ALT-BU-2020-4000-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2021-02599
Уязвимость библиотеки предоставления клиентского API для X Window System libX11, связанная с использованием памяти после ее освобождения, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
Modified: 2024-11-21
CVE-2020-14363
An integer overflow vulnerability leading to a double-free was found in libX11. This flaw allows a local privileged attacker to cause an application compiled with libX11 to crash, or in some cases, result in arbitrary code execution. The highest threat from this flaw is to confidentiality, integrity as well as system availability.
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14363
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14363
- https://github.com/Ruia-ruia/Exploits/blob/master/DFX11details.txt
- https://github.com/Ruia-ruia/Exploits/blob/master/DFX11details.txt
- https://github.com/Ruia-ruia/Exploits/blob/master/x11doublefree.sh
- https://github.com/Ruia-ruia/Exploits/blob/master/x11doublefree.sh
- FEDORA-2020-cf0afbd27e
- FEDORA-2020-cf0afbd27e
- https://lists.x.org/archives/xorg-announce/2020-August/003056.html
- https://lists.x.org/archives/xorg-announce/2020-August/003056.html
- USN-4487-2
- USN-4487-2
Package xorg-server updated to version 1.20.9-alt1 for branch sisyphus in task 256796.
Closed vulnerabilities
BDU:2020-03504
Уязвимость библиотеки шрифтов операционных систем Windows, позволяющая нарушителю выполнить произвольный код
BDU:2020-03915
Уязвимость сервера X Window System Xorg-server, связанная с некорректной инициализацией памяти, позволяющая нарушителю вызвать утечку части серверной памяти для клиента Xorg-server
BDU:2021-00126
Уязвимость функции SProcRecordQueryVersion сервера X Window System Xorg-server, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-00127
Уязвимость функции SProcXkbSelectEvents сервера X Window System Xorg-server, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-00128
Уязвимость функции ProcXIChangeHierarchy сервера X Window System Xorg-server, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-02598
Уязвимость функции XkbSetNamesCheck из xkb.c сервера X Window System Xorg-server, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальной информации или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-14345
A flaw was found in X.Org Server before xorg-x11-server 1.20.9. An Out-Of-Bounds access in XkbSetNames function may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
- [oss-security] 20210115 Re: [vs] Cinnamon lock screen bypass in multiple distributions
- [oss-security] 20210115 Re: [vs] Cinnamon lock screen bypass in multiple distributions
- https://bugzilla.redhat.com/show_bug.cgi?id=1862241
- https://bugzilla.redhat.com/show_bug.cgi?id=1862241
- https://lists.x.org/archives/xorg-announce/2020-August/003058.html
- https://lists.x.org/archives/xorg-announce/2020-August/003058.html
- GLSA-202012-01
- GLSA-202012-01
- USN-4488-2
- USN-4488-2
- USN-4490-1
- USN-4490-1
- https://www.zerodayinitiative.com/advisories/ZDI-20-1416/
- https://www.zerodayinitiative.com/advisories/ZDI-20-1416/
Modified: 2024-11-21
CVE-2020-14346
A flaw was found in xorg-x11-server before 1.20.9. An integer underflow in the X input extension protocol decoding in the X server may lead to arbitrary access of memory contents. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
- https://bugzilla.redhat.com/show_bug.cgi?id=1862246
- https://bugzilla.redhat.com/show_bug.cgi?id=1862246
- https://lists.x.org/archives/xorg-announce/2020-August/003058.html
- https://lists.x.org/archives/xorg-announce/2020-August/003058.html
- GLSA-202012-01
- GLSA-202012-01
- USN-4488-2
- USN-4488-2
- https://www.zerodayinitiative.com/advisories/ZDI-20-1417/
- https://www.zerodayinitiative.com/advisories/ZDI-20-1417/
Modified: 2024-11-21
CVE-2020-14347
A flaw was found in the way xserver memory was not properly initialized. This could leak parts of server memory to the X client. In cases where Xorg server runs with elevated privileges, this could result in possible ASLR bypass. Xorg-server before version 1.20.9 is vulnerable.
