Malware Devil

Monday, November 9, 2020

Creando presupuestos para ciberseguridad efectivos

Construir una organización eficaz y resistente con un presupuesto limitado es una gran hazaña. Cuando se trata de presupuestos de ciberseguridad, hay muchos aspectos que deben considerarse. Afortunadamente, la alineación con las mejores prácticas de la industria y los marcos de seguridad agregan un poco de claridad a este desafío. Al presentar el webcast “¡Todo […]… Read More

The post Creando presupuestos para ciberseguridad efectivos appeared first on The State of Security.

The post Creando presupuestos para ciberseguridad efectivos appeared first on Security Boulevard.

Read More

The post Creando presupuestos para ciberseguridad efectivos appeared first on Malware Devil.



https://malwaredevil.com/2020/11/09/creando-presupuestos-para-ciberseguridad-efectivos/?utm_source=rss&utm_medium=rss&utm_campaign=creando-presupuestos-para-ciberseguridad-efectivos

CISA Strategy for 5G Security and Resilience

In August 2020, the Cybersecurity and Infrastructure Security Agency (CISA) released its strategy to ensure the security and resilience of 5G infrastructure in the United States. Roughly every 10 years, the next generation of mobile communication networks is released, bringing faster speeds and increased capabilities. The fifth generation (5G) of wireless technology is a complete […]… Read More

The post CISA Strategy for 5G Security and Resilience appeared first on The State of Security.

The post CISA Strategy for 5G Security and Resilience appeared first on Security Boulevard.

Read More

The post CISA Strategy for 5G Security and Resilience appeared first on Malware Devil.



https://malwaredevil.com/2020/11/09/cisa-strategy-for-5g-security-and-resilience/?utm_source=rss&utm_medium=rss&utm_campaign=cisa-strategy-for-5g-security-and-resilience

ISC Stormcast For Monday, November 9th 2020 https://isc.sans.edu/podcastdetail.html?id=7244, (Mon, Nov 9th)

(c) SANS Internet Storm Center. https://isc.sans.edu Creative Commons Attribution-Noncommercial 3.0 United States License. Read More

The post ISC Stormcast For Monday, November 9th 2020 https://isc.sans.edu/podcastdetail.html?id=7244, (Mon, Nov 9th) appeared first on Malware Devil.



https://malwaredevil.com/2020/11/09/isc-stormcast-for-monday-november-9th-2020-https-isc-sans-edu-podcastdetail-htmlid7244-mon-nov-9th/?utm_source=rss&utm_medium=rss&utm_campaign=isc-stormcast-for-monday-november-9th-2020-https-isc-sans-edu-podcastdetail-htmlid7244-mon-nov-9th

ESB-2020.3939 – [Debian] libexif: Execute arbitrary code/commands – Remote with user interaction

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.3939
                          libexif security update
                              9 November 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           libexif
Publisher:         Debian
Operating System:  Debian GNU/Linux
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-0452  

Reference:         ESB-2020.3934

Original Bulletin: 
   http://www.debian.org/security/2020/dsa-4786

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4786-1                   security@debian.org
https://www.debian.org/security/                       Moritz Muehlenhoff
November 08, 2020                     https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : libexif
CVE ID         : CVE-2020-0452

It was discovered that a boundary check in libexif, a library to parse
EXIF files, could be optimised away by the compiler, resulting in
a potential buffer overflow.

For the stable distribution (buster), this problem has been fixed in
version 0.6.21-5.1+deb10u5.

We recommend that you upgrade your libexif packages.

For the detailed security status of libexif please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libexif

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----
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=Yb9P
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=ICdB
-----END PGP SIGNATURE-----

Read More

The post ESB-2020.3939 – [Debian] libexif: Execute arbitrary code/commands – Remote with user interaction appeared first on Malware Devil.



https://malwaredevil.com/2020/11/09/esb-2020-3939-debian-libexif-execute-arbitrary-code-commands-remote-with-user-interaction/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2020-3939-debian-libexif-execute-arbitrary-code-commands-remote-with-user-interaction

ESB-2020.3938 – [Debian] wordpress: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.3938
                         wordpress security update
                              9 November 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           wordpress
Publisher:         Debian
Operating System:  Debian GNU/Linux
Impact/Access:     Execute Arbitrary Code/Commands -- Remote/Unauthenticated      
                   Increased Privileges            -- Remote/Unauthenticated      
                   Cross-site Request Forgery      -- Remote with User Interaction
                   Denial of Service               -- Remote/Unauthenticated      
                   Cross-site Scripting            -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-28040 CVE-2020-28039 CVE-2020-28038
                   CVE-2020-28037 CVE-2020-28036 CVE-2020-28035
                   CVE-2020-28034 CVE-2020-28033 CVE-2020-28032

Reference:         ESB-2020.3789

Original Bulletin: 
   http://www.debian.org/security/2020/dsa-4784

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

- - -------------------------------------------------------------------------
Debian Security Advisory DSA-4784-1                   security@debian.org
https://www.debian.org/security/                       Sebastien Delafond
November 06, 2020                     https://www.debian.org/security/faq
- - -------------------------------------------------------------------------

Package        : wordpress
CVE ID         : CVE-2020-28032 CVE-2020-28033 CVE-2020-28034 CVE-2020-28035 
                 CVE-2020-28036 CVE-2020-28037 CVE-2020-28038 CVE-2020-28039 
                 CVE-2020-28040
Debian Bug     : 971914 973562

Several vulnerabilities were discovered in WordPress, a web blogging
tool. They allowed remote attackers to run insecure deserialization,
embed spam, perform various Cross-Site Scripting (XSS) or Cross-Site
Request Forgery (CSRF) attacks, escalate privileges, run arbitrary
code, and delete arbitrary files.

For the stable distribution (buster), these problems have been fixed in
version 5.0.11+dfsg1-0+deb10u1.

We recommend that you upgrade your wordpress packages.

For the detailed security status of wordpress please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/wordpress

Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/

Mailing list: debian-security-announce@lists.debian.org
- -----BEGIN PGP SIGNATURE-----

iQEzBAEBCgAdFiEEAqSkbVtrXP4xJMh3EL6Jg/PVnWQFAl+lSYUACgkQEL6Jg/PV
nWStuwgAoDBZA5FLY+lIr5ioN46PD2SzjnNwBsyyBHHdu81Lbrid976RVFUfUsex
AtTQGIbDG3lr3DSL0lzwQKikgRnTHDO42PwP+dATpK3yH0sjr8xSSr3rqVITz+iB
qQVWc2UqHR+zUUbxoa6/W2V9y+zqVmm1BDvkIlbHw4x2m8/ErhrEo8FR9C3105I0
DdzQXxSFEEK6l/090I7gGtXIFHa9izk8AQ8pgytBTUAveWE/sLWdF1vHDfQhb3FY
HSPs/uzVvbLBDDfwr8xRWVjkL8kyism5ynmRwqtE+AiMqDWSVGlADdcZtcsyUeDt
WpOwXIdWwNIPrpalNbLeO/Bu2apvWw==
=Jo4W
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=IQcp
-----END PGP SIGNATURE-----

Read More

The post ESB-2020.3938 – [Debian] wordpress: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2020/11/09/esb-2020-3938-debian-wordpress-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2020-3938-debian-wordpress-multiple-vulnerabilities

ESB-2020.3937 – [SUSE] linux kernel: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.3937
            Security update for the Linux Kernel (Live Patches)
                              9 November 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           linux kernel
Publisher:         SUSE
Operating System:  SUSE
Impact/Access:     Root Compromise          -- Existing Account      
                   Denial of Service        -- Existing Account      
                   Access Confidential Data -- Remote/Unauthenticated
                   Reduced Security         -- Existing Account      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-25212 CVE-2020-24394 CVE-2020-14386
                   CVE-2020-14381 CVE-2020-11668 CVE-2020-1749
                   CVE-2020-0431 CVE-2020-0429 

Reference:         ESB-2020.3907
                   ESB-2020.3888
                   ESB-2020.3775
                   ESB-2020.3682
                   ESB-2020.3669

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2020/suse-su-20203225-1
   https://www.suse.com/support/update/announcement/2020/suse-su-20203219-1
   https://www.suse.com/support/update/announcement/2020/suse-su-20203204-1
   https://www.suse.com/support/update/announcement/2020/suse-su-20203210-1
   https://www.suse.com/support/update/announcement/2020/suse-su-20203222-1

Comment: This bulletin contains five (5) SUSE security advisories.

