ALT-BU-2020-3805-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-10738
A flaw was found in Moodle versions 3.8 before 3.8.3, 3.7 before 3.7.6, 3.6 before 3.6.10, 3.5 before 3.5.12 and earlier unsupported versions. It was possible to create a SCORM package in such a way that when added to a course, it could be interacted with via web services in order to achieve remote code execution.
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-68410
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10738
- https://moodle.org/mod/forum/discuss.php?d=403513
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-68410
- https://moodle.org/mod/forum/discuss.php?d=403513
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10738
Closed vulnerabilities
BDU:2020-02586
Уязвимость реализации протокола удалённого рабочего стола FreeRDP, вызванная целочисленным переполнением, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации
BDU:2020-02587
Уязвимость реализации протокола удалённого рабочего стола FreeRDP, вызванная целочисленным переполнением, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2020-02588
Уязвимость функции rfx_process_message_tileset реализации протокола удалённого рабочего стола FreeRDP, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-02589
Уязвимость функции clear_decompress_subcode_rlex реализации протокола удалённого рабочего стола FreeRDP, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-02590
Уязвимость реализации протокола удалённого рабочего стола FreeRDP, вызванная ошибками индексации массива, позволяющая нарушителю вызвать отказ в обслуживании или сбой в работе клиентской части с последующим отсутствием или искажением звука
BDU:2020-02591
Уязвимость реализации протокола удалённого рабочего стола FreeRDP, существующая из-за считывания данных за пределами заданного буфера, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-02592
Уязвимость реализации протокола удалённого рабочего стола FreeRDP, связанная с ошибкой повторного освобождения памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-02593
Уязвимость реализации протокола удалённого рабочего стола FreeRDP, существующая из-за считывания данных за пределами заданного буфера, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-03797
Уязвимость RDP-клиента FreeRDP, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2020-03798
Уязвимость RDP-клиента FreeRDP, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-03799
Уязвимость функции update_recv_order RDP-клиента FreeRDP, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2020-03800
Уязвимость функции update_recv_order RDP-клиента FreeRDP, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2021-00498
Уязвимость irp-функций реализации протокола удалённого рабочего стола FreeRDP, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2021-05828
Уязвимость реализации протокола удалённого рабочего стола FreeRDP, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-05829
Уязвимость реализации протокола удалённого рабочего стола FreeRDP, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-1000852
FreeRDP FreeRDP 2.0.0-rc3 released version before commit 205c612820dac644d665b5bb1cdf437dc5ca01e3 contains a Other/Unknown vulnerability in channels/drdynvc/client/drdynvc_main.c, drdynvc_process_capability_request that can result in The RDP server can read the client's memory.. This attack appear to be exploitable via RDPClient must connect the rdp server with echo option. This vulnerability appears to have been fixed in after commit 205c612820dac644d665b5bb1cdf437dc5ca01e3.
- RHSA-2019:2157
- RHSA-2019:2157
- https://github.com/FreeRDP/FreeRDP/issues/4866
- https://github.com/FreeRDP/FreeRDP/issues/4866
- https://github.com/FreeRDP/FreeRDP/pull/4871
- https://github.com/FreeRDP/FreeRDP/pull/4871
- https://github.com/FreeRDP/FreeRDP/pull/4871/commits/baee520e3dd9be6511c45a14c5f5e77784de1471
- https://github.com/FreeRDP/FreeRDP/pull/4871/commits/baee520e3dd9be6511c45a14c5f5e77784de1471
- FEDORA-2019-b2d986c3e9
- FEDORA-2019-b2d986c3e9
- USN-4379-1
- USN-4379-1
Modified: 2024-11-21
CVE-2020-11017
In FreeRDP less than or equal to 2.0.0, by providing manipulated input a malicious client can create a double free condition and crash the server. This is fixed in version 2.1.0.
- openSUSE-SU-2020:1090
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-q5c8-fm29-q57c
- [debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update
- openSUSE-SU-2020:1090
- [debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-q5c8-fm29-q57c
Modified: 2024-11-21
CVE-2020-11018
In FreeRDP less than or equal to 2.0.0, a possible resource exhaustion vulnerability can be performed. Malicious clients could trigger out of bound reads causing memory allocation with random size. This has been fixed in 2.1.0.
- openSUSE-SU-2020:1090
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-8cvc-vcw7-6mfw
- [debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update
- openSUSE-SU-2020:1090
- [debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-8cvc-vcw7-6mfw
Modified: 2024-11-21
CVE-2020-11019
In FreeRDP less than or equal to 2.0.0, when running with logger set to "WLOG_TRACE", a possible crash of application could occur due to a read of an invalid array index. Data could be printed as string to local terminal. This has been fixed in 2.1.0.
- openSUSE-SU-2020:1090
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-wvrr-2f4r-hjvh
- [debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update
- openSUSE-SU-2020:1090
- [debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-wvrr-2f4r-hjvh
Modified: 2024-11-21
CVE-2020-11038
In FreeRDP less than or equal to 2.0.0, an Integer Overflow to Buffer Overflow exists. When using /video redirection, a manipulated server can instruct the client to allocate a buffer with a smaller size than requested due to an integer overflow in size calculation. With later messages, the server can manipulate the client to write data out of bound to the previously allocated buffer. This has been patched in 2.1.0.
- openSUSE-SU-2020:1090
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-h25x-cqr6-fp6g
- [debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update
- openSUSE-SU-2020:1090
- [debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-h25x-cqr6-fp6g
Modified: 2024-11-21
CVE-2020-11039
In FreeRDP less than or equal to 2.0.0, when using a manipulated server with USB redirection enabled (nearly) arbitrary memory can be read and written due to integer overflows in length checks. This has been patched in 2.1.0.
