Professional OVAL Repository
[Eng]
[Rus]
[Sign-In]
OVAL
Search
Categories
RedCheck
About
OVAL Definitions
OVAL Items
FSTEC Data Bank Information Security Threats
NKCKI
EOL (End Of Life)
Linux Security Advisories
Mozilla Foundation Security Advisory
IBM
VMware
Cisco
Check Point Software Technologies
Apache
Solaris
FreeBSD
Development
GitHub Enterprise
Google Chrome Security Advisories
Oracle Security Advisories
Adobe Security Advisories
OpenSSL Security Advisories
Microsoft
CVE
CWE
CPE
Latest Updates
OS ROSA
ALT Linux
Astra Linux SE 1.5
Astra Linux SE 1.6
RED OS
DSA (Debian Security Advisory) Patсh Statistics
DSA (Debian Security Advisory) Patсh Feed
DSA (Debian Security Advisory) Vulnerability Feed
DLA (Debian Security Advisory) Patсh Statistics
DLA (Debian Security Advisory) Patсh Feed
DLA (Debian Security Advisory) Vulnerability Feed
ALT Linux (Security Bulletins) Patсh Statistics
ALT Linux (Security Bulletins) Patсh Feed
ALT Linux (Security Bulletins) Vulnerability Feed
RED OS (Security Bulletins) Patсh Statistics
RED OS (Security Bulletins) Patсh Feed
RED OS (Security Bulletins) Vulnerability Feed
USN (Ubuntu Security Notice) Patсh Statistics
USN (Ubuntu Security Notice) Patсh Feed
USN (Ubuntu Security Notice) Vulnerability Feed
RHSA (RedHat Security Advisory) Patсh Statistics
RHSA (RedHat Security Advisory) Patсh Feed
RHSA (RedHat Security Advisory) Vulnerability Feed
ELSA (Oracle Linux Security Advisory) Patсh Statistics
ELSA (Oracle Linux Security Advisory) Patсh Feed
ELSA (Oracle Linux Security Advisory) Vulnerability Feed
SUSE (SUSE Security Advisories) Patсh Statistics
SUSE (SUSE Security Advisories) Patсh Feed
SUSE (SUSE Security Advisories) Vulnerability Feed
openSUSE (openSUSE Security Advisories) Patсh Statistics
openSUSE (openSUSE Security Advisories) Patсh Feed
openSUSE (openSUSE Security Advisories) Vulnerability Feed
Amazon Linux AMI (Security Bulletins) Patсh Statistics
Amazon Linux AMI (Security Bulletins) Patсh Feed
Amazon Linux AMI (Security Bulletins) Vulnerability Feed
Mageia Linux (Security Bulletins) Patсh Statistics
Mageia Linux (Security Bulletins) Patсh Feed
Mageia Linux (Security Bulletins) Vulnerability Feed
OS ROSA SX COBALT 1.0
OS ROSA DX COBALT 1.0
ROSA 7.3 (Security Advisories) Patсh Statistics
ROSA 7.3 (Security Advisories) Patсh Feed
ROSA 7.3 (Security Advisories) Vulnerability Feed
ALT Linux SPT 6.0
ALT Linux SPT 7.0
ALT 8 SP
ALT 9
RED OS Murom 7.1
RED OS Murom 7.2
IBM DB2
VMware Vulnerabilities Advisory (VMSA)
VMware vCenter Patch Advisories
VMware ESXi Patch Advisories
VMware NSX Patches
VMware NSX Vulnerabilities
VMware Photon OS 1.0 Patches
VMware Photon OS 1.0 Vulnerabilities
VMware Photon OS 2.0 Patches
VMware Photon OS 2.0 Vulnerabilities
Cisco ASA
Cisco IOS/NX-OS Advisory
Cisco NX-OS Vulnerabilities
Check Point Gaia
Apache Tomcat Advisories
Apache Tomcat Server
Apache HTTP Server
Python
Node.js
RubyGems
Qt
Microsoft Security Bulletin
Microsoft Knowledge Base Article
Microsoft SharePoint
Microsoft SharePoint Foundation 2013
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
About OVALdb
User manual
Pricing
Contact us
OVAL Definitions
>
OVAL Definition Details
Id
oval:com.altx-soft.nix:def:101437
[Rus]
Version
6
Class
patch
ALTXid
282969
Language
English
Severity
High
Title
openSUSE-SU-2019:1407-1 -- Security update for Linux Kernel
Description
The openSUSE Leap 42.3 kernel was updated to 4.4.179 to receive various security and bugfixes.
