ALT-BU-2017-3085-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2015-4054
PgBouncer before 1.5.5 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) by sending a password packet before a startup packet.
- [oss-security] 20150522 Re: CVE Request: pgbouncer: DoS/remote crash: invalid packet order causes lookup of NULL pointer
- [oss-security] 20150522 Re: CVE Request: pgbouncer: DoS/remote crash: invalid packet order causes lookup of NULL pointer
- 74751
- 74751
- https://github.com/pgbouncer/pgbouncer/commit/74d6e5f7de5ec736f71204b7b422af7380c19ac5
- https://github.com/pgbouncer/pgbouncer/commit/74d6e5f7de5ec736f71204b7b422af7380c19ac5
- https://github.com/pgbouncer/pgbouncer/commit/edab5be6665b9e8de66c25ba527509b229468573
- https://github.com/pgbouncer/pgbouncer/commit/edab5be6665b9e8de66c25ba527509b229468573
- https://github.com/pgbouncer/pgbouncer/issues/42
- https://github.com/pgbouncer/pgbouncer/issues/42
- https://pgbouncer.github.io/changelog.html#pgbouncer-15x
- https://pgbouncer.github.io/changelog.html#pgbouncer-15x
- GLSA-201701-24
- GLSA-201701-24
Closed bugs
Нестандартный пусть до загружаемых модулей
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-2669
Dovecot before version 2.2.29 is vulnerable to a denial of service. When 'dict' passdb and userdb were used for user authentication, the username sent by the IMAP/POP3 client was sent through var_expand() to perform %variable expansion. Sending specially crafted %variable fields could result in excessive memory usage causing the process to crash (and restart), or excessive CPU usage causing all authentications to hang.
- [oss-security] 20170411 CVE-2017-2669: Dovecot DoS when passdb dict was used for authentication
- [oss-security] 20170411 CVE-2017-2669: Dovecot DoS when passdb dict was used for authentication
- 97536
- 97536
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2669
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2669
- [dovecot-news] 20170410 v2.2.29 released
- [dovecot-news] 20170410 v2.2.29 released
- https://github.com/dovecot/core/commit/000030feb7a30f193197f1aab8a7b04a26b42735.patch
- https://github.com/dovecot/core/commit/000030feb7a30f193197f1aab8a7b04a26b42735.patch
- DSA-3828
- DSA-3828
Closed vulnerabilities
Modified: 2024-11-21
CVE-2016-9575
Ipa versions 4.2.x, 4.3.x before 4.3.3 and 4.4.x before 4.4.3 did not properly check the user's permissions while modifying certificate profiles in IdM's certprofile-mod command. An authenticated, unprivileged attacker could use this flaw to modify profiles to issue certificates with arbitrary naming or key usage information and subsequently use such certificates for other attacks.
Package 389-ds-base updated to version 1.3.7.0-alt1 for branch sisyphus in task 182232.
Closed vulnerabilities
BDU:2020-02901
Уязвимость службы каталогов уровня предприятия 389 Directory Server, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2017-15134
A stack buffer overflow flaw was found in the way 389-ds-base 1.3.6.x before 1.3.6.13, 1.3.7.x before 1.3.7.9, 1.4.x before 1.4.0.5 handled certain LDAP search filters. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.
- openSUSE-SU-2019:1397
- openSUSE-SU-2019:1397
- 102790
- 102790
- RHSA-2018:0163
- RHSA-2018:0163
- https://bugzilla.redhat.com/show_bug.cgi?id=1531573
- https://bugzilla.redhat.com/show_bug.cgi?id=1531573
- [debian-lts-announce] 20180715 [SECURITY] [DLA 1428-1] 389-ds-base security update
- [debian-lts-announce] 20180715 [SECURITY] [DLA 1428-1] 389-ds-base security update
- https://pagure.io/389-ds-base/c/6aa2acdc3cad9
- https://pagure.io/389-ds-base/c/6aa2acdc3cad9
Modified: 2024-11-21
CVE-2017-2668
389-ds-base before versions 1.3.5.17 and 1.3.6.10 is vulnerable to an invalid pointer dereference in the way LDAP bind requests are handled. A remote unauthenticated attacker could use this flaw to make ns-slapd crash via a specially crafted LDAP bind request, resulting in denial of service.
Modified: 2024-11-21
CVE-2018-1089
389-ds-base before versions 1.4.0.9, 1.3.8.1, 1.3.6.15 did not properly handle long search filters with characters needing escapes, possibly leading to buffer overflows. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.
- 104137
- 104137
- RHSA-2018:1364
- RHSA-2018:1364
- RHSA-2018:1380
- RHSA-2018:1380
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1089
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1089
- [debian-lts-announce] 20180715 [SECURITY] [DLA 1428-1] 389-ds-base security update
- [debian-lts-announce] 20180715 [SECURITY] [DLA 1428-1] 389-ds-base security update