VARIoT IoT vulnerabilities database
| VAR-201908-0254 | CVE-2019-8461 | Check Point Endpoint Security Initial Client Vulnerabilities related to untrusted search paths |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
Check Point Endpoint Security Initial Client for Windows before version E81.30 tries to load a DLL placed in any PATH location on a clean image without Endpoint Client installed. An attacker can leverage this to gain LPE using a specially crafted DLL placed in any PATH location accessible with write permissions to the user. Attackers can use a specially crafted DLL to exploit this vulnerability to obtain LPE
| VAR-201909-1527 | CVE-2019-14814 | Linux Kernel Vulnerable to classic buffer overflow |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
There is heap-based buffer overflow in Linux kernel, all versions up to, excluding 5.3, in the marvell wifi chip driver in Linux kernel, that allows local users to cause a denial of service(system crash) or possibly execute arbitrary code. Linux Kernel Contains a classic buffer overflow vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Important: kernel-alt security and bug fix update
Advisory ID: RHSA-2020:0174-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2020:0174
Issue date: 2020-01-21
CVE Names: CVE-2018-3693 CVE-2018-18559 CVE-2019-3846
CVE-2019-8912 CVE-2019-10126 CVE-2019-11487
CVE-2019-14814 CVE-2019-14815 CVE-2019-14816
CVE-2019-17133 CVE-2019-18660
====================================================================
1. Summary:
An update for kernel-alt is now available for Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact
of Important. A Common Vulnerability Scoring System (CVSS) base score,
which gives a detailed severity rating, is available for each vulnerability
from the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7) - aarch64, noarch, ppc64le, s390x
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7) - aarch64, noarch, ppc64le
3.
Security Fix(es):
* Kernel: speculative bounds check bypass store (CVE-2018-3693)
* kernel: Use-after-free due to race condition in AF_PACKET implementation
(CVE-2018-18559)
* kernel: Heap overflow in mwifiex_update_bss_desc_with_ie function in
marvell/mwifiex/scan.c (CVE-2019-3846)
* kernel: af_alg_release() in crypto/af_alg.c neglects to set a NULL value
for a certain structure member, which leads to a use-after-free in
sockfs_setattr (CVE-2019-8912)
* kernel: Heap overflow in mwifiex_uap_parse_tail_ies function in
drivers/net/wireless/marvell/mwifiex/ie.c (CVE-2019-10126)
* kernel: Count overflow in FUSE request leading to use-after-free issues.
Bug Fix(es):
* Kernel panic on job cleanup, related to SyS_getdents64 (BZ#1702057)
* Kernel modules generated incorrectly when system is localized to
non-English language (BZ#1705285)
* RHEL-Alt-7.6 - Fixup tlbie vs store ordering issue on POWER9 (BZ#1756270)
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
The system must be rebooted for this update to take effect.
5. Bugs fixed (https://bugzilla.redhat.com/):
1581650 - CVE-2018-3693 Kernel: speculative bounds check bypass store
1641878 - CVE-2018-18559 kernel: Use-after-free due to race condition in AF_PACKET implementation
1678685 - CVE-2019-8912 kernel: af_alg_release() in crypto/af_alg.c neglects to set a NULL value for a certain structure member, which leads to a use-after-free in sockfs_setattr
1703063 - CVE-2019-11487 kernel: Count overflow in FUSE request leading to use-after-free issues. Package List:
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server (v. 7):
Source:
kernel-alt-4.14.0-115.17.1.el7a.src.rpm
aarch64:
kernel-4.14.0-115.17.1.el7a.aarch64.rpm
kernel-debug-4.14.0-115.17.1.el7a.aarch64.rpm
kernel-debug-debuginfo-4.14.0-115.17.1.el7a.aarch64.rpm
kernel-debug-devel-4.14.0-115.17.1.el7a.aarch64.rpm
kernel-debuginfo-4.14.0-115.17.1.el7a.aarch64.rpm
kernel-debuginfo-common-aarch64-4.14.0-115.17.1.el7a.aarch64.rpm
kernel-devel-4.14.0-115.17.1.el7a.aarch64.rpm
kernel-headers-4.14.0-115.17.1.el7a.aarch64.rpm
kernel-tools-4.14.0-115.17.1.el7a.aarch64.rpm
kernel-tools-debuginfo-4.14.0-115.17.1.el7a.aarch64.rpm
kernel-tools-libs-4.14.0-115.17.1.el7a.aarch64.rpm
perf-4.14.0-115.17.1.el7a.aarch64.rpm
perf-debuginfo-4.14.0-115.17.1.el7a.aarch64.rpm
python-perf-4.14.0-115.17.1.el7a.aarch64.rpm
python-perf-debuginfo-4.14.0-115.17.1.el7a.aarch64.rpm
noarch:
kernel-abi-whitelists-4.14.0-115.17.1.el7a.noarch.rpm
kernel-doc-4.14.0-115.17.1.el7a.noarch.rpm
ppc64le:
