ALT-BU-2020-3652-13
Branch p9 update bulletin.
Closed vulnerabilities
BDU:2020-01278
Уязвимость реализации класса PHP DirectoryIterator интерпретатора языка программирования PHP, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2020-01291
Уязвимость функции exif_read_data интерпретатора языка программирования PHP, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании
BDU:2020-01391
Уязвимость функции mbstring() интерпретатора языка программирования PHP, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
BDU:2020-01446
Уязвимость функции fgetss() языка сценариев общего назначения с открытым исходным кодом PHP, связанная с чтением за границами буфера памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
BDU:2020-01688
Уязвимость функции link интерпретатора языка программирования PHP, позволяющая нарушителю получить несанкционированный доступ к информации
BDU:2020-01689
Уязвимость интерпретатора языка программирования PHP, связанная с чтение за границами буфера памяти, позволяющая нарушителю получить несанкционированный доступ к информации
BDU:2020-05769
Уязвимость функции mbfl_filt_conv_big5_wchar интерпретатора PHP, позволяющая нарушителю получить доступ к защищаемой информации или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-11044
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 on Windows, PHP link() function accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.
- https://bugs.php.net/bug.php?id=78862
- https://bugs.php.net/bug.php?id=78862
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2019-11045
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP DirectoryIterator class accepts filenames with embedded \0 byte and treats them as terminating at that byte. This could lead to security vulnerabilities, e.g. in applications checking paths that the code is allowed to access.
- openSUSE-SU-2020:0080
- openSUSE-SU-2020:0080
- https://bugs.php.net/bug.php?id=78863
- https://bugs.php.net/bug.php?id=78863
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- USN-4239-1
- USN-4239-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2019-11046
In PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0, PHP bcmath extension functions on some systems, including Windows, can be tricked into reading beyond the allocated space by supplying it with string containing characters that are identified as numeric by the OS but aren't ASCII numbers. This can read to disclosure of the content of some memory locations.
- openSUSE-SU-2020:0080
- openSUSE-SU-2020:0080
- https://bugs.php.net/bug.php?id=78878
- https://bugs.php.net/bug.php?id=78878
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://support.f5.com/csp/article/K48866433?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K48866433?utm_source=f5support&%3Butm_medium=RSS
- USN-4239-1
- USN-4239-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2019-11050
When PHP EXIF extension is parsing EXIF information from an image, e.g. via exif_read_data() function, in PHP versions 7.2.x below 7.2.26, 7.3.x below 7.3.13 and 7.4.0 it is possible to supply it with data what will cause it to read past the allocated buffer. This may lead to information disclosure or crash.
- openSUSE-SU-2020:0080
- openSUSE-SU-2020:0080
- https://bugs.php.net/bug.php?id=78793
- https://bugs.php.net/bug.php?id=78793
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- [debian-lts-announce] 20191229 [SECURITY] [DLA 2050-1] php5 security update
- FEDORA-2019-437d94e271
- FEDORA-2019-437d94e271
- FEDORA-2019-a54a622670
- FEDORA-2019-a54a622670
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- https://security.netapp.com/advisory/ntap-20200103-0002/
- https://security.netapp.com/advisory/ntap-20200103-0002/
- USN-4239-1
- USN-4239-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2020-7059
When using fgetss() function to read data with stripping tags, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause this function to read past the allocated buffer. This may lead to information disclosure or crash.
- openSUSE-SU-2020:0341
- openSUSE-SU-2020:0341
- https://bugs.php.net/bug.php?id=79099
- https://bugs.php.net/bug.php?id=79099
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- GLSA-202003-57
- GLSA-202003-57
- https://security.netapp.com/advisory/ntap-20200221-0002/
- https://security.netapp.com/advisory/ntap-20200221-0002/
- USN-4279-1
- USN-4279-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Modified: 2024-11-21
CVE-2020-7060
When using certain mbstring functions to convert multibyte encodings, in PHP versions 7.2.x below 7.2.27, 7.3.x below 7.3.14 and 7.4.x below 7.4.2 it is possible to supply data that will cause function mbfl_filt_conv_big5_wchar to read past the allocated buffer. This may lead to information disclosure or crash.
- openSUSE-SU-2020:0341
- openSUSE-SU-2020:0341
- https://bugs.php.net/bug.php?id=79037
- https://bugs.php.net/bug.php?id=79037
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- [debian-lts-announce] 20200228 [SECURITY] [DLA 2124-1] php5 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200218 [SECURITY] [DSA 4626-1] php7.3 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20200219 [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- 20210116 Re: [SECURITY] [DSA 4628-1] php7.0 security update
- GLSA-202003-57
- GLSA-202003-57
- https://security.netapp.com/advisory/ntap-20200221-0002/
- https://security.netapp.com/advisory/ntap-20200221-0002/
- USN-4279-1
- USN-4279-1
- DSA-4626
- DSA-4626
- DSA-4628
- DSA-4628
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Closed bugs
Некорректно отображается пункт программы в меню xfce (все на английском)
Package alterator-luks updated to version 0.3.1-alt2 for branch p9 in task 243475.
