ALT-BU-2020-4198-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2018-01132
Уязвимость функции fax_notify_mail пакета mgetty операционных систем Red Hat Enterprise Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-00618
Уязвимость функции do_activate() пакета mgetty, позволяющая нарушителю выполнить произвольные команды
Modified: 2024-11-21
CVE-2018-16741
An issue was discovered in mgetty before 1.2.1. In fax/faxq-helper.c, the function do_activate() does not properly sanitize shell metacharacters to prevent command injection. It is possible to use the ||, &&, or > characters within a file created by the "faxq-helper activate
Modified: 2024-11-21
CVE-2018-16742
An issue was discovered in mgetty before 1.2.1. In contrib/scrts.c, a stack-based buffer overflow can be triggered via a command-line parameter.
Modified: 2024-11-21
CVE-2018-16743
An issue was discovered in mgetty before 1.2.1. In contrib/next-login/login.c, the command-line parameter username is passed unsanitized to strcpy(), which can cause a stack-based buffer overflow.
Modified: 2024-11-21
CVE-2018-16744
An issue was discovered in mgetty before 1.2.1. In fax_notify_mail() in faxrec.c, the mail_to parameter is not sanitized. It could allow for command injection if untrusted input can reach it, because popen is used.
Modified: 2024-11-21
CVE-2018-16745
An issue was discovered in mgetty before 1.2.1. In fax_notify_mail() in faxrec.c, the mail_to parameter is not sanitized. It could allow a buffer overflow if long untrusted input can reach it.
Modified: 2024-11-21
CVE-2019-1010189
mgetty prior to version 1.2.1 is affected by: Infinite Loop. The impact is: DoS, the program does never terminates. The component is: g3/g32pbm.c. The attack vector is: Local, the user should open a specially crafted file. The fixed version is: 1.2.1.
Modified: 2024-11-21
CVE-2019-1010190
mgetty prior to 1.2.1 is affected by: out-of-bounds read. The impact is: DoS, the program may crash if the memory is not mapped. The component is: putwhitespan() in g3/pbm2g3.c. The attack vector is: Local, the victim must open a specially crafted file. The fixed version is: 1.2.1.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-9430
Stack-based buffer overflow in dnstracer through 1.9 allows attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a command line with a long name argument that is mishandled in a strcpy call for argv[0]. An example threat model is a web application that launches dnstracer with an untrusted name string.
Closed vulnerabilities
BDU:2020-03566
Уязвимость функции memcpy библиотеки glibc, позволяющая нарушителю выполнить произвольный код в контексте привилегированного процесса
BDU:2020-04683
Уязвимость утилиты iconv системной библиотеки GNU C Library (glibc), связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03561
Уязвимость функции wordexp() библиотеки, обеспечивающей системные вызовы и основные функции glibc, позволяющая нарушителю читать произвольные файлы
BDU:2021-06406
Уязвимость утилиты iconv системной библиотеки GNU C Library (glibc), связанная с переходом программы в бесконечный цикл, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-01635
Уязвимость функции getcwd() системной библиотеки glibc, позволяющая нарушителю выполнить произвольный код
BDU:2022-05763
Уязвимость системной библиотеки GNU C Library, связанная с ошибками инициализации памяти, позволяющая нарушителю получить доступ к конфиденциальным данным
Modified: 2024-11-21
CVE-2016-10228
The iconv program in the GNU C Library (aka glibc or libc6) 2.31 and earlier, when invoked with multiple suffixes in the destination encoding (TRANSLATE or IGNORE) along with the -c option, enters an infinite loop when processing invalid multi-byte input sequences, leading to a denial of service.
- http://openwall.com/lists/oss-security/2017/03/01/10
- http://openwall.com/lists/oss-security/2017/03/01/10
- 96525
- 96525
- [mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar
- [mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar
- [debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update
- [debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update
- GLSA-202101-20
- GLSA-202101-20
- https://sourceware.org/bugzilla/show_bug.cgi?id=19519
- https://sourceware.org/bugzilla/show_bug.cgi?id=19519
- https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
- https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
- https://sourceware.org/bugzilla/show_bug.cgi?id=26224
- https://sourceware.org/bugzilla/show_bug.cgi?id=26224
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
Modified: 2024-11-21
CVE-2019-19126
On the x86-64 architecture, the GNU C Library (aka glibc) before 2.31 fails to ignore the LD_PREFER_MAP_32BIT_EXEC environment variable during program execution after a security transition, allowing local attackers to restrict the possible mapping addresses for loaded libraries and thus bypass ASLR for a setuid program.
- [debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update
- [debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update
- FEDORA-2020-c32e4b271c
- FEDORA-2020-c32e4b271c
- FEDORA-2020-1a3bdfde17
- FEDORA-2020-1a3bdfde17
- https://sourceware.org/bugzilla/show_bug.cgi?id=25204
- https://sourceware.org/bugzilla/show_bug.cgi?id=25204
- USN-4416-1
- USN-4416-1
Modified: 2024-11-21
CVE-2020-1751
An out-of-bounds write vulnerability was found in glibc before 2.31 when handling signal trampolines on PowerPC. Specifically, the backtrace function did not properly check the array bounds when storing the frame address, resulting in a denial of service or potential code execution. The highest threat from this vulnerability is to system availability.
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
- GLSA-202006-04
- GLSA-202006-04
- https://security.netapp.com/advisory/ntap-20200430-0002/
- https://security.netapp.com/advisory/ntap-20200430-0002/
- https://sourceware.org/bugzilla/show_bug.cgi?id=25423
- https://sourceware.org/bugzilla/show_bug.cgi?id=25423
- USN-4416-1
- USN-4416-1
Modified: 2024-11-21
CVE-2020-27618
The iconv function in the GNU C Library (aka glibc or libc6) 2.32 and earlier, when processing invalid multi-byte input sequences in IBM1364, IBM1371, IBM1388, IBM1390, and IBM1399 encodings, fails to advance the input state, which could lead to an infinite loop in applications, resulting in a denial of service, a different vulnerability from CVE-2016-10228.
- [debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update
- [debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update
- GLSA-202107-07
- GLSA-202107-07
- https://security.netapp.com/advisory/ntap-20210401-0006/
- https://security.netapp.com/advisory/ntap-20210401-0006/
- https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
- https://sourceware.org/bugzilla/show_bug.cgi?id=19519#c21
- https://sourceware.org/bugzilla/show_bug.cgi?id=26224
- https://sourceware.org/bugzilla/show_bug.cgi?id=26224
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
Modified: 2024-11-21
CVE-2020-6096
An exploitable signed comparison vulnerability exists in the ARMv7 memcpy() implementation of GNU glibc 2.30.9000. Calling memcpy() (on ARMv7 targets that utilize the GNU glibc implementation) with a negative value for the 'num' parameter results in a signed comparison vulnerability. If an attacker underflows the 'num' parameter to memcpy(), this vulnerability could lead to undefined behavior such as writing to out-of-bounds memory and potentially remote code execution. Furthermore, this memcpy() implementation allows for program execution to continue in scenarios where a segmentation fault or crash should have occurred. The dangers occur in that subsequent execution and iterations of this code will be executed with this corrupted data.
- [mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar
- [mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar
- [debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update
- [debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update
- FEDORA-2020-4e92a61688
- FEDORA-2020-4e92a61688
- FEDORA-2020-d860479b2a
- FEDORA-2020-d860479b2a
- GLSA-202101-20
- GLSA-202101-20
- https://sourceware.org/bugzilla/show_bug.cgi?id=25620
- https://sourceware.org/bugzilla/show_bug.cgi?id=25620
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2020-1019
Modified: 2024-11-21
CVE-2021-35942
The wordexp function in the GNU C Library (aka glibc) through 2.33 may crash or read arbitrary memory in parse_param (in posix/wordexp.c) when called with an untrusted, crafted pattern, potentially resulting in a denial of service or disclosure of information. This occurs because atoi was used but strtoul should have been used to ensure correct calculations.