- --------------------------BEGIN INCLUDED TEXT--------------------

SUSE Security Update: Security update for the Linux Kernel (Live Patch 29 for
SLE 12 SP3)

______________________________________________________________________________

Announcement ID:   SUSE-SU-2020:3225-1
Rating:            important
References:        #1176012 #1176072 #1176382 #1176896 #1176931
Cross-References:  CVE-2020-0429 CVE-2020-0431 CVE-2020-14381 CVE-2020-14386
                   CVE-2020-25212
Affected Products:
                   SUSE Linux Enterprise Server for SAP 12-SP3
                   SUSE Linux Enterprise Server for SAP 12-SP2
                   SUSE Linux Enterprise Server 12-SP3-LTSS
                   SUSE Linux Enterprise Server 12-SP2-LTSS
______________________________________________________________________________

An update that fixes 5 vulnerabilities is now available.

Description:

This update for the Linux Kernel 4.4.180-94_107 fixes several issues.
The following security issues were fixed:

  o CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c,
    there is possible memory corruption due to a use after free. This could
    lead to local escalation of privilege with system execution privileges
    needed. User interaction is not needed for exploitation. (bsc#1176724)
  o CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait
    operation, which could have lead to memory corruption and possibly
    privilege escalation (bsc#1176011).
  o CVE-2020-0431: In kbd_keycode of keyboard.c, there is a possible out of
    bounds write due to a missing bounds check. This could lead to local
    escalation of privilege with no additional execution privileges needed.
    User interaction is not needed for exploitation. (bsc#1176722)
  o CVE-2020-25212: A TOCTOU mismatch in the NFS client code could be used by
    local attackers to corrupt memory or possibly have unspecified other impact
    because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c
    (bsc#1176381).
  o CVE-2020-14386: Fixed a memory corruption which could have lead to an
    attacker gaining root privileges from unprivileged processes. The highest
    threat from this vulnerability is to data confidentiality and integrity
    (bsc#1176069).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise Server for SAP 12-SP3:
    zypper in -t patch SUSE-SLE-SAP-12-SP3-2020-3202=1
    SUSE-SLE-SAP-12-SP3-2020-3209=1 SUSE-SLE-SAP-12-SP3-2020-3218=1
    SUSE-SLE-SAP-12-SP3-2020-3220=1 SUSE-SLE-SAP-12-SP3-2020-3221=1
    SUSE-SLE-SAP-12-SP3-2020-3225=1
  o SUSE Linux Enterprise Server for SAP 12-SP2:
    zypper in -t patch SUSE-SLE-SAP-12-SP2-2020-3227=1
    SUSE-SLE-SAP-12-SP2-2020-3228=1 SUSE-SLE-SAP-12-SP2-2020-3229=1
    SUSE-SLE-SAP-12-SP2-2020-3233=1
  o SUSE Linux Enterprise Server 12-SP3-LTSS:
    zypper in -t patch SUSE-SLE-SERVER-12-SP3-2020-3202=1
    SUSE-SLE-SERVER-12-SP3-2020-3209=1 SUSE-SLE-SERVER-12-SP3-2020-3218=1
    SUSE-SLE-SERVER-12-SP3-2020-3220=1 SUSE-SLE-SERVER-12-SP3-2020-3221=1
    SUSE-SLE-SERVER-12-SP3-2020-3225=1
  o SUSE Linux Enterprise Server 12-SP2-LTSS:
    zypper in -t patch SUSE-SLE-SERVER-12-SP2-2020-3227=1
    SUSE-SLE-SERVER-12-SP2-2020-3228=1 SUSE-SLE-SERVER-12-SP2-2020-3229=1
    SUSE-SLE-SERVER-12-SP2-2020-3233=1

Package List:

  o SUSE Linux Enterprise Server for SAP 12-SP3 (ppc64le x86_64):
       kgraft-patch-4_4_180-94_107-default-8-2.2
       kgraft-patch-4_4_180-94_107-default-debuginfo-8-2.2
       kgraft-patch-4_4_180-94_113-default-7-2.2
       kgraft-patch-4_4_180-94_113-default-debuginfo-7-2.2
       kgraft-patch-4_4_180-94_116-default-4-2.2
       kgraft-patch-4_4_180-94_116-default-debuginfo-4-2.2
       kgraft-patch-4_4_180-94_121-default-3-2.2
       kgraft-patch-4_4_180-94_121-default-debuginfo-3-2.2
       kgraft-patch-4_4_180-94_124-default-3-2.2
       kgraft-patch-4_4_180-94_124-default-debuginfo-3-2.2
       kgraft-patch-4_4_180-94_127-default-3-2.1
       kgraft-patch-4_4_180-94_127-default-debuginfo-3-2.1
  o SUSE Linux Enterprise Server for SAP 12-SP2 (ppc64le x86_64):
       kgraft-patch-4_4_121-92_125-default-8-2.2
       kgraft-patch-4_4_121-92_129-default-5-2.2
       kgraft-patch-4_4_121-92_135-default-3-2.2
       kgraft-patch-4_4_121-92_138-default-3-2.1
  o SUSE Linux Enterprise Server 12-SP3-LTSS (ppc64le x86_64):
       kgraft-patch-4_4_180-94_107-default-8-2.2
       kgraft-patch-4_4_180-94_107-default-debuginfo-8-2.2
       kgraft-patch-4_4_180-94_113-default-7-2.2
       kgraft-patch-4_4_180-94_113-default-debuginfo-7-2.2
       kgraft-patch-4_4_180-94_116-default-4-2.2
       kgraft-patch-4_4_180-94_116-default-debuginfo-4-2.2
       kgraft-patch-4_4_180-94_121-default-3-2.2
       kgraft-patch-4_4_180-94_121-default-debuginfo-3-2.2
       kgraft-patch-4_4_180-94_124-default-3-2.2
       kgraft-patch-4_4_180-94_124-default-debuginfo-3-2.2
       kgraft-patch-4_4_180-94_127-default-3-2.1
       kgraft-patch-4_4_180-94_127-default-debuginfo-3-2.1
  o SUSE Linux Enterprise Server 12-SP2-LTSS (ppc64le x86_64):
       kgraft-patch-4_4_121-92_125-default-8-2.2
       kgraft-patch-4_4_121-92_129-default-5-2.2
       kgraft-patch-4_4_121-92_135-default-3-2.2
       kgraft-patch-4_4_121-92_138-default-3-2.1


