ALT-BU-2019-3896-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2019-02995
Уязвимость реализации сетевого протокола HTTP/2 операционных систем Windows, веб-сервера Apache Traffic Server, веб-сервера H2O, сетевых программных средств netty, SwiftNIO, Envoy, программной платформы Node.js позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-02996
Уязвимость реализации сетевого протокола HTTP/2 операционных систем Windows, веб-сервера Apache Traffic Server, веб-сервера H2O, сетевых программных средств netty, SwiftNIO, Envoy, программной платформы Node.js позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-12452
types/types.go in Containous Traefik 1.7.x through 1.7.11, when the --api flag is used and the API is publicly reachable and exposed without sufficient access control (which is contrary to the API documentation), allows remote authenticated users to discover password hashes by reading the Basic HTTP Authentication or Digest HTTP Authentication section, or discover a key by reading the ClientTLS section. These can be found in the JSON response to a /api request.
Modified: 2024-11-21
CVE-2019-9512
Some HTTP/2 implementations are vulnerable to ping floods, potentially leading to a denial of service. The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both.
- https://www.synology.com/security/advisory/Synology_SA_19_33
- openSUSE-SU-2019:2000
- openSUSE-SU-2019:2056
- openSUSE-SU-2019:2072
- openSUSE-SU-2019:2085
- openSUSE-SU-2019:2115
- openSUSE-SU-2019:2114
- openSUSE-SU-2019:2130
- 20190816 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0
- [oss-security] 20190819 [ANNOUNCE] Security release of Kubernetes v1.15.3, v1.14.6, v1.13.10 - CVE-2019-9512 and CVE-2019-9514
- RHSA-2019:2594
- RHSA-2019:2661
- RHSA-2019:2682
- RHSA-2019:2690
- RHSA-2019:2726
- RHSA-2019:2766
- RHSA-2019:2769
- RHSA-2019:2796
- RHSA-2019:2861
- RHSA-2019:2925
- RHSA-2019:2939
- RHSA-2019:2955
- RHSA-2019:2966
- RHSA-2019:3131
- RHSA-2019:3245
- RHSA-2019:3265
- RHSA-2019:3892
- RHSA-2019:3906
- RHSA-2019:4018
- RHSA-2019:4019
- RHSA-2019:4020
- RHSA-2019:4021
- RHSA-2019:4040
- RHSA-2019:4041
- RHSA-2019:4042
- RHSA-2019:4045
- RHSA-2019:4269
- RHSA-2019:4273
- RHSA-2019:4352
- RHSA-2020:0406
- RHSA-2020:0727
- https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
- VU#605641
- https://kc.mcafee.com/corporate/index?page=content&id=SB10296
- [trafficserver-users] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks
- [trafficserver-announce] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks
- [trafficserver-dev] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks
- [debian-lts-announce] 20201208 [SECURITY] [DLA 2485-1] golang-golang-x-net-dev security update
- FEDORA-2019-65db7ad6c7
- FEDORA-2019-6a2980de56
- FEDORA-2019-5a6a7bc12c
- FEDORA-2019-55d101a740
- 20190814 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0
- 20190819 [SECURITY] [DSA 4503-1] golang-1.11 security update
- 20190825 [SECURITY] [DSA 4508-1] h2o security update
- 20190910 [SECURITY] [DSA 4520-1] trafficserver security update
- https://security.netapp.com/advisory/ntap-20190823-0001/
- https://security.netapp.com/advisory/ntap-20190823-0004/
- https://security.netapp.com/advisory/ntap-20190823-0005/
- https://support.f5.com/csp/article/K98053339
- https://support.f5.com/csp/article/K98053339?utm_source=f5support&%3Butm_medium=RSS
- USN-4308-1
- DSA-4503
- DSA-4508
- DSA-4520
- https://www.synology.com/security/advisory/Synology_SA_19_33