Closed bugs
fails to setup a password for the LUKS partition properly
Closed vulnerabilities
BDU:2020-01598
Уязвимость реализации механизма HMAC-SHA-256 криптографической библиотеки GnuTLS, позволяющая нарушителю осуществить атаку типа «Lucky 13» и атаку с восстановлением открытого текста
BDU:2020-01599
Уязвимость реализации механизма HMAC-SHA-384 криптографической библиотеки GnuTLS, позволяющая нарушителю осуществить атаку типа «Lucky 13» и атаку с восстановлением открытого текста
Modified: 2024-11-21
CVE-2018-10844
It was found that the GnuTLS implementation of HMAC-SHA-256 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plaintext-recovery attacks via statistical analysis of timing data using crafted packets.
- 105138
- 105138
- RHSA-2018:3050
- RHSA-2018:3050
- RHSA-2018:3505
- RHSA-2018:3505
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10844
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10844
- https://eprint.iacr.org/2018/747
- https://eprint.iacr.org/2018/747
- https://gitlab.com/gnutls/gnutls/merge_requests/657
- https://gitlab.com/gnutls/gnutls/merge_requests/657
- [debian-lts-announce] 20181030 [SECURITY] [DLA 1560-1] gnutls28 security update
- [debian-lts-announce] 20181030 [SECURITY] [DLA 1560-1] gnutls28 security update
- FEDORA-2020-d14280a6e8
- FEDORA-2020-d14280a6e8
- FEDORA-2020-f90fb78f70
- FEDORA-2020-f90fb78f70
- USN-3999-1
- USN-3999-1
Modified: 2024-11-21
CVE-2018-10845
It was found that the GnuTLS implementation of HMAC-SHA-384 was vulnerable to a Lucky thirteen style attack. Remote attackers could use this flaw to conduct distinguishing attacks and plain text recovery attacks via statistical analysis of timing data using crafted packets.
- 105138
- 105138
- RHSA-2018:3050
- RHSA-2018:3050
- RHSA-2018:3505
- RHSA-2018:3505
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10845
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10845
- https://eprint.iacr.org/2018/747
- https://eprint.iacr.org/2018/747
- https://gitlab.com/gnutls/gnutls/merge_requests/657
- https://gitlab.com/gnutls/gnutls/merge_requests/657
- [debian-lts-announce] 20181030 [SECURITY] [DLA 1560-1] gnutls28 security update
- [debian-lts-announce] 20181030 [SECURITY] [DLA 1560-1] gnutls28 security update
- FEDORA-2020-d14280a6e8
- FEDORA-2020-d14280a6e8
- FEDORA-2020-f90fb78f70
- FEDORA-2020-f90fb78f70
- USN-3999-1
- USN-3999-1
Modified: 2024-11-21
CVE-2018-10846
A cache-based side channel in GnuTLS implementation that leads to plain text recovery in cross-VM attack setting was found. An attacker could use a combination of "Just in Time" Prime+probe attack in combination with Lucky-13 attack to recover plain text using crafted packets.