References:

  o https://www.suse.com/security/cve/CVE-2020-0429.html
  o https://www.suse.com/security/cve/CVE-2020-0431.html
  o https://www.suse.com/security/cve/CVE-2020-14381.html
  o https://www.suse.com/security/cve/CVE-2020-14386.html
  o https://www.suse.com/security/cve/CVE-2020-25212.html
  o https://bugzilla.suse.com/1176012
  o https://bugzilla.suse.com/1176072
  o https://bugzilla.suse.com/1176382
  o https://bugzilla.suse.com/1176896
  o https://bugzilla.suse.com/1176931



- --------------------------------------------------------------------------------


SUSE Security Update: Security update for the Linux Kernel (Live Patch 35 for
SLE 12 SP3)

______________________________________________________________________________

Announcement ID:   SUSE-SU-2020:3219-1
Rating:            important
References:        #1165631 #1173942 #1176012 #1176382 #1176896 #1176931
Cross-References:  CVE-2020-0429 CVE-2020-0431 CVE-2020-11668 CVE-2020-14381
                   CVE-2020-1749 CVE-2020-25212
Affected Products:
                   SUSE Linux Enterprise Server for SAP 12-SP3
                   SUSE Linux Enterprise Server for SAP 12-SP2
                   SUSE Linux Enterprise Server 12-SP3-LTSS
                   SUSE Linux Enterprise Server 12-SP2-LTSS
______________________________________________________________________________

An update that fixes 6 vulnerabilities is now available.

Description:

This update for the Linux Kernel 4.4.180-94_130 fixes several issues.
The following security issues were fixed:

  o CVE-2020-0429: In l2tp_session_delete and related functions of l2tp_core.c,
    there is possible memory corruption due to a use after free. This could
    lead to local escalation of privilege with system execution privileges
    needed. User interaction is not needed for exploitation. (bsc#1176724)
  o CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait
    operation, which could have lead to memory corruption and possibly
    privilege escalation (bsc#1176011).
  o CVE-2020-0431: In kbd_keycode of keyboard.c, there is a possible out of
    bounds write due to a missing bounds check. This could lead to local
    escalation of privilege with no additional execution privileges needed.
    User interaction is not needed for exploitation. (bsc#1176722)
  o CVE-2020-25212: A TOCTOU mismatch in the NFS client code could be used by
    local attackers to corrupt memory or possibly have unspecified other impact
    because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c
    (bsc#1176381).
  o CVE-2020-11668: Fixed an out of bounds write to the heap in drivers/media/
    usb/gspca/xirlink_cit.c (aka the Xirlink camera USB driver) caused by
    mishandling invalid descriptors (bsc#1168952).
  o CVE-2020-1749: A flaw was found in the implementation of some networking
    protocols in IPsec, such as VXLAN and GENEVE tunnels over IPv6. When an
    encrypted tunnel is created between two hosts, the kernel isn't correctly
    routing tunneled data over the encrypted link, rather sending the data
    unencrypted. This would have allowed anyone in between the two endpoints to
    read the traffic unencrypted. (bsc#1165629)

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise Server for SAP 12-SP3:
    zypper in -t patch SUSE-SLE-SAP-12-SP3-2020-3219=1
  o SUSE Linux Enterprise Server for SAP 12-SP2:
    zypper in -t patch SUSE-SLE-SAP-12-SP2-2020-3226=1
  o SUSE Linux Enterprise Server 12-SP3-LTSS:
    zypper in -t patch SUSE-SLE-SERVER-12-SP3-2020-3219=1
  o SUSE Linux Enterprise Server 12-SP2-LTSS:
    zypper in -t patch SUSE-SLE-SERVER-12-SP2-2020-3226=1

Package List:

  o SUSE Linux Enterprise Server for SAP 12-SP3 (ppc64le x86_64):
       kgraft-patch-4_4_180-94_130-default-2-2.1
       kgraft-patch-4_4_180-94_130-default-debuginfo-2-2.1
  o SUSE Linux Enterprise Server for SAP 12-SP2 (ppc64le x86_64):
       kgraft-patch-4_4_121-92_141-default-2-2.1
  o SUSE Linux Enterprise Server 12-SP3-LTSS (ppc64le x86_64):
       kgraft-patch-4_4_180-94_130-default-2-2.1
       kgraft-patch-4_4_180-94_130-default-debuginfo-2-2.1
  o SUSE Linux Enterprise Server 12-SP2-LTSS (ppc64le x86_64):
       kgraft-patch-4_4_121-92_141-default-2-2.1


References:

  o https://www.suse.com/security/cve/CVE-2020-0429.html
  o https://www.suse.com/security/cve/CVE-2020-0431.html
  o https://www.suse.com/security/cve/CVE-2020-11668.html
  o https://www.suse.com/security/cve/CVE-2020-14381.html
  o https://www.suse.com/security/cve/CVE-2020-1749.html
  o https://www.suse.com/security/cve/CVE-2020-25212.html
  o https://bugzilla.suse.com/1165631
  o https://bugzilla.suse.com/1173942
  o https://bugzilla.suse.com/1176012
  o https://bugzilla.suse.com/1176382
  o https://bugzilla.suse.com/1176896
  o https://bugzilla.suse.com/1176931


- --------------------------------------------------------------------------------


SUSE Security Update: Security update for the Linux Kernel (Live 
Patch 4 for SLE 12 SP5)
______________________________________________________________________________

Announcement ID:   SUSE-SU-2020:3204-1
Rating:            important
References:        #1175992 #1176012 #1176072 #1176382 #1176896
Cross-References:  CVE-2020-0431 CVE-2020-14381 CVE-2020-14386 CVE-2020-24394
                   CVE-2020-25212
Affected Products:
                   SUSE Linux Enterprise Live Patching 12-SP5
                   SUSE Linux Enterprise Live Patching 12-SP4
______________________________________________________________________________

Patch 4 for
SLE 12 SP5)

An update that fixes 5 vulnerabilities is now available.

Description:

This update for the Linux Kernel 4.12.14-122_20 fixes several issues.
The following security issues were fixed:

  o CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait
    operation, which could have lead to memory corruption and possibly
    privilege escalation (bsc#1176011).
  o CVE-2020-0431: In kbd_keycode of keyboard.c, there is a possible out of
    bounds write due to a missing bounds check. This could lead to local
    escalation of privilege with no additional execution privileges needed.
    User interaction is not needed for exploitation. (bsc#1176722)
  o CVE-2020-25212: A TOCTOU mismatch in the NFS client code could be used by
    local attackers to corrupt memory or possibly have unspecified other impact
    because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c
    (bsc#1176381).
  o CVE-2020-14386: Fixed a memory corruption which could have lead to an
    attacker gaining root privileges from unprivileged processes. The highest
    threat from this vulnerability is to data confidentiality and integrity
    (bsc#1176069).
  o CVE-2020-24394: The NFS server code can set incorrect permissions on new
    filesystem objects when the filesystem lacks ACL support. This occurs
    because the current umask is not considered (bsc#1175518).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise Live Patching 12-SP5:
    zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2020-3204=1
    SUSE-SLE-Live-Patching-12-SP5-2020-3205=1
    SUSE-SLE-Live-Patching-12-SP5-2020-3206=1
    SUSE-SLE-Live-Patching-12-SP5-2020-3208=1
    SUSE-SLE-Live-Patching-12-SP5-2020-3211=1
  o SUSE Linux Enterprise Live Patching 12-SP4:
    zypper in -t patch SUSE-SLE-Live-Patching-12-SP4-2020-3213=1
    SUSE-SLE-Live-Patching-12-SP4-2020-3214=1
    SUSE-SLE-Live-Patching-12-SP4-2020-3215=1
    SUSE-SLE-Live-Patching-12-SP4-2020-3216=1
    SUSE-SLE-Live-Patching-12-SP4-2020-3217=1

