ALT-BU-2019-3885-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2019-02995
Уязвимость реализации сетевого протокола HTTP/2 операционных систем Windows, веб-сервера Apache Traffic Server, веб-сервера H2O, сетевых программных средств netty, SwiftNIO, Envoy, программной платформы Node.js позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-02996
Уязвимость реализации сетевого протокола HTTP/2 операционных систем Windows, веб-сервера Apache Traffic Server, веб-сервера H2O, сетевых программных средств netty, SwiftNIO, Envoy, программной платформы Node.js позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-03595
Уязвимость функции net/url языка программирования GO, позволяющая нарушителю оказать воздействие на целостность данных, получить несанкционированный доступ к защищаемой информации, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-14809
net/url in Go before 1.11.13 and 1.12.x before 1.12.8 mishandles malformed hosts in URLs, leading to an authorization bypass in some applications. This is related to a Host field with a suffix appearing in neither Hostname() nor Port(), and is related to a non-numeric port number. For example, an attacker can compose a crafted javascript:// URL that results in a hostname of google.com.
- openSUSE-SU-2019:2000
- openSUSE-SU-2019:2000
- openSUSE-SU-2019:2056
- openSUSE-SU-2019:2056
- openSUSE-SU-2019:2072
- openSUSE-SU-2019:2072
- openSUSE-SU-2019:2085
- openSUSE-SU-2019:2085
- openSUSE-SU-2019:2130
- openSUSE-SU-2019:2130
- RHSA-2019:3433
- RHSA-2019:3433
- https://github.com/golang/go/issues/29098
- https://github.com/golang/go/issues/29098
- https://groups.google.com/forum/#%21topic/golang-announce/0uuMm1BwpHE
- https://groups.google.com/forum/#%21topic/golang-announce/0uuMm1BwpHE
- https://groups.google.com/forum/#%21topic/golang-announce/65QixT3tcmg
- https://groups.google.com/forum/#%21topic/golang-announce/65QixT3tcmg
- FEDORA-2019-65db7ad6c7
- FEDORA-2019-65db7ad6c7
- FEDORA-2019-55d101a740
- FEDORA-2019-55d101a740
- 20190819 [SECURITY] [DSA 4503-1] golang-1.11 security update
- 20190819 [SECURITY] [DSA 4503-1] golang-1.11 security update
- DSA-4503
- DSA-4503
Modified: 2024-11-21
CVE-2019-9512
Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.
- https://www.synology.com/security/advisory/Synology_SA_19_33
- openSUSE-SU-2019:2000
- openSUSE-SU-2019:2056
- openSUSE-SU-2019:2072
- openSUSE-SU-2019:2085
- openSUSE-SU-2019:2115
- openSUSE-SU-2019:2114
- openSUSE-SU-2019:2130
- 20190816 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0
- [oss-security] 20190819 [ANNOUNCE] Security release of Kubernetes v1.15.3, v1.14.6, v1.13.10 - CVE-2019-9512 and CVE-2019-9514
- RHSA-2019:2594
- RHSA-2019:2661
- RHSA-2019:2682
- RHSA-2019:2690
- RHSA-2019:2726
- RHSA-2019:2766
- RHSA-2019:2769
- RHSA-2019:2796
- RHSA-2019:2861
- RHSA-2019:2925
- RHSA-2019:2939
- RHSA-2019:2955
- RHSA-2019:2966
- RHSA-2019:3131
- RHSA-2019:3245
- RHSA-2019:3265
- RHSA-2019:3892
- RHSA-2019:3906
- RHSA-2019:4018
- RHSA-2019:4019
- RHSA-2019:4020
- RHSA-2019:4021
- RHSA-2019:4040
- RHSA-2019:4041
- RHSA-2019:4042
- RHSA-2019:4045
- RHSA-2019:4269
- RHSA-2019:4273
- RHSA-2019:4352
- RHSA-2020:0406
- RHSA-2020:0727
- https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
- VU#605641
- https://kc.mcafee.com/corporate/index?page=content&id=SB10296
- [trafficserver-users] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks
- [trafficserver-announce] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks
- [trafficserver-dev] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks
- [debian-lts-announce] 20201208 [SECURITY] [DLA 2485-1] golang-golang-x-net-dev security update
- FEDORA-2019-65db7ad6c7
- FEDORA-2019-6a2980de56
- FEDORA-2019-5a6a7bc12c
- FEDORA-2019-55d101a740
- 20190814 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0
- 20190819 [SECURITY] [DSA 4503-1] golang-1.11 security update
- 20190825 [SECURITY] [DSA 4508-1] h2o security update
- 20190910 [SECURITY] [DSA 4520-1] trafficserver security update
- https://security.netapp.com/advisory/ntap-20190823-0001/
- https://security.netapp.com/advisory/ntap-20190823-0004/
- https://security.netapp.com/advisory/ntap-20190823-0005/
- https://support.f5.com/csp/article/K98053339
- https://support.f5.com/csp/article/K98053339?utm_source=f5support&%3Butm_medium=RSS
- USN-4308-1
- DSA-4503
- DSA-4508
- DSA-4520
- https://www.synology.com/security/advisory/Synology_SA_19_33
- DSA-4520
- DSA-4508
- DSA-4503
- USN-4308-1
- https://support.f5.com/csp/article/K98053339?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K98053339
- https://security.netapp.com/advisory/ntap-20190823-0005/
- https://security.netapp.com/advisory/ntap-20190823-0004/