kernel-4.14.0-115.17.1.el7a.ppc64le.rpm
kernel-bootwrapper-4.14.0-115.17.1.el7a.ppc64le.rpm
kernel-debug-4.14.0-115.17.1.el7a.ppc64le.rpm
kernel-debug-debuginfo-4.14.0-115.17.1.el7a.ppc64le.rpm
kernel-debuginfo-4.14.0-115.17.1.el7a.ppc64le.rpm
kernel-debuginfo-common-ppc64le-4.14.0-115.17.1.el7a.ppc64le.rpm
kernel-devel-4.14.0-115.17.1.el7a.ppc64le.rpm
kernel-headers-4.14.0-115.17.1.el7a.ppc64le.rpm
kernel-tools-4.14.0-115.17.1.el7a.ppc64le.rpm
kernel-tools-debuginfo-4.14.0-115.17.1.el7a.ppc64le.rpm
kernel-tools-libs-4.14.0-115.17.1.el7a.ppc64le.rpm
perf-4.14.0-115.17.1.el7a.ppc64le.rpm
perf-debuginfo-4.14.0-115.17.1.el7a.ppc64le.rpm
python-perf-4.14.0-115.17.1.el7a.ppc64le.rpm
python-perf-debuginfo-4.14.0-115.17.1.el7a.ppc64le.rpm
s390x:
kernel-4.14.0-115.17.1.el7a.s390x.rpm
kernel-debug-4.14.0-115.17.1.el7a.s390x.rpm
kernel-debug-debuginfo-4.14.0-115.17.1.el7a.s390x.rpm
kernel-debug-devel-4.14.0-115.17.1.el7a.s390x.rpm
kernel-debuginfo-4.14.0-115.17.1.el7a.s390x.rpm
kernel-debuginfo-common-s390x-4.14.0-115.17.1.el7a.s390x.rpm
kernel-devel-4.14.0-115.17.1.el7a.s390x.rpm
kernel-headers-4.14.0-115.17.1.el7a.s390x.rpm
kernel-kdump-4.14.0-115.17.1.el7a.s390x.rpm
kernel-kdump-debuginfo-4.14.0-115.17.1.el7a.s390x.rpm
kernel-kdump-devel-4.14.0-115.17.1.el7a.s390x.rpm
perf-4.14.0-115.17.1.el7a.s390x.rpm
perf-debuginfo-4.14.0-115.17.1.el7a.s390x.rpm
python-perf-4.14.0-115.17.1.el7a.s390x.rpm
python-perf-debuginfo-4.14.0-115.17.1.el7a.s390x.rpm
Red Hat Enterprise Linux for ARM and IBM Power LE (POWER9) Server Optional (v. 7):
aarch64:
kernel-debug-debuginfo-4.14.0-115.17.1.el7a.aarch64.rpm
kernel-debuginfo-4.14.0-115.17.1.el7a.aarch64.rpm
kernel-debuginfo-common-aarch64-4.14.0-115.17.1.el7a.aarch64.rpm
kernel-tools-debuginfo-4.14.0-115.17.1.el7a.aarch64.rpm
kernel-tools-libs-devel-4.14.0-115.17.1.el7a.aarch64.rpm
perf-debuginfo-4.14.0-115.17.1.el7a.aarch64.rpm
python-perf-debuginfo-4.14.0-115.17.1.el7a.aarch64.rpm
noarch:
kernel-doc-4.14.0-115.17.1.el7a.noarch.rpm
ppc64le:
kernel-debug-debuginfo-4.14.0-115.17.1.el7a.ppc64le.rpm
kernel-debug-devel-4.14.0-115.17.1.el7a.ppc64le.rpm
kernel-debuginfo-4.14.0-115.17.1.el7a.ppc64le.rpm
kernel-debuginfo-common-ppc64le-4.14.0-115.17.1.el7a.ppc64le.rpm
kernel-tools-debuginfo-4.14.0-115.17.1.el7a.ppc64le.rpm
kernel-tools-libs-devel-4.14.0-115.17.1.el7a.ppc64le.rpm
perf-debuginfo-4.14.0-115.17.1.el7a.ppc64le.rpm
python-perf-debuginfo-4.14.0-115.17.1.el7a.ppc64le.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2018-3693
https://access.redhat.com/security/cve/CVE-2018-18559
https://access.redhat.com/security/cve/CVE-2019-3846
https://access.redhat.com/security/cve/CVE-2019-8912
https://access.redhat.com/security/cve/CVE-2019-10126
https://access.redhat.com/security/cve/CVE-2019-11487
https://access.redhat.com/security/cve/CVE-2019-14814
https://access.redhat.com/security/cve/CVE-2019-14815
https://access.redhat.com/security/cve/CVE-2019-14816
https://access.redhat.com/security/cve/CVE-2019-17133
https://access.redhat.com/security/cve/CVE-2019-18660
https://access.redhat.com/security/updates/classification/#important
https://access.redhat.com/solutions/3523601
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2020 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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gRWJ
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://www.redhat.com/mailman/listinfo/rhsa-announce
. ==========================================================================
Kernel Live Patch Security Notice 0058-1
October 22, 2019
linux vulnerability
==========================================================================
A security issue affects these releases of Ubuntu:
| Series | Base kernel | Arch | flavors |
|------------------+--------------+----------+------------------|
| Ubuntu 18.04 LTS | 4.15.0 | amd64 | aws |
| Ubuntu 18.04 LTS | 4.15.0 | amd64 | generic |
| Ubuntu 18.04 LTS | 4.15.0 | amd64 | lowlatency |
| Ubuntu 18.04 LTS | 4.15.0 | amd64 | oem |
| Ubuntu 18.04 LTS | 5.0.0 | amd64 | azure |
| Ubuntu 14.04 LTS | 4.4.0 | amd64 | generic |
| Ubuntu 14.04 LTS | 4.4.0 | amd64 | lowlatency |
| Ubuntu 16.04 LTS | 4.4.0 | amd64 | aws |
| Ubuntu 16.04 LTS | 4.4.0 | amd64 | generic |
| Ubuntu 16.04 LTS | 4.4.0 | amd64 | lowlatency |
| Ubuntu 16.04 LTS | 4.15.0 | amd64 | azure |
| Ubuntu 16.04 LTS | 4.15.0 | amd64 | generic |
| Ubuntu 16.04 LTS | 4.15.0 | amd64 | lowlatency |
Summary:
Several security issues were fixed in the kernel.
