ALT-BU-2020-3702-1
Branch p9 update bulletin.
Closed vulnerabilities
BDU:2020-02164
Уязвимость системы управления конфигурациями Ansible, связана с раскрытием информации через регистрационные файлы, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2020-02200
Уязвимость системы управления конфигурациями Ansible, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2020-02201
Уязвимость системы управления конфигурациями Ansible, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2020-03324
Уязвимость модулей Splunk и Sumologic системы управления конфигурациями Ansible, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2020-05681
Уязвимость модуля win_unzip системы управления конфигурациями Ansible, связанная с неверным ограничением имени пути к каталогу с ограниченным доступом, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2020-05762
Уязвимость системы управления конфигурациями Ansible, связанная с неприятием мер по нейтрализации специальных элементов, используемых в команде ОС, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код
BDU:2020-05829
Уязвимость системы управления конфигурациями Ansible, связанная с ошибками синхронизации при использовании общего ресурса, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код
BDU:2021-03714
Уязвимость модуля solaris_zone системы управления конфигурациями Ansible, связанная с отсутствием мер по очистке входных данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-00266
Уязвимость системы управления конфигурациями ansible, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность
BDU:2022-00282
Уязвимость системы управления конфигурациями Ansible, связанная с небезопасными временными файлами, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-00284
Уязвимость модуля svn системы управления конфигурациями Ansible, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность
BDU:2022-03971
Уязвимость модуля nxos_file_copy системы управления конфигурациями Ansible, позволяющая нарушителю выполнить произвольные команды
Modified: 2024-11-21
CVE-2018-16859
Execution of Ansible playbooks on Windows platforms with PowerShell ScriptBlock logging and Module logging enabled can allow for 'become' passwords to appear in EventLogs in plaintext. A local user with administrator privileges on the machine can view these logs and discover the plaintext password. Ansible Engine 2.8 and older are believed to be vulnerable.
- openSUSE-SU-2019:1125
- openSUSE-SU-2019:1125
- openSUSE-SU-2019:1635
- openSUSE-SU-2019:1635
- openSUSE-SU-2019:1858
- openSUSE-SU-2019:1858
- 106004
- 106004
- RHSA-2018:3770
- RHSA-2018:3770
- RHSA-2018:3771
- RHSA-2018:3771
- RHSA-2018:3772
- RHSA-2018:3772
- RHSA-2018:3773
- RHSA-2018:3773
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16859
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16859
- https://github.com/ansible/ansible/pull/49142
- https://github.com/ansible/ansible/pull/49142
Modified: 2024-11-21
CVE-2019-10156
A flaw was discovered in the way Ansible templating was implemented in versions before 2.6.18, 2.7.12 and 2.8.2, causing the possibility of information disclosure through unexpected variable substitution. By taking advantage of unintended variable substitution the content of any variable may be disclosed.
- RHSA-2019:3744
- RHSA-2019:3744
- RHSA-2019:3789
- RHSA-2019:3789
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10156
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10156
- https://github.com/ansible/ansible/pull/57188
- https://github.com/ansible/ansible/pull/57188
- [debian-lts-announce] 20190916 [SECURITY] [DLA 1923-1] ansible security update
- [debian-lts-announce] 20190916 [SECURITY] [DLA 1923-1] ansible security update
- [debian-lts-announce] 20210127 [SECURITY] [DLA 2535-1] ansible security update
- [debian-lts-announce] 20210127 [SECURITY] [DLA 2535-1] ansible security update
- DSA-4950
- DSA-4950
Modified: 2024-11-21
CVE-2019-10206
ansible-playbook -k and ansible cli tools, all versions 2.8.x before 2.8.4, all 2.7.x before 2.7.13 and all 2.6.x before 2.6.19, prompt passwords by expanding them from templates as they could contain special characters. Passwords should be wrapped to prevent templates trigger and exposing them.
- openSUSE-SU-2020:0513
- openSUSE-SU-2020:0513
- openSUSE-SU-2020:0523
- openSUSE-SU-2020:0523
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10206
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10206
- [debian-lts-announce] 20231228 [SECURITY] [DLA 3695-1] ansible security update
- [debian-lts-announce] 20231228 [SECURITY] [DLA 3695-1] ansible security update
- DSA-4950
- DSA-4950
Modified: 2024-11-21
CVE-2019-14846
In Ansible, all Ansible Engine versions up to ansible-engine 2.8.5, ansible-engine 2.7.13, ansible-engine 2.6.19, were logging at the DEBUG level which lead to a disclosure of credentials if a plugin used a library that logged credentials at the DEBUG level. This flaw does not affect Ansible modules, as those are executed in a separate process.