Family
unix
Platform
openSUSE Leap 42.3
Product
kernel-docs
Reference
VENDOR: openSUSE-SU-2019:1407-1
VENDOR: openSUSE-SU-2019:1407-1
Id:
openSUSE-SU-2019:1407-1
Reference:
http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html
CVE: CVE-2018-1000204
CVE: CVE-2018-1000204
Id:
CVE-2018-1000204
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000204
Comment
: ** DISPUTED ** Linux Kernel version 3.18 to 4.16 incorrectly handles an SG_IO ioctl on /dev/sg0 with dxfer_direction=SG_DXFER_FROM_DEV and an empty 6-byte cmdp. This may lead to copying up to 1000 kernel heap pages to the userspace. This has been fixed upstream in https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824 already. The problem has limited scope, as users don't usually have permissions to access SCSI devices. On the other hand, e.g. the Nero user manual suggests doing `chmod o+r+w /dev/sg*` to make the devices accessible. NOTE: third parties dispute the relevance of this report, noting that the requirement for an attacker to have both the CAP_SYS_ADMIN and CAP_SYS_RAWIO capabilities makes it "virtually impossible to exploit."
CVSSv2 Score:
6.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
SINGLE_INSTANCE
Confidentiality impact:
COMPLETE
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:M/Au: /C:C/I:N/A:N
References:
openSUSE-SU-2019:1407 (SUSE)
http://www.openwall.com/lists/oss-security/2018/06/26/3 (MISC)
RHSA-2018:2948 (REDHAT)
https://github.com/torvalds/linux/commit/a45b599ad808c3c982fdcdc12b0b8611c2f92824 (CONFIRM)
[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update (MLIST)
[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update (MLIST)
[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package (MLIST)
USN-3696-1 (UBUNTU)
USN-3696-2 (UBUNTU)
USN-3752-1 (UBUNTU)
USN-3752-2 (UBUNTU)
USN-3752-3 (UBUNTU)
USN-3754-1 (UBUNTU)
CVE: CVE-2018-10853
CVE: CVE-2018-10853
Id:
CVE-2018-10853
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-10853
Comment
: A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.
CVSSv2 Score:
4.6
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:P/A:P
CVSSv3 Score:
7.8
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE:
269 (Improper Privilege Management)
References:
https://www.openwall.com/lists/oss-security/2018/09/02/1 (MISC)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c9fa24ca7c9c47605672916491f79e8ccacb9e6 (CONFIRM)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=129a72a0d3c8e139a04512325384fe5ac119e74 (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10853 (CONFIRM)
[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package (MLIST)
[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update (MLIST)
[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update (MLIST)
USN-3777-2 (UBUNTU)
USN-3777-1 (UBUNTU)
openSUSE-SU-2019:1407 (SUSE)
RHSA-2019:2043 (REDHAT)
RHSA-2019:2029 (REDHAT)
RHSA-2020:0036 (REDHAT)
RHSA-2020:0103 (REDHAT)
RHSA-2020:0179 (REDHAT)
CVE: CVE-2018-12126
CVE: CVE-2018-12126
Id:
CVE-2018-12126
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12126
Comment
: Microarchitectural Store Buffer Data Sampling (MSBDS): Store buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
CVSSv2 Score:
4.7
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:C/I:N/A:N
CVSSv3 Score:
5.6
Attack vector:
LOCAL
Attack complexity:
HIGH
Privileges required:
LOW
User interaction:
NONE
Scope:
CHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
CWE:
200 (Information Exposure)
References:
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html (CONFIRM)
openSUSE-SU-2019:1505 (SUSE)
RHSA-2019:1455 (REDHAT)
USN-3977-3 (UBUNTU)
[debian-lts-announce] 20190620 [SECURITY] [DLA 1789-2] intel-microcode security update (MLIST)
