ALT-BU-2020-4123-2
Branch p9 update bulletin.
Closed vulnerabilities
BDU:2022-05695
Уязвимость пакета программ сетевого взаимодействия Samba, связанная с непроверенным состоянием ошибки, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05767
Уязвимость пакета программ сетевого взаимодействия Samba, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05769
Уязвимость пакета программ сетевого взаимодействия Samba, связанная с некорректным присваиванием привилегий, позволяющая нарушителю получить доступ к конфиденциальным данным
Modified: 2024-11-21
CVE-2020-14318
A flaw was found in the way samba handled file and directory permissions. An authenticated user could use this flaw to gain access to certain file and directory information which otherwise would be unavailable to the attacker.
- https://bugzilla.redhat.com/show_bug.cgi?id=1892631
- https://bugzilla.redhat.com/show_bug.cgi?id=1892631
- [debian-lts-announce] 20240422 [SECURITY] [DLA 3792-1] samba security update
- [debian-lts-announce] 20240422 [SECURITY] [DLA 3792-1] samba security update
- GLSA-202012-24
- GLSA-202012-24
- https://www.samba.org/samba/security/CVE-2020-14318.html
- https://www.samba.org/samba/security/CVE-2020-14318.html
Modified: 2024-11-21
CVE-2020-14323
A null pointer dereference flaw was found in samba's Winbind service in versions before 4.11.15, before 4.12.9 and before 4.13.1. A local user could use this flaw to crash the winbind service causing denial of service.
- openSUSE-SU-2020:1811
- openSUSE-SU-2020:1811
- openSUSE-SU-2020:1819
- openSUSE-SU-2020:1819
- https://bugzilla.redhat.com/show_bug.cgi?id=1891685
- https://bugzilla.redhat.com/show_bug.cgi?id=1891685
- [debian-lts-announce] 20201123 [SECURITY] [DLA 2463-1] samba security update
- [debian-lts-announce] 20201123 [SECURITY] [DLA 2463-1] samba security update
- [debian-lts-announce] 20240422 [SECURITY] [DLA 3792-1] samba security update
- [debian-lts-announce] 20240422 [SECURITY] [DLA 3792-1] samba security update
- FEDORA-2020-c1e9ae02d2
- FEDORA-2020-c1e9ae02d2
- FEDORA-2020-2e1a1489be
- FEDORA-2020-2e1a1489be
- GLSA-202012-24
- GLSA-202012-24
- https://security.netapp.com/advisory/ntap-20201103-0001/
- https://security.netapp.com/advisory/ntap-20201103-0001/
- https://www.samba.org/samba/security/CVE-2020-14323.html
- https://www.samba.org/samba/security/CVE-2020-14323.html
Modified: 2024-11-21
CVE-2020-14383
A flaw was found in samba's DNS server. An authenticated user could use this flaw to the RPC server to crash. This RPC server, which also serves protocols other than dnsserver, will be restarted after a short delay, but it is easy for an authenticated non administrative attacker to crash it again as soon as it returns. The Samba DNS server itself will continue to operate, but many RPC services will not.
- https://bugzilla.redhat.com/show_bug.cgi?id=1892636
- https://bugzilla.redhat.com/show_bug.cgi?id=1892636
- [debian-lts-announce] 20240422 [SECURITY] [DLA 3792-1] samba security update
- [debian-lts-announce] 20240422 [SECURITY] [DLA 3792-1] samba security update
- GLSA-202012-24
- GLSA-202012-24
- https://www.samba.org/samba/security/CVE-2020-14383.html
- https://www.samba.org/samba/security/CVE-2020-14383.html
Closed bugs
Сервис atftpd не запускается после перезагрузки системы
Closed vulnerabilities
Modified: 2024-11-21
CVE-2015-2063
Integer overflow in unace 1.2b allows remote attackers to cause a denial of service (crash) via a small file header in an ace archive, which triggers a buffer overflow.