- openSUSE-SU-2020:0513
- openSUSE-SU-2020:0513
- openSUSE-SU-2020:0523
- openSUSE-SU-2020:0523
- RHSA-2019:3201
- RHSA-2019:3201
- RHSA-2019:3202
- RHSA-2019:3202
- RHSA-2019:3203
- RHSA-2019:3203
- RHSA-2019:3207
- RHSA-2019:3207
- RHSA-2020:0756
- RHSA-2020:0756
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14846
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14846
- https://github.com/ansible/ansible/pull/63366
- https://github.com/ansible/ansible/pull/63366
- [debian-lts-announce] 20200505 [SECURITY] [DLA 2202-1] ansible security update
- [debian-lts-announce] 20200505 [SECURITY] [DLA 2202-1] ansible security update
- [debian-lts-announce] 20210127 [SECURITY] [DLA 2535-1] ansible security update
- [debian-lts-announce] 20210127 [SECURITY] [DLA 2535-1] ansible security update
- DSA-4950
- DSA-4950
Modified: 2024-11-21
CVE-2019-14856
ansible before versions 2.8.6, 2.7.14, 2.6.20 is vulnerable to a None
Modified: 2024-11-21
CVE-2019-14858
A vulnerability was found in Ansible engine 2.x up to 2.8 and Ansible tower 3.x up to 3.5. When a module has an argument_spec with sub parameters marked as no_log, passing an invalid parameter name to the module will cause the task to fail before the no_log options in the sub parameters are processed. As a result, data in the sub parameter fields will not be masked and will be displayed if Ansible is run with increased verbosity and present in the module invocation arguments for the task.
- openSUSE-SU-2020:0513
- openSUSE-SU-2020:0513
- openSUSE-SU-2020:0523
- openSUSE-SU-2020:0523
- RHSA-2019:3201
- RHSA-2019:3201
- RHSA-2019:3202
- RHSA-2019:3202
- RHSA-2019:3203
- RHSA-2019:3203
- RHSA-2019:3207
- RHSA-2019:3207
- RHSA-2020:0756
- RHSA-2020:0756
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14858
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14858
Modified: 2024-11-21
CVE-2019-14864
Ansible, versions 2.9.x before 2.9.1, 2.8.x before 2.8.7 and Ansible versions 2.7.x before 2.7.15, is not respecting the flag no_log set it to True when Sumologic and Splunk callback plugins are used send tasks results events to collectors. This would discloses and collects any sensitive data.
- openSUSE-SU-2020:0513
- openSUSE-SU-2020:0513
- openSUSE-SU-2020:0523
- openSUSE-SU-2020:0523
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14864
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14864
- https://github.com/ansible/ansible/issues/63522
- https://github.com/ansible/ansible/issues/63522
- https://github.com/ansible/ansible/pull/63527
- https://github.com/ansible/ansible/pull/63527
- DSA-4950
- DSA-4950
Modified: 2024-11-21
CVE-2019-14904
A flaw was found in the solaris_zone module from the Ansible Community modules. When setting the name for the zone on the Solaris host, the zone name is checked by listing the process with the 'ps' bare command on the remote machine. An attacker could take advantage of this flaw by crafting the name of the zone and executing arbitrary commands in the remote host. Ansible Engine 2.7.15, 2.8.7, and 2.9.2 as well as previous versions are affected.
- https://bugzilla.redhat.com/show_bug.cgi?id=1776944
- https://bugzilla.redhat.com/show_bug.cgi?id=1776944
- https://github.com/ansible/ansible/pull/65686
- https://github.com/ansible/ansible/pull/65686
- [debian-lts-announce] 20210127 [SECURITY] [DLA 2535-1] ansible security update
- [debian-lts-announce] 20210127 [SECURITY] [DLA 2535-1] ansible security update
- DSA-4950
- DSA-4950
Modified: 2024-11-21
CVE-2019-14905
A vulnerability was found in Ansible Engine versions 2.9.x before 2.9.3, 2.8.x before 2.8.8, 2.7.x before 2.7.16 and earlier, where in Ansible's nxos_file_copy module can be used to copy files to a flash or bootflash on NXOS devices. Malicious code could craft the filename parameter to perform OS command injections. This could result in a loss of confidentiality of the system among other issues.
- openSUSE-SU-2020:0513
- openSUSE-SU-2020:0513
- openSUSE-SU-2020:0523
- openSUSE-SU-2020:0523
- RHSA-2020:0216
- RHSA-2020:0216
- RHSA-2020:0218
- RHSA-2020:0218
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14905
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14905
- FEDORA-2020-2bed89517f
- FEDORA-2020-2bed89517f
Modified: 2024-11-21
CVE-2020-10684
A flaw was found in Ansible Engine, all versions 2.7.x, 2.8.x and 2.9.x prior to 2.7.17, 2.8.9 and 2.9.6 respectively, when using ansible_facts as a subkey of itself and promoting it to a variable when inject is enabled, overwriting the ansible_facts after the clean. An attacker could take advantage of this by altering the ansible_facts, such as ansible_hosts, users and any other key data which would lead into privilege escalation or code injection.
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10684
- FEDORA-2020-3990f03ba3
- FEDORA-2020-f80154b5b4
- FEDORA-2020-1b6ce91e37
- GLSA-202006-11
- DSA-4950
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-10684
- DSA-4950
- GLSA-202006-11
- FEDORA-2020-1b6ce91e37
- FEDORA-2020-f80154b5b4
- FEDORA-2020-3990f03ba3
Modified: 2024-11-21
CVE-2020-1733
A race condition flaw was found in Ansible Engine 2.7.17 and prior, 2.8.9 and prior, 2.9.6 and prior when running a playbook with an unprivileged become user. When Ansible needs to run a module with become user, the temporary directory is created in /var/tmp. This directory is created with "umask 77 && mkdir -p
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1733
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1733
- https://github.com/ansible/ansible/issues/67791
- https://github.com/ansible/ansible/issues/67791
- [debian-lts-announce] 20200505 [SECURITY] [DLA 2202-1] ansible security update
- [debian-lts-announce] 20200505 [SECURITY] [DLA 2202-1] ansible security update
- FEDORA-2020-3990f03ba3
- FEDORA-2020-3990f03ba3
- FEDORA-2020-f80154b5b4
- FEDORA-2020-f80154b5b4
- FEDORA-2020-1b6ce91e37
- FEDORA-2020-1b6ce91e37
- GLSA-202006-11
- GLSA-202006-11
- DSA-4950
- DSA-4950
Modified: 2024-11-21
CVE-2020-1734
A flaw was found in the pipe lookup plugin of ansible. Arbitrary commands can be run, when the pipe lookup plugin uses subprocess.Popen() with shell=True, by overwriting ansible facts and the variable is not escaped by quote plugin. An attacker could take advantage and run arbitrary commands by overwriting the ansible facts.
