ALT-BU-2019-4118-1
Branch p9 update bulletin.
Closed vulnerabilities
BDU:2020-01458
Уязвимость системы управления версиями GIT, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-01655
Уязвимость компонента проверки имени подмодулей распределенной системы управления версиями Git, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании и оказать воздействие на целостность данных
BDU:2020-01656
Уязвимость компонента безопасности подсистемы запуска WSL распределенной системы управления версиями Git, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании и оказать воздействие на целостность данных
BDU:2020-01657
Уязвимость компонента работы с NTFS Alternate Data Streams распределенной системы управления версиями Git, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании и оказать воздействие на целостность данных
BDU:2020-01658
Уязвимость компонента рекурсивного клонирования подмодулей распределенной системы управления версиями Git, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании и оказать воздействие на целостность данных
BDU:2020-01659
Уязвимость опции быстрого импорта --export-marks распределенной системы управления версиями Git, позволяющая нарушителю вызвать отказ в обслуживании и оказать воздействие на целостность данных
Modified: 2024-11-21
CVE-2019-1348
An issue was found in Git before v2.24.1, v2.23.1, v2.22.2, v2.21.1, v2.20.2, v2.19.3, v2.18.2, v2.17.3, v2.16.6, v2.15.4, and v2.14.6. The --export-marks option of git fast-import is exposed also via the in-stream command feature export-marks=... and it allows overwriting arbitrary paths.
- openSUSE-SU-2020:0123
- openSUSE-SU-2020:0123
- openSUSE-SU-2020:0598
- openSUSE-SU-2020:0598
- RHSA-2020:0228
- RHSA-2020:0228
- https://lore.kernel.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/T/#u
- https://lore.kernel.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/T/#u
- https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/
- https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/
- GLSA-202003-30
- GLSA-202003-30
- GLSA-202003-42
- GLSA-202003-42
- https://support.apple.com/kb/HT210729
- https://support.apple.com/kb/HT210729
Modified: 2024-11-21
CVE-2019-1349
A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input, aka 'Git for Visual Studio Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1350, CVE-2019-1352, CVE-2019-1354, CVE-2019-1387.
- openSUSE-SU-2020:0123
- openSUSE-SU-2020:0123
- openSUSE-SU-2020:0598
- openSUSE-SU-2020:0598
- RHSA-2020:0228
- RHSA-2020:0228
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1349
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1349
- https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/
- https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/
- GLSA-202003-30
- GLSA-202003-30
Modified: 2024-11-21
CVE-2019-1350
A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input, aka 'Git for Visual Studio Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1349, CVE-2019-1352, CVE-2019-1354, CVE-2019-1387.
- openSUSE-SU-2020:0123
- openSUSE-SU-2020:0123
- openSUSE-SU-2020:0598
- openSUSE-SU-2020:0598
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1350
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1350
- https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/
- https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/
- GLSA-202003-30
- GLSA-202003-30
- GLSA-202003-42
- GLSA-202003-42
Modified: 2024-11-21
CVE-2019-1351
A tampering vulnerability exists when Git for Visual Studio improperly handles virtual drive paths, aka 'Git for Visual Studio Tampering Vulnerability'.
- openSUSE-SU-2020:0123
- openSUSE-SU-2020:0123
- openSUSE-SU-2020:0598
- openSUSE-SU-2020:0598
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1351
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1351
- https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/
- https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/
- GLSA-202003-30
- GLSA-202003-30
Modified: 2024-11-21
CVE-2019-1352
A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input, aka 'Git for Visual Studio Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1349, CVE-2019-1350, CVE-2019-1354, CVE-2019-1387.
- openSUSE-SU-2020:0123
- openSUSE-SU-2020:0123
- openSUSE-SU-2020:0598
- openSUSE-SU-2020:0598
- RHSA-2020:0228
- RHSA-2020:0228
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1352
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1352
- https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/
- https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/
- GLSA-202003-30
- GLSA-202003-30
Modified: 2024-11-21
CVE-2019-1353
An issue was found in Git before v2.24.1, v2.23.1, v2.22.2, v2.21.1, v2.20.2, v2.19.3, v2.18.2, v2.17.3, v2.16.6, v2.15.4, and v2.14.6. When running Git in the Windows Subsystem for Linux (also known as "WSL") while accessing a working directory on a regular Windows drive, none of the NTFS protections were active.
- openSUSE-SU-2020:0123
- openSUSE-SU-2020:0123
- openSUSE-SU-2020:0598
- openSUSE-SU-2020:0598
- https://lore.kernel.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/T/#u
- https://lore.kernel.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/T/#u
- https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/
- https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/
- GLSA-202003-30
- GLSA-202003-30
Modified: 2024-11-21
CVE-2019-1354
A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input, aka 'Git for Visual Studio Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1349, CVE-2019-1350, CVE-2019-1352, CVE-2019-1387.
- openSUSE-SU-2020:0123
- openSUSE-SU-2020:0123
- openSUSE-SU-2020:0598
- openSUSE-SU-2020:0598
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1354
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1354
- https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/
- https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/
- GLSA-202003-30
- GLSA-202003-30
Modified: 2024-11-21
CVE-2019-1387
An issue was found in Git before v2.24.1, v2.23.1, v2.22.2, v2.21.1, v2.20.2, v2.19.3, v2.18.2, v2.17.3, v2.16.6, v2.15.4, and v2.14.6. Recursive clones are currently affected by a vulnerability that is caused by too-lax validation of submodule names, allowing very targeted attacks via remote code execution in recursive clones.
- openSUSE-SU-2020:0123
- openSUSE-SU-2020:0123
- openSUSE-SU-2020:0598
- openSUSE-SU-2020:0598
- RHSA-2019:4356
- RHSA-2019:4356
- RHSA-2020:0002
- RHSA-2020:0002
- RHSA-2020:0124
- RHSA-2020:0124
- RHSA-2020:0228
- RHSA-2020:0228
- [debian-lts-announce] 20200123 [SECURITY] [DLA 2059-1] git security update
- [debian-lts-announce] 20200123 [SECURITY] [DLA 2059-1] git security update
- [debian-lts-announce] 20240626 [SECURITY] [DLA 3844-1] git security update
- [debian-lts-announce] 20240626 [SECURITY] [DLA 3844-1] git security update
- FEDORA-2019-1cec196e20
- FEDORA-2019-1cec196e20
- https://lore.kernel.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/T/#u
- https://lore.kernel.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/T/#u
- https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/
- https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/
- GLSA-202003-30
- GLSA-202003-30
- GLSA-202003-42
- GLSA-202003-42
Modified: 2024-11-21
CVE-2019-19604
Arbitrary command execution is possible in Git before 2.20.2, 2.21.x before 2.21.1, 2.22.x before 2.22.2, 2.23.x before 2.23.1, and 2.24.x before 2.24.1 because a "git submodule update" operation can run commands found in the .gitmodules file of a malicious repository.
- openSUSE-SU-2020:0123
- openSUSE-SU-2020:0123
- openSUSE-SU-2020:0598
- openSUSE-SU-2020:0598
- [oss-security] 20191213 Multiple vulnerabilities fixed in Git
- [oss-security] 20191213 Multiple vulnerabilities fixed in Git
- https://gitlab.com/gitlab-com/gl-security/disclosures/blob/master/003_git_submodule/advisory.md
- https://gitlab.com/gitlab-com/gl-security/disclosures/blob/master/003_git_submodule/advisory.md
- FEDORA-2019-c841bcc3b9
- FEDORA-2019-c841bcc3b9
- FEDORA-2019-1cec196e20
- FEDORA-2019-1cec196e20
- https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/
- https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/
- https://raw.githubusercontent.com/git/git/master/Documentation/RelNotes/2.24.1.txt
- https://raw.githubusercontent.com/git/git/master/Documentation/RelNotes/2.24.1.txt
- GLSA-202003-30
- GLSA-202003-30
- DSA-4581
- DSA-4581
Closed bugs
git completion location
git не подхватывает git-subtree из пакета git-contrib
Closed vulnerabilities
BDU:2019-01623
Уязвимость функции wNumCoef мультимедийной библиотеки SDL, связанная с чтением за границами буфера данных, позволяющая нарушителю получить несанкционированный доступ к информации
BDU:2020-04698
Уязвимость функции IMA_ADPCM_nibble библиотеки Simple DirectMedia Layer, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2020-04699
Уязвимость функции InitMS_ADPCM библиотеки Simple DirectMedia Layer, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2020-04700
Уязвимость функции IMA_ADPCM_decode библиотеки Simple DirectMedia Layer, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2020-04701
Уязвимость функции MS_ADPCM_decode библиотеки Simple DirectMedia Layer, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2020-04702
Уязвимость функции InitMS_ADPCM библиотеки Simple DirectMedia Layer, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2020-04703
Уязвимость функции SDL_LoadWAV_RW библиотеки Simple DirectMedia Layer, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2020-04704
Уязвимость функции InitIMA_ADPCM библиотеки Simple DirectMedia Layer, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2020-04717
Уязвимость функции Blit1to4 библиотеки Simple DirectMedia Layer, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2020-04718
Уязвимость функции SDL_GetRGB библиотеки Simple DirectMedia Layer, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2020-04719
Уязвимость функции SDL_FillRect библиотеки Simple DirectMedia Layer , позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2020-04720
Уязвимость функции Map1toN библиотеки Simple DirectMedia Layer, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2021-03748
Уязвимость функция BlitNtoN (video/SDL_blit_N.c) мультимедийной библиотеки Simple DirectMedia Layer, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
BDU:2023-02638
Уязвимость функции IMA_ADPCM_decode() компонента audio/SDL_wave.c мультимедийной библиотеки Simple DirectMedia Layer, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-12222
An issue was discovered in libSDL2.a in Simple DirectMedia Layer (SDL) 2.0.9. There is an out-of-bounds read in the function SDL_InvalidateMap at video/SDL_pixels.c.
