ALT-BU-2019-3575-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2019-01403
Уязвимость пакета антивирусных программ ClamAV, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-1785
A vulnerability in the RAR file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and 0.101.0 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper error-handling mechanisms when processing nested RAR files sent to an affected device. An attacker could exploit this vulnerability by sending a crafted RAR file to an affected device. An exploit could allow the attacker to view or create arbitrary files on the targeted system.
Modified: 2024-11-21
CVE-2019-1786
A vulnerability in the Portable Document Format (PDF) scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and 0.101.0 could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of proper data handling mechanisms within the device buffer while indexing remaining file data on an affected device. An attacker could exploit this vulnerability by sending crafted PDF files to an affected device. A successful exploit could allow the attacker to cause an out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.
Modified: 2024-11-21
CVE-2019-1787
A vulnerability in the Portable Document Format (PDF) scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service (DoS) condition on an affected device. The vulnerability is due to a lack of proper data handling mechanisms within the device buffer while indexing remaining file data on an affected device. An attacker could exploit this vulnerability by sending crafted PDF files to an affected device. A successful exploit could allow the attacker to cause a heap buffer out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.
- openSUSE-SU-2019:1210
- openSUSE-SU-2019:1210
- openSUSE-SU-2019:1208
- openSUSE-SU-2019:1208
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12181
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12181
- [debian-lts-announce] 20190422 [SECURITY] [DLA 1759-1] clamav security update
- [debian-lts-announce] 20190422 [SECURITY] [DLA 1759-1] clamav security update
- GLSA-201904-12
- GLSA-201904-12
Modified: 2024-11-21
CVE-2019-1788
A vulnerability in the Object Linking & Embedding (OLE2) file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper input and validation checking mechanisms for OLE2 files sent an affected device. An attacker could exploit this vulnerability by sending malformed OLE2 files to the device running an affected version ClamAV Software. An exploit could allow the attacker to cause an out-of-bounds write condition, resulting in a crash that could result in a denial of service condition on an affected device.
- openSUSE-SU-2019:1210
- openSUSE-SU-2019:1210
- openSUSE-SU-2019:1208
- openSUSE-SU-2019:1208
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12166
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=12166
- [debian-lts-announce] 20190422 [SECURITY] [DLA 1759-1] clamav security update
- [debian-lts-announce] 20190422 [SECURITY] [DLA 1759-1] clamav security update
- GLSA-201904-12
- GLSA-201904-12
Modified: 2024-11-21
CVE-2019-1789
ClamAV versions prior to 0.101.2 are susceptible to a denial of service (DoS) vulnerability. An out-of-bounds heap read condition may occur when scanning PE files. An example is Windows EXE and DLL files that have been packed using Aspack as a result of inadequate bound-checking.
Modified: 2024-11-21
CVE-2019-1798
A vulnerability in the Portable Executable (PE) file scanning functionality of Clam AntiVirus (ClamAV) Software versions 0.101.1 and prior could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a lack of proper input and validation checking mechanisms for PE files sent an affected device. An attacker could exploit this vulnerability by sending malformed PE files to the device running an affected version ClamAV Software. An exploit could allow the attacker to cause an out-of-bounds read condition, resulting in a crash that could result in a denial of service condition on an affected device.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-9741
An issue was discovered in net/http in Go 1.11.5. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the second argument to http.NewRequest with \r\n followed by an HTTP header or a Redis command.
- 107432
- RHSA-2019:1300
- RHSA-2019:1519
- https://github.com/golang/go/issues/30794
- [debian-lts-announce] 20190403 [SECURITY] [DLA 1749-1] golang security update
- [debian-lts-announce] 20210313 [SECURITY] [DLA 2591-1] golang-1.7 security update
- [debian-lts-announce] 20210313 [SECURITY] [DLA 2592-1] golang-1.8 security update
- FEDORA-2019-d05bc7e3df
- 107432
- FEDORA-2019-d05bc7e3df
- [debian-lts-announce] 20210313 [SECURITY] [DLA 2592-1] golang-1.8 security update
- [debian-lts-announce] 20210313 [SECURITY] [DLA 2591-1] golang-1.7 security update
- [debian-lts-announce] 20190403 [SECURITY] [DLA 1749-1] golang security update
- https://github.com/golang/go/issues/30794
- RHSA-2019:1519
- RHSA-2019:1300
Package kubernetes updated to version 1.14.0-alt1 for branch sisyphus in task 225788.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-1002102
Improper validation of URL redirection in the Kubernetes API server in versions prior to v1.14.0 allows an attacker-controlled Kubelet to redirect API server requests from streaming endpoints to arbitrary hosts. Impacted API servers will follow the redirect as a GET request with client-certificate credentials for authenticating to the Kubelet.