Package List:

  o SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64):
       kgraft-patch-4_12_14-122_17-default-6-2.2
       kgraft-patch-4_12_14-122_20-default-5-2.2
  o SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le x86_64):
       kgraft-patch-4_12_14-120-default-7-18.2
       kgraft-patch-4_12_14-120-default-debuginfo-7-18.2
       kgraft-patch-4_12_14-122_12-default-7-2.2
       kgraft-patch-4_12_14-122_7-default-7-2.2
       kgraft-patch-SLE12-SP5_Update_0-debugsource-7-18.2
  o SUSE Linux Enterprise Live Patching 12-SP4 (ppc64le s390x x86_64):
       kgraft-patch-4_12_14-95_51-default-5-2.2
  o SUSE Linux Enterprise Live Patching 12-SP4 (ppc64le x86_64):
       kgraft-patch-4_12_14-95_37-default-8-2.2
       kgraft-patch-4_12_14-95_40-default-7-2.2
       kgraft-patch-4_12_14-95_45-default-7-2.2
       kgraft-patch-4_12_14-95_48-default-6-2.2


References:

  o https://www.suse.com/security/cve/CVE-2020-0431.html
  o https://www.suse.com/security/cve/CVE-2020-14381.html
  o https://www.suse.com/security/cve/CVE-2020-14386.html
  o https://www.suse.com/security/cve/CVE-2020-24394.html
  o https://www.suse.com/security/cve/CVE-2020-25212.html
  o https://bugzilla.suse.com/1175992
  o https://bugzilla.suse.com/1176012
  o https://bugzilla.suse.com/1176072
  o https://bugzilla.suse.com/1176382
  o https://bugzilla.suse.com/1176896


- --------------------------------------------------------------------------------


SUSE Security Update: Security update for the Linux Kernel (Live 
Patch 6 for SLE 12 SP5
______________________________________________________________________________

Announcement ID:   SUSE-SU-2020:3210-1
Rating:            important
References:        #1175992 #1176012 #1176072 #1176382
Cross-References:  CVE-2020-14381 CVE-2020-14386 CVE-2020-24394 CVE-2020-25212
Affected Products:
                   SUSE Linux Enterprise Live Patching 12-SP5
                   SUSE Linux Enterprise Live Patching 12-SP4
______________________________________________________________________________

Patch 6 for
SLE 12 SP5)

An update that fixes four vulnerabilities is now available.

Description:

This update for the Linux Kernel 4.12.14-122_26 fixes several issues.
The following security issues were fixed:

  o CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait
    operation, which could have lead to memory corruption and possibly
    privilege escalation (bsc#1176011).
  o CVE-2020-25212: A TOCTOU mismatch in the NFS client code could be used by
    local attackers to corrupt memory or possibly have unspecified other impact
    because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c
    (bsc#1176381).
  o CVE-2020-14386: Fixed a memory corruption which could have lead to an
    attacker gaining root privileges from unprivileged processes. The highest
    threat from this vulnerability is to data confidentiality and integrity
    (bsc#1176069).
  o CVE-2020-24394: The NFS server code can set incorrect permissions on new
    filesystem objects when the filesystem lacks ACL support. This occurs
    because the current umask is not considered (bsc#1175518).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise Live Patching 12-SP5:
    zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2020-3203=1
    SUSE-SLE-Live-Patching-12-SP5-2020-3223=1
    SUSE-SLE-Live-Patching-12-SP5-2020-3224=1
    SUSE-SLE-Live-Patching-12-SP5-2020-3232=1
  o SUSE Linux Enterprise Live Patching 12-SP4:
    zypper in -t patch SUSE-SLE-Live-Patching-12-SP4-2020-3210=1
    SUSE-SLE-Live-Patching-12-SP4-2020-3212=1

Package List:

  o SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64):
       kgraft-patch-4_12_14-122_23-default-3-2.2
       kgraft-patch-4_12_14-122_26-default-3-2.2
       kgraft-patch-4_12_14-122_29-default-3-2.1
       kgraft-patch-4_12_14-122_32-default-3-2.1
  o SUSE Linux Enterprise Live Patching 12-SP4 (ppc64le s390x x86_64):
       kgraft-patch-4_12_14-95_54-default-3-2.2
       kgraft-patch-4_12_14-95_57-default-3-2.1


References:

  o https://www.suse.com/security/cve/CVE-2020-14381.html
  o https://www.suse.com/security/cve/CVE-2020-14386.html
  o https://www.suse.com/security/cve/CVE-2020-24394.html
  o https://www.suse.com/security/cve/CVE-2020-25212.html
  o https://bugzilla.suse.com/1175992
  o https://bugzilla.suse.com/1176012
  o https://bugzilla.suse.com/1176072
  o https://bugzilla.suse.com/1176382


- --------------------------------------------------------------------------------


SUSE Security Update: Security update for the Linux Kernel (Live 
Patch 9 for SLE 12 SP5)
______________________________________________________________________________

Announcement ID:   SUSE-SU-2020:3222-1
Rating:            important
References:        #1176012 #1176382
Cross-References:  CVE-2020-14381 CVE-2020-25212
Affected Products:
                   SUSE Linux Enterprise Live Patching 12-SP5
                   SUSE Linux Enterprise Live Patching 12-SP4
______________________________________________________________________________

Patch 9 for
SLE 12 SP5)

An update that fixes two vulnerabilities is now available.

Description:

This update for the Linux Kernel 4.12.14-122_37 fixes several issues.
The following security issues were fixed:

  o CVE-2020-14381: Fixed a use-after-free in the fast user mutex (futex) wait
    operation, which could have lead to memory corruption and possibly
    privilege escalation (bsc#1176011).
  o CVE-2020-25212: A TOCTOU mismatch in the NFS client code could be used by
    local attackers to corrupt memory or possibly have unspecified other impact
    because a size check is in fs/nfs/nfs4proc.c instead of fs/nfs/nfs4xdr.c
    (bsc#1176381).

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise Live Patching 12-SP5:
    zypper in -t patch SUSE-SLE-Live-Patching-12-SP5-2020-3222=1
  o SUSE Linux Enterprise Live Patching 12-SP4:
    zypper in -t patch SUSE-SLE-Live-Patching-12-SP4-2020-3207=1

Package List:

  o SUSE Linux Enterprise Live Patching 12-SP5 (ppc64le s390x x86_64):
       kgraft-patch-4_12_14-122_37-default-2-2.1
  o SUSE Linux Enterprise Live Patching 12-SP4 (ppc64le s390x x86_64):
       kgraft-patch-4_12_14-95_60-default-2-2.1


References:

  o https://www.suse.com/security/cve/CVE-2020-14381.html
  o https://www.suse.com/security/cve/CVE-2020-25212.html
  o https://bugzilla.suse.com/1176012
  o https://bugzilla.suse.com/1176382

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=uqPy
-----END PGP SIGNATURE-----

Read More

The post ESB-2020.3937 – [SUSE] linux kernel: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2020/11/09/esb-2020-3937-suse-linux-kernel-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2020-3937-suse-linux-kernel-multiple-vulnerabilities

ESB-2020.3936 – [SUSE] linux kernel: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.3936
                   Security update for the Linux Kernel
                              9 November 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           linux kernel
Publisher:         SUSE
Operating System:  SUSE
Impact/Access:     Execute Arbitrary Code/Commands -- Existing Account      
                   Denial of Service               -- Existing Account      
                   Access Confidential Data        -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-25645 CVE-2020-25643 CVE-2020-25641
                   CVE-2020-25212  