- openSUSE-SU-2019:2070
- openSUSE-SU-2019:2070
- openSUSE-SU-2019:2108
- openSUSE-SU-2019:2108
- https://bugzilla.libsdl.org/show_bug.cgi?id=4621
- https://bugzilla.libsdl.org/show_bug.cgi?id=4621
- [debian-lts-announce] 20190722 [SECURITY] [DLA 1861-1] libsdl2-image security update
- [debian-lts-announce] 20190722 [SECURITY] [DLA 1861-1] libsdl2-image security update
- [debian-lts-announce] 20190727 [SECURITY] [DLA 1865-1] sdl-image1.2 security update
- [debian-lts-announce] 20190727 [SECURITY] [DLA 1865-1] sdl-image1.2 security update
- FEDORA-2020-ff2fe47ba4
- FEDORA-2020-ff2fe47ba4
- FEDORA-2019-a6bc0fb143
- FEDORA-2019-a6bc0fb143
- USN-4238-1
- USN-4238-1
Modified: 2024-11-21
CVE-2019-13616
SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in BlitNtoN in video/SDL_blit_N.c when called from SDL_SoftBlit in video/SDL_blit.c.
- openSUSE-SU-2019:2070
- openSUSE-SU-2019:2070
- openSUSE-SU-2019:2071
- openSUSE-SU-2019:2071
- openSUSE-SU-2019:2108
- openSUSE-SU-2019:2108
- openSUSE-SU-2019:2109
- openSUSE-SU-2019:2109
- openSUSE-SU-2019:2226
- openSUSE-SU-2019:2226
- openSUSE-SU-2019:2224
- openSUSE-SU-2019:2224
- RHSA-2019:3950
- RHSA-2019:3950
- RHSA-2019:3951
- RHSA-2019:3951
- RHSA-2020:0293
- RHSA-2020:0293
- https://bugzilla.libsdl.org/show_bug.cgi?id=4538
- https://bugzilla.libsdl.org/show_bug.cgi?id=4538
- [debian-lts-announce] 20210130 [SECURITY] [DLA 2536-1] libsdl2 security update
- [debian-lts-announce] 20210130 [SECURITY] [DLA 2536-1] libsdl2 security update
- [debian-lts-announce] 20211031 [SECURITY] [DLA 2804-1] libsdl1.2 security update
- [debian-lts-announce] 20211031 [SECURITY] [DLA 2804-1] libsdl1.2 security update
- [debian-lts-announce] 20230208 [SECURITY] [DLA 3314-1] libsdl2 security update
- [debian-lts-announce] 20230208 [SECURITY] [DLA 3314-1] libsdl2 security update
- FEDORA-2020-24652fe41c
- FEDORA-2020-24652fe41c
- FEDORA-2020-ff2fe47ba4
- FEDORA-2020-ff2fe47ba4
- FEDORA-2019-e08f78d4a6
- FEDORA-2019-e08f78d4a6
- FEDORA-2019-446ca9f695
- FEDORA-2019-446ca9f695
- FEDORA-2019-8ef33a69ca
- FEDORA-2019-8ef33a69ca
- GLSA-202305-17
- GLSA-202305-17
- USN-4156-1
- USN-4156-1
- USN-4156-2
- USN-4156-2
- USN-4238-1
- USN-4238-1
Modified: 2024-11-21
CVE-2019-13626
SDL (Simple DirectMedia Layer) 2.x through 2.0.9 has a heap-based buffer over-read in Fill_IMA_ADPCM_block, caused by an integer overflow in IMA_ADPCM_decode() in audio/SDL_wave.c.
- openSUSE-SU-2019:2226
- openSUSE-SU-2019:2226
- openSUSE-SU-2019:2224
- openSUSE-SU-2019:2224
- https://bugzilla.libsdl.org/show_bug.cgi?id=4522
- https://bugzilla.libsdl.org/show_bug.cgi?id=4522
- [debian-lts-announce] 20230208 [SECURITY] [DLA 3314-1] libsdl2 security update
- [debian-lts-announce] 20230208 [SECURITY] [DLA 3314-1] libsdl2 security update
- FEDORA-2020-ff2fe47ba4
- FEDORA-2020-ff2fe47ba4
- GLSA-201909-07
- GLSA-201909-07
Modified: 2024-11-21
CVE-2019-14906
A flaw was found with the RHSA-2019:3950 erratum, where it did not fix the CVE-2019-13616 SDL vulnerability. This issue only affects Red Hat SDL packages, SDL versions through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer overflow flaw while copying an existing surface into a new optimized one, due to a lack of validation while loading a BMP image, is possible. An application that uses SDL to parse untrusted input files may be vulnerable to this flaw, which could allow an attacker to make the application crash or execute code.
Modified: 2024-11-21
CVE-2019-7572
SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a buffer over-read in IMA_ADPCM_nibble in audio/SDL_wave.c.
- openSUSE-SU-2019:1213
- openSUSE-SU-2019:1223
- openSUSE-SU-2019:1261
- https://bugzilla.libsdl.org/show_bug.cgi?id=4495
- https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720
- [debian-lts-announce] 20190313 [SECURITY] [DLA 1713-1] libsdl1.2 security update
- [debian-lts-announce] 20190313 [SECURITY] [DLA 1714-1] libsdl2 security update
- [debian-lts-announce] 20191017 [SECURITY] [DLA 1713-2] libsdl1.2 regression update
- [debian-lts-announce] 20191017 [SECURITY] [DLA 1714-2] libsdl2 regression update
- [debian-lts-announce] 20211031 [SECURITY] [DLA 2804-1] libsdl1.2 security update
- [debian-lts-announce] 20230208 [SECURITY] [DLA 3314-1] libsdl2 security update
- FEDORA-2020-24652fe41c
- GLSA-201909-07
- GLSA-202305-17
- USN-4156-1
- USN-4156-2
- openSUSE-SU-2019:1213
- USN-4156-2
- USN-4156-1
- GLSA-202305-17
- GLSA-201909-07
- FEDORA-2020-24652fe41c
- [debian-lts-announce] 20230208 [SECURITY] [DLA 3314-1] libsdl2 security update
- [debian-lts-announce] 20211031 [SECURITY] [DLA 2804-1] libsdl1.2 security update
- [debian-lts-announce] 20191017 [SECURITY] [DLA 1714-2] libsdl2 regression update
- [debian-lts-announce] 20191017 [SECURITY] [DLA 1713-2] libsdl1.2 regression update
- [debian-lts-announce] 20190313 [SECURITY] [DLA 1714-1] libsdl2 security update
- [debian-lts-announce] 20190313 [SECURITY] [DLA 1713-1] libsdl1.2 security update
- https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720
- https://bugzilla.libsdl.org/show_bug.cgi?id=4495
- openSUSE-SU-2019:1261
- openSUSE-SU-2019:1223
Modified: 2024-11-21
CVE-2019-7573
SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (inside the wNumCoef loop).
- openSUSE-SU-2019:1213
- openSUSE-SU-2019:1223
- openSUSE-SU-2019:1261
- https://bugzilla.libsdl.org/show_bug.cgi?id=4491
- https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720
- [debian-lts-announce] 20190313 [SECURITY] [DLA 1713-1] libsdl1.2 security update
- [debian-lts-announce] 20190313 [SECURITY] [DLA 1714-1] libsdl2 security update
- [debian-lts-announce] 20191017 [SECURITY] [DLA 1713-2] libsdl1.2 regression update
- [debian-lts-announce] 20191017 [SECURITY] [DLA 1714-2] libsdl2 regression update
- [debian-lts-announce] 20211031 [SECURITY] [DLA 2804-1] libsdl1.2 security update
- [debian-lts-announce] 20230208 [SECURITY] [DLA 3314-1] libsdl2 security update
- FEDORA-2020-24652fe41c
- GLSA-201909-07
- GLSA-202305-17
- USN-4156-1
- USN-4156-2
- openSUSE-SU-2019:1213
- USN-4156-2
- USN-4156-1
- GLSA-202305-17
- GLSA-201909-07
- FEDORA-2020-24652fe41c
- [debian-lts-announce] 20230208 [SECURITY] [DLA 3314-1] libsdl2 security update
- [debian-lts-announce] 20211031 [SECURITY] [DLA 2804-1] libsdl1.2 security update
- [debian-lts-announce] 20191017 [SECURITY] [DLA 1714-2] libsdl2 regression update
- [debian-lts-announce] 20191017 [SECURITY] [DLA 1713-2] libsdl1.2 regression update
- [debian-lts-announce] 20190313 [SECURITY] [DLA 1714-1] libsdl2 security update
- [debian-lts-announce] 20190313 [SECURITY] [DLA 1713-1] libsdl1.2 security update
- https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720
- https://bugzilla.libsdl.org/show_bug.cgi?id=4491
- openSUSE-SU-2019:1261
- openSUSE-SU-2019:1223
Modified: 2024-11-21
CVE-2019-7574
SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in IMA_ADPCM_decode in audio/SDL_wave.c.
- openSUSE-SU-2019:1213
- openSUSE-SU-2019:1223
- openSUSE-SU-2019:1261
- https://bugzilla.libsdl.org/show_bug.cgi?id=4496
- https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720
- [debian-lts-announce] 20190313 [SECURITY] [DLA 1713-1] libsdl1.2 security update
- [debian-lts-announce] 20190313 [SECURITY] [DLA 1714-1] libsdl2 security update
- [debian-lts-announce] 20191017 [SECURITY] [DLA 1713-2] libsdl1.2 regression update
- [debian-lts-announce] 20191017 [SECURITY] [DLA 1714-2] libsdl2 regression update
- [debian-lts-announce] 20211031 [SECURITY] [DLA 2804-1] libsdl1.2 security update
- [debian-lts-announce] 20230208 [SECURITY] [DLA 3314-1] libsdl2 security update
- FEDORA-2020-24652fe41c
- GLSA-201909-07
- GLSA-202305-17
- USN-4156-1
- USN-4156-2
- openSUSE-SU-2019:1213
- USN-4156-2
- USN-4156-1
- GLSA-202305-17
- GLSA-201909-07
- FEDORA-2020-24652fe41c
- [debian-lts-announce] 20230208 [SECURITY] [DLA 3314-1] libsdl2 security update
- [debian-lts-announce] 20211031 [SECURITY] [DLA 2804-1] libsdl1.2 security update
- [debian-lts-announce] 20191017 [SECURITY] [DLA 1714-2] libsdl2 regression update
- [debian-lts-announce] 20191017 [SECURITY] [DLA 1713-2] libsdl1.2 regression update
- [debian-lts-announce] 20190313 [SECURITY] [DLA 1714-1] libsdl2 security update
- [debian-lts-announce] 20190313 [SECURITY] [DLA 1713-1] libsdl1.2 security update
- https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720
- https://bugzilla.libsdl.org/show_bug.cgi?id=4496
- openSUSE-SU-2019:1261
- openSUSE-SU-2019:1223
Modified: 2024-11-21
CVE-2019-7575
SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer overflow in MS_ADPCM_decode in audio/SDL_wave.c.