Modified: 2024-11-21
CVE-2020-1737
A flaw was found in Ansible 2.7.17 and prior, 2.8.9 and prior, and 2.9.6 and prior when using the Extract-Zip function from the win_unzip module as the extracted file(s) are not checked if they belong to the destination folder. An attacker could take advantage of this flaw by crafting an archive anywhere in the file system, using a path traversal. This issue is fixed in 2.10.
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1737
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1737
- https://github.com/ansible/ansible/issues/67795
- https://github.com/ansible/ansible/issues/67795
- FEDORA-2020-a3f12bcff4
- FEDORA-2020-a3f12bcff4
- FEDORA-2020-0cab7041f7
- FEDORA-2020-0cab7041f7
- FEDORA-2020-87f5e1e829
- FEDORA-2020-87f5e1e829
- GLSA-202006-11
- GLSA-202006-11
Modified: 2024-11-21
CVE-2020-1738
A flaw was found in Ansible Engine when the module package or service is used and the parameter 'use' is not specified. If a previous task is executed with a malicious user, the module sent can be selected by the attacker using the ansible facts file. All versions in 2.7.x, 2.8.x and 2.9.x branches are believed to be vulnerable.
Modified: 2024-11-21
CVE-2020-1739
A flaw was found in Ansible 2.7.16 and prior, 2.8.8 and prior, and 2.9.5 and prior when a password is set with the argument "password" of svn module, it is used on svn command line, disclosing to other users within the same node. An attacker could take advantage by reading the cmdline file from that particular PID on the procfs.
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1739
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1739
- https://github.com/ansible/ansible/issues/67797
- https://github.com/ansible/ansible/issues/67797
- [debian-lts-announce] 20200505 [SECURITY] [DLA 2202-1] ansible security update
- [debian-lts-announce] 20200505 [SECURITY] [DLA 2202-1] ansible security update
- FEDORA-2020-a3f12bcff4
- FEDORA-2020-a3f12bcff4
- FEDORA-2020-0cab7041f7
- FEDORA-2020-0cab7041f7
- FEDORA-2020-87f5e1e829
- FEDORA-2020-87f5e1e829
- DSA-4950
- DSA-4950
Closed bugs
New version
Package firefox-esr updated to version 68.6.0-alt1 for branch p9 in task 247748.
Closed vulnerabilities
BDU:2020-01115
Уязвимость веб-браузеров Firefox ESR и Firefox, связанная с использованием памяти после ее освобождения, позволяющая нарушителю выполнить произвольный код
BDU:2020-01910
Уязвимость функции sctp_load_addresses_from_init реализации протокола передачи сообщений с поддержкой множественной адресации usrsctp, связанная с чтением за границами буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03817
Уязвимость компонент BodyStream::OnInputStreamReady браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2019-20503
usrsctp before 2019-12-20 has out-of-bounds reads in sctp_load_addresses_from_init.
- openSUSE-SU-2020:0340
- openSUSE-SU-2020:0340
- openSUSE-SU-2020:0365
- openSUSE-SU-2020:0365
- openSUSE-SU-2020:0366
- openSUSE-SU-2020:0366
- openSUSE-SU-2020:0389
- openSUSE-SU-2020:0389
- 20200529 APPLE-SA-2020-05-26-1 iOS 13.5 and iPadOS 13.5
- 20200529 APPLE-SA-2020-05-26-1 iOS 13.5 and iPadOS 13.5
- 20200529 APPLE-SA-2020-05-26-7 Safari 13.1.1
- 20200529 APPLE-SA-2020-05-26-7 Safari 13.1.1
- 20200529 APPLE-SA-2020-05-26-5 watchOS 6.2.5
- 20200529 APPLE-SA-2020-05-26-5 watchOS 6.2.5
- 20200529 APPLE-SA-2020-05-26-4 tvOS 13.4.5
- 20200529 APPLE-SA-2020-05-26-4 tvOS 13.4.5
- RHSA-2020:0815
- RHSA-2020:0815
- RHSA-2020:0816
- RHSA-2020:0816
- RHSA-2020:0819
- RHSA-2020:0819
- RHSA-2020:0820
- RHSA-2020:0820
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1992
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1992
- https://chromereleases.googleblog.com/2020/03/stable-channel-update-for-desktop_18.html
- https://chromereleases.googleblog.com/2020/03/stable-channel-update-for-desktop_18.html
- https://crbug.com/1059349
- https://crbug.com/1059349
- https://github.com/sctplab/usrsctp/commit/790a7a2555aefb392a5a69923f1e9d17b4968467
- https://github.com/sctplab/usrsctp/commit/790a7a2555aefb392a5a69923f1e9d17b4968467
- [debian-lts-announce] 20200311 [SECURITY] [DLA 2140-1] firefox-esr security update
- [debian-lts-announce] 20200311 [SECURITY] [DLA 2140-1] firefox-esr security update
- [debian-lts-announce] 20200320 [SECURITY] [DLA 2150-1] thunderbird security update
- [debian-lts-announce] 20200320 [SECURITY] [DLA 2150-1] thunderbird security update
- [debian-lts-announce] 20230706 [SECURITY] [DLA 3481-1] libusrsctp security update
- [debian-lts-announce] 20230706 [SECURITY] [DLA 3481-1] libusrsctp security update
- FEDORA-2020-17149a4f3d
- FEDORA-2020-17149a4f3d
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-39e0b8bd14
- FEDORA-2020-7fd051b378
- FEDORA-2020-7fd051b378
- GLSA-202003-02
- GLSA-202003-02
- GLSA-202003-10
- GLSA-202003-10
