Professional OVAL Repository
[Eng]
[Rus]
[Sign-In]
OVAL
Search
Categories
RedCheck
About
OVAL Definitions
OVAL Items
FSTEC Data Bank Information Security Threats
NKCKI
EOL (End Of Life)
Linux Security Advisories
Mozilla Foundation Security Advisory
IBM
VMware
Cisco
Check Point Software Technologies
Apache
Solaris
FreeBSD
Development
GitHub Enterprise
Google Chrome Security Advisories
Oracle Security Advisories
Adobe Security Advisories
OpenSSL Security Advisories
Microsoft
CVE
CWE
CPE
Latest Updates
OS ROSA
ALT Linux
Astra Linux SE 1.5
Astra Linux SE 1.6
RED OS
DSA (Debian Security Advisory) Patсh Statistics
DSA (Debian Security Advisory) Patсh Feed
DSA (Debian Security Advisory) Vulnerability Feed
DLA (Debian Security Advisory) Patсh Statistics
DLA (Debian Security Advisory) Patсh Feed
DLA (Debian Security Advisory) Vulnerability Feed
ALT Linux (Security Bulletins) Patсh Statistics
ALT Linux (Security Bulletins) Patсh Feed
ALT Linux (Security Bulletins) Vulnerability Feed
RED OS (Security Bulletins) Patсh Statistics
RED OS (Security Bulletins) Patсh Feed
RED OS (Security Bulletins) Vulnerability Feed
USN (Ubuntu Security Notice) Patсh Statistics
USN (Ubuntu Security Notice) Patсh Feed
USN (Ubuntu Security Notice) Vulnerability Feed
RHSA (RedHat Security Advisory) Patсh Statistics
RHSA (RedHat Security Advisory) Patсh Feed
RHSA (RedHat Security Advisory) Vulnerability Feed
ELSA (Oracle Linux Security Advisory) Patсh Statistics
ELSA (Oracle Linux Security Advisory) Patсh Feed
ELSA (Oracle Linux Security Advisory) Vulnerability Feed
SUSE (SUSE Security Advisories) Patсh Statistics
SUSE (SUSE Security Advisories) Patсh Feed
SUSE (SUSE Security Advisories) Vulnerability Feed
openSUSE (openSUSE Security Advisories) Patсh Statistics
openSUSE (openSUSE Security Advisories) Patсh Feed
openSUSE (openSUSE Security Advisories) Vulnerability Feed
Amazon Linux AMI (Security Bulletins) Patсh Statistics
Amazon Linux AMI (Security Bulletins) Patсh Feed
Amazon Linux AMI (Security Bulletins) Vulnerability Feed
Mageia Linux (Security Bulletins) Patсh Statistics
Mageia Linux (Security Bulletins) Patсh Feed
Mageia Linux (Security Bulletins) Vulnerability Feed
OS ROSA SX COBALT 1.0
OS ROSA DX COBALT 1.0
ROSA 7.3 (Security Advisories) Patсh Statistics
ROSA 7.3 (Security Advisories) Patсh Feed
ROSA 7.3 (Security Advisories) Vulnerability Feed
ALT Linux SPT 6.0
ALT Linux SPT 7.0
ALT 8 SP
ALT 9
RED OS Murom 7.1
RED OS Murom 7.2
IBM DB2
VMware Vulnerabilities Advisory (VMSA)
VMware vCenter Patch Advisories
VMware ESXi Patch Advisories
VMware NSX Patches
VMware NSX Vulnerabilities
VMware Photon OS 1.0 Patches
VMware Photon OS 1.0 Vulnerabilities
VMware Photon OS 2.0 Patches
VMware Photon OS 2.0 Vulnerabilities
Cisco ASA
Cisco IOS/NX-OS Advisory
Cisco NX-OS Vulnerabilities
Check Point Gaia
Apache Tomcat Advisories
Apache Tomcat Server
Apache HTTP Server
Python
Node.js
RubyGems
Qt
Microsoft Security Bulletin
Microsoft Knowledge Base Article
Microsoft SharePoint
Microsoft SharePoint Foundation 2013
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
About OVALdb
User manual
Pricing
Contact us
OVAL Definitions
>
OVAL Definition Details
Id
oval:com.altx-soft.nix:def:101144
[Rus]
Version
7
Class
patch
ALTXid
282406
Language
English
Severity
High
Title
SUSE-SU-2019:14051-1 -- Security update for the Linux Kernel
Description
The SUSE Linux Enterprise 11 SP4 kernel was updated to receive various security and bugfixes.