- https://security.netapp.com/advisory/ntap-20190823-0001/
- 20190910 [SECURITY] [DSA 4520-1] trafficserver security update
- 20190825 [SECURITY] [DSA 4508-1] h2o security update
- 20190819 [SECURITY] [DSA 4503-1] golang-1.11 security update
- 20190814 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0
- FEDORA-2019-55d101a740
- FEDORA-2019-5a6a7bc12c
- FEDORA-2019-6a2980de56
- FEDORA-2019-65db7ad6c7
- [debian-lts-announce] 20201208 [SECURITY] [DLA 2485-1] golang-golang-x-net-dev security update
- [trafficserver-dev] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks
- [trafficserver-announce] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks
- [trafficserver-users] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks
- https://kc.mcafee.com/corporate/index?page=content&id=SB10296
- VU#605641
- https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
- RHSA-2020:0727
- RHSA-2020:0406
- RHSA-2019:4352
- RHSA-2019:4273
- RHSA-2019:4269
- RHSA-2019:4045
- RHSA-2019:4042
- RHSA-2019:4041
- RHSA-2019:4040
- RHSA-2019:4021
- RHSA-2019:4020
- RHSA-2019:4019
- RHSA-2019:4018
- RHSA-2019:3906
- RHSA-2019:3892
- RHSA-2019:3265
- RHSA-2019:3245
- RHSA-2019:3131
- RHSA-2019:2966
- RHSA-2019:2955
- RHSA-2019:2939
- RHSA-2019:2925
- RHSA-2019:2861
- RHSA-2019:2796
- RHSA-2019:2769
- RHSA-2019:2766
- RHSA-2019:2726
- RHSA-2019:2690
- RHSA-2019:2682
- RHSA-2019:2661
- RHSA-2019:2594
- [oss-security] 20190819 [ANNOUNCE] Security release of Kubernetes v1.15.3, v1.14.6, v1.13.10 - CVE-2019-9512 and CVE-2019-9514
- 20190816 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0
- openSUSE-SU-2019:2130
- openSUSE-SU-2019:2114
- openSUSE-SU-2019:2115
- openSUSE-SU-2019:2085
- openSUSE-SU-2019:2072
- openSUSE-SU-2019:2056
- openSUSE-SU-2019:2000
Modified: 2025-01-14
CVE-2019-9514
Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.
- openSUSE-SU-2019:2000
- openSUSE-SU-2019:2056
- openSUSE-SU-2019:2072
- openSUSE-SU-2019:2085
- openSUSE-SU-2019:2115
- openSUSE-SU-2019:2114
- openSUSE-SU-2019:2130
- 20190816 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0
- [oss-security] 20190819 [ANNOUNCE] Security release of Kubernetes v1.15.3, v1.14.6, v1.13.10 - CVE-2019-9512 and CVE-2019-9514
- [oss-security] 20231018 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations
- RHSA-2019:2594
- RHSA-2019:2661
- RHSA-2019:2682
- RHSA-2019:2690
- RHSA-2019:2726
- RHSA-2019:2766
- RHSA-2019:2769
- RHSA-2019:2796
- RHSA-2019:2861
- RHSA-2019:2925
- RHSA-2019:2939
- RHSA-2019:2955
- RHSA-2019:2966
- RHSA-2019:3131
- RHSA-2019:3245
- RHSA-2019:3265
- RHSA-2019:3892
- RHSA-2019:3906
- RHSA-2019:4018
- RHSA-2019:4019
- RHSA-2019:4020
- RHSA-2019:4021
- RHSA-2019:4040
- RHSA-2019:4041
- RHSA-2019:4042
- RHSA-2019:4045
- RHSA-2019:4269
- RHSA-2019:4273
- RHSA-2019:4352
- RHSA-2020:0406
- RHSA-2020:0727
- https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
- VU#605641
- https://kc.mcafee.com/corporate/index?page=content&id=SB10296
- [trafficserver-users] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks
- [trafficserver-announce] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks
- [trafficserver-dev] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks
- [debian-lts-announce] 20201208 [SECURITY] [DLA 2485-1] golang-golang-x-net-dev security update
- FEDORA-2019-65db7ad6c7
- FEDORA-2019-6a2980de56
- FEDORA-2019-5a6a7bc12c
- FEDORA-2019-55d101a740
- 20190814 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0
- 20190819 [SECURITY] [DSA 4503-1] golang-1.11 security update
- 20190825 [SECURITY] [DSA 4508-1] h2o security update
- 20190910 [SECURITY] [DSA 4520-1] trafficserver security update
- https://security.netapp.com/advisory/ntap-20190823-0001/
- https://security.netapp.com/advisory/ntap-20190823-0004/
- https://security.netapp.com/advisory/ntap-20190823-0005/
- https://support.f5.com/csp/article/K01988340
- https://support.f5.com/csp/article/K01988340?utm_source=f5support&%3Butm_medium=RSS
- USN-4308-1
- DSA-4503
- DSA-4508
- DSA-4520
- DSA-4669
- https://www.synology.com/security/advisory/Synology_SA_19_33
- openSUSE-SU-2019:2000
- https://www.synology.com/security/advisory/Synology_SA_19_33
- DSA-4669
- DSA-4520
- DSA-4508
- DSA-4503
- USN-4308-1
- https://support.f5.com/csp/article/K01988340?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K01988340
- https://security.netapp.com/advisory/ntap-20190823-0005/
- https://security.netapp.com/advisory/ntap-20190823-0004/
- https://security.netapp.com/advisory/ntap-20190823-0001/
- 20190910 [SECURITY] [DSA 4520-1] trafficserver security update
- 20190825 [SECURITY] [DSA 4508-1] h2o security update
- 20190819 [SECURITY] [DSA 4503-1] golang-1.11 security update
- 20190814 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0