- DSA-4520
- DSA-4508
- DSA-4503
- USN-4308-1
- https://support.f5.com/csp/article/K98053339?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K98053339
- https://security.netapp.com/advisory/ntap-20190823-0005/
- https://security.netapp.com/advisory/ntap-20190823-0004/
- https://security.netapp.com/advisory/ntap-20190823-0001/
- 20190910 [SECURITY] [DSA 4520-1] trafficserver security update
- 20190825 [SECURITY] [DSA 4508-1] h2o security update
- 20190819 [SECURITY] [DSA 4503-1] golang-1.11 security update
- 20190814 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0
- FEDORA-2019-55d101a740
- FEDORA-2019-5a6a7bc12c
- FEDORA-2019-6a2980de56
- FEDORA-2019-65db7ad6c7
- [debian-lts-announce] 20201208 [SECURITY] [DLA 2485-1] golang-golang-x-net-dev security update
- [trafficserver-dev] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks
- [trafficserver-announce] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks
- [trafficserver-users] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks
- https://kc.mcafee.com/corporate/index?page=content&id=SB10296
- VU#605641
- https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
- RHSA-2020:0727
- RHSA-2020:0406
- RHSA-2019:4352
- RHSA-2019:4273
- RHSA-2019:4269
- RHSA-2019:4045
- RHSA-2019:4042
- RHSA-2019:4041
- RHSA-2019:4040
- RHSA-2019:4021
- RHSA-2019:4020
- RHSA-2019:4019
- RHSA-2019:4018
- RHSA-2019:3906
- RHSA-2019:3892
- RHSA-2019:3265
- RHSA-2019:3245
- RHSA-2019:3131
- RHSA-2019:2966
- RHSA-2019:2955
- RHSA-2019:2939
- RHSA-2019:2925
- RHSA-2019:2861
- RHSA-2019:2796
- RHSA-2019:2769
- RHSA-2019:2766
- RHSA-2019:2726
- RHSA-2019:2690
- RHSA-2019:2682
- RHSA-2019:2661
- RHSA-2019:2594
- [oss-security] 20190819 [ANNOUNCE] Security release of Kubernetes v1.15.3, v1.14.6, v1.13.10 - CVE-2019-9512 and CVE-2019-9514
- 20190816 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0
- openSUSE-SU-2019:2130
- openSUSE-SU-2019:2114
- openSUSE-SU-2019:2115
- openSUSE-SU-2019:2085
- openSUSE-SU-2019:2072
- openSUSE-SU-2019:2056
- openSUSE-SU-2019:2000
Modified: 2025-01-14
CVE-2019-9514
Some HTTP/2 implementations are vulnerable to a reset flood, potentially leading to a denial of service. The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both.
- openSUSE-SU-2019:2000
- openSUSE-SU-2019:2056
- openSUSE-SU-2019:2072
- openSUSE-SU-2019:2085
- openSUSE-SU-2019:2115
- openSUSE-SU-2019:2114
- openSUSE-SU-2019:2130
- 20190816 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0
- [oss-security] 20190819 [ANNOUNCE] Security release of Kubernetes v1.15.3, v1.14.6, v1.13.10 - CVE-2019-9512 and CVE-2019-9514
- [oss-security] 20231018 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations
- RHSA-2019:2594
- RHSA-2019:2661
- RHSA-2019:2682
- RHSA-2019:2690
- RHSA-2019:2726
- RHSA-2019:2766
- RHSA-2019:2769
- RHSA-2019:2796
- RHSA-2019:2861
- RHSA-2019:2925
- RHSA-2019:2939
- RHSA-2019:2955
- RHSA-2019:2966
- RHSA-2019:3131
- RHSA-2019:3245
- RHSA-2019:3265
- RHSA-2019:3892
- RHSA-2019:3906
- RHSA-2019:4018
- RHSA-2019:4019
- RHSA-2019:4020
- RHSA-2019:4021
- RHSA-2019:4040
- RHSA-2019:4041
- RHSA-2019:4042
- RHSA-2019:4045
- RHSA-2019:4269
- RHSA-2019:4273
- RHSA-2019:4352
- RHSA-2020:0406
- RHSA-2020:0727
- https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
- VU#605641
- https://kc.mcafee.com/corporate/index?page=content&id=SB10296
- [trafficserver-users] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks
- [trafficserver-announce] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks
- [trafficserver-dev] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks
- [debian-lts-announce] 20201208 [SECURITY] [DLA 2485-1] golang-golang-x-net-dev security update
- FEDORA-2019-65db7ad6c7
- FEDORA-2019-6a2980de56
- FEDORA-2019-5a6a7bc12c
- FEDORA-2019-55d101a740
- 20190814 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0
- 20190819 [SECURITY] [DSA 4503-1] golang-1.11 security update
- 20190825 [SECURITY] [DSA 4508-1] h2o security update
- 20190910 [SECURITY] [DSA 4520-1] trafficserver security update
- https://security.netapp.com/advisory/ntap-20190823-0001/
- https://security.netapp.com/advisory/ntap-20190823-0004/
- https://security.netapp.com/advisory/ntap-20190823-0005/
- https://support.f5.com/csp/article/K01988340
- https://support.f5.com/csp/article/K01988340?utm_source=f5support&%3Butm_medium=RSS
- USN-4308-1
- DSA-4503
- DSA-4508
- DSA-4520
- DSA-4669
- https://www.synology.com/security/advisory/Synology_SA_19_33
- openSUSE-SU-2019:2000
- https://www.synology.com/security/advisory/Synology_SA_19_33
- DSA-4669
- DSA-4520
- DSA-4508
- DSA-4503
- USN-4308-1
- https://support.f5.com/csp/article/K01988340?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K01988340
- https://security.netapp.com/advisory/ntap-20190823-0005/
- https://security.netapp.com/advisory/ntap-20190823-0004/
- https://security.netapp.com/advisory/ntap-20190823-0001/
- 20190910 [SECURITY] [DSA 4520-1] trafficserver security update
- 20190825 [SECURITY] [DSA 4508-1] h2o security update
- 20190819 [SECURITY] [DSA 4503-1] golang-1.11 security update
- 20190814 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0
- FEDORA-2019-55d101a740
- FEDORA-2019-5a6a7bc12c
- FEDORA-2019-6a2980de56
- FEDORA-2019-65db7ad6c7
- [debian-lts-announce] 20201208 [SECURITY] [DLA 2485-1] golang-golang-x-net-dev security update
- [trafficserver-dev] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks
- [trafficserver-announce] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks
- [trafficserver-users] 20190813 Apache Traffic Server is vulnerable to various HTTP/2 attacks
- https://kc.mcafee.com/corporate/index?page=content&id=SB10296
- VU#605641
- https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
- RHSA-2020:0727
- RHSA-2020:0406
- RHSA-2019:4352
- RHSA-2019:4273
- RHSA-2019:4269
- RHSA-2019:4045
- RHSA-2019:4042
- RHSA-2019:4041
- RHSA-2019:4040
- RHSA-2019:4021
- RHSA-2019:4020
- RHSA-2019:4019
- RHSA-2019:4018
- RHSA-2019:3906
- RHSA-2019:3892
- RHSA-2019:3265
- RHSA-2019:3245
- RHSA-2019:3131
- RHSA-2019:2966
- RHSA-2019:2955
- RHSA-2019:2939
- RHSA-2019:2925
- RHSA-2019:2861
- RHSA-2019:2796
- RHSA-2019:2769
- RHSA-2019:2766
- RHSA-2019:2726
- RHSA-2019:2690
- RHSA-2019:2682
- RHSA-2019:2661
- RHSA-2019:2594
- [oss-security] 20231018 Re: CVE-2023-44487: HTTP/2 Rapid Reset attack against many implementations
- [oss-security] 20190819 [ANNOUNCE] Security release of Kubernetes v1.15.3, v1.14.6, v1.13.10 - CVE-2019-9512 and CVE-2019-9514
- 20190816 APPLE-SA-2019-08-13-5 SwiftNIO HTTP/2 1.5.0
- openSUSE-SU-2019:2130
- openSUSE-SU-2019:2114
- openSUSE-SU-2019:2115
- openSUSE-SU-2019:2085
- openSUSE-SU-2019:2072
- openSUSE-SU-2019:2056
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-13313
libosinfo 1.5.0 allows local users to discover credentials by listing a process, because credentials are passed to osinfo-install-script via the command line.
