ALT-BU-2018-3451-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2020-02560
Уязвимость компонентов build.c, prepare.c системы управления базами данных SQLite, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-8740
In SQLite through 3.22.0, databases whose schema is corrupted using a CREATE TABLE AS statement could cause a NULL pointer dereference, related to build.c and prepare.c.
- openSUSE-SU-2019:1426
- openSUSE-SU-2019:1426
- 103466
- 103466
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=6964
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=6964
- https://bugs.launchpad.net/ubuntu/+source/sqlite3/+bug/1756349
- https://bugs.launchpad.net/ubuntu/+source/sqlite3/+bug/1756349
- [bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [debian-lts-announce] 20190111 [SECURITY] [DLA 1633-1] sqlite3 security update
- [debian-lts-announce] 20190111 [SECURITY] [DLA 1633-1] sqlite3 security update
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2340-1] sqlite3 security update
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2340-1] sqlite3 security update
- [debian-lts-announce] 20230522 [SECURITY] [DLA 3431-1] sqlite security update
- [debian-lts-announce] 20230522 [SECURITY] [DLA 3431-1] sqlite security update
- FEDORA-2019-49f80a78bc
- FEDORA-2019-49f80a78bc
- USN-4205-1
- USN-4205-1
- USN-4394-1
- USN-4394-1
- https://www.sqlite.org/cgi/src/timeline?r=corrupt-schema
- https://www.sqlite.org/cgi/src/timeline?r=corrupt-schema
- https://www.sqlite.org/cgi/src/vdiff?from=1774f1c3baf0bc3d&to=d75e67654aa9620b
- https://www.sqlite.org/cgi/src/vdiff?from=1774f1c3baf0bc3d&to=d75e67654aa9620b
Package aircrack-ng updated to version 1.3-alt1 for branch sisyphus in task 212709.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2014-8321
Stack-based buffer overflow in the gps_tracker function in airodump-ng.c in Aircrack-ng before 1.2 RC 1 allows local users to execute arbitrary code or gain privileges via unspecified vectors.
- http://aircrack-ng.blogspot.com/2014/10/aircrack-ng-12-release-candidate-1.html
- http://aircrack-ng.blogspot.com/2014/10/aircrack-ng-12-release-candidate-1.html
- http://packetstormsecurity.com/files/128943/Aircrack-ng-1.2-Beta-3-DoS-Code-Execution.html
- http://packetstormsecurity.com/files/128943/Aircrack-ng-1.2-Beta-3-DoS-Code-Execution.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/98458
- https://exchange.xforce.ibmcloud.com/vulnerabilities/98458
- https://github.com/aircrack-ng/aircrack-ng/commit/ff70494dd389ba570dbdbf36f217c28d4381c6b5/
- https://github.com/aircrack-ng/aircrack-ng/commit/ff70494dd389ba570dbdbf36f217c28d4381c6b5/
- https://github.com/aircrack-ng/aircrack-ng/pull/13
- https://github.com/aircrack-ng/aircrack-ng/pull/13
Modified: 2024-11-21
CVE-2014-8322
Stack-based buffer overflow in the tcp_test function in aireplay-ng.c in Aircrack-ng before 1.2 RC 1 allows remote attackers to execute arbitrary code via a crafted length parameter value.
- http://aircrack-ng.blogspot.com/2014/10/aircrack-ng-12-release-candidate-1.html
- http://aircrack-ng.blogspot.com/2014/10/aircrack-ng-12-release-candidate-1.html
- http://packetstormsecurity.com/files/128943/Aircrack-ng-1.2-Beta-3-DoS-Code-Execution.html
- http://packetstormsecurity.com/files/128943/Aircrack-ng-1.2-Beta-3-DoS-Code-Execution.html
- http://www.exploit-db.com/exploits/35018
- http://www.exploit-db.com/exploits/35018
- https://exchange.xforce.ibmcloud.com/vulnerabilities/98459
- https://exchange.xforce.ibmcloud.com/vulnerabilities/98459
- https://github.com/aircrack-ng/aircrack-ng/commit/091b153f294b9b695b0b2831e65936438b550d7b
- https://github.com/aircrack-ng/aircrack-ng/commit/091b153f294b9b695b0b2831e65936438b550d7b
- https://github.com/aircrack-ng/aircrack-ng/pull/14
- https://github.com/aircrack-ng/aircrack-ng/pull/14
Modified: 2024-11-21
CVE-2014-8323
buddy-ng.c in Aircrack-ng before 1.2 Beta 3 allows remote attackers to cause a denial of service (segmentation fault) via a response with a crafted length parameter.
