ALT-BU-2020-3862-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2020-03224
Уязвимость страницы входа в личный архив Cgi/private.py системы управления почтовыми рассылками GNU Mailman, позволяющая нарушителю внедрить произвольный контент
BDU:2020-03997
Уязвимость программного обеспечения для управления рассылками электронных писем Mailman, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю оказать воздействие на целостность данных
Modified: 2024-11-21
CVE-2020-12108
/options/mailman in GNU Mailman before 2.1.31 allows Arbitrary Content Injection.
- openSUSE-SU-2020:0661
- openSUSE-SU-2020:0764
- openSUSE-SU-2020:1707
- openSUSE-SU-2020:1752
- https://bugs.launchpad.net/mailman/+bug/1873722
- https://code.launchpad.net/mailman
- [debian-lts-announce] 20200507 [SECURITY] [DLA 2204-1] mailman security update
- [debian-lts-announce] 20200710 [SECURITY] [DLA 2276-1] mailman security update
- FEDORA-2020-62f2df3ca4
- https://mail.python.org/pipermail/mailman-announce/
- USN-4354-1
- DSA-4991
- openSUSE-SU-2020:0661
- DSA-4991
- USN-4354-1
- https://mail.python.org/pipermail/mailman-announce/
- FEDORA-2020-62f2df3ca4
- [debian-lts-announce] 20200710 [SECURITY] [DLA 2276-1] mailman security update
- [debian-lts-announce] 20200507 [SECURITY] [DLA 2204-1] mailman security update
- https://code.launchpad.net/mailman
- https://bugs.launchpad.net/mailman/+bug/1873722
- openSUSE-SU-2020:1752
- openSUSE-SU-2020:1707
- openSUSE-SU-2020:0764
Modified: 2024-11-21
CVE-2020-12137
GNU Mailman 2.x before 2.1.30 uses the .obj extension for scrubbed application/octet-stream MIME parts. This behavior may contribute to XSS attacks against list-archive visitors, because an HTTP reply from an archive web server may lack a MIME type, and a web browser may perform MIME sniffing, conclude that the MIME type should have been text/html, and execute JavaScript code.
- http://bazaar.launchpad.net/~mailman-coders/mailman/2.1/view/head:/NEWS
- openSUSE-SU-2020:1707
- openSUSE-SU-2020:1752
- [oss-security] 20200424 Re: mailman 2.x: XSS via file attachments in list archives
- [debian-lts-announce] 20200503 [SECURITY] [DLA 2200-1] mailman security update
- FEDORA-2020-20b748e81e
- FEDORA-2020-69f2f1d987
- USN-4348-1
- DSA-4664
- https://www.openwall.com/lists/oss-security/2020/02/24/2
- https://www.openwall.com/lists/oss-security/2020/02/24/3
- http://bazaar.launchpad.net/~mailman-coders/mailman/2.1/view/head:/NEWS
- https://www.openwall.com/lists/oss-security/2020/02/24/3
- https://www.openwall.com/lists/oss-security/2020/02/24/2
- DSA-4664
- USN-4348-1
- FEDORA-2020-69f2f1d987
- FEDORA-2020-20b748e81e
- [debian-lts-announce] 20200503 [SECURITY] [DLA 2200-1] mailman security update
- [oss-security] 20200424 Re: mailman 2.x: XSS via file attachments in list archives
- openSUSE-SU-2020:1752
- openSUSE-SU-2020:1707
Modified: 2024-11-21
CVE-2020-15011
GNU Mailman before 2.1.33 allows arbitrary content injection via the Cgi/private.py private archive login page.
- openSUSE-SU-2020:1707
- openSUSE-SU-2020:1707
- openSUSE-SU-2020:1752
- openSUSE-SU-2020:1752
- https://bugs.launchpad.net/mailman/+bug/1877379
- https://bugs.launchpad.net/mailman/+bug/1877379
- [debian-lts-announce] 20200630 [SECURITY] [DLA 2265-1] mailman security update
- [debian-lts-announce] 20200630 [SECURITY] [DLA 2265-1] mailman security update
- [debian-lts-announce] 20200710 [SECURITY] [DLA 2276-1] mailman security update
- [debian-lts-announce] 20200710 [SECURITY] [DLA 2276-1] mailman security update
- USN-4406-1
- USN-4406-1
- DSA-4991
- DSA-4991
Closed bugs
MAILMAN_SITE_LIST = None breaks initial setup
Package kernel-image-std-debug updated to version 5.4.45-alt1 for branch sisyphus in task 252987.
Closed vulnerabilities
BDU:2021-06410
Уязвимость компонента mm/mremap.c ядра операционной системы Linux, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю повысить свои привилегии в системе
Modified: 2024-11-21
CVE-2020-10757
A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.
- openSUSE-SU-2020:0801
- Red Hat
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5bfea2d9b17f1034a68147a8b03b9789af5700f9
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
- FEDORA-2020-203ffedeb5
- https://security.netapp.com/advisory/ntap-20200702-0004/
- USN-4426-1
- USN-4439-1
- USN-4440-1
- USN-4483-1
- DSA-4698
- DSA-4699
- https://www.openwall.com/lists/oss-security/2020/06/04/4
- openSUSE-SU-2020:0801
- https://www.openwall.com/lists/oss-security/2020/06/04/4
- DSA-4699
- DSA-4698
- USN-4483-1
- USN-4440-1
- USN-4439-1
- USN-4426-1
- https://security.netapp.com/advisory/ntap-20200702-0004/
- FEDORA-2020-203ffedeb5
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5bfea2d9b17f1034a68147a8b03b9789af5700f9
- Red Hat
Package ganttproject updated to version 2.7.2-alt4 for branch sisyphus in task 252995.