- openSUSE-SU-2019:1213
- openSUSE-SU-2019:1223
- openSUSE-SU-2019:1261
- https://bugzilla.libsdl.org/show_bug.cgi?id=4493
- https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720
- [debian-lts-announce] 20190313 [SECURITY] [DLA 1713-1] libsdl1.2 security update
- [debian-lts-announce] 20190313 [SECURITY] [DLA 1714-1] libsdl2 security update
- [debian-lts-announce] 20191017 [SECURITY] [DLA 1713-2] libsdl1.2 regression update
- [debian-lts-announce] 20191017 [SECURITY] [DLA 1714-2] libsdl2 regression update
- [debian-lts-announce] 20210130 [SECURITY] [DLA 2536-1] libsdl2 security update
- [debian-lts-announce] 20211031 [SECURITY] [DLA 2804-1] libsdl1.2 security update
- [debian-lts-announce] 20230208 [SECURITY] [DLA 3314-1] libsdl2 security update
- FEDORA-2020-24652fe41c
- GLSA-201909-07
- GLSA-202305-17
- USN-4156-1
- USN-4156-2
- openSUSE-SU-2019:1213
- USN-4156-2
- USN-4156-1
- GLSA-202305-17
- GLSA-201909-07
- FEDORA-2020-24652fe41c
- [debian-lts-announce] 20230208 [SECURITY] [DLA 3314-1] libsdl2 security update
- [debian-lts-announce] 20211031 [SECURITY] [DLA 2804-1] libsdl1.2 security update
- [debian-lts-announce] 20210130 [SECURITY] [DLA 2536-1] libsdl2 security update
- [debian-lts-announce] 20191017 [SECURITY] [DLA 1714-2] libsdl2 regression update
- [debian-lts-announce] 20191017 [SECURITY] [DLA 1713-2] libsdl1.2 regression update
- [debian-lts-announce] 20190313 [SECURITY] [DLA 1714-1] libsdl2 security update
- [debian-lts-announce] 20190313 [SECURITY] [DLA 1713-1] libsdl1.2 security update
- https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720
- https://bugzilla.libsdl.org/show_bug.cgi?id=4493
- openSUSE-SU-2019:1261
- openSUSE-SU-2019:1223
Modified: 2024-11-21
CVE-2019-7576
SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in InitMS_ADPCM in audio/SDL_wave.c (outside the wNumCoef loop).
- openSUSE-SU-2019:1213
- openSUSE-SU-2019:1223
- openSUSE-SU-2019:1261
- https://bugzilla.libsdl.org/show_bug.cgi?id=4490
- https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720
- [debian-lts-announce] 20190313 [SECURITY] [DLA 1713-1] libsdl1.2 security update
- [debian-lts-announce] 20190313 [SECURITY] [DLA 1714-1] libsdl2 security update
- [debian-lts-announce] 20191017 [SECURITY] [DLA 1713-2] libsdl1.2 regression update
- [debian-lts-announce] 20191017 [SECURITY] [DLA 1714-2] libsdl2 regression update
- [debian-lts-announce] 20211031 [SECURITY] [DLA 2804-1] libsdl1.2 security update
- [debian-lts-announce] 20230208 [SECURITY] [DLA 3314-1] libsdl2 security update
- FEDORA-2020-24652fe41c
- GLSA-201909-07
- GLSA-202305-17
- USN-4156-1
- USN-4156-2
- openSUSE-SU-2019:1213
- USN-4156-2
- USN-4156-1
- GLSA-202305-17
- GLSA-201909-07
- FEDORA-2020-24652fe41c
- [debian-lts-announce] 20230208 [SECURITY] [DLA 3314-1] libsdl2 security update
- [debian-lts-announce] 20211031 [SECURITY] [DLA 2804-1] libsdl1.2 security update
- [debian-lts-announce] 20191017 [SECURITY] [DLA 1714-2] libsdl2 regression update
- [debian-lts-announce] 20191017 [SECURITY] [DLA 1713-2] libsdl1.2 regression update
- [debian-lts-announce] 20190313 [SECURITY] [DLA 1714-1] libsdl2 security update
- [debian-lts-announce] 20190313 [SECURITY] [DLA 1713-1] libsdl1.2 security update
- https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720
- https://bugzilla.libsdl.org/show_bug.cgi?id=4490
- openSUSE-SU-2019:1261
- openSUSE-SU-2019:1223
Modified: 2024-11-21
CVE-2019-7577
SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a buffer over-read in SDL_LoadWAV_RW in audio/SDL_wave.c.
- openSUSE-SU-2019:1213
- openSUSE-SU-2019:1223
- openSUSE-SU-2019:1261
- https://bugzilla.libsdl.org/show_bug.cgi?id=4492
- https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720
- [debian-lts-announce] 20190313 [SECURITY] [DLA 1713-1] libsdl1.2 security update
- [debian-lts-announce] 20190313 [SECURITY] [DLA 1714-1] libsdl2 security update
- [debian-lts-announce] 20191017 [SECURITY] [DLA 1713-2] libsdl1.2 regression update
- [debian-lts-announce] 20191017 [SECURITY] [DLA 1714-2] libsdl2 regression update
- [debian-lts-announce] 20210130 [SECURITY] [DLA 2536-1] libsdl2 security update
- [debian-lts-announce] 20211031 [SECURITY] [DLA 2804-1] libsdl1.2 security update
- [debian-lts-announce] 20230208 [SECURITY] [DLA 3314-1] libsdl2 security update
- FEDORA-2020-24652fe41c
- FEDORA-2019-918aad6bd5
- FEDORA-2019-bf531902c8
- GLSA-201909-07
- GLSA-202305-17
- USN-4156-1
- USN-4156-2
- openSUSE-SU-2019:1213
- USN-4156-2
- USN-4156-1
- GLSA-202305-17
- GLSA-201909-07
- FEDORA-2019-bf531902c8
- FEDORA-2019-918aad6bd5
- FEDORA-2020-24652fe41c
- [debian-lts-announce] 20230208 [SECURITY] [DLA 3314-1] libsdl2 security update
- [debian-lts-announce] 20211031 [SECURITY] [DLA 2804-1] libsdl1.2 security update
- [debian-lts-announce] 20210130 [SECURITY] [DLA 2536-1] libsdl2 security update
- [debian-lts-announce] 20191017 [SECURITY] [DLA 1714-2] libsdl2 regression update
- [debian-lts-announce] 20191017 [SECURITY] [DLA 1713-2] libsdl1.2 regression update
- [debian-lts-announce] 20190313 [SECURITY] [DLA 1714-1] libsdl2 security update
- [debian-lts-announce] 20190313 [SECURITY] [DLA 1713-1] libsdl1.2 security update
- https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720
- https://bugzilla.libsdl.org/show_bug.cgi?id=4492
- openSUSE-SU-2019:1261
- openSUSE-SU-2019:1223
Modified: 2024-11-21
CVE-2019-7578
SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in InitIMA_ADPCM in audio/SDL_wave.c.
- openSUSE-SU-2019:1213
- openSUSE-SU-2019:1223
- openSUSE-SU-2019:1261
- https://bugzilla.libsdl.org/show_bug.cgi?id=4494
- https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720
- [debian-lts-announce] 20190313 [SECURITY] [DLA 1713-1] libsdl1.2 security update
- [debian-lts-announce] 20190313 [SECURITY] [DLA 1714-1] libsdl2 security update
- [debian-lts-announce] 20191017 [SECURITY] [DLA 1713-2] libsdl1.2 regression update
- [debian-lts-announce] 20191017 [SECURITY] [DLA 1714-2] libsdl2 regression update
- [debian-lts-announce] 20210130 [SECURITY] [DLA 2536-1] libsdl2 security update
- [debian-lts-announce] 20211031 [SECURITY] [DLA 2804-1] libsdl1.2 security update
- [debian-lts-announce] 20230208 [SECURITY] [DLA 3314-1] libsdl2 security update
- FEDORA-2020-24652fe41c
- GLSA-201909-07
- GLSA-202305-17
- USN-4156-1
- USN-4156-2
- openSUSE-SU-2019:1213
- USN-4156-2
- USN-4156-1
- GLSA-202305-17
- GLSA-201909-07
- FEDORA-2020-24652fe41c
- [debian-lts-announce] 20230208 [SECURITY] [DLA 3314-1] libsdl2 security update
- [debian-lts-announce] 20211031 [SECURITY] [DLA 2804-1] libsdl1.2 security update
- [debian-lts-announce] 20210130 [SECURITY] [DLA 2536-1] libsdl2 security update
- [debian-lts-announce] 20191017 [SECURITY] [DLA 1714-2] libsdl2 regression update
- [debian-lts-announce] 20191017 [SECURITY] [DLA 1713-2] libsdl1.2 regression update
- [debian-lts-announce] 20190313 [SECURITY] [DLA 1714-1] libsdl2 security update
- [debian-lts-announce] 20190313 [SECURITY] [DLA 1713-1] libsdl1.2 security update
- https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720
- https://bugzilla.libsdl.org/show_bug.cgi?id=4494
- openSUSE-SU-2019:1261
- openSUSE-SU-2019:1223
Modified: 2024-11-21
CVE-2019-7635
SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in Blit1to4 in video/SDL_blit_1.c.
