ALT-BU-2020-3862-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2020-03224
Уязвимость страницы входа в личный архив Cgi/private.py системы управления почтовыми рассылками GNU Mailman, позволяющая нарушителю внедрить произвольный контент
BDU:2020-03997
Уязвимость программного обеспечения для управления рассылками электронных писем Mailman, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю оказать воздействие на целостность данных
Modified: 2024-11-21
CVE-2020-12108
/options/mailman in GNU Mailman before 2.1.31 allows Arbitrary Content Injection.
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00036.html
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00047.html
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00063.html
- https://bugs.launchpad.net/mailman/+bug/1873722
- https://code.launchpad.net/mailman
- https://lists.debian.org/debian-lts-announce/2020/05/msg00007.html
- https://lists.debian.org/debian-lts-announce/2020/07/msg00007.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/74EQIVFB34Q4UYAQLCUWG55YLKAUWCHD/
- https://mail.python.org/pipermail/mailman-announce/
- https://usn.ubuntu.com/4354-1/
- https://www.debian.org/security/2021/dsa-4991
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00036.html
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00003.html
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00047.html
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00063.html
- https://bugs.launchpad.net/mailman/+bug/1873722
- https://code.launchpad.net/mailman
- https://lists.debian.org/debian-lts-announce/2020/05/msg00007.html
- https://lists.debian.org/debian-lts-announce/2020/07/msg00007.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/74EQIVFB34Q4UYAQLCUWG55YLKAUWCHD/
- https://mail.python.org/pipermail/mailman-announce/
- https://usn.ubuntu.com/4354-1/
- https://www.debian.org/security/2021/dsa-4991
Modified: 2024-11-21
CVE-2020-12137
GNU Mailman 2.x before 2.1.30 uses the .obj extension for scrubbed application/octet-stream MIME parts. This behavior may contribute to XSS attacks against list-archive visitors, because an HTTP reply from an archive web server may lack a MIME type, and a web browser may perform MIME sniffing, conclude that the MIME type should have been text/html, and execute JavaScript code.
- http://bazaar.launchpad.net/~mailman-coders/mailman/2.1/view/head:/NEWS
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00047.html
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00063.html
- http://www.openwall.com/lists/oss-security/2020/04/24/3
- https://lists.debian.org/debian-lts-announce/2020/05/msg00002.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6YCMGTTOXXCVM4O6CYZLTZDX6YLYORNF/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G4COSBBEMJYLV7WSW5QTUJUOFJFK47KK/
- https://usn.ubuntu.com/4348-1/
- https://www.debian.org/security/2020/dsa-4664
- https://www.openwall.com/lists/oss-security/2020/02/24/2
- https://www.openwall.com/lists/oss-security/2020/02/24/3
- http://bazaar.launchpad.net/~mailman-coders/mailman/2.1/view/head:/NEWS
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00047.html
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00063.html
- http://www.openwall.com/lists/oss-security/2020/04/24/3
- https://lists.debian.org/debian-lts-announce/2020/05/msg00002.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6YCMGTTOXXCVM4O6CYZLTZDX6YLYORNF/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G4COSBBEMJYLV7WSW5QTUJUOFJFK47KK/
- https://usn.ubuntu.com/4348-1/
- https://www.debian.org/security/2020/dsa-4664
- https://www.openwall.com/lists/oss-security/2020/02/24/2
- https://www.openwall.com/lists/oss-security/2020/02/24/3
Modified: 2024-11-21
CVE-2020-15011
GNU Mailman before 2.1.33 allows arbitrary content injection via the Cgi/private.py private archive login page.
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00047.html
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00063.html
- https://bugs.launchpad.net/mailman/+bug/1877379
- https://lists.debian.org/debian-lts-announce/2020/06/msg00036.html
- https://lists.debian.org/debian-lts-announce/2020/07/msg00007.html
- https://usn.ubuntu.com/4406-1/
- https://www.debian.org/security/2021/dsa-4991
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00047.html
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00063.html
- https://bugs.launchpad.net/mailman/+bug/1877379
- https://lists.debian.org/debian-lts-announce/2020/06/msg00036.html
- https://lists.debian.org/debian-lts-announce/2020/07/msg00007.html
- https://usn.ubuntu.com/4406-1/
- https://www.debian.org/security/2021/dsa-4991
Closed bugs
MAILMAN_SITE_LIST = None breaks initial setup
Package kernel-image-std-debug updated to version 5.4.45-alt1 for branch sisyphus in task 252987.
