ALT-BU-2019-3900-1
Branch p9 update bulletin.
Package kernel-image-un-def updated to version 5.2.10-alt1 for branch p9 in task 236609.
Closed vulnerabilities
BDU:2019-03220
Уязвимость драйвера drivers/net/wireless/ath/ath6kl/usb.c ядра операционных систем Linux, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00286
Уязвимость драйвера drivers/usb/class/cdc-acm.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00289
Уязвимость драйвера drivers/usb/core/file.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00295
Уязвимость драйвера drivers/hid/usbhid/hiddev.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-06411
Уязвимость компонента sound/usb/mixer.c ядра операционной системы Linux, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю получить доступ к конфиденциальной информации или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-15098
drivers/net/wireless/ath/ath6kl/usb.c in the Linux kernel through 5.2.9 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.
- openSUSE-SU-2019:2173
- openSUSE-SU-2019:2173
- openSUSE-SU-2019:2181
- openSUSE-SU-2019:2181
- http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- [oss-security] 20190927 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2
- [oss-security] 20190927 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2
- [oss-security] 20190927 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2
- [oss-security] 20190927 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2
- [oss-security] 20190927 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2
- [oss-security] 20190927 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2
- [debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
- [debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
- [debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
- [debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
- https://lore.kernel.org/linux-wireless/20190804002905.11292-1-benquike%40gmail.com/T/#u
- https://lore.kernel.org/linux-wireless/20190804002905.11292-1-benquike%40gmail.com/T/#u
- 20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01)
- 20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01)
- https://security.netapp.com/advisory/ntap-20190905-0002/
- https://security.netapp.com/advisory/ntap-20190905-0002/
- https://support.f5.com/csp/article/K61214359
- https://support.f5.com/csp/article/K61214359
- https://support.f5.com/csp/article/K61214359?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K61214359?utm_source=f5support&%3Butm_medium=RSS
- USN-4184-1
- USN-4184-1
- USN-4185-1
- USN-4185-1
- USN-4186-1
- USN-4186-1
- USN-4186-2
- USN-4186-2
Modified: 2024-11-21
CVE-2019-15117
parse_audio_mixer_unit in sound/usb/mixer.c in the Linux kernel through 5.2.9 mishandles a short descriptor, leading to out-of-bounds memory access.
- openSUSE-SU-2019:2173
- openSUSE-SU-2019:2173
- openSUSE-SU-2019:2181
- openSUSE-SU-2019:2181
- http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- https://git.kernel.org/pub/scm/linux/kernel/git/tiwai/sound.git/commit/?id=daac07156b330b18eb5071aec4b3ddca1c377f2c
- https://git.kernel.org/pub/scm/linux/kernel/git/tiwai/sound.git/commit/?id=daac07156b330b18eb5071aec4b3ddca1c377f2c
- [debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update
- [debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update
- [debian-lts-announce] 20191001 [SECURITY] [DLA 1940-1] linux-4.9 security update
- [debian-lts-announce] 20191001 [SECURITY] [DLA 1940-1] linux-4.9 security update
- https://lore.kernel.org/lkml/20190814023625.21683-1-benquike%40gmail.com/
- https://lore.kernel.org/lkml/20190814023625.21683-1-benquike%40gmail.com/
- 20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01)
- 20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01)
- 20190925 [SECURITY] [DSA 4531-1] linux security update
- 20190925 [SECURITY] [DSA 4531-1] linux security update
- https://security.netapp.com/advisory/ntap-20190905-0002/
- https://security.netapp.com/advisory/ntap-20190905-0002/
- https://support.f5.com/csp/article/K16449953?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K16449953?utm_source=f5support&%3Butm_medium=RSS
- USN-4147-1
- USN-4147-1
- USN-4162-1
- USN-4162-1
- USN-4162-2
- USN-4162-2
- USN-4163-1
- USN-4163-1
- USN-4163-2
- USN-4163-2
- DSA-4531
- DSA-4531
Modified: 2024-11-21
CVE-2019-15118
check_input_term in sound/usb/mixer.c in the Linux kernel through 5.2.9 mishandles recursion, leading to kernel stack exhaustion.