Reference:         ESB-2020.3907
                   ESB-2020.3888
                   ESB-2020.3710
                   ESB-2020.3658

Original Bulletin: 
   https://www.suse.com/support/update/announcement/2020/suse-su-20203230-1

- --------------------------BEGIN INCLUDED TEXT--------------------

SUSE Security Update: Security update for the Linux Kernel

______________________________________________________________________________

Announcement ID:   SUSE-SU-2020:3230-1
Rating:            important
References:        #1065600 #1155798 #1168468 #1171675 #1175599 #1175718
                   #1176019 #1176381 #1176588 #1176979 #1177027 #1177121
                   #1177193 #1177194 #1177206 #1177258 #1177283 #1177284
                   #1177285 #1177286 #1177297 #1177384 #1177511 #954532
Cross-References:  CVE-2020-25212 CVE-2020-25641 CVE-2020-25643 CVE-2020-25645
Affected Products:
                   SUSE Linux Enterprise Module for Realtime 15-SP2
______________________________________________________________________________

An update that solves four vulnerabilities and has 20 fixes is now available.

Description:

The SUSE Linux Enterprise 15 SP2 kernel RT was updated to receive various
security and bugfixes.
The following security bugs were fixed:

  o CVE-2020-25212: Fixed getxattr kernel panic and memory overflow (bsc#
    1176381).
  o CVE-2020-25643: Added range checks in ppp_cp_parse_cr() (bsc#1177206).
  o CVE-2020-25641: Allowed for_each_bvec to support zero len bvec (bsc#
    1177121).
  o CVE-2020-25645: Added transport ports in route lookup for geneve (bsc#
    1177511).


The following non-security bugs were fixed:

