ALT-BU-2020-4090-1
Branch sisyphus update bulletin.
Package kernel-image-un-def updated to version 5.9.0-alt1 for branch sisyphus in task 259795.
Closed vulnerabilities
BDU:2020-05386
Уязвимость функции scalar32_min_max_or (kernel/bpf/verifier.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05832
Уязвимость подсистемы perf ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии
BDU:2021-01956
Уязвимость компонентов arch/x86/kvm/svm/sev.c подсистемы виртуализации Kernel-based Virtual Machine (KVM) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-04835
Уязвимость компонента drivers/gpu/drm/nouveau/nouveau_sgdma.c ядра операционной системы Linux , связанная с использованием памяти после её освобождения, позволяющая нарушителю выполнить произвольный код с root привилегиями
BDU:2021-06412
Уязвимость ядра операционной системы Linux, связанная с записью за границами буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05774
Уязвимость функции ext4_es_cache_extent() компонента fs/ext4/extents.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-14351
A flaw was found in the Linux kernel. A use-after-free memory flaw was found in the perf subsystem allowing a local attacker with permission to monitor perf events to corrupt memory and possibly escalate privileges. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
- https://bugzilla.redhat.com/show_bug.cgi?id=1862849
- https://bugzilla.redhat.com/show_bug.cgi?id=1862849
- [debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update
- [debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update
- [debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update
- [debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update
Modified: 2024-11-21
CVE-2020-25704
A flaw memory leak in the Linux kernel performance monitoring subsystem was found in the way if using PERF_EVENT_IOC_SET_FILTER. A local user could use this flaw to starve the resources causing denial of service.
- https://bugzilla.redhat.com/show_bug.cgi?id=1895961
- https://bugzilla.redhat.com/show_bug.cgi?id=1895961
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7bdb157cdebbf95a1cd94ed2e01b338714075d00
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7bdb157cdebbf95a1cd94ed2e01b338714075d00
- [debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update
- [debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update
- [debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update
- [debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update
- https://www.openwall.com/lists/oss-security/2020/11/09/1
- https://www.openwall.com/lists/oss-security/2020/11/09/1
- https://www.starwindsoftware.com/security/sw-20220802-0003/
- https://www.starwindsoftware.com/security/sw-20220802-0003/
Modified: 2024-11-21
CVE-2020-27194
An issue was discovered in the Linux kernel before 5.8.15. scalar32_min_max_or in kernel/bpf/verifier.c mishandles bounds tracking during use of 64-bit values, aka CID-5b9fbeb75b6a.
Modified: 2024-11-21
CVE-2020-28915
A buffer over-read (at the framebuffer layer) in the fbcon code in the Linux kernel before 5.8.15 could be used by local attackers to read kernel memory, aka CID-6735b4632def.
- https://bugzilla.suse.com/show_bug.cgi?id=1178886
- https://bugzilla.suse.com/show_bug.cgi?id=1178886
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.15
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.8.15
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5af08640795b2b9a940c9266c0260455377ae262
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5af08640795b2b9a940c9266c0260455377ae262
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6735b4632def0640dbdf4eb9f99816aca18c4f16
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=6735b4632def0640dbdf4eb9f99816aca18c4f16
- https://syzkaller.appspot.com/bug?id=08b8be45afea11888776f897895aef9ad1c3ecfd
- https://syzkaller.appspot.com/bug?id=08b8be45afea11888776f897895aef9ad1c3ecfd
Modified: 2024-11-21
CVE-2020-36311
An issue was discovered in the Linux kernel before 5.9. arch/x86/kvm/svm/sev.c allows attackers to cause a denial of service (soft lockup) by triggering destruction of a large SEV VM (which requires unregistering many encrypted regions), aka CID-7be74942f184.