Modified: 2024-11-21
CVE-2019-9946
Cloud Native Computing Foundation (CNCF) CNI (Container Networking Interface) 0.7.4 has a network firewall misconfiguration which affects Kubernetes. The CNI 'portmap' plugin, used to setup HostPorts for CNI, inserts rules at the front of the iptables nat chains; which take precedence over the KUBE- SERVICES chain. Because of this, the HostPort/portmap rule could match incoming traffic even if there were better fitting, more specific service definition rules like NodePorts later in the chain. The issue is fixed in CNI 0.7.5 and Kubernetes 1.11.9, 1.12.7, 1.13.5, and 1.14.0.
- RHBA-2019:0862
- https://github.com/containernetworking/plugins/pull/269#issuecomment-477683272
- FEDORA-2019-d2b57d3b19
- FEDORA-2019-24217abfdf
- https://security.netapp.com/advisory/ntap-20190416-0002/
- RHBA-2019:0862
- https://security.netapp.com/advisory/ntap-20190416-0002/
- FEDORA-2019-24217abfdf
- FEDORA-2019-d2b57d3b19
- https://github.com/containernetworking/plugins/pull/269#issuecomment-477683272
Closed vulnerabilities
Modified: 2024-11-21
CVE-2013-2179
X.Org xdm 1.1.10, 1.1.11, and possibly other versions, when performing authentication using certain implementations of the crypt API function that can return NULL, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) by attempting to log into an account whose password field contains invalid characters, as demonstrated using the crypt function from glibc 2.17 and later with (1) the "!" character in the salt portion of a password field or (2) a password that has been encrypted using DES or MD5 in FIPS-140 mode.
- http://cgit.freedesktop.org/xorg/app/xdm/commit/?id=8d1eb5c74413e4c9a21f689fc106949b121c0117
- http://cgit.freedesktop.org/xorg/app/xdm/commit/?id=8d1eb5c74413e4c9a21f689fc106949b121c0117
- openSUSE-SU-2013:1117
- openSUSE-SU-2013:1117
- [oss-security] 20130613 Re: CVE request for possible NULL ptr deref in XDM when using crypt() from glibc 2.17+
- [oss-security] 20130613 Re: CVE request for possible NULL ptr deref in XDM when using crypt() from glibc 2.17+
- https://bugs.mageia.org/show_bug.cgi?id=10682
- https://bugs.mageia.org/show_bug.cgi?id=10682
Closed vulnerabilities
BDU:2020-00252
Уязвимость криптографической библиотеки GnuTLS, связанная с доступом к неинициализированному указателю, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-05201
Уязвимость криптографической библиотеки GnuTLS, связанная с повторным освобождением памяти, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-3829
A vulnerability was found in gnutls versions from 3.5.8 before 3.6.7. A memory corruption (double free) vulnerability in the certificate verification API. Any client or server application that verifies X.509 certificates with GnuTLS 3.5.8 or later is affected.
- openSUSE-SU-2019:1353
- openSUSE-SU-2019:1353
- RHSA-2019:3600
- RHSA-2019:3600
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3829
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3829
- https://gitlab.com/gnutls/gnutls/issues/694
- https://gitlab.com/gnutls/gnutls/issues/694
- FEDORA-2019-46df367eed
- FEDORA-2019-46df367eed
- FEDORA-2019-e8c1cf958f
- FEDORA-2019-e8c1cf958f
- FEDORA-2019-971ded6f90
- FEDORA-2019-971ded6f90
- GLSA-201904-14
- GLSA-201904-14
- https://security.netapp.com/advisory/ntap-20190619-0004/
- https://security.netapp.com/advisory/ntap-20190619-0004/
- USN-3999-1
- USN-3999-1
- https://www.gnutls.org/security-new.html#GNUTLS-SA-2019-03-27
- https://www.gnutls.org/security-new.html#GNUTLS-SA-2019-03-27
Modified: 2024-11-21
CVE-2019-3836
It was discovered in gnutls before version 3.6.7 upstream that there is an uninitialized pointer access in gnutls versions 3.6.3 or later which can be triggered by certain post-handshake messages.
- openSUSE-SU-2019:1353
- openSUSE-SU-2019:1353
- RHSA-2019:3600
- RHSA-2019:3600
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3836
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3836
- https://gitlab.com/gnutls/gnutls/issues/704
- https://gitlab.com/gnutls/gnutls/issues/704
- FEDORA-2019-46df367eed
- FEDORA-2019-46df367eed
- GLSA-201904-14
- GLSA-201904-14
- https://security.netapp.com/advisory/ntap-20190502-0005/
- https://security.netapp.com/advisory/ntap-20190502-0005/
- USN-3999-1
- USN-3999-1