ALT-BU-2020-4129-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-27347
In tmux before version 3.1c the function input_csi_dispatch_sgr_colon() in file input.c contained a stack-based buffer-overflow that can be exploited by terminal output.
- https://github.com/tmux/tmux/commit/a868bacb46e3c900530bed47a1c6f85b0fbe701c
- https://github.com/tmux/tmux/commit/a868bacb46e3c900530bed47a1c6f85b0fbe701c
- https://raw.githubusercontent.com/tmux/tmux/3.1c/CHANGES
- https://raw.githubusercontent.com/tmux/tmux/3.1c/CHANGES
- GLSA-202011-10
- GLSA-202011-10
- https://www.openwall.com/lists/oss-security/2020/11/05/3
- https://www.openwall.com/lists/oss-security/2020/11/05/3
Package kernel-image-std-pae updated to version 5.4.75-alt1 for branch sisyphus in task 261119.
Closed vulnerabilities
BDU:2020-05831
Уязвимость ядра операционной системы Linux, связанная с использованием памяти после её освобождения, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2024-11-21
CVE-2020-25656
A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.
- https://bugzilla.redhat.com/show_bug.cgi?id=1888726
- https://bugzilla.redhat.com/show_bug.cgi?id=1888726
- [debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update
- [debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update
- [debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update
- [debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update
- https://lkml.org/lkml/2020/10/16/84
- https://lkml.org/lkml/2020/10/16/84
- https://lkml.org/lkml/2020/10/29/528
- https://lkml.org/lkml/2020/10/29/528
- https://www.starwindsoftware.com/security/sw-20210325-0006/
- https://www.starwindsoftware.com/security/sw-20210325-0006/
Closed vulnerabilities
BDU:2020-03623
Уязвимость функций xmlStringLenDecodeEntities библиотеки libxml2, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-04514
Уязвимость компонента xmlschemas.c библиотеки libxml2, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03429
Уязвимость функции xmlEncodeEntitiesInternal компонента libxml2/entities.c библиотеки Libxml2, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-20388
xmlSchemaPreRun in xmlschemas.c in libxml2 2.9.10 allows an xmlSchemaValidateStream memory leak.
- openSUSE-SU-2020:0681
- openSUSE-SU-2020:0681
- https://gitlab.gnome.org/GNOME/libxml2/merge_requests/68
- https://gitlab.gnome.org/GNOME/libxml2/merge_requests/68
- [debian-lts-announce] 20200909 [SECURITY] [DLA 2369-1] libxml2 security update
- [debian-lts-announce] 20200909 [SECURITY] [DLA 2369-1] libxml2 security update
- FEDORA-2020-41fe1680f6
- FEDORA-2020-41fe1680f6
- FEDORA-2020-0c71c00af4
- FEDORA-2020-0c71c00af4
- FEDORA-2020-7694e8be73
- FEDORA-2020-7694e8be73
- GLSA-202010-04
- GLSA-202010-04
- https://security.netapp.com/advisory/ntap-20200702-0005/
- https://security.netapp.com/advisory/ntap-20200702-0005/
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
Modified: 2024-11-21
CVE-2020-24977
GNOME project libxml2 v2.9.10 has a global buffer over-read vulnerability in xmlEncodeEntitiesInternal at libxml2/entities.c. The issue has been fixed in commit 50f06b3e.
- openSUSE-SU-2020:1430
- openSUSE-SU-2020:1430
- openSUSE-SU-2020:1465
- openSUSE-SU-2020:1465
- https://gitlab.gnome.org/GNOME/libxml2/-/commit/50f06b3efb638efb0abd95dc62dca05ae67882c2
- https://gitlab.gnome.org/GNOME/libxml2/-/commit/50f06b3efb638efb0abd95dc62dca05ae67882c2
- https://gitlab.gnome.org/GNOME/libxml2/-/issues/178
- https://gitlab.gnome.org/GNOME/libxml2/-/issues/178
- [mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar
- [mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar
- [debian-lts-announce] 20200909 [SECURITY] [DLA 2369-1] libxml2 security update
- [debian-lts-announce] 20200909 [SECURITY] [DLA 2369-1] libxml2 security update
- FEDORA-2020-35087800be
- FEDORA-2020-35087800be
- FEDORA-2020-ff317550e4
- FEDORA-2020-ff317550e4
- FEDORA-2020-b6aaf25741
- FEDORA-2020-b6aaf25741
- FEDORA-2020-be489044df
- FEDORA-2020-be489044df
- FEDORA-2020-935f62c3d9
- FEDORA-2020-935f62c3d9
- FEDORA-2020-7dd29dacad
- FEDORA-2020-7dd29dacad
- FEDORA-2020-20ab468a33
- FEDORA-2020-20ab468a33
- FEDORA-2020-dd2fc19b78
- FEDORA-2020-dd2fc19b78
- FEDORA-2020-b60dbdd538
- FEDORA-2020-b60dbdd538
- FEDORA-2020-7773c53bc8
- FEDORA-2020-7773c53bc8
- GLSA-202107-05
- GLSA-202107-05
- https://security.netapp.com/advisory/ntap-20200924-0001/
- https://security.netapp.com/advisory/ntap-20200924-0001/
- https://security.netapp.com/advisory/ntap-20200924-0001/
- https://security.netapp.com/advisory/ntap-20200924-0001/
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
Modified: 2024-11-21
CVE-2020-7595
xmlStringLenDecodeEntities in parser.c in libxml2 2.9.10 has an infinite loop in a certain end-of-file situation.