- openSUSE-SU-2020:1279
- openSUSE-SU-2020:1279
- openSUSE-SU-2020:1302
- openSUSE-SU-2020:1302
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14347
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14347
- [debian-lts-announce] 20200830 [SECURITY] [DLA 2359-1] xorg-server security update
- [debian-lts-announce] 20200830 [SECURITY] [DLA 2359-1] xorg-server security update
- https://lists.x.org/archives/xorg-announce/2020-July/003051.html
- https://lists.x.org/archives/xorg-announce/2020-July/003051.html
- GLSA-202012-01
- GLSA-202012-01
- USN-4488-1
- USN-4488-1
- USN-4488-2
- USN-4488-2
- DSA-4758
- DSA-4758
- https://www.openwall.com/lists/oss-security/2020/07/31/2
- https://www.openwall.com/lists/oss-security/2020/07/31/2
Modified: 2024-11-21
CVE-2020-1436
A remote code execution vulnerability exists when the Windows font library improperly handles specially crafted fonts.For all systems except Windows 10, an attacker who successfully exploited the vulnerability could execute code remotely, aka 'Windows Font Library Remote Code Execution Vulnerability'.
- [oss-security] 20200825 X.Org server security advisory: August 25, 2020
- [oss-security] 20200825 X.Org server security advisory: August 25, 2020
- [oss-security] 20200825 Re: X.Org server security advisory: August 25, 2020
- [oss-security] 20200825 Re: X.Org server security advisory: August 25, 2020
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1436
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1436
- https://www.zerodayinitiative.com/advisories/ZDI-20-877/
- https://www.zerodayinitiative.com/advisories/ZDI-20-877/
Modified: 2024-11-21
CVE-2020-14361
A flaw was found in X.Org Server before xorg-x11-server 1.20.9. An Integer underflow leading to heap-buffer overflow may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
- https://bugzilla.redhat.com/show_bug.cgi?id=1869142
- https://bugzilla.redhat.com/show_bug.cgi?id=1869142
- https://lists.x.org/archives/xorg-announce/2020-August/003058.html
- https://lists.x.org/archives/xorg-announce/2020-August/003058.html
- GLSA-202012-01
- GLSA-202012-01
- USN-4488-2
- USN-4488-2
- https://www.zerodayinitiative.com/advisories/ZDI-20-1418/
- https://www.zerodayinitiative.com/advisories/ZDI-20-1418/
Modified: 2024-11-21
CVE-2020-14362
A flaw was found in X.Org Server before xorg-x11-server 1.20.9. An Integer underflow leading to heap-buffer overflow may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
- https://bugzilla.redhat.com/show_bug.cgi?id=1869144
- https://bugzilla.redhat.com/show_bug.cgi?id=1869144
- https://lists.x.org/archives/xorg-announce/2020-August/003058.html
- https://lists.x.org/archives/xorg-announce/2020-August/003058.html
- GLSA-202012-01
- GLSA-202012-01
- USN-4488-2
- USN-4488-2
- https://www.zerodayinitiative.com/advisories/ZDI-20-1419/
- https://www.zerodayinitiative.com/advisories/ZDI-20-1419/
Package libvncserver updated to version 0.9.13-alt1 for branch sisyphus in task 256807.
Closed vulnerabilities
BDU:2020-03149
Уязвимость компонента libvncclient/rfbproto.c кроссплатформенной библиотеки LibVNCServer, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2020-03151
Уязвимость компонента libvncserver/rre.c кроссплатформенной библиотеки LibVNCServer, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2020-03152
Уязвимость компонента libvncserver/hextile.c кроссплатформенной библиотеки LibVNCServer, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2020-03153
Уязвимость компонента libvncserver/corre.c кроссплатформенной библиотеки LibVNCServer, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2020-03154
Уязвимость компонента libvncserver/scale.c кроссплатформенной библиотеки LibVNCServer, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2020-03155
Уязвимость компонента libvncserver/translate.c кроссплатформенной библиотеки LibVNCServer, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-03156
Уязвимость компонента libvncclient/tls_openssl.c кроссплатформенной библиотеки LibVNCServer, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-03157
Уязвимость компонента libvncserver/rfbregion.c кроссплатформенной библиотеки LibVNCServer, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-03158
Уязвимость компонента libvncclient/sockets.c кроссплатформенной библиотеки LibVNCServer, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-03159
Уязвимость компонента libvncclient/rfbproto.c кроссплатформенной библиотеки LibVNCServer, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-03958
Уязвимость реализации функции ConnectToRFBRepeater кроссплатформенной библиотеки LibVNCServer, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03737
Уязвимость программного обеспечения для реализации VNC функций LibVNCServer, связанная с отсутствием проверки деления на ноль, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03751
Уязвимость компонента libvncclient/sockets.c программного обеспечения для реализации VNC функций LibVNCServer, связанная с переполнением буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-21247
An issue was discovered in LibVNCServer before 0.9.13. There is an information leak (of uninitialized memory contents) in the libvncclient/rfbproto.c ConnectToRFBRepeater function.