- FEDORA-2019-55d101a740
- FEDORA-2019-5a6a7bc12c
- FEDORA-2019-6a2980de56
- FEDORA-2019-65db7ad6c7
- [debian-lts-announce] 20201208 [SECURITY] [DLA 2485-1] golang-golang-x-net-dev security update
- [trafficserver-dev] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks
- [trafficserver-announce] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks
- [trafficserver-users] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks
- https://kc.mcafee.com/corporate/index?page=content&id=SB10296
- VU#605641
- https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
- RHSA-2020:0727
- RHSA-2020:0406
- RHSA-2019:4352
- RHSA-2019:4273
- RHSA-2019:4269
- RHSA-2019:4045
- RHSA-2019:4042
- RHSA-2019:4041
- RHSA-2019:4040
- RHSA-2019:4021
- RHSA-2019:4020
- RHSA-2019:4019
- RHSA-2019:4018
- RHSA-2019:3906
- RHSA-2019:3892
- RHSA-2019:3265
- RHSA-2019:3245
- RHSA-2019:3131
- RHSA-2019:2966
- RHSA-2019:2955
- RHSA-2019:2939
- RHSA-2019:2925
- RHSA-2019:2861
- RHSA-2019:2796
- RHSA-2019:2769
- RHSA-2019:2766
- RHSA-2019:2726
- RHSA-2019:2690
- RHSA-2019:2682
- RHSA-2019:2661
- RHSA-2019:2594
- [oss-security] 20231018 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations
- [oss-security] 20190819 [ANNOUNCE] Security release of Kubernetes v1.15.3, v1.14.6, v1.13.10 - CVE-2019-9512 and CVE-2019-9514
- 20190816 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0
- openSUSE-SU-2019:2130
- openSUSE-SU-2019:2114
- openSUSE-SU-2019:2115
- openSUSE-SU-2019:2085
- openSUSE-SU-2019:2072
- openSUSE-SU-2019:2056
Closed vulnerabilities
BDU:2020-00700
Уязвимость функций interface_release_resource (hw/display/qxl.c) эмулятора аппаратного обеспечения QEMU, связанная с разыменованием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-05168
Уязвимость функции qemu-bridge-helper.c эмулятора аппаратного обеспечения QEMU, связанная с недостатках элементов безопасности, позволяющая нарушителю получить несанкционированный доступ к информации, вызвать отказ в обслуживании или оказать воздействие на доступность информации
Modified: 2024-11-21
CVE-2019-12155
interface_release_resource in hw/display/qxl.c in QEMU 3.1.x through 4.0.0 has a NULL pointer dereference.
- openSUSE-SU-2019:2041
- openSUSE-SU-2019:2041
- openSUSE-SU-2019:2059
- openSUSE-SU-2019:2059
- http://www.openwall.com/lists/oss-security/2019/05/22/1
- http://www.openwall.com/lists/oss-security/2019/05/22/1
- RHBA-2019:3723
- RHBA-2019:3723
- RHSA-2019:2607
- RHSA-2019:2607
- RHSA-2019:2892
- RHSA-2019:2892
- RHSA-2019:3179
- RHSA-2019:3179
- RHSA-2019:3345
- RHSA-2019:3345
- RHSA-2019:3742
- RHSA-2019:3742
- RHSA-2019:3787
- RHSA-2019:3787
- RHSA-2019:4344
- RHSA-2019:4344
- https://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=3be7eb2f47bf71db5f80fcf8750ea395dd5ffdd2
- https://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=3be7eb2f47bf71db5f80fcf8750ea395dd5ffdd2
- [debian-lts-announce] 20190920 [SECURITY] [DLA 1927-1] qemu security update
- [debian-lts-announce] 20190920 [SECURITY] [DLA 1927-1] qemu security update
- FEDORA-2019-e9de40d53f
- FEDORA-2019-e9de40d53f
- FEDORA-2019-52a8f5468e
- FEDORA-2019-52a8f5468e
- https://lists.gnu.org/archive/html/qemu-devel/2019-05/msg01321.html
- https://lists.gnu.org/archive/html/qemu-devel/2019-05/msg01321.html
- 20190531 [SECURITY] [DSA 4454-1] qemu security update
- 20190531 [SECURITY] [DSA 4454-1] qemu security update
- USN-4191-1
- USN-4191-1
- USN-4191-2
- USN-4191-2
- DSA-4454
- DSA-4454
Modified: 2024-11-21
CVE-2019-12928
The QMP migrate command in QEMU version 4.0.0 and earlier is vulnerable to OS command injection, which allows the remote attacker to achieve code execution, denial of service, or information disclosure by sending a crafted QMP command to the listening server. Note: This has been disputed as a non-issue since QEMU's -qmp interface is meant to be used by trusted users. If one is able to access this interface via a tcp socket open to the internet, then it is an insecure configuration issue
Modified: 2024-11-21
CVE-2019-12929
The QMP guest_exec command in QEMU 4.0.0 and earlier is prone to OS command injection, which allows the attacker to achieve code execution, denial of service, or information disclosure by sending a crafted QMP command to the listening server. Note: This has been disputed as a non-issue since QEMU's -qmp interface is meant to be used by trusted users. If one is able to access this interface via a tcp socket open to the internet, then it is an insecure configuration issue
Modified: 2024-11-21
CVE-2019-13164
qemu-bridge-helper.c in QEMU 3.1 and 4.0.0 does not ensure that a network interface name (obtained from bridge.conf or a --br=bridge option) is limited to the IFNAMSIZ size, which can lead to an ACL bypass.
