ALT-BU-2020-3989-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2020-03313
Уязвимость функции mapping0_forward (mapping0.c) мультимедийной библиотеки libvorbis, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2020-03314
Уязвимость функции bark_noise_hybridmp (psy.c) мультимедийной библиотеки libvorbis, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-10392
mapping0_forward in mapping0.c in Xiph.Org libvorbis 1.3.6 does not validate the number of channels, which allows remote attackers to cause a denial of service (heap-based buffer overflow or over-read) or possibly have unspecified other impact via a crafted file.
- RHSA-2019:3703
- RHSA-2019:3703
- https://gitlab.xiph.org/xiph/vorbis/issues/2335
- https://gitlab.xiph.org/xiph/vorbis/issues/2335
- [debian-lts-announce] 20191127 [SECURITY] [DLA 2013-1] libvorbis security update
- [debian-lts-announce] 20191127 [SECURITY] [DLA 2013-1] libvorbis security update
- [debian-lts-announce] 20211127 [SECURITY] [DLA 2828-1] libvorbis security update
- [debian-lts-announce] 20211127 [SECURITY] [DLA 2828-1] libvorbis security update
- GLSA-202003-36
- GLSA-202003-36
Modified: 2024-11-21
CVE-2018-10393
bark_noise_hybridmp in psy.c in Xiph.Org libvorbis 1.3.6 has a stack-based buffer over-read.
- RHSA-2019:3703
- RHSA-2019:3703
- https://gitlab.xiph.org/xiph/vorbis/issues/2334
- https://gitlab.xiph.org/xiph/vorbis/issues/2334
- [debian-lts-announce] 20191127 [SECURITY] [DLA 2013-1] libvorbis security update
- [debian-lts-announce] 20191127 [SECURITY] [DLA 2013-1] libvorbis security update
- [debian-lts-announce] 20211127 [SECURITY] [DLA 2828-1] libvorbis security update
- [debian-lts-announce] 20211127 [SECURITY] [DLA 2828-1] libvorbis security update
- GLSA-202003-36
- GLSA-202003-36
Closed vulnerabilities
BDU:2021-02074
Уязвимость фунции exif_data_load_data_content (exif-data.c) операционной системы Android, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-0198
In exif_data_load_data_content of exif-data.c, there is a possible UBSAN abort due to an integer overflow. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-146428941
- [debian-lts-announce] 20200613 [SECURITY] [DLA 2249-1] libexif security update
- FEDORA-2020-0aa0fc1b0c
- FEDORA-2020-e99ef3282f
- GLSA-202011-19
- https://source.android.com/security/bulletin/pixel/2020-06-01
- USN-4396-1
- [debian-lts-announce] 20200613 [SECURITY] [DLA 2249-1] libexif security update
- USN-4396-1
- https://source.android.com/security/bulletin/pixel/2020-06-01
- GLSA-202011-19
- FEDORA-2020-e99ef3282f
- FEDORA-2020-0aa0fc1b0c
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-18179
An issue was discovered in Open Ticket Request System (OTRS) 7.0.x through 7.0.12, and Community Edition 5.0.x through 5.0.38 and 6.0.x through 6.0.23. An attacker who is logged into OTRS as an agent is able to list tickets assigned to other agents, even tickets in a queue where the attacker doesn't have permissions.
- openSUSE-SU-2020:0551
- openSUSE-SU-2020:0551
- openSUSE-SU-2020:1475
- openSUSE-SU-2020:1475
- openSUSE-SU-2020:1509
- openSUSE-SU-2020:1509
- https://community.otrs.com/security-advisory-2019-14-security-update-for-otrs-framework/
- https://community.otrs.com/security-advisory-2019-14-security-update-for-otrs-framework/
- [debian-lts-announce] 20200101 [SECURITY] [DLA 2053-1] otrs2 security update
- [debian-lts-announce] 20200101 [SECURITY] [DLA 2053-1] otrs2 security update
- [debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update
- [debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update
Modified: 2024-11-21
CVE-2019-18180
Improper Check for filenames with overly long extensions in PostMaster (sending in email) or uploading files (e.g. attaching files to mails) of ((OTRS)) Community Edition and OTRS allows an remote attacker to cause an endless loop. This issue affects: OTRS AG: ((OTRS)) Community Edition 5.0.x version 5.0.38 and prior versions; 6.0.x version 6.0.23 and prior versions. OTRS AG: OTRS 7.0.x version 7.0.12 and prior versions.