- openSUSE-SU-2019:2173
- openSUSE-SU-2019:2173
- openSUSE-SU-2019:2181
- openSUSE-SU-2019:2181
- http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- https://git.kernel.org/pub/scm/linux/kernel/git/tiwai/sound.git/commit/?id=19bce474c45be69a284ecee660aa12d8f1e88f18
- https://git.kernel.org/pub/scm/linux/kernel/git/tiwai/sound.git/commit/?id=19bce474c45be69a284ecee660aa12d8f1e88f18
- [debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update
- [debian-lts-announce] 20190925 [SECURITY] [DLA 1930-1] linux security update
- [debian-lts-announce] 20191001 [SECURITY] [DLA 1940-1] linux-4.9 security update
- [debian-lts-announce] 20191001 [SECURITY] [DLA 1940-1] linux-4.9 security update
- https://lore.kernel.org/lkml/20190815043554.16623-1-benquike%40gmail.com/
- https://lore.kernel.org/lkml/20190815043554.16623-1-benquike%40gmail.com/
- 20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01)
- 20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01)
- 20190925 [SECURITY] [DSA 4531-1] linux security update
- 20190925 [SECURITY] [DSA 4531-1] linux security update
- https://security.netapp.com/advisory/ntap-20190905-0002/
- https://security.netapp.com/advisory/ntap-20190905-0002/
- USN-4147-1
- USN-4147-1
- USN-4162-1
- USN-4162-1
- USN-4162-2
- USN-4162-2
- USN-4163-1
- USN-4163-1
- USN-4163-2
- USN-4163-2
- DSA-4531
- DSA-4531
Modified: 2024-11-21
CVE-2019-15291
An issue was discovered in the Linux kernel through 5.2.9. There is a NULL pointer dereference caused by a malicious USB device in the flexcop_usb_probe function in the drivers/media/usb/b2c2/flexcop-usb.c driver.
- openSUSE-SU-2019:2308
- openSUSE-SU-2019:2308
- openSUSE-SU-2019:2307
- openSUSE-SU-2019:2307
- http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- [oss-security] 20190820 Linux kernel: multiple vulnerabilities in the USB subsystem x2
- [oss-security] 20190820 Linux kernel: multiple vulnerabilities in the USB subsystem x2
- [oss-security] 20190821 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2
- [oss-security] 20190821 Re: Linux kernel: multiple vulnerabilities in the USB subsystem x2
- [debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
- [debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
- [debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
- [debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
- 20200109 [slackware-security] Slackware 14.2 kernel (SSA:2020-008-01)
- 20200109 [slackware-security] Slackware 14.2 kernel (SSA:2020-008-01)
- https://security.netapp.com/advisory/ntap-20190905-0002/
- https://security.netapp.com/advisory/ntap-20190905-0002/
- https://syzkaller.appspot.com/bug?id=c0203bd72037d07493f4b7562411e4f5f4553a8f
- https://syzkaller.appspot.com/bug?id=c0203bd72037d07493f4b7562411e4f5f4553a8f
- USN-4254-1
- USN-4254-1
- USN-4254-2
- USN-4254-2
- USN-4258-1
- USN-4258-1
- USN-4284-1
- USN-4284-1
- USN-4287-1
- USN-4287-1
- USN-4287-2
- USN-4287-2
Modified: 2024-11-21
CVE-2019-19527
In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/hid/usbhid/hiddev.c driver, aka CID-9c09b214f30e.
- openSUSE-SU-2020:0336
- openSUSE-SU-2020:0336
- [oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
- [oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.10
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.10
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6d4472d7bec39917b54e4e80245784ea5d60ce49
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6d4472d7bec39917b54e4e80245784ea5d60ce49
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9c09b214f30e3c11f9b0b03f89442df03643794d
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=9c09b214f30e3c11f9b0b03f89442df03643794d
- [debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
- [debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
- [debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
- [debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
Modified: 2024-11-21
CVE-2019-19530
In the Linux kernel before 5.2.10, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/usb/class/cdc-acm.c driver, aka CID-c52873e5a1ef.
- openSUSE-SU-2019:2675
- openSUSE-SU-2019:2675
- [oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
- [oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.10
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.10
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c52873e5a1ef72f845526d9f6a50704433f9c625
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c52873e5a1ef72f845526d9f6a50704433f9c625
- [debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
- [debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
- [debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
- [debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
Modified: 2024-11-21
CVE-2019-19537
In the Linux kernel before 5.2.10, there is a race condition bug that can be caused by a malicious USB device in the USB character device driver layer, aka CID-303911cfc5b9. This affects drivers/usb/core/file.c.
- openSUSE-SU-2020:0336
- openSUSE-SU-2020:0336
- [oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
- [oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.10
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.2.10
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=303911cfc5b95d33687d9046133ff184cf5043ff
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=303911cfc5b95d33687d9046133ff184cf5043ff
- [debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
- [debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
- [debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
- [debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
Package libvncserver updated to version 0.9.11-alt4 for branch p9 in task 236672.
Closed vulnerabilities
BDU:2018-01493
Уязвимость функции rfbProcessClientNormalMessage() кроссплатформенной библиотеки LibVNCServer, позволяющая нарушителю вызвать отказ в обслуживании и получить несанкционированный доступ к конфиденциальным данным
Modified: 2024-11-21
CVE-2018-7225
An issue was discovered in LibVNCServer through 0.9.11. rfbProcessClientNormalMessage() in rfbserver.c does not sanitize msg.cct.length, leading to access to uninitialized and potentially sensitive data or possibly unspecified other impact (e.g., an integer overflow) via specially crafted VNC packets.