- [debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update
- [debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update
- GLSA-202208-24
- GLSA-202208-24
- https://security.netapp.com/advisory/ntap-20210827-0005/
- https://security.netapp.com/advisory/ntap-20210827-0005/
- https://sourceware.org/bugzilla/show_bug.cgi?id=28011
- https://sourceware.org/bugzilla/show_bug.cgi?id=28011
- https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=5adda61f62b77384718b4c0d8336ade8f2b4b35c
- https://sourceware.org/git/?p=glibc.git%3Ba=commit%3Bh=5adda61f62b77384718b4c0d8336ade8f2b4b35c
- https://sourceware.org/glibc/wiki/Security%20Exceptions
- https://sourceware.org/glibc/wiki/Security%20Exceptions
Modified: 2024-11-21
CVE-2021-3999
A flaw was found in glibc. An off-by-one buffer overflow and underflow in getcwd() may lead to memory corruption when the size of the buffer is exactly 1. A local attacker who can control the input buffer and size passed to getcwd() in a setuid program could use this flaw to potentially execute arbitrary code and escalate their privileges on the system.
- https://access.redhat.com/security/cve/CVE-2021-3999
- https://access.redhat.com/security/cve/CVE-2021-3999
- https://bugzilla.redhat.com/show_bug.cgi?id=2024637
- https://bugzilla.redhat.com/show_bug.cgi?id=2024637
- [debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update
- [debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update
- https://security.netapp.com/advisory/ntap-20221104-0001/
- https://security.netapp.com/advisory/ntap-20221104-0001/
- https://security-tracker.debian.org/tracker/CVE-2021-3999
- https://security-tracker.debian.org/tracker/CVE-2021-3999
- https://sourceware.org/bugzilla/show_bug.cgi?id=28769
- https://sourceware.org/bugzilla/show_bug.cgi?id=28769
- https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=23e0e8f5f1fb5ed150253d986ecccdc90c2dcd5e
- https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=23e0e8f5f1fb5ed150253d986ecccdc90c2dcd5e
- https://www.openwall.com/lists/oss-security/2022/01/24/4
- https://www.openwall.com/lists/oss-security/2022/01/24/4
Closed bugs
Некорректно отображается пункт программы в меню xfce: значение поля Comment на английском
Closed vulnerabilities
BDU:2020-05894
Уязвимость эмулятора аппаратного обеспечения QEMU, связанная с разыменовыванием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05895
Уязвимость эмулятора аппаратного обеспечения QEMU, связанная с разыменовыванием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-00072
Уязвимость множества функцийи из hw/usb/core.c эмулятора аппаратного обеспечения QEMU, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-05249
Уязвимость функции ide_atapi_cmd_reply_end эмулятора аппаратного обеспечения QEMU, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
BDU:2021-05257
Уязвимость эмуляции USB EHCI эмулятора аппаратного обеспечения QEMU, связанная с неправильным учетом ресурсов внешних эмуляторов, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-05312
Уязвимость API эмулятора аппаратного обеспечения QEMU, связанная с записью за границами буфера, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05834
Уязвимость функции dwc2_handle_packet компонента hw/usb/hcd-dwc2.c эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-14364
An out-of-bounds read/write access flaw was found in the USB emulator of the QEMU in versions before 5.2.0. This issue occurs while processing USB packets from a guest when USBDevice 'setup_len' exceeds its 'data_buf[4096]' in the do_token_in, do_token_out routines. This flaw allows a guest user to crash the QEMU process, resulting in a denial of service, or the potential execution of arbitrary code with the privileges of the QEMU process on the host.
- openSUSE-SU-2020:1664
- openSUSE-SU-2020:1664
- https://bugzilla.redhat.com/show_bug.cgi?id=1869201
- https://bugzilla.redhat.com/show_bug.cgi?id=1869201
- [debian-lts-announce] 20200913 [SECURITY] [DLA 2373-1] qemu security update
- [debian-lts-announce] 20200913 [SECURITY] [DLA 2373-1] qemu security update
- FEDORA-2020-3689b67b53
- FEDORA-2020-3689b67b53
- FEDORA-2020-eeb29955ed
- FEDORA-2020-eeb29955ed
- GLSA-202009-14
- GLSA-202009-14
- GLSA-202011-09
- GLSA-202011-09
- https://security.netapp.com/advisory/ntap-20200924-0006/
- https://security.netapp.com/advisory/ntap-20200924-0006/
- USN-4511-1
- USN-4511-1
- DSA-4760
- DSA-4760
- https://www.openwall.com/lists/oss-security/2020/08/24/2
- https://www.openwall.com/lists/oss-security/2020/08/24/2
- https://www.openwall.com/lists/oss-security/2020/08/24/3
- https://www.openwall.com/lists/oss-security/2020/08/24/3
Modified: 2024-11-21
CVE-2020-25723
A reachable assertion issue was found in the USB EHCI emulation code of QEMU. It could occur while processing USB requests due to missing handling of DMA memory map failure. A malicious privileged user within the guest may abuse this flaw to send bogus USB requests and crash the QEMU process on the host, resulting in a denial of service.
- [oss-security] 20201222 CVE-2020-25723 QEMU: assertion failure through usb_packet_unmap() in hw/usb/hcd-ehci.c
- [oss-security] 20201222 CVE-2020-25723 QEMU: assertion failure through usb_packet_unmap() in hw/usb/hcd-ehci.c
- https://bugzilla.redhat.com/show_bug.cgi?id=1898579
- https://bugzilla.redhat.com/show_bug.cgi?id=1898579
- [debian-lts-announce] 20220905 [SECURITY] [DLA 3099-1] qemu security update
- [debian-lts-announce] 20220905 [SECURITY] [DLA 3099-1] qemu security update
- https://security.netapp.com/advisory/ntap-20201218-0004/
- https://security.netapp.com/advisory/ntap-20201218-0004/
Modified: 2024-11-21
CVE-2020-25742
pci_change_irq_level in hw/pci/pci.c in QEMU before 5.1.1 has a NULL pointer dereference because pci_get_bus() might not return a valid pointer.
- http://www.openwall.com/lists/oss-security/2020/09/29/1
- http://www.openwall.com/lists/oss-security/2020/09/29/1
- https://bugzilla.redhat.com/show_bug.cgi?id=1883178
- https://bugzilla.redhat.com/show_bug.cgi?id=1883178
- https://lists.nongnu.org/archive/html/qemu-devel/2020-09/msg05294.html
- https://lists.nongnu.org/archive/html/qemu-devel/2020-09/msg05294.html
- https://ruhr-uni-bochum.sciebo.de/s/NNWP2GfwzYKeKwE?path=%2Flsi_nullptr1
- https://ruhr-uni-bochum.sciebo.de/s/NNWP2GfwzYKeKwE?path=%2Flsi_nullptr1
Modified: 2024-11-21
CVE-2020-25743
hw/ide/pci.c in QEMU before 5.1.1 can trigger a NULL pointer dereference because it lacks a pointer check before an ide_cancel_dma_sync call.
- http://www.openwall.com/lists/oss-security/2020/09/29/1
- http://www.openwall.com/lists/oss-security/2020/09/29/1
- https://bugzilla.redhat.com/show_bug.cgi?id=1881409
- https://bugzilla.redhat.com/show_bug.cgi?id=1881409
- https://lists.nongnu.org/archive/html/qemu-devel/2020-09/msg05967.html
- https://lists.nongnu.org/archive/html/qemu-devel/2020-09/msg05967.html
- https://ruhr-uni-bochum.sciebo.de/s/NNWP2GfwzYKeKwE?path=%2Fide_nullptr1b
- https://ruhr-uni-bochum.sciebo.de/s/NNWP2GfwzYKeKwE?path=%2Fide_nullptr1b
Modified: 2024-11-21
CVE-2020-27661
A divide-by-zero issue was found in dwc2_handle_packet in hw/usb/hcd-dwc2.c in the hcd-dwc2 USB host controller emulation of QEMU. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service.
- https://bugzilla.redhat.com/show_bug.cgi?id=1890653
- https://bugzilla.redhat.com/show_bug.cgi?id=1890653
- https://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=bea2a9e3e00b275dc40cfa09c760c715b8753e03
- https://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=bea2a9e3e00b275dc40cfa09c760c715b8753e03
- https://lists.nongnu.org/archive/html/qemu-devel/2020-10/msg04263.html
- https://lists.nongnu.org/archive/html/qemu-devel/2020-10/msg04263.html
- https://security.netapp.com/advisory/ntap-20210720-0010/
- https://security.netapp.com/advisory/ntap-20210720-0010/
- https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1770368.html
- https://www.mail-archive.com/debian-bugs-dist%40lists.debian.org/msg1770368.html
Modified: 2024-11-21
CVE-2020-27821
A flaw was found in the memory management API of QEMU during the initialization of a memory region cache. This issue could lead to an out-of-bounds write access to the MSI-X table while performing MMIO operations. A guest user may abuse this flaw to crash the QEMU process on the host, resulting in a denial of service. This flaw affects QEMU versions prior to 5.2.0.
- [oss-security] 20201216 CVE-2020-27821 QEMU: heap buffer overflow in msix_table_mmio_write() in hw/pci/msix.c
- [oss-security] 20201216 CVE-2020-27821 QEMU: heap buffer overflow in msix_table_mmio_write() in hw/pci/msix.c
- https://bugzilla.redhat.com/show_bug.cgi?id=1902651
- https://bugzilla.redhat.com/show_bug.cgi?id=1902651
- [debian-lts-announce] 20220905 [SECURITY] [DLA 3099-1] qemu security update
- [debian-lts-announce] 20220905 [SECURITY] [DLA 3099-1] qemu security update
- https://security.netapp.com/advisory/ntap-20210115-0006/
- https://security.netapp.com/advisory/ntap-20210115-0006/
Modified: 2024-11-21
CVE-2020-29443
ide_atapi_cmd_reply_end in hw/ide/atapi.c in QEMU 5.1.0 allows out-of-bounds read access because a buffer index is not validated.
- http://www.openwall.com/lists/oss-security/2021/01/18/2
- http://www.openwall.com/lists/oss-security/2021/01/18/2
- [debian-lts-announce] 20210218 [SECURITY] [DLA 2560-1] qemu security update
- [debian-lts-announce] 20210218 [SECURITY] [DLA 2560-1] qemu security update
- [debian-lts-announce] 20220905 [SECURITY] [DLA 3099-1] qemu security update
- [debian-lts-announce] 20220905 [SECURITY] [DLA 3099-1] qemu security update
- https://lists.nongnu.org/archive/html/qemu-devel/2020-11/msg04685.html
- https://lists.nongnu.org/archive/html/qemu-devel/2020-11/msg04685.html
- https://security.netapp.com/advisory/ntap-20210304-0003/
- https://security.netapp.com/advisory/ntap-20210304-0003/
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-5208
Integer overflow in the wrestool program in icoutils before 0.31.1 allows remote attackers to cause a denial of service (memory corruption) via a crafted executable, which triggers a denial of service (application crash) or the possibility of execution of arbitrary code.
- RHSA-2017:0837
- RHSA-2017:0837
- DSA-3756
- DSA-3756
- [oss-security] 20170108 Re: CVE Request: icoutils: exploitable crash in wrestool programm
- [oss-security] 20170108 Re: CVE Request: icoutils: exploitable crash in wrestool programm
- 95315
- 95315
- https://bugzilla.redhat.com/show_bug.cgi?id=1411251
- https://bugzilla.redhat.com/show_bug.cgi?id=1411251
- GLSA-201801-12
- GLSA-201801-12
Modified: 2024-11-21
CVE-2017-5331
Integer overflow in the check_offset function in b/wrestool/fileread.c in icoutils before 0.31.1 allows local users to cause a denial of service (process crash) and execute arbitrary code via a crafted executable.
- openSUSE-SU-2017:0166
- openSUSE-SU-2017:0166
- openSUSE-SU-2017:0167
- openSUSE-SU-2017:0167
- openSUSE-SU-2017:0168
- openSUSE-SU-2017:0168
- DSA-3765
- DSA-3765
- [oss-security] 20170110 Re: CVE Request: icoutils: exploitable crash in wrestool programm
- [oss-security] 20170110 Re: CVE Request: icoutils: exploitable crash in wrestool programm
- 95378
- 95378
- USN-3178-1
- USN-3178-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1412248
- https://bugzilla.redhat.com/show_bug.cgi?id=1412248
Modified: 2024-11-21
CVE-2017-5332
The extract_group_icon_cursor_resource in wrestool/extract.c in icoutils before 0.31.1 can access unallocated memory, which allows local users to cause a denial of service (process crash) and execute arbitrary code via a crafted executable.
- openSUSE-SU-2017:0166
- openSUSE-SU-2017:0166
- openSUSE-SU-2017:0167
- openSUSE-SU-2017:0167
- openSUSE-SU-2017:0168
- openSUSE-SU-2017:0168
- RHSA-2017:0837
- RHSA-2017:0837
- DSA-3765
- DSA-3765
- [oss-security] 20170110 Re: CVE Request: icoutils: exploitable crash in wrestool programm
- [oss-security] 20170110 Re: CVE Request: icoutils: exploitable crash in wrestool programm
- 95380
- 95380
- USN-3178-1
- USN-3178-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1412263
- https://bugzilla.redhat.com/show_bug.cgi?id=1412263
- https://git.savannah.gnu.org/cgit/icoutils.git/commit/?id=1aa9f28f7bcbdfff6a84a15ac8d9a87559b1596a
- https://git.savannah.gnu.org/cgit/icoutils.git/commit/?id=1aa9f28f7bcbdfff6a84a15ac8d9a87559b1596a
Modified: 2024-11-21
CVE-2017-5333
Integer overflow in the extract_group_icon_cursor_resource function in b/wrestool/extract.c in icoutils before 0.31.1 allows local users to cause a denial of service (process crash) or execute arbitrary code via a crafted executable file.
- openSUSE-SU-2017:0166
- openSUSE-SU-2017:0166
- openSUSE-SU-2017:0167
- openSUSE-SU-2017:0167
- openSUSE-SU-2017:0168
- openSUSE-SU-2017:0168
- RHSA-2017:0837
- RHSA-2017:0837
- DSA-3765
- DSA-3765
- [oss-security] 20170110 Re: CVE Request: icoutils: exploitable crash in wrestool programm
- [oss-security] 20170110 Re: CVE Request: icoutils: exploitable crash in wrestool programm
- 95678
- 95678
- USN-3178-1
- USN-3178-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1412259
- https://bugzilla.redhat.com/show_bug.cgi?id=1412259
- https://git.savannah.gnu.org/cgit/icoutils.git/commit/?id=1a108713ac26215c7568353f6e02e727e6d4b24a
- https://git.savannah.gnu.org/cgit/icoutils.git/commit/?id=1a108713ac26215c7568353f6e02e727e6d4b24a
Closed vulnerabilities
BDU:2021-01188
Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2021-01231
Уязвимость реализации функции isExceptionPending() браузера Mozilla Firefox, позволяющая нарушителю выполнить произвольный код
BDU:2021-01239
Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с записью данных за границами буфера в памяти, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2021-01240
Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, связанная с недостатками разграничения доступа, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2022-05940
Уязвимость браузера Mozilla Firefox для Android, связанная с недостатками разграничения доступа, позволяющая нарушителю обойти существующие ограничения безопасности
Modified: 2024-11-21
CVE-2020-16042
Uninitialized Use in V8 in Google Chrome prior to 87.0.4280.88 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
Modified: 2024-11-21
CVE-2020-26971
Certain blit values provided by the user were not properly constrained leading to a heap buffer overflow on some video drivers. This vulnerability affects Firefox < 84, Thunderbird < 78.6, and Firefox ESR < 78.6.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1663466
- https://bugzilla.mozilla.org/show_bug.cgi?id=1663466
- https://www.mozilla.org/security/advisories/mfsa2020-54/
- https://www.mozilla.org/security/advisories/mfsa2020-54/
- https://www.mozilla.org/security/advisories/mfsa2020-55/
- https://www.mozilla.org/security/advisories/mfsa2020-55/
- https://www.mozilla.org/security/advisories/mfsa2020-56/
- https://www.mozilla.org/security/advisories/mfsa2020-56/
Modified: 2024-11-21
CVE-2020-26972
The lifecycle of IPC Actors allows managed actors to outlive their manager actors; and the former must ensure that they are not attempting to use a dead actor they have a reference to. Such a check was omitted in WebGL, resulting in a use-after-free and a potentially exploitable crash. This vulnerability affects Firefox < 84.