Closed bugs
Изменить зависимость с php7-mysqli на php7-mysqlnd-mysqli
Closed vulnerabilities
BDU:2018-00106
Уязвимость функции ares_parse_naptr_reply библиотеки асинхронных DNS-запросов c-ares, позволяющая нарушителю выполнить чтение за границами буфера в памяти
BDU:2021-01024
Уязвимость программной платформы Node.js, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-04594
Уязвимость функций ares_destroy() и ares_getaddrinfo() библиотеки асинхронных DNS-запросов C-ares, связанная с использованием памяти после её освобождения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05898
Уязвимость функции ares_parse_soa_reply() библиотеки асинхронных DNS-запросов C-ares, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
Modified: 2024-11-21
CVE-2016-5180
Heap-based buffer overflow in the ares_create_query function in c-ares 1.x before 1.12.0 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly execute arbitrary code via a hostname with an escaped trailing dot.
- RHSA-2017:0002
- RHSA-2017:0002
- DSA-3682
- DSA-3682
- 93243
- 93243
- USN-3143-1
- USN-3143-1
- https://c-ares.haxx.se/adv_20160929.html
- https://c-ares.haxx.se/adv_20160929.html
- https://c-ares.haxx.se/CVE-2016-5180.patch
- https://c-ares.haxx.se/CVE-2016-5180.patch
- https://googlechromereleases.blogspot.in/2016/09/stable-channel-updates-for-chrome-os.html
- https://googlechromereleases.blogspot.in/2016/09/stable-channel-updates-for-chrome-os.html
- GLSA-201701-28
- GLSA-201701-28
- https://source.android.com/security/bulletin/2017-01-01.html
- https://source.android.com/security/bulletin/2017-01-01.html
Modified: 2024-11-21
CVE-2017-1000381
The c-ares function `ares_parse_naptr_reply()`, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way.
Modified: 2024-11-21
CVE-2020-14354
A possible use-after-free and double-free in c-ares lib version 1.16.0 if ares_destroy() is called prior to ares_getaddrinfo() completing. This flaw possibly allows an attacker to crash the service that uses c-ares lib. The highest threat from this vulnerability is to this service availability.
- https://bugzilla.redhat.com/show_bug.cgi?id=1866838
- https://bugzilla.redhat.com/show_bug.cgi?id=1866838
- https://c-ares.haxx.se/changelog.html
- https://c-ares.haxx.se/changelog.html
- https://github.com/c-ares/c-ares/commit/1cc7e83c3bdfaafbc5919c95025592d8de3a170e
- https://github.com/c-ares/c-ares/commit/1cc7e83c3bdfaafbc5919c95025592d8de3a170e
- FEDORA-2020-43d5a372fc
- FEDORA-2020-43d5a372fc
- https://packetstormsecurity.com/files/158755/GS20200804145053.txt
- https://packetstormsecurity.com/files/158755/GS20200804145053.txt
Modified: 2024-11-21
CVE-2020-22217
Buffer overflow vulnerability in c-ares before 1_16_1 thru 1_17_0 via function ares_parse_soa_reply in ares_parse_soa_reply.c.
Modified: 2024-11-21
CVE-2020-8277
A Node.js application that allows an attacker to trigger a DNS request for a host of their choice could trigger a Denial of Service in versions < 15.2.1, < 14.15.1, and < 12.19.1 by getting the application to resolve a DNS record with a larger number of responses. This is fixed in 15.2.1, 14.15.1, and 12.19.1.
- https://hackerone.com/reports/1033107
- https://hackerone.com/reports/1033107
- FEDORA-2020-7473744de1
- FEDORA-2020-7473744de1
- FEDORA-2020-307e873389
- FEDORA-2020-307e873389
- FEDORA-2021-ee913722db
- FEDORA-2021-ee913722db
- FEDORA-2021-afed2b904e
- FEDORA-2021-afed2b904e
- https://nodejs.org/en/blog/vulnerability/november-2020-security-releases/
- https://nodejs.org/en/blog/vulnerability/november-2020-security-releases/
- GLSA-202012-11
- GLSA-202012-11
- GLSA-202101-07
- GLSA-202101-07
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html