ALT-BU-2019-4143-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2021-03617
Уязвимость программного средства управления ресурсами кластера Pacemaker, связанная с недостатками контроля доступа, позволяющая нарушителю получить доступ к конфиденциальной информации или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-25654
An ACL bypass flaw was found in pacemaker. An attacker having a local account on the cluster and in the haclient group could use IPC communication with various daemons directly to perform certain tasks that they would be prevented by ACLs from doing if they went through the configuration.
- https://bugzilla.redhat.com/show_bug.cgi?id=1888191
- https://bugzilla.redhat.com/show_bug.cgi?id=1888191
- https://lists.clusterlabs.org/pipermail/users/2020-October/027840.html
- https://lists.clusterlabs.org/pipermail/users/2020-October/027840.html
- [debian-lts-announce] 20210106 [SECURITY] [DLA 2519-1] pacemaker security update
- [debian-lts-announce] 20210106 [SECURITY] [DLA 2519-1] pacemaker security update
- https://seclists.org/oss-sec/2020/q4/83
- https://seclists.org/oss-sec/2020/q4/83
- GLSA-202309-09
- GLSA-202309-09
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-19590
In radare2 through 4.0, there is an integer overflow for the variable new_token_size in the function r_asm_massemble at libr/asm/asm.c. This integer overflow will result in a Use-After-Free for the buffer tokens, which can be filled with arbitrary malicious data after the free. This allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted input.
Modified: 2024-11-21
CVE-2019-19647
radare2 through 4.0.0 lacks validation of the content variable in the function r_asm_pseudo_incbin at libr/asm/asm.c, ultimately leading to an arbitrary write. This allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via crafted input.
Closed bugs
Не коннектится к mysql8: ошибка упаковки
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-1121
procps-ng, procps is vulnerable to a process hiding through race condition. Since the kernel's proc_pid_readdir() returns PID entries in ascending numeric order, a process occupying a high PID can use inotify events to determine when the process list is being scanned, and fork/exec to obtain a lower PID, thus avoiding enumeration. An unprivileged attacker can hide a process from procps-ng's utilities by exploiting a race condition in reading /proc/PID entries. This vulnerability affects procps and procps-ng up to version 3.3.15, newer versions might be affected also.
- [oss-security] 20180517 Qualys Security Advisory - Procps-ng Audit Report
- [oss-security] 20180517 Qualys Security Advisory - Procps-ng Audit Report
- 104214
- 104214
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1121
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1121
- 44806
- 44806
- https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
- https://www.qualys.com/2018/05/17/procps-ng-audit-report-advisory.txt
Closed vulnerabilities
BDU:2020-01328
Уязвимость функции fribidi_get_par_embedding_levels_ex() (lib/fribidi-bidi.c) библиотеки GNU FriBidi, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
Modified: 2024-11-21
CVE-2019-18397
A buffer overflow in the fribidi_get_par_embedding_levels_ex() function in lib/fribidi-bidi.c of GNU FriBidi through 1.0.7 allows an attacker to cause a denial of service or possibly execute arbitrary code by delivering crafted text content to a user, when this content is then rendered by an application that uses FriBidi for text layout calculations. Examples include any GNOME or GTK+ based application that uses Pango for text layout, as this internally uses FriBidi for bidirectional text layout. For example, the attacker can construct a crafted text file to be opened in GEdit, or a crafted IRC message to be viewed in HexChat.
- RHSA-2019:4326
- RHSA-2019:4326
- RHSA-2019:4361
- RHSA-2019:4361
- RHSA-2020:0291
- RHSA-2020:0291
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=944327
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=944327
- https://github.com/fribidi/fribidi/commit/034c6e9a1d296286305f4cfd1e0072b879f52568
- https://github.com/fribidi/fribidi/commit/034c6e9a1d296286305f4cfd1e0072b879f52568
- FEDORA-2019-533a72fec5
- FEDORA-2019-533a72fec5
- FEDORA-2019-7075bc4ff8
- FEDORA-2019-7075bc4ff8
- https://marc.info/?l=oss-security&m=157322128105807&w=2
- https://marc.info/?l=oss-security&m=157322128105807&w=2
- GLSA-202003-41
- GLSA-202003-41
- https://security-tracker.debian.org/tracker/CVE-2019-18397
- https://security-tracker.debian.org/tracker/CVE-2019-18397
Package update-kernel updated to version 0.9.15-alt1 for branch sisyphus in task 243263.
Closed bugs
remove-old-kernels не удаляет старые ядра для каждого FLAVOR
Удаляет все подряд ядра одного FLAVOR
Closed vulnerabilities
BDU:2020-02039
Уязвимость системы инициализации Linux systemd, связанная с обращением к памяти после ее освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-1712
A heap use-after-free vulnerability was found in systemd before version v245-rc1, where asynchronous Polkit queries are performed while handling dbus messages. A local unprivileged attacker can abuse this flaw to crash systemd services or potentially execute code and elevate their privileges, by sending specially crafted dbus messages.
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1712
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1712
- https://github.com/systemd/systemd/commit/1068447e6954dc6ce52f099ed174c442cb89ed54
- https://github.com/systemd/systemd/commit/1068447e6954dc6ce52f099ed174c442cb89ed54
- https://github.com/systemd/systemd/commit/637486261528e8aa3da9f26a4487dc254f4b7abb
- https://github.com/systemd/systemd/commit/637486261528e8aa3da9f26a4487dc254f4b7abb
- https://github.com/systemd/systemd/commit/bc130b6858327b382b07b3985cf48e2aa9016b2d
- https://github.com/systemd/systemd/commit/bc130b6858327b382b07b3985cf48e2aa9016b2d
- https://github.com/systemd/systemd/commit/ea0d0ede03c6f18dbc5036c5e9cccf97e415ccc2
- https://github.com/systemd/systemd/commit/ea0d0ede03c6f18dbc5036c5e9cccf97e415ccc2
- [debian-lts-announce] 20220630 [SECURITY] [DLA 3063-1] systemd security update
- [debian-lts-announce] 20220630 [SECURITY] [DLA 3063-1] systemd security update
- https://www.openwall.com/lists/oss-security/2020/02/05/1
- https://www.openwall.com/lists/oss-security/2020/02/05/1
Package kubernetes updated to version 1.16.4-alt1 for branch sisyphus in task 243355.
Closed vulnerabilities
BDU:2020-00025
Уязвимость библиотеки синтаксического анализатора YAML программного средства управления кластерами виртуальных машин Kubernetes, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-11253
Improper input validation in the Kubernetes API server in versions v1.0-1.12 and versions prior to v1.13.12, v1.14.8, v1.15.5, and v1.16.2 allows authorized users to send malicious YAML or JSON payloads, causing the API server to consume excessive CPU or memory, potentially crashing and becoming unavailable. Prior to v1.14.0, default RBAC policy authorized anonymous users to submit requests that could trigger this vulnerability. Clusters upgraded from a version prior to v1.14.0 keep the more permissive policy by default for backwards compatibility.
- RHSA-2019:3239
- RHSA-2019:3239
- RHSA-2019:3811
- RHSA-2019:3811
- RHSA-2019:3905
- RHSA-2019:3905
- https://github.com/kubernetes/kubernetes/issues/83253
- https://github.com/kubernetes/kubernetes/issues/83253
- CVE-2019-11253: denial of service vulnerability from malicious YAML or JSON payloads
- CVE-2019-11253: denial of service vulnerability from malicious YAML or JSON payloads
- https://security.netapp.com/advisory/ntap-20191031-0006/
- https://security.netapp.com/advisory/ntap-20191031-0006/