ALT-BU-2019-4008-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2019-00848
Уязвимость реализации функции «cssp_read_tsrequest» RDP-клиента rdesktop, связанная с чтением за пределами границы памяти, позволяющая нарушителю вызывать отказ в обслуживании
BDU:2019-00849
Уязвимость реализации функции «rdpdr_process» RDP-клиента rdesktop, связанная с чтением за пределами границы памяти, позволяющая нарушителю вызывать отказ в обслуживании
BDU:2019-00850
Уязвимость реализации функции «cssp_read_tsrequest» RDP-клиента rdesktop, связанная с переполнением буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2019-00851
Уязвимость реализации функции «process_bitmap_updates» RDP-клиента rdesktop, связанная с целочисленным переполнением, которое приводит к записи за пределы функции, позволяющая нарушителю выполнить произвольный код
BDU:2019-00852
Уязвимость реализации функции process_bitmap_updates() RDP-клиента rdesktop, связанная с целочисленным переполнением, которое приводит к переполнению кучи, позволяющая нарушителю выполнить произвольный код
BDU:2019-00853
Уязвимость реализации функции process_bitmap_updates() RDP-клиента rdesktop, связанная с чтением за пределами границы памяти, позволяющая нарушителю вызывать отказ в обслуживании
BDU:2019-00854
Уязвимость реализации функции «process_plane» RDP-клиента rdesktop, связанная с переполнением буфера, позволяющая нарушителю выполнить произвольный код
BDU:2019-00855
Уязвимость реализации функции «rdpsnd_process_ping» RDP-клиента rdesktop, связанная с чтением за пределами границы памяти, позволяющая нарушителю вызывать отказ в обслуживании
BDU:2019-00856
Уязвимость реализации функции «process_secondary_order» RDP-клиента rdesktop, связанная с чтением за пределами границы памяти, позволяющая нарушителю вызывать отказ в обслуживании
BDU:2019-00857
Уязвимость реализации функции «ui_clip_handle_data» RDP-клиента rdesktop, связанная с переполнением буфера, позволяющая нарушителю выполнить произвольный код
BDU:2019-01579
Уязвимость функции ui_clip_handle_data RDP-клиента rdesktop, связанная с чтением за пределами границы буфера, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2019-01580
Уязвимость файла RDP-клиента rdesktop, связанная с чтением за пределами границы буфера, позволяющая нарушителю вызывать отказ в обслуживании
BDU:2019-01581
Уязвимость RDP-клиента rdesktop, связанная с чтением за пределами границы буфера, позволяющая нарушителю вызывать отказ в обслуживании
BDU:2019-01582
Уязвимость функции rdp_in_unistr RDP-клиента rdesktop, связанная с целочисленным переполнением, приводящим к переполнению буфера на основе кучи, позволяющая нарушителю выполнить произвольный код
BDU:2019-01583
Уязвимость функции process_demand_active RDP-клиента rdesktop, связанная с чтением за пределами границы буфера, позволяющая нарушителю вызывать отказ в обслуживании
BDU:2019-01584
Уязвимость функции lspci_process RDP-клиента rdesktop, связанная с целочисленным переполнением, приводящим к переполнению буфера на основе кучи, позволяющая нарушителю выполнить произвольный код
BDU:2019-01585
Уязвимость функции rdpsnddbg_process RDP-клиента rdesktop, связанная с целочисленным переполнением, приводящим к переполнению буфера на основе кучи, позволяющая нарушителю выполнить произвольный код
BDU:2019-01586
Уязвимость функции seamless_process RDP-клиента rdesktop, связанная с целочисленным переполнением, приводящим к переполнению буфера на основе кучи, позволяющая нарушителю выполнить произвольный код
BDU:2019-01587
Уязвимость функции seamless_process_line RDP-клиента rdesktop, связанная с переполнение буфера, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2018-20174
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in the function ui_clip_handle_data() that results in an information leak.