Software Description:
- linux: Linux kernel
Details:
It was discovered that a race condition existed in the GFS2 file system in
the Linux kernel. A local attacker could possibly use this to cause a
denial of service (system crash). (CVE-2016-10905)
It was discovered that a use-after-free error existed in the block layer
subsystem of the Linux kernel when certain failure conditions occurred. (CVE-2018-20856)
It was discovered that the USB gadget Midi driver in the Linux kernel
contained a double-free vulnerability when handling certain error
conditions. A local attacker could use this to cause a denial of service
(system crash). (CVE-2018-20961)
It was discovered that the XFS file system in the Linux kernel did not
properly handle mount failures in some situations. (CVE-2018-20976)
It was discovered that the RSI 91x Wi-Fi driver in the Linux kernel did not
did not handle detach operations correctly, leading to a use-after-free
vulnerability. A physically proximate attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2018-21008)
It was discovered that the Intel Wi-Fi device driver in the Linux kernel
did not properly validate certain Tunneled Direct Link Setup (TDLS). A
physically proximate attacker could use this to cause a denial of service
(Wi-Fi disconnect). (CVE-2019-0136)
It was discovered that the Linux kernel on ARM processors allowed a tracing
process to modify a syscall after a seccomp decision had been made on that
syscall. A local attacker could possibly use this to bypass seccomp
restrictions. (CVE-2019-2054)
It was discovered that an integer overflow existed in the Binder
implementation of the Linux kernel, leading to a buffer overflow. A local
attacker could use this to escalate privileges. (CVE-2019-2181)
It was discovered that the Marvell Wireless LAN device driver in the Linux
kernel did not properly validate the BSS descriptor. (CVE-2019-10126)
It was discovered that the Bluetooth UART implementation in the Linux
kernel did not properly check for missing tty operations. A local attacker
could use this to cause a denial of service. (CVE-2019-10207)
Jonathan Looney discovered that an integer overflow existed in the Linux
kernel when handling TCP Selective Acknowledgments (SACKs). A remote
attacker could use this to cause a denial of service (system crash).
(CVE-2019-11477)
Jonathan Looney discovered that the TCP retransmission queue implementation
in the Linux kernel could be fragmented when handling certain TCP Selective
Acknowledgment (SACK) sequences. A remote attacker could use this to cause
a denial of service. (CVE-2019-11478)
It was discovered that the ext4 file system implementation in the Linux
kernel did not properly zero out memory in some situations. A local
attacker could use this to expose sensitive information (kernel memory).
(CVE-2019-11833)
It was discovered that the PowerPC dlpar implementation in the Linux kernel
did not properly check for allocation errors in some situations. A local
attacker could possibly use this to cause a denial of service (system
crash). (CVE-2019-12614)
It was discovered that the floppy driver in the Linux kernel did not
properly validate meta data, leading to a buffer overread. A local attacker
could use this to cause a denial of service (system crash).
(CVE-2019-14283)
It was discovered that the floppy driver in the Linux kernel did not
properly validate ioctl() calls, leading to a division-by-zero. A local
attacker could use this to cause a denial of service (system crash).
(CVE-2019-14284)
Wen Huang discovered that the Marvell Wi-Fi device driver in the Linux
kernel did not properly perform bounds checking, leading to a heap
overflow. (CVE-2019-14814)
Wen Huang discovered that the Marvell Wi-Fi device driver in the Linux
kernel did not properly perform bounds checking, leading to a heap
overflow. (CVE-2019-14815)
Wen Huang discovered that the Marvell Wi-Fi device driver in the Linux
kernel did not properly perform bounds checking, leading to a heap
overflow. (CVE-2019-14816)
Matt Delco discovered that the KVM hypervisor implementation in the Linux
kernel did not properly perform bounds checking when handling coalesced
MMIO write operations. A local attacker with write access to /dev/kvm could
use this to cause a denial of service (system crash). (CVE-2019-14821)
Peter Pi discovered a buffer overflow in the virtio network backend
(vhost_net) implementation in the Linux kernel. (CVE-2019-14835)
Update instructions:
The problem can be corrected by updating your livepatches to the following
versions:
| Kernel | Version | flavors |
|--------------------------+----------+--------------------------|
| 4.4.0-148.174 | 58.1 | lowlatency, generic |
| 4.4.0-148.174~14.04.1 | 58.1 | lowlatency, generic |
| 4.4.0-150.176 | 58.1 | generic, lowlatency |
| 4.4.0-150.176~14.04.1 | 58.1 | lowlatency, generic |
| 4.4.0-151.178 | 58.1 | lowlatency, generic |
| 4.4.0-151.178~14.04.1 | 58.1 | generic, lowlatency |
| 4.4.0-154.181 | 58.1 | lowlatency, generic |
| 4.4.0-154.181~14.04.1 | 58.1 | generic, lowlatency |
| 4.4.0-157.185 | 58.1 | lowlatency, generic |
| 4.4.0-157.185~14.04.1 | 58.1 | generic, lowlatency |
| 4.4.0-159.187 | 58.1 | lowlatency, generic |
| 4.4.0-159.187~14.04.1 | 58.1 | generic, lowlatency |
| 4.4.0-161.189 | 58.1 | lowlatency, generic |
| 4.4.0-161.189~14.04.1 | 58.1 | lowlatency, generic |
| 4.4.0-164.192 | 58.1 | lowlatency, generic |
| 4.4.0-164.192~14.04.1 | 58.1 | lowlatency, generic |
| 4.4.0-165.193 | 58.1 | generic, lowlatency |
| 4.4.0-1083.93 | 58.1 | aws |
| 4.4.0-1084.94 | 58.1 | aws |
| 4.4.0-1085.96 | 58.1 | aws |
| 4.4.0-1087.98 | 58.1 | aws |