- https://support.apple.com/HT211168
- https://support.apple.com/HT211168
- https://support.apple.com/HT211171
- https://support.apple.com/HT211171
- https://support.apple.com/HT211175
- https://support.apple.com/HT211175
- https://support.apple.com/HT211177
- https://support.apple.com/HT211177
- https://support.apple.com/kb/HT211168
- https://support.apple.com/kb/HT211168
- https://support.apple.com/kb/HT211171
- https://support.apple.com/kb/HT211171
- https://support.apple.com/kb/HT211175
- https://support.apple.com/kb/HT211175
- https://support.apple.com/kb/HT211177
- https://support.apple.com/kb/HT211177
- USN-4299-1
- USN-4299-1
- USN-4328-1
- USN-4328-1
- USN-4335-1
- USN-4335-1
- DSA-4639
- DSA-4639
- DSA-4642
- DSA-4642
- DSA-4645
- DSA-4645
Modified: 2024-11-21
CVE-2020-6805
When removing data about an origin whose tab was recently closed, a use-after-free could occur in the Quota manager, resulting in a potentially exploitable crash. This vulnerability affects Thunderbird < 68.6, Firefox < 74, Firefox < ESR68.6, and Firefox ESR < 68.6.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1610880
- https://bugzilla.mozilla.org/show_bug.cgi?id=1610880
- USN-4328-1
- USN-4328-1
- USN-4335-1
- USN-4335-1
- https://www.mozilla.org/security/advisories/mfsa2020-08/
- https://www.mozilla.org/security/advisories/mfsa2020-08/
- https://www.mozilla.org/security/advisories/mfsa2020-09/
- https://www.mozilla.org/security/advisories/mfsa2020-09/
- https://www.mozilla.org/security/advisories/mfsa2020-10/
- https://www.mozilla.org/security/advisories/mfsa2020-10/
Modified: 2024-11-21
CVE-2020-6806
By carefully crafting promise resolutions, it was possible to cause an out-of-bounds read off the end of an array resized during script execution. This could have led to memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.6, Firefox < 74, Firefox < ESR68.6, and Firefox ESR < 68.6.
- http://packetstormsecurity.com/files/157524/Firefox-js-ReadableStreamCloseInternal-Out-Of-Bounds-Access.html
- http://packetstormsecurity.com/files/157524/Firefox-js-ReadableStreamCloseInternal-Out-Of-Bounds-Access.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1612308
- https://bugzilla.mozilla.org/show_bug.cgi?id=1612308
- USN-4328-1
- USN-4328-1
- USN-4335-1
- USN-4335-1
- https://www.mozilla.org/security/advisories/mfsa2020-08/
- https://www.mozilla.org/security/advisories/mfsa2020-08/
- https://www.mozilla.org/security/advisories/mfsa2020-09/
- https://www.mozilla.org/security/advisories/mfsa2020-09/
- https://www.mozilla.org/security/advisories/mfsa2020-10/
- https://www.mozilla.org/security/advisories/mfsa2020-10/
Modified: 2024-11-21
CVE-2020-6807
When a device was changed while a stream was about to be destroyed, the stream-reinit
task may have been executed after the stream was destroyed, causing a use-after-free and a potentially exploitable crash. This vulnerability affects Thunderbird < 68.6, Firefox < 74, Firefox < ESR68.6, and Firefox ESR < 68.6.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1614971
- https://bugzilla.mozilla.org/show_bug.cgi?id=1614971
- USN-4328-1
- USN-4328-1
- USN-4335-1
- USN-4335-1
- https://www.mozilla.org/security/advisories/mfsa2020-08/
- https://www.mozilla.org/security/advisories/mfsa2020-08/
- https://www.mozilla.org/security/advisories/mfsa2020-09/
- https://www.mozilla.org/security/advisories/mfsa2020-09/
- https://www.mozilla.org/security/advisories/mfsa2020-10/
- https://www.mozilla.org/security/advisories/mfsa2020-10/
Modified: 2024-11-21
CVE-2020-6811
The 'Copy as cURL' feature of Devtools' network tab did not properly escape the HTTP method of a request, which can be controlled by the website. If a user used the 'Copy as Curl' feature and pasted the command into a terminal, it could have resulted in command injection and arbitrary command execution. This vulnerability affects Thunderbird < 68.6, Firefox < 74, Firefox < ESR68.6, and Firefox ESR < 68.6.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1607742
- https://bugzilla.mozilla.org/show_bug.cgi?id=1607742
- USN-4328-1
- USN-4328-1
- USN-4335-1
- USN-4335-1
- https://www.mozilla.org/security/advisories/mfsa2020-08/
- https://www.mozilla.org/security/advisories/mfsa2020-08/
- https://www.mozilla.org/security/advisories/mfsa2020-09/
- https://www.mozilla.org/security/advisories/mfsa2020-09/
- https://www.mozilla.org/security/advisories/mfsa2020-10/
- https://www.mozilla.org/security/advisories/mfsa2020-10/
Modified: 2024-11-21
CVE-2020-6812
The first time AirPods are connected to an iPhone, they become named after the user's name by default (e.g. Jane Doe's AirPods.) Websites with camera or microphone permission are able to enumerate device names, disclosing the user's name. To resolve this issue, Firefox added a special case that renames devices containing the substring 'AirPods' to simply 'AirPods'. This vulnerability affects Thunderbird < 68.6, Firefox < 74, Firefox < ESR68.6, and Firefox ESR < 68.6.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1616661