Four new speculative execution information leak issues have been identified in Intel CPUs. (bsc#1111331) .
Family
unix
Platform
SUSE Linux Enterprise Server 11
Product
the Linux Kernel
Reference
VENDOR: SUSE-SU-2019:14051-1
VENDOR: SUSE-SU-2019:14051-1
Id:
SUSE-SU-2019:14051-1
Reference:
https://www.suse.com/support/update/announcement/2019/suse-su-201914051-1.html
CVE: CVE-2012-3412
CVE: CVE-2012-3412
Id:
CVE-2012-3412
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3412
Comment
: The sfc (aka Solarflare Solarstorm) driver in the Linux kernel before 3.2.30 allows remote attackers to cause a denial of service (DMA descriptor consumption and network-controller outage) via crafted TCP packets that trigger a small MSS value.
CVSSv2 Score:
7.8
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:C
CWE:
189 (Numeric Errors)
References:
https://github.com/torvalds/linux/commit/68cb695ccecf949d48949e72f8ce591fdaaa325c (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=844714 (CONFIRM)
[oss-security] 20120803 Remote DoS in Linux sfc driver through TCP MSS option (CVE-2012-3412) (MLIST)
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.2.30 (CONFIRM)
USN-1568-1 (UBUNTU)
RHSA-2012:1375 (REDHAT)
USN-1580-1 (UBUNTU)
USN-1567-1 (UBUNTU)
openSUSE-SU-2012:1330 (SUSE)
USN-1572-1 (UBUNTU)
USN-1579-1 (UBUNTU)
RHSA-2012:1430 (REDHAT)
SUSE-SU-2012:1679 (SUSE)
RHSA-2012:1401 (REDHAT)
USN-1577-1 (UBUNTU)
USN-1575-1 (UBUNTU)
RHSA-2012:1347 (REDHAT)
RHSA-2012:1323 (REDHAT)
USN-1578-1 (UBUNTU)
RHSA-2012:1324 (REDHAT)
50633 (SECUNIA)
50732 (SECUNIA)
50811 (SECUNIA)
51193 (SECUNIA)
CVE: CVE-2012-3430
CVE: CVE-2012-3430
Id:
CVE-2012-3430
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-3430
Comment
: The rds_recvmsg function in net/rds/recv.c in the Linux kernel before 3.0.44 does not initialize a certain structure member, which allows local users to obtain potentially sensitive information from kernel stack memory via a (1) recvfrom or (2) recvmsg system call on an RDS socket.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CWE:
200 (Information Exposure)
References:
https://bugzilla.redhat.com/show_bug.cgi?id=820039 (CONFIRM)
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.0.44 (CONFIRM)
[oss-security] 20120726 Re: CVE Request -- kernel: recv{from,msg}() on an rds socket can leak kernel memory (MLIST)
https://github.com/torvalds/linux/commit/06b6a1cf6e776426766298d055bb3991957d90a7 (CONFIRM)
USN-1568-1 (UBUNTU)
USN-1580-1 (UBUNTU)
USN-1567-1 (UBUNTU)
USN-1572-1 (UBUNTU)
USN-1579-1 (UBUNTU)
SUSE-SU-2012:1679 (SUSE)
USN-1577-1 (UBUNTU)
USN-1575-1 (UBUNTU)
RHSA-2012:1323 (REDHAT)
USN-1578-1 (UBUNTU)
50633 (SECUNIA)
50732 (SECUNIA)
50811 (SECUNIA)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=06b6a1cf6e776426766298d055bb3991957d90a7 (MISC)
CVE: CVE-2013-0160
CVE: CVE-2013-0160
Id:
CVE-2013-0160
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0160
Comment
: The Linux kernel through 3.7.9 allows local users to obtain sensitive information about keystroke timing by using the inotify API on the /dev/ptmx device.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CWE:
200 (Information Exposure)
References:
https://bugzilla.redhat.com/show_bug.cgi?id=892983 (CONFIRM)
[oss-security] 20130107 Re: /dev/ptmx timing (MLIST)
openSUSE-SU-2013:0395 (SUSE)
SUSE-SU-2013:0674 (SUSE)
openSUSE-SU-2013:0925 (SUSE)
openSUSE-SU-2013:1187 (SUSE)
USN-2129-1 (UBUNTU)
USN-2128-1 (UBUNTU)
SUSE-SU-2013:1182 (SUSE)
CVE: CVE-2013-0216
CVE: CVE-2013-0216
Id:
CVE-2013-0216
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0216
Comment
: The Xen netback functionality in the Linux kernel before 3.7.8 allows guest OS users to cause a denial of service (loop) by triggering ring pointer corruption.