| 4.4.0-1088.99 | 58.1 | aws |
| 4.4.0-1090.101 | 58.1 | aws |
| 4.4.0-1092.103 | 58.1 | aws |
| 4.4.0-1094.105 | 58.1 | aws |
| 4.15.0-50.54 | 58.1 | generic, lowlatency |
| 4.15.0-50.54~16.04.1 | 58.1 | generic, lowlatency |
| 4.15.0-51.55 | 58.1 | generic, lowlatency |
| 4.15.0-51.55~16.04.1 | 58.1 | generic, lowlatency |
| 4.15.0-52.56 | 58.1 | lowlatency, generic |
| 4.15.0-52.56~16.04.1 | 58.1 | generic, lowlatency |
| 4.15.0-54.58 | 58.1 | generic, lowlatency |
| 4.15.0-54.58~16.04.1 | 58.1 | generic, lowlatency |
| 4.15.0-55.60 | 58.1 | generic, lowlatency |
| 4.15.0-58.64 | 58.1 | generic, lowlatency |
| 4.15.0-58.64~16.04.1 | 58.1 | lowlatency, generic |
| 4.15.0-60.67 | 58.1 | lowlatency, generic |
| 4.15.0-60.67~16.04.1 | 58.1 | generic, lowlatency |
| 4.15.0-62.69 | 58.1 | generic, lowlatency |
| 4.15.0-62.69~16.04.1 | 58.1 | lowlatency, generic |
| 4.15.0-64.73 | 58.1 | generic, lowlatency |
| 4.15.0-64.73~16.04.1 | 58.1 | lowlatency, generic |
| 4.15.0-65.74 | 58.1 | lowlatency, generic |
| 4.15.0-1038.43 | 58.1 | oem |
| 4.15.0-1039.41 | 58.1 | aws |
| 4.15.0-1039.44 | 58.1 | oem |
| 4.15.0-1040.42 | 58.1 | aws |
| 4.15.0-1041.43 | 58.1 | aws |
| 4.15.0-1043.45 | 58.1 | aws |
| 4.15.0-1043.48 | 58.1 | oem |
| 4.15.0-1044.46 | 58.1 | aws |
| 4.15.0-1045.47 | 58.1 | aws |
| 4.15.0-1045.50 | 58.1 | oem |
| 4.15.0-1047.49 | 58.1 | aws |
| 4.15.0-1047.51 | 58.1 | azure |
| 4.15.0-1048.50 | 58.1 | aws |
| 4.15.0-1049.54 | 58.1 | azure |
| 4.15.0-1050.52 | 58.1 | aws |
| 4.15.0-1050.55 | 58.1 | azure |
| 4.15.0-1050.57 | 58.1 | oem |
| 4.15.0-1051.53 | 58.1 | aws |
| 4.15.0-1051.56 | 58.1 | azure |
| 4.15.0-1052.57 | 58.1 | azure |
| 4.15.0-1055.60 | 58.1 | azure |
| 4.15.0-1056.61 | 58.1 | azure |
| 4.15.0-1056.65 | 58.1 | oem |
| 4.15.0-1057.62 | 58.1 | azure |
| 4.15.0-1057.66 | 58.1 | oem |
| 4.15.0-1059.64 | 58.1 | azure |
| 5.0.0-1014.14~18.04.1 | 58.1 | azure |
| 5.0.0-1016.17~18.04.1 | 58.1 | azure |
| 5.0.0-1018.19~18.04.1 | 58.1 | azure |
| 5.0.0-1020.21~18.04.1 | 58.1 | azure |
Support Information:
Kernels older than the levels listed below do not receive livepatch
updates. Please upgrade your kernel as soon as possible.
| Series | Version | Flavors |
|------------------+------------------+--------------------------|
| Ubuntu 18.04 LTS | 4.15.0-1039 | aws |
| Ubuntu 16.04 LTS | 4.4.0-1083 | aws |
| Ubuntu 18.04 LTS | 5.0.0-1000 | azure |
| Ubuntu 16.04 LTS | 4.15.0-1047 | azure |
| Ubuntu 18.04 LTS | 4.15.0-50 | generic lowlatency |
| Ubuntu 16.04 LTS | 4.15.0-50 | generic lowlatency |
| Ubuntu 14.04 LTS | 4.4.0-148 | generic lowlatency |
| Ubuntu 18.04 LTS | 4.15.0-1038 | oem |
| Ubuntu 16.04 LTS | 4.4.0-148 | generic lowlatency |
References:
CVE-2016-10905, CVE-2018-20856, CVE-2018-20961, CVE-2018-20976,
CVE-2018-21008, CVE-2019-0136, CVE-2019-2054, CVE-2019-2181,
CVE-2019-3846, CVE-2019-10126, CVE-2019-10207, CVE-2019-11477,
CVE-2019-11478, CVE-2019-11833, CVE-2019-12614, CVE-2019-14283,
CVE-2019-14284, CVE-2019-14814, CVE-2019-14815, CVE-2019-14816,
CVE-2019-14821, CVE-2019-14835
--
ubuntu-security-announce mailing list
ubuntu-security-announce@lists.ubuntu.com
Modify settings or unsubscribe at: https://lists.ubuntu.com/mailman/listinfo/ubuntu-security-announce
.
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
[slackware-security] Slackware 14.2 kernel (SSA:2019-311-01)
New kernel packages are available for Slackware 14.2 to fix security issues.
Here are the details from the Slackware 14.2 ChangeLog:
+--------------------------+
patches/packages/linux-4.4.199/*: Upgraded.
These updates fix various bugs and security issues.
If you use lilo to boot your machine, be sure lilo.conf points to the correct
kernel and initrd and run lilo as root to update the bootloader.
If you use elilo to boot your machine, you should run eliloconfig to copy the
kernel and initrd to the EFI System Partition.
For more information, see:
Fixed in 4.4.191:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3900
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15118
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10906
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-10905
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10638
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15117
Fixed in 4.4.193:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14835
Fixed in 4.4.194:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14816
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14814
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15505
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14821
Fixed in 4.4.195:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17053
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17052
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17056
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17055
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17054
Fixed in 4.4.196:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-2215
Fixed in 4.4.197:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16746
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20976
Fixed in 4.4.198:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17075
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-17133
Fixed in 4.4.199:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15098
(* Security fix *)
+--------------------------+
Where to find the new packages:
+-----------------------------+
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)
Also see the "Get Slack" section on http://slackware.com for
additional mirror sites near you.
