ALT-BU-2019-3556-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2020-00799
Уязвимость функций g_file_make_directory_with_parents, g_file_replace_contents библиотеки Glib, позволяющая нарушителю повысить свои привилегии и получить доступ к файлам
Modified: 2024-11-21
CVE-2019-13012
The keyfile settings backend in GNOME GLib (aka glib2.0) before 2.60.0 creates directories using g_file_make_directory_with_parents (kfsb->dir, NULL, NULL) and files using g_file_replace_contents (kfsb->file, contents, length, NULL, FALSE, G_FILE_CREATE_REPLACE_DESTINATION, NULL, NULL, NULL). Consequently, it does not properly restrict directory (and file) permissions. Instead, for directories, 0777 permissions are used; for files, default file permissions are used. This is similar to CVE-2019-12450.
- openSUSE-SU-2019:1749
- openSUSE-SU-2019:1749
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931234#12
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=931234#12
- https://gitlab.gnome.org/GNOME/glib/commit/5e4da714f00f6bfb2ccd6d73d61329c6f3a08429
- https://gitlab.gnome.org/GNOME/glib/commit/5e4da714f00f6bfb2ccd6d73d61329c6f3a08429
- https://gitlab.gnome.org/GNOME/glib/issues/1658
- https://gitlab.gnome.org/GNOME/glib/issues/1658
- https://gitlab.gnome.org/GNOME/glib/merge_requests/450
- https://gitlab.gnome.org/GNOME/glib/merge_requests/450
- [bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [debian-lts-announce] 20190731 [SECURITY] [DLA 1866-1] glib2.0 security update
- [debian-lts-announce] 20190731 [SECURITY] [DLA 1866-1] glib2.0 security update
- [debian-lts-announce] 20190805 [SECURITY] [DLA 1866-2] glib2.0 regression update
- [debian-lts-announce] 20190805 [SECURITY] [DLA 1866-2] glib2.0 regression update
- https://security.netapp.com/advisory/ntap-20190806-0003/
- https://security.netapp.com/advisory/ntap-20190806-0003/
- USN-4049-1
- USN-4049-1
- USN-4049-2
- USN-4049-2
Package libwebkitgtk4 updated to version 2.24.0-alt1 for branch sisyphus in task 225059.
Closed vulnerabilities
BDU:2019-02463
Уязвимость подсистемы UIProcess модулей отображения веб-страниц WebKitGTK+, WebKitGTK, позволяющая нарушителю вызвать отказ в обслуживании или оказать воздействие на конфиденциальность и целостность защищаемой информации
Modified: 2024-11-21
CVE-2019-8375
The UIProcess subsystem in WebKit, as used in WebKitGTK through 2.23.90 and WebKitGTK+ through 2.22.6 and other products, does not prevent the script dialog size from exceeding the web view size, which allows remote attackers to cause a denial of service (Buffer Overflow) or possibly have unspecified other impact, related to UIProcess/API/gtk/WebKitScriptDialogGtk.cpp, UIProcess/API/gtk/WebKitScriptDialogImpl.cpp, and UIProcess/API/gtk/WebKitWebViewGtk.cpp, as demonstrated by GNOME Web (aka Epiphany).
- openSUSE-SU-2019:1206
- openSUSE-SU-2019:1316
- https://bugs.webkit.org/show_bug.cgi?id=184875
- https://github.com/WebKit/webkit/commit/6f9b511a115311b13c06eb58038ddc2c78da5531
- https://trac.webkit.org/changeset/241515/webkit
- USN-3948-1
- 46465
- https://www.inputzero.io/2019/02/fuzzing-webkit.html
- openSUSE-SU-2019:1206
- https://www.inputzero.io/2019/02/fuzzing-webkit.html
- 46465
- USN-3948-1
- https://trac.webkit.org/changeset/241515/webkit
- https://github.com/WebKit/webkit/commit/6f9b511a115311b13c06eb58038ddc2c78da5531
- https://bugs.webkit.org/show_bug.cgi?id=184875
- openSUSE-SU-2019:1316
Closed vulnerabilities
BDU:2020-03304
Уязвимость подсистемы GVFS среды рабочего стола GNOME, связанная с недостатками разграничения доступа, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Modified: 2024-11-21
CVE-2019-3827
An incorrect permission check in the admin backend in gvfs before version 1.39.4 was found that allows reading and modify arbitrary files by privileged users without asking for password when no authentication agent is running. This vulnerability can be exploited by malicious programs running under privileges of users belonging to the wheel group to further escalate its privileges by modifying system files without user's knowledge. Successful exploitation requires uncommon system configuration.