- [oss-security] 20190708 CVE-2019-13313, CVE-2019-13314: password disclosure via command line arguments
- [oss-security] 20190708 CVE-2019-13313, CVE-2019-13314: password disclosure via command line arguments
- RHSA-2019:3387
- RHSA-2019:3387
- https://gitlab.com/libosinfo/libosinfo/-/tags
- https://gitlab.com/libosinfo/libosinfo/-/tags
- https://gitlab.com/libosinfo/libosinfo/blob/master/NEWS
- https://gitlab.com/libosinfo/libosinfo/blob/master/NEWS
- https://libosinfo.org/download/
- https://libosinfo.org/download/
- FEDORA-2019-4b8990e4d6
- FEDORA-2019-4b8990e4d6
- FEDORA-2019-c9fbe3db9c
- FEDORA-2019-c9fbe3db9c
- FEDORA-2019-e23aeac13e
- FEDORA-2019-e23aeac13e
- FEDORA-2019-d2cde4761e
- FEDORA-2019-d2cde4761e
- https://www.redhat.com/archives/libosinfo/2019-July/msg00026.html
- https://www.redhat.com/archives/libosinfo/2019-July/msg00026.html
Closed vulnerabilities
BDU:2019-01562
Уязвимость почтового сервера Dovecot, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю повысить свои привилегии
BDU:2019-02459
Уязвимость JSON-кодировщика почтового сервера Dovecot, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-03702
Уязвимость реализации протокола Internet Message Access Protocol (IMAP) почтового сервера Dovecot, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-03704
Уязвимость реализации протокола Internet Message Access Protocol (IMAP) почтового сервера Dovecot, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-10691
The JSON encoder in Dovecot before 2.3.5.2 allows attackers to repeatedly crash the authentication service by attempting to authenticate with an invalid UTF-8 sequence as the username.
- openSUSE-SU-2019:1312
- openSUSE-SU-2019:1312
- [oss-security] 20190418 CVE-2019-10691: JSON encoder in Dovecot 2.3 incorrecty assert-crashes when encountering invalid UTF-8 characters.
- [oss-security] 20190418 CVE-2019-10691: JSON encoder in Dovecot 2.3 incorrecty assert-crashes when encountering invalid UTF-8 characters.
- [dovecot-news] 20190418 CVE-2019-10691: JSON encoder in Dovecot 2.3 incorrecty assert-crashes when encountering invalid UTF-8 characters.
- [dovecot-news] 20190418 CVE-2019-10691: JSON encoder in Dovecot 2.3 incorrecty assert-crashes when encountering invalid UTF-8 characters.
- FEDORA-2019-1b61a528dd
- FEDORA-2019-1b61a528dd
- GLSA-201908-29
- GLSA-201908-29
Modified: 2024-11-21
CVE-2019-11494
In the IMAP Server in Dovecot 2.3.3 through 2.3.5.2, the submission-login service crashes when the client disconnects prematurely during the AUTH command.
- openSUSE-SU-2019:2278
- openSUSE-SU-2019:2278
- openSUSE-SU-2019:2281
- openSUSE-SU-2019:2281
- FEDORA-2019-9e004decea
- FEDORA-2019-9e004decea
- FEDORA-2019-1b61a528dd
- FEDORA-2019-1b61a528dd
- https://www.dovecot.org/download.html
- https://www.dovecot.org/download.html
- https://www.dovecot.org/security.html
- https://www.dovecot.org/security.html
Modified: 2024-11-21
CVE-2019-11499
In the IMAP Server in Dovecot 2.3.3 through 2.3.5.2, the submission-login component crashes if AUTH PLAIN is attempted over a TLS secured channel with an unacceptable authentication message.