- openSUSE-SU-2020:0988
- openSUSE-SU-2020:0988
- openSUSE-SU-2020:1025
- openSUSE-SU-2020:1025
- openSUSE-SU-2020:1056
- openSUSE-SU-2020:1056
- https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf
- https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13
- https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13
- https://github.com/LibVNC/libvncserver/issues/253
- https://github.com/LibVNC/libvncserver/issues/253
- FEDORA-2020-1a4b1c8271
- FEDORA-2020-1a4b1c8271
- FEDORA-2020-37112ac660
- FEDORA-2020-37112ac660
Modified: 2024-11-21
CVE-2019-20788
libvncclient/cursor.c in LibVNCServer through 0.9.12 has a HandleCursorShape integer overflow and heap-based buffer overflow via a large height or width value. NOTE: this may overlap CVE-2019-15690.
- openSUSE-SU-2020:0624
- openSUSE-SU-2020:0624
- https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf
- https://github.com/LibVNC/libvncserver/commit/54220248886b5001fbbb9fa73c4e1a2cb9413fed
- https://github.com/LibVNC/libvncserver/commit/54220248886b5001fbbb9fa73c4e1a2cb9413fed
- https://securitylab.github.com/advisories/GHSL-2020-064-libvnc-libvncclient
- https://securitylab.github.com/advisories/GHSL-2020-064-libvnc-libvncclient
- USN-4407-1
- USN-4407-1
Modified: 2024-11-21
CVE-2019-20839
libvncclient/sockets.c in LibVNCServer before 0.9.13 has a buffer overflow via a long socket filename.
- openSUSE-SU-2020:0988
- openSUSE-SU-2020:0988
- openSUSE-SU-2020:1025
- openSUSE-SU-2020:1025
- openSUSE-SU-2020:1056
- openSUSE-SU-2020:1056
- https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf
- https://github.com/LibVNC/libvncserver/commit/3fd03977c9b35800d73a865f167338cb4d05b0c1
- https://github.com/LibVNC/libvncserver/commit/3fd03977c9b35800d73a865f167338cb4d05b0c1
- https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13
- https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13
- [debian-lts-announce] 20200630 [SECURITY] [DLA 2264-1] libvncserver security update
- [debian-lts-announce] 20200630 [SECURITY] [DLA 2264-1] libvncserver security update
- [debian-lts-announce] 20200828 [SECURITY] [DLA 2347-1] libvncserver security update
- [debian-lts-announce] 20200828 [SECURITY] [DLA 2347-1] libvncserver security update
- FEDORA-2020-1a4b1c8271
- FEDORA-2020-1a4b1c8271
- FEDORA-2020-37112ac660
- FEDORA-2020-37112ac660
- USN-4434-1
- USN-4434-1
Modified: 2024-11-21
CVE-2019-20840
An issue was discovered in LibVNCServer before 0.9.13. libvncserver/ws_decode.c can lead to a crash because of unaligned accesses in hybiReadAndDecode.
- openSUSE-SU-2020:0988
- openSUSE-SU-2020:0988
- openSUSE-SU-2020:1025
- openSUSE-SU-2020:1025
- openSUSE-SU-2020:1056
- openSUSE-SU-2020:1056
- https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf
- https://github.com/LibVNC/libvncserver/commit/0cf1400c61850065de590d403f6d49e32882fd76
- https://github.com/LibVNC/libvncserver/commit/0cf1400c61850065de590d403f6d49e32882fd76
- https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13
- https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13
- FEDORA-2020-1a4b1c8271
- FEDORA-2020-1a4b1c8271
- USN-4434-1
- USN-4434-1
Modified: 2024-11-21
CVE-2020-14396
An issue was discovered in LibVNCServer before 0.9.13. libvncclient/tls_openssl.c has a NULL pointer dereference.
- https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf
- https://github.com/LibVNC/libvncserver/commit/33441d90a506d5f3ae9388f2752901227e430553
- https://github.com/LibVNC/libvncserver/commit/33441d90a506d5f3ae9388f2752901227e430553
- https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13
- https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13
- USN-4434-1
- USN-4434-1
Modified: 2024-11-21
CVE-2020-14397
An issue was discovered in LibVNCServer before 0.9.13. libvncserver/rfbregion.c has a NULL pointer dereference.