Updated packages for Slackware 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.199/kernel-generic-4.4.199-i586-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.199/kernel-generic-smp-4.4.199_smp-i686-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.199/kernel-headers-4.4.199_smp-x86-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.199/kernel-huge-4.4.199-i586-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.199/kernel-huge-smp-4.4.199_smp-i686-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.199/kernel-modules-4.4.199-i586-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.199/kernel-modules-smp-4.4.199_smp-i686-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-14.2/patches/packages/linux-4.4.199/kernel-source-4.4.199_smp-noarch-1.txz
Updated packages for Slackware x86_64 14.2:
ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/linux-4.4.199/kernel-generic-4.4.199-x86_64-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/linux-4.4.199/kernel-headers-4.4.199-x86-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/linux-4.4.199/kernel-huge-4.4.199-x86_64-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/linux-4.4.199/kernel-modules-4.4.199-x86_64-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-14.2/patches/packages/linux-4.4.199/kernel-source-4.4.199-noarch-1.txz
MD5 signatures:
+-------------+
Slackware 14.2 packages:
0e523f42e759ecc2399f36e37672f110 kernel-generic-4.4.199-i586-1.txz
ee6451f5362008b46fee2e08e3077b21 kernel-generic-smp-4.4.199_smp-i686-1.txz
a8338ef88f2e3ea9c74d564c36ccd420 kernel-headers-4.4.199_smp-x86-1.txz
cd9e9c241e4eec2fba1dae658a28870e kernel-huge-4.4.199-i586-1.txz
842030890a424023817d42a83a86a7f4 kernel-huge-smp-4.4.199_smp-i686-1.txz
257db024bb4501548ac9118dbd2d9ae6 kernel-modules-4.4.199-i586-1.txz
96377cbaf7bca55aaca70358c63151a7 kernel-modules-smp-4.4.199_smp-i686-1.txz
0673e86466f9e624964d95107cf6712f kernel-source-4.4.199_smp-noarch-1.txz
Slackware x86_64 14.2 packages:
6d1ff428e7cad6caa8860acc402447a1 kernel-generic-4.4.199-x86_64-1.txz
dadc091dc725b8227e0d1e35098d6416 kernel-headers-4.4.199-x86-1.txz
f5f4c034203f44dd1513ad3504c42515 kernel-huge-4.4.199-x86_64-1.txz
a5337cd8b2ca80d4d93b9e9688e42b03 kernel-modules-4.4.199-x86_64-1.txz
5dd6e46c04f37b97062dc9e52cc38add kernel-source-4.4.199-noarch-1.txz
Installation instructions:
+------------------------+
Upgrade the packages as root:
# upgradepkg kernel-*.txz
If you are using an initrd, you'll need to rebuild it.
For a 32-bit SMP machine, use this command (substitute the appropriate
kernel version if you are not running Slackware 14.2):
# /usr/share/mkinitrd/mkinitrd_command_generator.sh -k 4.4.199-smp | bash
For a 64-bit machine, or a 32-bit uniprocessor machine, use this command
(substitute the appropriate kernel version if you are not running
Slackware 14.2):
# /usr/share/mkinitrd/mkinitrd_command_generator.sh -k 4.4.199 | bash
Please note that "uniprocessor" has to do with the kernel you are running,
not with the CPU. Most systems should run the SMP kernel (if they can)
regardless of the number of cores the CPU has. If you aren't sure which
kernel you are running, run "uname -a". If you see SMP there, you are
running the SMP kernel and should use the 4.4.199-smp version when running
mkinitrd_command_generator. Note that this is only for 32-bit -- 64-bit
systems should always use 4.4.199 as the version.
If you are using lilo or elilo to boot the machine, you'll need to ensure
that the machine is properly prepared before rebooting.
If using LILO:
By default, lilo.conf contains an image= line that references a symlink
that always points to the correct kernel. No editing should be required
unless your machine uses a custom lilo.conf. If that is the case, be sure
that the image= line references the correct kernel file. Either way,
you'll need to run "lilo" as root to reinstall the boot loader.
If using elilo:
Ensure that the /boot/vmlinuz symlink is pointing to the kernel you wish
to use, and then run eliloconfig to update the EFI System Partition.
+-----+
Slackware Linux Security Team
http://slackware.com/gpg-key
security@slackware.com
+------------------------------------------------------------------------+
| To leave the slackware-security mailing list: |
+------------------------------------------------------------------------+
| Send an email to majordomo@slackware.com with this text in the body of |
| the email message: |
| |
| unsubscribe slackware-security |
| |
| You will get a confirmation message back containing instructions to |
| complete the process. Please do not reply to this email address.
This update provides the corresponding updates for the Linux
Hardware Enablement (HWE) kernel from Ubuntu 19.04 for Ubuntu
18.04 LTS. Please note that the RDS protocol is blacklisted in Ubuntu by
default. (CVE-2019-2181)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 18.04 LTS:
linux-image-5.0.0-1021-gcp 5.0.0-1021.21~18.04.1
linux-image-5.0.0-1023-azure 5.0.0-1023.24~18.04.1
linux-image-5.0.0-1023-gke 5.0.0-1023.23~18.04.2
linux-image-5.0.0-32-generic 5.0.0-32.34~18.04.2
linux-image-5.0.0-32-generic-lpae 5.0.0-32.34~18.04.2
linux-image-5.0.0-32-lowlatency 5.0.0-32.34~18.04.2
linux-image-azure 5.0.0.1023.33
linux-image-gcp 5.0.0.1021.26
linux-image-generic-hwe-18.04 5.0.0.32.89
linux-image-generic-lpae-hwe-18.04 5.0.0.32.89
linux-image-gke-5.0 5.0.0.1023.12
linux-image-lowlatency-hwe-18.04 5.0.0.32.89
linux-image-snapdragon-hwe-18.04 5.0.0.32.89
linux-image-virtual-hwe-18.04 5.0.0.32.89
After a standard system update you need to reboot your computer to make
all the necessary changes.
ATTENTION: Due to an unavoidable ABI change the kernel updates have
been given a new version number, which requires you to recompile and
reinstall all third party kernel modules you might have installed.
Unless you manually uninstalled the standard kernel metapackages
(e.g. linux-generic, linux-generic-lts-RELEASE, linux-virtual,
linux-powerpc), a standard system upgrade will automatically perform
this as well. 8) - aarch64, noarch, ppc64le, s390x, x86_64
3.