- openSUSE-SU-2019:2041
- openSUSE-SU-2019:2041
- openSUSE-SU-2019:2059
- openSUSE-SU-2019:2059
- http://www.openwall.com/lists/oss-security/2019/07/02/2
- http://www.openwall.com/lists/oss-security/2019/07/02/2
- [oss-security] 20190703 CVE-2019-13164 Qemu: qemu-bridge-helper ACL bypassed with long interface names
- [oss-security] 20190703 CVE-2019-13164 Qemu: qemu-bridge-helper ACL bypassed with long interface names
- 109054
- 109054
- https://github.com/qemu/qemu/commit/03d7712b4bcd47bfe0fe14ba2fffa87e111fa086
- https://github.com/qemu/qemu/commit/03d7712b4bcd47bfe0fe14ba2fffa87e111fa086
- [debian-lts-announce] 20190920 [SECURITY] [DLA 1927-1] qemu security update
- [debian-lts-announce] 20190920 [SECURITY] [DLA 1927-1] qemu security update
- https://lists.gnu.org/archive/html/qemu-devel/2019-07/msg00145.html
- https://lists.gnu.org/archive/html/qemu-devel/2019-07/msg00145.html
- 20190825 [SECURITY] [DSA 4506-1] qemu security update
- 20190825 [SECURITY] [DSA 4506-1] qemu security update
- 20190902 [SECURITY] [DSA 4512-1] qemu security update
- 20190902 [SECURITY] [DSA 4512-1] qemu security update
- GLSA-202003-66
- GLSA-202003-66
- USN-4191-1
- USN-4191-1
- USN-4191-2
- USN-4191-2
- DSA-4506
- DSA-4506
- DSA-4512
- DSA-4512
Modified: 2024-11-21
CVE-2019-15034
hw/display/bochs-display.c in QEMU 4.0.0 does not ensure a sufficient PCI config space allocation, leading to a buffer overflow involving the PCIe extended config space.
Closed vulnerabilities
BDU:2019-01946
Уязвимость реализации протокола EAP-PWD сертификации устройств беспроводной связи WPA, связанная с использованием криптографических алгоритмов, содержащих дефекты, позволяющая нарушителю осуществить установку и запуск приложений или получить доступ к конфиденциальным данным
BDU:2019-01947
Уязвимость компонента wpa_supplicant протокола EAP-PWD сертификации устройств беспроводной связи WPA, связанная с неправильной аутентификацией, позволяющая нарушителю оказать воздействие на целостность и конфиденциальность данных, а также вызвать отказ в обслуживании
BDU:2019-01948
Уязвимость компонента EAP Server протокола EAP-PWD сертификации устройств беспроводной связи WPA, связанная с некорректным использованием привилегий, позволяющая нарушителю оказать воздействие на целостность и конфиденциальность данных или вызвать отказ в обслуживании
BDU:2019-01949
Уязвимость компонента wpa_supplicant протокола EAP-PWD сертификации устройств беспроводной связи WPA, связанная с некорректным использованием привилегий, позволяющая нарушителю оказать воздействие на целостность и конфиденциальность данных или вызвать отказ в обслуживании
BDU:2020-00775
Уязвимость функции wpa_supplicant сервера EAP hostapd, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-03318
Уязвимость реализации протокола WPA программы-демона пользовательского пространства hostapd, позволяющая нарушителю получить учетные данные
BDU:2021-05846
Уязвимость реализации SAE функции wpa_supplicant сертификации устройств беспроводной связи WPA, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2021-05847
Уязвимость реализации SAE функции wpa_supplicant сертификации устройств беспроводной связи WPA, связанная с недостатками процедуры аутентификации, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-11555
The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly state properly for a case where an unexpected fragment could be received. This could result in process termination due to a NULL pointer dereference (denial of service). This affects eap_server/eap_server_pwd.c and eap_peer/eap_pwd.c.
- [oss-security] 20190426 Re: wpa_supplicant/hostapd: EAP-pwd message reassembly issue with unexpected fragment
- [oss-security] 20190426 Re: wpa_supplicant/hostapd: EAP-pwd message reassembly issue with unexpected fragment
- [debian-lts-announce] 20190731 [SECURITY] [DLA 1867-1] wpa security update
- [debian-lts-announce] 20190731 [SECURITY] [DLA 1867-1] wpa security update
- FEDORA-2019-ff1b728d09
- FEDORA-2019-ff1b728d09
- FEDORA-2019-d6bc3771a4
- FEDORA-2019-d6bc3771a4
- FEDORA-2019-28d3ca93d2
- FEDORA-2019-28d3ca93d2
- 20190515 FreeBSD Security Advisory FreeBSD-SA-19:03.wpa
- 20190515 FreeBSD Security Advisory FreeBSD-SA-19:03.wpa
- 20190527 [SECURITY] [DSA 4450-1] wpa security update
- 20190527 [SECURITY] [DSA 4450-1] wpa security update
- FreeBSD-SA-19:03
- FreeBSD-SA-19:03
- GLSA-201908-25
- GLSA-201908-25
- USN-3969-1
- USN-3969-1
- USN-3969-2
- USN-3969-2
- https://w1.fi/security/2019-5/
- https://w1.fi/security/2019-5/
- https://w1.fi/security/2019-5/eap-pwd-message-reassembly-issue-with-unexpected-fragment.txt
- https://w1.fi/security/2019-5/eap-pwd-message-reassembly-issue-with-unexpected-fragment.txt
- DSA-4450
- DSA-4450
- https://www.openwall.com/lists/oss-security/2019/04/18/6
- https://www.openwall.com/lists/oss-security/2019/04/18/6
Modified: 2024-11-21
CVE-2019-13377
The implementations of SAE and EAP-pwd in hostapd and wpa_supplicant 2.x through 2.8 are vulnerable to side-channel attacks as a result of observable timing differences and cache access patterns when Brainpool curves are used. An attacker may be able to gain leaked information from a side-channel attack that can be used for full password recovery.
