ALT-BU-2019-3895-1
Branch p9 update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-13207
nsd-checkzone in NLnet Labs NSD 4.2.0 has a Stack-based Buffer Overflow in the dname_concatenate() function in dname.c.
Package udev-rule-generator updated to version 1.1-alt1 for branch p9 in task 236424.
Closed bugs
Сделать возможность выбора базового названия для имени интерфайса
Closed bugs
При включенном EFI Secure Boot система не загружается автоматом по таймауту
Package gear-uupdate updated to version 0.28.0-alt1 for branch p9 in task 236366.
Closed bugs
Вызывать gear-update --ignore-exclude по умолчанию
Closed vulnerabilities
BDU:2019-01562
Уязвимость почтового сервера Dovecot, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю повысить свои привилегии
BDU:2019-02459
Уязвимость JSON-кодировщика почтового сервера Dovecot, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-03702
Уязвимость реализации протокола Internet Message Access Protocol (IMAP) почтового сервера Dovecot, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-03704
Уязвимость реализации протокола Internet Message Access Protocol (IMAP) почтового сервера Dovecot, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-10691
The JSON encoder in Dovecot before 2.3.5.2 allows attackers to repeatedly crash the authentication service by attempting to authenticate with an invalid UTF-8 sequence as the username.
- openSUSE-SU-2019:1312
- openSUSE-SU-2019:1312
- [oss-security] 20190418 CVE-2019-10691: JSON encoder in Dovecot 2.3 incorrecty assert-crashes when encountering invalid UTF-8 characters.
- [oss-security] 20190418 CVE-2019-10691: JSON encoder in Dovecot 2.3 incorrecty assert-crashes when encountering invalid UTF-8 characters.
- [dovecot-news] 20190418 CVE-2019-10691: JSON encoder in Dovecot 2.3 incorrecty assert-crashes when encountering invalid UTF-8 characters.
- [dovecot-news] 20190418 CVE-2019-10691: JSON encoder in Dovecot 2.3 incorrecty assert-crashes when encountering invalid UTF-8 characters.
- FEDORA-2019-1b61a528dd
- FEDORA-2019-1b61a528dd
- GLSA-201908-29
- GLSA-201908-29
Modified: 2024-11-21
CVE-2019-11494
In the IMAP Server in Dovecot 2.3.3 through 2.3.5.2, the submission-login service crashes when the client disconnects prematurely during the AUTH command.
- openSUSE-SU-2019:2278
- openSUSE-SU-2019:2278
- openSUSE-SU-2019:2281
- openSUSE-SU-2019:2281
- FEDORA-2019-9e004decea
- FEDORA-2019-9e004decea
- FEDORA-2019-1b61a528dd
- FEDORA-2019-1b61a528dd
- https://www.dovecot.org/download.html
- https://www.dovecot.org/download.html
- https://www.dovecot.org/security.html
- https://www.dovecot.org/security.html
Modified: 2024-11-21
CVE-2019-11499
In the IMAP Server in Dovecot 2.3.3 through 2.3.5.2, the submission-login component crashes if AUTH PLAIN is attempted over a TLS secured channel with an unacceptable authentication message.
- openSUSE-SU-2019:2278
- openSUSE-SU-2019:2278
- openSUSE-SU-2019:2281
- openSUSE-SU-2019:2281
- FEDORA-2019-9e004decea
- FEDORA-2019-9e004decea
- FEDORA-2019-1b61a528dd
- FEDORA-2019-1b61a528dd
- https://www.dovecot.org/download.html
- https://www.dovecot.org/download.html
- https://www.dovecot.org/security.html
- https://www.dovecot.org/security.html
Modified: 2024-11-21
CVE-2019-7524
In Dovecot before 2.2.36.3 and 2.3.x before 2.3.5.1, a local attacker can cause a buffer overflow in the indexer-worker process, which can be used to elevate to root. This occurs because of missing checks in the fts and pop3-uidl components.
