ALT-BU-2020-3922-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2021-02002
Уязвимость функции parse_playlist библиотеки libavformat мультимедийной среды Ffmpeg, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-04596
Уязвимость функции dnn_execute_layer_pad компонента libavfilter/dnn/dnn_backend_native_layer_pad.c мультимедийной библиотеки FFmpeg, связанная с переполнением буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-05271
Уязвимость демультиплексора tty мультимедийной библиотеки FFmpeg, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным
Modified: 2024-11-21
CVE-2020-13904
FFmpeg 2.8 and 4.2.3 has a use-after-free via a crafted EXTINF duration in an m3u8 file because parse_playlist in libavformat/hls.c frees a pointer, and later that pointer is accessed in av_probe_input_format3 in libavformat/format.c.
- https://github.com/FFmpeg/FFmpeg/commit/6959358683c7533f586c07a766acc5fe9544d8b2
- [debian-lts-announce] 20200727 [SECURITY] [DLA 2291-1] ffmpeg security update
- https://patchwork.ffmpeg.org/project/ffmpeg/patch/20200529033905.41926-1-lq%40chinaffmpeg.org/
- GLSA-202007-58
- https://trac.ffmpeg.org/ticket/8673
- USN-4431-1
- DSA-4722
- https://github.com/FFmpeg/FFmpeg/commit/6959358683c7533f586c07a766acc5fe9544d8b2
- DSA-4722
- USN-4431-1
- https://trac.ffmpeg.org/ticket/8673
- GLSA-202007-58
- https://patchwork.ffmpeg.org/project/ffmpeg/patch/20200529033905.41926-1-lq%40chinaffmpeg.org/
- [debian-lts-announce] 20200727 [SECURITY] [DLA 2291-1] ffmpeg security update
Modified: 2024-11-21
CVE-2020-24020
Buffer Overflow vulnerability in FFMpeg 4.2.3 in dnn_execute_layer_pad in libavfilter/dnn/dnn_backend_native_layer_pad.c due to a call to memcpy without length checks, which could let a remote malicious user execute arbitrary code.
Modified: 2024-11-21
CVE-2021-3566
Prior to ffmpeg version 4.3, the tty demuxer did not have a 'read_probe' function assigned to it. By crafting a legitimate "ffconcat" file that references an image, followed by a file the triggers the tty demuxer, the contents of the second file will be copied into the output file verbatim (as long as the `-vcodec copy` option is passed to ffmpeg).
- https://github.com/FFmpeg/FFmpeg/commit/3bce9e9b3ea35c54bacccc793d7da99ea5157532#diff-74f6b92a0541378ad15de9c29c0a2b0c69881ad9ffc71abe568b88b535e00a7f
- https://github.com/FFmpeg/FFmpeg/commit/3bce9e9b3ea35c54bacccc793d7da99ea5157532#diff-74f6b92a0541378ad15de9c29c0a2b0c69881ad9ffc71abe568b88b535e00a7f
- [debian-lts-announce] 20210815 [SECURITY] [DLA 2742-1] ffmpeg security update
- [debian-lts-announce] 20210815 [SECURITY] [DLA 2742-1] ffmpeg security update
Package kernel-image-mp updated to version 5.7.8-alt1 for branch sisyphus in task 254915.
Closed vulnerabilities
BDU:2020-03435
Уязвимость функции usbtest_disconnect ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05546
Уязвимость функции __split_huge_pmd (mm/huge_memory.c) ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код
BDU:2021-03188
Уязвимость компонента fs/nfsd/vfs.c ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Modified: 2024-11-21
CVE-2020-15393
In the Linux kernel 4.4 through 5.7.6, usbtest_disconnect in drivers/usb/misc/usbtest.c has a memory leak, aka CID-28ebeb8db770.
- openSUSE-SU-2020:1062
- openSUSE-SU-2020:1062
- openSUSE-SU-2020:1153
- openSUSE-SU-2020:1153
- https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=831eebad70a25f55b5745453ac252d4afe997187
- https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=831eebad70a25f55b5745453ac252d4afe997187
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=28ebeb8db77035e058a510ce9bd17c2b9a009dba
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=28ebeb8db77035e058a510ce9bd17c2b9a009dba
- [debian-lts-announce] 20200812 [SECURITY] [DLA 2323-1] linux-4.19 new package
- [debian-lts-announce] 20200812 [SECURITY] [DLA 2323-1] linux-4.19 new package
- [debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update
- [debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update
- [debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update
- [debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update
- https://lkml.org/lkml/2020/6/2/968
- https://lkml.org/lkml/2020/6/2/968
- USN-4463-1
- USN-4463-1
- USN-4465-1
- USN-4465-1
- USN-4483-1
- USN-4483-1
- USN-4485-1
- USN-4485-1
Modified: 2024-11-21
CVE-2020-15780
An issue was discovered in drivers/acpi/acpi_configfs.c in the Linux kernel before 5.7.7. Injection of malicious ACPI tables via configfs could be used by attackers to bypass lockdown and secure boot restrictions, aka CID-75b0cea7bf30.