- http://aircrack-ng.blogspot.com/2014/10/aircrack-ng-12-release-candidate-1.html
- http://aircrack-ng.blogspot.com/2014/10/aircrack-ng-12-release-candidate-1.html
- FEDORA-2014-14283
- FEDORA-2014-14283
- FEDORA-2014-14247
- FEDORA-2014-14247
- FEDORA-2014-14233
- FEDORA-2014-14233
- http://packetstormsecurity.com/files/128943/Aircrack-ng-1.2-Beta-3-DoS-Code-Execution.html
- http://packetstormsecurity.com/files/128943/Aircrack-ng-1.2-Beta-3-DoS-Code-Execution.html
- GLSA-201411-08
- GLSA-201411-08
- 20141101 Aircrack-ng 1.2 Beta 3" multiple vulnerabilities
- 20141101 Aircrack-ng 1.2 Beta 3" multiple vulnerabilities
- 71085
- 71085
- https://bugzilla.redhat.com/show_bug.cgi?id=1159812
- https://bugzilla.redhat.com/show_bug.cgi?id=1159812
- https://github.com/aircrack-ng/aircrack-ng/commit/da087238963c1239fdabd47dc1b65279605aca70
- https://github.com/aircrack-ng/aircrack-ng/commit/da087238963c1239fdabd47dc1b65279605aca70
Modified: 2024-11-21
CVE-2014-8324
network.c in Aircrack-ng before 1.2 Beta 3 allows remote attackers to cause a denial of service (segmentation fault) via a response with a crafted length parameter.
- http://aircrack-ng.blogspot.com/2014/10/aircrack-ng-12-release-candidate-1.html
- http://aircrack-ng.blogspot.com/2014/10/aircrack-ng-12-release-candidate-1.html
- FEDORA-2014-14283
- FEDORA-2014-14283
- FEDORA-2014-14247
- FEDORA-2014-14247
- FEDORA-2014-14233
- FEDORA-2014-14233
- http://packetstormsecurity.com/files/128943/Aircrack-ng-1.2-Beta-3-DoS-Code-Execution.html
- http://packetstormsecurity.com/files/128943/Aircrack-ng-1.2-Beta-3-DoS-Code-Execution.html
- GLSA-201411-08
- GLSA-201411-08
- 20141101 Aircrack-ng 1.2 Beta 3" multiple vulnerabilities
- 20141101 Aircrack-ng 1.2 Beta 3" multiple vulnerabilities
- https://bugzilla.redhat.com/show_bug.cgi?id=1159812
- https://bugzilla.redhat.com/show_bug.cgi?id=1159812
- https://github.com/aircrack-ng/aircrack-ng/commit/88702a3ce4c28a973bf69023cd0312f412f6193e
- https://github.com/aircrack-ng/aircrack-ng/commit/88702a3ce4c28a973bf69023cd0312f412f6193e
Package libsndfile updated to version 1.0.28-alt2 for branch sisyphus in task 212728.
Closed vulnerabilities
BDU:2018-00012
Уязвимость функции aiff_read_chanmap (aaiff.c) библиотеки libsndfile, позволяющая нарушителю нарушить конфиденциальность, целостность и доступность данных
BDU:2018-00013
Уязвимость функции psf_binheader_writef (common.c) библиотеки libsndfile операционной системы Astra Linux, позволяющая нарушителю нарушить конфиденциальность, целостность и доступность данных или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2017-12562
Heap-based Buffer Overflow in the psf_binheader_writef function in common.c in libsndfile through 1.0.28 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.
Modified: 2024-11-21
CVE-2017-6892
In libsndfile version 1.0.28, an error in the "aiff_read_chanmap()" function (aiff.c) can be exploited to cause an out-of-bounds read memory access via a specially crafted AIFF file.