Package gnome-shell updated to version 3.32.0-alt1 for branch sisyphus in task 225059.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-3820
It was discovered that the gnome-shell lock screen since version 3.15.91 did not properly restrict all contextual actions. An attacker with physical access to a locked workstation could invoke certain keyboard shortcuts, and potentially other actions.
- openSUSE-SU-2019:1529
- openSUSE-SU-2019:1529
- openSUSE-SU-2019:1582
- openSUSE-SU-2019:1582
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3820
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3820
- https://gitlab.gnome.org/GNOME/gnome-shell/issues/851
- https://gitlab.gnome.org/GNOME/gnome-shell/issues/851
- USN-3966-1
- USN-3966-1
Closed vulnerabilities
BDU:2020-02203
Уязвимость графического интерфейса Gnome Display Manager операционной системы Fedora, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Modified: 2024-11-21
CVE-2019-3825
A vulnerability was discovered in gdm before 3.31.4. When timed login is enabled in configuration, an attacker could bypass the lock screen by selecting the timed login user and waiting for the timer to expire, at which time they would gain access to the logged-in user's session.
Package gnome-keyring updated to version 3.31.91-alt1 for branch sisyphus in task 225059.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-19358
GNOME Keyring through 3.28.2 allows local users to retrieve login credentials via a Secret Service API call and the D-Bus interface if the keyring is unlocked, a similar issue to CVE-2008-7320. One perspective is that this occurs because available D-Bus protection mechanisms (involving the busconfig and policy XML elements) are not used. NOTE: the vendor disputes this because, according to the security model, untrusted applications must not be allowed to access the user's session bus socket.
- https://bugs.launchpad.net/ubuntu/+source/gnome-keyring/+bug/1780365
- https://bugs.launchpad.net/ubuntu/+source/gnome-keyring/+bug/1780365
- https://bugzilla.redhat.com/show_bug.cgi?id=1652194#c8
- https://bugzilla.redhat.com/show_bug.cgi?id=1652194#c8
- https://github.com/sungjungk/keyring_crack
- https://github.com/sungjungk/keyring_crack
- https://gitlab.gnome.org/GNOME/gnome-keyring/-/issues/5#note_1876550
- https://gitlab.gnome.org/GNOME/gnome-keyring/-/issues/5#note_1876550
- https://www.youtube.com/watch?v=Do4E9ZQaPck
- https://www.youtube.com/watch?v=Do4E9ZQaPck
Closed vulnerabilities
BDU:2020-01582
Уязвимость модулей отображения веб-страниц WebKitGTK и WPE WebKit, связанная с недостаточной проверкой входных данных, позволяющая нарушителю проводить спуфинг-атаки
Modified: 2024-11-21
CVE-2019-6251
WebKitGTK and WPE WebKit prior to version 2.24.1 are vulnerable to address bar spoofing upon certain JavaScript redirections. An attacker could cause malicious web content to be displayed as if for a trusted URI. This is similar to the CVE-2018-8383 issue in Microsoft Edge.