- https://bugzilla.mozilla.org/show_bug.cgi?id=1616661
- USN-4328-1
- USN-4328-1
- USN-4335-1
- USN-4335-1
- https://www.mozilla.org/security/advisories/mfsa2020-08/
- https://www.mozilla.org/security/advisories/mfsa2020-08/
- https://www.mozilla.org/security/advisories/mfsa2020-09/
- https://www.mozilla.org/security/advisories/mfsa2020-09/
- https://www.mozilla.org/security/advisories/mfsa2020-10/
- https://www.mozilla.org/security/advisories/mfsa2020-10/
Modified: 2024-11-21
CVE-2020-6814
Mozilla developers reported memory safety bugs present in Firefox and Thunderbird 68.5. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 68.6, Firefox < 74, Firefox < ESR68.6, and Firefox ESR < 68.6.
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1592078%2C1604847%2C1608256%2C1612636%2C1614339
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1592078%2C1604847%2C1608256%2C1612636%2C1614339
- USN-4328-1
- USN-4328-1
- USN-4335-1
- USN-4335-1
- https://www.mozilla.org/security/advisories/mfsa2020-08/
- https://www.mozilla.org/security/advisories/mfsa2020-08/
- https://www.mozilla.org/security/advisories/mfsa2020-09/
- https://www.mozilla.org/security/advisories/mfsa2020-09/
- https://www.mozilla.org/security/advisories/mfsa2020-10/
- https://www.mozilla.org/security/advisories/mfsa2020-10/
Closed vulnerabilities
BDU:2020-01478
Уязвимость прокси-сервера Squid, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю получить доступ к ограниченным HTTP-серверам
BDU:2020-01857
Уязвимость прокси-сервера Squid, связанная с записью за границами буфера, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-01858
Уязвимость параметра append_domain прокси-сервера Squid, связанная с подделкой межсайтовых запросов, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность
BDU:2020-02596
Уязвимость прокси-сервера Squid, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2020-02597
Уязвимость прокси-сервера Squid, вызванная переполнением буфера, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2020-02598
Уязвимость прокси-сервера Squid, существующая из-за недостаточной проверки входных данных в ext_lm_group_acl, позволяющая нарушителю завершить процесс Squid и вызвать отказ в обслуживании для всех клиентов, использующих прокси
BDU:2020-05767
Уязвимость прокси-сервера Squid, связанная с выходом операции за границы буфера в памяти, позволяюшая нарушителю получить доступ к защищаемой информации
BDU:2021-01719
Уязвимость механизма HTTP дайджест-аутентификации прокси-сервера Squid, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2021-01746
Уязвимость механизма обработки URN-ответов прокси-сервера Squid, связанная с недостатком механизма проверки размера копируемых данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01748
Уязвимость заголовка запросов прокси-сервера Squid, связанная с недостатками обработки HTTP-запросов, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2021-01750
Уязвимость программного пакета, который реализует функцию кэширующего прокси-сервера Squid, связанная с неверной нейтрализация особых элементов в выходных данных, позволяющая нарушителю оказать воздействие на целостность данных
Modified: 2024-11-21
CVE-2019-12523
An issue was discovered in Squid before 4.9. When handling a URN request, a corresponding HTTP request is made. This HTTP request doesn't go through the access checks that incoming HTTP requests go through. This causes all access checks to be bypassed and allows access to restricted HTTP servers, e.g., an attacker can connect to HTTP servers that only listen on localhost.
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html
- http://lists.opensuse.org/opensuse-security-announce/2019-11/msg00056.html
- http://www.squid-cache.org/Advisories/SQUID-2019_8.txt
- http://www.squid-cache.org/Advisories/SQUID-2019_8.txt
- https://bugzilla.suse.com/show_bug.cgi?id=1156329
- https://bugzilla.suse.com/show_bug.cgi?id=1156329
- [debian-lts-announce] 20200710 [SECURITY] [DLA 2278-1] squid3 security update
- [debian-lts-announce] 20200710 [SECURITY] [DLA 2278-1] squid3 security update
- FEDORA-2019-9538783033
- FEDORA-2019-9538783033
- FEDORA-2019-0b16cbdd0e
- FEDORA-2019-0b16cbdd0e
- USN-4213-1
- USN-4213-1
- USN-4446-1
- USN-4446-1
- DSA-4682
- DSA-4682
Modified: 2024-11-21
CVE-2019-12526
An issue was discovered in Squid before 4.9. URN response handling in Squid suffers from a heap-based buffer overflow. When receiving data from a remote server in response to an URN request, Squid fails to ensure that the response can fit within the buffer. This leads to attacker controlled data overflowing in the heap.