Closed vulnerabilities
Modified: 2024-09-16
BDU:2021-06410
Уязвимость компонента mm/mremap.c ядра операционной системы Linux, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю повысить свои привилегии в системе
Modified: 2024-11-21
CVE-2020-10757
A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1842525
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5bfea2d9b17f1034a68147a8b03b9789af5700f9
- https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IEM47BXZJLODRH5YNNZSAQ2NVM63MYMC/
- https://security.netapp.com/advisory/ntap-20200702-0004/
- https://usn.ubuntu.com/4426-1/
- https://usn.ubuntu.com/4439-1/
- https://usn.ubuntu.com/4440-1/
- https://usn.ubuntu.com/4483-1/
- https://www.debian.org/security/2020/dsa-4698
- https://www.debian.org/security/2020/dsa-4699
- https://www.openwall.com/lists/oss-security/2020/06/04/4
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1842525
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5bfea2d9b17f1034a68147a8b03b9789af5700f9
- https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IEM47BXZJLODRH5YNNZSAQ2NVM63MYMC/
- https://security.netapp.com/advisory/ntap-20200702-0004/
- https://usn.ubuntu.com/4426-1/
- https://usn.ubuntu.com/4439-1/
- https://usn.ubuntu.com/4440-1/
- https://usn.ubuntu.com/4483-1/
- https://www.debian.org/security/2020/dsa-4698
- https://www.debian.org/security/2020/dsa-4699
- https://www.openwall.com/lists/oss-security/2020/06/04/4
Package ganttproject updated to version 2.7.2-alt4 for branch sisyphus in task 252995.
Closed bugs
Сложности интеграции файлов программы GanttProject
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-23109
Buffer overflow vulnerability in function convert_colorspace in heif_colorconversion.cc in libheif v1.6.2, allows attackers to cause a denial of service and disclose sensitive information, via a crafted HEIF file.
Package kernel-image-std-def updated to version 5.4.45-alt1 for branch sisyphus in task 252989.
Closed vulnerabilities
Modified: 2024-09-16
BDU:2021-06410
Уязвимость компонента mm/mremap.c ядра операционной системы Linux, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю повысить свои привилегии в системе
Modified: 2024-11-21
CVE-2020-10757
A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1842525
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5bfea2d9b17f1034a68147a8b03b9789af5700f9
- https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IEM47BXZJLODRH5YNNZSAQ2NVM63MYMC/
- https://security.netapp.com/advisory/ntap-20200702-0004/
- https://usn.ubuntu.com/4426-1/
- https://usn.ubuntu.com/4439-1/
- https://usn.ubuntu.com/4440-1/
- https://usn.ubuntu.com/4483-1/
- https://www.debian.org/security/2020/dsa-4698
- https://www.debian.org/security/2020/dsa-4699
- https://www.openwall.com/lists/oss-security/2020/06/04/4
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1842525
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5bfea2d9b17f1034a68147a8b03b9789af5700f9
- https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IEM47BXZJLODRH5YNNZSAQ2NVM63MYMC/
- https://security.netapp.com/advisory/ntap-20200702-0004/
- https://usn.ubuntu.com/4426-1/
- https://usn.ubuntu.com/4439-1/
- https://usn.ubuntu.com/4440-1/
- https://usn.ubuntu.com/4483-1/
- https://www.debian.org/security/2020/dsa-4698
- https://www.debian.org/security/2020/dsa-4699
- https://www.openwall.com/lists/oss-security/2020/06/04/4
Package kernel-image-un-def updated to version 5.7.1-alt1 for branch sisyphus in task 252994.