- openSUSE-SU-2019:2135
- openSUSE-SU-2019:2135
- 106938
- 106938
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- GLSA-201903-06
- GLSA-201903-06
- DSA-4394
- DSA-4394
Modified: 2024-11-21
CVE-2018-20175
rdesktop versions up to and including v1.8.3 contains several Integer Signedness errors that lead to Out-Of-Bounds Reads in the file mcs.c and result in a Denial of Service (segfault).
- openSUSE-SU-2019:2135
- openSUSE-SU-2019:2135
- 106938
- 106938
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- GLSA-201903-06
- GLSA-201903-06
- DSA-4394
- DSA-4394
Modified: 2024-11-21
CVE-2018-20176
rdesktop versions up to and including v1.8.3 contain several Out-Of- Bounds Reads in the file secure.c that result in a Denial of Service (segfault).
- openSUSE-SU-2019:2135
- openSUSE-SU-2019:2135
- 106938
- 106938
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- GLSA-201903-06
- GLSA-201903-06
- DSA-4394
- DSA-4394
Modified: 2024-11-21
CVE-2018-20177
rdesktop versions up to and including v1.8.3 contain an Integer Overflow that leads to a Heap-Based Buffer Overflow in the function rdp_in_unistr() and results in memory corruption and possibly even a remote code execution.
- openSUSE-SU-2019:2135
- openSUSE-SU-2019:2135
- 106938
- 106938
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- GLSA-201903-06
- GLSA-201903-06
- DSA-4394
- DSA-4394
Modified: 2024-11-21
CVE-2018-20178
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in the function process_demand_active() that results in a Denial of Service (segfault).
- openSUSE-SU-2019:2135
- openSUSE-SU-2019:2135
- 106938
- 106938
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- GLSA-201903-06
- GLSA-201903-06
- DSA-4394
- DSA-4394
Modified: 2024-11-21
CVE-2018-20179
rdesktop versions up to and including v1.8.3 contain an Integer Underflow that leads to a Heap-Based Buffer Overflow in the function lspci_process() and results in memory corruption and probably even a remote code execution.
- openSUSE-SU-2019:2135
- openSUSE-SU-2019:2135
- 106938
- 106938
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- GLSA-201903-06
- GLSA-201903-06
- DSA-4394
- DSA-4394
Modified: 2024-11-21
CVE-2018-20180
rdesktop versions up to and including v1.8.3 contain an Integer Underflow that leads to a Heap-Based Buffer Overflow in the function rdpsnddbg_process() and results in memory corruption and probably even a remote code execution.
- openSUSE-SU-2019:2135
- openSUSE-SU-2019:2135
- 106938
- 106938
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- GLSA-201903-06
- GLSA-201903-06
- DSA-4394
- DSA-4394
Modified: 2024-11-21
CVE-2018-20181
rdesktop versions up to and including v1.8.3 contain an Integer Underflow that leads to a Heap-Based Buffer Overflow in the function seamless_process() and results in memory corruption and probably even a remote code execution.
- openSUSE-SU-2019:2135
- openSUSE-SU-2019:2135
- 106938
- 106938
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- GLSA-201903-06
- GLSA-201903-06
- DSA-4394
- DSA-4394
Modified: 2024-11-21
CVE-2018-20182
rdesktop versions up to and including v1.8.3 contain a Buffer Overflow over the global variables in the function seamless_process_line() that results in memory corruption and probably even a remote code execution.
- openSUSE-SU-2019:2135
- openSUSE-SU-2019:2135
- 106938
- 106938
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- GLSA-201903-06
- GLSA-201903-06
- DSA-4394
- DSA-4394
Modified: 2024-11-21
CVE-2018-8791
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function rdpdr_process() that results in an information leak.
- openSUSE-SU-2019:2135
- openSUSE-SU-2019:2135
- 106938
- 106938
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- GLSA-201903-06
- GLSA-201903-06
- DSA-4394
- DSA-4394
Modified: 2024-11-21
CVE-2018-8792
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function cssp_read_tsrequest() that results in a Denial of Service (segfault).
