ALT-BU-2020-3849-12
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2021-04594
Уязвимость функций ares_destroy() и ares_getaddrinfo() библиотеки асинхронных DNS-запросов C-ares, связанная с использованием памяти после её освобождения, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-14354
A possible use-after-free and double-free in c-ares lib version 1.16.0 if ares_destroy() is called prior to ares_getaddrinfo() completing. This flaw possibly allows an attacker to crash the service that uses c-ares lib. The highest threat from this vulnerability is to this service availability.
- https://bugzilla.redhat.com/show_bug.cgi?id=1866838
- https://bugzilla.redhat.com/show_bug.cgi?id=1866838
- https://c-ares.haxx.se/changelog.html
- https://c-ares.haxx.se/changelog.html
- https://github.com/c-ares/c-ares/commit/1cc7e83c3bdfaafbc5919c95025592d8de3a170e
- https://github.com/c-ares/c-ares/commit/1cc7e83c3bdfaafbc5919c95025592d8de3a170e
- FEDORA-2020-43d5a372fc
- FEDORA-2020-43d5a372fc
- https://packetstormsecurity.com/files/158755/GS20200804145053.txt
- https://packetstormsecurity.com/files/158755/GS20200804145053.txt
Closed vulnerabilities
BDU:2019-00426
Уязвимость функции AllocateDataSet программной библиотеки управления цветом Little CMS (Little Color Management System), позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
Modified: 2024-11-21
CVE-2018-11555
tificc in Little CMS 2.9 has an out-of-bounds write in the PrecalculatedXFORM function in cmsxform.c in liblcms2.a via a crafted TIFF file. NOTE: Little CMS developers do consider this a vulnerability because the issue is based on an sample program using LIBTIFF and do not apply to the lcms2 library, lcms2 does not depends on LIBTIFF other than to build sample programs, and the issue cannot be reproduced on the lcms2 library.”
Modified: 2024-11-21
CVE-2018-11556
tificc in Little CMS 2.9 has an out-of-bounds write in the cmsPipelineCheckAndRetreiveStages function in cmslut.c in liblcms2.a via a crafted TIFF file. NOTE: Little CMS developers do consider this a vulnerability because the issue is based on an sample program using LIBTIFF and do not apply to the lcms2 library, lcms2 does not depends on LIBTIFF other than to build sample programs, and the issue cannot be reproduced on the lcms2 library.”
Modified: 2024-11-21
CVE-2018-16435
Little CMS (aka Little Color Management System) 2.9 has an integer overflow in the AllocateDataSet function in cmscgats.c, leading to a heap-based buffer overflow in the SetData function via a crafted file in the second argument to cmsIT8LoadFromFile.
- RHSA-2018:3004
- RHSA-2018:3004
- https://github.com/mm2/Little-CMS/commit/768f70ca405cd3159d990e962d54456773bb8cf8
- https://github.com/mm2/Little-CMS/commit/768f70ca405cd3159d990e962d54456773bb8cf8
- https://github.com/mm2/Little-CMS/issues/171
- https://github.com/mm2/Little-CMS/issues/171
- [debian-lts-announce] 20180906 [SECURITY] [DLA 1496-1] lcms2 security update
- [debian-lts-announce] 20180906 [SECURITY] [DLA 1496-1] lcms2 security update
- GLSA-202105-18
- GLSA-202105-18
- USN-3770-1
- USN-3770-1
- USN-3770-2
- USN-3770-2
- DSA-4284
- DSA-4284
Closed bugs
Не находятся значки, нужные для отображения кнопок диалогов nemo
Closed vulnerabilities
BDU:2020-05179
Уязвимость интерпретатора языка программирования PHP, связанная с целочисленным переполнением буфера, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-11048
In PHP versions 7.2.x below 7.2.31, 7.3.x below 7.3.18 and 7.4.x below 7.4.6, when HTTP file uploads are allowed, supplying overly long filenames or field names could lead PHP engine to try to allocate oversized memory storage, hit the memory limit and stop processing the request, without cleaning up temporary files created by upload request. This potentially could lead to accumulation of uncleaned temporary files exhausting the disk space on the target server.