CVSSv2 Score:
5.2
Access vector:
ADJACENT_NETWORK
Access complexity:
MEDIUM
Authentication:
SINGLE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:A/AC:M/Au:S/C:N/I:N/A:C
CWE:
20 (Improper Input Validation)
References:
https://github.com/torvalds/linux/commit/48856286b64e4b66ec62b94e504d0b29c1ade664 (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=910883 (CONFIRM)
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.7.8 (CONFIRM)
[oss-security] 20130205 Xen Security Advisory 39 (CVE-2013-0216,CVE-2013-0217) - Linux netback DoS via malicious guest ring. (MLIST)
openSUSE-SU-2013:0395 (SUSE)
SUSE-SU-2013:0674 (SUSE)
openSUSE-SU-2013:0925 (SUSE)
MDVSA-2013:176 (MANDRIVA)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=48856286b64e4b66ec62b94e504d0b29c1ade664 (MISC)
CVE: CVE-2013-0231
CVE: CVE-2013-0231
Id:
CVE-2013-0231
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-0231
Comment
: The pciback_enable_msi function in the PCI backend driver (drivers/xen/pciback/conf_space_capability_msi.c) in Xen for the Linux kernel 2.6.18 and 3.8 allows guest OS users with PCI device access to cause a denial of service via a large number of kernel log messages. NOTE: some of these details are obtained from third party information.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CWE:
119 (Improper Restriction of Operations within the Bounds of a Memory Buffer)
References:
52059 (SECUNIA)
89903 (OSVDB)
[oss-security] 20130205 Xen Security Advisory 43 (CVE-2013-0231) - Linux pciback DoS via not rate limited log messages. (MLIST)
57740 (BID)
DSA-2632 (DEBIAN)
openSUSE-SU-2013:0395 (SUSE)
SUSE-SU-2013:0674 (SUSE)
openSUSE-SU-2013:0925 (SUSE)
xen-pcibackenablemsi-dos(81923) (XF)
CVE: CVE-2013-1979
CVE: CVE-2013-1979
Id:
CVE-2013-1979
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-1979
Comment
: The scm_set_cred function in include/net/scm.h in the Linux kernel before 3.8.11 uses incorrect uid and gid values during credentials passing, which allows local users to gain privileges via a crafted application.
CVSSv2 Score:
6.9
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:C/I:C/A:C
CWE:
264 (Permissions, Privileges, and Access Controls)
References:
https://bugzilla.redhat.com/show_bug.cgi?id=955629 (CONFIRM)
[oss-security] 20130428 Multiple Linux setuid output redirection vulnerabilities (MLIST)
https://github.com/torvalds/linux/commit/83f1b4ba917db5dc5a061a44b3403ddb6e783494 (CONFIRM)
http://www.kernel.org/pub/linux/kernel/v3.x/ChangeLog-3.8.11 (CONFIRM)
MDVSA-2013:176 (MANDRIVA)
openSUSE-SU-2013:1187 (SUSE)
FEDORA-2013-6537 (FEDORA)
FEDORA-2013-6999 (FEDORA)
openSUSE-SU-2013:1971 (SUSE)
SUSE-SU-2014:1316 (SUSE)
SUSE-SU-2014:1319 (SUSE)
SUSE-SU-2013:1182 (SUSE)
http://git.kernel.org/?p=linux/kernel/git/torvalds/linux-2.6.git%3Ba=commit%3Bh=83f1b4ba917db5dc5a061a44b3403ddb6e783494 (MISC)
CVE: CVE-2018-12126
CVE: CVE-2018-12126
Id:
CVE-2018-12126
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126
Comment
: Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
CVSSv2 Score:
4.7
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:C/I:N/A:N
CVSSv3 Score:
5.6
Attack vector:
LOCAL
Attack complexity:
HIGH
Privileges required:
LOW
User interaction:
NONE
Scope:
CHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
CWE:
200 (Information Exposure)
References:
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html (CONFIRM)
openSUSE-SU-2019:1505 (SUSE)
RHSA-2019:1455 (REDHAT)
USN-3977-3 (UBUNTU)
[debian-lts-announce] 20190620 [SECURITY] [DLA 1789-2] intel-microcode security update (MLIST)
20190624 [SECURITY] [DSA 4447-2] intel-microcode security update (BUGTRAQ)
20190624 [SECURITY] [DSA 4469-1] libvirt security update (BUGTRAQ)
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt (CONFIRM)
https://cert-portal.siemens.com/productcert/pdf/ssa-616472.pdf (CONFIRM)
