ALT-BU-2019-3631-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2020-01402
Уязвимость функции managed-keys сервера DNS BIND, связанная с неограниченным распределением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-5743
By design, BIND is intended to limit the number of TCP clients that can be connected at any given time. The number of allowed connections is a tunable parameter which, if unset, defaults to a conservative value for most servers. Unfortunately, the code which was intended to limit the number of simultaneous connections contained an error which could be exploited to grow the number of simultaneous connections beyond this limit. Versions affected: BIND 9.9.0 -> 9.10.8-P1, 9.11.0 -> 9.11.6, 9.12.0 -> 9.12.4, 9.14.0. BIND 9 Supported Preview Edition versions 9.9.3-S1 -> 9.11.5-S3, and 9.11.5-S5. Versions 9.13.0 -> 9.13.7 of the 9.13 development branch are also affected. Versions prior to BIND 9.9.0 have not been evaluated for vulnerability to CVE-2018-5743.
- https://kb.isc.org/docs/cve-2018-5743
- https://kb.isc.org/docs/cve-2018-5743
- https://support.f5.com/csp/article/K74009656?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K74009656?utm_source=f5support&%3Butm_medium=RSS
- https://www.synology.com/security/advisory/Synology_SA_19_20
- https://www.synology.com/security/advisory/Synology_SA_19_20
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-14733
The Odoo Community Association (OCA) dbfilter_from_header module makes Odoo 8.x, 9.x, 10.x, and 11.x vulnerable to ReDoS (regular expression denial of service) under certain circumstances.
- https://github.com/OCA/server-tools/issues/1335
- https://github.com/OCA/server-tools/tree/10.0/dbfilter_from_header
- https://github.com/OCA/server-tools/tree/11.0/dbfilter_from_header
- https://github.com/OCA/server-tools/tree/8.0/dbfilter_from_header
- https://github.com/OCA/server-tools/tree/9.0/dbfilter_from_header
- https://github.com/OCA/server-tools/issues/1335
- https://github.com/OCA/server-tools/tree/9.0/dbfilter_from_header
- https://github.com/OCA/server-tools/tree/8.0/dbfilter_from_header
- https://github.com/OCA/server-tools/tree/11.0/dbfilter_from_header
- https://github.com/OCA/server-tools/tree/10.0/dbfilter_from_header
Modified: 2024-11-21
CVE-2018-14859
Incorrect access control in the password reset component in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated users to reset the password of other users by being the first party to use the secure token.
Modified: 2024-11-21
CVE-2018-14860
Improper sanitization of dynamic user expressions in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated privileged users to escape from the dynamic expression sandbox and execute arbitrary code on the hosting system.
Modified: 2024-11-21
CVE-2018-14861
Improper data access control in Odoo Community 10.0 and 11.0 and Odoo Enterprise 10.0 and 11.0 allows authenticated users to perform a CSV export of the secure hashed passwords of other users.
Modified: 2024-11-21
CVE-2018-14862
Incorrect access control in the mail templating system in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated internal users to delete arbitrary menuitems via a crafted RPC request.
Modified: 2024-11-21
CVE-2018-14863
Incorrect access control in the RPC framework in Odoo Community 8.0 through 11.0 and Odoo Enterprise 9.0 through 11.0 allows authenticated users to call private functions via RPC.
Modified: 2024-11-21
CVE-2018-14865
Report engine in Odoo Community 9.0 through 11.0 and earlier and Odoo Enterprise 9.0 through 11.0 and earlier does not use secure options when passing documents to wkhtmltopdf, which allows remote attackers to read local files.
Modified: 2024-11-21
CVE-2018-14866
Incorrect access control in the TransientModel framework in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows authenticated attackers to access data in transient records that they do not own by making an RPC call before garbage collection occurs.
Modified: 2024-11-21
CVE-2018-14885
Incorrect access control in the database manager component in Odoo Community 10.0 and 11.0 and Odoo Enterprise 10.0 and 11.0 allows a remote attacker to restore a database dump without knowing the super-admin password. An arbitrary password succeeds.
Modified: 2024-11-21
CVE-2018-14886
The module-description renderer in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier does not disable RST's local file inclusion, which allows privileged authenticated users to read local files via a crafted module description.
Modified: 2024-11-21
CVE-2018-14887
Improper Host header sanitization in the dbfilter routing component in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier allows a remote attacker to deny access to the service and to disclose database names via a crafted request.
Modified: 2024-11-21
CVE-2018-15632
Improper input validation in database creation logic in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier, allows remote attackers to initialize an empty database on which they can connect with default credentials.
Modified: 2024-11-21
CVE-2018-15633
Cross-site scripting (XSS) issue in "document" module in Odoo Community 11.0 and earlier and Odoo Enterprise 11.0 and earlier, allows remote attackers to inject arbitrary web script in the browser of a victim via crafted attachment filenames.
Closed bugs
Сломана сборка odoo
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-11576
Gitea before 1.8.0 allows 1FA for user accounts that have completed 2FA enrollment. If a user's credentials are known, then an attacker could send them to the API without requiring the 2FA one-time password.
Closed bugs
Обновить audacity
Package python-module-sphinx updated to version 1.6.5-alt4 for branch sisyphus in task 228232.
Closed bugs
Сломалась сборка python-module-sphinx