- openSUSE-SU-2019:1212
- openSUSE-SU-2019:1220
- [oss-security] 20190328 CVE-2019-7524: Buffer overflow when reading extension header from dovecot index files
- 107672
- https://dovecot.org/list/dovecot-news/2019-March/000403.html
- https://dovecot.org/security.html
- [debian-lts-announce] 20190329 [SECURITY] [DLA 1736-1] dovecot security update
- FEDORA-2019-9e004decea
- FEDORA-2019-1b61a528dd
- 20190328 [SECURITY] [DSA 4418-1] dovecot security update
- GLSA-201904-19
- USN-3928-1
- DSA-4418
- openSUSE-SU-2019:1212
- DSA-4418
- USN-3928-1
- GLSA-201904-19
- 20190328 [SECURITY] [DSA 4418-1] dovecot security update
- FEDORA-2019-1b61a528dd
- FEDORA-2019-9e004decea
- [debian-lts-announce] 20190329 [SECURITY] [DLA 1736-1] dovecot security update
- https://dovecot.org/security.html
- https://dovecot.org/list/dovecot-news/2019-March/000403.html
- 107672
- [oss-security] 20190328 CVE-2019-7524: Buffer overflow when reading extension header from dovecot index files
- openSUSE-SU-2019:1220
Closed bugs
Обновить dovecot
Последняя версия: 2.3.7.1
Closed vulnerabilities
BDU:2020-00700
Уязвимость функций interface_release_resource (hw/display/qxl.c) эмулятора аппаратного обеспечения QEMU, связанная с разыменованием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-05168
Уязвимость функции qemu-bridge-helper.c эмулятора аппаратного обеспечения QEMU, связанная с недостатках элементов безопасности, позволяющая нарушителю получить несанкционированный доступ к информации, вызвать отказ в обслуживании или оказать воздействие на доступность информации
Modified: 2024-11-21
CVE-2019-12155
interface_release_resource in hw/display/qxl.c in QEMU 3.1.x through 4.0.0 has a NULL pointer dereference.
- openSUSE-SU-2019:2041
- openSUSE-SU-2019:2041
- openSUSE-SU-2019:2059
- openSUSE-SU-2019:2059
- http://www.openwall.com/lists/oss-security/2019/05/22/1
- http://www.openwall.com/lists/oss-security/2019/05/22/1
- RHBA-2019:3723
- RHBA-2019:3723
- RHSA-2019:2607
- RHSA-2019:2607
- RHSA-2019:2892
- RHSA-2019:2892
- RHSA-2019:3179
- RHSA-2019:3179
- RHSA-2019:3345
- RHSA-2019:3345
- RHSA-2019:3742
- RHSA-2019:3742
- RHSA-2019:3787
- RHSA-2019:3787
- RHSA-2019:4344
- RHSA-2019:4344
- https://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=3be7eb2f47bf71db5f80fcf8750ea395dd5ffdd2
- https://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=3be7eb2f47bf71db5f80fcf8750ea395dd5ffdd2
- [debian-lts-announce] 20190920 [SECURITY] [DLA 1927-1] qemu security update
- [debian-lts-announce] 20190920 [SECURITY] [DLA 1927-1] qemu security update
- FEDORA-2019-e9de40d53f
- FEDORA-2019-e9de40d53f
- FEDORA-2019-52a8f5468e
- FEDORA-2019-52a8f5468e
- https://lists.gnu.org/archive/html/qemu-devel/2019-05/msg01321.html
- https://lists.gnu.org/archive/html/qemu-devel/2019-05/msg01321.html
- 20190531 [SECURITY] [DSA 4454-1] qemu security update
- 20190531 [SECURITY] [DSA 4454-1] qemu security update
- USN-4191-1
- USN-4191-1
- USN-4191-2
- USN-4191-2
- DSA-4454
- DSA-4454
Modified: 2024-11-21
CVE-2019-12928
The QMP migrate command in QEMU version 4.0.0 and earlier is vulnerable to OS command injection, which allows the remote attacker to achieve code execution, denial of service, or information disclosure by sending a crafted QMP command to the listening server. Note: This has been disputed as a non-issue since QEMU's -qmp interface is meant to be used by trusted users. If one is able to access this interface via a tcp socket open to the internet, then it is an insecure configuration issue
Modified: 2024-11-21
CVE-2019-12929
The QMP guest_exec command in QEMU 4.0.0 and earlier is prone to OS command injection, which allows the attacker to achieve code execution, denial of service, or information disclosure by sending a crafted QMP command to the listening server. Note: This has been disputed as a non-issue since QEMU's -qmp interface is meant to be used by trusted users. If one is able to access this interface via a tcp socket open to the internet, then it is an insecure configuration issue
Modified: 2024-11-21
CVE-2019-13164
qemu-bridge-helper.c in QEMU 3.1 and 4.0.0 does not ensure that a network interface name (obtained from bridge.conf or a --br=bridge option) is limited to the IFNAMSIZ size, which can lead to an ACL bypass.