- openSUSE-SU-2020:0988
- openSUSE-SU-2020:0988
- openSUSE-SU-2020:1025
- openSUSE-SU-2020:1025
- openSUSE-SU-2020:1056
- openSUSE-SU-2020:1056
- https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf
- https://github.com/LibVNC/libvncserver/commit/38e98ee61d74f5f5ab4aa4c77146faad1962d6d0
- https://github.com/LibVNC/libvncserver/commit/38e98ee61d74f5f5ab4aa4c77146faad1962d6d0
- https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13
- https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13
- [debian-lts-announce] 20200630 [SECURITY] [DLA 2264-1] libvncserver security update
- [debian-lts-announce] 20200630 [SECURITY] [DLA 2264-1] libvncserver security update
- [debian-lts-announce] 20200828 [SECURITY] [DLA 2347-1] libvncserver security update
- [debian-lts-announce] 20200828 [SECURITY] [DLA 2347-1] libvncserver security update
- USN-4434-1
- USN-4434-1
- USN-4573-1
- USN-4573-1
Modified: 2024-11-21
CVE-2020-14398
An issue was discovered in LibVNCServer before 0.9.13. An improperly closed TCP connection causes an infinite loop in libvncclient/sockets.c.
- openSUSE-SU-2020:0988
- openSUSE-SU-2020:0988
- openSUSE-SU-2020:1025
- openSUSE-SU-2020:1025
- openSUSE-SU-2020:1056
- openSUSE-SU-2020:1056
- https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf
- https://github.com/LibVNC/libvncserver/commit/57433015f856cc12753378254ce4f1c78f5d9c7b
- https://github.com/LibVNC/libvncserver/commit/57433015f856cc12753378254ce4f1c78f5d9c7b
- https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13
- https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13
- USN-4434-1
- USN-4434-1
Modified: 2024-11-21
CVE-2020-14399
An issue was discovered in LibVNCServer before 0.9.13. Byte-aligned data is accessed through uint32_t pointers in libvncclient/rfbproto.c. NOTE: there is reportedly "no trust boundary crossed.
- openSUSE-SU-2020:0988
- openSUSE-SU-2020:0988
- openSUSE-SU-2020:1025
- openSUSE-SU-2020:1025
- openSUSE-SU-2020:1056
- openSUSE-SU-2020:1056
- https://bugzilla.redhat.com/show_bug.cgi?id=1860354
- https://bugzilla.redhat.com/show_bug.cgi?id=1860354
- https://github.com/LibVNC/libvncserver/commit/23e5cbe6b090d7f22982aee909a6a618174d3c2d
- https://github.com/LibVNC/libvncserver/commit/23e5cbe6b090d7f22982aee909a6a618174d3c2d
- https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13
- https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13
- [debian-lts-announce] 20200630 [SECURITY] [DLA 2264-1] libvncserver security update
- [debian-lts-announce] 20200630 [SECURITY] [DLA 2264-1] libvncserver security update
- [debian-lts-announce] 20200828 [SECURITY] [DLA 2347-1] libvncserver security update
- [debian-lts-announce] 20200828 [SECURITY] [DLA 2347-1] libvncserver security update
- USN-4434-1
- USN-4434-1
Modified: 2024-11-21
CVE-2020-14400
An issue was discovered in LibVNCServer before 0.9.13. Byte-aligned data is accessed through uint16_t pointers in libvncserver/translate.c. NOTE: Third parties do not consider this to be a vulnerability as there is no known path of exploitation or cross of a trust boundary
- openSUSE-SU-2020:0988
- openSUSE-SU-2020:0988
- openSUSE-SU-2020:1025
- openSUSE-SU-2020:1025
- openSUSE-SU-2020:1056
- openSUSE-SU-2020:1056
- https://bugzilla.redhat.com/show_bug.cgi?id=1860361
- https://bugzilla.redhat.com/show_bug.cgi?id=1860361
- https://github.com/LibVNC/libvncserver/commit/53073c8d7e232151ea2ecd8a1243124121e10e2d
- https://github.com/LibVNC/libvncserver/commit/53073c8d7e232151ea2ecd8a1243124121e10e2d
- https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13
- https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13
- [debian-lts-announce] 20200630 [SECURITY] [DLA 2264-1] libvncserver security update
- [debian-lts-announce] 20200630 [SECURITY] [DLA 2264-1] libvncserver security update
- [debian-lts-announce] 20200828 [SECURITY] [DLA 2347-1] libvncserver security update
- [debian-lts-announce] 20200828 [SECURITY] [DLA 2347-1] libvncserver security update
- USN-4434-1
- USN-4434-1
Modified: 2024-11-21
CVE-2020-14401
An issue was discovered in LibVNCServer before 0.9.13. libvncserver/scale.c has a pixel_value integer overflow.