Bug Fix(es):
* [Azure][8.1] Include patch "PCI: hv: Avoid use of hv_pci_dev->pci_slot
after freeing it" (BZ#1764635)
* block layer: update to v5.3 (BZ#1777766)
* backport xfs: fix missing ILOCK unlock when xfs_setattr_nonsize fails due
to EDQUOT (BZ#1778692)
* Backport important bugfixes from upstream post 5.3 (BZ#1778693)
* LUN path recovery issue with Emulex LPe32002 HBA in RHEL 8.0 Server
during storage side cable pull testing (BZ#1781108)
* cifs tasks enter D state and error out with "CIFS VFS: SMB signature
verification returned error = -5" (BZ#1781110)
* Update CIFS to linux 5.3 (except RDMA and conflicts) (BZ#1781113)
* RHEL8.0 - Regression to RHEL7.6 by changing force_latency found during
RHEL8.0 validation for SAP HANA on POWER (BZ#1781114)
* blk-mq: overwirte performance drops on real MQ device (BZ#1782181)
4. 8) - x86_64
3.
Bug Fix(es):
* kernel-rt: update RT source tree to the RHEL-8.1.z2 source tree
(BZ#1780326)
4
| VAR-201908-0838 | CVE-2019-1967 | Cisco NX-OS Software resource management vulnerability |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
A vulnerability in the Network Time Protocol (NTP) feature of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to excessive use of system resources when the affected device is logging a drop action for received MODE_PRIVATE (Mode 7) NTP packets. An attacker could exploit this vulnerability by flooding the device with a steady stream of Mode 7 NTP packets. A successful exploit could allow the attacker to cause high CPU and memory usage on the affected device, which could cause internal system processes to restart or cause the affected device to unexpectedly reload. Note: The NTP feature is enabled by default. Cisco NX-OS The software contains a resource management vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Cisco NX-OS Software is a data center-level operating system software used by a set of switches of Cisco. The following products and versions are affected: Cisco MDS 9000 Series Multilayer Switches; Nexus 3000 Series Switches; Nexus 3500 Platform Switches; Nexus 3600 Platform Switches; Nexus 5500 Platform Switches; Nexus 5600 Platform Switches; 7700 Series Switches; Nexus 9000 Series Switches (standalone NX-OS mode); Nexus 9500 R-Series Switching Platform
| VAR-201908-0839 | CVE-2019-1968 | Cisco NX-OS Software input validation vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A vulnerability in the NX-API feature of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause an NX-API system process to unexpectedly restart. The vulnerability is due to incorrect validation of the HTTP header of a request that is sent to the NX-API. An attacker could exploit this vulnerability by sending a crafted HTTP request to the NX-API on an affected device. A successful exploit could allow the attacker to cause a denial of service (DoS) condition in the NX-API service; however, the NX-OS device itself would still be available and passing network traffic. Note: The NX-API feature is disabled by default. Cisco NX-OS The software contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Cisco NX-OS Software is a data center-level operating system software used by a set of switches of Cisco. The following products and versions are affected: Cisco MDS 9000 Series Multilayer Switches; Nexus 3000 Series Switches; Nexus 3500 Platform Switches; Nexus 3600 Platform Switches; Nexus 5500 Platform Switches; Nexus 5600 Platform Switches; 7700 Series Switches; Nexus 9000 Series Switches (standalone NX-OS mode); Nexus 9500 R-Series Switching Platform
| VAR-201908-0856 | CVE-2019-1977 | Cisco Nexus 9000 Series switch state vulnerability |
CVSS V2: 4.3 CVSS V3: 7.5 Severity: HIGH |
A vulnerability within the Endpoint Learning feature of Cisco Nexus 9000 Series Switches running in Application Centric Infrastructure (ACI) mode could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an endpoint device in certain circumstances. The vulnerability is due to improper endpoint learning when packets are received on a specific port from outside the ACI fabric and destined to an endpoint located on a border leaf when Disable Remote Endpoint Learning has been enabled. This can result in a Remote (XR) entry being created for the impacted endpoint that will become stale if the endpoint migrates to a different port or leaf switch. This results in traffic not reaching the impacted endpoint until the Remote entry can be relearned by another mechanism. Cisco Nexus 9000 Series switches have a state vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. NX-OS ACI Software is one of the operating systems used in Cisco network equipment. A remote attacker could exploit this vulnerability to cause a denial of service
| VAR-201908-0848 | CVE-2019-1966 | Cisco UCS Fabric Interconnect Vulnerability related to authorization, authority, and access control in software |
CVSS V2: 7.2 CVSS V3: 7.8 Severity: HIGH |
A vulnerability in a specific CLI command within the local management (local-mgmt) context for Cisco UCS Fabric Interconnect Software could allow an authenticated, local attacker to gain elevated privileges as the root user on an affected device. The vulnerability is due to extraneous subcommand options present for a specific CLI command within the local-mgmt context. An attacker could exploit this vulnerability by authenticating to an affected device, entering the local-mgmt context, and issuing a specific CLI command and submitting user input. A successful exploit could allow the attacker to execute arbitrary operating system commands as root on an affected device. The attacker would need to have valid user credentials for the device. Cisco UCS Fabric Interconnect The software contains vulnerabilities related to authorization, permissions, and access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Cisco UCS 6200 Series Fabric Interconnects, etc. are all products of Cisco (Cisco). Cisco UCS 6200 Series Fabric Interconnects is a 6200 series switching fabric device. UCS 6300 Series Fabric Interconnects is a 6300 series switching fabric device. UCS 6400 Series Fabric Interconnects is a 6400 series switching fabric device
| VAR-201908-0568 | CVE-2019-13405 | Advan VD-1 Firmware access control vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
A broken access control vulnerability found in Advan VD-1 firmware version 230 leads to insecure ADB service. An attacker can send a POST request to cgibin/AdbSetting.cgi to enable ADB without any authentication then take the compromised device as a relay or to install mining software. Advan VD-1 The firmware contains a vulnerability related to access control.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. AndroVideo Advan VD-1 is a security camera from Taiwan's AndroVideo.