- openSUSE-SU-2019:1213
- openSUSE-SU-2019:1223
- openSUSE-SU-2019:1261
- openSUSE-SU-2019:2071
- openSUSE-SU-2019:2109
- https://bugzilla.libsdl.org/show_bug.cgi?id=4498
- https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720
- [debian-lts-announce] 20190313 [SECURITY] [DLA 1713-1] libsdl1.2 security update
- [debian-lts-announce] 20190313 [SECURITY] [DLA 1714-1] libsdl2 security update
- [debian-lts-announce] 20190722 [SECURITY] [DLA 1861-1] libsdl2-image security update
- [debian-lts-announce] 20190727 [SECURITY] [DLA 1865-1] sdl-image1.2 security update
- [debian-lts-announce] 20191017 [SECURITY] [DLA 1713-2] libsdl1.2 regression update
- [debian-lts-announce] 20191017 [SECURITY] [DLA 1714-2] libsdl2 regression update
- [debian-lts-announce] 20210130 [SECURITY] [DLA 2536-1] libsdl2 security update
- [debian-lts-announce] 20211031 [SECURITY] [DLA 2804-1] libsdl1.2 security update
- [debian-lts-announce] 20230208 [SECURITY] [DLA 3314-1] libsdl2 security update
- FEDORA-2020-24652fe41c
- GLSA-201909-07
- GLSA-202305-17
- USN-4143-1
- USN-4156-1
- USN-4156-2
- USN-4238-1
- openSUSE-SU-2019:1213
- USN-4238-1
- USN-4156-2
- USN-4156-1
- USN-4143-1
- GLSA-202305-17
- GLSA-201909-07
- FEDORA-2020-24652fe41c
- [debian-lts-announce] 20230208 [SECURITY] [DLA 3314-1] libsdl2 security update
- [debian-lts-announce] 20211031 [SECURITY] [DLA 2804-1] libsdl1.2 security update
- [debian-lts-announce] 20210130 [SECURITY] [DLA 2536-1] libsdl2 security update
- [debian-lts-announce] 20191017 [SECURITY] [DLA 1714-2] libsdl2 regression update
- [debian-lts-announce] 20191017 [SECURITY] [DLA 1713-2] libsdl1.2 regression update
- [debian-lts-announce] 20190727 [SECURITY] [DLA 1865-1] sdl-image1.2 security update
- [debian-lts-announce] 20190722 [SECURITY] [DLA 1861-1] libsdl2-image security update
- [debian-lts-announce] 20190313 [SECURITY] [DLA 1714-1] libsdl2 security update
- [debian-lts-announce] 20190313 [SECURITY] [DLA 1713-1] libsdl1.2 security update
- https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720
- https://bugzilla.libsdl.org/show_bug.cgi?id=4498
- openSUSE-SU-2019:2109
- openSUSE-SU-2019:2071
- openSUSE-SU-2019:1261
- openSUSE-SU-2019:1223
Modified: 2024-11-21
CVE-2019-7636
SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in SDL_GetRGB in video/SDL_pixels.c.
- openSUSE-SU-2019:1213
- openSUSE-SU-2019:1223
- openSUSE-SU-2019:1261
- https://bugzilla.libsdl.org/show_bug.cgi?id=4499
- https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720
- [debian-lts-announce] 20190313 [SECURITY] [DLA 1713-1] libsdl1.2 security update
- [debian-lts-announce] 20190313 [SECURITY] [DLA 1714-1] libsdl2 security update
- [debian-lts-announce] 20191017 [SECURITY] [DLA 1713-2] libsdl1.2 regression update
- [debian-lts-announce] 20191017 [SECURITY] [DLA 1714-2] libsdl2 regression update
- [debian-lts-announce] 20210130 [SECURITY] [DLA 2536-1] libsdl2 security update
- [debian-lts-announce] 20211031 [SECURITY] [DLA 2804-1] libsdl1.2 security update
- [debian-lts-announce] 20230208 [SECURITY] [DLA 3314-1] libsdl2 security update
- FEDORA-2020-24652fe41c
- GLSA-201909-07
- GLSA-202305-17
- USN-4143-1
- USN-4156-1
- USN-4156-2
- openSUSE-SU-2019:1213
- USN-4156-2
- USN-4156-1
- USN-4143-1
- GLSA-202305-17
- GLSA-201909-07
- FEDORA-2020-24652fe41c
- [debian-lts-announce] 20230208 [SECURITY] [DLA 3314-1] libsdl2 security update
- [debian-lts-announce] 20211031 [SECURITY] [DLA 2804-1] libsdl1.2 security update
- [debian-lts-announce] 20210130 [SECURITY] [DLA 2536-1] libsdl2 security update
- [debian-lts-announce] 20191017 [SECURITY] [DLA 1714-2] libsdl2 regression update
- [debian-lts-announce] 20191017 [SECURITY] [DLA 1713-2] libsdl1.2 regression update
- [debian-lts-announce] 20190313 [SECURITY] [DLA 1714-1] libsdl2 security update
- [debian-lts-announce] 20190313 [SECURITY] [DLA 1713-1] libsdl1.2 security update
- https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720
- https://bugzilla.libsdl.org/show_bug.cgi?id=4499
- openSUSE-SU-2019:1261
- openSUSE-SU-2019:1223
Modified: 2024-11-21
CVE-2019-7637
SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer overflow in SDL_FillRect in video/SDL_surface.c.
- openSUSE-SU-2019:1213
- openSUSE-SU-2019:1223
- openSUSE-SU-2019:1261
- openSUSE-SU-2019:1633
- openSUSE-SU-2019:1632
- https://bugzilla.libsdl.org/show_bug.cgi?id=4497
- https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720
- [debian-lts-announce] 20190313 [SECURITY] [DLA 1713-1] libsdl1.2 security update
- [debian-lts-announce] 20190313 [SECURITY] [DLA 1714-1] libsdl2 security update
- [debian-lts-announce] 20191017 [SECURITY] [DLA 1713-2] libsdl1.2 regression update
- [debian-lts-announce] 20191017 [SECURITY] [DLA 1714-2] libsdl2 regression update
- [debian-lts-announce] 20211031 [SECURITY] [DLA 2803-1] libsdl2 security update
- [debian-lts-announce] 20211031 [SECURITY] [DLA 2804-1] libsdl1.2 security update
- FEDORA-2020-24652fe41c
- USN-4143-1
- USN-4156-1
- USN-4156-2
- openSUSE-SU-2019:1213
- USN-4156-2
- USN-4156-1
- USN-4143-1
- FEDORA-2020-24652fe41c
- [debian-lts-announce] 20211031 [SECURITY] [DLA 2804-1] libsdl1.2 security update
- [debian-lts-announce] 20211031 [SECURITY] [DLA 2803-1] libsdl2 security update
- [debian-lts-announce] 20191017 [SECURITY] [DLA 1714-2] libsdl2 regression update
- [debian-lts-announce] 20191017 [SECURITY] [DLA 1713-2] libsdl1.2 regression update
- [debian-lts-announce] 20190313 [SECURITY] [DLA 1714-1] libsdl2 security update
- [debian-lts-announce] 20190313 [SECURITY] [DLA 1713-1] libsdl1.2 security update
- https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720
- https://bugzilla.libsdl.org/show_bug.cgi?id=4497
- openSUSE-SU-2019:1632
- openSUSE-SU-2019:1633
- openSUSE-SU-2019:1261
- openSUSE-SU-2019:1223
Modified: 2024-11-21
CVE-2019-7638
SDL (Simple DirectMedia Layer) through 1.2.15 and 2.x through 2.0.9 has a heap-based buffer over-read in Map1toN in video/SDL_pixels.c.
- openSUSE-SU-2019:1213
- openSUSE-SU-2019:1223
- openSUSE-SU-2019:1261
- https://bugzilla.libsdl.org/show_bug.cgi?id=4500
- https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720
- [debian-lts-announce] 20190313 [SECURITY] [DLA 1713-1] libsdl1.2 security update
- [debian-lts-announce] 20190313 [SECURITY] [DLA 1714-1] libsdl2 security update
- [debian-lts-announce] 20191017 [SECURITY] [DLA 1713-2] libsdl1.2 regression update
- [debian-lts-announce] 20191017 [SECURITY] [DLA 1714-2] libsdl2 regression update
- [debian-lts-announce] 20210130 [SECURITY] [DLA 2536-1] libsdl2 security update
- [debian-lts-announce] 20211031 [SECURITY] [DLA 2804-1] libsdl1.2 security update
- [debian-lts-announce] 20230208 [SECURITY] [DLA 3314-1] libsdl2 security update
- FEDORA-2020-24652fe41c
- GLSA-201909-07
- GLSA-202305-17
- USN-4143-1
- USN-4156-1
- openSUSE-SU-2019:1213
- USN-4156-1
- USN-4143-1
- GLSA-202305-17
- GLSA-201909-07
- FEDORA-2020-24652fe41c
- [debian-lts-announce] 20230208 [SECURITY] [DLA 3314-1] libsdl2 security update
- [debian-lts-announce] 20211031 [SECURITY] [DLA 2804-1] libsdl1.2 security update
- [debian-lts-announce] 20210130 [SECURITY] [DLA 2536-1] libsdl2 security update
- [debian-lts-announce] 20191017 [SECURITY] [DLA 1714-2] libsdl2 regression update
- [debian-lts-announce] 20191017 [SECURITY] [DLA 1713-2] libsdl1.2 regression update
- [debian-lts-announce] 20190313 [SECURITY] [DLA 1714-1] libsdl2 security update
- [debian-lts-announce] 20190313 [SECURITY] [DLA 1713-1] libsdl1.2 security update
- https://discourse.libsdl.org/t/vulnerabilities-found-in-libsdl-1-2-15/25720
- https://bugzilla.libsdl.org/show_bug.cgi?id=4500
- openSUSE-SU-2019:1261
- openSUSE-SU-2019:1223
Package firefox-esr updated to version 68.3.0-alt2 for branch p9 in task 242427.
Closed vulnerabilities
BDU:2020-01389
Уязвимость веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с ошибкой извлечения документа из DocShell, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-01390
Уязвимость программного обеспечения Firefox, Firefox ESR, Thunderbird, связанная с копированием буфера без проверки размера входных данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-01649
Уязвимость механизма сериализации веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с отсутствием проверки размера вводимых данных при использовании буфера, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании и оказать воздействие на целостность данных
BDU:2020-01675
Уязвимость механизма идентификации по отпечатку пальца веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная использование области памяти после её освобождения, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании и оказать воздействие на целостность данных
BDU:2020-01797
Уязвимость механизма использования nested workers браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с использование области памяти после её освобождения, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании и оказать воздействие на целостность данных
BDU:2020-01824
Уязвимость браузера Firefox, связанная с записью за границами буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность
BDU:2022-05929
Уязвимость службы обновления браузеров Mozilla Firefox, Mozilla Firefox ESR и почтового клиента Thunderbird для Windows, позволяющая нарушителю записать файлы состояний и журнала в незащищенный каталог
Modified: 2024-11-21
CVE-2019-11745
When encrypting with a block cipher, if a call to NSC_EncryptUpdate was made with data smaller than the block size, a small out of bounds write could occur. This could have caused heap corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.
