ALT-BU-2020-3686-1
Branch sisyphus update bulletin.
Package kernel-image-mp updated to version 5.5.8-alt1 for branch sisyphus in task 247420.
Closed vulnerabilities
BDU:2020-01075
Уязвимость функции rwsem_down_write_slowpath (kernel/locking/rwsem.c) ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании
BDU:2020-01076
Уязвимость архитектуры AArch64 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-02707
Уязвимость функции get_raw_socket (drivers/vhost/net.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-04742
Уязвимость реализации вызова VT_RESIZEX ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-10942
In the Linux kernel before 5.5.8, get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls.
- openSUSE-SU-2020:0543
- [oss-security] 20200415 CVE-2020-10942 Kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.5.8
- https://git.kernel.org/linus/42d84c8490f9f0931786f1623191fcab397c3d64
- [debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
- https://lkml.org/lkml/2020/2/15/125
- https://security.netapp.com/advisory/ntap-20200403-0003/
- USN-4342-1
- USN-4344-1
- USN-4345-1
- USN-4364-1
- DSA-4667
- DSA-4698
- openSUSE-SU-2020:0543
- DSA-4698
- DSA-4667
- USN-4364-1
- USN-4345-1
- USN-4344-1
- USN-4342-1
- https://security.netapp.com/advisory/ntap-20200403-0003/
- https://lkml.org/lkml/2020/2/15/125
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
- [debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
- https://git.kernel.org/linus/42d84c8490f9f0931786f1623191fcab397c3d64
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.5.8
- [oss-security] 20200415 CVE-2020-10942 Kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field
Modified: 2024-11-21
CVE-2020-36558
A race condition in the Linux kernel before 5.5.7 involving VT_RESIZEX could lead to a NULL pointer dereference and general protection fault.
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.5.7
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.5.7
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cd1ed50efd88261298577cd92a14f2768eddeeb
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6cd1ed50efd88261298577cd92a14f2768eddeeb
Modified: 2024-11-21
CVE-2020-9383
An issue was discovered in the Linux kernel 3.16 through 5.5.6. set_fdc in drivers/block/floppy.c leads to a wait_til_ready out-of-bounds read because the FDC index is not checked for errors before assigning it, aka CID-2e90ca68b0d2.
- openSUSE-SU-2020:0388
- openSUSE-SU-2020:0388
- https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=2f9ac30a54dc0181ddac3705cdcf4775d863c530
- https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=2f9ac30a54dc0181ddac3705cdcf4775d863c530
- https://github.com/torvalds/linux/commit/2e90ca68b0d2f5548804f22f0dd61145516171e3
- https://github.com/torvalds/linux/commit/2e90ca68b0d2f5548804f22f0dd61145516171e3
- [debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
- [debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
- https://security.netapp.com/advisory/ntap-20200313-0003/
- https://security.netapp.com/advisory/ntap-20200313-0003/
- USN-4342-1
- USN-4342-1
- USN-4344-1
- USN-4344-1
- USN-4345-1
- USN-4345-1
- USN-4346-1
- USN-4346-1
- DSA-4698
- DSA-4698
Modified: 2024-11-21
CVE-2020-9391
An issue was discovered in the Linux kernel 5.4 and 5.5 through 5.5.6 on the AArch64 architecture. It ignores the top byte in the address passed to the brk system call, potentially moving the memory break downwards when the application expects it to move upwards, aka CID-dcde237319e6. This has been observed to cause heap corruption with the GNU C Library malloc implementation.
- [oss-security] 20200225 CVE-2020-9391: Ignoring the top byte of addresses in brk causes heap corruption (AArch64)
- [oss-security] 20200225 CVE-2020-9391: Ignoring the top byte of addresses in brk causes heap corruption (AArch64)
- https://bugzilla.redhat.com/show_bug.cgi?id=1797052
- https://bugzilla.redhat.com/show_bug.cgi?id=1797052
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dcde237319e626d1ec3c9d8b7613032f0fd4663a
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dcde237319e626d1ec3c9d8b7613032f0fd4663a
- FEDORA-2020-3cd64d683c
- FEDORA-2020-3cd64d683c
- https://security.netapp.com/advisory/ntap-20200313-0003/
- https://security.netapp.com/advisory/ntap-20200313-0003/
Closed vulnerabilities
BDU:2021-00071
Уязвимость функции zrle_compress_data программного обеспечения для эмуляции аппаратного обеспечения различных платформ QEMU, связанная с неправильным освобождением памяти перед удалением последней ссылки, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-20382
QEMU 4.1.0 has a memory leak in zrle_compress_data in ui/vnc-enc-zrle.c during a VNC disconnect operation because libz is misused, resulting in a situation where memory allocated in deflateInit2 is not freed in deflateEnd.
- openSUSE-SU-2020:0468
- openSUSE-SU-2020:0468
- http://www.openwall.com/lists/oss-security/2020/03/05/1
- http://www.openwall.com/lists/oss-security/2020/03/05/1
- https://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=6bf21f3d83e95bcc4ba35a7a07cc6655e8b010b0
- https://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=6bf21f3d83e95bcc4ba35a7a07cc6655e8b010b0
- [debian-lts-announce] 20200726 [SECURITY] [DLA 2288-1] qemu security update
- [debian-lts-announce] 20200726 [SECURITY] [DLA 2288-1] qemu security update
- USN-4372-1
- USN-4372-1
- DSA-4665
- DSA-4665
Package kernel-image-un-def updated to version 5.5.8-alt1 for branch sisyphus in task 247429.