- openSUSE-SU-2019:2278
- openSUSE-SU-2019:2278
- openSUSE-SU-2019:2281
- openSUSE-SU-2019:2281
- FEDORA-2019-9e004decea
- FEDORA-2019-9e004decea
- FEDORA-2019-1b61a528dd
- FEDORA-2019-1b61a528dd
- https://www.dovecot.org/download.html
- https://www.dovecot.org/download.html
- https://www.dovecot.org/security.html
- https://www.dovecot.org/security.html
Modified: 2024-11-21
CVE-2019-7524
In Dovecot before 2.2.36.3 and 2.3.x before 2.3.5.1, a local attacker can cause a buffer overflow in the indexer-worker process, which can be used to elevate to root. This occurs because of missing checks in the fts and pop3-uidl components.
- openSUSE-SU-2019:1212
- openSUSE-SU-2019:1220
- [oss-security] 20190328 CVE-2019-7524: Buffer overflow when reading extension header from dovecot index files
- 107672
- https://dovecot.org/list/dovecot-news/2019-March/000403.html
- https://dovecot.org/security.html
- [debian-lts-announce] 20190329 [SECURITY] [DLA 1736-1] dovecot security update
- FEDORA-2019-9e004decea
- FEDORA-2019-1b61a528dd
- 20190328 [SECURITY] [DSA 4418-1] dovecot security update
- GLSA-201904-19
- USN-3928-1
- DSA-4418
- openSUSE-SU-2019:1212
- DSA-4418
- USN-3928-1
- GLSA-201904-19
- 20190328 [SECURITY] [DSA 4418-1] dovecot security update
- FEDORA-2019-1b61a528dd
- FEDORA-2019-9e004decea
- [debian-lts-announce] 20190329 [SECURITY] [DLA 1736-1] dovecot security update
- https://dovecot.org/security.html
- https://dovecot.org/list/dovecot-news/2019-March/000403.html
- 107672
- [oss-security] 20190328 CVE-2019-7524: Buffer overflow when reading extension header from dovecot index files
- openSUSE-SU-2019:1220
Closed bugs
Обновить dovecot
Последняя версия: 2.3.7.1
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-12921
PFileFlashPixView::GetGlobalInfoProperty in f_fpxvw.cpp in libfpx 1.3.1_p6 allows remote attackers to cause a denial of service (NULL pointer dereference) via a crafted fpx image.
- [oss-security] 20170817 libfpx: NULL pointer dereference in PFileFlashPixView:etGlobalInfoProperty (f_fpxvw.cpp)
- [oss-security] 20170817 libfpx: NULL pointer dereference in PFileFlashPixView:etGlobalInfoProperty (f_fpxvw.cpp)
- https://blogs.gentoo.org/ago/2017/08/09/libfpx-null-pointer-dereference-in-pfileflashpixviewgetglobalinfoproperty-f_fpxvw-cpp/
- https://blogs.gentoo.org/ago/2017/08/09/libfpx-null-pointer-dereference-in-pfileflashpixviewgetglobalinfoproperty-f_fpxvw-cpp/
Modified: 2024-11-21
CVE-2017-12925
Double free vulnerability in DfFromLB in docfile.cxx in libfpx 1.3.1_p6 allows remote attackers to cause a denial of service via a crafted fpx image.
- [oss-security] 20170817 libfpx: double-free in DfFromLB (docfile.cxx)
- [oss-security] 20170817 libfpx: double-free in DfFromLB (docfile.cxx)
- https://blogs.gentoo.org/ago/2017/08/09/libfpx-double-free-in-dffromlb-docfile-cxx/
- https://blogs.gentoo.org/ago/2017/08/09/libfpx-double-free-in-dffromlb-docfile-cxx/