- openSUSE-SU-2020:0003
- openSUSE-SU-2020:0003
- openSUSE-SU-2020:0002
- openSUSE-SU-2020:0002
- openSUSE-SU-2020:0008
- openSUSE-SU-2020:0008
- RHSA-2020:0243
- RHSA-2020:0243
- RHSA-2020:0466
- RHSA-2020:0466
- https://bugzilla.mozilla.org/show_bug.cgi?id=1586176
- https://bugzilla.mozilla.org/show_bug.cgi?id=1586176
- https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-379803.pdf
- [debian-lts-announce] 20200929 [SECURITY] [DLA 2388-1] nss security update
- [debian-lts-announce] 20200929 [SECURITY] [DLA 2388-1] nss security update
- GLSA-202003-02
- GLSA-202003-02
- GLSA-202003-10
- GLSA-202003-10
- GLSA-202003-37
- GLSA-202003-37
- https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
- https://us-cert.cisa.gov/ics/advisories/icsa-21-040-04
- USN-4241-1
- USN-4241-1
- USN-4335-1
- USN-4335-1
- https://www.mozilla.org/security/advisories/mfsa2019-36/
- https://www.mozilla.org/security/advisories/mfsa2019-36/
- https://www.mozilla.org/security/advisories/mfsa2019-37/
- https://www.mozilla.org/security/advisories/mfsa2019-37/
- https://www.mozilla.org/security/advisories/mfsa2019-38/
- https://www.mozilla.org/security/advisories/mfsa2019-38/
Modified: 2024-11-21
CVE-2019-13722
Inappropriate implementation in WebRTC in Google Chrome prior to 79.0.3945.79 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Modified: 2024-11-21
CVE-2019-17005
The plain text serializer used a fixed-size array for the number of
- elements it could process; however it was possible to overflow the static-sized array leading to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.
- openSUSE-SU-2020:0003
- openSUSE-SU-2020:0003
- openSUSE-SU-2020:0002
- openSUSE-SU-2020:0002
- RHSA-2020:0292
- RHSA-2020:0292
- RHSA-2020:0295
- RHSA-2020:0295
- https://bugzilla.mozilla.org/show_bug.cgi?id=1584170
- https://bugzilla.mozilla.org/show_bug.cgi?id=1584170
- GLSA-202003-02
- GLSA-202003-02
- GLSA-202003-10
- GLSA-202003-10
- USN-4241-1
- USN-4241-1
- USN-4335-1
- USN-4335-1
- https://www.mozilla.org/security/advisories/mfsa2019-36/
- https://www.mozilla.org/security/advisories/mfsa2019-36/
- https://www.mozilla.org/security/advisories/mfsa2019-37/
- https://www.mozilla.org/security/advisories/mfsa2019-37/
- https://www.mozilla.org/security/advisories/mfsa2019-38/
- https://www.mozilla.org/security/advisories/mfsa2019-38/
Modified: 2024-11-21
CVE-2019-17008
When using nested workers, a use-after-free could occur during worker destruction. This resulted in a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.
- openSUSE-SU-2020:0003
- openSUSE-SU-2020:0003
- openSUSE-SU-2020:0002
- openSUSE-SU-2020:0002
- RHSA-2020:0292
- RHSA-2020:0292
- RHSA-2020:0295
- RHSA-2020:0295
- https://bugzilla.mozilla.org/show_bug.cgi?id=1546331
- https://bugzilla.mozilla.org/show_bug.cgi?id=1546331
- GLSA-202003-02
- GLSA-202003-02
- GLSA-202003-10
- GLSA-202003-10
- USN-4241-1
- USN-4241-1
- USN-4335-1
- USN-4335-1
- https://www.mozilla.org/security/advisories/mfsa2019-36/
- https://www.mozilla.org/security/advisories/mfsa2019-36/
- https://www.mozilla.org/security/advisories/mfsa2019-37/
- https://www.mozilla.org/security/advisories/mfsa2019-37/
- https://www.mozilla.org/security/advisories/mfsa2019-38/
- https://www.mozilla.org/security/advisories/mfsa2019-38/
Modified: 2024-11-21
CVE-2019-17009
When running, the updater service wrote status and log files to an unrestricted location; potentially allowing an unprivileged process to locate and exploit a vulnerability in file handling in the updater service. *Note: This attack requires local system access and only affects Windows. Other operating systems are not affected.*. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.
- openSUSE-SU-2020:0003
- openSUSE-SU-2020:0003
- openSUSE-SU-2020:0002
- openSUSE-SU-2020:0002
- https://bugzilla.mozilla.org/show_bug.cgi?id=1510494
- https://bugzilla.mozilla.org/show_bug.cgi?id=1510494
- https://www.mozilla.org/security/advisories/mfsa2019-36/
- https://www.mozilla.org/security/advisories/mfsa2019-36/
- https://www.mozilla.org/security/advisories/mfsa2019-37/
- https://www.mozilla.org/security/advisories/mfsa2019-37/
- https://www.mozilla.org/security/advisories/mfsa2019-38/
- https://www.mozilla.org/security/advisories/mfsa2019-38/
Modified: 2024-11-21
CVE-2019-17010
Under certain conditions, when checking the Resist Fingerprinting preference during device orientation checks, a race condition could have caused a use-after-free and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.
- openSUSE-SU-2020:0003
- openSUSE-SU-2020:0003
- openSUSE-SU-2020:0002
- openSUSE-SU-2020:0002
- RHSA-2020:0292
- RHSA-2020:0292
- RHSA-2020:0295
- RHSA-2020:0295
- https://bugzilla.mozilla.org/show_bug.cgi?id=1581084
- https://bugzilla.mozilla.org/show_bug.cgi?id=1581084
- GLSA-202003-02
- GLSA-202003-02
- GLSA-202003-10
- GLSA-202003-10
- USN-4241-1
- USN-4241-1
- USN-4335-1
- USN-4335-1
- https://www.mozilla.org/security/advisories/mfsa2019-36/
- https://www.mozilla.org/security/advisories/mfsa2019-36/
- https://www.mozilla.org/security/advisories/mfsa2019-37/
- https://www.mozilla.org/security/advisories/mfsa2019-37/
- https://www.mozilla.org/security/advisories/mfsa2019-38/
- https://www.mozilla.org/security/advisories/mfsa2019-38/
Modified: 2024-11-21
CVE-2019-17011
Under certain conditions, when retrieving a document from a DocShell in the antitracking code, a race condition could cause a use-after-free condition and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.
- openSUSE-SU-2020:0003
- openSUSE-SU-2020:0003
- openSUSE-SU-2020:0002
- openSUSE-SU-2020:0002
- RHSA-2020:0292
- RHSA-2020:0292
- RHSA-2020:0295
- RHSA-2020:0295
- https://bugzilla.mozilla.org/show_bug.cgi?id=1591334
- https://bugzilla.mozilla.org/show_bug.cgi?id=1591334
- GLSA-202003-02
- GLSA-202003-02
- GLSA-202003-10
- GLSA-202003-10
- USN-4241-1
- USN-4241-1
- USN-4335-1
- USN-4335-1
- https://www.mozilla.org/security/advisories/mfsa2019-36/
- https://www.mozilla.org/security/advisories/mfsa2019-36/
- https://www.mozilla.org/security/advisories/mfsa2019-37/
- https://www.mozilla.org/security/advisories/mfsa2019-37/
- https://www.mozilla.org/security/advisories/mfsa2019-38/
- https://www.mozilla.org/security/advisories/mfsa2019-38/
Modified: 2024-11-21
CVE-2019-17012
Mozilla developers reported memory safety bugs present in Firefox 70 and Firefox ESR 68.2. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 68.3, Firefox ESR < 68.3, and Firefox < 71.
- openSUSE-SU-2020:0003
- openSUSE-SU-2020:0003
- openSUSE-SU-2020:0002
- openSUSE-SU-2020:0002
- RHSA-2020:0292
- RHSA-2020:0292
- RHSA-2020:0295
- RHSA-2020:0295
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1449736%2C1533957%2C1560667%2C1567209%2C1580288%2C1585760%2C1592502
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1449736%2C1533957%2C1560667%2C1567209%2C1580288%2C1585760%2C1592502
- GLSA-202003-02
- GLSA-202003-02
- GLSA-202003-10
- GLSA-202003-10
- USN-4241-1
- USN-4241-1
- USN-4335-1
- USN-4335-1
- https://www.mozilla.org/security/advisories/mfsa2019-36/
- https://www.mozilla.org/security/advisories/mfsa2019-36/
- https://www.mozilla.org/security/advisories/mfsa2019-37/
- https://www.mozilla.org/security/advisories/mfsa2019-37/
- https://www.mozilla.org/security/advisories/mfsa2019-38/
- https://www.mozilla.org/security/advisories/mfsa2019-38/
Package kernel-image-un-def updated to version 5.3.15-alt1 for branch p9 in task 242337.
