The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of Android OS

vulnerability alert CVE-2019-2024

Linux kernel: use after free via em28xx_dvb_fini

Synthesis of the vulnerability

An attacker can force the usage of a freed memory area via em28xx_dvb_fini() of the Linux kernel, in order to trigger a denial of service, and possibly to run code.
Impacted products: Debian, Android OS, Linux, openSUSE Leap, RSA Authentication Manager, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 2/4.
Consequences: administrator access/rights, denial of service on server, denial of service on service.
Provenance: user shell.
Creation date: 27/03/2019.
Identifiers: CERTFR-2019-AVI-131, CERTFR-2019-AVI-391, CERTFR-2019-AVI-419, CVE-2019-2024, DLA-1799-1, DLA-1799-2, DSA-2019-093, openSUSE-SU-2019:1085-1, openSUSE-SU-2019:1193-1, SUSE-SU-2019:0765-1, SUSE-SU-2019:0767-1, SUSE-SU-2019:0801-1, SUSE-SU-2019:0828-1, SUSE-SU-2019:0901-1, USN-4094-1, USN-4118-1, VIGILANCE-VUL-28871.

Description of the vulnerability

An attacker can force the usage of a freed memory area via em28xx_dvb_fini() of the Linux kernel, in order to trigger a denial of service, and possibly to run code.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert CVE-2018-5383

Bluetooth Firmware: information disclosure via Weak Elliptic Curve Parameters

Synthesis of the vulnerability

An attacker can bypass access restrictions to data via Weak Elliptic Curve Parameters of Bluetooth Firmware, in order to obtain sensitive information.
Impacted products: iOS by Apple, iPhone, Mac OS X, Debian, Android OS, openSUSE Leap, RHEL, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 2/4.
Consequences: data reading.
Provenance: radio connection.
Creation date: 19/02/2019.
Identifiers: CERTFR-2019-AVI-188, CERTFR-2019-AVI-391, CERTFR-2019-AVI-419, CVE-2018-5383, DLA-1747-1, HT208848, HT208849, HT208937, HT209139, openSUSE-SU-2019:0275-1, RHSA-2019:2169-01, SUSE-SU-2019:0422-1, SUSE-SU-2019:0427-1, SUSE-SU-2019:0427-2, SUSE-SU-2019:0466-1, USN-4094-1, USN-4095-1, USN-4095-2, USN-4118-1, VIGILANCE-VUL-28536.

Description of the vulnerability

An attacker can bypass access restrictions to data via Weak Elliptic Curve Parameters of Bluetooth Firmware, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

vulnerability alert CVE-2018-14614

Linux kernel: out-of-bounds memory reading via __remove_dirty_segment

Synthesis of the vulnerability

An attacker can force a read at an invalid address via __remove_dirty_segment() of the Linux kernel, in order to trigger a denial of service, or to obtain sensitive information.
Impacted products: Debian, Android OS, Linux, Slackware, Ubuntu.
Severity: 2/4.
Consequences: data reading, denial of service on server, denial of service on service.
Provenance: user shell.
Creation date: 31/01/2019.
Identifiers: 200419, CERTFR-2019-AVI-145, CERTFR-2019-AVI-391, CERTFR-2019-AVI-419, CVE-2018-14614, DLA-1715-1, SSA:2019-030-01, USN-3932-1, USN-3932-2, USN-4094-1, USN-4118-1, VIGILANCE-VUL-28411.

Description of the vulnerability

An attacker can force a read at an invalid address via __remove_dirty_segment() of the Linux kernel, in order to trigger a denial of service, or to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

vulnerability CVE-2018-20669

Linux kernel: privilege escalation via i915_gem_execbuffer2_ioctl

Synthesis of the vulnerability

An attacker can bypass restrictions via i915_gem_execbuffer2_ioctl of the Linux kernel, in order to escalate his privileges.
Impacted products: Android OS, Linux, openSUSE Leap, SUSE Linux Enterprise Desktop, SLES.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights.
Provenance: user shell.
Creation date: 24/01/2019.
Identifiers: CERTFR-2019-AVI-131, CVE-2018-20669, openSUSE-SU-2019:0203-1, SUSE-SU-2019:0765-1, SUSE-SU-2019:0767-1, VIGILANCE-VUL-28340.

