ALT-BU-2019-4093-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-10195
A flaw was found in IPA, all 4.6.x versions before 4.6.7, all 4.7.x versions before 4.7.4 and all 4.8.x versions before 4.8.3, in the way that FreeIPA's batch processing API logged operations. This included passing user passwords in clear text on FreeIPA masters. Batch processing of commands with passwords as arguments or options is not performed by default in FreeIPA but is possible by third-party components. An attacker having access to system logs on FreeIPA masters could use this flaw to produce log file content with passwords exposed.
- RHBA-2019:4268
- RHBA-2019:4268
- RHSA-2020:0378
- RHSA-2020:0378
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10195
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10195
- FEDORA-2019-c64e1612f5
- FEDORA-2019-c64e1612f5
- FEDORA-2019-8e9093da55
- FEDORA-2019-8e9093da55
- https://www.freeipa.org/page/Releases/4.6.7
- https://www.freeipa.org/page/Releases/4.6.7
- https://www.freeipa.org/page/Releases/4.7.4
- https://www.freeipa.org/page/Releases/4.7.4
- https://www.freeipa.org/page/Releases/4.8.3
- https://www.freeipa.org/page/Releases/4.8.3
Modified: 2024-11-21
CVE-2019-14867
A flaw was found in IPA, all 4.6.x versions before 4.6.7, all 4.7.x versions before 4.7.4 and all 4.8.x versions before 4.8.3, in the way the internal function ber_scanf() was used in some components of the IPA server, which parsed kerberos key data. An unauthenticated attacker who could trigger parsing of the krb principal key could cause the IPA server to crash or in some conditions, cause arbitrary code to be executed on the server hosting the IPA server.
- RHBA-2019:4268
- RHBA-2019:4268
- RHSA-2020:0378
- RHSA-2020:0378
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14867
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14867
- FEDORA-2019-c64e1612f5
- FEDORA-2019-c64e1612f5
- FEDORA-2019-8e9093da55
- FEDORA-2019-8e9093da55
- https://www.freeipa.org/page/Releases/4.6.7
- https://www.freeipa.org/page/Releases/4.6.7
- https://www.freeipa.org/page/Releases/4.7.4
- https://www.freeipa.org/page/Releases/4.7.4
- https://www.freeipa.org/page/Releases/4.8.3
- https://www.freeipa.org/page/Releases/4.8.3
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-18849
In tnef before 1.4.18, an attacker may be able to write to the victim's .ssh/authorized_keys file via an e-mail message with a crafted winmail.dat application/ms-tnef attachment, because of a heap-based buffer over-read involving strdup.
- https://github.com/verdammelt/tnef/compare/1.4.17...1.4.18
- https://github.com/verdammelt/tnef/compare/1.4.17...1.4.18
- https://github.com/verdammelt/tnef/pull/40
- https://github.com/verdammelt/tnef/pull/40
- [debian-lts-announce] 20191129 [SECURITY] [DLA 2005-1] tnef security update
- [debian-lts-announce] 20191129 [SECURITY] [DLA 2005-1] tnef security update
- [debian-lts-announce] 20210823 [SECURITY] [DLA 2748-1] tnef security update
- [debian-lts-announce] 20210823 [SECURITY] [DLA 2748-1] tnef security update
- FEDORA-2019-5f14b810f8
- FEDORA-2019-5f14b810f8
- FEDORA-2019-815807c020
- FEDORA-2019-815807c020
- USN-4524-1
- USN-4524-1
Closed bugs
Не работают иконки в контекстном меню.