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.9
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.9
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7be74942f184fdfba34ddd19a0d995deb34d4a03
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=7be74942f184fdfba34ddd19a0d995deb34d4a03
- [debian-lts-announce] 20210720 [SECURITY] [DLA 2714-1] linux-4.19 security update
- [debian-lts-announce] 20210720 [SECURITY] [DLA 2714-1] linux-4.19 security update
- DSA-4941
- DSA-4941
Modified: 2024-11-21
CVE-2021-20292
There is a flaw reported in the Linux kernel in versions before 5.9 in drivers/gpu/drm/nouveau/nouveau_sgdma.c in nouveau_sgdma_create_ttm in Nouveau DRM subsystem. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker with a local account with a root privilege, can leverage this vulnerability to escalate privileges and execute code in the context of the kernel.
Modified: 2024-11-21
CVE-2021-3428
A flaw was found in the Linux kernel. A denial of service problem is identified if an extent tree is corrupted in a crafted ext4 filesystem in fs/ext4/extents.c in ext4_es_cache_extent. Fabricating an integer overflow, A local attacker with a special user privilege may cause a system crash problem which can lead to an availability threat.
- https://bugzilla.redhat.com/show_bug.cgi?id=1972621
- https://bugzilla.redhat.com/show_bug.cgi?id=1972621
- https://ubuntu.com/security/CVE-2021-3428
- https://ubuntu.com/security/CVE-2021-3428
- https://www.openwall.com/lists/oss-security/2021/03/17/1
- https://www.openwall.com/lists/oss-security/2021/03/17/1
Modified: 2024-11-21
CVE-2021-3612
An out-of-bounds memory write flaw was found in the Linux kernel's joystick devices subsystem in versions before 5.9-rc1, in the way the user calls ioctl JSIOCSBTNMAP. This flaw allows a local user to crash the system or possibly escalate their privileges on the system. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
- https://bugzilla.redhat.com/show_bug.cgi?id=1974079
- https://bugzilla.redhat.com/show_bug.cgi?id=1974079
- [debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update
- [debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update
- [debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update
- [debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update
- FEDORA-2021-a95108d156
- FEDORA-2021-a95108d156
- https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82%40gmail.com/
- https://lore.kernel.org/linux-input/20210620120030.1513655-1-avlarkin82%40gmail.com/
- https://security.netapp.com/advisory/ntap-20210805-0005/
- https://security.netapp.com/advisory/ntap-20210805-0005/
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-14320
In Moodle before 3.9.1, 3.8.4 and 3.7.7, the filter in the admin task log required extra sanitizing to prevent a reflected XSS risk.
Modified: 2024-11-21
CVE-2020-14321
In Moodle before 3.9.1, 3.8.4, 3.7.7 and 3.5.13, teachers of a course were able to assign themselves the manager role within that course.
Modified: 2024-11-21
CVE-2020-14322
In Moodle before 3.9.1, 3.8.4, 3.7.7 and 3.5.13, yui_combo needed to limit the amount of files it can load to help mitigate the risk of denial of service.
Modified: 2024-11-21
CVE-2020-25628
The filter in the tag manager required extra sanitizing to prevent a reflected XSS risk. This affects 3.9 to 3.9.1, 3.8 to 3.8.4, 3.7 to 3.7.7, 3.5 to 3.5.13 and earlier unsupported versions. Fixed in 3.9.2, 3.8.5, 3.7.8 and 3.5.14.
Modified: 2024-11-21
CVE-2020-25629
A vulnerability was found in Moodle where users with "Log in as" capability in a course context (typically, course managers) may gain access to some site administration capabilities by "logging in as" a System manager. This affects 3.9 to 3.9.1, 3.8 to 3.8.4, 3.7 to 3.7.7, 3.5 to 3.5.13 and earlier unsupported versions. This is fixed in 3.9.2, 3.8.5, 3.7.8 and 3.5.14.
Modified: 2024-11-21
CVE-2020-25630
A vulnerability was found in Moodle where the decompressed size of zip files was not checked against available user quota before unzipping them, which could lead to a denial of service risk. This affects versions 3.9 to 3.9.1, 3.8 to 3.8.4, 3.7 to 3.7.7, 3.5 to 3.5.13 and earlier unsupported versions. Fixed in 3.9.2, 3.8.5, 3.7.8 and 3.5.14.