- http://www.squid-cache.org/Advisories/SQUID-2019_7.txt
- http://www.squid-cache.org/Advisories/SQUID-2019_7.txt
- https://bugzilla.suse.com/show_bug.cgi?id=1156326
- https://bugzilla.suse.com/show_bug.cgi?id=1156326
- [debian-lts-announce] 20191210 [SECURITY] [DLA 2028-1] squid3 security update
- [debian-lts-announce] 20191210 [SECURITY] [DLA 2028-1] squid3 security update
- [debian-lts-announce] 20200710 [SECURITY] [DLA 2278-1] squid3 security update
- [debian-lts-announce] 20200710 [SECURITY] [DLA 2278-1] squid3 security update
- FEDORA-2019-9538783033
- FEDORA-2019-9538783033
- FEDORA-2019-0b16cbdd0e
- FEDORA-2019-0b16cbdd0e
- GLSA-202003-34
- GLSA-202003-34
- USN-4213-1
- USN-4213-1
- DSA-4682
- DSA-4682
Modified: 2024-11-21
CVE-2019-12528
An issue was discovered in Squid before 4.10. It allows a crafted FTP server to trigger disclosure of sensitive information from heap memory, such as information associated with other users' sessions or non-Squid processes.
- openSUSE-SU-2020:0307
- openSUSE-SU-2020:0307
- openSUSE-SU-2020:0606
- openSUSE-SU-2020:0606
- openSUSE-SU-2020:0623
- openSUSE-SU-2020:0623
- http://www.squid-cache.org/Advisories/SQUID-2020_2.txt
- http://www.squid-cache.org/Advisories/SQUID-2020_2.txt
- [debian-lts-announce] 20200710 [SECURITY] [DLA 2278-1] squid3 security update
- [debian-lts-announce] 20200710 [SECURITY] [DLA 2278-1] squid3 security update
- FEDORA-2020-ab8e7463ab
- FEDORA-2020-ab8e7463ab
- FEDORA-2020-790296a8f4
- FEDORA-2020-790296a8f4
- GLSA-202003-34
- GLSA-202003-34
- USN-4289-1
- USN-4289-1
- DSA-4682
- DSA-4682
Modified: 2024-11-21
CVE-2019-18676
An issue was discovered in Squid 3.x and 4.x through 4.8. Due to incorrect input validation, there is a heap-based buffer overflow that can result in Denial of Service to all clients using the proxy. Severity is high due to this vulnerability occurring before normal security checks; any remote client that can reach the proxy port can trivially perform the attack via a crafted URI scheme.
- http://www.squid-cache.org/Advisories/SQUID-2019_8.txt
- http://www.squid-cache.org/Advisories/SQUID-2019_8.txt
- http://www.squid-cache.org/Versions/v4/changesets/squid-4-fbbdf75efd7a5cc244b4886a9d42ea458c5a3a73.patch
- http://www.squid-cache.org/Versions/v4/changesets/squid-4-fbbdf75efd7a5cc244b4886a9d42ea458c5a3a73.patch
- https://bugzilla.suse.com/show_bug.cgi?id=1156329
- https://bugzilla.suse.com/show_bug.cgi?id=1156329
- https://github.com/squid-cache/squid/pull/275
- https://github.com/squid-cache/squid/pull/275
- [debian-lts-announce] 20200710 [SECURITY] [DLA 2278-1] squid3 security update
- [debian-lts-announce] 20200710 [SECURITY] [DLA 2278-1] squid3 security update
- FEDORA-2019-9538783033
- FEDORA-2019-9538783033
- FEDORA-2019-0b16cbdd0e
- FEDORA-2019-0b16cbdd0e
- USN-4213-1
- USN-4213-1
- USN-4446-1
- USN-4446-1
- DSA-4682
- DSA-4682
Modified: 2024-11-21
CVE-2019-18677
An issue was discovered in Squid 3.x and 4.x through 4.8 when the append_domain setting is used (because the appended characters do not properly interact with hostname length restrictions). Due to incorrect message processing, it can inappropriately redirect traffic to origins it should not be delivered to.