Description of the vulnerability

An attacker can bypass restrictions via i915_gem_execbuffer2_ioctl of the Linux kernel, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2018-9568

Linux kernel: memory corruption via sk_clone_lock

Synthesis of the vulnerability

An attacker can trigger a memory corruption via sk_clone_lock() of the Linux kernel, in order to trigger a denial of service, and possibly to run code.
Impacted products: Android OS, Linux, openSUSE Leap, RHEL, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 2/4.
Consequences: administrator access/rights, denial of service on server, denial of service on service.
Provenance: user shell.
Creation date: 18/01/2019.
Identifiers: CERTFR-2019-AVI-038, CERTFR-2019-AVI-042, CERTFR-2019-AVI-044, CERTFR-2019-AVI-051, CERTFR-2019-AVI-071, CERTFR-2019-AVI-112, CERTFR-2019-AVI-114, CERTFR-2019-AVI-233, CERTFR-2019-AVI-440, CVE-2018-9568, openSUSE-SU-2019:0065-1, openSUSE-SU-2019:0140-1, RHSA-2019:0512-01, RHSA-2019:0514-01, RHSA-2019:2696-01, RHSA-2019:2730-01, RHSA-2019:2736-01, SUSE-SU-2019:0148-1, SUSE-SU-2019:0196-1, SUSE-SU-2019:0222-1, SUSE-SU-2019:0224-1, SUSE-SU-2019:0320-1, SUSE-SU-2019:0439-1, SUSE-SU-2019:0541-1, SUSE-SU-2019:1289-1, SUSE-SU-2019:13937-1, SUSE-SU-2019:13979-1, USN-3880-1, USN-3880-2, VIGILANCE-VUL-28304.

Description of the vulnerability

An attacker can trigger a memory corruption via sk_clone_lock() of the Linux kernel, in order to trigger a denial of service, and possibly to run code.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2018-19985

Linux kernel: out-of-bounds memory reading via hso_probe

Synthesis of the vulnerability

An attacker can force a read at an invalid address via hso_probe() of the Linux kernel, in order to trigger a denial of service, or to obtain sensitive information.
Impacted products: Debian, Android OS, Linux, openSUSE Leap, RSA Authentication Manager, Slackware, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 1/4.
Consequences: data reading, denial of service on server, denial of service on service.
Provenance: user shell.
Creation date: 31/12/2018.
Identifiers: CERTFR-2019-AVI-038, CERTFR-2019-AVI-042, CERTFR-2019-AVI-051, CERTFR-2019-AVI-071, CERTFR-2019-AVI-114, CERTFR-2019-AVI-115, CERTFR-2019-AVI-233, CERTFR-2019-AVI-419, CERTFR-2019-AVI-441, CVE-2018-19985, DLA-1731-1, DLA-1731-2, DLA-1771-1, DSA-2019-062, openSUSE-SU-2019:0065-1, openSUSE-SU-2019:0140-1, SSA:2019-030-01, SUSE-SU-2019:0148-1, SUSE-SU-2019:0196-1, SUSE-SU-2019:0222-1, SUSE-SU-2019:0224-1, SUSE-SU-2019:0320-1, SUSE-SU-2019:0439-1, SUSE-SU-2019:0541-1, SUSE-SU-2019:1289-1, SUSE-SU-2019:13937-1, SUSE-SU-2019:13979-1, USN-3910-1, USN-3910-2, USN-4115-1, USN-4115-2, USN-4118-1, VIGILANCE-VUL-28137.

Description of the vulnerability

An attacker can force a read at an invalid address via hso_probe() of the Linux kernel, in order to trigger a denial of service, or to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert CVE-2018-20511

Linux kernel: information disclosure via SIOCFINDIPDDPRT

Synthesis of the vulnerability

A local attacker can read a memory fragment via SIOCFINDIPDDPRT of the Linux kernel, in order to obtain sensitive information.
Impacted products: Debian, Android OS, Linux, Slackware, Ubuntu.
Severity: 1/4.
Consequences: data reading.
Provenance: user shell.
Creation date: 28/12/2018.
Identifiers: CERTFR-2019-AVI-391, CERTFR-2019-AVI-419, CVE-2018-20511, DLA-1731-1, DLA-1731-2, SSA:2019-030-01, USN-4094-1, USN-4118-1, VIGILANCE-VUL-28126.

Description of the vulnerability

A local attacker can read a memory fragment via SIOCFINDIPDDPRT of the Linux kernel, in order to obtain sensitive information.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability alert CVE-2018-20169