- FEDORA-2019-97e9040197
- FEDORA-2019-97e9040197
- 20190929 [SECURITY] [DSA 4538-1] wpa security update
- 20190929 [SECURITY] [DSA 4538-1] wpa security update
- https://usn.ubuntu.com/4098-1/
- https://usn.ubuntu.com/4098-1/
- https://w1.fi/cgit/hostap/commit/?id=147bf7b88a9c231322b5b574263071ca6dbb0503
- https://w1.fi/cgit/hostap/commit/?id=147bf7b88a9c231322b5b574263071ca6dbb0503
- https://w1.fi/cgit/hostap/commit/?id=cd803299ca485eb857e37c88f973fccfbb8600e5
- https://w1.fi/cgit/hostap/commit/?id=cd803299ca485eb857e37c88f973fccfbb8600e5
- DSA-4538
- DSA-4538
Modified: 2024-11-21
CVE-2019-9494
The implementations of SAE in hostapd and wpa_supplicant are vulnerable to side channel attacks as a result of observable timing differences and cache access patterns. An attacker may be able to gain leaked information from a side channel attack that can be used for full password recovery. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.7 are affected.
- openSUSE-SU-2020:0222
- http://packetstormsecurity.com/files/152914/FreeBSD-Security-Advisory-FreeBSD-SA-19-03.wpa.html
- FEDORA-2019-d03bae77f5
- FEDORA-2019-eba1109acd
- FEDORA-2019-f409af9fbe
- 20190515 FreeBSD Security Advisory FreeBSD-SA-19:03.wpa
- FreeBSD-SA-19:03
- https://w1.fi/security/2019-1/
- https://www.synology.com/security/advisory/Synology_SA_19_16
- openSUSE-SU-2020:0222
- https://www.synology.com/security/advisory/Synology_SA_19_16
- https://w1.fi/security/2019-1/
- FreeBSD-SA-19:03
- 20190515 FreeBSD Security Advisory FreeBSD-SA-19:03.wpa
- FEDORA-2019-f409af9fbe
- FEDORA-2019-eba1109acd
- FEDORA-2019-d03bae77f5
- http://packetstormsecurity.com/files/152914/FreeBSD-Security-Advisory-FreeBSD-SA-19-03.wpa.html
Modified: 2024-11-21
CVE-2019-9495
The implementations of EAP-PWD in hostapd and wpa_supplicant are vulnerable to side-channel attacks as a result of cache access patterns. All versions of hostapd and wpa_supplicant with EAP-PWD support are vulnerable. The ability to install and execute applications is necessary for a successful attack. Memory access patterns are visible in a shared cache. Weak passwords may be cracked. Versions of hostapd/wpa_supplicant 2.7 and newer, are not vulnerable to the timing attack described in CVE-2019-9494. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.
- openSUSE-SU-2020:0222
- http://packetstormsecurity.com/files/152914/FreeBSD-Security-Advisory-FreeBSD-SA-19-03.wpa.html
- [debian-lts-announce] 20190731 [SECURITY] [DLA 1867-1] wpa security update
- FEDORA-2019-d03bae77f5
- FEDORA-2019-eba1109acd
- FEDORA-2019-f409af9fbe
- 20190515 FreeBSD Security Advisory FreeBSD-SA-19:03.wpa
- FreeBSD-SA-19:03
- https://w1.fi/security/2019-2/
- https://www.synology.com/security/advisory/Synology_SA_19_16
- openSUSE-SU-2020:0222
- https://www.synology.com/security/advisory/Synology_SA_19_16
- https://w1.fi/security/2019-2/
- FreeBSD-SA-19:03
- 20190515 FreeBSD Security Advisory FreeBSD-SA-19:03.wpa
- FEDORA-2019-f409af9fbe
- FEDORA-2019-eba1109acd
- FEDORA-2019-d03bae77f5
- [debian-lts-announce] 20190731 [SECURITY] [DLA 1867-1] wpa security update
- http://packetstormsecurity.com/files/152914/FreeBSD-Security-Advisory-FreeBSD-SA-19-03.wpa.html
Modified: 2024-11-21
CVE-2019-9496
An invalid authentication sequence could result in the hostapd process terminating due to missing state validation steps when processing the SAE confirm message when in hostapd/AP mode. All version of hostapd with SAE support are vulnerable. An attacker may force the hostapd process to terminate, performing a denial of service attack. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.7 are affected.
- openSUSE-SU-2020:0222
- http://packetstormsecurity.com/files/152914/FreeBSD-Security-Advisory-FreeBSD-SA-19-03.wpa.html
- FEDORA-2019-d03bae77f5
- FEDORA-2019-eba1109acd
- FEDORA-2019-f409af9fbe
- 20190515 FreeBSD Security Advisory FreeBSD-SA-19:03.wpa
- FreeBSD-SA-19:03
- https://w1.fi/security/2019-3/
- https://www.synology.com/security/advisory/Synology_SA_19_16
- openSUSE-SU-2020:0222
- https://www.synology.com/security/advisory/Synology_SA_19_16
- https://w1.fi/security/2019-3/
- FreeBSD-SA-19:03
- 20190515 FreeBSD Security Advisory FreeBSD-SA-19:03.wpa
- FEDORA-2019-f409af9fbe
- FEDORA-2019-eba1109acd
- FEDORA-2019-d03bae77f5
- http://packetstormsecurity.com/files/152914/FreeBSD-Security-Advisory-FreeBSD-SA-19-03.wpa.html
Modified: 2024-11-21
CVE-2019-9497
The implementations of EAP-PWD in hostapd EAP Server and wpa_supplicant EAP Peer do not validate the scalar and element values in EAP-pwd-Commit. This vulnerability may allow an attacker to complete EAP-PWD authentication without knowing the password. However, unless the crypto library does not implement additional checks for the EC point, the attacker will not be able to derive the session key or complete the key exchange. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.4 are affected. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.