  o 9p: Fix memory leak in v9fs_mount (git-fixes).
  o ACPI: EC: Reference count query handlers under lock (git-fixes).
  o airo: Fix read overflows sending packets (git-fixes).
  o ar5523: Add USB ID of SMCWUSBT-G2 wireless adapter (git-fixes).
  o ASoC: img-i2s-out: Fix runtime PM imbalance on error (git-fixes).
  o ASoC: Intel: bytcr_rt5640: Add quirk for MPMAN Converter9 2-in-1
    (git-fixes).
  o ASoC: kirkwood: fix IRQ error handling (git-fixes).
  o ASoC: wm8994: Ensure the device is resumed in wm89xx_mic_detect functions
    (git-fixes).
  o ASoC: wm8994: Skip setting of the WM8994_MICBIAS register for WM1811
    (git-fixes).
  o ath10k: fix array out-of-bounds access (git-fixes).
  o ath10k: fix memory leak for tpc_stats_final (git-fixes).
  o ath10k: use kzalloc to read for ath10k_sdio_hif_diag_read (git-fixes).
  o Bluetooth: Fix refcount use-after-free issue (git-fixes).
  o Bluetooth: guard against controllers sending zero'd events (git-fixes).
  o Bluetooth: Handle Inquiry Cancel error after Inquiry Complete (git-fixes).
  o Bluetooth: L2CAP: handle l2cap config request during open state
    (git-fixes).
  o Bluetooth: prefetch channel before killing sock (git-fixes).
  o brcmfmac: Fix double freeing in the fmac usb data path (git-fixes).
  o btrfs: block-group: do not set the wrong READA flag for
    btrfs_read_block_groups() (bsc#1176019).
  o btrfs: block-group: fix free-space bitmap threshold (bsc#1176019).
  o btrfs: block-group: refactor how we delete one block group item (bsc#
    1176019).
  o btrfs: block-group: refactor how we insert a block group item (bsc#
    1176019).
  o btrfs: block-group: refactor how we read one block group item (bsc#
    1176019).
  o btrfs: block-group: rename write_one_cache_group() (bsc#1176019).
  o btrfs: do not take an extra root ref at allocation time (bsc#1176019).
  o btrfs: drop logs when we've aborted a transaction (bsc#1176019).
  o btrfs: fix a race between scrub and block group removal/allocation (bsc#
    1176019).
  o btrfs: fix crash during unmount due to race with delayed inode workers (bsc
    #1176019).
  o btrfs: free block groups after free'ing fs trees (bsc#1176019).
  o btrfs: hold a ref on the root on the dead roots list (bsc#1176019).
  o btrfs: kill the subvol_srcu (bsc#1176019).
  o btrfs: make btrfs_cleanup_fs_roots use the radix tree lock (bsc#1176019).
  o btrfs: make inodes hold a ref on their roots (bsc#1176019).
  o btrfs: make the extent buffer leak check per fs info (bsc#1176019).
  o btrfs: move ino_cache_inode dropping out of btrfs_free_fs_root (bsc#
    1176019).
  o btrfs: move the block group freeze/unfreeze helpers into block-group.c (bsc
    #1176019).
  o btrfs: move the root freeing stuff into btrfs_put_root (bsc#1176019).
  o btrfs: remove no longer necessary chunk mutex locking cases (bsc#1176019).
  o btrfs: rename member 'trimming' of block group to a more generic name (bsc#
    1176019).
  o btrfs: scrub, only lookup for csums if we are dealing with a data extent
    (bsc#1176019).
  o bus: hisi_lpc: Fixup IO ports addresses to avoid use-after-free in host
    removal (git-fixes).
  o clk: samsung: exynos4: mark 'chipid' clock as CLK_IGNORE_UNUSED
    (git-fixes).
  o clk: socfpga: stratix10: fix the divider for the emac_ptp_free_clk
    (git-fixes).
  o clk: tegra: Always program PLL_E when enabled (git-fixes).
  o clk/ti/adpll: allocate room for terminating null (git-fixes).
  o clocksource/drivers/h8300_timer8: Fix wrong return value in
    h8300_8timer_init() (git-fixes).
  o clocksource/drivers/timer-gx6605s: Fixup counter reload (git-fixes).
  o cpuidle: Poll for a minimum of 30ns and poll for a tick if lower c-states
    are disabled (bnc#1176588).
  o crypto: dh - check validity of Z before export (bsc#1175718).
  o crypto: dh - SP800-56A rev 3 local public key validation (bsc#1175718).
  o crypto: ecc - SP800-56A rev 3 local public key validation (bsc#1175718).
  o crypto: ecdh - check validity of Z before export (bsc#1175718).
  o dmaengine: mediatek: hsdma_probe: fixed a memory leak when devm_request_irq
    fails (git-fixes).
  o dmaengine: stm32-dma: use vchan_terminate_vdesc() in .terminate_all
    (git-fixes).
  o dmaengine: stm32-mdma: use vchan_terminate_vdesc() in .terminate_all
    (git-fixes).
  o dmaengine: tegra-apb: Prevent race conditions on channel's freeing
    (git-fixes).
  o dmaengine: zynqmp_dma: fix burst length configuration (git-fixes).
  o dma-fence: Serialise signal enabling (dma_fence_enable_sw_signaling)
    (git-fixes).
  o drivers: char: tlclk.c: Avoid data race between init and interrupt handler
    (git-fixes).
  o drm/amdgpu: restore proper ref count in amdgpu_display_crtc_set_config
    (git-fixes).
  o drm/radeon: revert "Prefer lower feedback dividers" (bsc#1177384).
  o e1000: Do not perform reset in reset_task if we are already down
    (git-fixes).
  o ftrace: Move RCU is watching check after recursion check (git-fixes).
  o fuse: do not ignore errors from fuse_writepages_fill() (bsc#1177193).
  o gpio: mockup: fix resource leak in error path (git-fixes).
  o gpio: rcar: Fix runtime PM imbalance on error (git-fixes).
  o gpio: siox: explicitly support only threaded irqs (git-fixes).
  o gpio: sprd: Clear interrupt when setting the type as edge (git-fixes).
  o gpio: tc35894: fix up tc35894 interrupt configuration (git-fixes).
  o hwmon: (applesmc) check status earlier (git-fixes).
  o i2c: aspeed: Mask IRQ status to relevant bits (git-fixes).
  o i2c: core: Call i2c_acpi_install_space_handler() before
    i2c_acpi_register_devices() (git-fixes).
  o i2c: i801: Exclude device from suspend direct complete optimization
    (git-fixes).
  o i2c: tegra: Prevent interrupt triggering after transfer timeout
    (git-fixes).
  o i2c: tegra: Restore pinmux on system resume (git-fixes).
  o ieee802154/adf7242: check status of adf7242_read_reg (git-fixes).
  o ieee802154: fix one possible memleak in ca8210_dev_com_init (git-fixes).
  o iio: adc: qcom-spmi-adc5: fix driver name (git-fixes).
  o Input: i8042 - add nopnp quirk for Acer Aspire 5 A515 (bsc#954532).
  o Input: trackpoint - enable Synaptics trackpoints (git-fixes).
  o iommu/amd: Fix IOMMU AVIC not properly update the is_run bit in IRTE (bsc#
    1177297).
  o iommu/amd: Fix potential @entry null deref (bsc#1177283).
  o iommu/amd: Re-factor guest virtual APIC (de-)activation code (bsc#1177284).
  o iommu/amd: Restore IRTE.RemapEn bit for amd_iommu_activate_guest_mode (bsc#
    1177285).
  o iommu/exynos: add missing put_device() call in exynos_iommu_of_xlate() (bsc
    #1177286).
  o kABI: Fix kABI for 12856e7acde4 PCI/IOV: Mark VFs as not implementing
    PCI_COMMAND_MEMORY (bsc#1176979).
  o leds: mlxreg: Fix possible buffer overflow (git-fixes).
  o lib/mpi: Add mpi_sub_ui() (bsc#1175718).
  o locking/rwsem: Disable reader optimistic spinning (bnc#1176588).
  o mac80211: do not allow bigger VHT MPDUs than the hardware supports
    (git-fixes).
  o mac80211: skip mpath lookup also for control port tx (git-fixes).
  o mac802154: tx: fix use-after-free (git-fixes).
  o media: mc-device.c: fix memleak in media_device_register_entity
    (git-fixes).
  o media: smiapp: Fix error handling at NVM reading (git-fixes).
  o media: ti-vpe: cal: Restrict DMA to avoid memory corruption (git-fixes).
  o mfd: mfd-core: Protect against NULL call-back function pointer (git-fixes).
  o mmc: core: Rework wp-gpio handling (git-fixes).
  o mmc: sdhci: Workaround broken command queuing on Intel GLK based IRBIS
    models (git-fixes).
  o mt76: add missing locking around ampdu action (git-fixes).
  o mt76: clear skb pointers from rx aggregation reorder buffer during cleanup
    (git-fixes).
  o mt76: do not use devm API for led classdev (git-fixes).
  o mt76: fix handling full tx queues in mt76_dma_tx_queue_skb_raw (git-fixes).
  o mt76: fix LED link time failure (git-fixes).
  o mtd: cfi_cmdset_0002: do not free cfi->cfiq in error path of
    cfi_amdstd_setup() (git-fixes).
  o mtd: rawnand: gpmi: Fix runtime PM imbalance on error (git-fixes).
  o mtd: rawnand: omap_elm: Fix runtime PM imbalance on error (git-fixes).
  o net: phy: realtek: fix rtl8211e rx/tx delay config (git-fixes).
  o nfs: Fix security label length not being reset (bsc#1176381).
  o PCI: Avoid double hpmemsize MMIO window assignment (git-fixes).
  o PCI/IOV: Mark VFs as not implementing PCI_COMMAND_MEMORY (bsc#1176979).
  o PCI: tegra194: Fix runtime PM imbalance on error (git-fixes).
  o PCI: tegra: Fix runtime PM imbalance on error (git-fixes).
  o phy: ti: am654: Fix a leak in serdes_am654_probe() (git-fixes).
  o pinctrl: mvebu: Fix i2c sda definition for 98DX3236 (git-fixes).
  o Platform: OLPC: Fix memleak in olpc_ec_probe (git-fixes).
  o platform/x86: fix kconfig dependency warning for FUJITSU_LAPTOP
    (git-fixes).
  o platform/x86: fix kconfig dependency warning for LG_LAPTOP (git-fixes).
  o platform/x86: intel_pmc_core: do not create a static struct device
    (git-fixes).
  o platform/x86: intel-vbtn: Switch to an allow-list for SW_TABLET_MODE
    reporting (bsc#1175599).
  o platform/x86: thinkpad_acpi: initialize tp_nvram_state variable
    (git-fixes).
  o platform/x86: thinkpad_acpi: re-initialize ACPI buffer size when reuse
    (git-fixes).
  o power: supply: max17040: Correct voltage reading (git-fixes).
  o Refresh patches.suse/
    fnic-to-not-call-scsi_done-for-unhandled-commands.patch (bsc#1168468, bsc#
    1171675).
  o rtc: ds1374: fix possible race condition (git-fixes).
  o rtc: sa1100: fix possible race condition (git-fixes).
  o s390/pci: Mark all VFs as not implementing PCI_COMMAND_MEMORY (bsc#
    1176979).
  o sched/fair: Ignore cache hotness for SMT migration (bnc#1155798 (CPU
    scheduler functional and performance backports)).
  o sched/fair: Use dst group while checking imbalance for NUMA balancer (bnc#
    1155798 (CPU scheduler functional and performance backports)).
  o sched/numa: Avoid creating large imbalances at task creation time (bnc#
    1176588).
  o sched/numa: Check numa balancing information only when enabled (bnc#
    1176588).
  o sched/numa: Use runnable_avg to classify node (bnc#1155798 (CPU scheduler
    functional and performance backports)).
  o scsi: iscsi: iscsi_tcp: Avoid holding spinlock while calling getpeername()
    (bsc#1177258).
  o serial: 8250: 8250_omap: Terminate DMA before pushing data on RX timeout
    (git-fixes).
  o serial: 8250_omap: Fix sleeping function called from invalid context during
    probe (git-fixes).
  o serial: 8250_port: Do not service RX FIFO if throttled (git-fixes).
  o serial: uartps: Wait for tx_empty in console setup (git-fixes).
  o spi: fsl-espi: Only process interrupts for expected events (git-fixes).
  o staging:r8188eu: avoid skb_clone for amsdu to msdu conversion (git-fixes).
  o thermal: rcar_thermal: Handle probe error gracefully (git-fixes).
  o Update config files. Enable ACPI_PCI_SLOT and HOTPLUG_PCI_ACPI (bsc#
    1177194).
  o usb: dwc3: Increase timeout for CmdAct cleared by device controller
    (git-fixes).
  o USB: EHCI: ehci-mv: fix error handling in mv_ehci_probe() (git-fixes).
  o USB: EHCI: ehci-mv: fix less than zero comparison of an unsigned int
    (git-fixes).
  o USB: gadget: f_ncm: Fix NDP16 datagram validation (git-fixes).
  o vfio/pci: Decouple PCI_COMMAND_MEMORY bit checks from is_virtfn (bsc#
    1176979).
  o vmxnet3: fix cksum offload issues for non-udp tunnels (git-fixes).
  o wlcore: fix runtime pm imbalance in wl1271_tx_work (git-fixes).
  o wlcore: fix runtime pm imbalance in wlcore_regdomain_config (git-fixes).
  o xen/events: do not use chip_data for legacy IRQs (bsc#1065600).
  o yam: fix possible memory leak in yam_init_driver (git-fixes).