- openSUSE-SU-2020:0551
- openSUSE-SU-2020:0551
- openSUSE-SU-2020:1475
- openSUSE-SU-2020:1475
- openSUSE-SU-2020:1509
- openSUSE-SU-2020:1509
- https://community.otrs.com/security-advisory-2019-15-security-update-for-otrs-framework/
- https://community.otrs.com/security-advisory-2019-15-security-update-for-otrs-framework/
- [debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update
- [debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update
Modified: 2024-11-21
CVE-2020-1765
An improper control of parameters allows the spoofing of the from fields of the following screens: AgentTicketCompose, AgentTicketForward, AgentTicketBounce and AgentTicketEmailOutbound. This issue affects: ((OTRS)) Community Edition 5.0.x version 5.0.39 and prior versions; 6.0.x version 6.0.24 and prior versions. OTRS 7.0.x version 7.0.13 and prior versions.
- openSUSE-SU-2020:0551
- openSUSE-SU-2020:0551
- openSUSE-SU-2020:1475
- openSUSE-SU-2020:1475
- openSUSE-SU-2020:1509
- openSUSE-SU-2020:1509
- [debian-lts-announce] 20200129 [SECURITY] [DLA 2079-1] otrs2 security update
- [debian-lts-announce] 20200129 [SECURITY] [DLA 2079-1] otrs2 security update
- [debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update
- [debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update
- https://otrs.com/release-notes/otrs-security-advisory-2020-01/
- https://otrs.com/release-notes/otrs-security-advisory-2020-01/
Modified: 2024-11-21
CVE-2020-1766
Due to improper handling of uploaded images it is possible in very unlikely and rare conditions to force the agents browser to execute malicious javascript from a special crafted SVG file rendered as inline jpg file. This issue affects: ((OTRS)) Community Edition 5.0.x version 5.0.39 and prior versions; 6.0.x version 6.0.24 and prior versions. OTRS 7.0.x version 7.0.13 and prior versions.
- openSUSE-SU-2020:0551
- openSUSE-SU-2020:0551
- openSUSE-SU-2020:1475
- openSUSE-SU-2020:1475
- openSUSE-SU-2020:1509
- openSUSE-SU-2020:1509
- [debian-lts-announce] 20200129 [SECURITY] [DLA 2079-1] otrs2 security update
- [debian-lts-announce] 20200129 [SECURITY] [DLA 2079-1] otrs2 security update
- [debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update
- [debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update
- https://otrs.com/release-notes/otrs-security-advisory-2020-02/
- https://otrs.com/release-notes/otrs-security-advisory-2020-02/
Modified: 2024-11-21
CVE-2020-1767
Agent A is able to save a draft (i.e. for customer reply). Then Agent B can open the draft, change the text completely and send it in the name of Agent A. For the customer it will not be visible that the message was sent by another agent. This issue affects: ((OTRS)) Community Edition 6.0.x version 6.0.24 and prior versions. OTRS 7.0.x version 7.0.13 and prior versions.
- [debian-lts-announce] 20200129 [SECURITY] [DLA 2079-1] otrs2 security update
- [debian-lts-announce] 20200129 [SECURITY] [DLA 2079-1] otrs2 security update
- [debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update
- [debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update
- https://otrs.com/release-notes/otrs-security-advisory-2020-03/
- https://otrs.com/release-notes/otrs-security-advisory-2020-03/
Modified: 2024-11-21
CVE-2020-1769
In the login screens (in agent and customer interface), Username and Password fields use autocomplete, which might be considered as security issue. This issue affects: ((OTRS)) Community Edition: 5.0.41 and prior versions, 6.0.26 and prior versions. OTRS: 7.0.15 and prior versions.
- openSUSE-SU-2020:0551
- openSUSE-SU-2020:0551
- openSUSE-SU-2020:1475
- openSUSE-SU-2020:1475
- openSUSE-SU-2020:1509
- openSUSE-SU-2020:1509
- [debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update
- [debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update
- https://otrs.com/release-notes/otrs-security-advisory-2020-06/
- https://otrs.com/release-notes/otrs-security-advisory-2020-06/
Modified: 2024-11-21
CVE-2020-1770
Support bundle generated files could contain sensitive information that might be unwanted to be disclosed. This issue affects: ((OTRS)) Community Edition: 5.0.41 and prior versions, 6.0.26 and prior versions. OTRS: 7.0.15 and prior versions.
- openSUSE-SU-2020:0551
- openSUSE-SU-2020:0551
- openSUSE-SU-2020:1475
- openSUSE-SU-2020:1475
- openSUSE-SU-2020:1509
- openSUSE-SU-2020:1509
- [debian-lts-announce] 20200501 [SECURITY] [DLA 2198-1] otrs2 security update
- [debian-lts-announce] 20200501 [SECURITY] [DLA 2198-1] otrs2 security update
- [debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update
- [debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update
- https://otrs.com/release-notes/otrs-security-advisory-2020-07/
- https://otrs.com/release-notes/otrs-security-advisory-2020-07/
Modified: 2024-11-21
CVE-2020-1771
Attacker is able craft an article with a link to the customer address book with malicious content (JavaScript). When agent opens the link, JavaScript code is executed due to the missing parameter encoding. This issue affects: ((OTRS)) Community Edition: 6.0.26 and prior versions. OTRS: 7.0.15 and prior versions.
