ALT-BU-2020-3992-1
Branch p8 update bulletin.
Package postgresql9.5 updated to version 9.5.23-alt0.M80P.1 for branch p8 in task 256188.
Closed vulnerabilities
BDU:2021-00079
Уязвимость системы управления базами данных PostgreSQL, связанная с ненадежным путем поиска, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-14350
It was found that some PostgreSQL extensions did not use search_path safely in their installation script. An attacker with sufficient privileges could use this flaw to trick an administrator into executing a specially crafted script, during the installation or update of such extension. This affects PostgreSQL versions before 12.4, before 11.9, before 10.14, before 9.6.19, and before 9.5.23.
- openSUSE-SU-2020:1227
- openSUSE-SU-2020:1227
- openSUSE-SU-2020:1228
- openSUSE-SU-2020:1228
- openSUSE-SU-2020:1244
- openSUSE-SU-2020:1244
- openSUSE-SU-2020:1243
- openSUSE-SU-2020:1243
- openSUSE-SU-2020:1312
- openSUSE-SU-2020:1312
- openSUSE-SU-2020:1326
- openSUSE-SU-2020:1326
- https://bugzilla.redhat.com/show_bug.cgi?id=1865746
- https://bugzilla.redhat.com/show_bug.cgi?id=1865746
- [debian-lts-announce] 20200817 [SECURITY] [DLA 2331-1] posgresql-9.6 security update
- [debian-lts-announce] 20200817 [SECURITY] [DLA 2331-1] posgresql-9.6 security update
- GLSA-202008-13
- GLSA-202008-13
- https://security.netapp.com/advisory/ntap-20200918-0002/
- https://security.netapp.com/advisory/ntap-20200918-0002/
- USN-4472-1
- USN-4472-1
Package postgresql9.6 updated to version 9.6.19-alt0.M80P.1 for branch p8 in task 256188.
Closed vulnerabilities
BDU:2021-00079
Уязвимость системы управления базами данных PostgreSQL, связанная с ненадежным путем поиска, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-14350
It was found that some PostgreSQL extensions did not use search_path safely in their installation script. An attacker with sufficient privileges could use this flaw to trick an administrator into executing a specially crafted script, during the installation or update of such extension. This affects PostgreSQL versions before 12.4, before 11.9, before 10.14, before 9.6.19, and before 9.5.23.
- openSUSE-SU-2020:1227
- openSUSE-SU-2020:1227
- openSUSE-SU-2020:1228
- openSUSE-SU-2020:1228
- openSUSE-SU-2020:1244
- openSUSE-SU-2020:1244
- openSUSE-SU-2020:1243
- openSUSE-SU-2020:1243
- openSUSE-SU-2020:1312
- openSUSE-SU-2020:1312
- openSUSE-SU-2020:1326
- openSUSE-SU-2020:1326
- https://bugzilla.redhat.com/show_bug.cgi?id=1865746
- https://bugzilla.redhat.com/show_bug.cgi?id=1865746
- [debian-lts-announce] 20200817 [SECURITY] [DLA 2331-1] posgresql-9.6 security update
- [debian-lts-announce] 20200817 [SECURITY] [DLA 2331-1] posgresql-9.6 security update
- GLSA-202008-13
- GLSA-202008-13
- https://security.netapp.com/advisory/ntap-20200918-0002/
- https://security.netapp.com/advisory/ntap-20200918-0002/
- USN-4472-1
- USN-4472-1
Package postgresql10 updated to version 10.14-alt0.M80P.1 for branch p8 in task 256188.
Closed vulnerabilities
BDU:2021-00079
Уязвимость системы управления базами данных PostgreSQL, связанная с ненадежным путем поиска, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2023-00613
Уязвимость системы управления базами данных PostgreSQL, связанная с неконтролируемым элементом пути поиска, позволяющая нарушителю повысить свои привилегии и выполнить произвольные команды
Modified: 2024-11-21
CVE-2020-14349
It was found that PostgreSQL versions before 12.4, before 11.9 and before 10.14 did not properly sanitize the search_path during logical replication. An authenticated attacker could use this flaw in an attack similar to CVE-2018-1058, in order to execute arbitrary SQL command in the context of the user used for replication.