- openSUSE-SU-2019:1374
- openSUSE-SU-2019:1391
- http://packetstormsecurity.com/files/152485/WebKitGTK-WPE-WebKit-URI-Spoofing-Code-Execution.html
- [oss-security] 20190410 WebKitGTK and WPE WebKit Security Advisory WSA-2019-0002
- https://bugs.webkit.org/show_bug.cgi?id=194208
- https://gitlab.gnome.org/GNOME/epiphany/issues/532
- FEDORA-2019-74f7603660
- FEDORA-2019-432b3dff25
- FEDORA-2019-b3ad0a302b
- FEDORA-2019-77433fc7f3
- FEDORA-2019-d9a15be3ba
- 20190411 WebKitGTK and WPE WebKit Security Advisory WSA-2019-0002
- GLSA-201909-05
- https://trac.webkit.org/changeset/243434
- USN-3948-1
- openSUSE-SU-2019:1374
- USN-3948-1
- https://trac.webkit.org/changeset/243434
- GLSA-201909-05
- 20190411 WebKitGTK and WPE WebKit Security Advisory WSA-2019-0002
- FEDORA-2019-d9a15be3ba
- FEDORA-2019-77433fc7f3
- FEDORA-2019-b3ad0a302b
- FEDORA-2019-432b3dff25
- FEDORA-2019-74f7603660
- https://gitlab.gnome.org/GNOME/epiphany/issues/532
- https://bugs.webkit.org/show_bug.cgi?id=194208
- [oss-security] 20190410 WebKitGTK and WPE WebKit Security Advisory WSA-2019-0002
- http://packetstormsecurity.com/files/152485/WebKitGTK-WPE-WebKit-URI-Spoofing-Code-Execution.html
- openSUSE-SU-2019:1391
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-18718
An issue was discovered in gThumb through 3.6.2. There is a double-free vulnerability in the add_themes_from_dir method in dlg-contact-sheet.c because of two successive calls of g_free, each of which frees the same buffer.
Closed vulnerabilities
BDU:2019-01412
Уязвимость функции ldb_wildcard_compare компонента LDAP пакета программ сетевого взаимодействия Samba, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-3824
A flaw was found in the way an LDAP search expression could crash the shared LDAP server process of a samba AD DC in samba before version 4.10. An authenticated user, having read permissions on the LDAP server, could use this flaw to cause denial of service.
- openSUSE-SU-2019:1163
- openSUSE-SU-2019:1163
- 107347
- 107347
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3824
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3824
- https://bugzilla.samba.org/show_bug.cgi?id=13773
- https://bugzilla.samba.org/show_bug.cgi?id=13773
- [debian-lts-announce] 20190301 [SECURITY] [DLA 1699-1] ldb security update
- [debian-lts-announce] 20190301 [SECURITY] [DLA 1699-1] ldb security update
- https://security.netapp.com/advisory/ntap-20190226-0001/
- https://security.netapp.com/advisory/ntap-20190226-0001/
- USN-3895-1
- USN-3895-1
- DSA-4397
- DSA-4397
Closed vulnerabilities
BDU:2019-01412
Уязвимость функции ldb_wildcard_compare компонента LDAP пакета программ сетевого взаимодействия Samba, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-3824
A flaw was found in the way an LDAP search expression could crash the shared LDAP server process of a samba AD DC in samba before version 4.10. An authenticated user, having read permissions on the LDAP server, could use this flaw to cause denial of service.
- openSUSE-SU-2019:1163
- openSUSE-SU-2019:1163
- 107347
- 107347
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3824
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3824
- https://bugzilla.samba.org/show_bug.cgi?id=13773
- https://bugzilla.samba.org/show_bug.cgi?id=13773
- [debian-lts-announce] 20190301 [SECURITY] [DLA 1699-1] ldb security update
- [debian-lts-announce] 20190301 [SECURITY] [DLA 1699-1] ldb security update
- https://security.netapp.com/advisory/ntap-20190226-0001/
- https://security.netapp.com/advisory/ntap-20190226-0001/
- USN-3895-1
- USN-3895-1
- DSA-4397
- DSA-4397