ALT-BU-2020-3736-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2015-8080
Integer overflow in the getnum function in lua_struct.c in Redis 2.8.x before 2.8.24 and 3.0.x before 3.0.6 allows context-dependent attackers with permission to run Lua code in a Redis session to cause a denial of service (memory corruption and application crash) or possibly bypass intended sandbox restrictions via a large number, which triggers a stack-based buffer overflow.
- openSUSE-SU-2016:1444
- openSUSE-SU-2016:1444
- RHSA-2016:0095
- RHSA-2016:0095
- RHSA-2016:0096
- RHSA-2016:0096
- RHSA-2016:0097
- RHSA-2016:0097
- DSA-3412
- DSA-3412
- [oss-security] 20151106 Review+CVE request: multiple issues in redis EVAL command (lua sandbox)
- [oss-security] 20151106 Review+CVE request: multiple issues in redis EVAL command (lua sandbox)
- [oss-security] 20151106 Re: Review+CVE request: multiple issues in redis EVAL command (lua sandbox)
- [oss-security] 20151106 Re: Review+CVE request: multiple issues in redis EVAL command (lua sandbox)
- 77507
- 77507
- https://github.com/antirez/redis/issues/2855
- https://github.com/antirez/redis/issues/2855
- https://raw.githubusercontent.com/antirez/redis/2.8/00-RELEASENOTES
- https://raw.githubusercontent.com/antirez/redis/2.8/00-RELEASENOTES
- https://raw.githubusercontent.com/antirez/redis/3.0/00-RELEASENOTES
- https://raw.githubusercontent.com/antirez/redis/3.0/00-RELEASENOTES
- GLSA-201702-16
- GLSA-201702-16
Closed vulnerabilities
BDU:2020-02038
Уязвимость функции send_client_hello (handshake.c) криптографической библиотеки GnuTLS, связанная с недостатками используемых криптографических алгоритмов, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным или оказать воздействие на целостность данных
Modified: 2024-11-21
CVE-2020-11501
GnuTLS 3.6.x before 3.6.13 uses incorrect cryptography for DTLS. The earliest affected version is 3.6.3 (2018-07-16) because of an error in a 2017-10-06 commit. The DTLS client always uses 32 '\0' bytes instead of a random value, and thus contributes no randomness to a DTLS negotiation. This breaks the security guarantees of the DTLS protocol.
- openSUSE-SU-2020:0501
- https://gitlab.com/gnutls/gnutls/-/commit/5b595e8e52653f6c5726a4cdd8fddeb6e83804d2
- https://gitlab.com/gnutls/gnutls/-/issues/960
- FEDORA-2020-d14280a6e8
- FEDORA-2020-f90fb78f70
- GLSA-202004-06
- https://security.netapp.com/advisory/ntap-20200416-0002/
- USN-4322-1
- DSA-4652
- https://www.gnutls.org/security-new.html#GNUTLS-SA-2020-03-31
- openSUSE-SU-2020:0501
- https://www.gnutls.org/security-new.html#GNUTLS-SA-2020-03-31
- DSA-4652
- USN-4322-1
- https://security.netapp.com/advisory/ntap-20200416-0002/
- GLSA-202004-06
- FEDORA-2020-f90fb78f70
- FEDORA-2020-d14280a6e8
- https://gitlab.com/gnutls/gnutls/-/issues/960
- https://gitlab.com/gnutls/gnutls/-/commit/5b595e8e52653f6c5726a4cdd8fddeb6e83804d2
Closed bugs
Невозможно сменить пользователя, если у пользователя настроен автоматический вход и пустой пароль
Package bubblewrap updated to version 0.4.1-alt1 for branch sisyphus in task 249018.
Closed vulnerabilities
BDU:2020-05810
Уязвимость приложения Bubblewrap, связанная с небезопасным управлением привилегиями, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации
Modified: 2024-11-21
CVE-2020-5291
Bubblewrap (bwrap) before version 0.4.1, if installed in setuid mode and the kernel supports unprivileged user namespaces, then the `bwrap --userns2` option can be used to make the setuid process keep running as root while being traceable. This can in turn be used to gain root permissions. Note that this only affects the combination of bubblewrap in setuid mode (which is typically used when unprivileged user namespaces are not supported) and the support of unprivileged user namespaces. Known to be affected are: * Debian testing/unstable, if unprivileged user namespaces enabled (not default) * Debian buster-backports, if unprivileged user namespaces enabled (not default) * Arch if using `linux-hardened`, if unprivileged user namespaces enabled (not default) * Centos 7 flatpak COPR, if unprivileged user namespaces enabled (not default) This has been fixed in the 0.4.1 release, and all affected users should update.
- https://github.com/containers/bubblewrap/commit/1f7e2ad948c051054b683461885a0215f1806240
- https://github.com/containers/bubblewrap/commit/1f7e2ad948c051054b683461885a0215f1806240
- https://github.com/containers/bubblewrap/security/advisories/GHSA-j2qp-rvxj-43vj
- https://github.com/containers/bubblewrap/security/advisories/GHSA-j2qp-rvxj-43vj