AndroVideo Advan VD-1 has an access control error vulnerability. No detailed vulnerability details are provided at this time. AndroVideo Advan VD-1 is a security camera produced by AndroVideo Company in Taiwan, China. This vulnerability stems from network systems or products not properly restricting access to resources from unauthorized roles
| VAR-201908-0571 | CVE-2019-13408 | AndroVideo Advan VD-1 path traversal vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A relative path traversal vulnerability found in Advan VD-1 firmware versions up to 230. It allows attackers to download arbitrary files via url cgibin/ExportSettings.cgi?Download=filepath, without any authentication. AndroVideo Advan VD-1 is a security camera from Taiwan's AndroVideo. An attacker could use this vulnerability to access locations outside the restricted directory. AndroVideo Advan VD-1 is a security camera produced by AndroVideo Company in Taiwan, China. The vulnerability stems from a network system or product that fails to properly filter resources or special elements in file paths
| VAR-201908-0065 | CVE-2019-9932 | plural Lexmark Product buffer error vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Various Lexmark products have a Buffer Overflow (issue 2 of 3). plural Lexmark The product contains a buffer error vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state. Lexmark CS31x and others are all printers from Lexmark. This vulnerability stems from the incorrect verification of data boundaries when the network system or product performs operations on the memory, resulting in incorrect read and write operations to other associated memory locations. The following products and versions are affected: Lexmark CS31x with firmware LW71.VYL.P230 and earlier; CS41x with firmware LW71.VY2.P230 and earlier; CS51x with firmware LW71.VY4.P230 and earlier; GM2.P230 and previous versions of CX310, etc
| VAR-201908-0570 | CVE-2019-13407 | Advan VD-1 Firmware cross-site scripting vulnerability |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
A XSS found in Advan VD-1 firmware versions up to 230. VD-1 responses a path error message when a requested resource was not found in page cgibin/ssi.cgi. It leads to a reflected XSS because the error message does not escape properly. Advan VD-1 The firmware contains a cross-site scripting vulnerability.Information may be obtained and information may be altered. AndroVideo Advan VD-1 is a security camera produced by AndroVideo Company in Taiwan, China. The vulnerability stems from the lack of correct validation of client data in WEB applications. An attacker could exploit this vulnerability to execute client code
| VAR-201908-0569 | CVE-2019-13406 | AndroVideo Advan VD-1 Access Control Error Vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
A broken access control vulnerability found in Advan VD-1 firmware versions up to 230. An attacker can send a POST request to cgibin/ApkUpload.cgi to install arbitrary APK without any authentication. AndroVideo Advan VD-1 is a security camera from Taiwan's AndroVideo. AndroVideo Advan VD-1 is a security camera produced by AndroVideo Company in Taiwan, China
| VAR-201908-1622 | CVE-2019-10059 | Lexmark Vulnerabilities related to security functions in devices |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
The legacy finger service (TCP port 79) is enabled by default on various older Lexmark devices. Lexmark The device contains vulnerabilities related to security functions.Information may be obtained. Lexmark CS31x and others are all printers from Lexmark. This vulnerability is due to the lack of security measures such as authentication, access control, and rights management in network systems or products. The following products and versions are affected: Lexmark CS31x using LW71.VYL.P233 and earlier; CS41x using LW71.VY2.P233 and earlier; CS51x using LW71.VY4.P233 and earlier; using LW71.GM2.P233 and earlier version of the CX310, etc
| VAR-201908-0064 | CVE-2019-9931 | plural Lexmark Vulnerability related to input validation in printers |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
Various Lexmark printers contain a denial of service vulnerability in the SNMP service that can be exploited to crash the device. plural Lexmark The printer contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state
| VAR-201908-0063 | CVE-2019-9930 | plural Lexmark Product integer overflow vulnerability |
CVSS V2: 10.0 CVSS V3: 9.8 Severity: CRITICAL |
Various Lexmark products have an Integer Overflow. plural Lexmark The product contains an integer overflow vulnerability.Information is obtained, information is altered, and service operation is disrupted (DoS) There is a possibility of being put into a state
| VAR-201908-0845 | CVE-2019-1963 | Cisco FXOS Software and Cisco NX-OS Software input validation vulnerability |
CVSS V2: 6.8 CVSS V3: 6.5 Severity: MEDIUM |
A vulnerability in the Simple Network Management Protocol (SNMP) input packet processor of Cisco FXOS Software and Cisco NX-OS Software could allow an authenticated, remote attacker to cause the SNMP application on an affected device to restart unexpectedly. The vulnerability is due to improper validation of Abstract Syntax Notation One (ASN.1)-encoded variables in SNMP packets. An attacker could exploit this vulnerability by sending a crafted SNMP packet to the SNMP daemon on the affected device. A successful exploit could allow the attacker to cause the SNMP application to restart multiple times, leading to a system-level restart and a denial of service (DoS) condition. Cisco FXOS Software and Cisco NX-OS The software contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Cisco Firepower 4100 Series, etc. are all products of Cisco (Cisco). Cisco Firepower 4100 Series is a 4100 series firewall device. Cisco Nexus 3000 Series Switches is a 3000 series switch. Cisco MDS 9000 Series Multilayer Switches is a MDS 9000 series multilayer switch. The following products and versions are affected: Cisco Firepower 4100 Series; Firepower 9300 Security Appliances; MDS 9000 Series Multilayer Switches; Nexus 1000 Virtual Edge for VMware vSphere; Nexus 1000V Switch for Microsoft Hyper-V; Switches; Nexus 3500 Platform Switches; Nexus 3600 Platform Switches; Nexus 5500 Platform Switches; Nexus 5600 Platform Switches; Nexus 6000 Series Switches; Nexus 7000
| VAR-201908-0847 | CVE-2019-1965 | Cisco NX-OS Software depletion vulnerability |
CVSS V2: 4.0 CVSS V3: 7.7 Severity: HIGH |
