ALT-BU-2019-4020-1
Branch p9 update bulletin.
Closed vulnerabilities
BDU:2019-03696
Уязвимость программы системного администрирования Sudo, существующая из-за недостаточной проверки входных данных, выполнить произвольные команды с привилегиями root
Modified: 2024-11-21
CVE-2019-14287
In Sudo before 1.8.28, an attacker with access to a Runas ALL sudoer account can bypass certain policy blacklists and session PAM modules, and can cause incorrect logging, by invoking sudo with a crafted user ID. For example, this allows bypass of !root configuration, and USER= logging, for a "sudo -u \#$((0xffffffff))" command.
- openSUSE-SU-2019:2316
- openSUSE-SU-2019:2316
- openSUSE-SU-2019:2333
- openSUSE-SU-2019:2333
- http://packetstormsecurity.com/files/154853/Slackware-Security-Advisory-sudo-Updates.html
- http://packetstormsecurity.com/files/154853/Slackware-Security-Advisory-sudo-Updates.html
- [oss-security] 20191014 Sudo: CVE-2019-14287
- [oss-security] 20191014 Sudo: CVE-2019-14287
- [oss-security] 20191023 Membership application for linux-distros - VMware
- [oss-security] 20191023 Membership application for linux-distros - VMware
- [oss-security] 20191029 Re: Membership application for linux-distros - VMware
- [oss-security] 20191029 Re: Membership application for linux-distros - VMware
- [oss-security] 20210914 Re: Oracle Solaris membership in the distros list
- [oss-security] 20210914 Re: Oracle Solaris membership in the distros list
- RHBA-2019:3248
- RHBA-2019:3248
- RHSA-2019:3197
- RHSA-2019:3197
- RHSA-2019:3204
- RHSA-2019:3204
- RHSA-2019:3205
- RHSA-2019:3205
- RHSA-2019:3209
- RHSA-2019:3209
- RHSA-2019:3219
- RHSA-2019:3219
- RHSA-2019:3278
- RHSA-2019:3278
- RHSA-2019:3694
- RHSA-2019:3694
- RHSA-2019:3754
- RHSA-2019:3754
- RHSA-2019:3755
- RHSA-2019:3755
- RHSA-2019:3895
- RHSA-2019:3895
- RHSA-2019:3916
- RHSA-2019:3916
- RHSA-2019:3941
- RHSA-2019:3941
- RHSA-2019:4191
- RHSA-2019:4191
- RHSA-2020:0388
- RHSA-2020:0388
- [debian-lts-announce] 20191017 [SECURITY] [DLA 1964-1] sudo security update
- [debian-lts-announce] 20191017 [SECURITY] [DLA 1964-1] sudo security update
- FEDORA-2019-9cb221f2be
- FEDORA-2019-9cb221f2be
- FEDORA-2019-72755db9c7
- FEDORA-2019-72755db9c7
- FEDORA-2019-67998e9f7e
- FEDORA-2019-67998e9f7e
- https://resources.whitesourcesoftware.com/blog-whitesource/new-vulnerability-in-sudo-cve-2019-14287
- https://resources.whitesourcesoftware.com/blog-whitesource/new-vulnerability-in-sudo-cve-2019-14287
- 20191015 [slackware-security] sudo (SSA:2019-287-01)
- 20191015 [slackware-security] sudo (SSA:2019-287-01)
- 20191015 [SECURITY] [DSA 4543-1] sudo security update
- 20191015 [SECURITY] [DSA 4543-1] sudo security update
- GLSA-202003-12
- GLSA-202003-12
- https://security.netapp.com/advisory/ntap-20191017-0003/
- https://security.netapp.com/advisory/ntap-20191017-0003/
- https://support.f5.com/csp/article/K53746212?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K53746212?utm_source=f5support&%3Butm_medium=RSS
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbns03976en_us
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbns03976en_us
- USN-4154-1
- USN-4154-1
- DSA-4543
- DSA-4543
- [oss-security] 20191015 Re: Sudo: CVE-2019-14287
- [oss-security] 20191015 Re: Sudo: CVE-2019-14287
- https://www.sudo.ws/alerts/minus_1_uid.html
- https://www.sudo.ws/alerts/minus_1_uid.html
Closed bugs
CVE-2019-14287 в sudo < 1.8.28
Closed vulnerabilities
BDU:2019-01741