- openSUSE-SU-2020:0988
- openSUSE-SU-2020:0988
- openSUSE-SU-2020:1025
- openSUSE-SU-2020:1025
- openSUSE-SU-2020:1056
- openSUSE-SU-2020:1056
- https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf
- https://github.com/LibVNC/libvncserver/commit/a6788d1da719ae006605b78d22f5a9f170b423af
- https://github.com/LibVNC/libvncserver/commit/a6788d1da719ae006605b78d22f5a9f170b423af
- https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13
- https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13
- [debian-lts-announce] 20200630 [SECURITY] [DLA 2264-1] libvncserver security update
- [debian-lts-announce] 20200630 [SECURITY] [DLA 2264-1] libvncserver security update
- [debian-lts-announce] 20200828 [SECURITY] [DLA 2347-1] libvncserver security update
- [debian-lts-announce] 20200828 [SECURITY] [DLA 2347-1] libvncserver security update
- USN-4434-1
- USN-4434-1
Modified: 2024-11-21
CVE-2020-14402
An issue was discovered in LibVNCServer before 0.9.13. libvncserver/corre.c allows out-of-bounds access via encodings.
- openSUSE-SU-2020:0988
- openSUSE-SU-2020:0988
- openSUSE-SU-2020:1025
- openSUSE-SU-2020:1025
- openSUSE-SU-2020:1056
- openSUSE-SU-2020:1056
- https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf
- https://github.com/LibVNC/libvncserver/commit/74e8a70f2c9a5248d6718ce443e07c7ed314dfff
- https://github.com/LibVNC/libvncserver/commit/74e8a70f2c9a5248d6718ce443e07c7ed314dfff
- https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13
- https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13
- [debian-lts-announce] 20200630 [SECURITY] [DLA 2264-1] libvncserver security update
- [debian-lts-announce] 20200630 [SECURITY] [DLA 2264-1] libvncserver security update
- [debian-lts-announce] 20200828 [SECURITY] [DLA 2347-1] libvncserver security update
- [debian-lts-announce] 20200828 [SECURITY] [DLA 2347-1] libvncserver security update
- USN-4434-1
- USN-4434-1
- USN-4573-1
- USN-4573-1
Modified: 2024-11-21
CVE-2020-14403
An issue was discovered in LibVNCServer before 0.9.13. libvncserver/hextile.c allows out-of-bounds access via encodings.
- https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf
- https://github.com/LibVNC/libvncserver/commit/74e8a70f2c9a5248d6718ce443e07c7ed314dfff
- https://github.com/LibVNC/libvncserver/commit/74e8a70f2c9a5248d6718ce443e07c7ed314dfff
- https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13
- https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13
- [debian-lts-announce] 20200630 [SECURITY] [DLA 2264-1] libvncserver security update
- [debian-lts-announce] 20200630 [SECURITY] [DLA 2264-1] libvncserver security update
- [debian-lts-announce] 20200828 [SECURITY] [DLA 2347-1] libvncserver security update
- [debian-lts-announce] 20200828 [SECURITY] [DLA 2347-1] libvncserver security update
- USN-4434-1
- USN-4434-1
- USN-4573-1
- USN-4573-1
Modified: 2024-11-21
CVE-2020-14404
An issue was discovered in LibVNCServer before 0.9.13. libvncserver/rre.c allows out-of-bounds access via encodings.
- https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf
- https://github.com/LibVNC/libvncserver/commit/74e8a70f2c9a5248d6718ce443e07c7ed314dfff
- https://github.com/LibVNC/libvncserver/commit/74e8a70f2c9a5248d6718ce443e07c7ed314dfff
- https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13
- https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13
- [debian-lts-announce] 20200630 [SECURITY] [DLA 2264-1] libvncserver security update
- [debian-lts-announce] 20200630 [SECURITY] [DLA 2264-1] libvncserver security update
- [debian-lts-announce] 20200828 [SECURITY] [DLA 2347-1] libvncserver security update
- [debian-lts-announce] 20200828 [SECURITY] [DLA 2347-1] libvncserver security update
- USN-4434-1
- USN-4434-1
- USN-4573-1
- USN-4573-1
Modified: 2024-11-21
CVE-2020-14405
An issue was discovered in LibVNCServer before 0.9.13. libvncclient/rfbproto.c does not limit TextChat size.
