ALT-BU-2018-3404-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2020-00694
Уязвимость компонента LDAP-сервера программ сетевого взаимодействия Samba, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-1140
A missing input sanitization flaw was found in the implementation of LDP database used for the LDAP server. An attacker could use this flaw to cause a denial of service against a samba server, used as a Active Directory Domain Controller. All versions of Samba from 4.8.0 onwards are vulnerable
- 105082
- 105082
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1140
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1140
- https://bugzilla.samba.org/show_bug.cgi?id=13374
- https://bugzilla.samba.org/show_bug.cgi?id=13374
- GLSA-202003-52
- GLSA-202003-52
- https://security.netapp.com/advisory/ntap-20180814-0001/
- https://security.netapp.com/advisory/ntap-20180814-0001/
- https://www.samba.org/samba/security/CVE-2018-1140.html
- https://www.samba.org/samba/security/CVE-2018-1140.html
Closed vulnerabilities
BDU:2019-01639
Уязвимость программного обеспечения Samba, связанная c переполнением буфера динамической памяти, позволяющая нарушителю выполнить произвольный код
BDU:2020-00691
Уязвимость пакета программ для сетевого взаимодействия Samba, связанная с разыменованием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00692
Уязвимость компонента Active Directory LDAP-сервера программ сетевого взаимодействия Samba, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным
BDU:2020-00693
Уязвимость компонента аутентификации NTLMv1 программ сетевого взаимодействия Samba, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным
BDU:2020-00694
Уязвимость компонента LDAP-сервера программ сетевого взаимодействия Samba, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-10858
A heap-buffer overflow was found in the way samba clients processed extra long filename in a directory listing. A malicious samba server could use this flaw to cause arbitrary code execution on a samba client. Samba versions before 4.6.16, 4.7.9 and 4.8.4 are vulnerable.
- 105085
- 105085
- 1042002
- 1042002
- RHSA-2018:2612
- RHSA-2018:2612
- RHSA-2018:2613
- RHSA-2018:2613
- RHSA-2018:3056
- RHSA-2018:3056
- RHSA-2018:3470
- RHSA-2018:3470
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10858
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10858
- https://kc.mcafee.com/corporate/index?page=content&id=SB10284
- https://kc.mcafee.com/corporate/index?page=content&id=SB10284
- GLSA-202003-52
- GLSA-202003-52
- https://security.netapp.com/advisory/ntap-20180814-0001/
- https://security.netapp.com/advisory/ntap-20180814-0001/
- USN-3738-1
- USN-3738-1
- DSA-4271
- DSA-4271
- https://www.samba.org/samba/security/CVE-2018-10858.html
- https://www.samba.org/samba/security/CVE-2018-10858.html
Modified: 2024-11-21
CVE-2018-10918
A null pointer dereference flaw was found in the way samba checked database outputs from the LDB database layer. An authenticated attacker could use this flaw to crash a samba server in an Active Directory Domain Controller configuration. Samba versions before 4.7.9 and 4.8.4 are vulnerable.
- 105083
- 105083
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10918
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10918
- GLSA-202003-52
- GLSA-202003-52
- https://security.netapp.com/advisory/ntap-20180814-0001/
- https://security.netapp.com/advisory/ntap-20180814-0001/
- USN-3738-1
- USN-3738-1
- https://www.samba.org/samba/security/CVE-2018-10918.html
- https://www.samba.org/samba/security/CVE-2018-10918.html
Modified: 2024-11-21
CVE-2018-10919
The Samba Active Directory LDAP server was vulnerable to an information disclosure flaw because of missing access control checks. An authenticated attacker could use this flaw to extract confidential attribute values using LDAP search expressions. Samba versions before 4.6.16, 4.7.9 and 4.8.4 are vulnerable.
- 105081
- 105081
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10919
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10919
- GLSA-202003-52
- GLSA-202003-52
- https://security.netapp.com/advisory/ntap-20180814-0001/
- https://security.netapp.com/advisory/ntap-20180814-0001/
- USN-3738-1
- USN-3738-1
- DSA-4271
- DSA-4271
- https://www.samba.org/samba/security/CVE-2018-10919.html
- https://www.samba.org/samba/security/CVE-2018-10919.html
Modified: 2024-11-21
CVE-2018-1139
A flaw was found in the way samba before 4.7.9 and 4.8.4 allowed the use of weak NTLMv1 authentication even when NTLMv1 was explicitly disabled. A man-in-the-middle attacker could use this flaw to read the credential and other details passed between the samba server and client.