Modified: 2024-11-21
CVE-2020-26973
Certain input to the CSS Sanitizer confused it, resulting in incorrect components being removed. This could have been used as a sanitizer bypass. This vulnerability affects Firefox < 84, Thunderbird < 78.6, and Firefox ESR < 78.6.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1680084
- https://bugzilla.mozilla.org/show_bug.cgi?id=1680084
- https://www.mozilla.org/security/advisories/mfsa2020-54/
- https://www.mozilla.org/security/advisories/mfsa2020-54/
- https://www.mozilla.org/security/advisories/mfsa2020-55/
- https://www.mozilla.org/security/advisories/mfsa2020-55/
- https://www.mozilla.org/security/advisories/mfsa2020-56/
- https://www.mozilla.org/security/advisories/mfsa2020-56/
Modified: 2024-11-21
CVE-2020-26974
When flex-basis was used on a table wrapper, a StyleGenericFlexBasis object could have been incorrectly cast to the wrong type. This resulted in a heap user-after-free, memory corruption, and a potentially exploitable crash. This vulnerability affects Firefox < 84, Thunderbird < 78.6, and Firefox ESR < 78.6.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1681022
- https://bugzilla.mozilla.org/show_bug.cgi?id=1681022
- https://www.mozilla.org/security/advisories/mfsa2020-54/
- https://www.mozilla.org/security/advisories/mfsa2020-54/
- https://www.mozilla.org/security/advisories/mfsa2020-55/
- https://www.mozilla.org/security/advisories/mfsa2020-55/
- https://www.mozilla.org/security/advisories/mfsa2020-56/
- https://www.mozilla.org/security/advisories/mfsa2020-56/
Modified: 2024-11-21
CVE-2020-26975
When a malicious application installed on the user's device broadcast an Intent to Firefox for Android, arbitrary headers could have been specified, leading to attacks such as abusing ambient authority or session fixation. This was resolved by only allowing certain safe-listed headers. *Note: This issue only affected Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 84.
Modified: 2024-11-21
CVE-2020-26976
When a HTTPS pages was embedded in a HTTP page, and there was a service worker registered for the former, the service worker could have intercepted the request for the secure page despite the iframe not being a secure context due to the (insecure) framing. This vulnerability affects Firefox < 84.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1674343
- https://bugzilla.mozilla.org/show_bug.cgi?id=1674343
- [debian-lts-announce] 20210202 [SECURITY] [DLA 2539-1] firefox-esr security update
- [debian-lts-announce] 20210202 [SECURITY] [DLA 2539-1] firefox-esr security update
- [debian-lts-announce] 20210202 [SECURITY] [DLA 2541-1] thunderbird security update
- [debian-lts-announce] 20210202 [SECURITY] [DLA 2541-1] thunderbird security update
- GLSA-202102-02
- GLSA-202102-02
- DSA-4840
- DSA-4840
- DSA-4842
- DSA-4842
- https://www.mozilla.org/security/advisories/mfsa2020-54/
- https://www.mozilla.org/security/advisories/mfsa2020-54/
Modified: 2024-11-21
CVE-2020-26977
By attempting to connect a website using an unresponsive port, an attacker could have controlled the content of a tab while the URL bar displayed the original domain. *Note: This issue only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 84.
Modified: 2024-11-21
CVE-2020-26978
Using techniques that built on the slipstream research, a malicious webpage could have exposed both an internal network's hosts as well as services running on the user's local machine. This vulnerability affects Firefox < 84, Thunderbird < 78.6, and Firefox ESR < 78.6.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1677047
- https://bugzilla.mozilla.org/show_bug.cgi?id=1677047
- https://www.mozilla.org/security/advisories/mfsa2020-54/
- https://www.mozilla.org/security/advisories/mfsa2020-54/
- https://www.mozilla.org/security/advisories/mfsa2020-55/
- https://www.mozilla.org/security/advisories/mfsa2020-55/
- https://www.mozilla.org/security/advisories/mfsa2020-56/
- https://www.mozilla.org/security/advisories/mfsa2020-56/
Modified: 2024-11-21
CVE-2020-26979
When a user typed a URL in the address bar or the search bar and quickly hit the enter key, a website could sometimes capture that event and then redirect the user before navigation occurred to the desired, entered address. To construct a convincing spoof the attacker would have had to guess what the user was typing, perhaps by suggesting it. This vulnerability affects Firefox < 84.
Modified: 2024-11-21
CVE-2020-35111
When an extension with the proxy permission registered to receive
- https://bugzilla.mozilla.org/show_bug.cgi?id=1657916
- https://bugzilla.mozilla.org/show_bug.cgi?id=1657916
- https://www.mozilla.org/security/advisories/mfsa2020-54/
- https://www.mozilla.org/security/advisories/mfsa2020-54/
- https://www.mozilla.org/security/advisories/mfsa2020-55/
- https://www.mozilla.org/security/advisories/mfsa2020-55/
- https://www.mozilla.org/security/advisories/mfsa2020-56/
- https://www.mozilla.org/security/advisories/mfsa2020-56/
Modified: 2024-11-21
CVE-2020-35112
If a user downloaded a file lacking an extension on Windows, and then "Open"-ed it from the downloads panel, if there was an executable file in the downloads directory with the same name but with an executable extension (such as .bat or .exe) that executable would have been launched instead. *Note: This issue only affected Windows operating systems. Other operating systems are unaffected.*. This vulnerability affects Firefox < 84, Thunderbird < 78.6, and Firefox ESR < 78.6.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1661365
- https://bugzilla.mozilla.org/show_bug.cgi?id=1661365
- https://www.mozilla.org/security/advisories/mfsa2020-54/
- https://www.mozilla.org/security/advisories/mfsa2020-54/
- https://www.mozilla.org/security/advisories/mfsa2020-55/
- https://www.mozilla.org/security/advisories/mfsa2020-55/
- https://www.mozilla.org/security/advisories/mfsa2020-56/
- https://www.mozilla.org/security/advisories/mfsa2020-56/
Modified: 2024-11-21
CVE-2020-35113
Mozilla developers reported memory safety bugs present in Firefox 83 and Firefox ESR 78.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 84, Thunderbird < 78.6, and Firefox ESR < 78.6.
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1664831%2C1673589
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1664831%2C1673589
- https://www.mozilla.org/security/advisories/mfsa2020-54/
- https://www.mozilla.org/security/advisories/mfsa2020-54/
- https://www.mozilla.org/security/advisories/mfsa2020-55/
- https://www.mozilla.org/security/advisories/mfsa2020-55/
- https://www.mozilla.org/security/advisories/mfsa2020-56/
- https://www.mozilla.org/security/advisories/mfsa2020-56/
Modified: 2024-11-21
CVE-2020-35114
Mozilla developers reported memory safety bugs present in Firefox 83. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 84.
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1607449%2C1640416%2C1656459%2C1669914%2C1673567
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1607449%2C1640416%2C1656459%2C1669914%2C1673567
- https://www.mozilla.org/security/advisories/mfsa2020-54/
- https://www.mozilla.org/security/advisories/mfsa2020-54/
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-1000418
The WildMidi_Open function in WildMIDI since commit d8a466829c67cacbb1700beded25c448d99514e5 allows remote attackers to cause a denial of service (heap-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted file.
Closed vulnerabilities
BDU:2015-02023
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2024-11-21
CVE-2014-0466
The fixps script in a2ps 4.14 does not use the -dSAFER option when executing gs, which allows context-dependent attackers to delete arbitrary files or execute arbitrary commands via a crafted PostScript file.
Modified: 2024-11-21
CVE-2015-8107
Format string vulnerability in GNU a2ps 4.14 allows remote attackers to execute arbitrary code.
