ALT-BU-2019-3900-1
Branch p9 update bulletin.
Package kernel-image-un-def updated to version 5.2.10-alt1 for branch p9 in task 236609.
Closed vulnerabilities
BDU:2019-03220
Уязвимость драйвера drivers/net/wireless/ath/ath6kl/usb.c ядра операционных систем Linux, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00286
Уязвимость драйвера drivers/usb/class/cdc-acm.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00289
Уязвимость драйвера drivers/usb/core/file.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00295
Уязвимость драйвера drivers/hid/usbhid/hiddev.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-06411
Уязвимость компонента sound/usb/mixer.c ядра операционной системы Linux, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю получить доступ к конфиденциальной информации или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-15098
drivers/net/wireless/ath/ath6kl/usb.c in the Linux kernel through 5.2.9 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
- http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- http://www.openwall.com/lists/oss-security/2019/09/27/1
- http://www.openwall.com/lists/oss-security/2019/09/27/2
- http://www.openwall.com/lists/oss-security/2019/09/27/3
- https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
- https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
- https://lore.kernel.org/linux-wireless/20190804002905.11292-1-benquike%40gmail.com/T/#u
- https://seclists.org/bugtraq/2019/Nov/11
- https://security.netapp.com/advisory/ntap-20190905-0002/
- https://support.f5.com/csp/article/K61214359
- https://support.f5.com/csp/article/K61214359?utm_source=f5support&%3Butm_medium=RSS
- https://usn.ubuntu.com/4184-1/
- https://usn.ubuntu.com/4185-1/
- https://usn.ubuntu.com/4186-1/
- https://usn.ubuntu.com/4186-2/
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
- http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- http://www.openwall.com/lists/oss-security/2019/09/27/1
- http://www.openwall.com/lists/oss-security/2019/09/27/2
- http://www.openwall.com/lists/oss-security/2019/09/27/3
- https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
- https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
- https://lore.kernel.org/linux-wireless/20190804002905.11292-1-benquike%40gmail.com/T/#u
- https://seclists.org/bugtraq/2019/Nov/11
- https://security.netapp.com/advisory/ntap-20190905-0002/
- https://support.f5.com/csp/article/K61214359
- https://support.f5.com/csp/article/K61214359?utm_source=f5support&%3Butm_medium=RSS
- https://usn.ubuntu.com/4184-1/
- https://usn.ubuntu.com/4185-1/
- https://usn.ubuntu.com/4186-1/
- https://usn.ubuntu.com/4186-2/
Modified: 2024-11-21
CVE-2019-15117
parse_audio_mixer_unit in sound/usb/mixer.c in the Linux kernel through 5.2.9 mishandles a short descriptor, leading to out-of-bounds memory access.
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
- http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- https://git.kernel.org/pub/scm/linux/kernel/git/tiwai/sound.git/commit/?id=daac07156b330b18eb5071aec4b3ddca1c377f2c
- https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html
- https://lists.debian.org/debian-lts-announce/2019/10/msg00000.html
- https://lore.kernel.org/lkml/20190814023625.21683-1-benquike%40gmail.com/
- https://seclists.org/bugtraq/2019/Nov/11
- https://seclists.org/bugtraq/2019/Sep/41
- https://security.netapp.com/advisory/ntap-20190905-0002/
- https://support.f5.com/csp/article/K16449953?utm_source=f5support&%3Butm_medium=RSS
- https://usn.ubuntu.com/4147-1/
- https://usn.ubuntu.com/4162-1/
- https://usn.ubuntu.com/4162-2/
- https://usn.ubuntu.com/4163-1/
- https://usn.ubuntu.com/4163-2/
- https://www.debian.org/security/2019/dsa-4531
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
- http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- https://git.kernel.org/pub/scm/linux/kernel/git/tiwai/sound.git/commit/?id=daac07156b330b18eb5071aec4b3ddca1c377f2c
- https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html
- https://lists.debian.org/debian-lts-announce/2019/10/msg00000.html
- https://lore.kernel.org/lkml/20190814023625.21683-1-benquike%40gmail.com/
- https://seclists.org/bugtraq/2019/Nov/11
- https://seclists.org/bugtraq/2019/Sep/41
- https://security.netapp.com/advisory/ntap-20190905-0002/
- https://support.f5.com/csp/article/K16449953?utm_source=f5support&%3Butm_medium=RSS
- https://usn.ubuntu.com/4147-1/
- https://usn.ubuntu.com/4162-1/
- https://usn.ubuntu.com/4162-2/
- https://usn.ubuntu.com/4163-1/
- https://usn.ubuntu.com/4163-2/
- https://www.debian.org/security/2019/dsa-4531
Modified: 2024-11-21
CVE-2019-15118
check_input_term in sound/usb/mixer.c in the Linux kernel through 5.2.9 mishandles recursion, leading to kernel stack exhaustion.