Modified: 2024-11-21
CVE-2020-25631
A vulnerability was found in Moodle 3.9 to 3.9.1, 3.8 to 3.8.4 and 3.7 to 3.7.7 where it was possible to include JavaScript in a book's chapter title, which was not escaped on the "Add new chapter" page. This is fixed in 3.9.2, 3.8.5 and 3.7.8.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-15613
A bug in Nextcloud Server 17.0.1 causes the workflow rules to depend their behaviour on the file extension when checking file mimetypes.
Modified: 2024-11-21
CVE-2019-15616
Dangling remote share attempts in Nextcloud 16 allow a DNS pollution when running long.
Modified: 2024-11-21
CVE-2019-15617
A missing check in Nextcloud Server 17.0.0 allowed an attacker to set up a new second factor when trying to login.
Modified: 2024-11-21
CVE-2019-15619
Improper neutralization of file names, conversation names and board names in Nextcloud Server 16.0.3, Nextcloud Talk 6.0.3 and Nextcloud Deck 0.6.5 causes an XSS when linking them with each others in a project.
- https://hackerone.com/reports/662204
- https://hackerone.com/reports/662204
- https://nextcloud.com/security/advisory/?id=NC-SA-2020-008
- https://nextcloud.com/security/advisory/?id=NC-SA-2020-008
- https://nextcloud.com/security/advisory/?id=NC-SA-2020-009
- https://nextcloud.com/security/advisory/?id=NC-SA-2020-009
- https://nextcloud.com/security/advisory/?id=NC-SA-2020-010
- https://nextcloud.com/security/advisory/?id=NC-SA-2020-010
Modified: 2024-11-21
CVE-2019-15621
Improper permissions preservation in Nextcloud Server 16.0.1 causes sharees to be able to reshare with write permissions when sharing the mount point of a share they received, as a public link.
Modified: 2024-11-21
CVE-2019-15623
Exposure of Private Information in Nextcloud Server 16.0.1 causes the server to send it's domain and user IDs to the Nextcloud Lookup Server without any further data when the Lookup server is disabled.
Modified: 2024-11-21
CVE-2020-8118
An authenticated server-side request forgery in Nextcloud server 16.0.1 allowed to detect local and remote services when adding a new subscription in the calendar application.
Modified: 2024-11-21
CVE-2020-8119
Improper authorization in Nextcloud server 17.0.0 causes leaking of previews and files when a file-drop share link is opened via the gallery app.
Modified: 2024-11-21
CVE-2020-8138
A missing check for IPv4 nested inside IPv6 in Nextcloud server < 17.0.1, < 16.0.7, and < 15.0.14 allowed a Server-Side Request Forgery (SSRF) vulnerability when subscribing to a malicious calendar URL.
Modified: 2024-11-21
CVE-2020-8139
A missing access control check in Nextcloud Server < 18.0.1, < 17.0.4, and < 16.0.9 causes hide-download shares to be downloadable when appending /download to the URL.
Modified: 2024-11-21
CVE-2020-8150
A cryptographic issue in Nextcloud Server 19.0.1 allowed an attacker to downgrade the encryption scheme and break the integrity of encrypted files.
- 20201225 Re: [FD] CVE-2020-8150 - Remote Code Execution as SYSTEM/root via Backblaze
- 20201225 Re: [FD] CVE-2020-8150 - Remote Code Execution as SYSTEM/root via Backblaze
- 20201229 Re: [FD] CVE-2020-8150 - Remote Code Execution as SYSTEM/root via Backblaze
- 20201229 Re: [FD] CVE-2020-8150 - Remote Code Execution as SYSTEM/root via Backblaze
- 20201229 Re: CVE-2020-8150 - Remote Code Execution as SYSTEM/root via Backblaze
- 20201229 Re: CVE-2020-8150 - Remote Code Execution as SYSTEM/root via Backblaze
- https://hackerone.com/reports/742588
- https://hackerone.com/reports/742588
- https://nextcloud.com/security/advisory/?id=NC-SA-2020-039
- https://nextcloud.com/security/advisory/?id=NC-SA-2020-039
Modified: 2024-11-21
CVE-2020-8152
Insufficient protection of the server-side encryption keys in Nextcloud Server 19.0.1 allowed an attacker to replace the public key to decrypt them later on.