- openSUSE-SU-2020:1090
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-mx9p-f6q8-mqwq
- [debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update
- openSUSE-SU-2020:1090
- [debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-mx9p-f6q8-mqwq
Modified: 2024-11-21
CVE-2020-11040
In FreeRDP less than or equal to 2.0.0, there is an out-of-bound data read from memory in clear_decompress_subcode_rlex, visualized on screen as color. This has been patched in 2.1.0.
- openSUSE-SU-2020:1090
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-x4wq-m7c9-rjgr
- [debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update
- openSUSE-SU-2020:1090
- [debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-x4wq-m7c9-rjgr
Modified: 2024-11-21
CVE-2020-11041
In FreeRDP less than or equal to 2.0.0, an outside controlled array index is used unchecked for data used as configuration for sound backend (alsa, oss, pulse, ...). The most likely outcome is a crash of the client instance followed by no or distorted sound or a session disconnect. If a user cannot upgrade to the patched version, a workaround is to disable sound for the session. This has been patched in 2.1.0.
- openSUSE-SU-2020:1090
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-w67c-26c4-2h9w
- [debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update
- openSUSE-SU-2020:1090
- [debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-w67c-26c4-2h9w
Modified: 2024-11-21
CVE-2020-11043
In FreeRDP less than or equal to 2.0.0, there is an out-of-bounds read in rfx_process_message_tileset. Invalid data fed to RFX decoder results in garbage on screen (as colors). This has been patched in 2.1.0.
- openSUSE-SU-2020:1090
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-5mr4-28w3-rc84
- [debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update
- openSUSE-SU-2020:1090
- [debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-5mr4-28w3-rc84
Modified: 2024-11-21
CVE-2020-11058
In FreeRDP after 1.1 and before 2.0.0, a stream out-of-bounds seek in rdp_read_font_capability_set could lead to a later out-of-bounds read. As a result, a manipulated client or server might force a disconnect due to an invalid data read. This has been fixed in 2.0.0.
- https://github.com/FreeRDP/FreeRDP/commit/3627aaf7d289315b614a584afb388f04abfb5bbf
- https://github.com/FreeRDP/FreeRDP/issues/6011
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-wjg2-2f82-466g
- [debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update
- [debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update
- USN-4379-1
- USN-4382-1
- https://github.com/FreeRDP/FreeRDP/commit/3627aaf7d289315b614a584afb388f04abfb5bbf
- USN-4382-1
- USN-4379-1
- [debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update
- [debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-wjg2-2f82-466g
- https://github.com/FreeRDP/FreeRDP/issues/6011
Modified: 2024-11-21
CVE-2020-11085
In FreeRDP before 2.1.0, there is an out-of-bounds read in cliprdr_read_format_list. Clipboard format data read (by client or server) might read data out-of-bounds. This has been fixed in 2.1.0.
- openSUSE-SU-2020:1090
- https://github.com/FreeRDP/FreeRDP/commit/b73143cf7ee5fe4cdabcbf56908aa15d8a883821
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-2j4w-v45m-95hf
- [debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update
- openSUSE-SU-2020:1090
- [debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-2j4w-v45m-95hf
- https://github.com/FreeRDP/FreeRDP/commit/b73143cf7ee5fe4cdabcbf56908aa15d8a883821
Modified: 2024-11-21
CVE-2020-11086
In FreeRDP less than or equal to 2.0.0, there is an out-of-bound read in ntlm_read_ntlm_v2_client_challenge that reads up to 28 bytes out-of-bound to an internal structure. This has been fixed in 2.1.0.
- openSUSE-SU-2020:1090
- https://github.com/FreeRDP/FreeRDP/commit/c098f21fdaadca57ff649eee1674f6cc321a2ec4
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-fg8v-w34r-c974
- [debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update
- openSUSE-SU-2020:1090
- [debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-fg8v-w34r-c974
- https://github.com/FreeRDP/FreeRDP/commit/c098f21fdaadca57ff649eee1674f6cc321a2ec4
Modified: 2024-11-21
CVE-2020-11087
In FreeRDP less than or equal to 2.0.0, there is an out-of-bound read in ntlm_read_AuthenticateMessage. This has been fixed in 2.1.0.
- openSUSE-SU-2020:1090
- https://github.com/FreeRDP/FreeRDP/commit/8241ab42fdf0cc89cf69fc574bf6360c9977a0d4
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-84vj-g73m-chw7
- [debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update
- openSUSE-SU-2020:1090
- [debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-84vj-g73m-chw7
- https://github.com/FreeRDP/FreeRDP/commit/8241ab42fdf0cc89cf69fc574bf6360c9977a0d4
Modified: 2024-11-21
CVE-2020-11088
In FreeRDP less than or equal to 2.0.0, there is an out-of-bound read in ntlm_read_NegotiateMessage. This has been fixed in 2.1.0.
- openSUSE-SU-2020:1090
- https://github.com/FreeRDP/FreeRDP/commit/8fa38359634a9910b91719818ab02f23c320dbae
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-xh4f-fh87-43hp
- [debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update
- openSUSE-SU-2020:1090
- [debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-xh4f-fh87-43hp
- https://github.com/FreeRDP/FreeRDP/commit/8fa38359634a9910b91719818ab02f23c320dbae
Modified: 2024-11-21
CVE-2020-11089
In FreeRDP before 2.1.0, there is an out-of-bound read in irp functions (parallel_process_irp_create, serial_process_irp_create, drive_process_irp_write, printer_process_irp_write, rdpei_recv_pdu, serial_process_irp_write). This has been fixed in 2.1.0.