Closed vulnerabilities
BDU:2016-00001
Уязвимости загрузчика операционных систем Grub2, позволяющие нарушителю получить конфиденциальную информацию или вызвать отказ в обслуживании
BDU:2020-03625
Уязвимость конфигурационного файла grub.cfg загрузчика операционных систем Grub2, связанная с переполнением буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-03955
Уязвимость реализации функции распределения динамической памяти загрузчика операционных систем Grub2, позволяющая нарушителю оказать влияние на целостность, конфиденциальность и доступность информации
BDU:2020-03968
Уязвимость загрузчика операционных систем Grub2, связанная с целочисленным переполнением значения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-03969
Уязвимость реализации функции read_section_as_string() загрузчика операционных систем Grub2, позволяющая нарушителю оказать влияние на целостность данных или вызвать отказ в обслуживании
BDU:2020-03970
Уязвимость загрузчика операционных систем Grub2, связанная с выходом операции за границы буфера данных, позволяющая нарушителю оказать влияние на целостность данных или вызвать отказ в обслуживании
BDU:2020-03971
Уязвимость реализации функции grub_script_function_create() загрузчика операционных систем Grub2, позволяющая нарушителю получить доступ к конфиденциальным данным, оказать влияние на целостность данных, а также вызвать отказ в обслуживании
BDU:2020-03972
Уязвимость реализации функций grub_cmd_initrd и grub_initrd_init загрузчика операционных систем Grub2, позволяющая нарушителю получить доступ к конфиденциальным данным, оказать влияние на целостность данных, а также вызвать отказ в обслуживании
BDU:2022-05895
Уязвимость реализации протокола безопасной загрузки Secure Boot загрузчика операционных систем Grub2, позволяющая нарушителю выполнить произвольный код и получить полный контроль над устройством
Modified: 2024-11-21
CVE-2015-8370
Multiple integer underflows in Grub2 1.98 through 2.02 allow physically proximate attackers to bypass authentication, obtain sensitive information, or cause a denial of service (disk corruption) via backspace characters in the (1) grub_username_get function in grub-core/normal/auth.c or the (2) grub_password_get function in lib/crypto.c, which trigger an "Off-by-two" or "Out of bounds overwrite" memory error.
- http://hmarco.org/bugs/CVE-2015-8370-Grub2-authentication-bypass.html
- http://hmarco.org/bugs/CVE-2015-8370-Grub2-authentication-bypass.html
- FEDORA-2015-cebe5133e7
- FEDORA-2015-cebe5133e7
- FEDORA-2015-90c27b6e91
- FEDORA-2015-90c27b6e91
- openSUSE-SU-2015:2375
- openSUSE-SU-2015:2375
- SUSE-SU-2015:2385
- SUSE-SU-2015:2385
- SUSE-SU-2015:2386
- SUSE-SU-2015:2386
- SUSE-SU-2015:2387
- SUSE-SU-2015:2387
- openSUSE-SU-2015:2392
- openSUSE-SU-2015:2392
- SUSE-SU-2015:2399
- SUSE-SU-2015:2399
- openSUSE-SU-2016:0036
- openSUSE-SU-2016:0036
- http://packetstormsecurity.com/files/134831/Grub2-Authentication-Bypass.html
- http://packetstormsecurity.com/files/134831/Grub2-Authentication-Bypass.html
- RHSA-2015:2623
- RHSA-2015:2623
- 20151216 Back to 28: Grub2 Authentication Bypass 0-Day [CVE-2015-8370]
- 20151216 Back to 28: Grub2 Authentication Bypass 0-Day [CVE-2015-8370]
- DSA-3421
- DSA-3421
- [oss-security] 20151215 Back to 28: Grub2 Authentication Bypass 0-Day [CVE-2015-8370]
- [oss-security] 20151215 Back to 28: Grub2 Authentication Bypass 0-Day [CVE-2015-8370]
- [oss-security] 20240116 CVE-2023-4001: a password bypass vulnerability in the downstream GRUB boot manager
- [oss-security] 20240116 CVE-2023-4001: a password bypass vulnerability in the downstream GRUB boot manager
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 20151215 Back to 28: Grub2 Authentication Bypass 0-Day [CVE-2015-8370]
- 20151215 Back to 28: Grub2 Authentication Bypass 0-Day [CVE-2015-8370]
- 79358
- 79358
- 1034422
- 1034422
- USN-2836-1
- USN-2836-1
- GLSA-201512-03
- GLSA-201512-03
Modified: 2024-11-21
CVE-2020-10713
A flaw was found in grub2, prior to version 2.06. An attacker may use the GRUB 2 flaw to hijack and tamper the GRUB verification process. This flaw also allows the bypass of Secure Boot protections. In order to load an untrusted or modified kernel, an attacker would first need to establish access to the system such as gaining physical access, obtain the ability to alter a pxe-boot network, or have remote access to a networked system with root access. With this access, an attacker could then craft a string to cause a buffer overflow by injecting a malicious payload that leads to arbitrary code execution within GRUB. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
- openSUSE-SU-2020:1168
- openSUSE-SU-2020:1169
- [oss-security] 20200729 multiple secure boot grub2 and linux kernel vulnerabilities
- https://bugzilla.redhat.com/show_bug.cgi?id=1825243
- https://cve.openeuler.org/#/CVEInfo/CVE-2020-10713
- https://eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/
- https://kb.vmware.com/s/article/80181
- GLSA-202104-05
- https://security.netapp.com/advisory/ntap-20200731-0008/
- 20200804 GRUB2 Arbitrary Code Execution Vulnerability
- USN-4432-1
- DSA-4735
- VU#174059
- openSUSE-SU-2020:1168
- VU#174059
- DSA-4735
- USN-4432-1
- 20200804 GRUB2 Arbitrary Code Execution Vulnerability
- https://security.netapp.com/advisory/ntap-20200731-0008/
- GLSA-202104-05
- https://kb.vmware.com/s/article/80181
- https://eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/
- https://cve.openeuler.org/#/CVEInfo/CVE-2020-10713
- https://bugzilla.redhat.com/show_bug.cgi?id=1825243
- [oss-security] 20200729 multiple secure boot grub2 and linux kernel vulnerabilities
- openSUSE-SU-2020:1169
Modified: 2024-11-21
CVE-2020-14308
In grub2 versions before 2.06 the grub memory allocator doesn't check for possible arithmetic overflows on the requested allocation size. This leads the function to return invalid memory allocations which can be further used to cause possible integrity, confidentiality and availability impacts during the boot process.
- openSUSE-SU-2020:1168
- openSUSE-SU-2020:1168
- openSUSE-SU-2020:1169
- openSUSE-SU-2020:1169
- [oss-security] 20200729 multiple secure boot grub2 and linux kernel vulnerabilities
- [oss-security] 20200729 multiple secure boot grub2 and linux kernel vulnerabilities
- [oss-security] 20210916 Containers-optimized OS (COS) membership in the linux-distros list
- [oss-security] 20210916 Containers-optimized OS (COS) membership in the linux-distros list
- [oss-security] 20210917 Re: Containers-optimized OS (COS) membership in the linux-distros list
- [oss-security] 20210917 Re: Containers-optimized OS (COS) membership in the linux-distros list
- [oss-security] 20210920 Re: Containers-optimized OS (COS) membership in the linux-distros list
- [oss-security] 20210920 Re: Containers-optimized OS (COS) membership in the linux-distros list
- https://bugzilla.redhat.com/show_bug.cgi?id=1852009
- https://bugzilla.redhat.com/show_bug.cgi?id=1852009
- GLSA-202104-05
- GLSA-202104-05
- https://security.netapp.com/advisory/ntap-20200731-0008/
- https://security.netapp.com/advisory/ntap-20200731-0008/
- USN-4432-1
- USN-4432-1
Modified: 2024-11-21
CVE-2020-14309
There's an issue with grub2 in all versions before 2.06 when handling squashfs filesystems containing a symbolic link with name length of UINT32 bytes in size. The name size leads to an arithmetic overflow leading to a zero-size allocation further causing a heap-based buffer overflow with attacker controlled data.
- openSUSE-SU-2020:1168
- openSUSE-SU-2020:1168
- openSUSE-SU-2020:1169
- openSUSE-SU-2020:1169
- https://bugzilla.redhat.com/show_bug.cgi?id=1852022
- https://bugzilla.redhat.com/show_bug.cgi?id=1852022
- GLSA-202104-05
- GLSA-202104-05
- https://security.netapp.com/advisory/ntap-20200731-0008/
- https://security.netapp.com/advisory/ntap-20200731-0008/
- USN-4432-1
- USN-4432-1
Modified: 2024-11-21
CVE-2020-14310
There is an issue on grub2 before version 2.06 at function read_section_as_string(). It expects a font name to be at max UINT32_MAX - 1 length in bytes but it doesn't verify it before proceed with buffer allocation to read the value from the font value. An attacker may leverage that by crafting a malicious font file which has a name with UINT32_MAX, leading to read_section_as_string() to an arithmetic overflow, zero-sized allocation and further heap-based buffer overflow.