- https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf
- https://github.com/LibVNC/libvncserver/commit/8937203441ee241c4ace85da687b7d6633a12365
- https://github.com/LibVNC/libvncserver/commit/8937203441ee241c4ace85da687b7d6633a12365
- https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13
- https://github.com/LibVNC/libvncserver/compare/LibVNCServer-0.9.12...LibVNCServer-0.9.13
- [debian-lts-announce] 20200630 [SECURITY] [DLA 2264-1] libvncserver security update
- [debian-lts-announce] 20200630 [SECURITY] [DLA 2264-1] libvncserver security update
- [debian-lts-announce] 20200828 [SECURITY] [DLA 2347-1] libvncserver security update
- [debian-lts-announce] 20200828 [SECURITY] [DLA 2347-1] libvncserver security update
- USN-4434-1
- USN-4434-1
Modified: 2024-11-21
CVE-2020-25708
A divide by zero issue was found to occur in libvncserver-0.9.12. A malicious client could use this flaw to send a specially crafted message that, when processed by the VNC server, would lead to a floating point exception, resulting in a denial of service.
Package kernel-image-mp updated to version 5.8.4-alt1 for branch sisyphus in task 256844.
Closed vulnerabilities
BDU:2020-03245
Уязвимость функции prctl() ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2020-03246
Уязвимость реализации технологии Single Thread Indirect Branch Predictors (STIBP) ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2020-03247
Уязвимость компонента SSBD ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2020-05549
Уязвимость функции romfs_dev_read (fs/romfs/storage.c) ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2020-05723
Уязвимость сетевой файловой системы Network File System (NFS) операционных систем Linux, позволяющая нарушителю повысить свои привилегии
BDU:2020-05802
Уязвимость функции net/nfc/rawsock.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на целостность защищаемой информации
BDU:2021-00261
Уязвимость ядра операционной системы Linux, связанная с ошибкой разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-00285
Уязвимость файла fs/block_dev.c ядра операционной системы Linux, связанная с использованием памяти после ее освобождения, позволяющая нарушителю повысить свои привилегии или вызвать отказ в обслуживании
BDU:2021-01954
Уязвимость функции set_memory_region_test (arch/x86/kvm/svm/svm.c) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-02144
Уязвимость модуля ZRAM ядра операционных систем Linux, Ubuntu и OpenSUSE Leap, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05386
Уязвимость подсистемы eBPF ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании, аварийное завершение работы приложения или выполнить произвольный код
BDU:2022-05472
Уязвимость компонента net/sunrpc/xprtrdma/rpc_rdma.c ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2022-06617
Уязвимость компонента net/bluetooth/hci_event.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06902
Уязвимость ядра операционной системы Linux, связанная с ошибками разыменования указателя, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2023-00700
Уязвимость функции vgacon_scrollback_cur() видеодрайвера ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-01750
Уязвимость компонента lib/nlattr.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-10766
A logic bug flaw was found in Linux kernel before 5.8-rc1 in the implementation of SSBD. A bug in the logic handling allows an attacker with a local account to disable SSBD protection during a context switch when additional speculative execution mitigations are in place. This issue was introduced when the per task/process conditional STIPB switching was added on top of the existing SSBD switching. The highest threat from this vulnerability is to confidentiality.
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10766
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dbbe2ad02e9df26e372f38cc3e70dab9222c832e
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10766
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=dbbe2ad02e9df26e372f38cc3e70dab9222c832e
Modified: 2024-11-21
CVE-2020-10767
A flaw was found in the Linux kernel before 5.8-rc1 in the implementation of the Enhanced IBPB (Indirect Branch Prediction Barrier). The IBPB mitigation will be disabled when STIBP is not available or when the Enhanced Indirect Branch Restricted Speculation (IBRS) is available. This flaw allows a local attacker to perform a Spectre V2 style attack when this configuration is active. The highest threat from this vulnerability is to confidentiality.
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10767
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=21998a351512eba4ed5969006f0c55882d995ada
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10767
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=21998a351512eba4ed5969006f0c55882d995ada
Modified: 2024-11-21
CVE-2020-10768
A flaw was found in the Linux Kernel before 5.8-rc1 in the prctl() function, where it can be used to enable indirect branch speculation after it has been disabled. This call incorrectly reports it as being 'force disabled' when it is not and opens the system to Spectre v2 attacks. The highest threat from this vulnerability is to confidentiality.
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10768
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4d8df8cbb9156b0a0ab3f802b80cb5db57acc0bf
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10768
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=4d8df8cbb9156b0a0ab3f802b80cb5db57acc0bf
Modified: 2024-11-21
CVE-2020-10781
A flaw was found in the Linux Kernel before 5.8-rc6 in the ZRAM kernel module, where a user with a local account and the ability to read the /sys/class/zram-control/hot_add file can create ZRAM device nodes in the /dev/ directory. This read allocates kernel memory and is not accounted for a user that triggers the creation of that ZRAM device. With this vulnerability, continually reading the device may consume a large amount of system memory and cause the Out-of-Memory (OOM) killer to activate and terminate random userspace processes, possibly making the system inoperable.