Closed vulnerabilities
BDU:2019-03219
Уязвимость драйвера drivers/net/wireless/ath/ath10k/usb.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04662
Уязвимость функции mwifiex_pcie_alloc_cmdrsp_buf() (drivers/net/wireless/marvell/mwifiex/pcie.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04664
Уязвимость функции nl80211_get_ftm_responder_stats() (net/wireless/nl80211.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04666
Уязвимость функции cx23888_ir_probe() (drivers/media/pci/cx23885/cx23888-ir.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04801
Уязвимость функции rtl_usb_probe() (drivers/net/wireless/realtek/rtlwifi/usb.c ) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04802
Уязвимость функции crypto_report() (crypto/crypto_user_base.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04806
Уязвимость функции alloc_sgtable() (drivers/net/wireless/intel/iwlwifi/fw/dbg.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04807
Уязвимость функции mwifiex_pcie_init_evt_ring() (drivers/net/wireless/marvell/mwifiex/pcie.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04809
Уязвимость функции bfad_im_get_stats() (drivers/scsi/bfa/bfad_attr.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04810
Уязвимость функции rtl8xxxu_submit_int_urb() (drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04811
Уязвимость функции iwl_pcie_ctxt_info_gen3_init() (drivers/net/wireless/intel/iwlwifi/pcie/ctxt-info-gen3.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04828
Уязвимость функции fsl_lpspi_probe() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04833
Уязвимость драйверов drivers/net/wireless/ath/ath9k/htc_hst.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04854
Уязвимость функции __btrfs_free_extent (fs/btrfs/extent-tree.c) ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2019-04855
Уязвимость функции ext4_empty_dir (fs/ext4/namei.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04856
Уязвимость функции btrfs_root_node (fs/btrfs/ctree.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00119
Уязвимость функции create_resource_pool() (drivers/gpu/drm/amd/display/dc) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00157
Уязвимость функции bnxt_re_create_srq() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00160
Уязвимость функции predicate_parse() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00284
Уязвимость функции vcs_write (drivers/tty/vt/vc_screen.c) ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии
BDU:2020-00290
Уязвимость драйвера drivers/input/ff-memless.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00304
Уязвимость функции try_merge_free_space ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2020-01077
Уязвимость функции rwsem_down_write_slowpath (kernel/locking/rwsem.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-01564
Уязвимость функции the__ipmi_bmc_register() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-02159
Уязвимость функции « i40e_setup_macvlans» в ядре операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-02944
Уязвимость компонентов arch/powerpc/kernel/entry_64.S и arch/powerpc/kernel/security.c ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к информации
Modified: 2024-11-21
CVE-2019-15099
drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.2.8 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.
- openSUSE-SU-2019:2181
- openSUSE-SU-2019:2181
- https://lore.kernel.org/linux-wireless/20190804003101.11541-1-benquike%40gmail.com/T/#u
- https://lore.kernel.org/linux-wireless/20190804003101.11541-1-benquike%40gmail.com/T/#u
- https://security.netapp.com/advisory/ntap-20190905-0002/
- https://security.netapp.com/advisory/ntap-20190905-0002/
- https://support.f5.com/csp/article/K76295179
- https://support.f5.com/csp/article/K76295179
- https://support.f5.com/csp/article/K76295179?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K76295179?utm_source=f5support&%3Butm_medium=RSS
- USN-4258-1
- USN-4258-1
- USN-4284-1
- USN-4284-1
- USN-4287-1
- USN-4287-1
- USN-4287-2
- USN-4287-2
Modified: 2024-11-21
CVE-2019-18660
The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.
- openSUSE-SU-2019:2675
- openSUSE-SU-2019:2675
- http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- [oss-security] 20191128 CVE-2019-18660: Linux kernel: powerpc: missing Spectre-RSB mitigation
- [oss-security] 20191128 CVE-2019-18660: Linux kernel: powerpc: missing Spectre-RSB mitigation
- RHSA-2020:0174
- RHSA-2020:0174
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.1
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.1
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=39e72bf96f5847ba87cc5bd7a3ce0fed813dc9ad
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=39e72bf96f5847ba87cc5bd7a3ce0fed813dc9ad
- FEDORA-2019-b86a7bdba0
- FEDORA-2019-b86a7bdba0
- FEDORA-2019-124a241044
- FEDORA-2019-124a241044
- 20200109 [slackware-security] Slackware 14.2 kernel (SSA:2020-008-01)
- 20200109 [slackware-security] Slackware 14.2 kernel (SSA:2020-008-01)
- https://security.netapp.com/advisory/ntap-20200103-0001/
- https://security.netapp.com/advisory/ntap-20200103-0001/
- USN-4225-1
- USN-4225-1
- USN-4225-2
- USN-4225-2
- USN-4226-1
- USN-4226-1
- USN-4227-1
- USN-4227-1
- USN-4227-2
- USN-4227-2
- USN-4228-1
- USN-4228-1
- USN-4228-2
- USN-4228-2
- https://www.openwall.com/lists/oss-security/2019/11/27/1
- https://www.openwall.com/lists/oss-security/2019/11/27/1
Modified: 2024-11-21
CVE-2019-19036
btrfs_root_node in fs/btrfs/ctree.c in the Linux kernel through 5.3.12 allows a NULL pointer dereference because rcu_dereference(root->node) can be zero.
- openSUSE-SU-2020:0336
- openSUSE-SU-2020:0336
- https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19036
- https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19036
- https://security.netapp.com/advisory/ntap-20191205-0001/
- https://security.netapp.com/advisory/ntap-20191205-0001/
- USN-4414-1
- USN-4414-1
- USN-4439-1
- USN-4439-1
Modified: 2024-11-21
CVE-2019-19037
ext4_empty_dir in fs/ext4/namei.c in the Linux kernel through 5.3.12 allows a NULL pointer dereference because ext4_read_dirblock(inode,0,DIRENT_HTREE) can be zero.
- https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19037
- https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19037
- [debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
- [debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
- https://security.netapp.com/advisory/ntap-20191205-0001/
- https://security.netapp.com/advisory/ntap-20191205-0001/
Modified: 2024-11-21
CVE-2019-19039
__btrfs_free_extent in fs/btrfs/extent-tree.c in the Linux kernel through 5.3.12 calls btrfs_print_leaf in a certain ENOENT case, which allows local users to obtain potentially sensitive information about register values via the dmesg program. NOTE: The BTRFS development team disputes this issues as not being a vulnerability because “1) The kernel provide facilities to restrict access to dmesg - dmesg_restrict=1 sysctl option. So it's really up to the system administrator to judge whether dmesg access shall be disallowed or not. 2) WARN/WARN_ON are widely used macros in the linux kernel. If this CVE is considered valid this would mean there are literally thousands CVE lurking in the kernel - something which clearly is not the case.
- https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19039
- https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19039
- [debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update
- [debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update
- USN-4414-1
- USN-4414-1
Modified: 2024-11-21
CVE-2019-19043
A memory leak in the i40e_setup_macvlans() function in drivers/net/ethernet/intel/i40e/i40e_main.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering i40e_setup_channel() failures, aka CID-27d461333459.
- https://github.com/torvalds/linux/commit/27d461333459d282ffa4a2bdb6b215a59d493a8f
- https://github.com/torvalds/linux/commit/27d461333459d282ffa4a2bdb6b215a59d493a8f
- FEDORA-2019-021c968423
- FEDORA-2019-021c968423
- FEDORA-2019-34a75d7e61
- FEDORA-2019-34a75d7e61
- https://security.netapp.com/advisory/ntap-20191205-0001/
- https://security.netapp.com/advisory/ntap-20191205-0001/
- USN-4300-1
- USN-4300-1
Modified: 2024-11-21
CVE-2019-19046
A memory leak in the __ipmi_bmc_register() function in drivers/char/ipmi/ipmi_msghandler.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering ida_simple_get() failure, aka CID-4aa7afb0ee20. NOTE: third parties dispute the relevance of this because an attacker cannot realistically control this failure at probe time
- openSUSE-SU-2019:2675
- openSUSE-SU-2019:2675
- https://bugzilla.suse.com/show_bug.cgi?id=1157304
- https://bugzilla.suse.com/show_bug.cgi?id=1157304
- https://github.com/torvalds/linux/commit/4aa7afb0ee20a97fbf0c5bab3df028d5fb85fdab
- https://github.com/torvalds/linux/commit/4aa7afb0ee20a97fbf0c5bab3df028d5fb85fdab
- FEDORA-2019-021c968423
- FEDORA-2019-021c968423
- FEDORA-2019-34a75d7e61
- FEDORA-2019-34a75d7e61
- USN-4302-1
- USN-4302-1
- USN-4319-1
- USN-4319-1
- USN-4325-1
- USN-4325-1
Modified: 2024-11-21
CVE-2019-19054
A memory leak in the cx23888_ir_probe() function in drivers/media/pci/cx23885/cx23888-ir.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering kfifo_alloc() failures, aka CID-a7b2df76b42b.
- openSUSE-SU-2020:0336
- openSUSE-SU-2020:0336
- https://github.com/torvalds/linux/commit/a7b2df76b42bdd026e3106cf2ba97db41345a177
- https://github.com/torvalds/linux/commit/a7b2df76b42bdd026e3106cf2ba97db41345a177
- FEDORA-2019-021c968423
- FEDORA-2019-021c968423
- FEDORA-2019-34a75d7e61
- FEDORA-2019-34a75d7e61
- https://security.netapp.com/advisory/ntap-20191205-0001/
- https://security.netapp.com/advisory/ntap-20191205-0001/
- USN-4525-1
- USN-4525-1
- USN-4526-1
- USN-4526-1
- USN-4527-1
- USN-4527-1
Modified: 2024-11-21
CVE-2019-19055
A memory leak in the nl80211_get_ftm_responder_stats() function in net/wireless/nl80211.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering nl80211hdr_put() failures, aka CID-1399c59fa929. NOTE: third parties dispute the relevance of this because it occurs on a code path where a successful allocation has already occurred
- https://bugzilla.suse.com/show_bug.cgi?id=1157319
- https://bugzilla.suse.com/show_bug.cgi?id=1157319
- https://github.com/torvalds/linux/commit/1399c59fa92984836db90538cf92397fe7caaa57
- https://github.com/torvalds/linux/commit/1399c59fa92984836db90538cf92397fe7caaa57
- FEDORA-2019-021c968423
- FEDORA-2019-021c968423
- FEDORA-2019-34a75d7e61
- FEDORA-2019-34a75d7e61
- USN-4225-1
- USN-4225-1
- USN-4225-2
- USN-4225-2
- USN-4226-1
- USN-4226-1
Modified: 2024-11-21
CVE-2019-19056
A memory leak in the mwifiex_pcie_alloc_cmdrsp_buf() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-db8fd2cde932.