Уязвимость модуля urllib интерпретатора языка программирования Python, связанная с недостатками ограничения имени пути к каталогу, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность
BDU:2019-02825
Уязвимость функций urllib.parse.urlsplit и urllib.parse.urlparse интерпретатора языка программирования Python, позволяющая нарушителю раскрыть защищаемую информацию, читать или записывать произвольные данные, или вызвать отказ в обслуживании
BDU:2020-01057
Уязвимость модуля urllib2 интерпретатора языка программирования Python, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации
BDU:2021-03607
Уязвимость модуля urllib2 интерпретатора языка программирования Python, связанная с непринятием мер по нейтрализации последовательностей crlf, позволяющая нарушителю оказать воздействие на целостность данных
Modified: 2024-11-21
CVE-2019-10160
A security regression of CVE-2019-9636 was discovered in python since commit d537ab0ff9767ef024f26246899728f0116b1ec3 affecting versions 2.7, 3.5, 3.6, 3.7 and from v3.8.0a4 through v3.8.0b1, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application.
- openSUSE-SU-2019:1906
- openSUSE-SU-2019:1906
- openSUSE-SU-2020:0086
- openSUSE-SU-2020:0086
- RHSA-2019:1587
- RHSA-2019:1587
- RHSA-2019:1700
- RHSA-2019:1700
- RHSA-2019:2437
- RHSA-2019:2437
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10160
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10160
- https://github.com/python/cpython/commit/250b62acc59921d399f0db47db3b462cd6037e09
- https://github.com/python/cpython/commit/250b62acc59921d399f0db47db3b462cd6037e09
- https://github.com/python/cpython/commit/8d0ef0b5edeae52960c7ed05ae8a12388324f87e
- https://github.com/python/cpython/commit/8d0ef0b5edeae52960c7ed05ae8a12388324f87e
- https://github.com/python/cpython/commit/f61599b050c621386a3fc6bc480359e2d3bb93de
- https://github.com/python/cpython/commit/f61599b050c621386a3fc6bc480359e2d3bb93de
- https://github.com/python/cpython/commit/fd1771dbdd28709716bd531580c40ae5ed814468
- https://github.com/python/cpython/commit/fd1771dbdd28709716bd531580c40ae5ed814468
- [bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image
- [bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1834-1] python2.7 security update
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1834-1] python2.7 security update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update
- FEDORA-2019-7df59302e0
- FEDORA-2019-7df59302e0
- FEDORA-2019-7723d4774a
- FEDORA-2019-7723d4774a
- FEDORA-2019-57462fa10d
- FEDORA-2019-57462fa10d
- FEDORA-2019-2b1f72899a
- FEDORA-2019-2b1f72899a
- FEDORA-2019-5dc275c9f2
- FEDORA-2019-5dc275c9f2
- FEDORA-2019-60a1defcd1
- FEDORA-2019-60a1defcd1
- FEDORA-2019-d202cda4f8
- FEDORA-2019-d202cda4f8
- FEDORA-2019-9bfb4a3e4b
- FEDORA-2019-9bfb4a3e4b
- FEDORA-2019-b06ec6159b
- FEDORA-2019-b06ec6159b
- FEDORA-2019-50772cf122
- FEDORA-2019-50772cf122
- https://python-security.readthedocs.io/vuln/urlsplit-nfkc-normalization2.html
- https://python-security.readthedocs.io/vuln/urlsplit-nfkc-normalization2.html
- https://security.netapp.com/advisory/ntap-20190617-0003/
- https://security.netapp.com/advisory/ntap-20190617-0003/
- USN-4127-1
- USN-4127-1
- USN-4127-2
- USN-4127-2
Modified: 2024-11-21
CVE-2019-9740
An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the query string after a ? character) followed by an HTTP header or a Redis command. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.