A vulnerability in the Virtual Shell (VSH) session management for Cisco NX-OS Software could allow an authenticated, remote attacker to cause a VSH process to fail to delete upon termination. This can lead to a build-up of VSH processes that overtime can deplete system memory. When there is no system memory available, this can cause unexpected system behaviors and crashes. The vulnerability is due to the VSH process not being properly deleted when a remote management connection to the device is disconnected. An attacker could exploit this vulnerability by repeatedly performing a remote management connection to the device and terminating the connection in an unexpected manner. A successful exploit could allow the attacker to cause the VSH processes to fail to delete, which can lead to a system-wide denial of service (DoS) condition. The attacker must have valid user credentials to log in to the device using the remote management connection. Cisco NX-OS The software is vulnerable to resource exhaustion.Service operation interruption (DoS) There is a possibility of being put into a state. Cisco Nexus 3000 Series Switches and others are products of Cisco. The Cisco Nexus 3000 Series Switches is a 3000 Series switch. The Cisco Nexus 3500 Platform Switches is a 3500 Series platform switch. The Cisco MDS 9000 Series Multilayer Switches are an MDS 9000 Series multilayer switch. Cisco NX-OS Software is a data center-level operating system software used by a switch
| VAR-201908-0844 | CVE-2019-1962 | Cisco NX-OS Software Cisco Fabric Services Component Input Validation Error Vulnerability |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
A vulnerability in the Cisco Fabric Services component of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause process crashes, which can result in a denial of service (DoS) condition on an affected system. The vulnerability is due to insufficient validation of TCP packets when processed by the Cisco Fabric Services over IP (CFSoIP) feature. An attacker could exploit this vulnerability by sending a malicious Cisco Fabric Services TCP packet to an affected device. A successful exploit could allow the attacker to cause process crashes, resulting in a device reload and a DoS condition. Note: There are three distribution methods that can be configured for Cisco Fabric Services. This vulnerability affects only distribution method CFSoIP, which is disabled by default. See the Details section for more information. Cisco NX-OS The software contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Cisco Nexus 3000 Series Switches and others are products of Cisco. The Cisco Nexus 3000 Series Switches is a 3000 Series switch. The Cisco Nexus 3500 Platform Switches is a 3500 Series platform switch. The Cisco MDS 9000 Series Multilayer Switches are an MDS 9000 Series multilayer switch. Cisco NX-OS Software is a data center-level operating system software used by a switch
| VAR-201908-0267 | CVE-2019-12643 | Cisco IOS XE Software authentication vulnerabilities |
CVSS V2: 10.0 CVSS V3: 10.0 Severity: CRITICAL |
A vulnerability in the Cisco REST API virtual service container for Cisco IOS XE Software could allow an unauthenticated, remote attacker to bypass authentication on the managed Cisco IOS XE device. The vulnerability is due to an improper check performed by the area of code that manages the REST API authentication service. An attacker could exploit this vulnerability by submitting malicious HTTP requests to the targeted device. A successful exploit could allow the attacker to obtain the token-id of an authenticated user. This token-id could be used to bypass authentication and execute privileged actions through the interface of the REST API virtual service container on the affected Cisco IOS XE device. The REST API interface is not enabled by default and must be installed and activated separately on IOS XE devices. See the Details section for more information. The following products and versions are affected: Cisco 4000 Series Integrated Services Routers; ASR 1000 Series Aggregation Services Routers; Cloud Services Router 1000V Series; Integrated Services Virtual Router
| VAR-201908-0846 | CVE-2019-1964 | Cisco Nexus 7000 Series Switches and Nexus 7700 Series Switches NX-OS Software Input Validation Error Vulnerability |
CVSS V2: 7.8 CVSS V3: 7.5 Severity: HIGH |
A vulnerability in the IPv6 traffic processing of Cisco NX-OS Software could allow an unauthenticated, remote attacker to cause an unexpected restart of the netstack process on an affected device. The vulnerability is due to improper validation of IPv6 traffic sent through an affected device. An attacker could exploit this vulnerability by sending a malformed IPv6 packet through an affected device. A successful exploit could allow the attacker to cause a denial of service (DoS) condition while the netstack process restarts. A sustained attack could lead to a reboot of the device. Cisco NX-OS The software contains an input validation vulnerability.Service operation interruption (DoS) There is a possibility of being put into a state. Cisco Nexus 7000 Series Switches and Cisco Nexus 7700 Series Switches are products of Cisco. The Cisco Nexus 7000 Series Switches is a 7000 Series switch. The Cisco Nexus 7700 Series Switches is a 7700 Series switch. Cisco NX-OS Software is a data center-level operating system software used by a switch
| VAR-201908-0058 | CVE-2019-9934 | plural Lexmark Access control vulnerabilities in products |
CVSS V2: 5.0 CVSS V3: 5.3 Severity: MEDIUM |
Various Lexmark products have Incorrect Access Control (issue 1 of 2). Lexmark CS31x and others are all printers from Lexmark. This vulnerability stems from network systems or products not properly restricting access to resources from unauthorized roles. The following products and versions are affected: CS31x with firmware LW71.VYL.P229 and earlier; CS41x with firmware LW71.VY2.P229 and earlier; CX310 with firmware LW71.GM2.P229 and earlier; MS310 with .P229 and earlier firmware; MS312 with LW71.GM2.P229 and earlier firmware; MS317 with LW71.GM2.P229 and earlier firmware; MS410 with LW71.PRL.P229 and earlier firmware; M1140 with firmware version .PRL.P229 and earlier; MS315 with firmware version LW71.TL2.P229 and earlier; MS415 with firmware version LW71.TL2.P229 and earlier; MS417 with firmware version LW71.TL2.P229 and earlier; MX31x with firmware LW71.SB2.P229 and earlier; XM1135 with firmware LW71.SB2.P229 and earlier; MS51x with firmware LW71.PR2.P229 and earlier; firmware with LW71.PR2.P229 and earlier MS610dn; MS617 using LW71.PR2.P229 and earlier firmware; M1145 using LW71.PR2.P229 and earlier firmware; M3150dn using LW71.PR2.P229 and earlier firmware; using LW71.DN2.P229 and earlier MS71x with firmware LW71.DN2.P229 and earlier; M5163dn with firmware LW71.DN2.P229 and earlier; MS810 with firmware LW71.DN2.P229 and earlier; MS811 with firmware LW71.DN2.P229 and earlier; MS812 with previous version firmware; MS817 with LW71.DN2.P229 and previous version firmware; MS818 with LW71.DN2.P229 and previous version firmware