ALT-BU-2019-4124-1
Branch p9 update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-18837
An issue was discovered in crun before 0.10.5. With a crafted image, it doesn't correctly check whether a target is a symlink, resulting in access to files outside of the container. This occurs in libcrun/linux.c and libcrun/chroot_realpath.c.
- https://github.com/containers/crun/pull/173
- https://github.com/containers/crun/pull/173
- https://github.com/containers/crun/releases/tag/0.10.5
- https://github.com/containers/crun/releases/tag/0.10.5
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DTA5SJUAKQUK6HRY2CZVJUIZP5BO3EOG/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DTA5SJUAKQUK6HRY2CZVJUIZP5BO3EOG/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITB2UNEGHXZUR3ATYHWPSK5LJB36N7AP/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITB2UNEGHXZUR3ATYHWPSK5LJB36N7AP/
Closed vulnerabilities
BDU:2020-01805
Уязвимость функции ip_reass (ip_input.с) аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-00071
Уязвимость функции zrle_compress_data программного обеспечения для эмуляции аппаратного обеспечения различных платформ QEMU, связанная с неправильным освобождением памяти перед удалением последней ссылки, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01327
Уязвимость функции rom_copy из hw/core/loader.c эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-05171
Уязвимость компонента block/iscsi.c эмулятора аппаратного обеспечения QEMU, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к конфиденциальным данным
Modified: 2024-11-21
CVE-2019-15890
libslirp 4.0.0, as used in QEMU 4.1.0, has a use-after-free in ip_reass in ip_input.c.
- openSUSE-SU-2019:2510
- openSUSE-SU-2019:2510
- http://www.openwall.com/lists/oss-security/2019/09/06/3
- http://www.openwall.com/lists/oss-security/2019/09/06/3
- RHSA-2020:0775
- RHSA-2020:0775
- https://gitlab.freedesktop.org/slirp/libslirp/commit/c5927943
- https://gitlab.freedesktop.org/slirp/libslirp/commit/c5927943
- [debian-lts-announce] 20190920 [SECURITY] [DLA 1927-1] qemu security update
- [debian-lts-announce] 20190920 [SECURITY] [DLA 1927-1] qemu security update
- 20200203 [SECURITY] [DSA 4616-1] qemu security update
- 20200203 [SECURITY] [DSA 4616-1] qemu security update
- USN-4191-1
- USN-4191-1
- USN-4191-2
- USN-4191-2
- DSA-4616
- DSA-4616
Modified: 2024-11-21
CVE-2019-20382
QEMU 4.1.0 has a memory leak in zrle_compress_data in ui/vnc-enc-zrle.c during a VNC disconnect operation because libz is misused, resulting in a situation where memory allocated in deflateInit2 is not freed in deflateEnd.
- openSUSE-SU-2020:0468
- openSUSE-SU-2020:0468
- http://www.openwall.com/lists/oss-security/2020/03/05/1
- http://www.openwall.com/lists/oss-security/2020/03/05/1
- https://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=6bf21f3d83e95bcc4ba35a7a07cc6655e8b010b0
- https://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=6bf21f3d83e95bcc4ba35a7a07cc6655e8b010b0
- [debian-lts-announce] 20200726 [SECURITY] [DLA 2288-1] qemu security update
- [debian-lts-announce] 20200726 [SECURITY] [DLA 2288-1] qemu security update
- USN-4372-1
- USN-4372-1
- DSA-4665
- DSA-4665
Modified: 2024-11-21
CVE-2019-20808
In QEMU 4.1.0, an out-of-bounds read flaw was found in the ATI VGA implementation. It occurs in the ati_cursor_define() routine while handling MMIO write operations through the ati_mm_write() callback. A malicious guest could abuse this flaw to crash the QEMU process, resulting in a denial of service.
- https://bugzilla.redhat.com/show_bug.cgi?id=1841136
- https://bugzilla.redhat.com/show_bug.cgi?id=1841136
- https://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=aab0e2a661b2b6bf7915c0aefe807fb60d6d9d13
- https://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=aab0e2a661b2b6bf7915c0aefe807fb60d6d9d13
- https://security.netapp.com/advisory/ntap-20210205-0003/
- https://security.netapp.com/advisory/ntap-20210205-0003/
Modified: 2024-11-21
CVE-2020-11947
iscsi_aio_ioctl_cb in block/iscsi.c in QEMU 4.1.0 has a heap-based buffer over-read that may disclose unrelated information from process memory to an attacker.