- openSUSE-SU-2020:1228
- openSUSE-SU-2020:1228
- openSUSE-SU-2020:1244
- openSUSE-SU-2020:1244
- openSUSE-SU-2020:1243
- openSUSE-SU-2020:1243
- openSUSE-SU-2020:1312
- openSUSE-SU-2020:1312
- openSUSE-SU-2020:1326
- openSUSE-SU-2020:1326
- https://bugzilla.redhat.com/show_bug.cgi?id=1865744
- https://bugzilla.redhat.com/show_bug.cgi?id=1865744
- GLSA-202008-13
- GLSA-202008-13
- https://security.netapp.com/advisory/ntap-20200918-0002/
- https://security.netapp.com/advisory/ntap-20200918-0002/
- USN-4472-1
- USN-4472-1
Modified: 2024-11-21
CVE-2020-14350
It was found that some PostgreSQL extensions did not use search_path safely in their installation script. An attacker with sufficient privileges could use this flaw to trick an administrator into executing a specially crafted script, during the installation or update of such extension. This affects PostgreSQL versions before 12.4, before 11.9, before 10.14, before 9.6.19, and before 9.5.23.
- openSUSE-SU-2020:1227
- openSUSE-SU-2020:1227
- openSUSE-SU-2020:1228
- openSUSE-SU-2020:1228
- openSUSE-SU-2020:1244
- openSUSE-SU-2020:1244
- openSUSE-SU-2020:1243
- openSUSE-SU-2020:1243
- openSUSE-SU-2020:1312
- openSUSE-SU-2020:1312
- openSUSE-SU-2020:1326
- openSUSE-SU-2020:1326
- https://bugzilla.redhat.com/show_bug.cgi?id=1865746
- https://bugzilla.redhat.com/show_bug.cgi?id=1865746
- [debian-lts-announce] 20200817 [SECURITY] [DLA 2331-1] posgresql-9.6 security update
- [debian-lts-announce] 20200817 [SECURITY] [DLA 2331-1] posgresql-9.6 security update
- GLSA-202008-13
- GLSA-202008-13
- https://security.netapp.com/advisory/ntap-20200918-0002/
- https://security.netapp.com/advisory/ntap-20200918-0002/
- USN-4472-1
- USN-4472-1
Package postgresql11-1C updated to version 11.9-alt0.M80P.1 for branch p8 in task 256188.
Closed vulnerabilities
BDU:2021-00079
Уязвимость системы управления базами данных PostgreSQL, связанная с ненадежным путем поиска, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2023-00613
Уязвимость системы управления базами данных PostgreSQL, связанная с неконтролируемым элементом пути поиска, позволяющая нарушителю повысить свои привилегии и выполнить произвольные команды
Modified: 2024-11-21
CVE-2020-14349
It was found that PostgreSQL versions before 12.4, before 11.9 and before 10.14 did not properly sanitize the search_path during logical replication. An authenticated attacker could use this flaw in an attack similar to CVE-2018-1058, in order to execute arbitrary SQL command in the context of the user used for replication.
- openSUSE-SU-2020:1228
- openSUSE-SU-2020:1228
- openSUSE-SU-2020:1244
- openSUSE-SU-2020:1244
- openSUSE-SU-2020:1243
- openSUSE-SU-2020:1243
- openSUSE-SU-2020:1312
- openSUSE-SU-2020:1312
- openSUSE-SU-2020:1326
- openSUSE-SU-2020:1326
- https://bugzilla.redhat.com/show_bug.cgi?id=1865744
- https://bugzilla.redhat.com/show_bug.cgi?id=1865744
- GLSA-202008-13
- GLSA-202008-13
- https://security.netapp.com/advisory/ntap-20200918-0002/
- https://security.netapp.com/advisory/ntap-20200918-0002/
- USN-4472-1
- USN-4472-1
Modified: 2024-11-21
CVE-2020-14350
It was found that some PostgreSQL extensions did not use search_path safely in their installation script. An attacker with sufficient privileges could use this flaw to trick an administrator into executing a specially crafted script, during the installation or update of such extension. This affects PostgreSQL versions before 12.4, before 11.9, before 10.14, before 9.6.19, and before 9.5.23.