- 105138
- 105138
- RHSA-2018:3050
- RHSA-2018:3050
- RHSA-2018:3505
- RHSA-2018:3505
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10846
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10846
- https://eprint.iacr.org/2018/747
- https://eprint.iacr.org/2018/747
- https://gitlab.com/gnutls/gnutls/merge_requests/657
- https://gitlab.com/gnutls/gnutls/merge_requests/657
- [debian-lts-announce] 20181030 [SECURITY] [DLA 1560-1] gnutls28 security update
- [debian-lts-announce] 20181030 [SECURITY] [DLA 1560-1] gnutls28 security update
- FEDORA-2020-d14280a6e8
- FEDORA-2020-d14280a6e8
- FEDORA-2020-f90fb78f70
- FEDORA-2020-f90fb78f70
- USN-3999-1
- USN-3999-1
Closed bugs
[FR] Обновить до свежей версии
Обновить до последней версии
Package firefox-esr updated to version 68.5.0-alt1 for branch p9 in task 245948.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-6796
A content process could have modified shared memory relating to crash reporting information, crash itself, and cause an out-of-bound write. This could have caused memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 73 and Firefox < ESR68.5.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1610426
- https://bugzilla.mozilla.org/show_bug.cgi?id=1610426
- GLSA-202003-02
- GLSA-202003-02
- USN-4278-2
- USN-4278-2
- https://www.mozilla.org/security/advisories/mfsa2020-05/
- https://www.mozilla.org/security/advisories/mfsa2020-05/
- https://www.mozilla.org/security/advisories/mfsa2020-06/
- https://www.mozilla.org/security/advisories/mfsa2020-06/
Modified: 2024-11-21
CVE-2020-6797
By downloading a file with the .fileloc extension, a semi-privileged extension could launch an arbitrary application on the user's computer. The attacker is restricted as they are unable to download non-quarantined files or supply command line arguments to the application, limiting the impact. Note: this issue only occurs on Mac OSX. Other operating systems are unaffected. This vulnerability affects Thunderbird < 68.5, Firefox < 73, and Firefox < ESR68.5.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1596668
- https://bugzilla.mozilla.org/show_bug.cgi?id=1596668
- GLSA-202003-02
- GLSA-202003-02
- https://www.mozilla.org/security/advisories/mfsa2020-05/
- https://www.mozilla.org/security/advisories/mfsa2020-05/
- https://www.mozilla.org/security/advisories/mfsa2020-06/
- https://www.mozilla.org/security/advisories/mfsa2020-06/
- https://www.mozilla.org/security/advisories/mfsa2020-07/
- https://www.mozilla.org/security/advisories/mfsa2020-07/
Modified: 2024-11-21
CVE-2020-6798
If a template tag was used in a select tag, the parser could be confused and allow JavaScript parsing and execution when it should not be allowed. A site that relied on the browser behaving correctly could suffer a cross-site scripting vulnerability as a result. In general, this flaw cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but is potentially a risk in browser or browser-like contexts. This vulnerability affects Thunderbird < 68.5, Firefox < 73, and Firefox < ESR68.5.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1602944
- https://bugzilla.mozilla.org/show_bug.cgi?id=1602944
- GLSA-202003-02
- GLSA-202003-02
- GLSA-202003-10
- GLSA-202003-10
- USN-4278-2
- USN-4278-2
- USN-4328-1
- USN-4328-1
- USN-4335-1
- USN-4335-1
- https://www.mozilla.org/security/advisories/mfsa2020-05/
- https://www.mozilla.org/security/advisories/mfsa2020-05/
- https://www.mozilla.org/security/advisories/mfsa2020-06/
- https://www.mozilla.org/security/advisories/mfsa2020-06/
- https://www.mozilla.org/security/advisories/mfsa2020-07/
- https://www.mozilla.org/security/advisories/mfsa2020-07/
Modified: 2024-11-21
CVE-2020-6799
Command line arguments could have been injected during Firefox invocation as a shell handler for certain unsupported file types. This required Firefox to be configured as the default handler for a given file type and for a file downloaded to be opened in a third party application that insufficiently sanitized URL data. In that situation, clicking a link in the third party application could have been used to retrieve and execute files whose location was supplied through command line arguments. Note: This issue only affects Windows operating systems and when Firefox is configured as the default handler for non-default filetypes. Other operating systems are unaffected. This vulnerability affects Firefox < 73 and Firefox < ESR68.5.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1606596
- https://bugzilla.mozilla.org/show_bug.cgi?id=1606596
- GLSA-202003-02
- GLSA-202003-02
- https://www.mozilla.org/security/advisories/mfsa2020-05/
- https://www.mozilla.org/security/advisories/mfsa2020-05/
- https://www.mozilla.org/security/advisories/mfsa2020-06/
- https://www.mozilla.org/security/advisories/mfsa2020-06/
Modified: 2024-11-21
CVE-2020-6800
Mozilla developers and community members reported memory safety bugs present in Firefox 72 and Firefox ESR 68.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. In general, these flaws cannot be exploited through email in the Thunderbird product because scripting is disabled when reading mail, but are potentially risks in browser or browser-like contexts. This vulnerability affects Thunderbird < 68.5, Firefox < 73, and Firefox < ESR68.5.
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1595786%2C1596706%2C1598543%2C1604851%2C1608580%2C1608785%2C1605777
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1595786%2C1596706%2C1598543%2C1604851%2C1608580%2C1608785%2C1605777
- GLSA-202003-02
- GLSA-202003-02
- GLSA-202003-10
- GLSA-202003-10
- USN-4278-2
- USN-4278-2
- USN-4328-1
- USN-4328-1
- USN-4335-1
- USN-4335-1
- https://www.mozilla.org/security/advisories/mfsa2020-05/
- https://www.mozilla.org/security/advisories/mfsa2020-05/
- https://www.mozilla.org/security/advisories/mfsa2020-06/
- https://www.mozilla.org/security/advisories/mfsa2020-06/
- https://www.mozilla.org/security/advisories/mfsa2020-07/
- https://www.mozilla.org/security/advisories/mfsa2020-07/