20190624 [SECURITY] [DSA 4447-2] intel-microcode security update (BUGTRAQ)
20190624 [SECURITY] [DSA 4469-1] libvirt security update (BUGTRAQ)
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt (CONFIRM)
https://cert-portal.siemens.com/productcert/pdf/ssa-616472.pdf (CONFIRM)
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190712-01-mds-en (CONFIRM)
openSUSE-SU-2019:1806 (SUSE)
openSUSE-SU-2019:1805 (SUSE)
FreeBSD-SA-19:07 (FREEBSD)
RHSA-2019:2553 (REDHAT)
https://kc.mcafee.com/corporate/index?page=content&id=SB10292 (CONFIRM)
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf (CONFIRM)
FreeBSD-SA-19:26 (FREEBSD)
20191112 FreeBSD Security Advisory FreeBSD-SA-19:26.mcu (BUGTRAQ)
20191112 [SECURITY] [DSA 4564-1] linux security update (BUGTRAQ)
http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html (MISC)
https://www.synology.com/security/advisory/Synology_SA_19_24 (CONFIRM)
DSA-4602 (DEBIAN)
20200114 [SECURITY] [DSA 4602-1] xen security update (BUGTRAQ)
GLSA-202003-56 (GENTOO)
FEDORA-2019-1f5832fc0e ()
CVE: CVE-2018-12127
CVE: CVE-2018-12127
Id:
CVE-2018-12127
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12127
Comment
: Microarchitectural Load Port Data Sampling (MLPDS): Load ports on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
CVSSv2 Score:
4.7
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:C/I:N/A:N
CVSSv3 Score:
5.6
Attack vector:
LOCAL
Attack complexity:
HIGH
Privileges required:
LOW
User interaction:
NONE
Scope:
CHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
CWE:
200 (Information Exposure)
References:
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html (CONFIRM)
openSUSE-SU-2019:1505 (SUSE)
RHSA-2019:1455 (REDHAT)
USN-3977-3 (UBUNTU)
[debian-lts-announce] 20190620 [SECURITY] [DLA 1789-2] intel-microcode security update (MLIST)
20190624 [SECURITY] [DSA 4447-2] intel-microcode security update (BUGTRAQ)
20190624 [SECURITY] [DSA 4469-1] libvirt security update (BUGTRAQ)
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt (CONFIRM)
https://cert-portal.siemens.com/productcert/pdf/ssa-616472.pdf (CONFIRM)
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190712-01-mds-en (CONFIRM)
openSUSE-SU-2019:1806 (SUSE)
openSUSE-SU-2019:1805 (SUSE)
FreeBSD-SA-19:07 (FREEBSD)
RHSA-2019:2553 (REDHAT)
https://kc.mcafee.com/corporate/index?page=content&id=SB10292 (CONFIRM)
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf (CONFIRM)
FreeBSD-SA-19:26 (FREEBSD)
20191112 FreeBSD Security Advisory FreeBSD-SA-19:26.mcu (BUGTRAQ)
20191112 [SECURITY] [DSA 4564-1] linux security update (BUGTRAQ)
http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html (MISC)
https://www.synology.com/security/advisory/Synology_SA_19_24 (CONFIRM)
DSA-4602 (DEBIAN)
20200114 [SECURITY] [DSA 4602-1] xen security update (BUGTRAQ)
GLSA-202003-56 (GENTOO)
FEDORA-2019-1f5832fc0e ()
CVE: CVE-2018-12130
CVE: CVE-2018-12130
Id:
CVE-2018-12130
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-12130
Comment
: Microarchitectural Fill Buffer Data Sampling (MFBDS): Fill buffers on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
CVSSv2 Score:
4.7
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:C/I:N/A:N
CVSSv3 Score:
5.6
Attack vector:
LOCAL
Attack complexity:
HIGH
Privileges required:
LOW
User interaction:
NONE
Scope:
CHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
CWE:
200 (Information Exposure)
References:
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html (CONFIRM)
openSUSE-SU-2019:1505 (SUSE)
RHSA-2019:1455 (REDHAT)
USN-3977-3 (UBUNTU)
[debian-lts-announce] 20190620 [SECURITY] [DLA 1789-2] intel-microcode security update (MLIST)
20190624 [SECURITY] [DSA 4447-2] intel-microcode security update (BUGTRAQ)
20190624 [SECURITY] [DSA 4469-1] libvirt security update (BUGTRAQ)
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt (CONFIRM)