- openSUSE-SU-2020:1090
- https://github.com/FreeRDP/FreeRDP/commit/6b485b146a1b9d6ce72dfd7b5f36456c166e7a16
- https://github.com/FreeRDP/FreeRDP/commit/795842f4096501fcefc1a7f535ccc8132feb31d7
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hfc7-c5gv-8c2h
- [debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update
- openSUSE-SU-2020:1090
- [debian-lts-announce] 20231007 [SECURITY] [DLA 3606-1] freerdp2 security update
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-hfc7-c5gv-8c2h
- https://github.com/FreeRDP/FreeRDP/commit/795842f4096501fcefc1a7f535ccc8132feb31d7
- https://github.com/FreeRDP/FreeRDP/commit/6b485b146a1b9d6ce72dfd7b5f36456c166e7a16
Modified: 2024-11-21
CVE-2020-11521
libfreerdp/codec/planar.c in FreeRDP version > 1.0 through 2.0.0-rc4 has an Out-of-bounds Write.
- openSUSE-SU-2020:1090
- https://github.com/FreeRDP/FreeRDP/commits/master
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-5cwc-6wc9-255w
- [debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update
- https://pub.freerdp.com/cve/CVE-2020-11521/pocAnalysis_6.pdf
- USN-4379-1
- USN-4382-1
- openSUSE-SU-2020:1090
- USN-4382-1
- USN-4379-1
- https://pub.freerdp.com/cve/CVE-2020-11521/pocAnalysis_6.pdf
- [debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-5cwc-6wc9-255w
- https://github.com/FreeRDP/FreeRDP/commits/master
Modified: 2024-11-21
CVE-2020-11522
libfreerdp/gdi/gdi.c in FreeRDP > 1.0 through 2.0.0-rc4 has an Out-of-bounds Read.
- openSUSE-SU-2020:1090
- https://github.com/FreeRDP/FreeRDP/commits/master
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-48wx-7vgj-fffh
- [debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update
- https://pub.freerdp.com/cve/CVE-2020-11522/pocAnalysis_5.pdf
- USN-4379-1
- USN-4382-1
- openSUSE-SU-2020:1090
- USN-4382-1
- USN-4379-1
- https://pub.freerdp.com/cve/CVE-2020-11522/pocAnalysis_5.pdf
- [debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-48wx-7vgj-fffh
- https://github.com/FreeRDP/FreeRDP/commits/master
Modified: 2024-11-21
CVE-2020-11523
libfreerdp/gdi/region.c in FreeRDP versions > 1.0 through 2.0.0-rc4 has an Integer Overflow.
- openSUSE-SU-2020:1090
- https://github.com/FreeRDP/FreeRDP/commits/master
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-4qrh-8cp8-4x42
- [debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update
- https://pub.freerdp.com/cve/CVE-2020-11523/pocAnalysis_2.pdf
- USN-4379-1
- USN-4382-1
- openSUSE-SU-2020:1090
- USN-4382-1
- USN-4379-1
- https://pub.freerdp.com/cve/CVE-2020-11523/pocAnalysis_2.pdf
- [debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-4qrh-8cp8-4x42
- https://github.com/FreeRDP/FreeRDP/commits/master
Modified: 2024-11-21
CVE-2020-11524
libfreerdp/codec/interleaved.c in FreeRDP versions > 1.0 through 2.0.0-rc4 has an Out-of-bounds Write.
- openSUSE-SU-2020:1090
- https://github.com/FreeRDP/FreeRDP/commits/master
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-cgw8-3mp2-p5qw
- https://pub.freerdp.com/cve/CVE-2020-11524/pocAnalysis_3.pdf
- USN-4379-1
- openSUSE-SU-2020:1090
- USN-4379-1
- https://pub.freerdp.com/cve/CVE-2020-11524/pocAnalysis_3.pdf
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-cgw8-3mp2-p5qw
- https://github.com/FreeRDP/FreeRDP/commits/master
Modified: 2024-11-21
CVE-2020-11525
libfreerdp/cache/bitmap.c in FreeRDP versions > 1.0 through 2.0.0-rc4 has an Out of bounds read.
- openSUSE-SU-2020:1090
- https://github.com/FreeRDP/FreeRDP/commits/master
- https://github.com/FreeRDP/FreeRDP/pull/6019/commits/58dc36b3c883fd460199cedb6d30e58eba58298c
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-9755-fphh-gmjg
- [debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update
- https://pub.freerdp.com/cve/CVE-2020-11525/pocAnalysis_1.pdf
- USN-4379-1
- USN-4382-1
- openSUSE-SU-2020:1090
- USN-4382-1
- USN-4379-1
- https://pub.freerdp.com/cve/CVE-2020-11525/pocAnalysis_1.pdf
- [debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-9755-fphh-gmjg
- https://github.com/FreeRDP/FreeRDP/pull/6019/commits/58dc36b3c883fd460199cedb6d30e58eba58298c
- https://github.com/FreeRDP/FreeRDP/commits/master
Modified: 2024-11-21
CVE-2020-11526
libfreerdp/core/update.c in FreeRDP versions > 1.1 through 2.0.0-rc4 has an Out-of-bounds Read.
- openSUSE-SU-2020:1090
- https://github.com/FreeRDP/FreeRDP/commits/master
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-97jw-m5w5-xvf9
- [debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update
- https://pub.freerdp.com/cve/CVE-2020-11526/pocAnalysis_4.pdf
- USN-4379-1
- USN-4382-1
- openSUSE-SU-2020:1090
- USN-4382-1
- USN-4379-1
- https://pub.freerdp.com/cve/CVE-2020-11526/pocAnalysis_4.pdf
- [debian-lts-announce] 20200829 [SECURITY] [DLA 2356-1] freerdp security update
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-97jw-m5w5-xvf9
- https://github.com/FreeRDP/FreeRDP/commits/master
Package alterator-ca updated to version 0.5.8-alt1 for branch sisyphus in task 251521.