- openSUSE-SU-2020:0222
- http://packetstormsecurity.com/files/152914/FreeBSD-Security-Advisory-FreeBSD-SA-19-03.wpa.html
- [debian-lts-announce] 20190731 [SECURITY] [DLA 1867-1] wpa security update
- FEDORA-2019-d03bae77f5
- FEDORA-2019-eba1109acd
- FEDORA-2019-f409af9fbe
- 20190515 FreeBSD Security Advisory FreeBSD-SA-19:03.wpa
- FreeBSD-SA-19:03
- https://w1.fi/security/2019-4/
- https://www.synology.com/security/advisory/Synology_SA_19_16
- openSUSE-SU-2020:0222
- https://www.synology.com/security/advisory/Synology_SA_19_16
- https://w1.fi/security/2019-4/
- FreeBSD-SA-19:03
- 20190515 FreeBSD Security Advisory FreeBSD-SA-19:03.wpa
- FEDORA-2019-f409af9fbe
- FEDORA-2019-eba1109acd
- FEDORA-2019-d03bae77f5
- [debian-lts-announce] 20190731 [SECURITY] [DLA 1867-1] wpa security update
- http://packetstormsecurity.com/files/152914/FreeBSD-Security-Advisory-FreeBSD-SA-19-03.wpa.html
Modified: 2024-11-21
CVE-2019-9498
The implementations of EAP-PWD in hostapd EAP Server, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. An attacker may be able to use invalid scalar/element values to complete authentication, gaining session key and network access without needing or learning the password. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.4 are affected. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.
- openSUSE-SU-2020:0222
- [debian-lts-announce] 20190731 [SECURITY] [DLA 1867-1] wpa security update
- FEDORA-2019-d03bae77f5
- FEDORA-2019-eba1109acd
- FEDORA-2019-f409af9fbe
- 20190515 FreeBSD Security Advisory FreeBSD-SA-19:03.wpa
- FreeBSD-SA-19:03
- https://w1.fi/security/2019-4/
- https://www.synology.com/security/advisory/Synology_SA_19_16
- openSUSE-SU-2020:0222
- https://www.synology.com/security/advisory/Synology_SA_19_16
- https://w1.fi/security/2019-4/
- FreeBSD-SA-19:03
- 20190515 FreeBSD Security Advisory FreeBSD-SA-19:03.wpa
- FEDORA-2019-f409af9fbe
- FEDORA-2019-eba1109acd
- FEDORA-2019-d03bae77f5
- [debian-lts-announce] 20190731 [SECURITY] [DLA 1867-1] wpa security update
Modified: 2024-11-21
CVE-2019-9499
The implementations of EAP-PWD in wpa_supplicant EAP Peer, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. An attacker may complete authentication, session key and control of the data connection with a client. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.4 are affected. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.
- openSUSE-SU-2020:0222
- [debian-lts-announce] 20190731 [SECURITY] [DLA 1867-1] wpa security update
- FEDORA-2019-d03bae77f5
- FEDORA-2019-eba1109acd
- FEDORA-2019-f409af9fbe
- 20190515 FreeBSD Security Advisory FreeBSD-SA-19:03.wpa
- FreeBSD-SA-19:03
- https://w1.fi/security/2019-4/
- https://www.synology.com/security/advisory/Synology_SA_19_16
- openSUSE-SU-2020:0222
- https://www.synology.com/security/advisory/Synology_SA_19_16
- https://w1.fi/security/2019-4/
- FreeBSD-SA-19:03
- 20190515 FreeBSD Security Advisory FreeBSD-SA-19:03.wpa
- FEDORA-2019-f409af9fbe
- FEDORA-2019-eba1109acd
- FEDORA-2019-d03bae77f5
- [debian-lts-announce] 20190731 [SECURITY] [DLA 1867-1] wpa security update
Package wpa_supplicant updated to version 2.9-alt1 for branch sisyphus in task 236307.
Closed vulnerabilities
BDU:2019-01946
Уязвимость реализации протокола EAP-PWD сертификации устройств беспроводной связи WPA, связанная с использованием криптографических алгоритмов, содержащих дефекты, позволяющая нарушителю осуществить установку и запуск приложений или получить доступ к конфиденциальным данным
BDU:2019-01947
Уязвимость компонента wpa_supplicant протокола EAP-PWD сертификации устройств беспроводной связи WPA, связанная с неправильной аутентификацией, позволяющая нарушителю оказать воздействие на целостность и конфиденциальность данных, а также вызвать отказ в обслуживании
BDU:2019-01948
Уязвимость компонента EAP Server протокола EAP-PWD сертификации устройств беспроводной связи WPA, связанная с некорректным использованием привилегий, позволяющая нарушителю оказать воздействие на целостность и конфиденциальность данных или вызвать отказ в обслуживании
BDU:2019-01949
Уязвимость компонента wpa_supplicant протокола EAP-PWD сертификации устройств беспроводной связи WPA, связанная с некорректным использованием привилегий, позволяющая нарушителю оказать воздействие на целостность и конфиденциальность данных или вызвать отказ в обслуживании
BDU:2020-00775
Уязвимость функции wpa_supplicant сервера EAP hostapd, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-05846
Уязвимость реализации SAE функции wpa_supplicant сертификации устройств беспроводной связи WPA, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2021-05847
Уязвимость реализации SAE функции wpa_supplicant сертификации устройств беспроводной связи WPA, связанная с недостатками процедуры аутентификации, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-11555
The EAP-pwd implementation in hostapd (EAP server) before 2.8 and wpa_supplicant (EAP peer) before 2.8 does not validate fragmentation reassembly state properly for a case where an unexpected fragment could be received. This could result in process termination due to a NULL pointer dereference (denial of service). This affects eap_server/eap_server_pwd.c and eap_peer/eap_pwd.c.