- https://github.com/erikd/libsndfile/commit/f833c53cb596e9e1792949f762e0b33661822748
- https://github.com/erikd/libsndfile/commit/f833c53cb596e9e1792949f762e0b33661822748
- [debian-lts-announce] 20201029 [SECURITY] [DLA 2418-1] libsndfile security update
- [debian-lts-announce] 20201029 [SECURITY] [DLA 2418-1] libsndfile security update
- https://secuniaresearch.flexerasoftware.com/advisories/76717/
- https://secuniaresearch.flexerasoftware.com/advisories/76717/
- https://secuniaresearch.flexerasoftware.com/secunia_research/2017-13/
- https://secuniaresearch.flexerasoftware.com/secunia_research/2017-13/
- GLSA-201811-23
- GLSA-201811-23
- USN-4013-1
- USN-4013-1
Closed vulnerabilities
BDU:2019-00688
Уязвимость модуля crypto языка программирования Go, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-01887
Уязвимость реализации команды «go get» языка программирования Go, позволяющая нарушителю выполнить произвольный код
BDU:2020-01888
Уязвимость реализации команды «go get» языка программирования Go, позволяющая нарушителю выполнить произвольный код
BDU:2020-01889
Уязвимость пакета crypto/x509 языка программирования Go, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-16873
In Go before 1.10.6 and 1.11.x before 1.11.3, the "go get" command is vulnerable to remote code execution when executed with the -u flag and the import path of a malicious Go package, or a package that imports it directly or indirectly. Specifically, it is only vulnerable in GOPATH mode, but not in module mode (the distinction is documented at https://golang.org/cmd/go/#hdr-Module_aware_go_get). Using custom domains, it's possible to arrange things so that a Git repository is cloned to a folder named ".git" by using a vanity import path that ends with "/.git". If the Git repository root contains a "HEAD" file, a "config" file, an "objects" directory, a "refs" directory, with some work to ensure the proper ordering of operations, "go get -u" can be tricked into considering the parent directory as a repository root, and running Git commands on it. That will use the "config" file in the original Git repository root for its configuration, and if that config file contains malicious commands, they will execute on the system running "go get -u".
- openSUSE-SU-2019:1079
- openSUSE-SU-2019:1079
- openSUSE-SU-2019:1444
- openSUSE-SU-2019:1444
- openSUSE-SU-2019:1499
- openSUSE-SU-2019:1499
- openSUSE-SU-2019:1506
- openSUSE-SU-2019:1506
- openSUSE-SU-2019:1703
- openSUSE-SU-2019:1703
- openSUSE-SU-2020:0554
- openSUSE-SU-2020:0554
- 106226
- 106226
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16873
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16873
- https://groups.google.com/forum/?pli=1#%21topic/golang-announce/Kw31K8G7Fi0
- https://groups.google.com/forum/?pli=1#%21topic/golang-announce/Kw31K8G7Fi0
- [debian-lts-announce] 20210313 [SECURITY] [DLA 2591-1] golang-1.7 security update
- [debian-lts-announce] 20210313 [SECURITY] [DLA 2591-1] golang-1.7 security update
- [debian-lts-announce] 20210313 [SECURITY] [DLA 2592-1] golang-1.8 security update
- [debian-lts-announce] 20210313 [SECURITY] [DLA 2592-1] golang-1.8 security update
- GLSA-201812-09
- GLSA-201812-09
Modified: 2024-11-21
CVE-2018-16874
In Go before 1.10.6 and 1.11.x before 1.11.3, the "go get" command is vulnerable to directory traversal when executed with the import path of a malicious Go package which contains curly braces (both '{' and '}' characters). Specifically, it is only vulnerable in GOPATH mode, but not in module mode (the distinction is documented at https://golang.org/cmd/go/#hdr-Module_aware_go_get). The attacker can cause an arbitrary filesystem write, which can lead to code execution.
- openSUSE-SU-2019:1079
- openSUSE-SU-2019:1079
- openSUSE-SU-2019:1444
- openSUSE-SU-2019:1444
- openSUSE-SU-2019:1499
- openSUSE-SU-2019:1499
- openSUSE-SU-2019:1506
- openSUSE-SU-2019:1506
- openSUSE-SU-2019:1703
- openSUSE-SU-2019:1703
- openSUSE-SU-2020:0554
- openSUSE-SU-2020:0554
- 106228
- 106228
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16874
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16874
- https://groups.google.com/forum/?pli=1#%21topic/golang-announce/Kw31K8G7Fi0
- https://groups.google.com/forum/?pli=1#%21topic/golang-announce/Kw31K8G7Fi0
- [debian-lts-announce] 20210313 [SECURITY] [DLA 2591-1] golang-1.7 security update
- [debian-lts-announce] 20210313 [SECURITY] [DLA 2591-1] golang-1.7 security update
- [debian-lts-announce] 20210313 [SECURITY] [DLA 2592-1] golang-1.8 security update
- [debian-lts-announce] 20210313 [SECURITY] [DLA 2592-1] golang-1.8 security update
- GLSA-201812-09
- GLSA-201812-09
Modified: 2024-11-21
CVE-2018-16875
The crypto/x509 package of Go before 1.10.6 and 1.11.x before 1.11.3 does not limit the amount of work performed for each chain verification, which might allow attackers to craft pathological inputs leading to a CPU denial of service. Go TLS servers accepting client certificates and TLS clients are affected.
