ALT-BU-2020-3915-1
Branch p9 update bulletin.
Closed bugs
Добавить зависимость libctl-devel
Closed vulnerabilities
BDU:2021-03635
Уязвимость множества функций из libscp_v0.c RDP сервера xrdp, связанная с переполнением буфера на стеке, позволяющая нарушителю получить доступ к конфиденциальной информации или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-4044
The xrdp-sesman service before version 0.9.13.1 can be crashed by connecting over port 3350 and supplying a malicious payload. Once the xrdp-sesman process is dead, an unprivileged attacker on the server could then proceed to start their own imposter sesman service listening on port 3350. This will allow them to capture any user credentials that are submitted to XRDP and approve or reject arbitrary login credentials. For xorgxrdp sessions in particular, this allows an unauthorized user to hijack an existing session. This is a buffer overflow attack, so there may be a risk of arbitrary code execution as well.
- openSUSE-SU-2020:0999
- openSUSE-SU-2020:0999
- openSUSE-SU-2020:1200
- openSUSE-SU-2020:1200
- https://github.com/neutrinolabs/xrdp/commit/0c791d073d0eb344ee7aaafd221513dc9226762c
- https://github.com/neutrinolabs/xrdp/commit/0c791d073d0eb344ee7aaafd221513dc9226762c
- https://github.com/neutrinolabs/xrdp/releases/tag/v0.9.13.1
- https://github.com/neutrinolabs/xrdp/releases/tag/v0.9.13.1
- https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-j9fv-6fwf-p3g4
- https://github.com/neutrinolabs/xrdp/security/advisories/GHSA-j9fv-6fwf-p3g4
- [debian-lts-announce] 20200809 [SECURITY] [DLA 2319-1] xrdp security update
- [debian-lts-announce] 20200809 [SECURITY] [DLA 2319-1] xrdp security update
- DSA-4737
- DSA-4737
Closed bugs
Отсутствуют переводы на русский язык при некоторых сценариях входа
Package kubernetes updated to version 1.18.5-alt1 for branch p9 in task 254411.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-11252
The Kubernetes kube-controller-manager in versions v1.0-v1.17 is vulnerable to a credential leakage via error messages in mount failure logs and events for AzureFile and CephFS volumes.
Modified: 2024-11-21
CVE-2019-11254
The Kubernetes API Server component in versions 1.1-1.14, and versions prior to 1.15.10, 1.16.7 and 1.17.3 allows an authorized user who sends malicious YAML payloads to cause the kube-apiserver to consume excessive CPU cycles while parsing YAML.
- https://github.com/kubernetes/kubernetes/issues/89535
- https://github.com/kubernetes/kubernetes/issues/89535
- https://groups.google.com/d/msg/kubernetes-announce/ALL9s73E5ck/4yHe8J-PBAAJ
- https://groups.google.com/d/msg/kubernetes-announce/ALL9s73E5ck/4yHe8J-PBAAJ
- https://security.netapp.com/advisory/ntap-20200413-0003/
- https://security.netapp.com/advisory/ntap-20200413-0003/
Modified: 2024-11-21
CVE-2020-8551
The Kubelet component in versions 1.15.0-1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via the kubelet API, including the unauthenticated HTTP read-only API typically served on port 10255, and the authenticated HTTPS API typically served on port 10250.
- https://github.com/kubernetes/kubernetes/issues/89377
- https://github.com/kubernetes/kubernetes/issues/89377
- https://groups.google.com/forum/#%21topic/kubernetes-security-announce/2UOlsba2g0s
- https://groups.google.com/forum/#%21topic/kubernetes-security-announce/2UOlsba2g0s
- FEDORA-2020-aeea04cd13
- FEDORA-2020-aeea04cd13
- https://security.netapp.com/advisory/ntap-20200413-0003/
- https://security.netapp.com/advisory/ntap-20200413-0003/
Modified: 2024-11-21
CVE-2020-8552
The Kubernetes API server component in versions prior to 1.15.9, 1.16.0-1.16.6, and 1.17.0-1.17.2 has been found to be vulnerable to a denial of service attack via successful API requests.