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190712-01-mds-en (CONFIRM)
openSUSE-SU-2019:1806 (SUSE)
openSUSE-SU-2019:1805 (SUSE)
FreeBSD-SA-19:07 (FREEBSD)
RHSA-2019:2553 (REDHAT)
https://kc.mcafee.com/corporate/index?page=content&id=SB10292 (CONFIRM)
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf (CONFIRM)
FreeBSD-SA-19:26 (FREEBSD)
20191112 FreeBSD Security Advisory FreeBSD-SA-19:26.mcu (BUGTRAQ)
20191112 [SECURITY] [DSA 4564-1] linux security update (BUGTRAQ)
http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html (MISC)
https://www.synology.com/security/advisory/Synology_SA_19_24 (CONFIRM)
DSA-4602 (DEBIAN)
20200114 [SECURITY] [DSA 4602-1] xen security update (BUGTRAQ)
GLSA-202003-56 (GENTOO)
FEDORA-2019-1f5832fc0e ()
CVE: CVE-2018-12127
CVE: CVE-2018-12127
Id:
CVE-2018-12127
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127
Comment
: Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
CVSSv2 Score:
4.7
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:C/I:N/A:N
CVSSv3 Score:
5.6
Attack vector:
LOCAL
Attack complexity:
HIGH
Privileges required:
LOW
User interaction:
NONE
Scope:
CHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
CWE:
200 (Information Exposure)
References:
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html (CONFIRM)
openSUSE-SU-2019:1505 (SUSE)
RHSA-2019:1455 (REDHAT)
USN-3977-3 (UBUNTU)
[debian-lts-announce] 20190620 [SECURITY] [DLA 1789-2] intel-microcode security update (MLIST)
20190624 [SECURITY] [DSA 4447-2] intel-microcode security update (BUGTRAQ)
20190624 [SECURITY] [DSA 4469-1] libvirt security update (BUGTRAQ)
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt (CONFIRM)
https://cert-portal.siemens.com/productcert/pdf/ssa-616472.pdf (CONFIRM)
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190712-01-mds-en (CONFIRM)
openSUSE-SU-2019:1806 (SUSE)
openSUSE-SU-2019:1805 (SUSE)
FreeBSD-SA-19:07 (FREEBSD)
RHSA-2019:2553 (REDHAT)
https://kc.mcafee.com/corporate/index?page=content&id=SB10292 (CONFIRM)
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf (CONFIRM)
FreeBSD-SA-19:26 (FREEBSD)
20191112 FreeBSD Security Advisory FreeBSD-SA-19:26.mcu (BUGTRAQ)
20191112 [SECURITY] [DSA 4564-1] linux security update (BUGTRAQ)
http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html (MISC)
https://www.synology.com/security/advisory/Synology_SA_19_24 (CONFIRM)
DSA-4602 (DEBIAN)
20200114 [SECURITY] [DSA 4602-1] xen security update (BUGTRAQ)
GLSA-202003-56 (GENTOO)
FEDORA-2019-1f5832fc0e ()
CVE: CVE-2018-12130
CVE: CVE-2018-12130
Id:
CVE-2018-12130
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130
Comment
: Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
CVSSv2 Score:
4.7
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:C/I:N/A:N
CVSSv3 Score:
5.6
Attack vector:
LOCAL
Attack complexity:
HIGH
Privileges required:
LOW
User interaction:
NONE
Scope:
CHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
CWE:
200 (Information Exposure)
References:
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html (CONFIRM)
openSUSE-SU-2019:1505 (SUSE)
RHSA-2019:1455 (REDHAT)
USN-3977-3 (UBUNTU)
[debian-lts-announce] 20190620 [SECURITY] [DLA 1789-2] intel-microcode security update (MLIST)
20190624 [SECURITY] [DSA 4447-2] intel-microcode security update (BUGTRAQ)
20190624 [SECURITY] [DSA 4469-1] libvirt security update (BUGTRAQ)
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt (CONFIRM)
https://cert-portal.siemens.com/productcert/pdf/ssa-616472.pdf (CONFIRM)
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190712-01-mds-en (CONFIRM)
openSUSE-SU-2019:1806 (SUSE)
openSUSE-SU-2019:1805 (SUSE)
FreeBSD-SA-19:07 (FREEBSD)
RHSA-2019:2553 (REDHAT)
https://kc.mcafee.com/corporate/index?page=content&id=SB10292 (CONFIRM)
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf (CONFIRM)