https://cert-portal.siemens.com/productcert/pdf/ssa-616472.pdf (CONFIRM)
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190712-01-mds-en (CONFIRM)
openSUSE-SU-2019:1806 (SUSE)
openSUSE-SU-2019:1805 (SUSE)
FreeBSD-SA-19:07 (FREEBSD)
RHSA-2019:2553 (REDHAT)
https://kc.mcafee.com/corporate/index?page=content&id=SB10292 (CONFIRM)
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf (CONFIRM)
FreeBSD-SA-19:26 (FREEBSD)
20191112 FreeBSD Security Advisory FreeBSD-SA-19:26.mcu (BUGTRAQ)
20191112 [SECURITY] [DSA 4564-1] linux security update (BUGTRAQ)
http://packetstormsecurity.com/files/155281/FreeBSD-Security-Advisory-FreeBSD-SA-19-26.mcu.html (MISC)
https://www.synology.com/security/advisory/Synology_SA_19_24 (CONFIRM)
DSA-4602 (DEBIAN)
20200114 [SECURITY] [DSA 4602-1] xen security update (BUGTRAQ)
GLSA-202003-56 (GENTOO)
FEDORA-2019-1f5832fc0e ()
CVE: CVE-2018-15594
CVE: CVE-2018-15594
Id:
CVE-2018-15594
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-15594
Comment
: arch/x86/kernel/paravirt.c in the Linux kernel before 4.18.1 mishandles certain indirect calls, which makes it easier for attackers to conduct Spectre-v2 attacks against paravirtual guests.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CVSSv3 Score:
5.5
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CWE:
200 (Information Exposure)
References:
https://twitter.com/grsecurity/status/1029324426142199808 (MISC)
https://github.com/torvalds/linux/commit/5800dc5c19f34e6e03b5adab1282535cb102fafd (MISC)
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.18.1 (MISC)
http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5800dc5c19f34e6e03b5adab1282535cb102fafd (MISC)
105120 (BID)
1041601 (SECTRACK)
DSA-4308 (DEBIAN)
USN-3777-2 (UBUNTU)
USN-3777-1 (UBUNTU)
USN-3776-2 (UBUNTU)
USN-3776-1 (UBUNTU)
USN-3775-2 (UBUNTU)
USN-3775-1 (UBUNTU)
[debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update (MLIST)
USN-3777-3 (UBUNTU)
openSUSE-SU-2019:1407 (SUSE)
RHSA-2019:2043 (REDHAT)
RHSA-2019:2029 (REDHAT)
CVE: CVE-2018-17972
CVE: CVE-2018-17972
Id:
CVE-2018-17972
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-17972
Comment
: An issue was discovered in the proc_pid_stack function in fs/proc/base.c in the Linux kernel through 4.18.11. It does not ensure that only root may inspect the kernel stack of an arbitrary task, allowing a local attacker to exploit racy stack unwinding and leak kernel task stack contents.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:C/I:N/A:N
CVSSv3 Score:
5.5
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
CWE:
362 (Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition'))
References:
https://marc.info/?l=linux-fsdevel&m=153806242024956&w=2 (MISC)
105525 (BID)
USN-3821-2 (UBUNTU)
USN-3821-1 (UBUNTU)
USN-3832-1 (UBUNTU)
USN-3835-1 (UBUNTU)
USN-3871-1 (UBUNTU)
USN-3880-2 (UBUNTU)
USN-3871-4 (UBUNTU)
USN-3871-3 (UBUNTU)
USN-3880-1 (UBUNTU)
USN-3871-5 (UBUNTU)
RHSA-2019:0514 (REDHAT)
RHSA-2019:0512 (REDHAT)
[debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update (MLIST)
[debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update (MLIST)
[debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update (MLIST)
RHSA-2019:0831 (REDHAT)
openSUSE-SU-2019:1407 (SUSE)
RHSA-2019:2473 (REDHAT)
https://support.f5.com/csp/article/K27673650?utm_source=f5support&%3Butm_medium=RSS ()
CVE: CVE-2018-5814
CVE: CVE-2018-5814
Id:
CVE-2018-5814
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-5814
Comment
: In the Linux Kernel before version 4.16.11, 4.14.43, 4.9.102, and 4.4.133, multiple race condition errors when handling probe, disconnect, and rebind operations can be exploited to trigger a use-after-free condition or a NULL pointer dereference by sending multiple USB over IP packets.