Closed bugs
WARNING: Skipping duplicate certificate
Closed vulnerabilities
BDU:2020-03820
Уязвимость средства для запуска сценариев Web Worker веб-браузеров Firefox ESR и Firefox и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-03821
Уязвимость веб-браузеров Firefox ESR и Firefox и почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-03822
Уязвимость веб-браузеров Firefox ESR и Firefox, связанная с недостаточной проверкой входных данных, позволяющая нарушителю выполнить произаольный код
BDU:2020-03823
Уязвимость веб-браузеров Firefox ESR и Firefox, связанная с недостаточной проверкой входных данных, позволяющая нарушителю выполнить произаольный код
BDU:2020-03849
Уязвимость механизма проверки фрагментов SCTP в WebRTC веб-браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-00078
Уязвимость веб-браузеров Firefox ESR и Firefox и почтового клиента Thunderbird, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01269
Уязвимость опции «Копировать как cURL» веб-браузеров Firefox ESR, Firefox, почтового клиента Thunderbird, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Modified: 2024-11-21
CVE-2020-12387
A race condition when running shutdown code for Web Worker led to a use-after-free vulnerability. This resulted in a potentially exploitable crash. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1545345
- https://security.gentoo.org/glsa/202005-03
- https://security.gentoo.org/glsa/202005-04
- USN-4373-1
- https://www.mozilla.org/security/advisories/mfsa2020-16/
- https://www.mozilla.org/security/advisories/mfsa2020-17/
- https://www.mozilla.org/security/advisories/mfsa2020-18/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1545345
- https://www.mozilla.org/security/advisories/mfsa2020-18/
- https://www.mozilla.org/security/advisories/mfsa2020-17/
- https://www.mozilla.org/security/advisories/mfsa2020-16/
- USN-4373-1
- https://security.gentoo.org/glsa/202005-04
- https://security.gentoo.org/glsa/202005-03
Modified: 2024-11-21
CVE-2020-12388
The Firefox content processes did not sufficiently lockdown access control which could result in a sandbox escape. *Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox ESR < 68.8 and Firefox < 76.
- http://packetstormsecurity.com/files/157860/Firefox-Default-Content-Process-DACL-Sandbox-Escape.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1618911
- https://www.mozilla.org/security/advisories/mfsa2020-16/
- https://www.mozilla.org/security/advisories/mfsa2020-17/
- http://packetstormsecurity.com/files/157860/Firefox-Default-Content-Process-DACL-Sandbox-Escape.html
- https://www.mozilla.org/security/advisories/mfsa2020-17/
- https://www.mozilla.org/security/advisories/mfsa2020-16/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1618911
Modified: 2024-11-21
CVE-2020-12389
The Firefox content processes did not sufficiently lockdown access control which could result in a sandbox escape. *Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox ESR < 68.8 and Firefox < 76.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1554110
- https://www.mozilla.org/security/advisories/mfsa2020-16/
- https://www.mozilla.org/security/advisories/mfsa2020-17/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1554110
- https://www.mozilla.org/security/advisories/mfsa2020-17/
- https://www.mozilla.org/security/advisories/mfsa2020-16/
Modified: 2024-11-21
CVE-2020-12390
Incorrect origin serialization of URLs with IPv6 addresses could lead to incorrect security checks. This vulnerability affects Firefox < 76.
Modified: 2024-11-21
CVE-2020-12391
Documents formed using data: URLs in an OBJECT element failed to inherit the CSP of the creating context. This allowed the execution of scripts that should have been blocked, albeit with a unique opaque origin. This vulnerability affects Firefox < 76.
Modified: 2024-11-21
CVE-2020-12392
The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP POST data of a request, which can be controlled by the website. If a user used the 'Copy as cURL' feature and pasted the command into a terminal, it could have resulted in the disclosure of local files. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1614468
- https://security.gentoo.org/glsa/202005-03
- https://security.gentoo.org/glsa/202005-04
- USN-4373-1
- https://www.mozilla.org/security/advisories/mfsa2020-16/
- https://www.mozilla.org/security/advisories/mfsa2020-17/
- https://www.mozilla.org/security/advisories/mfsa2020-18/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1614468
- https://www.mozilla.org/security/advisories/mfsa2020-18/
- https://www.mozilla.org/security/advisories/mfsa2020-17/
- https://www.mozilla.org/security/advisories/mfsa2020-16/
- USN-4373-1
- https://security.gentoo.org/glsa/202005-04
- https://security.gentoo.org/glsa/202005-03
Modified: 2024-11-21
CVE-2020-12393
The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP method of a request, which can be controlled by the website. If a user used the 'Copy as cURL' feature and pasted the command into a terminal, it could have resulted in command injection and arbitrary command execution. *Note: this issue only affects Firefox on Windows operating systems.*. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1615471
- https://www.mozilla.org/security/advisories/mfsa2020-16/
- https://www.mozilla.org/security/advisories/mfsa2020-17/
- https://www.mozilla.org/security/advisories/mfsa2020-18/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1615471
- https://www.mozilla.org/security/advisories/mfsa2020-18/
- https://www.mozilla.org/security/advisories/mfsa2020-17/
- https://www.mozilla.org/security/advisories/mfsa2020-16/
Modified: 2024-11-21
CVE-2020-12394
A logic flaw in our location bar implementation could have allowed a local attacker to spoof the current location by selecting a different origin and removing focus from the input element. This vulnerability affects Firefox < 76.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1628288
- https://security.gentoo.org/glsa/202005-04
- https://www.mozilla.org/security/advisories/mfsa2020-16/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1628288
- https://www.mozilla.org/security/advisories/mfsa2020-16/
- https://security.gentoo.org/glsa/202005-04
Modified: 2024-11-21
CVE-2020-12395
Mozilla developers and community members reported memory safety bugs present in Firefox 75 and Firefox ESR 68.7. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0.