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
- http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- https://git.kernel.org/pub/scm/linux/kernel/git/tiwai/sound.git/commit/?id=19bce474c45be69a284ecee660aa12d8f1e88f18
- https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html
- https://lists.debian.org/debian-lts-announce/2019/10/msg00000.html
- https://lore.kernel.org/lkml/20190815043554.16623-1-benquike%40gmail.com/
- https://seclists.org/bugtraq/2019/Nov/11
- https://seclists.org/bugtraq/2019/Sep/41
- https://security.netapp.com/advisory/ntap-20190905-0002/
- https://usn.ubuntu.com/4147-1/
- https://usn.ubuntu.com/4162-1/
- https://usn.ubuntu.com/4162-2/
- https://usn.ubuntu.com/4163-1/
- https://usn.ubuntu.com/4163-2/
- https://www.debian.org/security/2019/dsa-4531
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00064.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00066.html
- http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- https://git.kernel.org/pub/scm/linux/kernel/git/tiwai/sound.git/commit/?id=19bce474c45be69a284ecee660aa12d8f1e88f18
- https://lists.debian.org/debian-lts-announce/2019/09/msg00025.html
- https://lists.debian.org/debian-lts-announce/2019/10/msg00000.html
- https://lore.kernel.org/lkml/20190815043554.16623-1-benquike%40gmail.com/
- https://seclists.org/bugtraq/2019/Nov/11
- https://seclists.org/bugtraq/2019/Sep/41
- https://security.netapp.com/advisory/ntap-20190905-0002/
- https://usn.ubuntu.com/4147-1/
- https://usn.ubuntu.com/4162-1/
- https://usn.ubuntu.com/4162-2/
- https://usn.ubuntu.com/4163-1/
- https://usn.ubuntu.com/4163-2/
- https://www.debian.org/security/2019/dsa-4531
Modified: 2024-11-21
CVE-2019-15291
An issue was discovered in the Linux kernel through 5.2.9. There is a NULL pointer dereference caused by a malicious USB device in the flexcop_usb_probe function in the drivers/media/usb/b2c2/flexcop-usb.c driver.
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html
- http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- http://www.openwall.com/lists/oss-security/2019/08/20/2
- http://www.openwall.com/lists/oss-security/2019/08/22/1
- https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
- https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
- https://seclists.org/bugtraq/2020/Jan/10
- https://security.netapp.com/advisory/ntap-20190905-0002/
- https://syzkaller.appspot.com/bug?id=c0203bd72037d07493f4b7562411e4f5f4553a8f
- https://usn.ubuntu.com/4254-1/
- https://usn.ubuntu.com/4254-2/
- https://usn.ubuntu.com/4258-1/
- https://usn.ubuntu.com/4284-1/
- https://usn.ubuntu.com/4287-1/
- https://usn.ubuntu.com/4287-2/
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00036.html
- http://lists.opensuse.org/opensuse-security-announce/2019-10/msg00037.html
- http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- http://www.openwall.com/lists/oss-security/2019/08/20/2
- http://www.openwall.com/lists/oss-security/2019/08/22/1
- https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
- https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
- https://seclists.org/bugtraq/2020/Jan/10
- https://security.netapp.com/advisory/ntap-20190905-0002/
- https://syzkaller.appspot.com/bug?id=c0203bd72037d07493f4b7562411e4f5f4553a8f
- https://usn.ubuntu.com/4254-1/
- https://usn.ubuntu.com/4254-2/
- https://usn.ubuntu.com/4258-1/
- https://usn.ubuntu.com/4284-1/
- https://usn.ubuntu.com/4287-1/
- https://usn.ubuntu.com/4287-2/
Modified: 2024-11-21
CVE-2019-19527
In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver, aka CID-9c09b214f30e.