- openSUSE-SU-2019:2131
- openSUSE-SU-2019:2133
- http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html
- [oss-security] 20210204 [CVE-2020-15693, CVE-2020-15694] Nim - stdlib Httpclient - Header Crlf Injection & Server Response Validation
- 107466
- RHSA-2019:1260
- RHSA-2019:2030
- RHSA-2019:3335
- RHSA-2019:3520
- RHSA-2019:3725
- https://bugs.python.org/issue36276
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1834-1] python2.7 security update
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1835-1] python3.4 security update
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1835-2] python3.4 regression update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update
- FEDORA-2019-7df59302e0
- FEDORA-2019-7723d4774a
- FEDORA-2019-57462fa10d
- FEDORA-2019-d202cda4f8
- FEDORA-2019-ec26883852
- FEDORA-2019-1ffd6b6064
- FEDORA-2019-b06ec6159b
- 20191021 [slackware-security] python (SSA:2019-293-01)
- GLSA-202003-26
- https://security.netapp.com/advisory/ntap-20190619-0005/
- USN-4127-1
- USN-4127-2
- https://www.oracle.com/security-alerts/cpujul2022.html
- openSUSE-SU-2019:2131
- https://www.oracle.com/security-alerts/cpujul2022.html
- USN-4127-2
- USN-4127-1
- https://security.netapp.com/advisory/ntap-20190619-0005/
- GLSA-202003-26
- 20191021 [slackware-security] python (SSA:2019-293-01)
- FEDORA-2019-b06ec6159b
- FEDORA-2019-1ffd6b6064
- FEDORA-2019-ec26883852
- FEDORA-2019-d202cda4f8
- FEDORA-2019-57462fa10d
- FEDORA-2019-7723d4774a
- FEDORA-2019-7df59302e0
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1835-2] python3.4 regression update
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1835-1] python3.4 security update
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1834-1] python2.7 security update
- https://bugs.python.org/issue36276
- RHSA-2019:3725
- RHSA-2019:3520
- RHSA-2019:3335
- RHSA-2019:2030
- RHSA-2019:1260
- 107466
- [oss-security] 20210204 [CVE-2020-15693, CVE-2020-15694] Nim - stdlib Httpclient - Header Crlf Injection & Server Response Validation
- http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html
- openSUSE-SU-2019:2133
Modified: 2024-11-21
CVE-2019-9947
An issue was discovered in urllib2 in Python 2.x through 2.7.16 and urllib in Python 3.x through 3.7.3. CRLF injection is possible if the attacker controls a url parameter, as demonstrated by the first argument to urllib.request.urlopen with \r\n (specifically in the path component of a URL that lacks a ? character) followed by an HTTP header or a Redis command. This is similar to the CVE-2019-9740 query string issue. This is fixed in: v2.7.17, v2.7.17rc1, v2.7.18, v2.7.18rc1; v3.5.10, v3.5.10rc1, v3.5.8, v3.5.8rc1, v3.5.8rc2, v3.5.9; v3.6.10, v3.6.10rc1, v3.6.11, v3.6.11rc1, v3.6.12, v3.6.9, v3.6.9rc1; v3.7.4, v3.7.4rc1, v3.7.4rc2, v3.7.5, v3.7.5rc1, v3.7.6, v3.7.6rc1, v3.7.7, v3.7.7rc1, v3.7.8, v3.7.8rc1, v3.7.9.
