ALT-BU-2017-3085-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2025-04-20
CVE-2015-4054
PgBouncer before 1.5.5 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) by sending a password packet before a startup packet.
- http://www.openwall.com/lists/oss-security/2015/05/22/5
- http://www.securityfocus.com/bid/74751
- https://github.com/pgbouncer/pgbouncer/commit/74d6e5f7de5ec736f71204b7b422af7380c19ac5
- https://github.com/pgbouncer/pgbouncer/commit/edab5be6665b9e8de66c25ba527509b229468573
- https://github.com/pgbouncer/pgbouncer/issues/42
- https://pgbouncer.github.io/changelog.html#pgbouncer-15x
- https://security.gentoo.org/glsa/201701-24
- http://www.openwall.com/lists/oss-security/2015/05/22/5
- http://www.securityfocus.com/bid/74751
- https://github.com/pgbouncer/pgbouncer/commit/74d6e5f7de5ec736f71204b7b422af7380c19ac5
- https://github.com/pgbouncer/pgbouncer/commit/edab5be6665b9e8de66c25ba527509b229468573
- https://github.com/pgbouncer/pgbouncer/issues/42
- https://pgbouncer.github.io/changelog.html#pgbouncer-15x
- https://security.gentoo.org/glsa/201701-24
Closed bugs
Нестандартный пусть до загружаемых модулей
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-2669
Dovecot before version 2.2.29 is vulnerable to a denial of service. When 'dict' passdb and userdb were used for user authentication, the username sent by the IMAP/POP3 client was sent through var_expand() to perform %variable expansion. Sending specially crafted %variable fields could result in excessive memory usage causing the process to crash (and restart), or excessive CPU usage causing all authentications to hang.
- http://www.openwall.com/lists/oss-security/2017/04/11/1
- http://www.securityfocus.com/bid/97536
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2669
- https://dovecot.org/pipermail/dovecot-news/2017-April/000341.html
- https://github.com/dovecot/core/commit/000030feb7a30f193197f1aab8a7b04a26b42735.patch
- https://www.debian.org/security/2017/dsa-3828
- http://www.openwall.com/lists/oss-security/2017/04/11/1
- http://www.securityfocus.com/bid/97536
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2669
- https://dovecot.org/pipermail/dovecot-news/2017-April/000341.html
- https://github.com/dovecot/core/commit/000030feb7a30f193197f1aab8a7b04a26b42735.patch
- https://www.debian.org/security/2017/dsa-3828
Closed vulnerabilities
Modified: 2024-11-21
CVE-2016-9575
Ipa versions 4.2.x, 4.3.x before 4.3.3 and 4.4.x before 4.4.3 did not properly check the user's permissions while modifying certificate profiles in IdM's certprofile-mod command. An authenticated, unprivileged attacker could use this flaw to modify profiles to issue certificates with arbitrary naming or key usage information and subsequently use such certificates for other attacks.
Package 389-ds-base updated to version 1.3.7.0-alt1 for branch sisyphus in task 182232.
Closed vulnerabilities
BDU:2020-02901
Уязвимость службы каталогов уровня предприятия 389 Directory Server, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2017-15134
A stack buffer overflow flaw was found in the way 389-ds-base 1.3.6.x before 1.3.6.13, 1.3.7.x before 1.3.7.9, 1.4.x before 1.4.0.5 handled certain LDAP search filters. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00033.html
- http://www.securityfocus.com/bid/102790
- https://access.redhat.com/errata/RHSA-2018:0163
- https://bugzilla.redhat.com/show_bug.cgi?id=1531573
- https://lists.debian.org/debian-lts-announce/2018/07/msg00018.html
- https://pagure.io/389-ds-base/c/6aa2acdc3cad9
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00033.html
- http://www.securityfocus.com/bid/102790
- https://access.redhat.com/errata/RHSA-2018:0163
- https://bugzilla.redhat.com/show_bug.cgi?id=1531573
- https://lists.debian.org/debian-lts-announce/2018/07/msg00018.html
- https://pagure.io/389-ds-base/c/6aa2acdc3cad9
Modified: 2024-11-21
CVE-2017-2668
389-ds-base before versions 1.3.5.17 and 1.3.6.10 is vulnerable to an invalid pointer dereference in the way LDAP bind requests are handled. A remote unauthenticated attacker could use this flaw to make ns-slapd crash via a specially crafted LDAP bind request, resulting in denial of service.
- http://www.securityfocus.com/bid/97524
- https://access.redhat.com/errata/RHSA-2017:0893
- https://access.redhat.com/errata/RHSA-2017:0920
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2668
- https://pagure.io/389-ds-base/issue/49220
- http://www.securityfocus.com/bid/97524
- https://access.redhat.com/errata/RHSA-2017:0893
- https://access.redhat.com/errata/RHSA-2017:0920
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2668
- https://pagure.io/389-ds-base/issue/49220
Modified: 2024-11-21
CVE-2018-1089
389-ds-base before versions 1.4.0.9, 1.3.8.1, 1.3.6.15 did not properly handle long search filters with characters needing escapes, possibly leading to buffer overflows. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.
- http://www.securityfocus.com/bid/104137
- https://access.redhat.com/errata/RHSA-2018:1364
- https://access.redhat.com/errata/RHSA-2018:1380
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1089
- https://lists.debian.org/debian-lts-announce/2018/07/msg00018.html
- http://www.securityfocus.com/bid/104137
- https://access.redhat.com/errata/RHSA-2018:1364
- https://access.redhat.com/errata/RHSA-2018:1380
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1089
- https://lists.debian.org/debian-lts-announce/2018/07/msg00018.html