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
- http://www.openwall.com/lists/oss-security/2019/12/03/4
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.10
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6d4472d7bec39917b54e4e80245784ea5d60ce49
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9c09b214f30e3c11f9b0b03f89442df03643794d
- https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
- https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
- http://www.openwall.com/lists/oss-security/2019/12/03/4
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.10
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6d4472d7bec39917b54e4e80245784ea5d60ce49
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9c09b214f30e3c11f9b0b03f89442df03643794d
- https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
- https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
Modified: 2024-11-21
CVE-2019-19530
In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver, aka CID-c52873e5a1ef.
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
- http://www.openwall.com/lists/oss-security/2019/12/03/4
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.10
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c52873e5a1ef72f845526d9f6a50704433f9c625
- https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
- https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2019-12/msg00029.html
- http://www.openwall.com/lists/oss-security/2019/12/03/4
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.10
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c52873e5a1ef72f845526d9f6a50704433f9c625
- https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
- https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
Modified: 2024-11-21
CVE-2019-19537
In the Linux kernel before 5.2.10, there is a race condition bug that can be caused by a malicious USB device in the USB character device driver layer, aka CID-303911cfc5b9. This affects drivers/usb/core/file.c.
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
- http://www.openwall.com/lists/oss-security/2019/12/03/4
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.10
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=303911cfc5b95d33687d9046133ff184cf5043ff
- https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
- https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00021.html
- http://www.openwall.com/lists/oss-security/2019/12/03/4
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.10
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=303911cfc5b95d33687d9046133ff184cf5043ff
- https://lists.debian.org/debian-lts-announce/2020/01/msg00013.html
- https://lists.debian.org/debian-lts-announce/2020/03/msg00001.html
Package libvncserver updated to version 0.9.11-alt4 for branch p9 in task 236672.
Closed vulnerabilities
BDU:2018-01493
Уязвимость функции rfbProcessClientNormalMessage() кроссплатформенной библиотеки LibVNCServer, позволяющая нарушителю вызвать отказ в обслуживании и получить несанкционированный доступ к конфиденциальным данным
Modified: 2024-11-21
CVE-2018-7225
An issue was discovered in LibVNCServer through 0.9.11. rfbProcessClientNormalMessage() in rfbserver.c does not sanitize msg.cct.length, leading to access to uninitialized and potentially sensitive data or possibly unspecified other impact (e.g., an integer overflow) via specially crafted VNC packets.
- http://www.openwall.com/lists/oss-security/2018/02/18/1
- http://www.securityfocus.com/bid/103107
- https://access.redhat.com/errata/RHSA-2018:1055
- https://github.com/LibVNC/libvncserver/issues/218
- https://lists.debian.org/debian-lts-announce/2018/03/msg00035.html
- https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html
- https://lists.debian.org/debian-lts-announce/2019/11/msg00032.html
- https://lists.debian.org/debian-lts-announce/2019/12/msg00028.html
- https://security.gentoo.org/glsa/201908-05
- https://usn.ubuntu.com/3618-1/
- https://usn.ubuntu.com/4547-1/
- https://usn.ubuntu.com/4573-1/
- https://usn.ubuntu.com/4587-1/
- https://www.debian.org/security/2018/dsa-4221
- http://www.openwall.com/lists/oss-security/2018/02/18/1
- http://www.securityfocus.com/bid/103107
- https://access.redhat.com/errata/RHSA-2018:1055
- https://github.com/LibVNC/libvncserver/issues/218
- https://lists.debian.org/debian-lts-announce/2018/03/msg00035.html
- https://lists.debian.org/debian-lts-announce/2019/10/msg00042.html
- https://lists.debian.org/debian-lts-announce/2019/11/msg00032.html
- https://lists.debian.org/debian-lts-announce/2019/12/msg00028.html
- https://security.gentoo.org/glsa/201908-05
- https://usn.ubuntu.com/3618-1/
- https://usn.ubuntu.com/4547-1/
- https://usn.ubuntu.com/4573-1/
- https://usn.ubuntu.com/4587-1/
- https://www.debian.org/security/2018/dsa-4221
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-24031
In the Zstandard command-line utility prior to v1.4.1, output files were created with default permissions. Correct file permissions (matching the input) would only be set at completion time. Output files could therefore be readable or writable to unintended parties.