- http://www.openwall.com/lists/oss-security/2018/02/18/1
- http://www.openwall.com/lists/oss-security/2018/02/18/1
- 103107
- 103107
- RHSA-2018:1055
- RHSA-2018:1055
- https://github.com/LibVNC/libvncserver/issues/218
- https://github.com/LibVNC/libvncserver/issues/218
- [debian-lts-announce] 20180330 [SECURITY] [DLA 1332-1] libvncserver security update
- [debian-lts-announce] 20180330 [SECURITY] [DLA 1332-1] libvncserver security update
- [debian-lts-announce] 20191030 [SECURITY] [DLA 1979-1] italc security update
- [debian-lts-announce] 20191030 [SECURITY] [DLA 1979-1] italc security update
- [debian-lts-announce] 20191129 [SECURITY] [DLA 2014-1] vino security update
- [debian-lts-announce] 20191129 [SECURITY] [DLA 2014-1] vino security update
- [debian-lts-announce] 20191221 [SECURITY] [DLA 2045-1] tightvnc security update
- [debian-lts-announce] 20191221 [SECURITY] [DLA 2045-1] tightvnc security update
- GLSA-201908-05
- GLSA-201908-05
- USN-3618-1
- USN-3618-1
- USN-4547-1
- USN-4547-1
- USN-4573-1
- USN-4573-1
- USN-4587-1
- USN-4587-1
- DSA-4221
- DSA-4221
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-24031
In the Zstandard command-line utility prior to v1.4.1, output files were created with default permissions. Correct file permissions (matching the input) would only be set at completion time. Output files could therefore be readable or writable to unintended parties.
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981404
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=981404
- https://github.com/facebook/zstd/issues/1630
- https://github.com/facebook/zstd/issues/1630
- https://www.facebook.com/security/advisories/cve-2021-24031
- https://www.facebook.com/security/advisories/cve-2021-24031
Closed vulnerabilities
Modified: 2024-11-21
CVE-2013-4440
Password Generator (aka Pwgen) before 2.07 generates weak non-tty passwords, which makes it easier for context-dependent attackers to guess the password via a brute-force attack.
- http://advisories.mageia.org/MGASA-2014-0535.html
- http://advisories.mageia.org/MGASA-2014-0535.html
- FEDORA-2014-16368
- FEDORA-2014-16368
- FEDORA-2014-16406
- FEDORA-2014-16406
- FEDORA-2014-16473
- FEDORA-2014-16473
- http://sourceforge.net/p/pwgen/code/ci/00118ccac4656adb028504639b313d7b09e62b79/
- http://sourceforge.net/p/pwgen/code/ci/00118ccac4656adb028504639b313d7b09e62b79/
- MDVSA-2015:008
- MDVSA-2015:008
- [oss-security] 20140606 Re: CVE Request: pwgen
- [oss-security] 20140606 Re: CVE Request: pwgen
- [oss-security] 20141015 Re: RESEND: CVE Request: pwgen
- [oss-security] 20141015 Re: RESEND: CVE Request: pwgen
Modified: 2024-11-21
CVE-2013-4441
The Phonemes mode in Pwgen 2.06 generates predictable passwords, which makes it easier for context-dependent attackers to guess the password via a brute-force attack.
- http://www.openwall.com/lists/oss-security/2013/06/06/1
- http://www.openwall.com/lists/oss-security/2013/06/06/1
- http://www.openwall.com/lists/oss-security/2013/10/16/15
- http://www.openwall.com/lists/oss-security/2013/10/16/15
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=726578
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=726578
- https://www.openwall.com/lists/oss-security/2012/01/22/6
- https://www.openwall.com/lists/oss-security/2012/01/22/6
Modified: 2024-11-21
CVE-2013-4442
Password Generator (aka Pwgen) before 2.07 uses weak pseudo generated numbers when /dev/urandom is unavailable, which makes it easier for context-dependent attackers to guess the numbers.
- http://advisories.mageia.org/MGASA-2014-0535.html
- http://advisories.mageia.org/MGASA-2014-0535.html
- FEDORA-2014-16368
- FEDORA-2014-16368
- FEDORA-2014-16406
- FEDORA-2014-16406
- FEDORA-2014-16473
- FEDORA-2014-16473
- http://sourceforge.net/p/pwgen/code/ci/00118ccac4656adb028504639b313d7b09e62b79/
- http://sourceforge.net/p/pwgen/code/ci/00118ccac4656adb028504639b313d7b09e62b79/
- MDVSA-2015:008
- MDVSA-2015:008
- [oss-security] 20140606 Re: CVE Request: pwgen
- [oss-security] 20140606 Re: CVE Request: pwgen
- [oss-security] 20141015 Re: RESEND: CVE Request: pwgen
- [oss-security] 20141015 Re: RESEND: CVE Request: pwgen
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=672241
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=672241
Package alterator-net-eth updated to version 5.1.2-alt1 for branch p9 in task 236628.
Closed bugs
ipv4address не создается при переключении конфигурации с DHCP на ручное (изменения, внесенные с помощью альтератора не применяются сразу при нажатии на кнопку "Применить")