- 105084
- 105084
- RHSA-2018:2612
- RHSA-2018:2612
- RHSA-2018:2613
- RHSA-2018:2613
- RHSA-2018:3056
- RHSA-2018:3056
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1139
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1139
- GLSA-202003-52
- GLSA-202003-52
- https://security.netapp.com/advisory/ntap-20180814-0001/
- https://security.netapp.com/advisory/ntap-20180814-0001/
- USN-3738-1
- USN-3738-1
- https://www.samba.org/samba/security/CVE-2018-1139.html
- https://www.samba.org/samba/security/CVE-2018-1139.html
Modified: 2024-11-21
CVE-2018-1140
A missing input sanitization flaw was found in the implementation of LDP database used for the LDAP server. An attacker could use this flaw to cause a denial of service against a samba server, used as a Active Directory Domain Controller. All versions of Samba from 4.8.0 onwards are vulnerable
- 105082
- 105082
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1140
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1140
- https://bugzilla.samba.org/show_bug.cgi?id=13374
- https://bugzilla.samba.org/show_bug.cgi?id=13374
- GLSA-202003-52
- GLSA-202003-52
- https://security.netapp.com/advisory/ntap-20180814-0001/
- https://security.netapp.com/advisory/ntap-20180814-0001/
- https://www.samba.org/samba/security/CVE-2018-1140.html
- https://www.samba.org/samba/security/CVE-2018-1140.html
Closed vulnerabilities
BDU:2019-01639
Уязвимость программного обеспечения Samba, связанная c переполнением буфера динамической памяти, позволяющая нарушителю выполнить произвольный код
BDU:2020-00691
Уязвимость пакета программ для сетевого взаимодействия Samba, связанная с разыменованием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00692
Уязвимость компонента Active Directory LDAP-сервера программ сетевого взаимодействия Samba, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным
BDU:2020-00693
Уязвимость компонента аутентификации NTLMv1 программ сетевого взаимодействия Samba, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным
BDU:2020-00694
Уязвимость компонента LDAP-сервера программ сетевого взаимодействия Samba, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-10858
A heap-buffer overflow was found in the way samba clients processed extra long filename in a directory listing. A malicious samba server could use this flaw to cause arbitrary code execution on a samba client. Samba versions before 4.6.16, 4.7.9 and 4.8.4 are vulnerable.
- 105085
- 105085
- 1042002
- 1042002
- RHSA-2018:2612
- RHSA-2018:2612
- RHSA-2018:2613
- RHSA-2018:2613
- RHSA-2018:3056
- RHSA-2018:3056
- RHSA-2018:3470
- RHSA-2018:3470
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10858
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10858
- https://kc.mcafee.com/corporate/index?page=content&id=SB10284
- https://kc.mcafee.com/corporate/index?page=content&id=SB10284
- GLSA-202003-52
- GLSA-202003-52
- https://security.netapp.com/advisory/ntap-20180814-0001/
- https://security.netapp.com/advisory/ntap-20180814-0001/
- USN-3738-1
- USN-3738-1
- DSA-4271
- DSA-4271
- https://www.samba.org/samba/security/CVE-2018-10858.html
- https://www.samba.org/samba/security/CVE-2018-10858.html
Modified: 2024-11-21
CVE-2018-10918
A null pointer dereference flaw was found in the way samba checked database outputs from the LDB database layer. An authenticated attacker could use this flaw to crash a samba server in an Active Directory Domain Controller configuration. Samba versions before 4.7.9 and 4.8.4 are vulnerable.
- 105083
- 105083
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10918
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10918
- GLSA-202003-52
- GLSA-202003-52
- https://security.netapp.com/advisory/ntap-20180814-0001/
- https://security.netapp.com/advisory/ntap-20180814-0001/
- USN-3738-1
- USN-3738-1
- https://www.samba.org/samba/security/CVE-2018-10918.html
- https://www.samba.org/samba/security/CVE-2018-10918.html
Modified: 2024-11-21
CVE-2018-10919
The Samba Active Directory LDAP server was vulnerable to an information disclosure flaw because of missing access control checks. An authenticated attacker could use this flaw to extract confidential attribute values using LDAP search expressions. Samba versions before 4.6.16, 4.7.9 and 4.8.4 are vulnerable.
- 105081
- 105081
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10919
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10919
- GLSA-202003-52
- GLSA-202003-52
- https://security.netapp.com/advisory/ntap-20180814-0001/
- https://security.netapp.com/advisory/ntap-20180814-0001/
- USN-3738-1
- USN-3738-1
- DSA-4271
- DSA-4271
- https://www.samba.org/samba/security/CVE-2018-10919.html
- https://www.samba.org/samba/security/CVE-2018-10919.html
Modified: 2024-11-21
CVE-2018-1139
A flaw was found in the way samba before 4.7.9 and 4.8.4 allowed the use of weak NTLMv1 authentication even when NTLMv1 was explicitly disabled. A man-in-the-middle attacker could use this flaw to read the credential and other details passed between the samba server and client.