FreeBSD-SA-19:26 (FREEBSD)
20191112 FreeBSD Security Advisory FreeBSD-SA-19:26.mcu (BUGTRAQ)
20191112 [SECURITY] [DSA 4564-1] linux security update (BUGTRAQ)
http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html (MISC)
https://www.synology.com/security/advisory/Synology_SA_19_24 (CONFIRM)
DSA-4602 (DEBIAN)
20200114 [SECURITY] [DSA 4602-1] xen security update (BUGTRAQ)
GLSA-202003-56 (GENTOO)
FEDORA-2019-1f5832fc0e ()
CVE: CVE-2019-11091
CVE: CVE-2019-11091
Id:
CVE-2019-11091
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091
Comment
: Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
CVSSv2 Score:
4.7
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:C/I:N/A:N
CVSSv3 Score:
5.6
Attack vector:
LOCAL
Attack complexity:
HIGH
Privileges required:
LOW
User interaction:
NONE
Scope:
CHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
References:
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html (CONFIRM)
openSUSE-SU-2019:1505 (SUSE)
RHSA-2019:1455 (REDHAT)
USN-3977-3 (UBUNTU)
[debian-lts-announce] 20190620 [SECURITY] [DLA 1789-2] intel-microcode security update (MLIST)
20190624 [SECURITY] [DSA 4447-2] intel-microcode security update (BUGTRAQ)
20190624 [SECURITY] [DSA 4469-1] libvirt security update (BUGTRAQ)
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt (CONFIRM)
https://cert-portal.siemens.com/productcert/pdf/ssa-616472.pdf (CONFIRM)
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190712-01-mds-en (CONFIRM)
openSUSE-SU-2019:1806 (SUSE)
openSUSE-SU-2019:1805 (SUSE)
FreeBSD-SA-19:07 (FREEBSD)
RHSA-2019:2553 (REDHAT)
https://kc.mcafee.com/corporate/index?page=content&id=SB10292 (CONFIRM)
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf (CONFIRM)
20191112 [SECURITY] [DSA 4564-1] linux security update (BUGTRAQ)
https://www.synology.com/security/advisory/Synology_SA_19_24 (CONFIRM)
DSA-4602 (DEBIAN)
20200114 [SECURITY] [DSA 4602-1] xen security update (BUGTRAQ)
GLSA-202003-56 (GENTOO)
FEDORA-2019-1f5832fc0e ()
CVE: CVE-2019-9213
CVE: CVE-2019-9213
Id:
CVE-2019-9213
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9213
Comment
: In the Linux kernel before 4.20.14, expand_downwards in mm/mmap.c lacks a check for the mmap minimum address, which makes it easier for attackers to exploit kernel NULL pointer dereferences on non-SMAP platforms. This is related to a capability check for the wrong task.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CVSSv3 Score:
5.5
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CWE:
476 (NULL Pointer Dereference)
References:
https://github.com/torvalds/linux/commit/0a1d52994d440e21def1c2174932410b4f2a98a1 (MISC)
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.162 (MISC)
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.14 (MISC)
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.27 (MISC)
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.105 (MISC)
https://bugs.chromium.org/p/project-zero/issues/detail?id=1792 (MISC)
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0a1d52994d440e21def1c2174932410b4f2a98a1 (MISC)
46502 (EXPLOIT-DB)
107296 (BID)
[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update (MLIST)
openSUSE-SU-2019:1085 (SUSE)
[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update (MLIST)
USN-3933-2 (UBUNTU)
USN-3932-2 (UBUNTU)
USN-3932-1 (UBUNTU)
USN-3931-2 (UBUNTU)
USN-3931-1 (UBUNTU)
USN-3930-2 (UBUNTU)
USN-3930-1 (UBUNTU)
USN-3933-1 (UBUNTU)
openSUSE-SU-2019:1193 (SUSE)
RHSA-2019:0831 (REDHAT)
[debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update (MLIST)
RHSA-2019:1479 (REDHAT)
RHSA-2019:1480 (REDHAT)
http://packetstormsecurity.com/files/156053/Reliable-Datagram-Sockets-RDS-rds_atomic_free_op-Privilege-Escalation.html (MISC)
Content available only for registered users!
ovaldb@altx-soft.com