ALT-BU-2019-4125-1
Branch sisyphus update bulletin.
Package virtualbox updated to version 5.2.34-alt3 for branch sisyphus in task 242216.
Closed bugs
License for Virtualbox
Closed vulnerabilities
BDU:2021-05799
Уязвимость функции sldns_str2wire_dname_buf_origin DNS-сервера Unbound, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-05838
Уязвимость функции rdata_copy DNS-сервера Unbound, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-05865
Уязвимость макроса ALIGN_UP DNS-сервера Unbound, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-05875
Уязвимость функции dname_pkt_copy DNS-сервера Unbound, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-05909
Уязвимость функции ub_packed_rrset_key DNS-сервера Unbound, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-06226
Уязвимость функции synth_cname() DNS-сервера Unbound, связанная с недостатком использования функции assert(), позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-06245
Уязвимость функции dnsc_load_local_data DNS-сервера Unbound, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-06246
Уязвимость функции dname_pkt_copy DNS-сервера Unbound, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-06248
Уязвимость функции dname_pkt_copy DNS-сервера Unbound, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06879
Уязвимость модуля ipsec DNS-сервера Unbound, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-06882
Уязвимость компонента create_unbound_ad_servers.sh DNS-сервера Unbound, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2022-06885
Уязвимость функции sldns_bget_token_par DNS-сервера Unbound, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-06886
Уязвимость функции regional_alloc компонента util/regional.c DNS-сервера Unbound, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-18934
Unbound 1.6.4 through 1.9.4 contain a vulnerability in the ipsec module that can cause shell code execution after receiving a specially crafted answer. This issue can only be triggered if unbound was compiled with `--enable-ipsecmod` support, and ipsecmod is enabled and used in the configuration.
- openSUSE-SU-2020:0913
- openSUSE-SU-2020:0913
- openSUSE-SU-2020:0912
- openSUSE-SU-2020:0912
- [oss-security] 20191119 CVE-2019-18934 Unbound: Vulnerability in IPSEC module
- [oss-security] 20191119 CVE-2019-18934 Unbound: Vulnerability in IPSEC module
- https://github.com/NLnetLabs/unbound/blob/release-1.9.5/doc/Changelog
- https://github.com/NLnetLabs/unbound/blob/release-1.9.5/doc/Changelog
- FEDORA-2019-a29e620cd4
- FEDORA-2019-a29e620cd4
- https://www.nlnetlabs.nl/downloads/unbound/CVE-2019-18934.txt
- https://www.nlnetlabs.nl/downloads/unbound/CVE-2019-18934.txt
- https://www.nlnetlabs.nl/news/2019/Nov/19/unbound-1.9.5-released/
- https://www.nlnetlabs.nl/news/2019/Nov/19/unbound-1.9.5-released/
Modified: 2024-11-21
CVE-2019-25031
Unbound before 1.9.5 allows configuration injection in create_unbound_ad_servers.sh upon a successful man-in-the-middle attack against a cleartext HTTP session. NOTE: The vendor does not consider this a vulnerability of the Unbound software. create_unbound_ad_servers.sh is a contributed script from the community that facilitates automatic configuration creation. It is not part of the Unbound installation
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update
- https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
- https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
- https://security.netapp.com/advisory/ntap-20210507-0007/
- https://security.netapp.com/advisory/ntap-20210507-0007/
Modified: 2024-11-21
CVE-2019-25032
Unbound before 1.9.5 allows an integer overflow in the regional allocator via regional_alloc. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update
- https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
- https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
- https://security.netapp.com/advisory/ntap-20210507-0007/
- https://security.netapp.com/advisory/ntap-20210507-0007/
Modified: 2024-11-21
CVE-2019-25033
Unbound before 1.9.5 allows an integer overflow in the regional allocator via the ALIGN_UP macro. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update
- https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
- https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
- https://security.netapp.com/advisory/ntap-20210507-0007/
- https://security.netapp.com/advisory/ntap-20210507-0007/
Modified: 2024-11-21
CVE-2019-25034
Unbound before 1.9.5 allows an integer overflow in sldns_str2wire_dname_buf_origin, leading to an out-of-bounds write. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update
- https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
- https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