- 105084
- 105084
- RHSA-2018:2612
- RHSA-2018:2612
- RHSA-2018:2613
- RHSA-2018:2613
- RHSA-2018:3056
- RHSA-2018:3056
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1139
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1139
- GLSA-202003-52
- GLSA-202003-52
- https://security.netapp.com/advisory/ntap-20180814-0001/
- https://security.netapp.com/advisory/ntap-20180814-0001/
- USN-3738-1
- USN-3738-1
- https://www.samba.org/samba/security/CVE-2018-1139.html
- https://www.samba.org/samba/security/CVE-2018-1139.html
Modified: 2024-11-21
CVE-2018-1140
A missing input sanitization flaw was found in the implementation of LDP database used for the LDAP server. An attacker could use this flaw to cause a denial of service against a samba server, used as a Active Directory Domain Controller. All versions of Samba from 4.8.0 onwards are vulnerable
- 105082
- 105082
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1140
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1140
- https://bugzilla.samba.org/show_bug.cgi?id=13374
- https://bugzilla.samba.org/show_bug.cgi?id=13374
- GLSA-202003-52
- GLSA-202003-52
- https://security.netapp.com/advisory/ntap-20180814-0001/
- https://security.netapp.com/advisory/ntap-20180814-0001/
- https://www.samba.org/samba/security/CVE-2018-1140.html
- https://www.samba.org/samba/security/CVE-2018-1140.html
Package libgraphite2 updated to version 1.3.12-alt1 for branch sisyphus in task 211568.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-7999
In libgraphite2 in graphite2 1.3.11, a NULL pointer dereference vulnerability was found in Segment.cpp during a dumbRendering operation, which may allow attackers to cause a denial of service or possibly have unspecified other impact via a crafted .ttf file.
- https://github.com/silnrsi/graphite/commit/db132b4731a9b4c9534144ba3a18e65b390e9ff6
- https://github.com/silnrsi/graphite/commit/db132b4731a9b4c9534144ba3a18e65b390e9ff6
- https://github.com/silnrsi/graphite/issues/22
- https://github.com/silnrsi/graphite/issues/22
- FEDORA-2019-d0b1feb995
- FEDORA-2019-d0b1feb995
- FEDORA-2019-644ef7ebec
- FEDORA-2019-644ef7ebec
Closed vulnerabilities
BDU:2019-02446
Уязвимость функции g_markup_parse_context_end_parse библиотеки Glib, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-02447
Уязвимость функции g_markup_parse_context_parse библиотеки Glib, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-16428
In GNOME GLib 2.56.1, g_markup_parse_context_end_parse() in gmarkup.c has a NULL pointer dereference.
- [oss-security] 20200214 Re: CVE for program distributing vulnerable components ?
- [oss-security] 20200214 Re: CVE for program distributing vulnerable components ?
- 105210
- 105210
- https://gitlab.gnome.org/GNOME/glib/commit/fccef3cc822af74699cca84cd202719ae61ca3b9
- https://gitlab.gnome.org/GNOME/glib/commit/fccef3cc822af74699cca84cd202719ae61ca3b9
- https://gitlab.gnome.org/GNOME/glib/issues/1364
- https://gitlab.gnome.org/GNOME/glib/issues/1364
- [debian-lts-announce] 20190731 [SECURITY] [DLA 1866-1] glib2.0 security update
- [debian-lts-announce] 20190731 [SECURITY] [DLA 1866-1] glib2.0 security update
- USN-3767-1
- USN-3767-1
- USN-3767-2
- USN-3767-2
Modified: 2024-11-21
CVE-2018-16429
GNOME GLib 2.56.1 has an out-of-bounds read vulnerability in g_markup_parse_context_parse() in gmarkup.c, related to utf8_str().
- https://gitlab.gnome.org/GNOME/glib/commit/cec71705406f0b2790422f0c1aa0ff3b4b464b1b
- https://gitlab.gnome.org/GNOME/glib/commit/cec71705406f0b2790422f0c1aa0ff3b4b464b1b
- https://gitlab.gnome.org/GNOME/glib/issues/1361
- https://gitlab.gnome.org/GNOME/glib/issues/1361
- [bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [debian-lts-announce] 20190731 [SECURITY] [DLA 1866-1] glib2.0 security update
- [debian-lts-announce] 20190731 [SECURITY] [DLA 1866-1] glib2.0 security update
- USN-3767-1
- USN-3767-1
- USN-3767-2
- USN-3767-2
Closed bugs
Обновить URL и версию до 2.0.9
Package kubernetes updated to version 1.11.2-alt1.S1 for branch sisyphus in task 211573.
Closed vulnerabilities
BDU:2018-01617
Уязвимость программного средства управления кластерами виртуальных машин Kubernetes, связанная с непринятием мер по нейтрализации специальных элементов, используемых в командах, позволяющая нарушителю выполнить произвольные команды операционной системы
Modified: 2024-11-21
CVE-2018-1002101
In Kubernetes versions 1.9.0-1.9.9, 1.10.0-1.10.5, and 1.11.0-1.11.1, user input was handled insecurely while setting up volume mounts on Windows nodes, which could lead to command line argument injection.
Closed bugs
Hardcoded memory_limit value in the wrapper script