- 20201225 Re: [FD] CVE-2020-8152 - Elevation of Privilege in Backblaze
- 20201225 Re: [FD] CVE-2020-8152 - Elevation of Privilege in Backblaze
- https://hackerone.com/reports/743505
- https://hackerone.com/reports/743505
- https://nextcloud.com/security/advisory/?id=NC-SA-2020-040
- https://nextcloud.com/security/advisory/?id=NC-SA-2020-040
Modified: 2024-11-21
CVE-2020-8154
An Insecure direct object reference vulnerability in Nextcloud Server 18.0.2 allowed an attacker to remote wipe devices of other users when sending a malicious request directly to the endpoint.
- openSUSE-SU-2020:0667
- openSUSE-SU-2020:0667
- openSUSE-SU-2020:0668
- openSUSE-SU-2020:0668
- openSUSE-SU-2020:0670
- openSUSE-SU-2020:0670
- openSUSE-SU-2020:1652
- openSUSE-SU-2020:1652
- https://hackerone.com/reports/819807
- https://hackerone.com/reports/819807
- FEDORA-2020-c9863904de
- FEDORA-2020-c9863904de
- https://nextcloud.com/security/advisory/?id=NC-SA-2020-018
- https://nextcloud.com/security/advisory/?id=NC-SA-2020-018
Modified: 2024-11-21
CVE-2020-8155
An outdated 3rd party library in the Files PDF viewer for Nextcloud Server 18.0.2 caused a Cross-site scripting vulnerability when opening a malicious PDF.
- openSUSE-SU-2020:0667
- openSUSE-SU-2020:0667
- openSUSE-SU-2020:0668
- openSUSE-SU-2020:0668
- openSUSE-SU-2020:0670
- openSUSE-SU-2020:0670
- openSUSE-SU-2020:1652
- openSUSE-SU-2020:1652
- FEDORA-2020-c9863904de
- FEDORA-2020-c9863904de
- https://nextcloud.com/security/advisory/?id=NC-SA-2020-019
- https://nextcloud.com/security/advisory/?id=NC-SA-2020-019
Modified: 2024-11-21
CVE-2020-8173
A too small set of random characters being used for encryption in Nextcloud Server 18.0.4 allowed decryption in shorter time than intended.
Modified: 2024-11-21
CVE-2020-8183
A logic error in Nextcloud Server 19.0.0 caused a plaintext storage of the share password when it was given on the initial create API call.
Modified: 2024-11-21
CVE-2020-8236
A wrong configuration in Nextcloud Server 19.0.1 incorrectly made the user feel the passwordless WebAuthn is also a two factor verification by asking for the PIN of the passwordless WebAuthn but not verifying it.
Modified: 2024-11-21
CVE-2020-8259
Insufficient protection of the server-side encryption keys in Nextcloud Server 19.0.1 allowed an attacker to replace the encryption keys.
Modified: 2024-11-21
CVE-2020-8295
A wrong check in Nextcloud Server 19 and prior allowed to perform a denial of service attack when resetting the password for a user.
Modified: 2024-11-21
CVE-2020-8296
Nextcloud Server prior to 20.0.0 stores passwords in a recoverable format even when external storage is not configured.
- https://github.com/nextcloud/server/issues/17439
- https://github.com/nextcloud/server/issues/17439
- https://github.com/nextcloud/server/pull/21037
- https://github.com/nextcloud/server/pull/21037
- https://hackerone.com/reports/867164
- https://hackerone.com/reports/867164
- FEDORA-2021-eac0e52f88
- FEDORA-2021-eac0e52f88
- https://nextcloud.com/security/advisory/?id=NC-SA-2021-006
- https://nextcloud.com/security/advisory/?id=NC-SA-2021-006
Closed bugs
You are using a fallback implementation of the intl extension
Собрать актуальную версию v20.0.x