- openSUSE-SU-2020:0551
- openSUSE-SU-2020:0551
- openSUSE-SU-2020:1475
- openSUSE-SU-2020:1475
- openSUSE-SU-2020:1509
- openSUSE-SU-2020:1509
- [debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update
- [debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update
- https://otrs.com/release-notes/otrs-security-advisory-2020-08/
- https://otrs.com/release-notes/otrs-security-advisory-2020-08/
Modified: 2024-11-21
CVE-2020-1772
It's possible to craft Lost Password requests with wildcards in the Token value, which allows attacker to retrieve valid Token(s), generated by users which already requested new passwords. This issue affects: ((OTRS)) Community Edition 5.0.41 and prior versions, 6.0.26 and prior versions. OTRS: 7.0.15 and prior versions.
- openSUSE-SU-2020:0551
- openSUSE-SU-2020:0551
- openSUSE-SU-2020:1475
- openSUSE-SU-2020:1475
- openSUSE-SU-2020:1509
- openSUSE-SU-2020:1509
- [debian-lts-announce] 20200501 [SECURITY] [DLA 2198-1] otrs2 security update
- [debian-lts-announce] 20200501 [SECURITY] [DLA 2198-1] otrs2 security update
- [debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update
- [debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update
- https://otrs.com/release-notes/otrs-security-advisory-2020-09/
- https://otrs.com/release-notes/otrs-security-advisory-2020-09/
Modified: 2024-11-21
CVE-2020-1773
An attacker with the ability to generate session IDs or password reset tokens, either by being able to authenticate or by exploiting OSA-2020-09, may be able to predict other users session IDs, password reset tokens and automatically generated passwords. This issue affects ((OTRS)) Community Edition: 5.0.41 and prior versions, 6.0.26 and prior versions. OTRS; 7.0.15 and prior versions.
- openSUSE-SU-2020:0551
- openSUSE-SU-2020:0551
- openSUSE-SU-2020:1475
- openSUSE-SU-2020:1475
- openSUSE-SU-2020:1509
- openSUSE-SU-2020:1509
- [debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update
- [debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update
- https://otrs.com/release-notes/otrs-security-advisory-2020-10/
- https://otrs.com/release-notes/otrs-security-advisory-2020-10/
Modified: 2024-11-21
CVE-2020-1774
When user downloads PGP or S/MIME keys/certificates, exported file has same name for private and public keys. Therefore it's possible to mix them and to send private key to the third-party instead of public key. This issue affects ((OTRS)) Community Edition: 5.0.42 and prior versions, 6.0.27 and prior versions. OTRS: 7.0.16 and prior versions.
- [debian-lts-announce] 20200501 [SECURITY] [DLA 2198-1] otrs2 security update
- [debian-lts-announce] 20200501 [SECURITY] [DLA 2198-1] otrs2 security update
- [debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update
- [debian-lts-announce] 20230831 [SECURITY] [DLA 3551-1] otrs2 security update
- https://otrs.com/release-notes/otrs-security-advisory-2020-11/
- https://otrs.com/release-notes/otrs-security-advisory-2020-11/
Modified: 2024-11-21
CVE-2020-1776
When an agent user is renamed or set to invalid the session belonging to the user is keept active. The session can not be used to access ticket data in the case the agent is invalid. This issue affects ((OTRS)) Community Edition: 6.0.28 and prior versions. OTRS: 7.0.18 and prior versions, 8.0.4. and prior versions.
Closed vulnerabilities
BDU:2021-00571
Уязвимость компонента Kafka Protocol Dissector (epan/dissectors/packet-kafka.c) программы-анализатора трафика Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-17498
In Wireshark 3.2.0 to 3.2.5, the Kafka protocol dissector could crash. This was addressed in epan/dissectors/packet-kafka.c by avoiding a double free during LZ4 decompression.