- openSUSE-SU-2019:2675
- openSUSE-SU-2019:2675
- https://github.com/torvalds/linux/commit/db8fd2cde93227e566a412cf53173ffa227998bc
- https://github.com/torvalds/linux/commit/db8fd2cde93227e566a412cf53173ffa227998bc
- [debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
- [debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
- [debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
- [debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
- FEDORA-2019-021c968423
- FEDORA-2019-021c968423
- FEDORA-2019-34a75d7e61
- FEDORA-2019-34a75d7e61
- https://security.netapp.com/advisory/ntap-20191205-0001/
- https://security.netapp.com/advisory/ntap-20191205-0001/
- USN-4286-1
- USN-4286-1
- USN-4286-2
- USN-4286-2
- USN-4300-1
- USN-4300-1
- USN-4301-1
- USN-4301-1
- USN-4302-1
- USN-4302-1
Modified: 2024-11-21
CVE-2019-19057
Two memory leaks in the mwifiex_pcie_init_evt_ring() function in drivers/net/wireless/marvell/mwifiex/pcie.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering mwifiex_map_pci_memory() failures, aka CID-d10dcb615c8e.
- openSUSE-SU-2019:2675
- openSUSE-SU-2019:2675
- http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- https://github.com/torvalds/linux/commit/d10dcb615c8e29d403a24d35f8310a7a53e3050c
- https://github.com/torvalds/linux/commit/d10dcb615c8e29d403a24d35f8310a7a53e3050c
- [debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
- [debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
- [debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
- [debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
- FEDORA-2019-021c968423
- FEDORA-2019-021c968423
- FEDORA-2019-34a75d7e61
- FEDORA-2019-34a75d7e61
- 20200109 [slackware-security] Slackware 14.2 kernel (SSA:2020-008-01)
- 20200109 [slackware-security] Slackware 14.2 kernel (SSA:2020-008-01)
- https://security.netapp.com/advisory/ntap-20191205-0001/
- https://security.netapp.com/advisory/ntap-20191205-0001/
- USN-4254-1
- USN-4254-1
- USN-4254-2
- USN-4254-2
- USN-4284-1
- USN-4284-1
- USN-4285-1
- USN-4285-1
- USN-4287-1
- USN-4287-1
- USN-4287-2
- USN-4287-2
Modified: 2024-11-21
CVE-2019-19058
A memory leak in the alloc_sgtable() function in drivers/net/wireless/intel/iwlwifi/fw/dbg.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering alloc_page() failures, aka CID-b4b814fec1a5.
- openSUSE-SU-2019:2675
- openSUSE-SU-2019:2675
- https://github.com/torvalds/linux/commit/b4b814fec1a5a849383f7b3886b654a13abbda7d
- https://github.com/torvalds/linux/commit/b4b814fec1a5a849383f7b3886b654a13abbda7d
- FEDORA-2019-021c968423
- FEDORA-2019-021c968423
- FEDORA-2019-34a75d7e61
- FEDORA-2019-34a75d7e61
- https://security.netapp.com/advisory/ntap-20191205-0001/
- https://security.netapp.com/advisory/ntap-20191205-0001/
- USN-4300-1
- USN-4300-1
- USN-4301-1
- USN-4301-1
- USN-4302-1
- USN-4302-1
Modified: 2024-11-21
CVE-2019-19059
Multiple memory leaks in the iwl_pcie_ctxt_info_gen3_init() function in drivers/net/wireless/intel/iwlwifi/pcie/ctxt-info-gen3.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering iwl_pcie_init_fw_sec() or dma_alloc_coherent() failures, aka CID-0f4f199443fa.
- https://github.com/torvalds/linux/commit/0f4f199443faca715523b0659aa536251d8b978f
- https://github.com/torvalds/linux/commit/0f4f199443faca715523b0659aa536251d8b978f
- FEDORA-2019-021c968423
- FEDORA-2019-021c968423
- FEDORA-2019-34a75d7e61
- FEDORA-2019-34a75d7e61
- https://security.netapp.com/advisory/ntap-20191205-0001/
- https://security.netapp.com/advisory/ntap-20191205-0001/
- USN-4300-1
- USN-4300-1
- USN-4301-1
- USN-4301-1
Modified: 2024-11-21
CVE-2019-19062
A memory leak in the crypto_report() function in crypto/crypto_user_base.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering crypto_report_alg() failures, aka CID-ffdde5932042.
- openSUSE-SU-2019:2675
- openSUSE-SU-2019:2675
- http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- https://github.com/torvalds/linux/commit/ffdde5932042600c6807d46c1550b28b0db6a3bc
- https://github.com/torvalds/linux/commit/ffdde5932042600c6807d46c1550b28b0db6a3bc
- [debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
- [debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
- [debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
- [debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
- FEDORA-2019-021c968423
- FEDORA-2019-021c968423
- FEDORA-2019-34a75d7e61
- FEDORA-2019-34a75d7e61
- 20200109 [slackware-security] Slackware 14.2 kernel (SSA:2020-008-01)
- 20200109 [slackware-security] Slackware 14.2 kernel (SSA:2020-008-01)
- https://security.netapp.com/advisory/ntap-20191205-0001/
- https://security.netapp.com/advisory/ntap-20191205-0001/
- USN-4254-1
- USN-4254-1
- USN-4254-2
- USN-4254-2
- USN-4258-1
- USN-4258-1
- USN-4284-1
- USN-4284-1
- USN-4287-1
- USN-4287-1
- USN-4287-2
- USN-4287-2
Modified: 2024-11-21
CVE-2019-19063
Two memory leaks in the rtl_usb_probe() function in drivers/net/wireless/realtek/rtlwifi/usb.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption), aka CID-3f9361695113.
- openSUSE-SU-2019:2675
- openSUSE-SU-2019:2675
- http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- https://github.com/torvalds/linux/commit/3f93616951138a598d930dcaec40f2bfd9ce43bb
- https://github.com/torvalds/linux/commit/3f93616951138a598d930dcaec40f2bfd9ce43bb
- FEDORA-2019-021c968423
- FEDORA-2019-021c968423
- FEDORA-2019-34a75d7e61
- FEDORA-2019-34a75d7e61
- 20200109 [slackware-security] Slackware 14.2 kernel (SSA:2020-008-01)
- 20200109 [slackware-security] Slackware 14.2 kernel (SSA:2020-008-01)
- https://security.netapp.com/advisory/ntap-20191205-0001/
- https://security.netapp.com/advisory/ntap-20191205-0001/
- USN-4254-1
- USN-4254-1
- USN-4254-2
- USN-4254-2
- USN-4284-1
- USN-4284-1
- USN-4285-1
- USN-4285-1
- USN-4287-1
- USN-4287-1
- USN-4287-2
- USN-4287-2
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
Modified: 2024-11-21
CVE-2019-19064
A memory leak in the fsl_lpspi_probe() function in drivers/spi/spi-fsl-lpspi.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering pm_runtime_get_sync() failures, aka CID-057b8945f78f. NOTE: third parties dispute the relevance of this because an attacker cannot realistically control these failures at probe time
- https://bugzilla.suse.com/show_bug.cgi?id=1157300
- https://bugzilla.suse.com/show_bug.cgi?id=1157300
- https://github.com/torvalds/linux/commit/057b8945f78f76d0b04eeb5c27cd9225e5e7ad86
- https://github.com/torvalds/linux/commit/057b8945f78f76d0b04eeb5c27cd9225e5e7ad86
- FEDORA-2019-021c968423
- FEDORA-2019-021c968423
- FEDORA-2019-34a75d7e61
- FEDORA-2019-34a75d7e61
- USN-4300-1
- USN-4300-1
Modified: 2024-11-21
CVE-2019-19066
A memory leak in the bfad_im_get_stats() function in drivers/scsi/bfa/bfad_attr.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering bfa_port_get_stats() failures, aka CID-0e62395da2bd.
- openSUSE-SU-2020:0336
- openSUSE-SU-2020:0336
- https://github.com/torvalds/linux/commit/0e62395da2bd5166d7c9e14cbc7503b256a34cb0
- https://github.com/torvalds/linux/commit/0e62395da2bd5166d7c9e14cbc7503b256a34cb0
- [debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
- [debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
- [debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
- [debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
- FEDORA-2019-021c968423
- FEDORA-2019-021c968423
- FEDORA-2019-34a75d7e61
- FEDORA-2019-34a75d7e61
- https://security.netapp.com/advisory/ntap-20191205-0001/
- https://security.netapp.com/advisory/ntap-20191205-0001/
- USN-4286-1
- USN-4286-1
- USN-4286-2
- USN-4286-2
- USN-4300-1
- USN-4300-1
- USN-4301-1
- USN-4301-1
- USN-4302-1
- USN-4302-1
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
Modified: 2024-11-21
CVE-2019-19068
A memory leak in the rtl8xxxu_submit_int_urb() function in drivers/net/wireless/realtek/rtl8xxxu/rtl8xxxu_core.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering usb_submit_urb() failures, aka CID-a2cdd07488e6.
- openSUSE-SU-2019:2675
- openSUSE-SU-2019:2675
- https://github.com/torvalds/linux/commit/a2cdd07488e666aa93a49a3fc9c9b1299e27ef3c
- https://github.com/torvalds/linux/commit/a2cdd07488e666aa93a49a3fc9c9b1299e27ef3c
- [debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
- [debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
- FEDORA-2019-021c968423
- FEDORA-2019-021c968423
- FEDORA-2019-34a75d7e61
- FEDORA-2019-34a75d7e61
- https://security.netapp.com/advisory/ntap-20191205-0001/
- https://security.netapp.com/advisory/ntap-20191205-0001/
- USN-4286-1
- USN-4286-1
- USN-4286-2
- USN-4286-2
- USN-4300-1
- USN-4300-1
- USN-4301-1
- USN-4301-1
- USN-4302-1
- USN-4302-1
Modified: 2024-11-21
CVE-2019-19072
A memory leak in the predicate_parse() function in kernel/trace/trace_events_filter.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption), aka CID-96c5c6e6a5b6.
