ALT-BU-2019-4116-2
Branch sisyphus update bulletin.
Closed bugs
Перенести lsof в /usr/bin/
Closed bugs
Изменить URL на https://github.com/c-icap
Closed bugs
Воспроизводимый segmentation fault
Closed vulnerabilities
BDU:2023-01658
Уязвимость программы для шифрования информации и создания электронных цифровых подписей GnuPG, связанная с слабым шифрованием, позволяющая нарушителю получить доступ к конфиденциальным данным
Modified: 2024-11-21
CVE-2019-14855
A flaw was found in the way certificate signatures could be forged using collisions found in the SHA-1 algorithm. An attacker could use this weakness to create forged certificate signatures. This issue affects GnuPG versions before 2.2.18.
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14855
- https://dev.gnupg.org/T4755
- https://dev.gnupg.org/T4755
- https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
- https://lists.gnupg.org/pipermail/gnupg-announce/2019q4/000442.html
- https://rwc.iacr.org/2020/slides/Leurent.pdf
- https://rwc.iacr.org/2020/slides/Leurent.pdf
- USN-4516-1
- USN-4516-1
Package libmaxminddb updated to version 1.4.2-alt2 for branch sisyphus in task 242679.
Closed bugs
Добавление тестов
Closed vulnerabilities
BDU:2020-01805
Уязвимость функции ip_reass (ip_input.с) аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-00071
Уязвимость функции zrle_compress_data программного обеспечения для эмуляции аппаратного обеспечения различных платформ QEMU, связанная с неправильным освобождением памяти перед удалением последней ссылки, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01327
Уязвимость функции rom_copy из hw/core/loader.c эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-05171
Уязвимость компонента block/iscsi.c эмулятора аппаратного обеспечения QEMU, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к конфиденциальным данным
Modified: 2024-11-21
CVE-2019-15890
libslirp 4.0.0, as used in QEMU 4.1.0, has a use-after-free in ip_reass in ip_input.c.
- openSUSE-SU-2019:2510
- openSUSE-SU-2019:2510
- http://www.openwall.com/lists/oss-security/2019/09/06/3
- http://www.openwall.com/lists/oss-security/2019/09/06/3
- RHSA-2020:0775
- RHSA-2020:0775
- https://gitlab.freedesktop.org/slirp/libslirp/commit/c5927943
- https://gitlab.freedesktop.org/slirp/libslirp/commit/c5927943
- [debian-lts-announce] 20190920 [SECURITY] [DLA 1927-1] qemu security update
- [debian-lts-announce] 20190920 [SECURITY] [DLA 1927-1] qemu security update
- 20200203 [SECURITY] [DSA 4616-1] qemu security update
- 20200203 [SECURITY] [DSA 4616-1] qemu security update
- USN-4191-1
- USN-4191-1
- USN-4191-2
- USN-4191-2
- DSA-4616
- DSA-4616
Modified: 2024-11-21
CVE-2019-20382
QEMU 4.1.0 has a memory leak in zrle_compress_data in ui/vnc-enc-zrle.c during a VNC disconnect operation because libz is misused, resulting in a situation where memory allocated in deflateInit2 is not freed in deflateEnd.
- openSUSE-SU-2020:0468
- openSUSE-SU-2020:0468
- http://www.openwall.com/lists/oss-security/2020/03/05/1
- http://www.openwall.com/lists/oss-security/2020/03/05/1
- https://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=6bf21f3d83e95bcc4ba35a7a07cc6655e8b010b0
- https://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=6bf21f3d83e95bcc4ba35a7a07cc6655e8b010b0
- [debian-lts-announce] 20200726 [SECURITY] [DLA 2288-1] qemu security update
- [debian-lts-announce] 20200726 [SECURITY] [DLA 2288-1] qemu security update
- USN-4372-1
- USN-4372-1
- DSA-4665
- DSA-4665
Modified: 2024-11-21
CVE-2019-20808
In QEMU 4.1.0, an out-of-bounds read flaw was found in the ATI VGA implementation. It occurs in the ati_cursor_define() routine while handling MMIO write operations through the ati_mm_write() callback. A malicious guest could abuse this flaw to crash the QEMU process, resulting in a denial of service.