- https://github.com/kubernetes/kubernetes/issues/89378
- https://github.com/kubernetes/kubernetes/issues/89378
- https://groups.google.com/forum/#%21topic/kubernetes-security-announce/2UOlsba2g0s
- https://groups.google.com/forum/#%21topic/kubernetes-security-announce/2UOlsba2g0s
- FEDORA-2020-aeea04cd13
- FEDORA-2020-aeea04cd13
- https://security.netapp.com/advisory/ntap-20200413-0003/
- https://security.netapp.com/advisory/ntap-20200413-0003/
Modified: 2024-11-21
CVE-2020-8555
The Kubernetes kube-controller-manager in versions v1.0-1.14, versions prior to v1.15.12, v1.16.9, v1.17.5, and version v1.18.0 are vulnerable to a Server Side Request Forgery (SSRF) that allows certain authorized users to leak up to 500 bytes of arbitrary information from unprotected endpoints within the master's host network (such as link-local or loopback services).
- [oss-security] 20200601 CVE-2020-8555: Kubernetes: Half-Blind SSRF in kube-controller-manager
- [oss-security] 20200601 CVE-2020-8555: Kubernetes: Half-Blind SSRF in kube-controller-manager
- [oss-security] 20210504 [kubernetes] CVE-2020-8562: Bypass of Kubernetes API Server proxy TOCTOU
- [oss-security] 20210504 [kubernetes] CVE-2020-8562: Bypass of Kubernetes API Server proxy TOCTOU
- https://github.com/kubernetes/kubernetes/issues/91542
- https://github.com/kubernetes/kubernetes/issues/91542
- https://groups.google.com/d/topic/kubernetes-security-announce/kEK27tqqs30/discussion
- https://groups.google.com/d/topic/kubernetes-security-announce/kEK27tqqs30/discussion
- FEDORA-2020-aeea04cd13
- FEDORA-2020-aeea04cd13
- https://security.netapp.com/advisory/ntap-20200724-0005/
- https://security.netapp.com/advisory/ntap-20200724-0005/
Modified: 2024-11-21
CVE-2020-8558
The Kubelet and kube-proxy components in versions 1.1.0-1.16.10, 1.17.0-1.17.6, and 1.18.0-1.18.3 were found to contain a security issue which allows adjacent hosts to reach TCP and UDP services bound to 127.0.0.1 running on the node or in the node's network namespace. Such a service is generally thought to be reachable only by other processes on the same host, but due to this defeect, could be reachable by other hosts on the same LAN as the node, or by containers running on the same node as the service.
- https://github.com/kubernetes/kubernetes/issues/92315
- https://github.com/kubernetes/kubernetes/issues/92315
- [Security Advisory] CVE-2020-8558: Kubernetes: Node setting allows for neighboring hosts to bypass localhost boundary
- [Security Advisory] CVE-2020-8558: Kubernetes: Node setting allows for neighboring hosts to bypass localhost boundary
- https://security.netapp.com/advisory/ntap-20200821-0001/
- https://security.netapp.com/advisory/ntap-20200821-0001/
Modified: 2024-11-21
CVE-2021-25743
kubectl does not neutralize escape, meta or control sequences contained in the raw data it outputs to a terminal. This includes but is not limited to the unstructured string fields in objects such as Events.
Closed vulnerabilities
BDU:2020-04871
Уязвимость пакетного менеджера Helm, существующая из-за неверного ограничения имени пути к каталогу с ограниченным доступом, позволяющая нарушителю выполнить распаковку файлов архива диаграмм за пределами целевого каталога
Modified: 2024-11-21
CVE-2019-1000008
All versions of Helm between Helm >=2.0.0 and < 2.12.2 contains a CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability in The commands `helm fetch --untar` and `helm lint some.tgz` that can result when chart archive files are unpacked a file may be unpacked outside of the target directory. This attack appears to be exploitable via a victim must run a helm command on a specially crafted chart archive. This vulnerability appears to have been fixed in 2.12.2.
Modified: 2024-11-21
CVE-2019-18658
In Helm 2.x before 2.15.2, commands that deal with loading a chart as a directory or packaging a chart provide an opportunity for a maliciously designed chart to include sensitive content such as /etc/passwd, or to execute a denial of service (DoS) via a special file such as /dev/urandom, via symlinks. No version of Tiller is known to be impacted. This is a client-only issue.