CVSSv2 Score:
6.9
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:C/I:C/A:C
CVSSv3 Score:
7
Attack vector:
LOCAL
Attack complexity:
HIGH
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE:
362 (Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition'))
References:
https://secuniaresearch.flexerasoftware.com/secunia_research/2018-8/ (MISC)
81540 (SECUNIA)
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/?id=c171654caa875919be3c533d3518da8be5be966e (CONFIRM)
https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/?id=22076557b07c12086eeb16b8ce2b0b735f7a27e7 (CONFIRM)
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.102 (CONFIRM)
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.133 (CONFIRM)
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.16.11 (CONFIRM)
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.43 (CONFIRM)
1041050 (SECTRACK)
USN-3696-2 (UBUNTU)
USN-3696-1 (UBUNTU)
[debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update (MLIST)
[debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update (MLIST)
[debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package (MLIST)
USN-3752-2 (UBUNTU)
USN-3752-1 (UBUNTU)
USN-3752-3 (UBUNTU)
openSUSE-SU-2019:1407 (SUSE)
CVE: CVE-2019-11091
CVE: CVE-2019-11091
Id:
CVE-2019-11091
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11091
Comment
: Microarchitectural Data Sampling Uncacheable Memory (MDSUM): Uncacheable memory on some microprocessors utilizing speculative execution may allow an authenticated user to potentially enable information disclosure via a side channel with local access. A list of impacted products can be found here: https://www.intel.com/content/dam/www/public/us/en/documents/corporate-information/SA00233-microcode-update-guidance_05132019.pdf
CVSSv2 Score:
4.7
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:C/I:N/A:N
CVSSv3 Score:
5.6
Attack vector:
LOCAL
Attack complexity:
HIGH
Privileges required:
LOW
User interaction:
NONE
Scope:
CHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:C/C:H/I:N/A:N
References:
https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00233.html (CONFIRM)
openSUSE-SU-2019:1505 (SUSE)
RHSA-2019:1455 (REDHAT)
USN-3977-3 (UBUNTU)
[debian-lts-announce] 20190620 [SECURITY] [DLA 1789-2] intel-microcode security update (MLIST)
20190624 [SECURITY] [DSA 4447-2] intel-microcode security update (BUGTRAQ)
20190624 [SECURITY] [DSA 4469-1] libvirt security update (BUGTRAQ)
http://www.arubanetworks.com/assets/alert/ARUBA-PSA-2019-003.txt (CONFIRM)
https://cert-portal.siemens.com/productcert/pdf/ssa-616472.pdf (CONFIRM)
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20190712-01-mds-en (CONFIRM)
openSUSE-SU-2019:1806 (SUSE)
openSUSE-SU-2019:1805 (SUSE)
FreeBSD-SA-19:07 (FREEBSD)
RHSA-2019:2553 (REDHAT)
https://kc.mcafee.com/corporate/index?page=content&id=SB10292 (CONFIRM)
https://cert-portal.siemens.com/productcert/pdf/ssa-608355.pdf (CONFIRM)
20191112 [SECURITY] [DSA 4564-1] linux security update (BUGTRAQ)
https://www.synology.com/security/advisory/Synology_SA_19_24 (CONFIRM)
DSA-4602 (DEBIAN)
20200114 [SECURITY] [DSA 4602-1] xen security update (BUGTRAQ)
GLSA-202003-56 (GENTOO)
FEDORA-2019-1f5832fc0e ()
CVE: CVE-2019-11486
CVE: CVE-2019-11486
Id:
CVE-2019-11486
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11486
Comment
: The Siemens R3964 line discipline driver in drivers/tty/n_r3964.c in the Linux kernel before 5.0.8 has multiple race conditions.