- openSUSE-SU-2020:1227
- openSUSE-SU-2020:1227
- openSUSE-SU-2020:1228
- openSUSE-SU-2020:1228
- openSUSE-SU-2020:1244
- openSUSE-SU-2020:1244
- openSUSE-SU-2020:1243
- openSUSE-SU-2020:1243
- openSUSE-SU-2020:1312
- openSUSE-SU-2020:1312
- openSUSE-SU-2020:1326
- openSUSE-SU-2020:1326
- https://bugzilla.redhat.com/show_bug.cgi?id=1865746
- https://bugzilla.redhat.com/show_bug.cgi?id=1865746
- [debian-lts-announce] 20200817 [SECURITY] [DLA 2331-1] posgresql-9.6 security update
- [debian-lts-announce] 20200817 [SECURITY] [DLA 2331-1] posgresql-9.6 security update
- GLSA-202008-13
- GLSA-202008-13
- https://security.netapp.com/advisory/ntap-20200918-0002/
- https://security.netapp.com/advisory/ntap-20200918-0002/
- USN-4472-1
- USN-4472-1
Package postgresql11 updated to version 11.9-alt0.M80P.1 for branch p8 in task 256188.
Closed vulnerabilities
BDU:2021-00079
Уязвимость системы управления базами данных PostgreSQL, связанная с ненадежным путем поиска, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2023-00613
Уязвимость системы управления базами данных PostgreSQL, связанная с неконтролируемым элементом пути поиска, позволяющая нарушителю повысить свои привилегии и выполнить произвольные команды
Modified: 2024-11-21
CVE-2020-14349
It was found that PostgreSQL versions before 12.4, before 11.9 and before 10.14 did not properly sanitize the search_path during logical replication. An authenticated attacker could use this flaw in an attack similar to CVE-2018-1058, in order to execute arbitrary SQL command in the context of the user used for replication.
- openSUSE-SU-2020:1228
- openSUSE-SU-2020:1228
- openSUSE-SU-2020:1244
- openSUSE-SU-2020:1244
- openSUSE-SU-2020:1243
- openSUSE-SU-2020:1243
- openSUSE-SU-2020:1312
- openSUSE-SU-2020:1312
- openSUSE-SU-2020:1326
- openSUSE-SU-2020:1326
- https://bugzilla.redhat.com/show_bug.cgi?id=1865744
- https://bugzilla.redhat.com/show_bug.cgi?id=1865744
- GLSA-202008-13
- GLSA-202008-13
- https://security.netapp.com/advisory/ntap-20200918-0002/
- https://security.netapp.com/advisory/ntap-20200918-0002/
- USN-4472-1
- USN-4472-1
Modified: 2024-11-21
CVE-2020-14350
It was found that some PostgreSQL extensions did not use search_path safely in their installation script. An attacker with sufficient privileges could use this flaw to trick an administrator into executing a specially crafted script, during the installation or update of such extension. This affects PostgreSQL versions before 12.4, before 11.9, before 10.14, before 9.6.19, and before 9.5.23.
- openSUSE-SU-2020:1227
- openSUSE-SU-2020:1227
- openSUSE-SU-2020:1228
- openSUSE-SU-2020:1228
- openSUSE-SU-2020:1244
- openSUSE-SU-2020:1244
- openSUSE-SU-2020:1243
- openSUSE-SU-2020:1243
- openSUSE-SU-2020:1312
- openSUSE-SU-2020:1312
- openSUSE-SU-2020:1326
- openSUSE-SU-2020:1326
- https://bugzilla.redhat.com/show_bug.cgi?id=1865746
- https://bugzilla.redhat.com/show_bug.cgi?id=1865746
- [debian-lts-announce] 20200817 [SECURITY] [DLA 2331-1] posgresql-9.6 security update
- [debian-lts-announce] 20200817 [SECURITY] [DLA 2331-1] posgresql-9.6 security update
- GLSA-202008-13
- GLSA-202008-13
- https://security.netapp.com/advisory/ntap-20200918-0002/
- https://security.netapp.com/advisory/ntap-20200918-0002/
- USN-4472-1
- USN-4472-1
Package postgresql12 updated to version 12.4-alt0.M80P.1 for branch p8 in task 256188.
Closed vulnerabilities
BDU:2021-00079
Уязвимость системы управления базами данных PostgreSQL, связанная с ненадежным путем поиска, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2023-00613
Уязвимость системы управления базами данных PostgreSQL, связанная с неконтролируемым элементом пути поиска, позволяющая нарушителю повысить свои привилегии и выполнить произвольные команды
Modified: 2024-11-21
CVE-2020-14349
It was found that PostgreSQL versions before 12.4, before 11.9 and before 10.14 did not properly sanitize the search_path during logical replication. An authenticated attacker could use this flaw in an attack similar to CVE-2018-1058, in order to execute arbitrary SQL command in the context of the user used for replication.