- openSUSE-SU-2020:1878
- openSUSE-SU-2020:1878
- openSUSE-SU-2020:1882
- openSUSE-SU-2020:1882
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16672
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16672
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=76afda963de4f0b9be24f2d8e873990a5cbf221b
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=76afda963de4f0b9be24f2d8e873990a5cbf221b
- FEDORA-2020-7f91f10f2b
- FEDORA-2020-7f91f10f2b
- FEDORA-2020-2981a0224d
- FEDORA-2020-2981a0224d
- GLSA-202008-14
- GLSA-202008-14
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.wireshark.org/security/wnpa-sec-2020-10.html
- https://www.wireshark.org/security/wnpa-sec-2020-10.html
Closed vulnerabilities
BDU:2021-01693
Уязвимость реализации сборки DNS-сервера с опцией «--enable-native-pkcs11» Bind9, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01725
Уязвимость пакета создающий DNS-сервер Bind9, связанная с недостатком использования функции assert(), позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01726
Уязвимость пакета DNS-сервера Bind9, связанная с ошибками при обработке правил «update-policy» типа «subdomain», позволяющая нарушителю обновлять все части DNS-зоны вместе с тем поддоменом, обновление которого запланировано
Modified: 2024-11-21
CVE-2020-8622
In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request, could send a truncated response to that request, triggering an assertion failure, causing the server to exit. Alternately, an off-path attacker would have to correctly guess when a TSIG-signed request was sent, along with other characteristics of the packet and message, and spoof a truncated response to trigger an assertion failure, causing the server to exit.
- openSUSE-SU-2020:1699
- openSUSE-SU-2020:1699
- openSUSE-SU-2020:1701
- openSUSE-SU-2020:1701
- https://kb.isc.org/docs/cve-2020-8622
- https://kb.isc.org/docs/cve-2020-8622
- [debian-lts-announce] 20200829 [SECURITY] [DLA 2355-1] bind9 security update
- [debian-lts-announce] 20200829 [SECURITY] [DLA 2355-1] bind9 security update
- FEDORA-2020-a02b7a0f21
- FEDORA-2020-a02b7a0f21
- FEDORA-2020-14c194e5af
- FEDORA-2020-14c194e5af
- GLSA-202008-19
- GLSA-202008-19
- https://security.netapp.com/advisory/ntap-20200827-0003/
- https://security.netapp.com/advisory/ntap-20200827-0003/
- USN-4468-1
- USN-4468-1
- USN-4468-2
- USN-4468-2
- DSA-4752
- DSA-4752
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.synology.com/security/advisory/Synology_SA_20_19
- https://www.synology.com/security/advisory/Synology_SA_20_19
Modified: 2024-11-21
CVE-2020-8623
In BIND 9.10.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.10.5-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker that can reach a vulnerable system with a specially crafted query packet can trigger a crash. To be vulnerable, the system must: * be running BIND that was built with "--enable-native-pkcs11" * be signing one or more zones with an RSA key * be able to receive queries from a possible attacker
- openSUSE-SU-2020:1699
- openSUSE-SU-2020:1699
- openSUSE-SU-2020:1701
- openSUSE-SU-2020:1701
- https://kb.isc.org/docs/cve-2020-8623
- https://kb.isc.org/docs/cve-2020-8623
- [debian-lts-announce] 20200829 [SECURITY] [DLA 2355-1] bind9 security update
- [debian-lts-announce] 20200829 [SECURITY] [DLA 2355-1] bind9 security update
- FEDORA-2020-a02b7a0f21
- FEDORA-2020-a02b7a0f21
- FEDORA-2020-14c194e5af
- FEDORA-2020-14c194e5af
- GLSA-202008-19
- GLSA-202008-19
- https://security.netapp.com/advisory/ntap-20200827-0003/
- https://security.netapp.com/advisory/ntap-20200827-0003/
- USN-4468-1
- USN-4468-1
- DSA-4752
- DSA-4752
- https://www.synology.com/security/advisory/Synology_SA_20_19
- https://www.synology.com/security/advisory/Synology_SA_20_19
Modified: 2024-11-21
CVE-2020-8624
In BIND 9.9.12 -> 9.9.13, 9.10.7 -> 9.10.8, 9.11.3 -> 9.11.21, 9.12.1 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.12-S1 -> 9.9.13-S1, 9.11.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker who has been granted privileges to change a specific subset of the zone's content could abuse these unintended additional privileges to update other contents of the zone.
- openSUSE-SU-2020:1699
- openSUSE-SU-2020:1699
- openSUSE-SU-2020:1701
- openSUSE-SU-2020:1701
- https://kb.isc.org/docs/cve-2020-8624
- https://kb.isc.org/docs/cve-2020-8624
- FEDORA-2020-a02b7a0f21
- FEDORA-2020-a02b7a0f21
- FEDORA-2020-14c194e5af
- FEDORA-2020-14c194e5af
- GLSA-202008-19
- GLSA-202008-19
- https://security.netapp.com/advisory/ntap-20200827-0003/
- https://security.netapp.com/advisory/ntap-20200827-0003/
- USN-4468-1
- USN-4468-1
- DSA-4752
- DSA-4752
- https://www.synology.com/security/advisory/Synology_SA_20_19
- https://www.synology.com/security/advisory/Synology_SA_20_19
Closed bugs
nasm-2.15.04: FTBFS на i586 у пакетов, использующих его при сборке
Closed bugs
make-initrd: do not fsck before resume from hibernation