Closed bugs
Сложности интеграции файлов программы GanttProject
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-23109
Buffer overflow vulnerability in function convert_colorspace in heif_colorconversion.cc in libheif v1.6.2, allows attackers to cause a denial of service and disclose sensitive information, via a crafted HEIF file.
Package kernel-image-std-def updated to version 5.4.45-alt1 for branch sisyphus in task 252989.
Closed vulnerabilities
BDU:2021-06410
Уязвимость компонента mm/mremap.c ядра операционной системы Linux, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю повысить свои привилегии в системе
Modified: 2024-11-21
CVE-2020-10757
A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.
- openSUSE-SU-2020:0801
- Red Hat
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5bfea2d9b17f1034a68147a8b03b9789af5700f9
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
- FEDORA-2020-203ffedeb5
- https://security.netapp.com/advisory/ntap-20200702-0004/
- USN-4426-1
- USN-4439-1
- USN-4440-1
- USN-4483-1
- DSA-4698
- DSA-4699
- https://www.openwall.com/lists/oss-security/2020/06/04/4
- openSUSE-SU-2020:0801
- https://www.openwall.com/lists/oss-security/2020/06/04/4
- DSA-4699
- DSA-4698
- USN-4483-1
- USN-4440-1
- USN-4439-1
- USN-4426-1
- https://security.netapp.com/advisory/ntap-20200702-0004/
- FEDORA-2020-203ffedeb5
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5bfea2d9b17f1034a68147a8b03b9789af5700f9
- Red Hat
Package kernel-image-un-def updated to version 5.7.1-alt1 for branch sisyphus in task 252994.
Closed vulnerabilities
BDU:2021-06410
Уязвимость компонента mm/mremap.c ядра операционной системы Linux, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю повысить свои привилегии в системе
Modified: 2024-11-21
CVE-2020-10757
A flaw was found in the Linux Kernel in versions after 4.5-rc1 in the way mremap handled DAX Huge Pages. This flaw allows a local attacker with access to a DAX enabled storage to escalate their privileges on the system.
- openSUSE-SU-2020:0801
- Red Hat
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5bfea2d9b17f1034a68147a8b03b9789af5700f9
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
- FEDORA-2020-203ffedeb5
- https://security.netapp.com/advisory/ntap-20200702-0004/
- USN-4426-1
- USN-4439-1
- USN-4440-1
- USN-4483-1
- DSA-4698
- DSA-4699
- https://www.openwall.com/lists/oss-security/2020/06/04/4
- openSUSE-SU-2020:0801
- https://www.openwall.com/lists/oss-security/2020/06/04/4
- DSA-4699
- DSA-4698
- USN-4483-1
- USN-4440-1
- USN-4439-1
- USN-4426-1
- https://security.netapp.com/advisory/ntap-20200702-0004/
- FEDORA-2020-203ffedeb5
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2242-1] linux-4.9 security update
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5bfea2d9b17f1034a68147a8b03b9789af5700f9
- Red Hat
Closed bugs
NSS and NSS_DISABLE_DBM
Closed vulnerabilities
BDU:2021-00799
Уязвимость реализации функции resetAccumulator() системы управления базами данных SQLite, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-13871
SQLite 3.32.2 has a use-after-free in resetAccumulator in select.c because the parse tree rewrite for window functions is too late.
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2340-1] sqlite3 security update
- FEDORA-2020-d0f892b069
- GLSA-202007-26
- https://security.netapp.com/advisory/ntap-20200619-0002/
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.sqlite.org/src/info/79eff1d0383179c4
- https://www.sqlite.org/src/info/c8d3b9f0a750a529
- https://www.sqlite.org/src/info/cd708fa84d2aaaea
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://www.sqlite.org/src/info/cd708fa84d2aaaea
- https://www.sqlite.org/src/info/c8d3b9f0a750a529
- https://www.sqlite.org/src/info/79eff1d0383179c4
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://security.netapp.com/advisory/ntap-20200619-0002/
- GLSA-202007-26
- FEDORA-2020-d0f892b069
- [debian-lts-announce] 20200822 [SECURITY] [DLA 2340-1] sqlite3 security update
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-13962
Qt 5.12.2 through 5.14.2, as used in unofficial builds of Mumble 1.3.0 and other products, mishandles OpenSSL's error queue, which can cause a denial of service to QSslSocket users. Because errors leak in unrelated TLS sessions, an unrelated session may be disconnected when any handshake fails. (Mumble 1.3.1 is not affected, regardless of the Qt version.)
- openSUSE-SU-2020:1319
- https://bugreports.qt.io/browse/QTBUG-83450
- https://github.com/mumble-voip/mumble/issues/3679
- https://github.com/mumble-voip/mumble/pull/4032
- FEDORA-2020-ca26a3f832
- FEDORA-2020-8372f6bae4
- FEDORA-2020-f869e01557
- GLSA-202007-18
- openSUSE-SU-2020:1319
- GLSA-202007-18
- FEDORA-2020-f869e01557
- FEDORA-2020-8372f6bae4
- FEDORA-2020-ca26a3f832
- https://github.com/mumble-voip/mumble/pull/4032
- https://github.com/mumble-voip/mumble/issues/3679
- https://bugreports.qt.io/browse/QTBUG-83450