Modified: 2024-11-21
CVE-2020-14311
There is an issue with grub2 before version 2.06 while handling symlink on ext filesystems. A filesystem containing a symbolic link with an inode size of UINT32_MAX causes an arithmetic overflow leading to a zero-sized memory allocation with subsequent heap-based buffer overflow.
- openSUSE-SU-2020:1168
- openSUSE-SU-2020:1168
- openSUSE-SU-2020:1169
- openSUSE-SU-2020:1169
- [oss-security] 20210916 Containers-optimized OS (COS) membership in the linux-distros list
- [oss-security] 20210916 Containers-optimized OS (COS) membership in the linux-distros list
- [oss-security] 20210917 Re: Containers-optimized OS (COS) membership in the linux-distros list
- [oss-security] 20210917 Re: Containers-optimized OS (COS) membership in the linux-distros list
- [oss-security] 20210920 Re: Containers-optimized OS (COS) membership in the linux-distros list
- [oss-security] 20210920 Re: Containers-optimized OS (COS) membership in the linux-distros list
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14311
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14311
- GLSA-202104-05
- GLSA-202104-05
- USN-4432-1
- USN-4432-1
Modified: 2024-11-21
CVE-2020-15705
GRUB2 fails to validate kernel signature when booted directly without shim, allowing secure boot to be bypassed. This only affects systems where the kernel signing certificate has been imported directly into the secure boot database and the GRUB image is booted directly without the use of shim. This issue affects GRUB2 version 2.04 and prior versions.
- openSUSE-SU-2020:1280
- openSUSE-SU-2020:1280
- openSUSE-SU-2020:1282
- openSUSE-SU-2020:1282
- http://ubuntu.com/security/notices/USN-4432-1
- http://ubuntu.com/security/notices/USN-4432-1
- [oss-security] 20200729 multiple secure boot grub2 and linux kernel vulnerabilities
- [oss-security] 20200729 multiple secure boot grub2 and linux kernel vulnerabilities
- [oss-security] 20210302 Multiple GRUB2 vulnerabilities
- [oss-security] 20210302 Multiple GRUB2 vulnerabilities
- [oss-security] 20210916 Containers-optimized OS (COS) membership in the linux-distros list
- [oss-security] 20210916 Containers-optimized OS (COS) membership in the linux-distros list
- [oss-security] 20210917 Re: Containers-optimized OS (COS) membership in the linux-distros list
- [oss-security] 20210917 Re: Containers-optimized OS (COS) membership in the linux-distros list
- [oss-security] 20210920 Re: Containers-optimized OS (COS) membership in the linux-distros list
- [oss-security] 20210920 Re: Containers-optimized OS (COS) membership in the linux-distros list
- https://access.redhat.com/security/vulnerabilities/grub2bootloader
- https://access.redhat.com/security/vulnerabilities/grub2bootloader
- https://lists.gnu.org/archive/html/grub-devel/2020-07/msg00034.html
- https://lists.gnu.org/archive/html/grub-devel/2020-07/msg00034.html
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200011
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200011
- GLSA-202104-05
- GLSA-202104-05
- https://security.netapp.com/advisory/ntap-20200731-0008/
- https://security.netapp.com/advisory/ntap-20200731-0008/
- USN-4432-1
- USN-4432-1
- https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass
- https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass
- https://www.debian.org/security/2020-GRUB-UEFI-SecureBoot
- https://www.debian.org/security/2020-GRUB-UEFI-SecureBoot
- https://www.eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/
- https://www.eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/
- https://www.openwall.com/lists/oss-security/2020/07/29/3
- https://www.openwall.com/lists/oss-security/2020/07/29/3
- https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/
- https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/
- https://www.suse.com/support/kb/doc/?id=000019673
- https://www.suse.com/support/kb/doc/?id=000019673
Modified: 2024-11-21
CVE-2020-15706
GRUB2 contains a race condition in grub_script_function_create() leading to a use-after-free vulnerability which can be triggered by redefining a function whilst the same function is already executing, leading to arbitrary code execution and secure boot restriction bypass. This issue affects GRUB2 version 2.04 and prior versions.
- openSUSE-SU-2020:1168
- openSUSE-SU-2020:1168
- openSUSE-SU-2020:1169
- openSUSE-SU-2020:1169
- http://ubuntu.com/security/notices/USN-4432-1
- http://ubuntu.com/security/notices/USN-4432-1
- [oss-security] 20200729 multiple secure boot grub2 and linux kernel vulnerabilities
- [oss-security] 20200729 multiple secure boot grub2 and linux kernel vulnerabilities
- https://access.redhat.com/security/vulnerabilities/grub2bootloader
- https://access.redhat.com/security/vulnerabilities/grub2bootloader
- https://lists.gnu.org/archive/html/grub-devel/2020-07/msg00034.html
- https://lists.gnu.org/archive/html/grub-devel/2020-07/msg00034.html
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200011
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200011
- GLSA-202104-05
- GLSA-202104-05
- https://security.netapp.com/advisory/ntap-20200731-0008/
- https://security.netapp.com/advisory/ntap-20200731-0008/
- USN-4432-1
- USN-4432-1
- https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass
- https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass
- DSA-4735
- DSA-4735
- https://www.debian.org/security/2020-GRUB-UEFI-SecureBoot
- https://www.debian.org/security/2020-GRUB-UEFI-SecureBoot
- https://www.eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/
- https://www.eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/
- https://www.openwall.com/lists/oss-security/2020/07/29/3
- https://www.openwall.com/lists/oss-security/2020/07/29/3
- https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/
- https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/
- https://www.suse.com/support/kb/doc/?id=000019673
- https://www.suse.com/support/kb/doc/?id=000019673
Modified: 2024-11-21
CVE-2020-15707
Integer overflows were discovered in the functions grub_cmd_initrd and grub_initrd_init in the efilinux component of GRUB2, as shipped in Debian, Red Hat, and Ubuntu (the functionality is not included in GRUB2 upstream), leading to a heap-based buffer overflow. These could be triggered by an extremely large number of arguments to the initrd command on 32-bit architectures, or a crafted filesystem with very large files on any architecture. An attacker could use this to execute arbitrary code and bypass UEFI Secure Boot restrictions. This issue affects GRUB2 version 2.04 and prior versions.
- openSUSE-SU-2020:1168
- openSUSE-SU-2020:1168
- openSUSE-SU-2020:1169
- openSUSE-SU-2020:1169
- http://ubuntu.com/security/notices/USN-4432-1
- http://ubuntu.com/security/notices/USN-4432-1
- [oss-security] 20200729 multiple secure boot grub2 and linux kernel vulnerabilities
- [oss-security] 20200729 multiple secure boot grub2 and linux kernel vulnerabilities
- https://access.redhat.com/security/vulnerabilities/grub2bootloader
- https://access.redhat.com/security/vulnerabilities/grub2bootloader
- https://lists.gnu.org/archive/html/grub-devel/2020-07/msg00034.html
- https://lists.gnu.org/archive/html/grub-devel/2020-07/msg00034.html
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200011
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/ADV200011
- GLSA-202104-05
- GLSA-202104-05
- https://security.netapp.com/advisory/ntap-20200731-0008/
- https://security.netapp.com/advisory/ntap-20200731-0008/
- USN-4432-1
- USN-4432-1
- https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass
- https://wiki.ubuntu.com/SecurityTeam/KnowledgeBase/GRUB2SecureBootBypass
- DSA-4735
- DSA-4735
- https://www.debian.org/security/2020-GRUB-UEFI-SecureBoot
- https://www.debian.org/security/2020-GRUB-UEFI-SecureBoot
- https://www.eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/
- https://www.eclypsium.com/2020/07/29/theres-a-hole-in-the-boot/
- https://www.openwall.com/lists/oss-security/2020/07/29/3
- https://www.openwall.com/lists/oss-security/2020/07/29/3
- https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/
- https://www.suse.com/c/suse-addresses-grub2-secure-boot-issue/
- https://www.suse.com/support/kb/doc/?id=000019673
- https://www.suse.com/support/kb/doc/?id=000019673
Package kernel-image-un-def updated to version 5.10.0-alt1 for branch sisyphus in task 263439.