Closed vulnerabilities
BDU:2020-02707
Уязвимость функции get_raw_socket (drivers/vhost/net.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-10942
In the Linux kernel before 5.5.8, get_raw_socket in drivers/vhost/net.c lacks validation of an sk_family field, which might allow attackers to trigger kernel stack corruption via crafted system calls.
- openSUSE-SU-2020:0543
- [oss-security] 20200415 CVE-2020-10942 Kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.5.8
- https://git.kernel.org/linus/42d84c8490f9f0931786f1623191fcab397c3d64
- [debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
- https://lkml.org/lkml/2020/2/15/125
- https://security.netapp.com/advisory/ntap-20200403-0003/
- USN-4342-1
- USN-4344-1
- USN-4345-1
- USN-4364-1
- DSA-4667
- DSA-4698
- openSUSE-SU-2020:0543
- DSA-4698
- DSA-4667
- USN-4364-1
- USN-4345-1
- USN-4344-1
- USN-4342-1
- https://security.netapp.com/advisory/ntap-20200403-0003/
- https://lkml.org/lkml/2020/2/15/125
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
- [debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
- https://git.kernel.org/linus/42d84c8490f9f0931786f1623191fcab397c3d64
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.5.8
- [oss-security] 20200415 CVE-2020-10942 Kernel: vhost-net: stack overflow in get_raw_socket while checking sk_family field
Package alterator-net-eth updated to version 5.1.6-alt1 for branch sisyphus in task 247449.
Closed bugs
при отсутствии /net-bridge модально ругается
Closed vulnerabilities
BDU:2021-03591
Уязвимость компонента tif_getimage.c библиотеки LibTIFF, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-03342
Уязвимость функции OGRExpatRealloc файла ogr/ogr_expat.cpp. библиотеки-транслятора для геопространственных данных GDAL, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-17545
GDAL through 3.0.1 has a poolDestroy double free in OGRExpatRealloc in ogr/ogr_expat.cpp when the 10MB threshold is exceeded.
- openSUSE-SU-2019:2466
- openSUSE-SU-2019:2466
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16178
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16178
- https://github.com/OSGeo/gdal/commit/148115fcc40f1651a5d15fa34c9a8c528e7147bb
- https://github.com/OSGeo/gdal/commit/148115fcc40f1651a5d15fa34c9a8c528e7147bb
- [debian-lts-announce] 20191109 [SECURITY] [DLA 1984-1] gdal security update
- [debian-lts-announce] 20191109 [SECURITY] [DLA 1984-1] gdal security update
- [debian-lts-announce] 20220112 [SECURITY] [DLA 2877-1] gdal security update
- [debian-lts-announce] 20220112 [SECURITY] [DLA 2877-1] gdal security update
- [debian-lts-announce] 20220930 [SECURITY] [DLA 3129-1] gdal security update
- [debian-lts-announce] 20220930 [SECURITY] [DLA 3129-1] gdal security update
- FEDORA-2019-f511b38b1f
- FEDORA-2019-f511b38b1f
- FEDORA-2019-a6960910d8
- FEDORA-2019-a6960910d8
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com//security-alerts/cpujul2021.html
Modified: 2024-12-20
CVE-2019-17546
tif_getimage.c in LibTIFF through 4.0.10, as used in GDAL through 3.0.1 and other products, has an integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image, related to a "Negative-size-param" condition.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16443
- https://github.com/OSGeo/gdal/commit/21674033ee246f698887604c7af7ba1962a40ddf
- https://gitlab.com/libtiff/libtiff/commit/4bb584a35f87af42d6cf09d15e9ce8909a839145
- [debian-lts-announce] 20191126 [SECURITY] [DLA 2009-1] tiff security update
- [debian-lts-announce] 20200318 [SECURITY] [DLA 2147-1] gdal security update
- FEDORA-2020-2e9bd06377
- FEDORA-2020-6f1209bb45
- 20200121 [SECURITY] [DSA 4608-1] tiff security update
- GLSA-202003-25
- DSA-4608
- DSA-4670
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16443
- DSA-4670
- https://security.netapp.com/advisory/ntap-20241220-0007/
- DSA-4608
- GLSA-202003-25
- 20200121 [SECURITY] [DSA 4608-1] tiff security update
- FEDORA-2020-6f1209bb45
- FEDORA-2020-2e9bd06377
- [debian-lts-announce] 20200318 [SECURITY] [DLA 2147-1] gdal security update
- [debian-lts-announce] 20191126 [SECURITY] [DLA 2009-1] tiff security update
- https://gitlab.com/libtiff/libtiff/commit/4bb584a35f87af42d6cf09d15e9ce8909a839145
- https://github.com/OSGeo/gdal/commit/21674033ee246f698887604c7af7ba1962a40ddf