- openSUSE-SU-2020:1228
- openSUSE-SU-2020:1228
- openSUSE-SU-2020:1244
- openSUSE-SU-2020:1244
- openSUSE-SU-2020:1243
- openSUSE-SU-2020:1243
- openSUSE-SU-2020:1312
- openSUSE-SU-2020:1312
- openSUSE-SU-2020:1326
- openSUSE-SU-2020:1326
- https://bugzilla.redhat.com/show_bug.cgi?id=1865744
- https://bugzilla.redhat.com/show_bug.cgi?id=1865744
- GLSA-202008-13
- GLSA-202008-13
- https://security.netapp.com/advisory/ntap-20200918-0002/
- https://security.netapp.com/advisory/ntap-20200918-0002/
- USN-4472-1
- USN-4472-1
Modified: 2024-11-21
CVE-2020-14350
It was found that some PostgreSQL extensions did not use search_path safely in their installation script. An attacker with sufficient privileges could use this flaw to trick an administrator into executing a specially crafted script, during the installation or update of such extension. This affects PostgreSQL versions before 12.4, before 11.9, before 10.14, before 9.6.19, and before 9.5.23.
- openSUSE-SU-2020:1227
- openSUSE-SU-2020:1227
- openSUSE-SU-2020:1228
- openSUSE-SU-2020:1228
- openSUSE-SU-2020:1244
- openSUSE-SU-2020:1244
- openSUSE-SU-2020:1243
- openSUSE-SU-2020:1243
- openSUSE-SU-2020:1312
- openSUSE-SU-2020:1312
- openSUSE-SU-2020:1326
- openSUSE-SU-2020:1326
- https://bugzilla.redhat.com/show_bug.cgi?id=1865746
- https://bugzilla.redhat.com/show_bug.cgi?id=1865746
- [debian-lts-announce] 20200817 [SECURITY] [DLA 2331-1] posgresql-9.6 security update
- [debian-lts-announce] 20200817 [SECURITY] [DLA 2331-1] posgresql-9.6 security update
- GLSA-202008-13
- GLSA-202008-13
- https://security.netapp.com/advisory/ntap-20200918-0002/
- https://security.netapp.com/advisory/ntap-20200918-0002/
- USN-4472-1
- USN-4472-1
Closed vulnerabilities
BDU:2021-01693
Уязвимость реализации сборки DNS-сервера с опцией «--enable-native-pkcs11» Bind9, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01725
Уязвимость пакета создающий DNS-сервер Bind9, связанная с недостатком использования функции assert(), позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01726
Уязвимость пакета DNS-сервера Bind9, связанная с ошибками при обработке правил «update-policy» типа «subdomain», позволяющая нарушителю обновлять все части DNS-зоны вместе с тем поддоменом, обновление которого запланировано
Modified: 2024-11-21
CVE-2020-8622
In BIND 9.0.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker on the network path for a TSIG-signed request, or operating the server receiving the TSIG-signed request, could send a truncated response to that request, triggering an assertion failure, causing the server to exit. Alternately, an off-path attacker would have to correctly guess when a TSIG-signed request was sent, along with other characteristics of the packet and message, and spoof a truncated response to trigger an assertion failure, causing the server to exit.
- openSUSE-SU-2020:1699
- openSUSE-SU-2020:1699
- openSUSE-SU-2020:1701
- openSUSE-SU-2020:1701
- https://kb.isc.org/docs/cve-2020-8622
- https://kb.isc.org/docs/cve-2020-8622
- [debian-lts-announce] 20200829 [SECURITY] [DLA 2355-1] bind9 security update
- [debian-lts-announce] 20200829 [SECURITY] [DLA 2355-1] bind9 security update
- FEDORA-2020-a02b7a0f21
- FEDORA-2020-a02b7a0f21
- FEDORA-2020-14c194e5af
- FEDORA-2020-14c194e5af
- GLSA-202008-19
- GLSA-202008-19
- https://security.netapp.com/advisory/ntap-20200827-0003/
- https://security.netapp.com/advisory/ntap-20200827-0003/
- USN-4468-1
- USN-4468-1
- USN-4468-2
- USN-4468-2
- DSA-4752
- DSA-4752
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.synology.com/security/advisory/Synology_SA_20_19
- https://www.synology.com/security/advisory/Synology_SA_20_19
Modified: 2024-11-21
CVE-2020-8623
In BIND 9.10.0 -> 9.11.21, 9.12.0 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.10.5-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker that can reach a vulnerable system with a specially crafted query packet can trigger a crash. To be vulnerable, the system must: * be running BIND that was built with "--enable-native-pkcs11" * be signing one or more zones with an RSA key * be able to receive queries from a possible attacker
- openSUSE-SU-2020:1699
- openSUSE-SU-2020:1699
- openSUSE-SU-2020:1701
- openSUSE-SU-2020:1701