CVSSv2 Score:
6.9
Access vector:
LOCAL
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:M/Au:N/C:C/I:C/A:C
CVSSv3 Score:
7
Attack vector:
LOCAL
Attack complexity:
HIGH
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE:
362 (Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition'))
References:
https://github.com/torvalds/linux/commit/c7084edc3f6d67750f50d4183134c4fb5712a5c8 (MISC)
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=c7084edc3f6d67750f50d4183134c4fb5712a5c8 (MISC)
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.8 (MISC)
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.169 (MISC)
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.35 (MISC)
https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.112 (MISC)
[oss-security] 20190429 Linux kernel: multiple issues (MLIST)
openSUSE-SU-2019:1404 (SUSE)
https://security.netapp.com/advisory/ntap-20190517-0005/ (CONFIRM)
openSUSE-SU-2019:1407 (SUSE)
[debian-lts-announce] 20190528 [SECURITY] [DLA 1799-1] linux security update (MLIST)
[debian-lts-announce] 20190528 [SECURITY] [DLA 1799-2] linux security update (MLIST)
openSUSE-SU-2019:1479 (SUSE)
https://support.f5.com/csp/article/K50222414 (CONFIRM)
DSA-4465 (DEBIAN)
[debian-lts-announce] 20190618 [SECURITY] [DLA 1824-1] linux-4.9 security update (MLIST)
20190618 [SECURITY] [DSA 4465-1] linux security update (BUGTRAQ)
CVE: CVE-2019-11815
CVE: CVE-2019-11815
Id:
CVE-2019-11815
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11815
Comment
: An issue was discovered in rds_tcp_kill_sock in net/rds/tcp.c in the Linux kernel before 5.0.8. There is a race condition leading to a use-after-free, related to net namespace cleanup.
CVSSv2 Score:
9.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:C/I:C/A:C
CVSSv3 Score:
8.1
Attack vector:
NETWORK
Attack complexity:
HIGH
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE:
362 (Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition'))
References:
https://github.com/torvalds/linux/commit/cb66ddd156203daefb8d71158036b27b0e2caf63 (MISC)
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cb66ddd156203daefb8d71158036b27b0e2caf63 (MISC)
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.8 (MISC)
108283 (BID)
openSUSE-SU-2019:1404 (SUSE)
openSUSE-SU-2019:1407 (SUSE)
https://support.f5.com/csp/article/K32019083 (CONFIRM)
openSUSE-SU-2019:1479 (SUSE)
USN-4008-1 (UBUNTU)
USN-4005-1 (UBUNTU)
USN-4008-3 (UBUNTU)
DSA-4465 (DEBIAN)
[debian-lts-announce] 20190618 [SECURITY] [DLA 1824-1] linux-4.9 security update (MLIST)
20190618 [SECURITY] [DSA 4465-1] linux security update (BUGTRAQ)
https://security.netapp.com/advisory/ntap-20190719-0003/ (CONFIRM)
USN-4068-1 (UBUNTU)
USN-4068-2 (UBUNTU)
http://packetstormsecurity.com/files/153799/Kernel-Live-Patch-Security-Notice-LSN-0053-1.html (MISC)
USN-4118-1 (UBUNTU)
CVE: CVE-2019-11884
CVE: CVE-2019-11884
Id:
CVE-2019-11884
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11884
Comment
: The do_hidp_sock_ioctl function in net/bluetooth/hidp/sock.c in the Linux kernel before 5.0.15 allows a local user to obtain potentially sensitive information from kernel stack memory via a HIDPCONNADD command, because a name field may not end with a '\0' character.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CVSSv3 Score:
3.3
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
LOW
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
References:
https://github.com/torvalds/linux/commit/a1616a5ac99ede5d605047a9012481ce7ff18b16 (MISC)
https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a1616a5ac99ede5d605047a9012481ce7ff18b16 (MISC)
https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.15 (MISC)
108299 (BID)
openSUSE-SU-2019:1404 (SUSE)
openSUSE-SU-2019:1407 (SUSE)
openSUSE-SU-2019:1479 (SUSE)
DSA-4465 (DEBIAN)
[debian-lts-announce] 20190617 [SECURITY] [DLA 1823-1] linux security update (MLIST)
[debian-lts-announce] 20190618 [SECURITY] [DLA 1824-1] linux-4.9 security update (MLIST)
20190618 [SECURITY] [DSA 4465-1] linux security update (BUGTRAQ)
USN-4068-1 (UBUNTU)
USN-4068-2 (UBUNTU)
USN-4069-1 (UBUNTU)
USN-4076-1 (UBUNTU)
USN-4069-2 (UBUNTU)
USN-4118-1 (UBUNTU)
RHSA-2019:3517 (REDHAT)
RHSA-2019:3309 (REDHAT)
RHSA-2020:0740 (REDHAT)
FEDORA-2019-640f8d8dd1 ()
FEDORA-2019-e6bf55e821 ()
FEDORA-2019-c36afa818c ()
CVE: CVE-2019-3882
CVE: CVE-2019-3882
Id:
CVE-2019-3882
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3882
Comment
: A flaw was found in the Linux kernel's vfio interface implementation that permits violation of the user's locked memory limit. If a device is bound to a vfio driver, such as vfio-pci, and the local attacker is administratively granted ownership of the device, it may cause a system memory exhaustion and thus a denial of service (DoS). Versions 3.10, 4.14 and 4.18 are vulnerable.