- openSUSE-SU-2019:1079
- openSUSE-SU-2019:1079
- openSUSE-SU-2019:1444
- openSUSE-SU-2019:1444
- openSUSE-SU-2019:1499
- openSUSE-SU-2019:1499
- openSUSE-SU-2019:1506
- openSUSE-SU-2019:1506
- openSUSE-SU-2019:1703
- openSUSE-SU-2019:1703
- 106230
- 106230
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16875
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16875
- https://groups.google.com/forum/?pli=1#%21topic/golang-announce/Kw31K8G7Fi0
- https://groups.google.com/forum/?pli=1#%21topic/golang-announce/Kw31K8G7Fi0
- GLSA-201812-09
- GLSA-201812-09
Modified: 2024-11-21
CVE-2019-6486
Go before 1.10.8 and 1.11.x before 1.11.5 mishandles P-521 and P-384 elliptic curves, which allows attackers to cause a denial of service (CPU consumption) or possibly conduct ECDH private key recovery attacks.
- openSUSE-SU-2019:1164
- openSUSE-SU-2019:1444
- openSUSE-SU-2019:1499
- openSUSE-SU-2019:1506
- 106740
- https://github.com/golang/go/commit/42b42f71cf8f5956c09e66230293dfb5db652360
- https://github.com/golang/go/issues/29903
- https://github.com/google/wycheproof
- https://groups.google.com/forum/#%21topic/golang-announce/mVeX35iXuSw
- [debian-lts-announce] 20190206 [SECURITY] [DLA 1664-1] golang security update
- DSA-4379
- DSA-4380
- openSUSE-SU-2019:1164
- DSA-4380
- DSA-4379
- [debian-lts-announce] 20190206 [SECURITY] [DLA 1664-1] golang security update
- https://groups.google.com/forum/#%21topic/golang-announce/mVeX35iXuSw
- https://github.com/google/wycheproof
- https://github.com/golang/go/issues/29903
- https://github.com/golang/go/commit/42b42f71cf8f5956c09e66230293dfb5db652360
- 106740
- openSUSE-SU-2019:1506
- openSUSE-SU-2019:1499
- openSUSE-SU-2019:1444
Package keepalived updated to version 2.0.7-alt1.S1 for branch sisyphus in task 212697.
Closed vulnerabilities
BDU:2019-02097
Уязвимость функции extract_status_code системы балансировки сетевого трафика Keepalived, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-19115
keepalived before 2.0.7 has a heap-based buffer overflow when parsing HTTP status codes resulting in DoS or possibly unspecified other impact, because extract_status_code in lib/html.c has no validation of the status code and instead writes an unlimited amount of data to the heap.
- RHSA-2019:0022
- RHSA-2019:0022
- RHSA-2019:1792
- RHSA-2019:1792
- RHSA-2019:1945
- RHSA-2019:1945
- https://bugzilla.suse.com/show_bug.cgi?id=1015141
- https://bugzilla.suse.com/show_bug.cgi?id=1015141
- https://github.com/acassen/keepalived/pull/961
- https://github.com/acassen/keepalived/pull/961
- https://github.com/acassen/keepalived/pull/961/commits/f28015671a4b04785859d1b4b1327b367b6a10e9
- https://github.com/acassen/keepalived/pull/961/commits/f28015671a4b04785859d1b4b1327b367b6a10e9
- [debian-lts-announce] 20181126 [SECURITY] [DLA-1589-1] keepalived security update
- [debian-lts-announce] 20181126 [SECURITY] [DLA-1589-1] keepalived security update
- GLSA-201903-01
- GLSA-201903-01
- USN-3995-1
- USN-3995-1
- USN-3995-2
- USN-3995-2
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-7651
In Eclipse Mosquitto 1.4.14, a user can shutdown the Mosquitto server simply by filling the RAM memory with a lot of connections with large payload. This can be done without authentications if occur in connection phase of MQTT protocol.