Closed vulnerabilities
Modified: 2024-09-16
BDU:2021-06410
Уязвимость компонента mm/mremap.c ядра операционной системы Linux, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю повысить свои привилегии в системе
Modified: 2024-11-21
CVE-2020-10757
A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1842525
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5bfea2d9b17f1034a68147a8b03b9789af5700f9
- https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IEM47BXZJLODRH5YNNZSAQ2NVM63MYMC/
- https://security.netapp.com/advisory/ntap-20200702-0004/
- https://usn.ubuntu.com/4426-1/
- https://usn.ubuntu.com/4439-1/
- https://usn.ubuntu.com/4440-1/
- https://usn.ubuntu.com/4483-1/
- https://www.debian.org/security/2020/dsa-4698
- https://www.debian.org/security/2020/dsa-4699
- https://www.openwall.com/lists/oss-security/2020/06/04/4
- http://lists.opensuse.org/opensuse-security-announce/2020-06/msg00022.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1842525
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5bfea2d9b17f1034a68147a8b03b9789af5700f9
- https://lists.debian.org/debian-lts-announce/2020/06/msg00012.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IEM47BXZJLODRH5YNNZSAQ2NVM63MYMC/
- https://security.netapp.com/advisory/ntap-20200702-0004/
- https://usn.ubuntu.com/4426-1/
- https://usn.ubuntu.com/4439-1/
- https://usn.ubuntu.com/4440-1/
- https://usn.ubuntu.com/4483-1/
- https://www.debian.org/security/2020/dsa-4698
- https://www.debian.org/security/2020/dsa-4699
- https://www.openwall.com/lists/oss-security/2020/06/04/4
Closed bugs
NSS and NSS_DISABLE_DBM
Closed vulnerabilities
Modified: 2023-11-21
BDU:2021-00799
Уязвимость реализации функции resetAccumulator() системы управления базами данных SQLite, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-13871
SQLite 3.32.2 has a use-after-free in resetAccumulator in select.c because the parse tree rewrite for window functions is too late.
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BN32AGQPMHZRNM6P6L5GZPETOWTGXOKP/
- https://security.gentoo.org/glsa/202007-26
- https://security.netapp.com/advisory/ntap-20200619-0002/
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.sqlite.org/src/info/79eff1d0383179c4
- https://www.sqlite.org/src/info/c8d3b9f0a750a529
- https://www.sqlite.org/src/info/cd708fa84d2aaaea
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://lists.debian.org/debian-lts-announce/2020/08/msg00037.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BN32AGQPMHZRNM6P6L5GZPETOWTGXOKP/
- https://security.gentoo.org/glsa/202007-26
- https://security.netapp.com/advisory/ntap-20200619-0002/
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.sqlite.org/src/info/79eff1d0383179c4
- https://www.sqlite.org/src/info/c8d3b9f0a750a529
- https://www.sqlite.org/src/info/cd708fa84d2aaaea
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-13962
Qt 5.12.2 through 5.14.2, as used in unofficial builds of Mumble 1.3.0 and other products, mishandles OpenSSL's error queue, which can cause a denial of service to QSslSocket users. Because errors leak in unrelated TLS sessions, an unrelated session may be disconnected when any handshake fails. (Mumble 1.3.1 is not affected, regardless of the Qt version.)
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00004.html
- https://bugreports.qt.io/browse/QTBUG-83450
- https://github.com/mumble-voip/mumble/issues/3679
- https://github.com/mumble-voip/mumble/pull/4032
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4X6EDPIIAQPVP2CHL2CHDHJ25EECA7UE/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQJDBZUYMMF4R5QQKD2HTIKQU2NSKO63/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V3IZY7LKJ6NAXQDFYFR4S7L5BBHYK53K/
- https://security.gentoo.org/glsa/202007-18
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00004.html
- https://bugreports.qt.io/browse/QTBUG-83450
- https://github.com/mumble-voip/mumble/issues/3679
- https://github.com/mumble-voip/mumble/pull/4032
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4X6EDPIIAQPVP2CHL2CHDHJ25EECA7UE/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UQJDBZUYMMF4R5QQKD2HTIKQU2NSKO63/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V3IZY7LKJ6NAXQDFYFR4S7L5BBHYK53K/
- https://security.gentoo.org/glsa/202007-18