ALT-BU-2020-4106-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2019-01549
Уязвимость драйвера NTFS-3G файловой системы NTFS для модуля FUSE ядер Unix-подобных операционных систем, связанная с переполнением буфера кучи, позволяющая нарушителю повысить привилегии до уровня суперпользователя
Modified: 2024-11-21
CVE-2019-9755
An integer underflow issue exists in ntfs-3g 2017.3.23. A local attacker could potentially exploit this by running /bin/ntfs-3g with specially crafted arguments from a specially crafted directory to cause a heap buffer overflow, resulting in a crash or the ability to execute arbitrary code. In installations where /bin/ntfs-3g is a setuid-root binary, this could lead to a local escalation of privileges.
Package wpa_supplicant updated to version 2.9-alt3 for branch sisyphus in task 260254.
Closed vulnerabilities
BDU:2019-04775
Уязвимость компонента защищённого доступа Wi-Fi WPA Supplicant, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-16275
hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range.
- [oss-security] 20190912 Re: hostapd/wpa_supplicant: AP mode PMF disconnection protection bypass
- [oss-security] 20190912 Re: hostapd/wpa_supplicant: AP mode PMF disconnection protection bypass
- [debian-lts-announce] 20190916 [SECURITY] [DLA 1922-1] wpa security update
- [debian-lts-announce] 20190916 [SECURITY] [DLA 1922-1] wpa security update
- FEDORA-2019-0e0b28001d
- FEDORA-2019-0e0b28001d
- FEDORA-2019-65509aac53
- FEDORA-2019-65509aac53
- FEDORA-2019-740834c559
- FEDORA-2019-740834c559
- FEDORA-2019-2bdcccee3c
- FEDORA-2019-2bdcccee3c
- FEDORA-2019-2265b5ae86
- FEDORA-2019-2265b5ae86
- 20190929 [SECURITY] [DSA 4538-1] wpa security update
- 20190929 [SECURITY] [DSA 4538-1] wpa security update
- USN-4136-1
- USN-4136-1
- USN-4136-2
- USN-4136-2
- https://w1.fi/security/2019-7/
- https://w1.fi/security/2019-7/
- https://w1.fi/security/2019-7/ap-mode-pmf-disconnection-protection-bypass.txt
- https://w1.fi/security/2019-7/ap-mode-pmf-disconnection-protection-bypass.txt
- DSA-4538
- DSA-4538
- https://www.openwall.com/lists/oss-security/2019/09/11/7
- https://www.openwall.com/lists/oss-security/2019/09/11/7
Closed bugs
Closed vulnerabilities
BDU:2019-04775
Уязвимость компонента защищённого доступа Wi-Fi WPA Supplicant, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-16275
hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range.
- [oss-security] 20190912 Re: hostapd/wpa_supplicant: AP mode PMF disconnection protection bypass
- [oss-security] 20190912 Re: hostapd/wpa_supplicant: AP mode PMF disconnection protection bypass
- [debian-lts-announce] 20190916 [SECURITY] [DLA 1922-1] wpa security update
- [debian-lts-announce] 20190916 [SECURITY] [DLA 1922-1] wpa security update
- FEDORA-2019-0e0b28001d
- FEDORA-2019-0e0b28001d
- FEDORA-2019-65509aac53
- FEDORA-2019-65509aac53
- FEDORA-2019-740834c559
- FEDORA-2019-740834c559
- FEDORA-2019-2bdcccee3c
- FEDORA-2019-2bdcccee3c
- FEDORA-2019-2265b5ae86
- FEDORA-2019-2265b5ae86
- 20190929 [SECURITY] [DSA 4538-1] wpa security update
- 20190929 [SECURITY] [DSA 4538-1] wpa security update
- USN-4136-1
- USN-4136-1
- USN-4136-2
- USN-4136-2
- https://w1.fi/security/2019-7/
- https://w1.fi/security/2019-7/
- https://w1.fi/security/2019-7/ap-mode-pmf-disconnection-protection-bypass.txt
- https://w1.fi/security/2019-7/ap-mode-pmf-disconnection-protection-bypass.txt
- DSA-4538
- DSA-4538
- https://www.openwall.com/lists/oss-security/2019/09/11/7
- https://www.openwall.com/lists/oss-security/2019/09/11/7
Closed bugs
Package firefox-esr updated to version 78.4.0-alt1 for branch sisyphus in task 260143.