Closed vulnerabilities
BDU:2020-04797
Уязвимость компонента net/bluetooth/l2cap_core.c ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2020-05454
Уязвимость функции sunkbd_reinit() (drivers/input/keyboard/sunkbd.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05539
Уязвимость ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2020-05831
Уязвимость ядра операционной системы Linux, связанная с использованием памяти после её освобождения, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2021-00005
Уязвимость компонента drivers/tty/tty_jobctrl.c ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2021-00006
Уязвимость компонентов drivers/tty/tty_jobctrl.c и drivers/tty/tty_io.c ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2021-01617
Уязвимость функции can_optimize (arch/x86/kernel/kprobes/opt.c) ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2021-02982
Уязвимость реализации системного вызова (/proc/pid/syscall) ядра операционных систем Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2021-03412
Уязвимость ядра операционной системы Linux, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2021-03443
Уязвимость компонента RTAS ядра операционной системы Linux, связанная с отсутствием механизма авторизации, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-05916
Уязвимость компонента drivers/infiniband/core/ucma.c ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2023-00628
Уязвимость функции io_prep_async_work() подсистемы io_uring ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии
BDU:2023-02799
Уязвимость функции xt_replace_table() в модуле net/netfilter/x_tables.c межсетевого экрана netfilter ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
Modified: 2024-11-21
CVE-2020-12351
Improper input validation in BlueZ may allow an unauthenticated user to potentially enable escalation of privilege via adjacent access.
- http://packetstormsecurity.com/files/162131/Linux-Kernel-5.4-BleedingTooth-Remote-Code-Execution.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html?wapkw=CVE-2020-12351
- http://packetstormsecurity.com/files/162131/Linux-Kernel-5.4-BleedingTooth-Remote-Code-Execution.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00435.html?wapkw=CVE-2020-12351
Modified: 2024-11-21
CVE-2020-25656
A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.
- https://bugzilla.redhat.com/show_bug.cgi?id=1888726
- https://bugzilla.redhat.com/show_bug.cgi?id=1888726
- [debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update
- [debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update
- [debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update
- [debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update
- https://lkml.org/lkml/2020/10/16/84
- https://lkml.org/lkml/2020/10/16/84
- https://lkml.org/lkml/2020/10/29/528
- https://lkml.org/lkml/2020/10/29/528
- https://www.starwindsoftware.com/security/sw-20210325-0006/
- https://www.starwindsoftware.com/security/sw-20210325-0006/
Modified: 2024-11-21
CVE-2020-25669
A vulnerability was found in the Linux Kernel where the function sunkbd_reinit having been scheduled by sunkbd_interrupt before sunkbd being freed. Though the dangling pointer is set to NULL in sunkbd_disconnect, there is still an alias in sunkbd_reinit causing Use After Free.
- [oss-security] 20201105 CVE-2020-25669: Linux Kernel use-after-free in sunkbd_reinit
- [oss-security] 20201105 CVE-2020-25669: Linux Kernel use-after-free in sunkbd_reinit
- [oss-security] 20201120 Re: CVE-2020-25669: Linux Kernel use-after-free in sunkbd_reinit
- [oss-security] 20201120 Re: CVE-2020-25669: Linux Kernel use-after-free in sunkbd_reinit
- https://github.com/torvalds/linux/commit/77e70d351db7de07a46ac49b87a6c3c7a60fca7e
- https://github.com/torvalds/linux/commit/77e70d351db7de07a46ac49b87a6c3c7a60fca7e
- [debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update
- [debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update
- [debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update
- [debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update
- https://security.netapp.com/advisory/ntap-20210702-0006/
- https://security.netapp.com/advisory/ntap-20210702-0006/
- https://www.openwall.com/lists/oss-security/2020/11/05/2%2C
- https://www.openwall.com/lists/oss-security/2020/11/05/2%2C
- https://www.openwall.com/lists/oss-security/2020/11/20/5%2C
- https://www.openwall.com/lists/oss-security/2020/11/20/5%2C
Modified: 2024-11-21
CVE-2020-25705
A flaw in ICMP packets in the Linux kernel may allow an attacker to quickly scan open UDP ports. This flaw allows an off-path remote attacker to effectively bypass source port UDP randomization. Software that relies on UDP source port randomization are indirectly affected as well on the Linux Based Products (RUGGEDCOM RM1224: All versions between v5.0 and v6.4, SCALANCE M-800: All versions between v5.0 and v6.4, SCALANCE S615: All versions between v5.0 and v6.4, SCALANCE SC-600: All versions prior to v2.1.3, SCALANCE W1750D: v8.3.0.1, v8.6.0, and v8.7.0, SIMATIC Cloud Connect 7: All versions, SIMATIC MV500 Family: All versions, SIMATIC NET CP 1243-1 (incl. SIPLUS variants): Versions 3.1.39 and later, SIMATIC NET CP 1243-7 LTE EU: Version
Modified: 2024-11-21
CVE-2020-27777
A flaw was found in the way RTAS handled memory accesses in userspace to kernel communication. On a locked down (usually due to Secure Boot) guest system running on top of PowerVM or KVM hypervisors (pseries platform) a root like local user could use this flaw to further increase their privileges to that of a running kernel.
- https://bugzilla.redhat.com/show_bug.cgi?id=1900844
- https://bugzilla.redhat.com/show_bug.cgi?id=1900844
- https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?h=next&id=bd59380c5ba4147dcbaad3e582b55ccfd120b764
- https://git.kernel.org/pub/scm/linux/kernel/git/powerpc/linux.git/commit/?h=next&id=bd59380c5ba4147dcbaad3e582b55ccfd120b764
- https://www.openwall.com/lists/oss-security/2020/10/09/1
- https://www.openwall.com/lists/oss-security/2020/10/09/1
- https://www.openwall.com/lists/oss-security/2020/11/23/2
- https://www.openwall.com/lists/oss-security/2020/11/23/2
Modified: 2024-11-21
CVE-2020-27830
A vulnerability was found in Linux Kernel where in the spk_ttyio_receive_buf2() function, it would dereference spk_ttyio_synth without checking whether it is NULL or not, and may lead to a NULL-ptr deref crash.
- [oss-security] 20201208 Re: Linux kernel NULL-ptr deref bug in spk_ttyio_receive_buf2
- [oss-security] 20201208 Re: Linux kernel NULL-ptr deref bug in spk_ttyio_receive_buf2
- [oss-security] 20201208 Re: Linux kernel NULL-ptr deref bug in spk_ttyio_receive_buf2
- [oss-security] 20201208 Re: Linux kernel NULL-ptr deref bug in spk_ttyio_receive_buf2
- https://bugzilla.redhat.com/show_bug.cgi?id=1919900
- https://bugzilla.redhat.com/show_bug.cgi?id=1919900
- [debian-lts-announce] 20210212 [SECURITY] [DLA 2557-1] linux-4.19 security update
- [debian-lts-announce] 20210212 [SECURITY] [DLA 2557-1] linux-4.19 security update
- https://security.netapp.com/advisory/ntap-20210625-0004/
- https://security.netapp.com/advisory/ntap-20210625-0004/
- DSA-4843
- DSA-4843
Modified: 2024-11-21
CVE-2020-28588
An information disclosure vulnerability exists in the /proc/pid/syscall functionality of Linux Kernel 5.1 Stable and 5.4.66. More specifically, this issue has been introduced in v5.1-rc4 (commit 631b7abacd02b88f4b0795c08b54ad4fc3e7c7c0) and is still present in v5.10-rc4, so it’s likely that all versions in between are affected. An attacker can read /proc/pid/syscall to trigger this vulnerability, which leads to the kernel leaking memory contents.
Modified: 2024-11-21
CVE-2020-28941
An issue was discovered in drivers/accessibility/speakup/spk_ttyio.c in the Linux kernel through 5.9.9. Local attackers on systems with the speakup driver could cause a local denial of service attack, aka CID-d41227544427. This occurs because of an invalid free when the line discipline is used more than once.