Special Instructions and Notes:

Please reboot the system after installing this update.

Patch Instructions:

To install this SUSE Security Update use the SUSE recommended installation
methods like YaST online_update or "zypper patch".
Alternatively you can run the command listed for your product:

  o SUSE Linux Enterprise Module for Realtime 15-SP2:
    zypper in -t patch SUSE-SLE-Module-RT-15-SP2-2020-3230=1

Package List:

  o SUSE Linux Enterprise Module for Realtime 15-SP2 (x86_64):
       cluster-md-kmp-rt-5.3.18-13.1
       cluster-md-kmp-rt-debuginfo-5.3.18-13.1
       dlm-kmp-rt-5.3.18-13.1
       dlm-kmp-rt-debuginfo-5.3.18-13.1
       gfs2-kmp-rt-5.3.18-13.1
       gfs2-kmp-rt-debuginfo-5.3.18-13.1
       kernel-rt-5.3.18-13.1
       kernel-rt-debuginfo-5.3.18-13.1
       kernel-rt-debugsource-5.3.18-13.1
       kernel-rt-devel-5.3.18-13.1
       kernel-rt-devel-debuginfo-5.3.18-13.1
       kernel-rt_debug-debuginfo-5.3.18-13.1
       kernel-rt_debug-debugsource-5.3.18-13.1
       kernel-rt_debug-devel-5.3.18-13.1
       kernel-rt_debug-devel-debuginfo-5.3.18-13.1
       kernel-syms-rt-5.3.18-13.1
       ocfs2-kmp-rt-5.3.18-13.1
       ocfs2-kmp-rt-debuginfo-5.3.18-13.1
  o SUSE Linux Enterprise Module for Realtime 15-SP2 (noarch):
       kernel-devel-rt-5.3.18-13.1
       kernel-source-rt-5.3.18-13.1


References:

  o https://www.suse.com/security/cve/CVE-2020-25212.html
  o https://www.suse.com/security/cve/CVE-2020-25641.html
  o https://www.suse.com/security/cve/CVE-2020-25643.html
  o https://www.suse.com/security/cve/CVE-2020-25645.html
  o https://bugzilla.suse.com/1065600
  o https://bugzilla.suse.com/1155798
  o https://bugzilla.suse.com/1168468
  o https://bugzilla.suse.com/1171675
  o https://bugzilla.suse.com/1175599
  o https://bugzilla.suse.com/1175718
  o https://bugzilla.suse.com/1176019
  o https://bugzilla.suse.com/1176381
  o https://bugzilla.suse.com/1176588
  o https://bugzilla.suse.com/1176979
  o https://bugzilla.suse.com/1177027
  o https://bugzilla.suse.com/1177121
  o https://bugzilla.suse.com/1177193
  o https://bugzilla.suse.com/1177194
  o https://bugzilla.suse.com/1177206
  o https://bugzilla.suse.com/1177258
  o https://bugzilla.suse.com/1177283
  o https://bugzilla.suse.com/1177284
  o https://bugzilla.suse.com/1177285
  o https://bugzilla.suse.com/1177286
  o https://bugzilla.suse.com/1177297
  o https://bugzilla.suse.com/1177384
  o https://bugzilla.suse.com/1177511
  o https://bugzilla.suse.com/954532

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=9uFG
-----END PGP SIGNATURE-----

Read More

The post ESB-2020.3936 – [SUSE] linux kernel: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2020/11/09/esb-2020-3936-suse-linux-kernel-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2020-3936-suse-linux-kernel-multiple-vulnerabilities

ESB-2020.3935 – [Debian] poppler: Multiple vulnerabilities

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.3935
                          poppler security update
                              9 November 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           poppler
Publisher:         Debian
Operating System:  Debian GNU/Linux
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
                   Denial of Service               -- Remote/Unauthenticated      
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-14494 CVE-2019-10018 CVE-2019-9959
                   CVE-2019-7310 CVE-2018-20662 CVE-2018-20650
                   CVE-2018-19058 CVE-2017-14928 CVE-2017-14926

Reference:         ESB-2020.3860
                   ESB-2020.1127
                   ESB-2019.3903.2
                   ESB-2019.3674

Original Bulletin: 
   https://www.debian.org/lts/security/2020/dla-2440

- --------------------------BEGIN INCLUDED TEXT--------------------

- -------------------------------------------------------------------------
Debian LTS Advisory DLA-2440-1              debian-lts@lists.debian.org
https://www.debian.org/lts/security/                    Markus Koschany
November 08, 2020                           https://wiki.debian.org/LTS
- -------------------------------------------------------------------------

Package        : poppler
Version        : 0.48.0-2+deb9u4
CVE ID         : CVE-2017-14926 CVE-2017-14928 CVE-2018-19058
                 CVE-2018-20650 CVE-2018-20662 CVE-2019-7310
                 CVE-2019-9959 CVE-2019-10018 CVE-2019-14494
Debian Bug     : 877239 877231 913177 917974 918158 926133
                 933812 921215 941776
  
Several issues were found and corrected in Poppler, a PDF rendering library,
that could lead to denial of service or possibly other unspecified impact when
processing maliciously crafted documents.

For Debian 9 stretch, these problems have been fixed in version
0.48.0-2+deb9u4.

We recommend that you upgrade your poppler packages.

For the detailed security status of poppler please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/poppler

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

- -----BEGIN PGP SIGNATURE-----
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=auNJ
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=mnuK
-----END PGP SIGNATURE-----

Read More

The post ESB-2020.3935 – [Debian] poppler: Multiple vulnerabilities appeared first on Malware Devil.



https://malwaredevil.com/2020/11/09/esb-2020-3935-debian-poppler-multiple-vulnerabilities/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2020-3935-debian-poppler-multiple-vulnerabilities

ESB-2020.3933 – [Linux][Debian] raptor2: Reduced security – Unknown/unspecified

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.3933
                          raptor2 security update
                              9 November 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           raptor2
Publisher:         Debian
Operating System:  Debian GNU/Linux
                   Linux variants
Impact/Access:     Reduced Security -- Unknown/Unspecified
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-18926  

Original Bulletin: 
   https://www.debian.org/lts/security/2020/dla-2438

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running raptor2 check for an updated version of the software for 
         their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- - -------------------------------------------------------------------------
Debian LTS Advisory DLA-2438-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                           Chris Lamb
November 07, 2020                             https://wiki.debian.org/LTS
- - -------------------------------------------------------------------------

Package        : raptor2
Version        : 2.0.14-1+deb9u1
CVE ID         : CVE-2017-18926
Debian Bug     : #973889

It was discovered that there were two heap overflow vulnerabilities
in raptor2, a set of parsers for RDF files that is used, amongst
others, in LibreOffice.

For Debian 9 "Stretch", this problem has been fixed in version
2.0.14-1+deb9u1.

We recommend that you upgrade your raptor2 packages.