- openSUSE-SU-2019:2389
- openSUSE-SU-2019:2393
- openSUSE-SU-2020:0086
- [oss-security] 20210204 [CVE-2020-15693, CVE-2020-15694] Nim - stdlib Httpclient - Header Crlf Injection & Server Response Validation
- RHSA-2019:1260
- RHSA-2019:2030
- RHSA-2019:3335
- RHSA-2019:3520
- RHSA-2019:3725
- https://bugs.python.org/issue35906
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1834-1] python2.7 security update
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1835-1] python3.4 security update
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1835-2] python3.4 regression update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update
- FEDORA-2019-ec26883852
- FEDORA-2019-1ffd6b6064
- GLSA-202003-26
- https://security.netapp.com/advisory/ntap-20190404-0004/
- USN-4127-1
- USN-4127-2
- openSUSE-SU-2019:2389
- USN-4127-2
- USN-4127-1
- https://security.netapp.com/advisory/ntap-20190404-0004/
- GLSA-202003-26
- FEDORA-2019-1ffd6b6064
- FEDORA-2019-ec26883852
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1835-2] python3.4 regression update
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1835-1] python3.4 security update
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1834-1] python2.7 security update
- https://bugs.python.org/issue35906
- RHSA-2019:3725
- RHSA-2019:3520
- RHSA-2019:3335
- RHSA-2019:2030
- RHSA-2019:1260
- [oss-security] 20210204 [CVE-2020-15693, CVE-2020-15694] Nim - stdlib Httpclient - Header Crlf Injection & Server Response Validation
- openSUSE-SU-2020:0086
- openSUSE-SU-2019:2393
Modified: 2024-11-21
CVE-2019-9948
urllib in Python 2.x through 2.7.16 supports the local_file: scheme, which makes it easier for remote attackers to bypass protection mechanisms that blacklist file: URIs, as demonstrated by triggering a urllib.urlopen('local_file:///etc/passwd') call.
- openSUSE-SU-2019:1273
- openSUSE-SU-2019:1580
- http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html
- 107549
- RHSA-2019:1700
- RHSA-2019:2030
- RHSA-2019:3335
- RHSA-2019:3520
- https://bugs.python.org/issue35907
- https://github.com/python/cpython/pull/11842
- [bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1834-1] python2.7 security update
- [debian-lts-announce] 20190711 [SECURITY] [DLA 1852-1] python3.4 security update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update
- FEDORA-2019-60a1defcd1
- FEDORA-2019-9bfb4a3e4b
- 20191021 [slackware-security] python (SSA:2019-293-01)
- GLSA-202003-26
- https://security.netapp.com/advisory/ntap-20190404-0004/
- USN-4127-1
- USN-4127-2
- openSUSE-SU-2019:1273
- USN-4127-2
- USN-4127-1
- https://security.netapp.com/advisory/ntap-20190404-0004/
- GLSA-202003-26
- 20191021 [slackware-security] python (SSA:2019-293-01)
- FEDORA-2019-9bfb4a3e4b
- FEDORA-2019-60a1defcd1
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update
- [debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update
- [debian-lts-announce] 20190711 [SECURITY] [DLA 1852-1] python3.4 security update
- [debian-lts-announce] 20190625 [SECURITY] [DLA 1834-1] python2.7 security update
- [bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image
- https://github.com/python/cpython/pull/11842
- https://bugs.python.org/issue35907
- RHSA-2019:3520
- RHSA-2019:3335
- RHSA-2019:2030
- RHSA-2019:1700
- 107549
- http://packetstormsecurity.com/files/154927/Slackware-Security-Advisory-python-Updates.html
- openSUSE-SU-2019:1580
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-10740
In Roundcube Webmail before 1.3.10, an attacker in possession of S/MIME or PGP encrypted emails can wrap them as sub-parts within a crafted multipart email. The encrypted part(s) can further be hidden using HTML/CSS or ASCII newline characters. This modified multipart email can be re-sent by the attacker to the intended receiver. If the receiver replies to this (benign looking) email, they unknowingly leak the plaintext of the encrypted message part(s) back to the attacker.
- openSUSE-SU-2020:1516
- openSUSE-SU-2020:1516
- https://github.com/roundcube/roundcubemail/issues/6638
- https://github.com/roundcube/roundcubemail/issues/6638
- https://github.com/roundcube/roundcubemail/releases/tag/1.3.10
- https://github.com/roundcube/roundcubemail/releases/tag/1.3.10
- FEDORA-2019-d9c2f1ec70
- FEDORA-2019-d9c2f1ec70
Modified: 2024-11-21
CVE-2019-15237
Roundcube Webmail through 1.3.9 mishandles Punycode xn-- domain names, leading to homograph attacks.