- https://bugzilla.redhat.com/show_bug.cgi?id=1841136
- https://bugzilla.redhat.com/show_bug.cgi?id=1841136
- https://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=aab0e2a661b2b6bf7915c0aefe807fb60d6d9d13
- https://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=aab0e2a661b2b6bf7915c0aefe807fb60d6d9d13
- https://security.netapp.com/advisory/ntap-20210205-0003/
- https://security.netapp.com/advisory/ntap-20210205-0003/
Modified: 2024-11-21
CVE-2020-11947
iscsi_aio_ioctl_cb in block/iscsi.c in QEMU 4.1.0 has a heap-based buffer over-read that may disclose unrelated information from process memory to an attacker.
- [oss-security] 20210113 CVE-2020-11947 QEMU: heap buffer overflow in iSCSI block driver may lead to information disclosure
- https://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=ff0507c239a246fd7215b31c5658fc6a3ee1e4c5
- https://security.netapp.com/advisory/ntap-20210212-0001/
- [oss-security] 20210113 CVE-2020-11947 QEMU: heap buffer overflow in iSCSI block driver may lead to information disclosure
- https://security.netapp.com/advisory/ntap-20210212-0001/
- https://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=ff0507c239a246fd7215b31c5658fc6a3ee1e4c5
Modified: 2024-11-21
CVE-2020-13765
rom_copy() in hw/core/loader.c in QEMU 4.0 and 4.1.0 does not validate the relationship between two addresses, which allows attackers to trigger an invalid memory copy operation.
- https://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=e423455c4f23a1a828901c78fe6d03b7dde79319
- https://github.com/qemu/qemu/commit/4f1c6cb2f9afafda05eab150fd2bd284edce6676
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2262-1] qemu security update
- [debian-lts-announce] 20200726 [SECURITY] [DLA 2288-1] qemu security update
- https://security.netapp.com/advisory/ntap-20200619-0006/
- USN-4467-1
- https://www.openwall.com/lists/oss-security/2020/06/03/6
- https://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=e423455c4f23a1a828901c78fe6d03b7dde79319
- https://www.openwall.com/lists/oss-security/2020/06/03/6
- USN-4467-1
- https://security.netapp.com/advisory/ntap-20200619-0006/
- [debian-lts-announce] 20200726 [SECURITY] [DLA 2288-1] qemu security update
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2262-1] qemu security update
- https://github.com/qemu/qemu/commit/4f1c6cb2f9afafda05eab150fd2bd284edce6676
Closed vulnerabilities
BDU:2020-01458
Уязвимость системы управления версиями GIT, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-01655
Уязвимость компонента проверки имени подмодулей распределенной системы управления версиями Git, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании и оказать воздействие на целостность данных
BDU:2020-01656
Уязвимость компонента безопасности подсистемы запуска WSL распределенной системы управления версиями Git, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании и оказать воздействие на целостность данных
BDU:2020-01657
Уязвимость компонента работы с NTFS Alternate Data Streams распределенной системы управления версиями Git, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании и оказать воздействие на целостность данных
BDU:2020-01658
Уязвимость компонента рекурсивного клонирования подмодулей распределенной системы управления версиями Git, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании и оказать воздействие на целостность данных
BDU:2020-01659
Уязвимость опции быстрого импорта --export-marks распределенной системы управления версиями Git, позволяющая нарушителю вызвать отказ в обслуживании и оказать воздействие на целостность данных
Modified: 2024-11-21
CVE-2019-1348
An issue was found in Git before v2.24.1, v2.23.1, v2.22.2, v2.21.1, v2.20.2, v2.19.3, v2.18.2, v2.17.3, v2.16.6, v2.15.4, and v2.14.6. The --export-marks option of git fast-import is exposed also via the in-stream command feature export-marks=... and it allows overwriting arbitrary paths.