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1595886%2C1611482%2C1614704%2C1624098%2C1625749%2C1626382%2C1628076%2C1631508
- https://security.gentoo.org/glsa/202005-03
- https://security.gentoo.org/glsa/202005-04
- USN-4373-1
- https://www.mozilla.org/security/advisories/mfsa2020-16/
- https://www.mozilla.org/security/advisories/mfsa2020-17/
- https://www.mozilla.org/security/advisories/mfsa2020-18/
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1595886%2C1611482%2C1614704%2C1624098%2C1625749%2C1626382%2C1628076%2C1631508
- https://www.mozilla.org/security/advisories/mfsa2020-18/
- https://www.mozilla.org/security/advisories/mfsa2020-17/
- https://www.mozilla.org/security/advisories/mfsa2020-16/
- USN-4373-1
- https://security.gentoo.org/glsa/202005-04
- https://security.gentoo.org/glsa/202005-03
Modified: 2024-11-21
CVE-2020-12396
Mozilla developers and community members reported memory safety bugs present in Firefox 75. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 76.
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1339601%2C1611938%2C1620488%2C1622291%2C1627644
- https://security.gentoo.org/glsa/202005-04
- https://www.mozilla.org/security/advisories/mfsa2020-16/
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1339601%2C1611938%2C1620488%2C1622291%2C1627644
- https://www.mozilla.org/security/advisories/mfsa2020-16/
- https://security.gentoo.org/glsa/202005-04
Modified: 2024-11-21
CVE-2020-12410
Mozilla developers reported memory safety bugs present in Firefox 76 and Firefox ESR 68.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 68.9.0, Firefox < 77, and Firefox ESR < 68.9.
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1619305%2C1632717
- USN-4421-1
- https://www.mozilla.org/security/advisories/mfsa2020-20/
- https://www.mozilla.org/security/advisories/mfsa2020-21/
- https://www.mozilla.org/security/advisories/mfsa2020-22/
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1619305%2C1632717
- https://www.mozilla.org/security/advisories/mfsa2020-22/
- https://www.mozilla.org/security/advisories/mfsa2020-21/
- https://www.mozilla.org/security/advisories/mfsa2020-20/
- USN-4421-1
Modified: 2024-11-21
CVE-2020-6831
A buffer overflow could occur when parsing and validating SCTP chunks in WebRTC. This could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox ESR < 68.8, Firefox < 76, and Thunderbird < 68.8.0.
- openSUSE-SU-2020:0917
- openSUSE-SU-2020:0917
- http://packetstormsecurity.com/files/158480/usrsctp-Stack-Buffer-Overflow.html
- http://packetstormsecurity.com/files/158480/usrsctp-Stack-Buffer-Overflow.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1632241
- https://bugzilla.mozilla.org/show_bug.cgi?id=1632241
- https://security.gentoo.org/glsa/202005-03
- https://security.gentoo.org/glsa/202005-03
- https://security.gentoo.org/glsa/202005-04
- https://security.gentoo.org/glsa/202005-04
- USN-4373-1
- USN-4373-1
- DSA-4714
- DSA-4714
- https://www.mozilla.org/security/advisories/mfsa2020-16/
- https://www.mozilla.org/security/advisories/mfsa2020-16/
- https://www.mozilla.org/security/advisories/mfsa2020-17/
- https://www.mozilla.org/security/advisories/mfsa2020-17/
- https://www.mozilla.org/security/advisories/mfsa2020-18/
- https://www.mozilla.org/security/advisories/mfsa2020-18/
Package kernel-image-un-def updated to version 5.6.12-alt1 for branch sisyphus in task 251537.
Closed vulnerabilities
BDU:2020-02428
Уязвимость реализации файловой системы FUSE ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-02431
Уязвимость функции sg_write ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код
BDU:2020-02432
Уязвимость функции btree_gc_coalesce (drivers/md/bcache/btree.c) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-01501
Уязвимость реализации протокола TCP ядра операционных систем Linux, позволяющая нарушителю провести атаку типа «человек посередине»
Modified: 2024-11-21
CVE-2019-20794
An issue was discovered in the Linux kernel 4.18 through 5.6.11 when unprivileged user namespaces are allowed. A user can create their own PID namespace, and mount a FUSE filesystem. Upon interaction with this FUSE filesystem, if the userspace component is terminated via a kill of the PID namespace's pid 1, it will result in a hung task, and resources being permanently locked up until system reboot. This can result in resource exhaustion.
- [oss-security] 20200824 CVE-2019-20794 kernel: task processes not being properly ended could lead to resource exhaustion
- [oss-security] 20200824 CVE-2019-20794 kernel: task processes not being properly ended could lead to resource exhaustion
- https://github.com/sargun/fuse-example
- https://github.com/sargun/fuse-example
- https://security.netapp.com/advisory/ntap-20200608-0001/
- https://security.netapp.com/advisory/ntap-20200608-0001/
- https://sourceforge.net/p/fuse/mailman/message/36598753/
- https://sourceforge.net/p/fuse/mailman/message/36598753/
Modified: 2024-11-21
CVE-2020-12770
An issue was discovered in the Linux kernel through 5.6.11. sg_write lacks an sg_remove_request call in a certain failure case, aka CID-83c6f2390040.