- [oss-security] 20210113 CVE-2020-11947 QEMU: heap buffer overflow in iSCSI block driver may lead to information disclosure
- https://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=ff0507c239a246fd7215b31c5658fc6a3ee1e4c5
- https://security.netapp.com/advisory/ntap-20210212-0001/
- [oss-security] 20210113 CVE-2020-11947 QEMU: heap buffer overflow in iSCSI block driver may lead to information disclosure
- https://security.netapp.com/advisory/ntap-20210212-0001/
- https://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=ff0507c239a246fd7215b31c5658fc6a3ee1e4c5
Modified: 2024-11-21
CVE-2020-13765
rom_copy() in hw/core/loader.c in QEMU 4.0 and 4.1.0 does not validate the relationship between two addresses, which allows attackers to trigger an invalid memory copy operation.
- https://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=e423455c4f23a1a828901c78fe6d03b7dde79319
- https://github.com/qemu/qemu/commit/4f1c6cb2f9afafda05eab150fd2bd284edce6676
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2262-1] qemu security update
- [debian-lts-announce] 20200726 [SECURITY] [DLA 2288-1] qemu security update
- https://security.netapp.com/advisory/ntap-20200619-0006/
- USN-4467-1
- https://www.openwall.com/lists/oss-security/2020/06/03/6
- https://git.qemu.org/?p=qemu.git%3Ba=commit%3Bh=e423455c4f23a1a828901c78fe6d03b7dde79319
- https://www.openwall.com/lists/oss-security/2020/06/03/6
- USN-4467-1
- https://security.netapp.com/advisory/ntap-20200619-0006/
- [debian-lts-announce] 20200726 [SECURITY] [DLA 2288-1] qemu security update
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2262-1] qemu security update
- https://github.com/qemu/qemu/commit/4f1c6cb2f9afafda05eab150fd2bd284edce6676
Closed vulnerabilities
BDU:2021-05799
Уязвимость функции sldns_str2wire_dname_buf_origin DNS-сервера Unbound, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-05838
Уязвимость функции rdata_copy DNS-сервера Unbound, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-05865
Уязвимость макроса ALIGN_UP DNS-сервера Unbound, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-05875
Уязвимость функции dname_pkt_copy DNS-сервера Unbound, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-05909
Уязвимость функции ub_packed_rrset_key DNS-сервера Unbound, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-06226
Уязвимость функции synth_cname() DNS-сервера Unbound, связанная с недостатком использования функции assert(), позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-06245
Уязвимость функции dnsc_load_local_data DNS-сервера Unbound, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-06246
Уязвимость функции dname_pkt_copy DNS-сервера Unbound, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-06248
Уязвимость функции dname_pkt_copy DNS-сервера Unbound, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06879
Уязвимость модуля ipsec DNS-сервера Unbound, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-06882
Уязвимость компонента create_unbound_ad_servers.sh DNS-сервера Unbound, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2022-06885
Уязвимость функции sldns_bget_token_par DNS-сервера Unbound, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-06886
Уязвимость функции regional_alloc компонента util/regional.c DNS-сервера Unbound, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-18934
Unbound 1.6.4 through 1.9.4 contain a vulnerability in the ipsec module that can cause shell code execution after receiving a specially crafted answer. This issue can only be triggered if unbound was compiled with `--enable-ipsecmod` support, and ipsecmod is enabled and used in the configuration.