Closed vulnerabilities
BDU:2021-01486
Уязвимость реализации технологии WebRTC программных средств Google Chrome, Firefox, Firefox-ESR и Thunderbird, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-05797
Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR и почтового клиента Thunderbird, связанная с копированием буфера без проверки размера входных данных, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2020-15683
Mozilla developers and community members reported memory safety bugs present in Firefox 81 and Firefox ESR 78.3. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 78.4, Firefox < 82, and Thunderbird < 78.4.
- openSUSE-SU-2020:1732
- openSUSE-SU-2020:1732
- openSUSE-SU-2020:1748
- openSUSE-SU-2020:1748
- openSUSE-SU-2020:1780
- openSUSE-SU-2020:1780
- openSUSE-SU-2020:1785
- openSUSE-SU-2020:1785
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1576843%2C1656987%2C1660954%2C1662760%2C1663439%2C1666140
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1576843%2C1656987%2C1660954%2C1662760%2C1663439%2C1666140
- [debian-lts-announce] 20201027 [SECURITY] [DLA 2416-1] thunderbird security update
- [debian-lts-announce] 20201027 [SECURITY] [DLA 2416-1] thunderbird security update
- GLSA-202010-08
- GLSA-202010-08
- DSA-4780
- DSA-4780
- https://www.mozilla.org/security/advisories/mfsa2020-45/
- https://www.mozilla.org/security/advisories/mfsa2020-45/
- https://www.mozilla.org/security/advisories/mfsa2020-46/
- https://www.mozilla.org/security/advisories/mfsa2020-46/
- https://www.mozilla.org/security/advisories/mfsa2020-47/
- https://www.mozilla.org/security/advisories/mfsa2020-47/
Modified: 2024-11-21
CVE-2020-15969
Use after free in WebRTC in Google Chrome prior to 86.0.4240.75 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- openSUSE-SU-2020:1829
- openSUSE-SU-2020:1829
- 20201215 APPLE-SA-2020-12-14-1 iOS 14.3 and iPadOS 14.3
- 20201215 APPLE-SA-2020-12-14-1 iOS 14.3 and iPadOS 14.3
- 20201215 APPLE-SA-2020-12-14-3 macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave
- 20201215 APPLE-SA-2020-12-14-3 macOS Big Sur 11.1, Security Update 2020-001 Catalina, Security Update 2020-007 Mojave
- 20201215 APPLE-SA-2020-12-14-5 watchOS 7.2
- 20201215 APPLE-SA-2020-12-14-5 watchOS 7.2
- 20201215 APPLE-SA-2020-12-14-7 tvOS 14.3
- 20201215 APPLE-SA-2020-12-14-7 tvOS 14.3
- 20201215 APPLE-SA-2020-12-14-8 Safari 14.0.2
- 20201215 APPLE-SA-2020-12-14-8 Safari 14.0.2
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2020/10/stable-channel-update-for-desktop.html
- https://crbug.com/1124659
- https://crbug.com/1124659
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-8aca25b5c8
- FEDORA-2020-127d40f1ab
- FEDORA-2020-127d40f1ab
- FEDORA-2020-4e8e48da22
- FEDORA-2020-4e8e48da22
- GLSA-202101-30
- GLSA-202101-30
- https://support.apple.com/kb/HT212003
- https://support.apple.com/kb/HT212003
- https://support.apple.com/kb/HT212005
- https://support.apple.com/kb/HT212005
- https://support.apple.com/kb/HT212007
- https://support.apple.com/kb/HT212007
- https://support.apple.com/kb/HT212009
- https://support.apple.com/kb/HT212009
- https://support.apple.com/kb/HT212011
- https://support.apple.com/kb/HT212011
- DSA-4824
- DSA-4824