- https://bugs.eclipse.org/bugs/show_bug.cgi?id=529754
- https://bugs.eclipse.org/bugs/show_bug.cgi?id=529754
- [debian-lts-announce] 20180331 [SECURITY] [DLA 1334-1] mosquitto security update
- [debian-lts-announce] 20180331 [SECURITY] [DLA 1334-1] mosquitto security update
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1409-1] mosquitto security update
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1409-1] mosquitto security update
- https://mosquitto.org/blog/2018/02/security-advisory-cve-2017-7651-cve-2017-7652/
- https://mosquitto.org/blog/2018/02/security-advisory-cve-2017-7651-cve-2017-7652/
- DSA-4325
- DSA-4325
Modified: 2024-11-21
CVE-2017-7652
In Eclipse Mosquitto 1.4.14, if a Mosquitto instance is set running with a configuration file, then sending a HUP signal to server triggers the configuration to be reloaded from disk. If there are lots of clients connected so that there are no more file descriptors/sockets available (default limit typically 1024 file descriptors on Linux), then opening the configuration file will fail.
- https://bugs.eclipse.org/bugs/show_bug.cgi?id=530102
- https://bugs.eclipse.org/bugs/show_bug.cgi?id=530102
- [debian-lts-announce] 20180331 [SECURITY] [DLA 1334-1] mosquitto security update
- [debian-lts-announce] 20180331 [SECURITY] [DLA 1334-1] mosquitto security update
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1409-1] mosquitto security update
- [debian-lts-announce] 20180629 [SECURITY] [DLA 1409-1] mosquitto security update
- https://mosquitto.org/blog/2018/02/security-advisory-cve-2017-7651-cve-2017-7652/
- https://mosquitto.org/blog/2018/02/security-advisory-cve-2017-7651-cve-2017-7652/
- DSA-4325
- DSA-4325
Modified: 2024-11-21
CVE-2017-7653
The Eclipse Mosquitto broker up to version 1.4.15 does not reject strings that are not valid UTF-8. A malicious client could cause other clients that do reject invalid UTF-8 strings to disconnect themselves from the broker by sending a topic string which is not valid UTF-8, and so cause a denial of service for the clients.
- http://docs.oasis-open.org/mqtt/disallowed-chars/v1.0/disallowed-chars-v1.0.pdf
- http://docs.oasis-open.org/mqtt/disallowed-chars/v1.0/disallowed-chars-v1.0.pdf
- https://bugs.eclipse.org/bugs/show_bug.cgi?id=532113
- https://bugs.eclipse.org/bugs/show_bug.cgi?id=532113
- [debian-lts-announce] 20180928 [SECURITY] [DLA 1525-1] mosquitto security update
- [debian-lts-announce] 20180928 [SECURITY] [DLA 1525-1] mosquitto security update
- USN-4023-1
- USN-4023-1
- DSA-4325
- DSA-4325
Modified: 2024-11-21
CVE-2017-7654
In Eclipse Mosquitto 1.4.15 and earlier, a Memory Leak vulnerability was found within the Mosquitto Broker. Unauthenticated clients can send crafted CONNECT packets which could cause a denial of service in the Mosquitto Broker.
- https://bugs.eclipse.org/bugs/show_bug.cgi?id=533493
- https://bugs.eclipse.org/bugs/show_bug.cgi?id=533493
- [debian-lts-announce] 20180928 [SECURITY] [DLA 1525-1] mosquitto security update
- [debian-lts-announce] 20180928 [SECURITY] [DLA 1525-1] mosquitto security update
- USN-4023-1
- USN-4023-1
- DSA-4325
- DSA-4325
Modified: 2024-11-21
CVE-2017-7655
In Eclipse Mosquitto version from 1.0 to 1.4.15, a Null Dereference vulnerability was found in the Mosquitto library which could lead to crashes for those applications using the library.
- https://bugs.eclipse.org/bugs/show_bug.cgi?id=533775
- https://bugs.eclipse.org/bugs/show_bug.cgi?id=533775
- [debian-lts-announce] 20191026 [SECURITY] [DLA 1972-1] mosquitto security update
- [debian-lts-announce] 20191026 [SECURITY] [DLA 1972-1] mosquitto security update
- [debian-lts-announce] 20211027 [SECURITY] [DLA 2793-1] mosquitto security update
- [debian-lts-announce] 20211027 [SECURITY] [DLA 2793-1] mosquitto security update