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981404
- https://github.com/facebook/zstd/issues/1630
- https://www.facebook.com/security/advisories/cve-2021-24031
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981404
- https://github.com/facebook/zstd/issues/1630
- https://www.facebook.com/security/advisories/cve-2021-24031
Closed vulnerabilities
Modified: 2025-04-12
CVE-2013-4440
Password Generator (aka Pwgen) before 2.07 generates weak non-tty passwords, which makes it easier for context-dependent attackers to guess the password via a brute-force attack.
- http://advisories.mageia.org/MGASA-2014-0535.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146015.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146237.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146285.html
- http://sourceforge.net/p/pwgen/code/ci/00118ccac4656adb028504639b313d7b09e62b79/
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:008
- http://www.openwall.com/lists/oss-security/2013/06/06/1
- http://www.openwall.com/lists/oss-security/2013/10/16/15
- http://advisories.mageia.org/MGASA-2014-0535.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146015.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146237.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146285.html
- http://sourceforge.net/p/pwgen/code/ci/00118ccac4656adb028504639b313d7b09e62b79/
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:008
- http://www.openwall.com/lists/oss-security/2013/06/06/1
- http://www.openwall.com/lists/oss-security/2013/10/16/15
Modified: 2024-11-21
CVE-2013-4441
The Phonemes mode in Pwgen 2.06 generates predictable passwords, which makes it easier for context-dependent attackers to guess the password via a brute-force attack.
- http://www.openwall.com/lists/oss-security/2013/06/06/1
- http://www.openwall.com/lists/oss-security/2013/10/16/15
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=726578
- https://www.openwall.com/lists/oss-security/2012/01/22/6
- http://www.openwall.com/lists/oss-security/2013/06/06/1
- http://www.openwall.com/lists/oss-security/2013/10/16/15
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=726578
- https://www.openwall.com/lists/oss-security/2012/01/22/6
Modified: 2025-04-12
CVE-2013-4442
Password Generator (aka Pwgen) before 2.07 uses weak pseudo generated numbers when /dev/urandom is unavailable, which makes it easier for context-dependent attackers to guess the numbers.
- http://advisories.mageia.org/MGASA-2014-0535.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146015.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146237.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146285.html
- http://sourceforge.net/p/pwgen/code/ci/00118ccac4656adb028504639b313d7b09e62b79/
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:008
- http://www.openwall.com/lists/oss-security/2013/06/06/1
- http://www.openwall.com/lists/oss-security/2013/10/16/15
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=672241
- http://advisories.mageia.org/MGASA-2014-0535.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146015.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146237.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-December/146285.html
- http://sourceforge.net/p/pwgen/code/ci/00118ccac4656adb028504639b313d7b09e62b79/
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:008
- http://www.openwall.com/lists/oss-security/2013/06/06/1
- http://www.openwall.com/lists/oss-security/2013/10/16/15
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=672241
Package alterator-net-eth updated to version 5.1.2-alt1 for branch p9 in task 236628.
Closed bugs
ipv4address не создается при переключении конфигурации с DHCP на ручное (изменения, внесенные с помощью альтератора не применяются сразу при нажатии на кнопку "Применить")