- openSUSE-SU-2019:2041
- openSUSE-SU-2019:2041
- openSUSE-SU-2019:2059
- openSUSE-SU-2019:2059
- http://www.openwall.com/lists/oss-security/2019/07/02/2
- http://www.openwall.com/lists/oss-security/2019/07/02/2
- [oss-security] 20190703 CVE-2019-13164 Qemu: qemu-bridge-helper ACL bypassed with long interface names
- [oss-security] 20190703 CVE-2019-13164 Qemu: qemu-bridge-helper ACL bypassed with long interface names
- 109054
- 109054
- https://github.com/qemu/qemu/commit/03d7712b4bcd47bfe0fe14ba2fffa87e111fa086
- https://github.com/qemu/qemu/commit/03d7712b4bcd47bfe0fe14ba2fffa87e111fa086
- [debian-lts-announce] 20190920 [SECURITY] [DLA 1927-1] qemu security update
- [debian-lts-announce] 20190920 [SECURITY] [DLA 1927-1] qemu security update
- https://lists.gnu.org/archive/html/qemu-devel/2019-07/msg00145.html
- https://lists.gnu.org/archive/html/qemu-devel/2019-07/msg00145.html
- 20190825 [SECURITY] [DSA 4506-1] qemu security update
- 20190825 [SECURITY] [DSA 4506-1] qemu security update
- 20190902 [SECURITY] [DSA 4512-1] qemu security update
- 20190902 [SECURITY] [DSA 4512-1] qemu security update
- GLSA-202003-66
- GLSA-202003-66
- USN-4191-1
- USN-4191-1
- USN-4191-2
- USN-4191-2
- DSA-4506
- DSA-4506
- DSA-4512
- DSA-4512
Modified: 2024-11-21
CVE-2019-15034
hw/display/bochs-display.c in QEMU 4.0.0 does not ensure a sufficient PCI config space allocation, leading to a buffer overflow involving the PCIe extended config space.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-13313
libosinfo 1.5.0 allows local users to discover credentials by listing a process, because credentials are passed to osinfo-install-script via the command line.
- [oss-security] 20190708 CVE-2019-13313, CVE-2019-13314: password disclosure via command line arguments
- [oss-security] 20190708 CVE-2019-13313, CVE-2019-13314: password disclosure via command line arguments
- RHSA-2019:3387
- RHSA-2019:3387
- https://gitlab.com/libosinfo/libosinfo/-/tags
- https://gitlab.com/libosinfo/libosinfo/-/tags
- https://gitlab.com/libosinfo/libosinfo/blob/master/NEWS
- https://gitlab.com/libosinfo/libosinfo/blob/master/NEWS
- https://libosinfo.org/download/
- https://libosinfo.org/download/
- FEDORA-2019-4b8990e4d6
- FEDORA-2019-4b8990e4d6
- FEDORA-2019-c9fbe3db9c
- FEDORA-2019-c9fbe3db9c
- FEDORA-2019-e23aeac13e
- FEDORA-2019-e23aeac13e
- FEDORA-2019-d2cde4761e
- FEDORA-2019-d2cde4761e
- https://www.redhat.com/archives/libosinfo/2019-July/msg00026.html
- https://www.redhat.com/archives/libosinfo/2019-July/msg00026.html