- https://security.netapp.com/advisory/ntap-20210507-0007/
- https://security.netapp.com/advisory/ntap-20210507-0007/
Modified: 2024-11-21
CVE-2019-25035
Unbound before 1.9.5 allows an out-of-bounds write in sldns_bget_token_par. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update
- https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
- https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
- https://security.netapp.com/advisory/ntap-20210507-0007/
- https://security.netapp.com/advisory/ntap-20210507-0007/
Modified: 2024-11-21
CVE-2019-25036
Unbound before 1.9.5 allows an assertion failure and denial of service in synth_cname. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update
- https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
- https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
- https://security.netapp.com/advisory/ntap-20210507-0007/
- https://security.netapp.com/advisory/ntap-20210507-0007/
Modified: 2024-11-21
CVE-2019-25037
Unbound before 1.9.5 allows an assertion failure and denial of service in dname_pkt_copy via an invalid packet. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update
- https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
- https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
- https://security.netapp.com/advisory/ntap-20210507-0007/
- https://security.netapp.com/advisory/ntap-20210507-0007/
Modified: 2024-11-21
CVE-2019-25038
Unbound before 1.9.5 allows an integer overflow in a size calculation in dnscrypt/dnscrypt.c. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update
- https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
- https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
- https://security.netapp.com/advisory/ntap-20210507-0007/
- https://security.netapp.com/advisory/ntap-20210507-0007/
Modified: 2024-11-21
CVE-2019-25039
Unbound before 1.9.5 allows an integer overflow in a size calculation in respip/respip.c. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update
- https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
- https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
- https://security.netapp.com/advisory/ntap-20210507-0007/
- https://security.netapp.com/advisory/ntap-20210507-0007/
Modified: 2024-11-21
CVE-2019-25040
Unbound before 1.9.5 allows an infinite loop via a compressed name in dname_pkt_copy. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update
- https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
- https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
- https://security.netapp.com/advisory/ntap-20210507-0007/
- https://security.netapp.com/advisory/ntap-20210507-0007/
Modified: 2024-11-21
CVE-2019-25041
Unbound before 1.9.5 allows an assertion failure via a compressed name in dname_pkt_copy. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update
- https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
- https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
- https://security.netapp.com/advisory/ntap-20210507-0007/
- https://security.netapp.com/advisory/ntap-20210507-0007/
Modified: 2024-11-21
CVE-2019-25042
Unbound before 1.9.5 allows an out-of-bounds write via a compressed name in rdata_copy. NOTE: The vendor disputes that this is a vulnerability. Although the code may be vulnerable, a running Unbound installation cannot be remotely or locally exploited
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2652-1] unbound1.9 security update
- https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
- https://ostif.org/our-audit-of-unbound-dns-by-x41-d-sec-full-results/
- https://security.netapp.com/advisory/ntap-20210507-0007/
- https://security.netapp.com/advisory/ntap-20210507-0007/
Package cryptsetup updated to version 2.2.2-alt1 for branch sisyphus in task 242851.
Closed vulnerabilities
BDU:2023-01662
Уязвимость функции hdr_validate_segments() компонента lib/luks2/luks2_json_metadata.c программы шифрования диска Cryptsetup, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-14382
A vulnerability was found in upstream release cryptsetup-2.2.0 where, there's a bug in LUKS2 format validation code, that is effectively invoked on every device/image presenting itself as LUKS2 container. The bug is in segments validation code in file 'lib/luks2/luks2_json_metadata.c' in function hdr_validate_segments(struct crypt_device *cd, json_object *hdr_jobj) where the code does not check for possible overflow on memory allocation used for intervals array (see statement "intervals = malloc(first_backup * sizeof(*intervals));"). Due to the bug, library can be *tricked* to expect such allocation was successful but for far less memory then originally expected. Later it may read data FROM image crafted by an attacker and actually write such data BEYOND allocated memory.