- http://www.squid-cache.org/Advisories/SQUID-2019_9.txt
- http://www.squid-cache.org/Advisories/SQUID-2019_9.txt
- http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-e5f1813a674848dde570f7920873e1071f96e0b4.patch
- http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-e5f1813a674848dde570f7920873e1071f96e0b4.patch
- http://www.squid-cache.org/Versions/v4/changesets/squid-4-36492033ea4097821a4f7ff3ddcb971fbd1e8ba0.patch
- http://www.squid-cache.org/Versions/v4/changesets/squid-4-36492033ea4097821a4f7ff3ddcb971fbd1e8ba0.patch
- https://bugzilla.suse.com/show_bug.cgi?id=1156328
- https://bugzilla.suse.com/show_bug.cgi?id=1156328
- https://github.com/squid-cache/squid/pull/427
- https://github.com/squid-cache/squid/pull/427
- [debian-lts-announce] 20191210 [SECURITY] [DLA 2028-1] squid3 security update
- [debian-lts-announce] 20191210 [SECURITY] [DLA 2028-1] squid3 security update
- [debian-lts-announce] 20200710 [SECURITY] [DLA 2278-1] squid3 security update
- [debian-lts-announce] 20200710 [SECURITY] [DLA 2278-1] squid3 security update
- FEDORA-2019-9538783033
- FEDORA-2019-9538783033
- FEDORA-2019-0b16cbdd0e
- FEDORA-2019-0b16cbdd0e
- USN-4213-1
- USN-4213-1
- DSA-4682
- DSA-4682
Modified: 2024-11-21
CVE-2019-18678
An issue was discovered in Squid 3.x and 4.x through 4.8. It allows attackers to smuggle HTTP requests through frontend software to a Squid instance that splits the HTTP Request pipeline differently. The resulting Response messages corrupt caches (between a client and Squid) with attacker-controlled content at arbitrary URLs. Effects are isolated to software between the attacker client and Squid. There are no effects on Squid itself, nor on any upstream servers. The issue is related to a request header containing whitespace between a header name and a colon.
- http://www.squid-cache.org/Advisories/SQUID-2019_10.txt
- http://www.squid-cache.org/Advisories/SQUID-2019_10.txt
- http://www.squid-cache.org/Versions/v4/changesets/squid-4-671ba97abe929156dc4c717ee52ad22fba0f7443.patch
- http://www.squid-cache.org/Versions/v4/changesets/squid-4-671ba97abe929156dc4c717ee52ad22fba0f7443.patch
- https://bugzilla.suse.com/show_bug.cgi?id=1156323
- https://bugzilla.suse.com/show_bug.cgi?id=1156323
- https://github.com/squid-cache/squid/pull/445
- https://github.com/squid-cache/squid/pull/445
- [debian-lts-announce] 20191210 [SECURITY] [DLA 2028-1] squid3 security update
- [debian-lts-announce] 20191210 [SECURITY] [DLA 2028-1] squid3 security update
- [debian-lts-announce] 20200710 [SECURITY] [DLA 2278-1] squid3 security update
- [debian-lts-announce] 20200710 [SECURITY] [DLA 2278-1] squid3 security update
- FEDORA-2019-9538783033
- FEDORA-2019-9538783033
- FEDORA-2019-0b16cbdd0e
- FEDORA-2019-0b16cbdd0e
- GLSA-202003-34
- GLSA-202003-34
- USN-4213-1
- USN-4213-1
- DSA-4682
- DSA-4682
Modified: 2024-11-21
CVE-2019-18679
An issue was discovered in Squid 2.x, 3.x, and 4.x through 4.8. Due to incorrect data management, it is vulnerable to information disclosure when processing HTTP Digest Authentication. Nonce tokens contain the raw byte value of a pointer that sits within heap memory allocation. This information reduces ASLR protections and may aid attackers isolating memory areas to target for remote code execution attacks.
- http://www.squid-cache.org/Advisories/SQUID-2019_11.txt
- http://www.squid-cache.org/Advisories/SQUID-2019_11.txt
- http://www.squid-cache.org/Versions/v4/changesets/squid-4-671ba97abe929156dc4c717ee52ad22fba0f7443.patch
- http://www.squid-cache.org/Versions/v4/changesets/squid-4-671ba97abe929156dc4c717ee52ad22fba0f7443.patch
- https://bugzilla.suse.com/show_bug.cgi?id=1156324
- https://bugzilla.suse.com/show_bug.cgi?id=1156324
- https://github.com/squid-cache/squid/pull/491
- https://github.com/squid-cache/squid/pull/491
- [debian-lts-announce] 20191210 [SECURITY] [DLA 2028-1] squid3 security update
- [debian-lts-announce] 20191210 [SECURITY] [DLA 2028-1] squid3 security update
- [debian-lts-announce] 20200710 [SECURITY] [DLA 2278-1] squid3 security update
- [debian-lts-announce] 20200710 [SECURITY] [DLA 2278-1] squid3 security update
- FEDORA-2019-9538783033
- FEDORA-2019-9538783033
- FEDORA-2019-0b16cbdd0e
- FEDORA-2019-0b16cbdd0e
- GLSA-202003-34
- GLSA-202003-34
- USN-4213-1
- USN-4213-1
- DSA-4682
- DSA-4682
Modified: 2024-11-21
CVE-2019-18860
Squid before 4.9, when certain web browsers are used, mishandles HTML in the host (aka hostname) parameter to cachemgr.cgi.
- openSUSE-SU-2020:0623
- openSUSE-SU-2020:0623
- https://github.com/squid-cache/squid/pull/504
- https://github.com/squid-cache/squid/pull/504
- https://github.com/squid-cache/squid/pull/505
- https://github.com/squid-cache/squid/pull/505
- [debian-lts-announce] 20200710 [SECURITY] [DLA 2278-1] squid3 security update
- [debian-lts-announce] 20200710 [SECURITY] [DLA 2278-1] squid3 security update
- USN-4356-1
- USN-4356-1
- DSA-4732
- DSA-4732
Modified: 2024-11-21
CVE-2020-8449
An issue was discovered in Squid before 4.10. Due to incorrect input validation, it can interpret crafted HTTP requests in unexpected ways to access server resources prohibited by earlier security filters.
