ALT-BU-2020-3846-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-12458
An information-disclosure flaw was found in Grafana through 6.7.3. The database directory /var/lib/grafana and database file /var/lib/grafana/grafana.db are world readable. This can result in exposure of sensitive information (e.g., cleartext or encrypted datasource passwords).
- https://access.redhat.com/security/cve/CVE-2020-12458
- https://bugzilla.redhat.com/show_bug.cgi?id=1827765
- https://github.com/grafana/grafana/issues/8283
- FEDORA-2020-d109a1d1d9
- FEDORA-2020-c6b0c7ebbb
- https://security.netapp.com/advisory/ntap-20200518-0001/
- https://access.redhat.com/security/cve/CVE-2020-12458
- https://security.netapp.com/advisory/ntap-20200518-0001/
- FEDORA-2020-c6b0c7ebbb
- FEDORA-2020-d109a1d1d9
- https://github.com/grafana/grafana/issues/8283
- https://bugzilla.redhat.com/show_bug.cgi?id=1827765
Modified: 2024-11-21
CVE-2020-13430
Grafana before 7.0.0 allows tag value XSS via the OpenTSDB datasource.
- https://github.com/grafana/grafana/pull/24539
- https://github.com/grafana/grafana/releases/tag/v7.0.0
- https://security.netapp.com/advisory/ntap-20200528-0003/
- https://github.com/grafana/grafana/pull/24539
- https://security.netapp.com/advisory/ntap-20200528-0003/
- https://github.com/grafana/grafana/releases/tag/v7.0.0
Package glib-networking updated to version 2.64.3-alt1 for branch sisyphus in task 251581.
Closed vulnerabilities
BDU:2021-01328
Уязвимость реализации GTlsClientConnection библиотеки glib-networking, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность
Modified: 2024-11-21
CVE-2020-13645
In GNOME glib-networking through 2.64.2, the implementation of GTlsClientConnection skips hostname verification of the server's TLS certificate if the application fails to specify the expected server identity. This is in contrast to its intended documented behavior, to fail the certificate verification. Applications that fail to provide the server identity, including Balsa before 2.5.11 and 2.6.x before 2.6.1, accept a TLS certificate if the certificate is valid for any host.
- https://gitlab.gnome.org/GNOME/balsa/-/issues/34
- https://gitlab.gnome.org/GNOME/glib-networking/-/issues/135
- FEDORA-2020-cadbc5992f
- FEDORA-2020-a83c8cd358
- FEDORA-2020-98ebbd1397
- GLSA-202007-50
- https://security.netapp.com/advisory/ntap-20200608-0004/
- USN-4405-1
- https://gitlab.gnome.org/GNOME/balsa/-/issues/34
- USN-4405-1
- https://security.netapp.com/advisory/ntap-20200608-0004/
- GLSA-202007-50
- FEDORA-2020-98ebbd1397
- FEDORA-2020-a83c8cd358
- FEDORA-2020-cadbc5992f
- https://gitlab.gnome.org/GNOME/glib-networking/-/issues/135
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-27793
An off-by-one overflow flaw was found in radare2 due to mismatched array length in core_java.c. This could allow an attacker to cause a crash, and perform a denail of service attack.
Modified: 2024-11-21
CVE-2020-27794
A double free issue was discovered in radare2 in cmd_info.c:cmd_info(). Successful exploitation could lead to modification of unexpected memory locations and potentially causing a crash.
Modified: 2024-11-21
CVE-2020-27795
A segmentation fault was discovered in radare2 with adf command. In libr/core/cmd_anal.c, when command "adf" has no or wrong argument, anal_fcn_data (core, input + 1) --> RAnalFunction *fcn = r_anal_get_fcn_in (core->anal, core->offset, -1); returns null pointer for fcn causing segmentation fault later in ensure_fcn_range (fcn).
- https://github.com/radareorg/radare2/commit/4d3811681a80f92a53e795f6a64c4b0fc2c8dd22
- https://github.com/radareorg/radare2/commit/4d3811681a80f92a53e795f6a64c4b0fc2c8dd22
- https://github.com/radareorg/radare2/issues/16215
- https://github.com/radareorg/radare2/issues/16215
- https://github.com/radareorg/radare2/pull/16230
- https://github.com/radareorg/radare2/pull/16230