- openSUSE-SU-2020:0847
- openSUSE-SU-2020:0847
- https://bugs.php.net/bug.php?id=78875
- https://bugs.php.net/bug.php?id=78875
- https://bugs.php.net/bug.php?id=78876
- https://bugs.php.net/bug.php?id=78876
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2261-1] php5 security update
- [debian-lts-announce] 20200629 [SECURITY] [DLA 2261-1] php5 security update
- FEDORA-2020-8838d072d5
- FEDORA-2020-8838d072d5
- FEDORA-2020-9fa7f4e25c
- FEDORA-2020-9fa7f4e25c
- https://security.netapp.com/advisory/ntap-20200528-0006/
- https://security.netapp.com/advisory/ntap-20200528-0006/
- USN-4375-1
- USN-4375-1
- DSA-4717
- DSA-4717
- DSA-4719
- DSA-4719
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Closed vulnerabilities
BDU:2020-04684
Уязвимость функций cosl, sinl, sincosl и tanl системной библиотеки GNU C Library (glibc), позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03122
Уязвимость функции glob библиотеки glibc операционной системы Аврора, связанная с использованием памяти после ее освобождения, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код
Modified: 2024-11-21
CVE-2020-10029
The GNU C Library (aka glibc or libc6) before 2.32 could overflow an on-stack buffer during range reduction if an input to an 80-bit long double function contains a non-canonical bit pattern, a seen when passing a 0x5d414141414141410000 value to sinl on x86 targets. This is related to sysdeps/ieee754/ldbl-96/e_rem_pio2l.c.
- openSUSE-SU-2020:0381
- [debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update
- FEDORA-2020-444c372453
- FEDORA-2020-7f625c5ea8
- FEDORA-2020-244efc27af
- GLSA-202006-04
- https://security.netapp.com/advisory/ntap-20200327-0003/
- https://sourceware.org/bugzilla/show_bug.cgi?id=25487
- https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=9333498794cde1d5cca518badf79533a24114b6f
- USN-4416-1
- openSUSE-SU-2020:0381
- USN-4416-1
- https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Ba=commit%3Bh=9333498794cde1d5cca518badf79533a24114b6f
- https://sourceware.org/bugzilla/show_bug.cgi?id=25487
- https://security.netapp.com/advisory/ntap-20200327-0003/
- GLSA-202006-04
- FEDORA-2020-244efc27af
- FEDORA-2020-7f625c5ea8
- FEDORA-2020-444c372453
- [debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update
Modified: 2024-11-21
CVE-2020-1751
An out-of-bounds write vulnerability was found in glibc before 2.31 when handling signal trampolines on PowerPC. Specifically, the backtrace function did not properly check the array bounds when storing the frame address, resulting in a denial of service or potential code execution. The highest threat from this vulnerability is to system availability.
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1751
- GLSA-202006-04
- GLSA-202006-04
- https://security.netapp.com/advisory/ntap-20200430-0002/
- https://security.netapp.com/advisory/ntap-20200430-0002/
- https://sourceware.org/bugzilla/show_bug.cgi?id=25423
- https://sourceware.org/bugzilla/show_bug.cgi?id=25423
- USN-4416-1
- USN-4416-1
Modified: 2024-11-21
CVE-2020-1752
A use-after-free vulnerability introduced in glibc upstream version 2.14 was found in the way the tilde expansion was carried out. Directory paths containing an initial tilde followed by a valid username were affected by this issue. A local attacker could exploit this flaw by creating a specially crafted path that, when processed by the glob function, would potentially lead to arbitrary code execution. This was fixed in version 2.32.
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1752
- [bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update
- [debian-lts-announce] 20221017 [SECURITY] [DLA 3152-1] glibc security update
- GLSA-202101-20
- GLSA-202101-20
- https://security.netapp.com/advisory/ntap-20200511-0005/
- https://security.netapp.com/advisory/ntap-20200511-0005/
- https://sourceware.org/bugzilla/show_bug.cgi?id=25414
- https://sourceware.org/bugzilla/show_bug.cgi?id=25414
- https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=ddc650e9b3dc916eab417ce9f79e67337b05035c
- https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=ddc650e9b3dc916eab417ce9f79e67337b05035c
- USN-4416-1
- USN-4416-1
Closed bugs
glibc: FAIL: misc/test-errno-linux