- openSUSE-SU-2019:2135
- openSUSE-SU-2019:2135
- 106938
- 106938
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- GLSA-201903-06
- GLSA-201903-06
- DSA-4394
- DSA-4394
Modified: 2024-11-21
CVE-2018-8793
rdesktop versions up to and including v1.8.3 contain a Heap-Based Buffer Overflow in function cssp_read_tsrequest() that results in a memory corruption and probably even a remote code execution.
- openSUSE-SU-2019:2135
- openSUSE-SU-2019:2135
- 106938
- 106938
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- GLSA-201903-06
- GLSA-201903-06
- DSA-4394
- DSA-4394
Modified: 2024-11-21
CVE-2018-8794
rdesktop versions up to and including v1.8.3 contain an Integer Overflow that leads to an Out-Of-Bounds Write in function process_bitmap_updates() and results in a memory corruption and possibly even a remote code execution.
- openSUSE-SU-2019:2135
- openSUSE-SU-2019:2135
- 106938
- 106938
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- GLSA-201903-06
- GLSA-201903-06
- DSA-4394
- DSA-4394
Modified: 2024-11-21
CVE-2018-8795
rdesktop versions up to and including v1.8.3 contain an Integer Overflow that leads to a Heap-Based Buffer Overflow in function process_bitmap_updates() and results in a memory corruption and probably even a remote code execution.
- openSUSE-SU-2019:2135
- openSUSE-SU-2019:2135
- 106938
- 106938
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- GLSA-201903-06
- GLSA-201903-06
- DSA-4394
- DSA-4394
Modified: 2024-11-21
CVE-2018-8796
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_bitmap_updates() that results in a Denial of Service (segfault).
- openSUSE-SU-2019:2135
- openSUSE-SU-2019:2135
- 106938
- 106938
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- GLSA-201903-06
- GLSA-201903-06
- DSA-4394
- DSA-4394
Modified: 2024-11-21
CVE-2018-8797
rdesktop versions up to and including v1.8.3 contain a Heap-Based Buffer Overflow in function process_plane() that results in a memory corruption and probably even a remote code execution.
- openSUSE-SU-2019:2135
- openSUSE-SU-2019:2135
- 106938
- 106938
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- GLSA-201903-06
- GLSA-201903-06
- DSA-4394
- DSA-4394
Modified: 2024-11-21
CVE-2018-8798
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function rdpsnd_process_ping() that results in an information leak.
- openSUSE-SU-2019:2135
- openSUSE-SU-2019:2135
- 106938
- 106938
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- GLSA-201903-06
- GLSA-201903-06
- DSA-4394
- DSA-4394
Modified: 2024-11-21
CVE-2018-8799
rdesktop versions up to and including v1.8.3 contain an Out-Of-Bounds Read in function process_secondary_order() that results in a Denial of Service (segfault).
- openSUSE-SU-2019:2135
- openSUSE-SU-2019:2135
- 106938
- 106938
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- GLSA-201903-06
- GLSA-201903-06
- DSA-4394
- DSA-4394
Modified: 2024-11-21
CVE-2018-8800
rdesktop versions up to and including v1.8.3 contain a Heap-Based Buffer Overflow in function ui_clip_handle_data() that results in a memory corruption and probably even a remote code execution.
- openSUSE-SU-2019:2135
- openSUSE-SU-2019:2135
- 106938
- 106938
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- https://github.com/rdesktop/rdesktop/commit/4dca546d04321a610c1835010b5dad85163b65e1
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- [debian-lts-announce] 20190219 [SECURITY] [DLA 1683-1] rdesktop security update
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- https://research.checkpoint.com/reverse-rdp-attack-code-execution-on-rdp-clients/
- GLSA-201903-06
- GLSA-201903-06
- DSA-4394
- DSA-4394
Closed bugs
[CVE] надо собрать 1.8.4
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-15682
RDesktop version 1.8.4 contains multiple out-of-bound access read vulnerabilities in its code, which results in a denial of service (DoS) condition. This attack appear to be exploitable via network connectivity. These issues have been fixed in version 1.8.5
Package kernel-image-un-def updated to version 5.3.6-alt1 for branch sisyphus in task 239169.