- https://github.com/torvalds/linux/commit/96c5c6e6a5b6db592acae039fed54b5c8844cd35
- https://github.com/torvalds/linux/commit/96c5c6e6a5b6db592acae039fed54b5c8844cd35
- FEDORA-2019-021c968423
- FEDORA-2019-021c968423
- FEDORA-2019-34a75d7e61
- FEDORA-2019-34a75d7e61
- https://security.netapp.com/advisory/ntap-20191205-0001/
- https://security.netapp.com/advisory/ntap-20191205-0001/
- USN-4225-1
- USN-4225-1
- USN-4225-2
- USN-4225-2
- USN-4226-1
- USN-4226-1
Modified: 2024-11-21
CVE-2019-19073
Memory leaks in drivers/net/wireless/ath/ath9k/htc_hst.c in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption) by triggering wait_for_completion_timeout() failures. This affects the htc_config_pipe_credits() function, the htc_setup_complete() function, and the htc_connect_service() function, aka CID-853acf7caf10.
- openSUSE-SU-2019:2675
- openSUSE-SU-2019:2675
- https://github.com/torvalds/linux/commit/853acf7caf10b828102d92d05b5c101666a6142b
- https://github.com/torvalds/linux/commit/853acf7caf10b828102d92d05b5c101666a6142b
- [debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update
- [debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update
- [debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update
- [debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update
- FEDORA-2019-021c968423
- FEDORA-2019-021c968423
- FEDORA-2019-34a75d7e61
- FEDORA-2019-34a75d7e61
- https://security.netapp.com/advisory/ntap-20191205-0001/
- https://security.netapp.com/advisory/ntap-20191205-0001/
- USN-4526-1
- USN-4526-1
- USN-4527-1
- USN-4527-1
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
Modified: 2024-11-21
CVE-2019-19077
A memory leak in the bnxt_re_create_srq() function in drivers/infiniband/hw/bnxt_re/ib_verbs.c in the Linux kernel through 5.3.11 allows attackers to cause a denial of service (memory consumption) by triggering copy to udata failures, aka CID-4a9d46a9fe14.
- openSUSE-SU-2019:2675
- openSUSE-SU-2019:2675
- https://github.com/torvalds/linux/commit/4a9d46a9fe14401f21df69cea97c62396d5fb053
- https://github.com/torvalds/linux/commit/4a9d46a9fe14401f21df69cea97c62396d5fb053
- https://security.netapp.com/advisory/ntap-20191205-0001/
- https://security.netapp.com/advisory/ntap-20191205-0001/
- USN-4258-1
- USN-4258-1
- USN-4284-1
- USN-4284-1
Modified: 2024-11-21
CVE-2019-19082
Memory leaks in *create_resource_pool() functions under drivers/gpu/drm/amd/display/dc in the Linux kernel through 5.3.11 allow attackers to cause a denial of service (memory consumption). This affects the dce120_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce120/dce120_resource.c, the dce110_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce110/dce110_resource.c, the dce100_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce100/dce100_resource.c, the dcn10_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dcn10/dcn10_resource.c, and the dce112_create_resource_pool() function in drivers/gpu/drm/amd/display/dc/dce112/dce112_resource.c, aka CID-104c307147ad.
- openSUSE-SU-2019:2675
- openSUSE-SU-2019:2675
- https://github.com/torvalds/linux/commit/104c307147ad379617472dd91a5bcb368d72bd6d
- https://github.com/torvalds/linux/commit/104c307147ad379617472dd91a5bcb368d72bd6d
- https://security.netapp.com/advisory/ntap-20191205-0001/
- https://security.netapp.com/advisory/ntap-20191205-0001/
- USN-4258-1
- USN-4258-1
- USN-4284-1
- USN-4284-1
- USN-4287-1
- USN-4287-1
- USN-4287-2
- USN-4287-2
Modified: 2024-11-21
CVE-2019-19252
vcs_write in drivers/tty/vt/vc_screen.c in the Linux kernel through 5.3.13 does not prevent write access to vcsu devices, aka CID-0c9acb1af77a.
- https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/tty.git/commit/?h=tty-testing&id=0c9acb1af77a3cb8707e43f45b72c95266903cee
- https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/tty.git/commit/?h=tty-testing&id=0c9acb1af77a3cb8707e43f45b72c95266903cee
- https://lore.kernel.org/lkml/c30fc539-68a8-65d7-226c-6f8e6fd8bdfb%40suse.com/
- https://lore.kernel.org/lkml/c30fc539-68a8-65d7-226c-6f8e6fd8bdfb%40suse.com/
- https://security.netapp.com/advisory/ntap-20200103-0001/
- https://security.netapp.com/advisory/ntap-20200103-0001/
- USN-4258-1
- USN-4258-1
- USN-4284-1
- USN-4284-1
Modified: 2024-11-21
CVE-2019-19318
In the Linux kernel 5.3.11, mounting a crafted btrfs image twice can cause an rwsem_down_write_slowpath use-after-free because (in rwsem_can_spin_on_owner in kernel/locking/rwsem.c) rwsem_owner_flags returns an already freed pointer,
- openSUSE-SU-2020:0336
- openSUSE-SU-2020:0336
- https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19318
- https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19318
- [debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update
- [debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update
- https://security.netapp.com/advisory/ntap-20200103-0001/
- https://security.netapp.com/advisory/ntap-20200103-0001/
- USN-4414-1
- USN-4414-1
Modified: 2024-11-21
CVE-2019-19448
In the Linux kernel 5.0.21 and 5.3.11, mounting a crafted btrfs filesystem image, performing some operations, and then making a syncfs system call can lead to a use-after-free in try_merge_free_space in fs/btrfs/free-space-cache.c because the pointer to a left data structure can be the same as the pointer to a right data structure.
- https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19448
- https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19448
- [debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update
- [debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update
- [debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update
- [debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update
- [debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update
- [debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update
- https://security.netapp.com/advisory/ntap-20200103-0001/
- https://security.netapp.com/advisory/ntap-20200103-0001/
- USN-4578-1
- USN-4578-1
Modified: 2024-11-21
CVE-2019-19524
In the Linux kernel before 5.3.12, there is a use-after-free bug that can be caused by a malicious USB device in the drivers/input/ff-memless.c driver, aka CID-fa3a5a1880c9.
- openSUSE-SU-2019:2675
- openSUSE-SU-2019:2675
- http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- [oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
- [oss-security] 20191203 Linux kernel: multiple vulnerabilities in the USB subsystem x3
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.12
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.12
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fa3a5a1880c91bb92594ad42dfe9eedad7996b86
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=fa3a5a1880c91bb92594ad42dfe9eedad7996b86
- [debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
- [debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
- [debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
- [debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
- 20200109 [slackware-security] Slackware 14.2 kernel (SSA:2020-008-01)
- 20200109 [slackware-security] Slackware 14.2 kernel (SSA:2020-008-01)
- USN-4225-1
- USN-4225-1
- USN-4225-2
- USN-4225-2
- USN-4226-1
- USN-4226-1
- USN-4227-1
- USN-4227-1
- USN-4227-2
- USN-4227-2
- USN-4228-1
- USN-4228-1
- USN-4228-2
- USN-4228-2
Package kernel-image-std-def updated to version 4.19.87-alt1 for branch p9 in task 242330.
Closed vulnerabilities
BDU:2019-03219
Уязвимость драйвера drivers/net/wireless/ath/ath10k/usb.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-02944
Уязвимость компонентов arch/powerpc/kernel/entry_64.S и arch/powerpc/kernel/security.c ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к информации
Modified: 2024-11-21
CVE-2019-15099
drivers/net/wireless/ath/ath10k/usb.c in the Linux kernel through 5.2.8 has a NULL pointer dereference via an incomplete address in an endpoint descriptor.
- openSUSE-SU-2019:2181
- openSUSE-SU-2019:2181
- https://lore.kernel.org/linux-wireless/20190804003101.11541-1-benquike%40gmail.com/T/#u
- https://lore.kernel.org/linux-wireless/20190804003101.11541-1-benquike%40gmail.com/T/#u
- https://security.netapp.com/advisory/ntap-20190905-0002/
- https://security.netapp.com/advisory/ntap-20190905-0002/
- https://support.f5.com/csp/article/K76295179
- https://support.f5.com/csp/article/K76295179
- https://support.f5.com/csp/article/K76295179?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K76295179?utm_source=f5support&%3Butm_medium=RSS
- USN-4258-1
- USN-4258-1
- USN-4284-1
- USN-4284-1
- USN-4287-1
- USN-4287-1
- USN-4287-2
- USN-4287-2
Modified: 2024-11-21
CVE-2019-18660
The Linux kernel before 5.4.1 on powerpc allows Information Exposure because the Spectre-RSB mitigation is not in place for all applicable CPUs, aka CID-39e72bf96f58. This is related to arch/powerpc/kernel/entry_64.S and arch/powerpc/kernel/security.c.
- openSUSE-SU-2019:2675
- openSUSE-SU-2019:2675
- http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- http://packetstormsecurity.com/files/155890/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- [oss-security] 20191128 CVE-2019-18660: Linux kernel: powerpc: missing Spectre-RSB mitigation
- [oss-security] 20191128 CVE-2019-18660: Linux kernel: powerpc: missing Spectre-RSB mitigation
- RHSA-2020:0174
- RHSA-2020:0174
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.1
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.4.1
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=39e72bf96f5847ba87cc5bd7a3ce0fed813dc9ad
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=39e72bf96f5847ba87cc5bd7a3ce0fed813dc9ad
- FEDORA-2019-b86a7bdba0
- FEDORA-2019-b86a7bdba0
- FEDORA-2019-124a241044
- FEDORA-2019-124a241044
- 20200109 [slackware-security] Slackware 14.2 kernel (SSA:2020-008-01)
- 20200109 [slackware-security] Slackware 14.2 kernel (SSA:2020-008-01)
- https://security.netapp.com/advisory/ntap-20200103-0001/
- https://security.netapp.com/advisory/ntap-20200103-0001/
- USN-4225-1
- USN-4225-1
- USN-4225-2
- USN-4225-2
- USN-4226-1
- USN-4226-1
- USN-4227-1
- USN-4227-1
- USN-4227-2
- USN-4227-2
- USN-4228-1
- USN-4228-1
- USN-4228-2
- USN-4228-2
- https://www.openwall.com/lists/oss-security/2019/11/27/1
- https://www.openwall.com/lists/oss-security/2019/11/27/1