- [oss-security] 20190426 Re: wpa_supplicant/hostapd: EAP-pwd message reassembly issue with unexpected fragment
- [oss-security] 20190426 Re: wpa_supplicant/hostapd: EAP-pwd message reassembly issue with unexpected fragment
- [debian-lts-announce] 20190731 [SECURITY] [DLA 1867-1] wpa security update
- [debian-lts-announce] 20190731 [SECURITY] [DLA 1867-1] wpa security update
- FEDORA-2019-ff1b728d09
- FEDORA-2019-ff1b728d09
- FEDORA-2019-d6bc3771a4
- FEDORA-2019-d6bc3771a4
- FEDORA-2019-28d3ca93d2
- FEDORA-2019-28d3ca93d2
- 20190515 FreeBSD Security Advisory FreeBSD-SA-19:03.wpa
- 20190515 FreeBSD Security Advisory FreeBSD-SA-19:03.wpa
- 20190527 [SECURITY] [DSA 4450-1] wpa security update
- 20190527 [SECURITY] [DSA 4450-1] wpa security update
- FreeBSD-SA-19:03
- FreeBSD-SA-19:03
- GLSA-201908-25
- GLSA-201908-25
- USN-3969-1
- USN-3969-1
- USN-3969-2
- USN-3969-2
- https://w1.fi/security/2019-5/
- https://w1.fi/security/2019-5/
- https://w1.fi/security/2019-5/eap-pwd-message-reassembly-issue-with-unexpected-fragment.txt
- https://w1.fi/security/2019-5/eap-pwd-message-reassembly-issue-with-unexpected-fragment.txt
- DSA-4450
- DSA-4450
- https://www.openwall.com/lists/oss-security/2019/04/18/6
- https://www.openwall.com/lists/oss-security/2019/04/18/6
Modified: 2024-11-21
CVE-2019-9494
The implementations of SAE in hostapd and wpa_supplicant are vulnerable to side channel attacks as a result of observable timing differences and cache access patterns. An attacker may be able to gain leaked information from a side channel attack that can be used for full password recovery. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.7 are affected.
- openSUSE-SU-2020:0222
- http://packetstormsecurity.com/files/152914/FreeBSD-Security-Advisory-FreeBSD-SA-19-03.wpa.html
- FEDORA-2019-d03bae77f5
- FEDORA-2019-eba1109acd
- FEDORA-2019-f409af9fbe
- 20190515 FreeBSD Security Advisory FreeBSD-SA-19:03.wpa
- FreeBSD-SA-19:03
- https://w1.fi/security/2019-1/
- https://www.synology.com/security/advisory/Synology_SA_19_16
- openSUSE-SU-2020:0222
- https://www.synology.com/security/advisory/Synology_SA_19_16
- https://w1.fi/security/2019-1/
- FreeBSD-SA-19:03
- 20190515 FreeBSD Security Advisory FreeBSD-SA-19:03.wpa
- FEDORA-2019-f409af9fbe
- FEDORA-2019-eba1109acd
- FEDORA-2019-d03bae77f5
- http://packetstormsecurity.com/files/152914/FreeBSD-Security-Advisory-FreeBSD-SA-19-03.wpa.html
Modified: 2024-11-21
CVE-2019-9495
The implementations of EAP-PWD in hostapd and wpa_supplicant are vulnerable to side-channel attacks as a result of cache access patterns. All versions of hostapd and wpa_supplicant with EAP-PWD support are vulnerable. The ability to install and execute applications is necessary for a successful attack. Memory access patterns are visible in a shared cache. Weak passwords may be cracked. Versions of hostapd/wpa_supplicant 2.7 and newer, are not vulnerable to the timing attack described in CVE-2019-9494. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.
- openSUSE-SU-2020:0222
- http://packetstormsecurity.com/files/152914/FreeBSD-Security-Advisory-FreeBSD-SA-19-03.wpa.html
- [debian-lts-announce] 20190731 [SECURITY] [DLA 1867-1] wpa security update
- FEDORA-2019-d03bae77f5
- FEDORA-2019-eba1109acd
- FEDORA-2019-f409af9fbe
- 20190515 FreeBSD Security Advisory FreeBSD-SA-19:03.wpa
- FreeBSD-SA-19:03
- https://w1.fi/security/2019-2/
- https://www.synology.com/security/advisory/Synology_SA_19_16
- openSUSE-SU-2020:0222
- https://www.synology.com/security/advisory/Synology_SA_19_16
- https://w1.fi/security/2019-2/
- FreeBSD-SA-19:03
- 20190515 FreeBSD Security Advisory FreeBSD-SA-19:03.wpa
- FEDORA-2019-f409af9fbe
- FEDORA-2019-eba1109acd
- FEDORA-2019-d03bae77f5
- [debian-lts-announce] 20190731 [SECURITY] [DLA 1867-1] wpa security update
- http://packetstormsecurity.com/files/152914/FreeBSD-Security-Advisory-FreeBSD-SA-19-03.wpa.html
Modified: 2024-11-21
CVE-2019-9496
An invalid authentication sequence could result in the hostapd process terminating due to missing state validation steps when processing the SAE confirm message when in hostapd/AP mode. All version of hostapd with SAE support are vulnerable. An attacker may force the hostapd process to terminate, performing a denial of service attack. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.7 are affected.