- openSUSE-SU-2020:0307
- openSUSE-SU-2020:0307
- openSUSE-SU-2020:0606
- openSUSE-SU-2020:0606
- http://www.squid-cache.org/Advisories/SQUID-2020_1.txt
- http://www.squid-cache.org/Advisories/SQUID-2020_1.txt
- http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2020_1.patch
- http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2020_1.patch
- http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-8e657e835965c3a011375feaa0359921c5b3e2dd.patch
- http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-8e657e835965c3a011375feaa0359921c5b3e2dd.patch
- http://www.squid-cache.org/Versions/v4/changesets/SQUID-2020_1.patch
- http://www.squid-cache.org/Versions/v4/changesets/SQUID-2020_1.patch
- http://www.squid-cache.org/Versions/v4/changesets/squid-4-b3a0719affab099c684f1cd62b79ab02816fa962.patch
- http://www.squid-cache.org/Versions/v4/changesets/squid-4-b3a0719affab099c684f1cd62b79ab02816fa962.patch
- http://www.squid-cache.org/Versions/v4/changesets/squid-4-d8e4715992d0e530871519549add5519cbac0598.patch
- http://www.squid-cache.org/Versions/v4/changesets/squid-4-d8e4715992d0e530871519549add5519cbac0598.patch
- [debian-lts-announce] 20200710 [SECURITY] [DLA 2278-1] squid3 security update
- [debian-lts-announce] 20200710 [SECURITY] [DLA 2278-1] squid3 security update
- FEDORA-2020-ab8e7463ab
- FEDORA-2020-ab8e7463ab
- FEDORA-2020-790296a8f4
- FEDORA-2020-790296a8f4
- GLSA-202003-34
- GLSA-202003-34
- https://security.netapp.com/advisory/ntap-20210304-0002/
- https://security.netapp.com/advisory/ntap-20210304-0002/
- USN-4289-1
- USN-4289-1
- DSA-4682
- DSA-4682
Modified: 2024-11-21
CVE-2020-8450
An issue was discovered in Squid before 4.10. Due to incorrect buffer management, a remote client can cause a buffer overflow in a Squid instance acting as a reverse proxy.
- openSUSE-SU-2020:0307
- openSUSE-SU-2020:0307
- openSUSE-SU-2020:0606
- openSUSE-SU-2020:0606
- http://www.squid-cache.org/Advisories/SQUID-2020_1.txt
- http://www.squid-cache.org/Advisories/SQUID-2020_1.txt
- http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2020_1.patch
- http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2020_1.patch
- http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-8e657e835965c3a011375feaa0359921c5b3e2dd.patch
- http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-8e657e835965c3a011375feaa0359921c5b3e2dd.patch
- http://www.squid-cache.org/Versions/v4/changesets/SQUID-2020_1.patch
- http://www.squid-cache.org/Versions/v4/changesets/SQUID-2020_1.patch
- http://www.squid-cache.org/Versions/v4/changesets/squid-4-b3a0719affab099c684f1cd62b79ab02816fa962.patch
- http://www.squid-cache.org/Versions/v4/changesets/squid-4-b3a0719affab099c684f1cd62b79ab02816fa962.patch
- http://www.squid-cache.org/Versions/v4/changesets/squid-4-d8e4715992d0e530871519549add5519cbac0598.patch
- http://www.squid-cache.org/Versions/v4/changesets/squid-4-d8e4715992d0e530871519549add5519cbac0598.patch
- [debian-lts-announce] 20200710 [SECURITY] [DLA 2278-1] squid3 security update
- [debian-lts-announce] 20200710 [SECURITY] [DLA 2278-1] squid3 security update
- FEDORA-2020-ab8e7463ab
- FEDORA-2020-ab8e7463ab
- FEDORA-2020-790296a8f4
- FEDORA-2020-790296a8f4
- GLSA-202003-34
- GLSA-202003-34
- https://security.netapp.com/advisory/ntap-20210304-0002/
- https://security.netapp.com/advisory/ntap-20210304-0002/
- USN-4289-1
- USN-4289-1
- DSA-4682
- DSA-4682
Modified: 2024-11-21
CVE-2020-8517
An issue was discovered in Squid before 4.10. Due to incorrect input validation, the NTLM authentication credentials parser in ext_lm_group_acl may write to memory outside the credentials buffer. On systems with memory access protections, this can result in the helper process being terminated unexpectedly. This leads to the Squid process also terminating and a denial of service for all clients using the proxy.
- openSUSE-SU-2020:0307
- openSUSE-SU-2020:0307
- openSUSE-SU-2020:0606
- openSUSE-SU-2020:0606
- openSUSE-SU-2020:0623
- openSUSE-SU-2020:0623
- http://www.squid-cache.org/Advisories/SQUID-2020_3.txt
- http://www.squid-cache.org/Advisories/SQUID-2020_3.txt
- http://www.squid-cache.org/Versions/v4/changesets/squid-4-6982f1187a26557e582172965e266f544ea562a5.patch
- http://www.squid-cache.org/Versions/v4/changesets/squid-4-6982f1187a26557e582172965e266f544ea562a5.patch
- GLSA-202003-34
- GLSA-202003-34
- https://security.netapp.com/advisory/ntap-20210304-0002/
- https://security.netapp.com/advisory/ntap-20210304-0002/
- USN-4289-1
- USN-4289-1