For the detailed security status of raptor2 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/raptor2

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

- -----BEGIN PGP SIGNATURE-----
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=vkN2
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=41Y6
-----END PGP SIGNATURE-----

Read More

The post ESB-2020.3933 – [Linux][Debian] raptor2: Reduced security – Unknown/unspecified appeared first on Malware Devil.



https://malwaredevil.com/2020/11/09/esb-2020-3933-linuxdebian-raptor2-reduced-security-unknown-unspecified/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2020-3933-linuxdebian-raptor2-reduced-security-unknown-unspecified

ESB-2020.3934 – [Linux][Debian] libexif: Execute arbitrary code/commands – Remote with user interaction

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.3934
                          libexif security update
                              9 November 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           libexif
Publisher:         Debian
Operating System:  Debian GNU/Linux
                   Linux variants
Impact/Access:     Execute Arbitrary Code/Commands -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-0452  

Original Bulletin: 
   https://www.debian.org/lts/security/2020/dla-2439

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running libexif check for an updated version of the software for 
         their operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- - -----------------------------------------------------------------------
Debian LTS Advisory DLA-2439-1              debian-lts@lists.debian.org
https://www.debian.org/lts/security/                      Utkarsh Gupta
November 07, 2020                           https://wiki.debian.org/LTS
- - -----------------------------------------------------------------------

Package        : libexif
Version        : 0.6.21-2+deb9u5
CVE ID         : CVE-2020-0452

In libexif/exif-entry.c, through libexif 0.6.21-2+deb9u4,
compiler optimization could remove a buffer overflow check,
making a buffer overflow possible with some EXIF tags.

For Debian 9 stretch, this problem has been fixed in version
0.6.21-2+deb9u5.

We recommend that you upgrade your libexif packages.

For the detailed security status of libexif please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/libexif

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
- -----BEGIN PGP SIGNATURE-----
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=vXB8
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=EhU5
-----END PGP SIGNATURE-----

Read More

The post ESB-2020.3934 – [Linux][Debian] libexif: Execute arbitrary code/commands – Remote with user interaction appeared first on Malware Devil.



https://malwaredevil.com/2020/11/09/esb-2020-3934-linuxdebian-libexif-execute-arbitrary-code-commands-remote-with-user-interaction/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2020-3934-linuxdebian-libexif-execute-arbitrary-code-commands-remote-with-user-interaction

ESB-2020.3932 – [Linux][Debian] krb5: Denial of service – Remote/unauthenticated

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.3932
                           krb5 security update
                              9 November 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           krb5
Publisher:         Debian
Operating System:  Debian GNU/Linux
                   Linux variants
Impact/Access:     Denial of Service -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-28196  

Original Bulletin: 
   https://www.debian.org/lts/security/2020/dla-2437

Comment: This advisory references vulnerabilities in products which run on 
         platforms other than Debian. It is recommended that administrators 
         running krb5 check for an updated version of the software for their
         operating system.

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- - -------------------------------------------------------------------------
Debian LTS Advisory DLA-2437-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                           Chris Lamb
November 07, 2020                             https://wiki.debian.org/LTS
- - -------------------------------------------------------------------------

Package        : krb5
Version        : 1.15-1+deb9u2
CVE ID         : CVE-2020-28196
Debian Bug     : #973880

It was discovered that there was a denial of service vulnerability in
the MIT Kerberos network authentication system, krb5. The lack of a
limit in the ASN.1 decoder could lead to infinite recursion and allow
an attacker to overrun the stack and cause the process to crash.

For Debian 9 "Stretch", this problem has been fixed in version
1.15-1+deb9u2.

We recommend that you upgrade your krb5 packages.

For the detailed security status of krb5 please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/krb5

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

- -----BEGIN PGP SIGNATURE-----
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=+BIC
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=XI3e
-----END PGP SIGNATURE-----

Read More

The post ESB-2020.3932 – [Linux][Debian] krb5: Denial of service – Remote/unauthenticated appeared first on Malware Devil.



https://malwaredevil.com/2020/11/09/esb-2020-3932-linuxdebian-krb5-denial-of-service-remote-unauthenticated/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2020-3932-linuxdebian-krb5-denial-of-service-remote-unauthenticated

ESB-2020.3931 – [Debian] sddm: Increased privileges – Existing account

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.3931
                           sddm security update
                              9 November 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           sddm
Publisher:         Debian
Operating System:  Debian GNU/Linux
Impact/Access:     Increased Privileges -- Existing Account
Resolution:        Patch/Upgrade
CVE Names:         CVE-2020-28049  

Reference:         ESB-2020.3898

Original Bulletin: 
   https://www.debian.org/lts/security/2020/dla-2436

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- - -------------------------------------------------------------------------
Debian LTS Advisory DLA-2436-1                debian-lts@lists.debian.org
https://www.debian.org/lts/security/                           Chris Lamb
November 06, 2020                             https://wiki.debian.org/LTS
- - -------------------------------------------------------------------------

Package        : sddm
Version        : 0.14.0-4+deb9u2
CVE ID         : CVE-2020-28049
Debian Bug     : #973748

It was discovered that there was an issue in the sddm display manager
where local unprivileged users could create a connection to the X
server.

For Debian 9 "Stretch", this problem has been fixed in version
0.14.0-4+deb9u2.

We recommend that you upgrade your sddm packages.

For the detailed security status of sddm please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/sddm

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

- -----BEGIN PGP SIGNATURE-----
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=oLl+
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBX6i9UuNLKJtyKPYoAQgVtg//Wpde1bCjrbuv6larTObmL+Xlu0ym/HR5
sVeSSpjovhBVaR/GyYrZ86MPpQr1ex915F4Qkpacc8P/HH40ZzdDnbpK5HXNEPM7
RytRhz7VJcnXMM+zOpD3uKd/eT5JshvO44rLc22mION6JKgGNjmzZcFVVhEf7V0H
HRmnm0ENQ5t994/5/m7OPbLifSBmB51ZBQ1orDZdD7kqVdTsFfgT++6ECsnfO+rj
FAZmbJXavYaZig6efx18x1DqxvnsSsyZ77cY5HkVOOnlIBV115bSyyjCObIQEFiB
x8vQYySUARcFHc7HxhIxPC72e1HeLLuGF3t4x5TfP7m1gnfOytX/KeQzId706snX
vstcxJE2YJevOXrh7nReuZIYfOoqvh2UUifHrRzUYeKnuHHqmli3bpgnMmgYeylg
GNMpWc491fGqlzjM7G5qJUuqArfr/GhDM6NjNbLmRa1zZJwnhUezNLDFGTCyt6MG
SLHSiOKDYGM0mV5H7BRcukF32q0ZVo01rt/5AghUPq7rBDw8XXPgPvz6LOfR8fCI
X/2R4Jg34qKGskz0RmX21iRu1UURqfAZ+8GRfTpwau9RfiWiEqyhqvxLtj1OpJPH
kUEvh5tKc0QHTf/bfe/ArMqXrw+2v1J3VR0zQsJuzPCjYsbGaS2KJuj3y77AB+YA
qN7drqs+KzE=
=qpKD
-----END PGP SIGNATURE-----

Read More

The post ESB-2020.3931 – [Debian] sddm: Increased privileges – Existing account appeared first on Malware Devil.



https://malwaredevil.com/2020/11/09/esb-2020-3931-debian-sddm-increased-privileges-existing-account/?utm_source=rss&utm_medium=rss&utm_campaign=esb-2020-3931-debian-sddm-increased-privileges-existing-account

Barbary Pirates and Russian Cybercrime

In 1801, the United States had a small Navy. Thomas Jefferson deployed almost half that Navy—three frigates and a schooner—to the Barbary C...