ALT-BU-2022-5043-1
Branch p10 update bulletin.
Closed vulnerabilities
BDU:2022-02931
Уязвимость библиотеки сканирования пакета антивирусных программ ClamAV и средства защиты от вредоносного программного обеспечения Cisco AMP для конечных устройств, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02932
Уязвимость библиотеки сканирования пакета антивирусных программ ClamAV и средства защиты от вредоносного программного обеспечения Cisco AMP для конечных устройств, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02933
Уязвимость библиотеки сканирования пакета антивирусных программ ClamAV и средства защиты от вредоносного программного обеспечения Cisco AMP для конечных устройств, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02934
Уязвимость библиотеки сканирования пакета антивирусных программ ClamAV и средства защиты от вредоносного программного обеспечения Cisco AMP для конечных устройств, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-03420
Уязвимость пакета антивирусных программ ClamAV, связанная с переполнением буфера в куче, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2022-20770
On April 20, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed: A vulnerability in CHM file parser of Clam AntiVirus (ClamAV) versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. For a description of this vulnerability, see the ClamAV blog. This advisory will be updated as additional information becomes available.
- [debian-lts-announce] 20220603 [SECURITY] [DLA 3042-1] clamav security update
- [debian-lts-announce] 20220603 [SECURITY] [DLA 3042-1] clamav security update
- FEDORA-2022-b8691af27b
- FEDORA-2022-b8691af27b
- FEDORA-2022-a910a41a17
- FEDORA-2022-a910a41a17
- FEDORA-2022-0ac71a8f3a
- FEDORA-2022-0ac71a8f3a
- GLSA-202310-01
- GLSA-202310-01
- 20220504 ClamAV CHM File Parsing Denial of Service Vulnerability Affecting Cisco Products: April 2022
- 20220504 ClamAV CHM File Parsing Denial of Service Vulnerability Affecting Cisco Products: April 2022
Modified: 2024-11-21
CVE-2022-20771
On April 20, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed: A vulnerability in the TIFF file parser of Clam AntiVirus (ClamAV) versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. For a description of this vulnerability, see the ClamAV blog. This advisory will be updated as additional information becomes available.
- [debian-lts-announce] 20220603 [SECURITY] [DLA 3042-1] clamav security update
- [debian-lts-announce] 20220603 [SECURITY] [DLA 3042-1] clamav security update
- FEDORA-2022-b8691af27b
- FEDORA-2022-b8691af27b
- FEDORA-2022-a910a41a17
- FEDORA-2022-a910a41a17
- FEDORA-2022-0ac71a8f3a
- FEDORA-2022-0ac71a8f3a
- GLSA-202310-01
- GLSA-202310-01
- 20220504 ClamAV TIFF File Parsing Denial of Service Vulnerability Affecting Cisco Products: April 2022
- 20220504 ClamAV TIFF File Parsing Denial of Service Vulnerability Affecting Cisco Products: April 2022
Modified: 2024-11-21
CVE-2022-20785
On April 20, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed: A vulnerability in HTML file parser of Clam AntiVirus (ClamAV) versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. For a description of this vulnerability, see the ClamAV blog. This advisory will be updated as additional information becomes available.
- [debian-lts-announce] 20220603 [SECURITY] [DLA 3042-1] clamav security update
- [debian-lts-announce] 20220603 [SECURITY] [DLA 3042-1] clamav security update
- FEDORA-2022-b8691af27b
- FEDORA-2022-b8691af27b
- FEDORA-2022-a910a41a17
- FEDORA-2022-a910a41a17
- FEDORA-2022-0ac71a8f3a
- FEDORA-2022-0ac71a8f3a
- GLSA-202310-01
- GLSA-202310-01
- 20220504 ClamAV HTML Scanning Memory Leak Vulnerability Affecting Cisco Products: April 2022
- 20220504 ClamAV HTML Scanning Memory Leak Vulnerability Affecting Cisco Products: April 2022
Modified: 2024-11-21
CVE-2022-20792
A vulnerability in the regex module used by the signature database load module of Clam AntiVirus (ClamAV) versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions could allow an authenticated, local attacker to crash ClamAV at database load time, and possibly gain code execution. The vulnerability is due to improper bounds checking that may result in a multi-byte heap buffer overwflow write. An attacker could exploit this vulnerability by placing a crafted CDB ClamAV signature database file in the ClamAV database directory. An exploit could allow the attacker to run code as the clamav user.
Modified: 2024-11-21
CVE-2022-20796
On May 4, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed: A vulnerability in Clam AntiVirus (ClamAV) versions 0.103.4, 0.103.5, 0.104.1, and 0.104.2 could allow an authenticated, local attacker to cause a denial of service condition on an affected device. For a description of this vulnerability, see the ClamAV blog.
- [debian-lts-announce] 20220603 [SECURITY] [DLA 3042-1] clamav security update
- [debian-lts-announce] 20220603 [SECURITY] [DLA 3042-1] clamav security update
- FEDORA-2022-b8691af27b
- FEDORA-2022-b8691af27b
- FEDORA-2022-a910a41a17
- FEDORA-2022-a910a41a17
- FEDORA-2022-0ac71a8f3a
- FEDORA-2022-0ac71a8f3a
- GLSA-202310-01
- GLSA-202310-01
- 20220504 ClamAV Truncated File Denial of Service Vulnerability Affecting Cisco Products: April 2022
- 20220504 ClamAV Truncated File Denial of Service Vulnerability Affecting Cisco Products: April 2022
Package wpa_supplicant updated to version 2.10-alt2 for branch p10 in task 300113.