- openSUSE-SU-2020:0123
- openSUSE-SU-2020:0123
- openSUSE-SU-2020:0598
- openSUSE-SU-2020:0598
- RHSA-2020:0228
- RHSA-2020:0228
- https://lore.kernel.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/T/#u
- https://lore.kernel.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/T/#u
- https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/
- https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/
- GLSA-202003-30
- GLSA-202003-30
- GLSA-202003-42
- GLSA-202003-42
- https://support.apple.com/kb/HT210729
- https://support.apple.com/kb/HT210729
Modified: 2024-11-21
CVE-2019-1349
A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input, aka 'Git for Visual Studio Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1350, CVE-2019-1352, CVE-2019-1354, CVE-2019-1387.
- openSUSE-SU-2020:0123
- openSUSE-SU-2020:0123
- openSUSE-SU-2020:0598
- openSUSE-SU-2020:0598
- RHSA-2020:0228
- RHSA-2020:0228
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1349
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1349
- https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/
- https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/
- GLSA-202003-30
- GLSA-202003-30
Modified: 2024-11-21
CVE-2019-1350
A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input, aka 'Git for Visual Studio Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1349, CVE-2019-1352, CVE-2019-1354, CVE-2019-1387.
- openSUSE-SU-2020:0123
- openSUSE-SU-2020:0123
- openSUSE-SU-2020:0598
- openSUSE-SU-2020:0598
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1350
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1350
- https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/
- https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/
- GLSA-202003-30
- GLSA-202003-30
- GLSA-202003-42
- GLSA-202003-42
Modified: 2024-11-21
CVE-2019-1351
A tampering vulnerability exists when Git for Visual Studio improperly handles virtual drive paths, aka 'Git for Visual Studio Tampering Vulnerability'.
- openSUSE-SU-2020:0123
- openSUSE-SU-2020:0123
- openSUSE-SU-2020:0598
- openSUSE-SU-2020:0598
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1351
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1351
- https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/
- https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/
- GLSA-202003-30
- GLSA-202003-30
Modified: 2024-11-21
CVE-2019-1352
A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input, aka 'Git for Visual Studio Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1349, CVE-2019-1350, CVE-2019-1354, CVE-2019-1387.
- openSUSE-SU-2020:0123
- openSUSE-SU-2020:0123
- openSUSE-SU-2020:0598
- openSUSE-SU-2020:0598
- RHSA-2020:0228
- RHSA-2020:0228
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1352
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1352
- https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/
- https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/
- GLSA-202003-30
- GLSA-202003-30
Modified: 2024-11-21
CVE-2019-1353
An issue was found in Git before v2.24.1, v2.23.1, v2.22.2, v2.21.1, v2.20.2, v2.19.3, v2.18.2, v2.17.3, v2.16.6, v2.15.4, and v2.14.6. When running Git in the Windows Subsystem for Linux (also known as "WSL") while accessing a working directory on a regular Windows drive, none of the NTFS protections were active.
- openSUSE-SU-2020:0123
- openSUSE-SU-2020:0123
- openSUSE-SU-2020:0598
- openSUSE-SU-2020:0598
- https://lore.kernel.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/T/#u
- https://lore.kernel.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/T/#u
- https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/
- https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/
- GLSA-202003-30
- GLSA-202003-30
Modified: 2024-11-21
CVE-2019-1354
A remote code execution vulnerability exists when Git for Visual Studio improperly sanitizes input, aka 'Git for Visual Studio Remote Code Execution Vulnerability'. This CVE ID is unique from CVE-2019-1349, CVE-2019-1350, CVE-2019-1352, CVE-2019-1387.