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10781
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=853eab68afc80f59f36bbdeb715e5c88c501e680
- [debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update
- https://www.openwall.com/lists/oss-security/2020/06/18/1
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10781
- https://www.openwall.com/lists/oss-security/2020/06/18/1
- [debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=853eab68afc80f59f36bbdeb715e5c88c501e680
Modified: 2024-11-21
CVE-2020-14331
A flaw was found in the Linux kernel’s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
- https://bugzilla.redhat.com/show_bug.cgi?id=1858679
- https://bugzilla.redhat.com/show_bug.cgi?id=1858679
- [debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update
- [debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update
- [debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update
- [debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update
- [debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update
- [debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update
- https://lists.openwall.net/linux-kernel/2020/07/29/234
- https://lists.openwall.net/linux-kernel/2020/07/29/234
- https://www.openwall.com/lists/oss-security/2020/07/28/2
- https://www.openwall.com/lists/oss-security/2020/07/28/2
Modified: 2024-11-21
CVE-2020-15436
Use-after-free vulnerability in fs/block_dev.c in the Linux kernel before 5.8 allows local users to gain privileges or cause a denial of service by leveraging improper access to a certain error field.
Modified: 2024-11-21
CVE-2020-15437
The Linux kernel before version 5.8 is vulnerable to a NULL pointer dereference in drivers/tty/serial/8250/8250_core.c:serial8250_isa_init_ports() that allows local users to cause a denial of service by using the p->serial_in pointer which uninitialized.
Modified: 2024-11-21
CVE-2020-25212
A TOCTOU mismatch in the NFS client code in the Linux kernel before 5.8.3 could be used by local attackers to corrupt memory or possibly have unspecified other impact because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c, aka CID-b4487b935452.
- openSUSE-SU-2020:1655
- openSUSE-SU-2020:1655
- openSUSE-SU-2020:1682
- openSUSE-SU-2020:1682
- openSUSE-SU-2020:1698
- openSUSE-SU-2020:1698
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.3
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.3
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b4487b93545214a9db8cbf32e86411677b0cca21
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=b4487b93545214a9db8cbf32e86411677b0cca21
- [debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update
- [debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update
- [debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update
- [debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update
- [debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update
- [debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update
- https://twitter.com/grsecurity/status/1303370421958578179
- https://twitter.com/grsecurity/status/1303370421958578179
- USN-4525-1
- USN-4525-1
- USN-4527-1
- USN-4527-1
- USN-4578-1
- USN-4578-1
Modified: 2024-11-21
CVE-2020-26088
A missing CAP_NET_RAW check in NFC socket creation in net/nfc/rawsock.c in the Linux kernel before 5.8.2 could be used by local attackers to create raw sockets, bypassing security mechanisms, aka CID-26896f01467a.
- openSUSE-SU-2020:1586
- openSUSE-SU-2020:1586
- openSUSE-SU-2020:1655
- openSUSE-SU-2020:1655
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.2
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.2
- https://github.com/torvalds/linux/commit/26896f01467a28651f7a536143fe5ac8449d4041
- https://github.com/torvalds/linux/commit/26896f01467a28651f7a536143fe5ac8449d4041
- [debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update
- [debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update
- [debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update
- [debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update
- [debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update
- [debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update
- USN-4578-1
- USN-4578-1
Modified: 2024-11-21
CVE-2020-29371
An issue was discovered in romfs_dev_read in fs/romfs/storage.c in the Linux kernel before 5.8.4. Uninitialized memory leaks to userspace, aka CID-bcf85fcedfdd.
- https://bugs.chromium.org/p/project-zero/issues/detail?id=2077
- https://bugs.chromium.org/p/project-zero/issues/detail?id=2077
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.4
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.4
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2935e0a3cec1ffa558eea90db6279cff83aa3592
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=2935e0a3cec1ffa558eea90db6279cff83aa3592
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bcf85fcedfdd17911982a3e3564fcfec7b01eebd
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bcf85fcedfdd17911982a3e3564fcfec7b01eebd
Modified: 2024-11-21
CVE-2020-36310
An issue was discovered in the Linux kernel before 5.8. arch/x86/kvm/svm/svm.c allows a set_memory_region_test infinite loop for certain nested page faults, aka CID-e72436bc3a52.