Closed vulnerabilities
BDU:2019-04775
Уязвимость компонента защищённого доступа Wi-Fi WPA Supplicant, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01584
Уязвимость компонента p2p/p2p_pd.c клиента защищённого доступа Wi-Fi WPA Supplicant, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2022-07363
Уязвимость реализации SAE клиента защищённого доступа Wi-Fi WPA Supplicant, связанная с раскрытием информации через несоответствие, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2022-07364
Уязвимость реализации EAP-pwd клиента защищённого доступа Wi-Fi WPA Supplicant, связанная с раскрытием информации через несоответствие, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2024-11-21
CVE-2019-16275
hostapd before 2.10 and wpa_supplicant before 2.10 allow an incorrect indication of disconnection in certain situations because source address validation is mishandled. This is a denial of service that should have been prevented by PMF (aka management frame protection). The attacker must send a crafted 802.11 frame from a location that is within the 802.11 communications range.
- [oss-security] 20190912 Re: hostapd/wpa_supplicant: AP mode PMF disconnection protection bypass
- [oss-security] 20190912 Re: hostapd/wpa_supplicant: AP mode PMF disconnection protection bypass
- [debian-lts-announce] 20190916 [SECURITY] [DLA 1922-1] wpa security update
- [debian-lts-announce] 20190916 [SECURITY] [DLA 1922-1] wpa security update
- FEDORA-2019-0e0b28001d
- FEDORA-2019-0e0b28001d
- FEDORA-2019-65509aac53
- FEDORA-2019-65509aac53
- FEDORA-2019-740834c559
- FEDORA-2019-740834c559
- FEDORA-2019-2bdcccee3c
- FEDORA-2019-2bdcccee3c
- FEDORA-2019-2265b5ae86
- FEDORA-2019-2265b5ae86
- 20190929 [SECURITY] [DSA 4538-1] wpa security update
- 20190929 [SECURITY] [DSA 4538-1] wpa security update
- USN-4136-1
- USN-4136-1
- USN-4136-2
- USN-4136-2
- https://w1.fi/security/2019-7/
- https://w1.fi/security/2019-7/
- https://w1.fi/security/2019-7/ap-mode-pmf-disconnection-protection-bypass.txt
- https://w1.fi/security/2019-7/ap-mode-pmf-disconnection-protection-bypass.txt
- DSA-4538
- DSA-4538
- https://www.openwall.com/lists/oss-security/2019/09/11/7
- https://www.openwall.com/lists/oss-security/2019/09/11/7
Modified: 2024-11-21
CVE-2021-27803
A vulnerability was discovered in how p2p/p2p_pd.c in wpa_supplicant before 2.10 processes P2P (Wi-Fi Direct) provision discovery requests. It could result in denial of service or other impact (potentially execution of arbitrary code), for an attacker within radio range.
- [oss-security] 20210227 Re: wpa_supplicant P2P provision discovery processing vulnerability
- [oss-security] 20210227 Re: wpa_supplicant P2P provision discovery processing vulnerability
- [debian-lts-announce] 20210302 [SECURITY] [DLA 2581-1] wpa security update
- [debian-lts-announce] 20210302 [SECURITY] [DLA 2581-1] wpa security update
- FEDORA-2021-99cad2b81f
- FEDORA-2021-99cad2b81f
- FEDORA-2021-3430f96019
- FEDORA-2021-3430f96019
- FEDORA-2021-9b00febe54
- FEDORA-2021-9b00febe54
- https://w1.fi/security/2021-1/0001-P2P-Fix-a-corner-case-in-peer-addition-based-on-PD-R.patch
- https://w1.fi/security/2021-1/0001-P2P-Fix-a-corner-case-in-peer-addition-based-on-PD-R.patch
- https://w1.fi/security/2021-1/wpa_supplicant-p2p-provision-discovery-processing-vulnerability.txt
- https://w1.fi/security/2021-1/wpa_supplicant-p2p-provision-discovery-processing-vulnerability.txt
- DSA-4898
- DSA-4898
- https://www.openwall.com/lists/oss-security/2021/02/25/3
- https://www.openwall.com/lists/oss-security/2021/02/25/3
Modified: 2024-11-21
CVE-2021-30004
In wpa_supplicant and hostapd 2.9, forging attacks may occur because AlgorithmIdentifier parameters are mishandled in tls/pkcs1.c and tls/x509v3.c.
Modified: 2024-11-21
CVE-2022-23303
The implementations of SAE in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9494.
Modified: 2024-11-21
CVE-2022-23304
The implementations of EAP-pwd in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side-channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9495.
Closed bugs
Не работает wi-fi на ноутбуке после обновления wpa_supplicant до 2.10-alt1
Package xfce4-settings updated to version 4.16.2-alt4 for branch p10 in task 300193.
Closed bugs
Редактируемые комбинации клавиш не работают