- openSUSE-SU-2020:0123
- openSUSE-SU-2020:0123
- openSUSE-SU-2020:0598
- openSUSE-SU-2020:0598
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1354
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2019-1354
- https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/
- https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/
- GLSA-202003-30
- GLSA-202003-30
Modified: 2024-11-21
CVE-2019-1387
An issue was found in Git before v2.24.1, v2.23.1, v2.22.2, v2.21.1, v2.20.2, v2.19.3, v2.18.2, v2.17.3, v2.16.6, v2.15.4, and v2.14.6. Recursive clones are currently affected by a vulnerability that is caused by too-lax validation of submodule names, allowing very targeted attacks via remote code execution in recursive clones.
- openSUSE-SU-2020:0123
- openSUSE-SU-2020:0123
- openSUSE-SU-2020:0598
- openSUSE-SU-2020:0598
- RHSA-2019:4356
- RHSA-2019:4356
- RHSA-2020:0002
- RHSA-2020:0002
- RHSA-2020:0124
- RHSA-2020:0124
- RHSA-2020:0228
- RHSA-2020:0228
- [debian-lts-announce] 20200123 [SECURITY] [DLA 2059-1] git security update
- [debian-lts-announce] 20200123 [SECURITY] [DLA 2059-1] git security update
- [debian-lts-announce] 20240626 [SECURITY] [DLA 3844-1] git security update
- [debian-lts-announce] 20240626 [SECURITY] [DLA 3844-1] git security update
- FEDORA-2019-1cec196e20
- FEDORA-2019-1cec196e20
- https://lore.kernel.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/T/#u
- https://lore.kernel.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/T/#u
- https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/
- https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/
- GLSA-202003-30
- GLSA-202003-30
- GLSA-202003-42
- GLSA-202003-42
Modified: 2024-11-21
CVE-2019-19604
Arbitrary command execution is possible in Git before 2.20.2, 2.21.x before 2.21.1, 2.22.x before 2.22.2, 2.23.x before 2.23.1, and 2.24.x before 2.24.1 because a "git submodule update" operation can run commands found in the .gitmodules file of a malicious repository.
- openSUSE-SU-2020:0123
- openSUSE-SU-2020:0123
- openSUSE-SU-2020:0598
- openSUSE-SU-2020:0598
- [oss-security] 20191213 Multiple vulnerabilities fixed in Git
- [oss-security] 20191213 Multiple vulnerabilities fixed in Git
- https://gitlab.com/gitlab-com/gl-security/disclosures/blob/master/003_git_submodule/advisory.md
- https://gitlab.com/gitlab-com/gl-security/disclosures/blob/master/003_git_submodule/advisory.md
- FEDORA-2019-c841bcc3b9
- FEDORA-2019-c841bcc3b9
- FEDORA-2019-1cec196e20
- FEDORA-2019-1cec196e20
- https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/
- https://public-inbox.org/git/xmqqr21cqcn9.fsf%40gitster-ct.c.googlers.com/
- https://raw.githubusercontent.com/git/git/master/Documentation/RelNotes/2.24.1.txt
- https://raw.githubusercontent.com/git/git/master/Documentation/RelNotes/2.24.1.txt
- GLSA-202003-30
- GLSA-202003-30
- DSA-4581
- DSA-4581
Package supervisor updated to version 4.1.0-alt1 for branch sisyphus in task 242677.
Closed vulnerabilities
BDU:2023-01676
Уязвимость компонента inet_http_server системы контроля процессов Supervisor, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-12105
In Supervisor through 4.0.2, an unauthenticated user can read log files or restart a service. Note: The maintainer responded that the affected component, inet_http_server, is not enabled by default but if the user enables it and does not set a password, Supervisor logs a warning message. The maintainer indicated the ability to run an open server will not be removed but an additional warning was added to the documentation
- http://supervisord.org/configuration.html#inet-http-server-section-settings
- http://supervisord.org/configuration.html#inet-http-server-section-settings
- https://github.com/Supervisor/supervisor/commit/4e334d9cf2a1daff685893e35e72398437df3dcb
- https://github.com/Supervisor/supervisor/commit/4e334d9cf2a1daff685893e35e72398437df3dcb
- https://github.com/Supervisor/supervisor/issues/1245
- https://github.com/Supervisor/supervisor/issues/1245