- openSUSE-SU-2020:1153
- openSUSE-SU-2020:1153
- openSUSE-SU-2020:1236
- openSUSE-SU-2020:1236
- [oss-security] 20200720 Re: Re: lockdown bypass on mainline kernel for loading unsigned modules
- [oss-security] 20200720 Re: Re: lockdown bypass on mainline kernel for loading unsigned modules
- [oss-security] 20200729 multiple secure boot grub2 and linux kernel vulnerabilities
- [oss-security] 20200729 multiple secure boot grub2 and linux kernel vulnerabilities
- [oss-security] 20200730 UEFI SecureBoot bypass fixes rolled out to kernels below radar
- [oss-security] 20200730 UEFI SecureBoot bypass fixes rolled out to kernels below radar
- [oss-security] 20200730 Re: UEFI SecureBoot bypass fixes rolled out to kernels below radar
- [oss-security] 20200730 Re: UEFI SecureBoot bypass fixes rolled out to kernels below radar
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.7
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.7
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=75b0cea7bf307f362057cc778efe89af4c615354
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=75b0cea7bf307f362057cc778efe89af4c615354
- https://git.zx2c4.com/american-unsigned-language/tree/american-unsigned-language-2.sh
- https://git.zx2c4.com/american-unsigned-language/tree/american-unsigned-language-2.sh
- USN-4425-1
- USN-4425-1
- USN-4426-1
- USN-4426-1
- USN-4439-1
- USN-4439-1
- USN-4440-1
- USN-4440-1
- https://www.openwall.com/lists/oss-security/2020/06/15/3
- https://www.openwall.com/lists/oss-security/2020/06/15/3
Modified: 2024-11-21
CVE-2020-24394
In the Linux kernel before 5.7.8, fs/nfsd/vfs.c (in the NFS server) can set incorrect permissions on new filesystem objects when the filesystem lacks ACL support, aka CID-22cf8419f131. This occurs because the current umask is not considered.
- openSUSE-SU-2020:1325
- openSUSE-SU-2020:1325
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962254
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=962254
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.8
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.8
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=22cf8419f1319ff87ec759d0ebdff4cbafaee832
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=22cf8419f1319ff87ec759d0ebdff4cbafaee832
- https://security.netapp.com/advisory/ntap-20200904-0003/
- https://security.netapp.com/advisory/ntap-20200904-0003/
- USN-4465-1
- USN-4465-1
- USN-4483-1
- USN-4483-1
- USN-4485-1
- USN-4485-1
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.starwindsoftware.com/security/sw-20210325-0004/
- https://www.starwindsoftware.com/security/sw-20210325-0004/
Modified: 2024-11-21
CVE-2020-29368
An issue was discovered in __split_huge_pmd in mm/huge_memory.c in the Linux kernel before 5.7.5. The copy-on-write implementation can grant unintended write access because of a race condition in a THP mapcount check, aka CID-c444eb564fb1.
- https://bugs.chromium.org/p/project-zero/issues/detail?id=2045
- https://bugs.chromium.org/p/project-zero/issues/detail?id=2045
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.5
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.7.5
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c444eb564fb16645c172d550359cb3d75fe8a040
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c444eb564fb16645c172d550359cb3d75fe8a040
- https://security.netapp.com/advisory/ntap-20210108-0002/
- https://security.netapp.com/advisory/ntap-20210108-0002/
Package gem-rubocop updated to version 0.88.0-alt1 for branch sisyphus in task 254835.
Closed bugs
Неработоспособен изкоробки
Package claws-mail updated to version 3.17.6-alt1 for branch sisyphus in task 254937.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-15917
common/session.c in Claws Mail before 3.17.6 has a protocol violation because suffix data after STARTTLS is mishandled.
- openSUSE-SU-2020:1116
- openSUSE-SU-2020:1116
- openSUSE-SU-2020:1139
- openSUSE-SU-2020:1139
- openSUSE-SU-2020:1269
- openSUSE-SU-2020:1269
- openSUSE-SU-2020:1192
- openSUSE-SU-2020:1192
- openSUSE-SU-2020:1822
- openSUSE-SU-2020:1822
- https://git.claws-mail.org/?p=claws.git%3Ba=blob%3Bf=RELEASE_NOTES
- https://git.claws-mail.org/?p=claws.git%3Ba=blob%3Bf=RELEASE_NOTES
- https://git.claws-mail.org/?p=claws.git%3Ba=commit%3Bh=fcc25329049b6f9bd8d890f1197ed61eb12e14d5
- https://git.claws-mail.org/?p=claws.git%3Ba=commit%3Bh=fcc25329049b6f9bd8d890f1197ed61eb12e14d5
- FEDORA-2020-fe6c1a9c16
- FEDORA-2020-fe6c1a9c16
- FEDORA-2020-2def860ce7
- FEDORA-2020-2def860ce7
- GLSA-202007-56
- GLSA-202007-56