- openSUSE-SU-2020:0913
- openSUSE-SU-2020:0913
- openSUSE-SU-2020:0912
- openSUSE-SU-2020:0912
- [oss-security] 20191119 CVE-2019-18934 Unbound: Vulnerability in IPSEC module
- [oss-security] 20191119 CVE-2019-18934 Unbound: Vulnerability in IPSEC module
- https://github.com/NLnetLabs/unbound/blob/release-1.9.5/doc/Changelog
- https://github.com/NLnetLabs/unbound/blob/release-1.9.5/doc/Changelog
- FEDORA-2019-a29e620cd4
- FEDORA-2019-a29e620cd4
- https://www.nlnetlabs.nl/downloads/unbound/CVE-2019-18934.txt
- https://www.nlnetlabs.nl/downloads/unbound/CVE-2019-18934.txt
- https://www.nlnetlabs.nl/news/2019/Nov/19/unbound-1.9.5-released/
- https://www.nlnetlabs.nl/news/2019/Nov/19/unbound-1.9.5-released/
Modified: 2024-11-21
CVE-2019-25031
Unbound before 1.9.5 allows configuration injection in create_unbound_ad_servers.sh upon a successful man-in-the-middle attack against a cleartext HTTP session. NOTE: The vendor does not consider this a vulnerability of the Unbound software. create_unbound_ad_servers.sh is a contributed script from the community that facilitates automatic configuration creation. It is not part of the Unbound installation
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update
- https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
- https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
- https://security.netapp.com/advisory/ntap-20210507-0007/
- https://security.netapp.com/advisory/ntap-20210507-0007/
Modified: 2024-11-21
CVE-2019-25032
Unbound before 1.9.5 allows an integer overflow in the regional allocator via regional_alloc. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update
- https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
- https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
- https://security.netapp.com/advisory/ntap-20210507-0007/
- https://security.netapp.com/advisory/ntap-20210507-0007/
Modified: 2024-11-21
CVE-2019-25033
Unbound before 1.9.5 allows an integer overflow in the regional allocator via the ALIGN_UP macro. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update
- https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
- https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
- https://security.netapp.com/advisory/ntap-20210507-0007/
- https://security.netapp.com/advisory/ntap-20210507-0007/
Modified: 2024-11-21
CVE-2019-25034
Unbound before 1.9.5 allows an integer overflow in sldns_str2wire_dname_buf_origin, leading to an out-of-bounds write. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update
- https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
- https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
- https://security.netapp.com/advisory/ntap-20210507-0007/
- https://security.netapp.com/advisory/ntap-20210507-0007/
Modified: 2024-11-21
CVE-2019-25035
Unbound before 1.9.5 allows an out-of-bounds write in sldns_bget_token_par. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update
- https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
- https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
- https://security.netapp.com/advisory/ntap-20210507-0007/
- https://security.netapp.com/advisory/ntap-20210507-0007/
Modified: 2024-11-21
CVE-2019-25036
Unbound before 1.9.5 allows an assertion failure and denial of service in synth_cname. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update
- https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
- https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
- https://security.netapp.com/advisory/ntap-20210507-0007/
- https://security.netapp.com/advisory/ntap-20210507-0007/
Modified: 2024-11-21
CVE-2019-25037
Unbound before 1.9.5 allows an assertion failure and denial of service in dname_pkt_copy via an invalid packet. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update
- https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
- https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
- https://security.netapp.com/advisory/ntap-20210507-0007/
- https://security.netapp.com/advisory/ntap-20210507-0007/
Modified: 2024-11-21
CVE-2019-25038
Unbound before 1.9.5 allows an integer overflow in a size calculation in dnscrypt/dnscrypt.c. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update
- https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
- https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
- https://security.netapp.com/advisory/ntap-20210507-0007/
- https://security.netapp.com/advisory/ntap-20210507-0007/
Modified: 2024-11-21
CVE-2019-25039
Unbound before 1.9.5 allows an integer overflow in a size calculation in respip/respip.c. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update
- https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
- https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
- https://security.netapp.com/advisory/ntap-20210507-0007/
- https://security.netapp.com/advisory/ntap-20210507-0007/
Modified: 2024-11-21
CVE-2019-25040
Unbound before 1.9.5 allows an infinite loop via a compressed name in dname_pkt_copy. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update
- https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
- https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
- https://security.netapp.com/advisory/ntap-20210507-0007/
- https://security.netapp.com/advisory/ntap-20210507-0007/
Modified: 2024-11-21
CVE-2019-25041
Unbound before 1.9.5 allows an assertion failure via a compressed name in dname_pkt_copy. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update
- https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
- https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
- https://security.netapp.com/advisory/ntap-20210507-0007/
- https://security.netapp.com/advisory/ntap-20210507-0007/
Modified: 2024-11-21
CVE-2019-25042
Unbound before 1.9.5 allows an out-of-bounds write via a compressed name in rdata_copy. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update
- https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
- https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
- https://security.netapp.com/advisory/ntap-20210507-0007/
- https://security.netapp.com/advisory/ntap-20210507-0007/
Closed bugs
Не работают иконки в контекстном меню.
Closed bugs
Воспроизводимый segmentation fault