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e72436bc3a5206f95bb384e741154166ddb3202e
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e72436bc3a5206f95bb384e741154166ddb3202e
- DSA-5095
- DSA-5095
Modified: 2024-11-21
CVE-2020-36386
An issue was discovered in the Linux kernel before 5.8.1. net/bluetooth/hci_event.c has a slab out-of-bounds read in hci_extended_inquiry_result_evt, aka CID-51c19bf3d5cf.
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.1
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.1
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51c19bf3d5cfaa66571e4b88ba2a6f6295311101
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=51c19bf3d5cfaa66571e4b88ba2a6f6295311101
- https://sites.google.com/view/syzscope/kasan-slab-out-of-bounds-read-in-hci_extended_inquiry_result_evt
- https://sites.google.com/view/syzscope/kasan-slab-out-of-bounds-read-in-hci_extended_inquiry_result_evt
- https://syzkaller.appspot.com/bug?id=4bf11aa05c4ca51ce0df86e500fce486552dc8d2
- https://syzkaller.appspot.com/bug?id=4bf11aa05c4ca51ce0df86e500fce486552dc8d2
- https://syzkaller.appspot.com/text?tag=ReproC&x=15ca2f46900000
- https://syzkaller.appspot.com/text?tag=ReproC&x=15ca2f46900000
Modified: 2025-02-21
CVE-2020-36691
An issue was discovered in the Linux kernel before 5.8. lib/nlattr.c allows attackers to cause a denial of service (unbounded recursion) via a nested Netlink policy with a back reference.
Modified: 2024-11-21
CVE-2021-4204
An out-of-bounds (OOB) memory access flaw was found in the Linux kernel's eBPF due to an Improper Input Validation. This flaw allows a local attacker with a special privilege to crash the system or leak internal information.
- https://access.redhat.com/security/cve/CVE-2021-4204
- https://access.redhat.com/security/cve/CVE-2021-4204
- https://bugzilla.redhat.com/show_bug.cgi?id=2039178
- https://bugzilla.redhat.com/show_bug.cgi?id=2039178
- https://security.netapp.com/advisory/ntap-20221228-0003/
- https://security.netapp.com/advisory/ntap-20221228-0003/
- https://security-tracker.debian.org/tracker/CVE-2021-4204
- https://security-tracker.debian.org/tracker/CVE-2021-4204
- https://www.openwall.com/lists/oss-security/2022/01/11/4
- https://www.openwall.com/lists/oss-security/2022/01/11/4
Modified: 2024-11-21
CVE-2022-0812
An information leak flaw was found in NFS over RDMA in the net/sunrpc/xprtrdma/rpc_rdma.c in the Linux Kernel. This flaw allows an attacker with normal user privileges to leak kernel information.
- https://access.redhat.com/security/cve/CVE-2022-0812
- https://access.redhat.com/security/cve/CVE-2022-0812
- https://bugzilla.redhat.com/show_bug.cgi?id=2058361
- https://bugzilla.redhat.com/show_bug.cgi?id=2058361
- https://bugzilla.redhat.com/show_bug.cgi?id=2058955
- https://bugzilla.redhat.com/show_bug.cgi?id=2058955
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=912288442cb2f431bf3c8cb097a5de83bc6dbac1
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=912288442cb2f431bf3c8cb097a5de83bc6dbac1
- https://security.netapp.com/advisory/ntap-20230427-0011/
- https://security.netapp.com/advisory/ntap-20230427-0011/
- https://ubuntu.com/security/CVE-2022-0812
- https://ubuntu.com/security/CVE-2022-0812
Modified: 2024-11-21
CVE-2022-1789
With shadow paging enabled, the INVPCID instruction results in a call to kvm_mmu_invpcid_gva. If INVPCID is executed with CR0.PG=0, the invlpg callback is not set and the result is a NULL pointer dereference.
- https://bugzilla.redhat.com/show_bug.cgi?id=1832397
- https://bugzilla.redhat.com/show_bug.cgi?id=1832397
- https://francozappa.github.io/about-bias/
- https://francozappa.github.io/about-bias/
- https://kb.cert.org/vuls/id/647177/
- https://kb.cert.org/vuls/id/647177/
- FEDORA-2022-3b86247c11
- FEDORA-2022-3b86247c11
- FEDORA-2022-ef8c8a5925
- FEDORA-2022-ef8c8a5925
- FEDORA-2022-be819b07a3
- FEDORA-2022-be819b07a3
- DSA-5161
- DSA-5161