CVSSv2 Score:
4.9
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:C
CVSSv3 Score:
5.5
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CWE:
770 (Allocation of Resources Without Limits or Throttling)
References:
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3882 (CONFIRM)
USN-3981-1 (UBUNTU)
USN-3980-1 (UBUNTU)
USN-3979-1 (UBUNTU)
USN-3982-2 (UBUNTU)
openSUSE-SU-2019:1404 (SUSE)
USN-3982-1 (UBUNTU)
https://security.netapp.com/advisory/ntap-20190517-0005/ (CONFIRM)
openSUSE-SU-2019:1407 (SUSE)
USN-3980-2 (UBUNTU)
[debian-lts-announce] 20190528 [SECURITY] [DLA 1799-1] linux security update (MLIST)
[debian-lts-announce] 20190528 [SECURITY] [DLA 1799-2] linux security update (MLIST)
USN-3981-2 (UBUNTU)
openSUSE-SU-2019:1479 (SUSE)
RHSA-2019:2043 (REDHAT)
RHSA-2019:2029 (REDHAT)
DSA-4497 (DEBIAN)
20190813 [SECURITY] [DSA 4497-1] linux security update (BUGTRAQ)
[debian-lts-announce] 20190814 [SECURITY] [DLA 1885-1] linux-4.9 security update (MLIST)
RHSA-2019:3517 (REDHAT)
RHSA-2019:3309 (REDHAT)
CVE: CVE-2019-9503
CVE: CVE-2019-9503
Id:
CVE-2019-9503
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9503
Comment
: The Broadcom brcmfmac WiFi driver prior to commit a4176ec356c73a46c07c181c6d04039fafa34a9f is vulnerable to a frame validation bypass. If the brcmfmac driver receives a firmware event frame from a remote source, the is_wlc_event_frame function will cause this frame to be discarded and unprocessed. If the driver receives the firmware event frame from the host, the appropriate handler is called. This frame validation can be bypassed if the bus used is USB (for instance by a wifi dongle). This can allow firmware event frames from a remote source to be processed. In the worst case scenario, by sending specially-crafted WiFi packets, a remote, unauthenticated attacker may be able to execute arbitrary code on a vulnerable system. More typically, this vulnerability will result in denial-of-service conditions.
CVSSv2 Score:
7.9
Access vector:
ADJACENT_NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
COMPLETE
Integrity impact:
COMPLETE
Availability impact:
COMPLETE
CVSSv2 Vector:
AV:A/AC:M/Au:N/C:C/I:C/A:C
CVSSv3 Score:
8.3
Attack vector:
ADJACENT_NETWORK
Attack complexity:
HIGH
Privileges required:
NONE
User interaction:
NONE
Scope:
CHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H
CWE:
20 (Improper Input Validation)
References:
https://kb.cert.org/vuls/id/166939/ (MISC)
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a4176ec356c73a46c07c181c6d04039fafa34a9f (MISC)
https://blog.quarkslab.com/reverse-engineering-broadcom-wireless-chipsets.html (MISC)
https://bugzilla.redhat.com/show_bug.cgi?id=1701842 (MISC)
https://people.canonical.com/~ubuntu-security/cve/2019/CVE-2019-9503.html (MISC)
https://security-tracker.debian.org/tracker/CVE-2019-9503 (MISC)
https://bugzilla.suse.com/show_bug.cgi?id=1132828 (MISC)
Content available only for registered users!
ovaldb@altx-soft.com