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=83c6f2390040f188cc25b270b4befeb5628c1aee
- [debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
- FEDORA-2020-c6b9fff7f8
- FEDORA-2020-5a69decc0c
- FEDORA-2020-4c69987c40
- https://lkml.org/lkml/2020/4/13/870
- https://security.netapp.com/advisory/ntap-20200608-0001/
- USN-4411-1
- USN-4412-1
- USN-4413-1
- USN-4414-1
- USN-4419-1
- DSA-4698
- DSA-4699
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=83c6f2390040f188cc25b270b4befeb5628c1aee
- DSA-4699
- DSA-4698
- USN-4419-1
- USN-4414-1
- USN-4413-1
- USN-4412-1
- USN-4411-1
- https://security.netapp.com/advisory/ntap-20200608-0001/
- https://lkml.org/lkml/2020/4/13/870
- FEDORA-2020-4c69987c40
- FEDORA-2020-5a69decc0c
- FEDORA-2020-c6b9fff7f8
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
- [debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
Modified: 2024-11-21
CVE-2020-12771
An issue was discovered in the Linux kernel through 5.6.11. btree_gc_coalesce in drivers/md/bcache/btree.c has a deadlock if a coalescing operation fails.
- openSUSE-SU-2020:1062
- openSUSE-SU-2020:1153
- [debian-lts-announce] 20200812 [SECURITY] [DLA 2323-1] linux-4.19 new package
- [debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update
- [debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update
- https://lkml.org/lkml/2020/4/26/87
- https://security.netapp.com/advisory/ntap-20200608-0001/
- USN-4462-1
- USN-4463-1
- USN-4465-1
- USN-4483-1
- USN-4485-1
- https://www.oracle.com/security-alerts/cpuApr2021.html
- openSUSE-SU-2020:1062
- https://www.oracle.com/security-alerts/cpuApr2021.html
- USN-4485-1
- USN-4483-1
- USN-4465-1
- USN-4463-1
- USN-4462-1
- https://security.netapp.com/advisory/ntap-20200608-0001/
- https://lkml.org/lkml/2020/4/26/87
- [debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update
- [debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update
- [debian-lts-announce] 20200812 [SECURITY] [DLA 2323-1] linux-4.19 new package
- openSUSE-SU-2020:1153
Modified: 2024-11-21
CVE-2020-36516
An issue was discovered in the Linux kernel through 5.16.11. The mixed IPID assignment method with the hash-based IPID assignment policy allows an off-path attacker to inject data into a victim's TCP session or terminate that session.
Package kernel-image-std-debug updated to version 5.4.40-alt1 for branch sisyphus in task 251531.
Closed vulnerabilities
BDU:2015-05303
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность защищаемой информации
BDU:2015-05304
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность защищаемой информации
BDU:2015-05305
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность защищаемой информации
BDU:2015-05306
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность защищаемой информации
BDU:2015-05307
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность защищаемой информации
BDU:2015-05308
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность защищаемой информации
BDU:2015-05309
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность защищаемой информации
BDU:2015-05310
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность защищаемой информации
BDU:2015-05311
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность защищаемой информации
BDU:2015-05312
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность защищаемой информации
BDU:2015-05313
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность защищаемой информации
BDU:2015-05314
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность защищаемой информации
BDU:2015-05315
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить доступность защищаемой информации
BDU:2015-05542
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-05543
Уязвимости операционной системы openSUSE, позволяющие злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2019-04798
Уязвимость функции add_ie_rates (drivers/net/wireless/marvell/libertas/cfg.c) драйвера Marvell WiFi ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-00158
Уязвимость функции nfp_abm_u32_knode_replace() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00338
Уязвимость функции perf_trace_lock_acquire ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00785
Уязвимость функции vc_do_resize ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании
BDU:2020-00786
Уязвимость функции vgacon_invert_region ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании
BDU:2020-00787
Уязвимость функции n_tty_receive_buf_common ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании
BDU:2020-00851
Уязвимость подсистемы виртуализации Kernel-based Virtual Machine (KVM) ядра операционных систем Linux, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2020-01796
Уязвимость функции lbs_ibss_join_existing (drivers/net/wireless/marvell/libertas/cfg.c) драйвера Marvell WiFi ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-03819
Уязвимость функции enable_sacf_uaccess ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05179
Уязвимость функции btrfs_queue_work ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
Modified: 2024-11-21
CVE-2013-1798
The ioapic_read_indirect function in virt/kvm/ioapic.c in the Linux kernel through 3.8.4 does not properly handle a certain combination of invalid IOAPIC_REG_SELECT and IOAPIC_REG_WINDOW operations, which allows guest OS users to obtain sensitive information from host OS memory or cause a denial of service (host OS OOPS) via a crafted application.
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a2c118bfab8bc6b8bb213abfc35201e441693d55
- http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=a2c118bfab8bc6b8bb213abfc35201e441693d55
- openSUSE-SU-2013:0847
- openSUSE-SU-2013:0847
- openSUSE-SU-2013:0925
- openSUSE-SU-2013:0925
- openSUSE-SU-2013:1187
- openSUSE-SU-2013:1187
- http://packetstormsecurity.com/files/157233/Kernel-Live-Patch-Security-Notice-LSN-0065-1.html
- http://packetstormsecurity.com/files/157233/Kernel-Live-Patch-Security-Notice-LSN-0065-1.html
- RHSA-2013:0727
- RHSA-2013:0727
- RHSA-2013:0744
- RHSA-2013:0744
- RHSA-2013:0746
- RHSA-2013:0746
- RHSA-2013:0928
- RHSA-2013:0928
- RHSA-2013:1026
- RHSA-2013:1026
- MDVSA-2013:176
- MDVSA-2013:176
- [oss-security] 20130320 linux kernel: kvm: CVE-2013-179[6..8]
- [oss-security] 20130320 linux kernel: kvm: CVE-2013-179[6..8]
- USN-1809-1
- USN-1809-1
- USN-1812-1
- USN-1812-1
- USN-1813-1
- USN-1813-1
- https://bugzilla.redhat.com/show_bug.cgi?id=917017
- https://bugzilla.redhat.com/show_bug.cgi?id=917017
- https://github.com/torvalds/linux/commit/a2c118bfab8bc6b8bb213abfc35201e441693d55
- https://github.com/torvalds/linux/commit/a2c118bfab8bc6b8bb213abfc35201e441693d55
Modified: 2024-11-21
CVE-2019-14896
A heap-based buffer overflow vulnerability was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. A remote attacker could cause a denial of service (system crash) or, possibly execute arbitrary code, when the lbs_ibss_join_existing function is called after a STA connects to an AP.