- [oss-security] 20201119 Re: Linux kernel NULL-ptr deref bug in spk_ttyio_ldisc_close
- [oss-security] 20201119 Re: Linux kernel NULL-ptr deref bug in spk_ttyio_ldisc_close
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d4122754442799187d5d537a9c039a49a67e57f1
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d4122754442799187d5d537a9c039a49a67e57f1
- https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/tty.git/commit/?h=tty-linus&id=d4122754442799187d5d537a9c039a49a67e57f1
- https://git.kernel.org/pub/scm/linux/kernel/git/gregkh/tty.git/commit/?h=tty-linus&id=d4122754442799187d5d537a9c039a49a67e57f1
- https://github.com/torvalds/linux/commit/d4122754442799187d5d537a9c039a49a67e57f1
- https://github.com/torvalds/linux/commit/d4122754442799187d5d537a9c039a49a67e57f1
- [debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update
- [debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update
- FEDORA-2020-8c15928d23
- FEDORA-2020-8c15928d23
- FEDORA-2020-4700a73bd5
- FEDORA-2020-4700a73bd5
- https://www.openwall.com/lists/oss-security/2020/11/19/3
- https://www.openwall.com/lists/oss-security/2020/11/19/3
Modified: 2024-11-21
CVE-2020-29660
A locking inconsistency issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_io.c and drivers/tty/tty_jobctrl.c may allow a read-after-free attack against TIOCGSID, aka CID-c8bcd9c5be24.
- http://packetstormsecurity.com/files/164950/Kernel-Live-Patch-Security-Notice-LSN-0082-1.html
- http://packetstormsecurity.com/files/164950/Kernel-Live-Patch-Security-Notice-LSN-0082-1.html
- [oss-security] 20201210 2 kernel issues
- [oss-security] 20201210 2 kernel issues
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c8bcd9c5be24fb9e6132e97da5a35e55a83e36b9
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c8bcd9c5be24fb9e6132e97da5a35e55a83e36b9
- [debian-lts-announce] 20210212 [SECURITY] [DLA 2557-1] linux-4.19 security update
- [debian-lts-announce] 20210212 [SECURITY] [DLA 2557-1] linux-4.19 security update
- [debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update
- [debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update
- FEDORA-2020-bc0cc81a7a
- FEDORA-2020-bc0cc81a7a
- FEDORA-2020-b732958765
- FEDORA-2020-b732958765
- https://security.netapp.com/advisory/ntap-20210122-0001/
- https://security.netapp.com/advisory/ntap-20210122-0001/
- DSA-4843
- DSA-4843
Modified: 2024-11-21
CVE-2020-29661
A locking issue was discovered in the tty subsystem of the Linux kernel through 5.9.13. drivers/tty/tty_jobctrl.c allows a use-after-free attack against TIOCSPGRP, aka CID-54ffccbf053b.
- http://packetstormsecurity.com/files/160681/Linux-TIOCSPGRP-Broken-Locking.html
- http://packetstormsecurity.com/files/160681/Linux-TIOCSPGRP-Broken-Locking.html
- http://packetstormsecurity.com/files/164950/Kernel-Live-Patch-Security-Notice-LSN-0082-1.html
- http://packetstormsecurity.com/files/164950/Kernel-Live-Patch-Security-Notice-LSN-0082-1.html
- [oss-security] 20201210 2 kernel issues
- [oss-security] 20201210 2 kernel issues
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=54ffccbf053b5b6ca4f6e45094b942fab92a25fc
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=54ffccbf053b5b6ca4f6e45094b942fab92a25fc
- [debian-lts-announce] 20210212 [SECURITY] [DLA 2557-1] linux-4.19 security update
- [debian-lts-announce] 20210212 [SECURITY] [DLA 2557-1] linux-4.19 security update
- [debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update
- [debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update
- FEDORA-2020-bc0cc81a7a
- FEDORA-2020-bc0cc81a7a
- FEDORA-2020-b732958765
- FEDORA-2020-b732958765
- https://security.netapp.com/advisory/ntap-20210122-0001/
- https://security.netapp.com/advisory/ntap-20210122-0001/
- DSA-4843
- DSA-4843
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
Modified: 2024-11-21
CVE-2020-36385
An issue was discovered in the Linux kernel before 5.10. drivers/infiniband/core/ucma.c has a use-after-free because the ctx is reached via the ctx_list in some ucma_migrate_id situations where ucma_close is called, aka CID-f5449e74802c.
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f5449e74802c1112dea984aec8af7a33c4516af1
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=f5449e74802c1112dea984aec8af7a33c4516af1
- https://security.netapp.com/advisory/ntap-20210720-0004/
- https://security.netapp.com/advisory/ntap-20210720-0004/
- https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-ucma_close-2
- https://sites.google.com/view/syzscope/kasan-use-after-free-read-in-ucma_close-2
- https://syzkaller.appspot.com/bug?id=457491c4672d7b52c1007db213d93e47c711fae6
- https://syzkaller.appspot.com/bug?id=457491c4672d7b52c1007db213d93e47c711fae6
- https://www.starwindsoftware.com/security/sw-20220802-0002/
- https://www.starwindsoftware.com/security/sw-20220802-0002/
Modified: 2025-01-31
CVE-2020-36694
An issue was discovered in netfilter in the Linux kernel before 5.10. There can be a use-after-free in the packet processing context, because the per-CPU sequence count is mishandled during concurrent iptables rules replacement. This could be exploited with the CAP_NET_ADMIN capability in an unprivileged namespace. NOTE: cc00bca was reverted in 5.12.
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.10
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.12
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cc00bcaa589914096edef7fb87ca5cee4a166b5c
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=cc00bcaa589914096edef7fb87ca5cee4a166b5c
- https://security.netapp.com/advisory/ntap-20230622-0005/
- https://security.netapp.com/advisory/ntap-20230622-0005/
- https://syzkaller.appspot.com/bug?id=0c4fd9c6aa04ec116d01e915d3b186f71a212cb2
- https://syzkaller.appspot.com/bug?id=0c4fd9c6aa04ec116d01e915d3b186f71a212cb2
Modified: 2024-11-21
CVE-2020-4788
IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296.
- [oss-security] 20201120 CVE-2020-4788: Speculation on incompletely validated data on IBM Power9
- [oss-security] 20201120 CVE-2020-4788: Speculation on incompletely validated data on IBM Power9
- [oss-security] 20201123 Re: CVE-2020-4788: Speculation on incompletely validated data on IBM Power9
- [oss-security] 20201123 Re: CVE-2020-4788: Speculation on incompletely validated data on IBM Power9
- ibm-i-cve20204788-info-disc (189296)
- ibm-i-cve20204788-info-disc (189296)
- FEDORA-2020-8c15928d23
- FEDORA-2020-8c15928d23
- FEDORA-2020-4700a73bd5
- FEDORA-2020-4700a73bd5
- https://www.ibm.com/support/pages/node/6370729
- https://www.ibm.com/support/pages/node/6370729
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
Modified: 2024-11-21
CVE-2021-3411
A flaw was found in the Linux kernel in versions prior to 5.10. A violation of memory access was found while detecting a padding of int3 in the linking state. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Modified: 2024-11-21
CVE-2023-0240
There is a logic error in io_uring's implementation which can be used to trigger a use-after-free vulnerability leading to privilege escalation. In the io_prep_async_work function the assumption that the last io_grab_identity call cannot return false is not true, and in this case the function will use the init_cred or the previous linked requests identity to do operations instead of using the current identity. This can lead to reference counting issues causing use-after-free. We recommend upgrading past version 5.10.161.
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/io_uring?h=linux-5.10.y&id=788d0824269bef539fe31a785b1517882eafed93
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/io_uring?h=linux-5.10.y&id=788d0824269bef539fe31a785b1517882eafed93
- https://github.com/gregkh/linux/commit/1e6fa5216a0e59ef02e8b6b40d553238a3b81d49
- https://github.com/gregkh/linux/commit/1e6fa5216a0e59ef02e8b6b40d553238a3b81d49
- https://kernel.dance/#788d0824269bef539fe31a785b1517882eafed93
- https://kernel.dance/#788d0824269bef539fe31a785b1517882eafed93
- https://security.netapp.com/advisory/ntap-20230316-0001/