- https://kb.isc.org/docs/cve-2020-8623
- https://kb.isc.org/docs/cve-2020-8623
- [debian-lts-announce] 20200829 [SECURITY] [DLA 2355-1] bind9 security update
- [debian-lts-announce] 20200829 [SECURITY] [DLA 2355-1] bind9 security update
- FEDORA-2020-a02b7a0f21
- FEDORA-2020-a02b7a0f21
- FEDORA-2020-14c194e5af
- FEDORA-2020-14c194e5af
- GLSA-202008-19
- GLSA-202008-19
- https://security.netapp.com/advisory/ntap-20200827-0003/
- https://security.netapp.com/advisory/ntap-20200827-0003/
- USN-4468-1
- USN-4468-1
- DSA-4752
- DSA-4752
- https://www.synology.com/security/advisory/Synology_SA_20_19
- https://www.synology.com/security/advisory/Synology_SA_20_19
Modified: 2024-11-21
CVE-2020-8624
In BIND 9.9.12 -> 9.9.13, 9.10.7 -> 9.10.8, 9.11.3 -> 9.11.21, 9.12.1 -> 9.16.5, 9.17.0 -> 9.17.3, also affects 9.9.12-S1 -> 9.9.13-S1, 9.11.3-S1 -> 9.11.21-S1 of the BIND 9 Supported Preview Edition, An attacker who has been granted privileges to change a specific subset of the zone's content could abuse these unintended additional privileges to update other contents of the zone.
- openSUSE-SU-2020:1699
- openSUSE-SU-2020:1699
- openSUSE-SU-2020:1701
- openSUSE-SU-2020:1701
- https://kb.isc.org/docs/cve-2020-8624
- https://kb.isc.org/docs/cve-2020-8624
- FEDORA-2020-a02b7a0f21
- FEDORA-2020-a02b7a0f21
- FEDORA-2020-14c194e5af
- FEDORA-2020-14c194e5af
- GLSA-202008-19
- GLSA-202008-19
- https://security.netapp.com/advisory/ntap-20200827-0003/
- https://security.netapp.com/advisory/ntap-20200827-0003/
- USN-4468-1
- USN-4468-1
- DSA-4752
- DSA-4752
- https://www.synology.com/security/advisory/Synology_SA_20_19
- https://www.synology.com/security/advisory/Synology_SA_20_19
Package kernel-image-std-debug updated to version 4.9.233-alt0.M80P.1 for branch p8 in task 256691.
Closed vulnerabilities
BDU:2020-00304
Уязвимость функции try_merge_free_space ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2023-00700
Уязвимость функции vgacon_scrollback_cur() видеодрайвера ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-19448
In the Linux kernel 5.0.21 and 5.3.11, mounting a crafted btrfs filesystem image, performing some operations, and then making a syncfs system call can lead to a use-after-free in try_merge_free_space in fs/btrfs/free-space-cache.c because the pointer to a left data structure can be the same as the pointer to a right data structure.
- https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19448
- https://github.com/bobfuzzer/CVE/tree/master/CVE-2019-19448
- [debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update
- [debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update
- [debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update
- [debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update
- [debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update
- [debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update
- https://security.netapp.com/advisory/ntap-20200103-0001/
- https://security.netapp.com/advisory/ntap-20200103-0001/
- USN-4578-1
- USN-4578-1
Modified: 2024-11-21
CVE-2020-14331
A flaw was found in the Linux kernel’s implementation of the invert video code on VGA consoles when a local attacker attempts to resize the console, calling an ioctl VT_RESIZE, which causes an out-of-bounds write to occur. This flaw allows a local user with access to the VGA console to crash the system, potentially escalating their privileges on the system. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
- https://bugzilla.redhat.com/show_bug.cgi?id=1858679
- https://bugzilla.redhat.com/show_bug.cgi?id=1858679
- [debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update
- [debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update
- [debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update
- [debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update
- [debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update
- [debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update
- https://lists.openwall.net/linux-kernel/2020/07/29/234
- https://lists.openwall.net/linux-kernel/2020/07/29/234
- https://www.openwall.com/lists/oss-security/2020/07/28/2
- https://www.openwall.com/lists/oss-security/2020/07/28/2