный путь к traceroute а БД
Package alterator-datetime updated to version 4.0-alt0.M80C.1 for branch c8.1 in task 235158.
Closed bugs
Неверный формат времени при установке
Не дает указать IP-адрес в NTP-сервере