Closed vulnerabilities
BDU:2019-03507
Уязвимость компонента net/wireless/nl80211.c ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код
BDU:2020-00158
Уязвимость функции nfp_abm_u32_knode_replace() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00288
Уязвимость драйвера drivers/net/ieee802154/atusb.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-16746
An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.
- openSUSE-SU-2020:0336
- openSUSE-SU-2020:0336
- openSUSE-SU-2020:1153
- openSUSE-SU-2020:1153
- http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- [debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
- [debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
- [debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
- [debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
- FEDORA-2019-057d691fd4
- FEDORA-2019-057d691fd4
- https://marc.info/?l=linux-wireless&m=156901391225058&w=2
- https://marc.info/?l=linux-wireless&m=156901391225058&w=2
- 20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01)
- 20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01)
- https://security.netapp.com/advisory/ntap-20191031-0005/
- https://security.netapp.com/advisory/ntap-20191031-0005/
- USN-4183-1
- USN-4183-1
- USN-4186-1
- USN-4186-1
- USN-4209-1
- USN-4209-1
- USN-4210-1
- USN-4210-1
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
Modified: 2024-11-21
CVE-2019-19076
A memory leak in the nfp_abm_u32_knode_replace() function in drivers/net/ethernet/netronome/nfp/abm/cls.c in the Linux kernel before 5.3.6 allows attackers to cause a denial of service (memory consumption), aka CID-78beef629fd9. NOTE: This has been argued as not a valid vulnerability. The upstream commit 78beef629fd9 was reverted
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.6
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.6
- https://git.kernel.org/linus/1d1997db870f4058676439ef7014390ba9e24eb2
- https://git.kernel.org/linus/1d1997db870f4058676439ef7014390ba9e24eb2
- https://github.com/torvalds/linux/commit/78beef629fd95be4ed853b2d37b832f766bd96ca
- https://github.com/torvalds/linux/commit/78beef629fd95be4ed853b2d37b832f766bd96ca
- https://lore.kernel.org/lkml/20191204103955.63c4d9af%40cakuba.netronome.com/
- https://lore.kernel.org/lkml/20191204103955.63c4d9af%40cakuba.netronome.com/
- https://security.netapp.com/advisory/ntap-20191205-0001/
- https://security.netapp.com/advisory/ntap-20191205-0001/
- USN-4209-1
- USN-4209-1
Modified: 2024-11-21
CVE-2019-19525
In the Linux kernel before 5.3.6, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/net/ieee802154/atusb.c driver, aka CID-7fd25e6fc035.
- openSUSE-SU-2019:2675
- openSUSE-SU-2019:2675
- [oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
- [oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.6
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.6
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7fd25e6fc035f4b04b75bca6d7e8daa069603a76
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7fd25e6fc035f4b04b75bca6d7e8daa069603a76
- [debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
- [debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
Package kernel-image-std-def updated to version 4.19.79-alt1 for branch sisyphus in task 239164.
Closed vulnerabilities
BDU:2019-03507
Уязвимость компонента net/wireless/nl80211.c ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2019-16746
An issue was discovered in net/wireless/nl80211.c in the Linux kernel through 5.2.17. It does not check the length of variable elements in a beacon head, leading to a buffer overflow.
- openSUSE-SU-2020:0336
- openSUSE-SU-2020:0336
- openSUSE-SU-2020:1153
- openSUSE-SU-2020:1153
- http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- http://packetstormsecurity.com/files/155212/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- [debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
- [debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
- [debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
- [debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
- FEDORA-2019-057d691fd4
- FEDORA-2019-057d691fd4
- https://marc.info/?l=linux-wireless&m=156901391225058&w=2
- https://marc.info/?l=linux-wireless&m=156901391225058&w=2
- 20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01)
- 20191108 [slackware-security] Slackware 14.2 kernel (SSA:2019-311-01)
- https://security.netapp.com/advisory/ntap-20191031-0005/
- https://security.netapp.com/advisory/ntap-20191031-0005/
- USN-4183-1
- USN-4183-1
- USN-4186-1
- USN-4186-1
- USN-4209-1
- USN-4209-1
- USN-4210-1
- USN-4210-1
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html