- openSUSE-SU-2020:0222
- http://packetstormsecurity.com/files/152914/FreeBSD-Security-Advisory-FreeBSD-SA-19-03.wpa.html
- FEDORA-2019-d03bae77f5
- FEDORA-2019-eba1109acd
- FEDORA-2019-f409af9fbe
- 20190515 FreeBSD Security Advisory FreeBSD-SA-19:03.wpa
- FreeBSD-SA-19:03
- https://w1.fi/security/2019-3/
- https://www.synology.com/security/advisory/Synology_SA_19_16
- openSUSE-SU-2020:0222
- https://www.synology.com/security/advisory/Synology_SA_19_16
- https://w1.fi/security/2019-3/
- FreeBSD-SA-19:03
- 20190515 FreeBSD Security Advisory FreeBSD-SA-19:03.wpa
- FEDORA-2019-f409af9fbe
- FEDORA-2019-eba1109acd
- FEDORA-2019-d03bae77f5
- http://packetstormsecurity.com/files/152914/FreeBSD-Security-Advisory-FreeBSD-SA-19-03.wpa.html
Modified: 2024-11-21
CVE-2019-9497
The implementations of EAP-PWD in hostapd EAP Server and wpa_supplicant EAP Peer do not validate the scalar and element values in EAP-pwd-Commit. This vulnerability may allow an attacker to complete EAP-PWD authentication without knowing the password. However, unless the crypto library does not implement additional checks for the EC point, the attacker will not be able to derive the session key or complete the key exchange. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.4 are affected. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.
- openSUSE-SU-2020:0222
- http://packetstormsecurity.com/files/152914/FreeBSD-Security-Advisory-FreeBSD-SA-19-03.wpa.html
- [debian-lts-announce] 20190731 [SECURITY] [DLA 1867-1] wpa security update
- FEDORA-2019-d03bae77f5
- FEDORA-2019-eba1109acd
- FEDORA-2019-f409af9fbe
- 20190515 FreeBSD Security Advisory FreeBSD-SA-19:03.wpa
- FreeBSD-SA-19:03
- https://w1.fi/security/2019-4/
- https://www.synology.com/security/advisory/Synology_SA_19_16
- openSUSE-SU-2020:0222
- https://www.synology.com/security/advisory/Synology_SA_19_16
- https://w1.fi/security/2019-4/
- FreeBSD-SA-19:03
- 20190515 FreeBSD Security Advisory FreeBSD-SA-19:03.wpa
- FEDORA-2019-f409af9fbe
- FEDORA-2019-eba1109acd
- FEDORA-2019-d03bae77f5
- [debian-lts-announce] 20190731 [SECURITY] [DLA 1867-1] wpa security update
- http://packetstormsecurity.com/files/152914/FreeBSD-Security-Advisory-FreeBSD-SA-19-03.wpa.html
Modified: 2024-11-21
CVE-2019-9498
The implementations of EAP-PWD in hostapd EAP Server, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. An attacker may be able to use invalid scalar/element values to complete authentication, gaining session key and network access without needing or learning the password. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.4 are affected. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.
- openSUSE-SU-2020:0222
- [debian-lts-announce] 20190731 [SECURITY] [DLA 1867-1] wpa security update
- FEDORA-2019-d03bae77f5
- FEDORA-2019-eba1109acd
- FEDORA-2019-f409af9fbe
- 20190515 FreeBSD Security Advisory FreeBSD-SA-19:03.wpa
- FreeBSD-SA-19:03
- https://w1.fi/security/2019-4/
- https://www.synology.com/security/advisory/Synology_SA_19_16
- openSUSE-SU-2020:0222
- https://www.synology.com/security/advisory/Synology_SA_19_16
- https://w1.fi/security/2019-4/
- FreeBSD-SA-19:03
- 20190515 FreeBSD Security Advisory FreeBSD-SA-19:03.wpa
- FEDORA-2019-f409af9fbe
- FEDORA-2019-eba1109acd
- FEDORA-2019-d03bae77f5
- [debian-lts-announce] 20190731 [SECURITY] [DLA 1867-1] wpa security update
Modified: 2024-11-21
CVE-2019-9499
The implementations of EAP-PWD in wpa_supplicant EAP Peer, when built against a crypto library missing explicit validation on imported elements, do not validate the scalar and element values in EAP-pwd-Commit. An attacker may complete authentication, session key and control of the data connection with a client. Both hostapd with SAE support and wpa_supplicant with SAE support prior to and including version 2.4 are affected. Both hostapd with EAP-pwd support and wpa_supplicant with EAP-pwd support prior to and including version 2.7 are affected.
- openSUSE-SU-2020:0222
- [debian-lts-announce] 20190731 [SECURITY] [DLA 1867-1] wpa security update
- FEDORA-2019-d03bae77f5
- FEDORA-2019-eba1109acd
- FEDORA-2019-f409af9fbe
- 20190515 FreeBSD Security Advisory FreeBSD-SA-19:03.wpa
- FreeBSD-SA-19:03
- https://w1.fi/security/2019-4/
- https://www.synology.com/security/advisory/Synology_SA_19_16
- openSUSE-SU-2020:0222
- https://www.synology.com/security/advisory/Synology_SA_19_16
- https://w1.fi/security/2019-4/
- FreeBSD-SA-19:03
- 20190515 FreeBSD Security Advisory FreeBSD-SA-19:03.wpa
- FEDORA-2019-f409af9fbe
- FEDORA-2019-eba1109acd
- FEDORA-2019-d03bae77f5
- [debian-lts-announce] 20190731 [SECURITY] [DLA 1867-1] wpa security update
Package nvidia-settings updated to version 430.40-alt2 for branch sisyphus in task 236309.
Closed bugs
NVCtrl.o собран без -fPIC