- openSUSE-SU-2020:0336
- openSUSE-SU-2020:0336
- http://packetstormsecurity.com/files/155879/Kernel-Live-Patch-Security-Notice-LSN-0061-1.html
- http://packetstormsecurity.com/files/155879/Kernel-Live-Patch-Security-Notice-LSN-0061-1.html
- http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html
- http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14896
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14896
- [debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
- [debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
- [debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
- [debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
- FEDORA-2019-8846a1a5a2
- FEDORA-2019-8846a1a5a2
- FEDORA-2019-91f6e7bb71
- FEDORA-2019-91f6e7bb71
- https://security.netapp.com/advisory/ntap-20200103-0001/
- https://security.netapp.com/advisory/ntap-20200103-0001/
- USN-4225-1
- USN-4225-1
- USN-4225-2
- USN-4225-2
- USN-4226-1
- USN-4226-1
- USN-4227-1
- USN-4227-1
- USN-4227-2
- USN-4227-2
- USN-4228-1
- USN-4228-1
- USN-4228-2
- USN-4228-2
Modified: 2024-11-21
CVE-2019-14897
A stack-based buffer overflow was found in the Linux kernel, version kernel-2.6.32, in Marvell WiFi chip driver. An attacker is able to cause a denial of service (system crash) or, possibly execute arbitrary code, when a STA works in IBSS mode (allows connecting stations together without the use of an AP) and connects to another STA.
- openSUSE-SU-2020:0336
- openSUSE-SU-2020:0336
- http://packetstormsecurity.com/files/155879/Kernel-Live-Patch-Security-Notice-LSN-0061-1.html
- http://packetstormsecurity.com/files/155879/Kernel-Live-Patch-Security-Notice-LSN-0061-1.html
- http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html
- http://packetstormsecurity.com/files/156185/Kernel-Live-Patch-Security-Notice-LSN-0062-1.html
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14897
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14897
- [debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
- [debian-lts-announce] 20200118 [SECURITY] [DLA 2068-1] linux security update
- [debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
- [debian-lts-announce] 20200302 [SECURITY] [DLA 2114-1] linux-4.9 security update
- FEDORA-2019-8846a1a5a2
- FEDORA-2019-8846a1a5a2
- FEDORA-2019-91f6e7bb71
- FEDORA-2019-91f6e7bb71
- USN-4225-1
- USN-4225-1
- USN-4225-2
- USN-4225-2
- USN-4226-1
- USN-4226-1
- USN-4227-1
- USN-4227-1
- USN-4227-2
- USN-4227-2
- USN-4228-1
- USN-4228-1
- USN-4228-2
- USN-4228-2
Modified: 2024-11-21
CVE-2019-19076
A memory leak in the nfp_abm_u32_knode_replace() function in drivers/net/ethernet/netronome/nfp/abm/cls.c in the Linux kernel before 5.3.6 allows attackers to cause a denial of service (memory consumption), aka CID-78beef629fd9. NOTE: This has been argued as not a valid vulnerability. The upstream commit 78beef629fd9 was reverted
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.6
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.3.6
- https://git.kernel.org/linus/1d1997db870f4058676439ef7014390ba9e24eb2
- https://git.kernel.org/linus/1d1997db870f4058676439ef7014390ba9e24eb2
- https://github.com/torvalds/linux/commit/78beef629fd95be4ed853b2d37b832f766bd96ca
- https://github.com/torvalds/linux/commit/78beef629fd95be4ed853b2d37b832f766bd96ca
- https://lore.kernel.org/lkml/20191204103955.63c4d9af%40cakuba.netronome.com/
- https://lore.kernel.org/lkml/20191204103955.63c4d9af%40cakuba.netronome.com/
- https://security.netapp.com/advisory/ntap-20191205-0001/
- https://security.netapp.com/advisory/ntap-20191205-0001/
- USN-4209-1
- USN-4209-1
Modified: 2024-11-21
CVE-2019-19377
In the Linux kernel 5.0.21, mounting a crafted btrfs filesystem image, performing some operations, and unmounting can lead to a use-after-free in btrfs_queue_work in fs/btrfs/async-thread.c.
- https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19377
- https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19377
- [debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update
- [debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update
- https://security.netapp.com/advisory/ntap-20200103-0001/
- https://security.netapp.com/advisory/ntap-20200103-0001/
- USN-4367-1
- USN-4367-1
- USN-4369-1
- USN-4369-1
- USN-4414-1
- USN-4414-1
Modified: 2024-11-21
CVE-2019-19769
In the Linux kernel 5.3.10, there is a use-after-free (read) in the perf_trace_lock_acquire function (related to include/trace/events/lock.h).