Linux kernel: buffer overflow via usb_get_extra_descriptor

Synthesis of the vulnerability

An attacker can generate a buffer overflow via usb_get_extra_descriptor() of the Linux kernel, in order to trigger a denial of service, and possibly to run code.
Impacted products: Debian, Fedora, Android OS, Linux, openSUSE Leap, RSA Authentication Manager, Slackware, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 2/4.
Consequences: administrator access/rights, privileged access/rights, denial of service on server.
Provenance: physical access.
Creation date: 18/12/2018.
Identifiers: CERTFR-2019-AVI-038, CERTFR-2019-AVI-042, CERTFR-2019-AVI-044, CERTFR-2019-AVI-051, CERTFR-2019-AVI-071, CERTFR-2019-AVI-114, CERTFR-2019-AVI-233, CERTFR-2019-AVI-391, CERTFR-2019-AVI-419, CVE-2018-20169, DLA-1731-1, DLA-1731-2, DLA-1771-1, DSA-2019-062, FEDORA-2018-6e8c330d50, openSUSE-SU-2019:0065-1, openSUSE-SU-2019:0140-1, SSA:2019-030-01, SUSE-SU-2019:0148-1, SUSE-SU-2019:0196-1, SUSE-SU-2019:0222-1, SUSE-SU-2019:0224-1, SUSE-SU-2019:0320-1, SUSE-SU-2019:0439-1, SUSE-SU-2019:0541-1, SUSE-SU-2019:1289-1, SUSE-SU-2019:13937-1, SUSE-SU-2019:13979-1, USN-3879-1, USN-3879-2, USN-4094-1, USN-4118-1, VIGILANCE-VUL-28046.

Description of the vulnerability

An attacker can generate a buffer overflow via usb_get_extra_descriptor() of the Linux kernel, in order to trigger a denial of service, and possibly to run code.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability announce CVE-2018-20346 CVE-2018-20505 CVE-2018-20506

SQLite, Chrome: memory corruption via FTS3 Query

Synthesis of the vulnerability

An attacker can generate a memory corruption via a FTS3 query of SQLite, in order to trigger a denial of service, and possibly to run code.
Impacted products: iOS by Apple, iPhone, Mac OS X, Debian, Fedora, FreeBSD, Android OS, Chrome, openSUSE Leap, Opera, RHEL, SQLite, SUSE Linux Enterprise Desktop, SLES, Synology DSM, Synology DS***, Synology RS***, Ubuntu.
Severity: 3/4.
Consequences: user access/rights, denial of service on service, denial of service on client.
Provenance: document.
Number of vulnerabilities in this bulletin: 3.
Creation date: 17/12/2018.
Identifiers: CVE-2018-20346, CVE-2018-20505, CVE-2018-20506, DLA-1613-1, DSA-4352-1, FEDORA-2018-5f91fbf4fd, FEDORA-2018-ccbe8b931c, FEDORA-2019-49f80a78bc, FreeBSD-EN-19:03.sqlite, HT209443, HT209446, Magellan, openSUSE-SU-2018:4056-1, openSUSE-SU-2018:4122-1, openSUSE-SU-2018:4142-1, openSUSE-SU-2018:4143-1, openSUSE-SU-2019:1159-1, openSUSE-SU-2019:1222-1, RHSA-2018:3803-01, SUSE-SU-2019:0913-1, SUSE-SU-2019:0973-1, SUSE-SU-2019:14003-1, Synology-SA-18:61, USN-4019-1, USN-4019-2, VIGILANCE-VUL-28027.

Description of the vulnerability

The FTS3/FTS4 extension of SQLite can be used to create tables with text indexes.

However, a series of special SQL queries using FTS3 triggers a memory corruption in the ext/fts3/fts3.c file. An access to a SQL session is thus needed for the attacker.

It can be noted that the Chrome browser supports SQL queries via WebSQL implemented with SQLite, so it is also vulnerable via a web page.

An attacker can therefore generate a memory corruption via a FTS3 query of SQLite, in order to trigger a denial of service, and possibly to run code.
Full Vigil@nce bulletin... (Free trial)

vulnerability bulletin CVE-2018-18397

Linux kernel: privilege escalation via Userfaultfd Sparse Tmpfs Files Write

Synthesis of the vulnerability

An attacker can bypass restrictions via Userfaultfd Sparse Tmpfs Files Write of the Linux kernel, in order to escalate his privileges.
Impacted products: Android OS, Linux, openSUSE Leap, RHEL, SUSE Linux Enterprise Desktop, SLES, Ubuntu.
Severity: 2/4.
Consequences: privileged access/rights, data creation/edition.
Provenance: user shell.
Creation date: 12/12/2018.
Identifiers: 1700, CERTFR-2019-AVI-038, CERTFR-2019-AVI-042, CERTFR-2019-AVI-091, CERTFR-2019-AVI-183, CVE-2018-18397, openSUSE-SU-2019:0065-1, RHSA-2019:0163-01, RHSA-2019:0202-01, RHSA-2019:0324-01, RHSA-2019:0831-01, SUSE-SU-2019:0196-1, SUSE-SU-2019:0222-1, SUSE-SU-2019:0224-1, USN-3901-1, USN-3901-2, USN-3903-1, USN-3903-2, VIGILANCE-VUL-28013.

Description of the vulnerability

An attacker can bypass restrictions via Userfaultfd Sparse Tmpfs Files Write of the Linux kernel, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about Android OS: