ALT-BU-2019-3981-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2020-01652
Уязвимость политики безопасности веб-браузера Firefox, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным и оказать воздействие на целостность данных
BDU:2020-01667
Уязвимость функции requestPointerLock() веб-браузера Firefox, позволяющая нарушителю оказать воздействие на целостность данных
Modified: 2024-11-21
CVE-2019-11754
When the pointer lock is enabled by a website though requestPointerLock(), no user notification is given. This could allow a malicious website to hijack the mouse pointer and confuse users. This vulnerability affects Firefox < 69.0.1.
Modified: 2024-11-21
CVE-2019-17001
A Content-Security-Policy that blocks in-line scripts could be bypassed using an object tag to execute JavaScript in the protected document (cross-site scripting). This is a separate bypass from CVE-2019-17000.*Note: This flaw only affected Firefox 69 and was not present in earlier versions.*. This vulnerability affects Firefox < 70.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-3893
In Foreman it was discovered that the delete compute resource operation, when executed from the Foreman API, leads to the disclosure of the plaintext password or token for the affected compute resource. A malicious user with the "delete_compute_resource" permission can use this flaw to take control over compute resources managed by foreman. Versions before 1.20.3, 1.21.1, 1.22.0 are vulnerable.
- [oss-security] 20190414 CVE-2019-3893: Foreman: Compute resource credentials exposed during deletion on API
- [oss-security] 20190414 CVE-2019-3893: Foreman: Compute resource credentials exposed during deletion on API
- 107846
- 107846
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3893
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3893
- https://github.com/theforeman/foreman/pull/6621
- https://github.com/theforeman/foreman/pull/6621
- https://projects.theforeman.org/issues/26450
- https://projects.theforeman.org/issues/26450
Closed bugs
Добавить скрипт в /etc/eepm/repack.d/