- https://bugzilla.kernel.org/show_bug.cgi?id=205705
- https://bugzilla.kernel.org/show_bug.cgi?id=205705
- FEDORA-2020-73c00eda1c
- FEDORA-2020-73c00eda1c
- FEDORA-2020-76966b3419
- FEDORA-2020-76966b3419
- https://security.netapp.com/advisory/ntap-20200103-0001/
- https://security.netapp.com/advisory/ntap-20200103-0001/
- USN-4368-1
- USN-4368-1
- USN-4369-1
- USN-4369-1
Modified: 2024-11-21
CVE-2019-3016
In a Linux KVM guest that has PV TLB enabled, a process in the guest kernel may be able to read memory locations from another process in the same guest. This problem is limit to the host running linux kernel 4.10 with a guest running linux kernel 4.16 or later. The problem mainly affects AMD processors but Intel CPUs cannot be ruled out.
- http://packetstormsecurity.com/files/157233/Kernel-Live-Patch-Security-Notice-LSN-0065-1.html
- http://packetstormsecurity.com/files/157233/Kernel-Live-Patch-Security-Notice-LSN-0065-1.html
- [oss-security] 20200130 CVE-2019-3016: information leak within a KVM guest
- [oss-security] 20200130 CVE-2019-3016: information leak within a KVM guest
- https://bugzilla.redhat.com/show_bug.cgi?id=1792167
- https://bugzilla.redhat.com/show_bug.cgi?id=1792167
- https://git.kernel.org/linus/1eff70a9abd46f175defafd29bc17ad456f398a7
- https://git.kernel.org/linus/1eff70a9abd46f175defafd29bc17ad456f398a7
- https://git.kernel.org/linus/8c6de56a42e0c657955e12b882a81ef07d1d073e
- https://git.kernel.org/linus/8c6de56a42e0c657955e12b882a81ef07d1d073e
- https://git.kernel.org/linus/917248144db5d7320655dbb41d3af0b8a0f3d589
- https://git.kernel.org/linus/917248144db5d7320655dbb41d3af0b8a0f3d589
- https://git.kernel.org/linus/a6bd811f1209fe1c64c9f6fd578101d6436c6b6e
- https://git.kernel.org/linus/a6bd811f1209fe1c64c9f6fd578101d6436c6b6e
- https://git.kernel.org/linus/b043138246a41064527cf019a3d51d9f015e9796
- https://git.kernel.org/linus/b043138246a41064527cf019a3d51d9f015e9796
- https://lore.kernel.org/lkml/1580407316-11391-1-git-send-email-pbonzini%40redhat.com/
- https://lore.kernel.org/lkml/1580407316-11391-1-git-send-email-pbonzini%40redhat.com/
- https://security.netapp.com/advisory/ntap-20200313-0003/
- https://security.netapp.com/advisory/ntap-20200313-0003/
- USN-4300-1
- USN-4300-1
- USN-4301-1
- USN-4301-1
- DSA-4699
- DSA-4699
Modified: 2024-11-21
CVE-2020-11884
In the Linux kernel 4.19 through 5.6.7 on the s390 platform, code execution may occur because of a race condition, as demonstrated by code in enable_sacf_uaccess in arch/s390/lib/uaccess.c that fails to protect against a concurrent page table upgrade, aka CID-3f777e19d171. A crash could also occur.
- https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=215d1f3928713d6eaec67244bcda72105b898000
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3f777e19d171670ab558a6d5e6b1ac7f9b6c574f
- FEDORA-2020-b453269c4e
- FEDORA-2020-16f9239805
- FEDORA-2020-64d46a6e29
- https://security.netapp.com/advisory/ntap-20200608-0001/
- USN-4342-1
- USN-4343-1
- USN-4345-1
- DSA-4667
- https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=215d1f3928713d6eaec67244bcda72105b898000
- DSA-4667
- USN-4345-1
- USN-4343-1
- USN-4342-1
- https://security.netapp.com/advisory/ntap-20200608-0001/
- FEDORA-2020-64d46a6e29
- FEDORA-2020-16f9239805
- FEDORA-2020-b453269c4e
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3f777e19d171670ab558a6d5e6b1ac7f9b6c574f
Modified: 2024-11-21
CVE-2020-8647
There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vc_do_resize function in drivers/tty/vt/vt.c.
- openSUSE-SU-2020:0388
- openSUSE-SU-2020:0388
- https://bugzilla.kernel.org/show_bug.cgi?id=206359
- https://bugzilla.kernel.org/show_bug.cgi?id=206359
- [debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
- [debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
- DSA-4698
- DSA-4698
Modified: 2024-11-21
CVE-2020-8648
There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the n_tty_receive_buf_common function in drivers/tty/n_tty.c.
- openSUSE-SU-2020:0336
- openSUSE-SU-2020:0336
- https://bugzilla.kernel.org/show_bug.cgi?id=206361
- https://bugzilla.kernel.org/show_bug.cgi?id=206361
- [debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
- [debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
- https://security.netapp.com/advisory/ntap-20200924-0004/
- https://security.netapp.com/advisory/ntap-20200924-0004/
- USN-4342-1
- USN-4342-1
- USN-4344-1
- USN-4344-1
- USN-4345-1
- USN-4345-1
- USN-4346-1
- USN-4346-1
- DSA-4698
- DSA-4698
Modified: 2024-11-21
CVE-2020-8649
There is a use-after-free vulnerability in the Linux kernel through 5.5.2 in the vgacon_invert_region function in drivers/video/console/vgacon.c.
- openSUSE-SU-2020:0388
- openSUSE-SU-2020:0388
- https://bugzilla.kernel.org/show_bug.cgi?id=206357
- https://bugzilla.kernel.org/show_bug.cgi?id=206357
- [debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
- [debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
- DSA-4698
- DSA-4698