- openSUSE-SU-2020:0681
- openSUSE-SU-2020:0681
- https://cert-portal.siemens.com/productcert/pdf/ssa-292794.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-292794.pdf
- https://gitlab.gnome.org/GNOME/libxml2/commit/0e1a49c89076
- https://gitlab.gnome.org/GNOME/libxml2/commit/0e1a49c89076
- [debian-lts-announce] 20200909 [SECURITY] [DLA 2369-1] libxml2 security update
- [debian-lts-announce] 20200909 [SECURITY] [DLA 2369-1] libxml2 security update
- FEDORA-2020-41fe1680f6
- FEDORA-2020-41fe1680f6
- FEDORA-2020-0c71c00af4
- FEDORA-2020-0c71c00af4
- FEDORA-2020-7694e8be73
- FEDORA-2020-7694e8be73
- GLSA-202010-04
- GLSA-202010-04
- https://security.netapp.com/advisory/ntap-20200702-0005/
- https://security.netapp.com/advisory/ntap-20200702-0005/
- https://us-cert.cisa.gov/ics/advisories/icsa-21-103-08
- https://us-cert.cisa.gov/ics/advisories/icsa-21-103-08
- USN-4274-1
- USN-4274-1
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
Closed bugs
Не запускается deluge
Package kernel-image-un-def updated to version 5.9.6-alt1 for branch sisyphus in task 261122.
Closed vulnerabilities
BDU:2020-05831
Уязвимость ядра операционной системы Linux, связанная с использованием памяти после её освобождения, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2024-11-21
CVE-2020-25656
A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.
- https://bugzilla.redhat.com/show_bug.cgi?id=1888726
- https://bugzilla.redhat.com/show_bug.cgi?id=1888726
- [debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update
- [debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update
- [debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update
- [debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update
- https://lkml.org/lkml/2020/10/16/84
- https://lkml.org/lkml/2020/10/16/84
- https://lkml.org/lkml/2020/10/29/528
- https://lkml.org/lkml/2020/10/29/528
- https://www.starwindsoftware.com/security/sw-20210325-0006/
- https://www.starwindsoftware.com/security/sw-20210325-0006/
Package kernel-image-std-def updated to version 5.4.75-alt1 for branch sisyphus in task 261117.
Closed vulnerabilities
BDU:2020-05831
Уязвимость ядра операционной системы Linux, связанная с использованием памяти после её освобождения, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2024-11-21
CVE-2020-25656
A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.
- https://bugzilla.redhat.com/show_bug.cgi?id=1888726
- https://bugzilla.redhat.com/show_bug.cgi?id=1888726
- [debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update
- [debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update
- [debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update
- [debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update
- https://lkml.org/lkml/2020/10/16/84
- https://lkml.org/lkml/2020/10/16/84
- https://lkml.org/lkml/2020/10/29/528
- https://lkml.org/lkml/2020/10/29/528
- https://www.starwindsoftware.com/security/sw-20210325-0006/
- https://www.starwindsoftware.com/security/sw-20210325-0006/
Package alterator-setup updated to version 0.3.7-alt1 for branch sisyphus in task 260846.
Closed bugs
Не стартует
Package python3-module-ecdsa updated to version 0.16.0-alt1 for branch sisyphus in task 261150.
Closed vulnerabilities
BDU:2020-01480
Уязвимость криптографической библиотеки Python ECDSA, связанная с недостаточной обработкой исключительных состояний, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-01481
Уязвимость криптографической библиотеки Python ECDSA, связанная с некорректной проверкой криптографической подписи, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации
Modified: 2024-11-21
CVE-2019-14853
An error-handling flaw was found in python-ecdsa before version 0.13.3. During signature decoding, malformed DER signatures could raise unexpected exceptions (or no exceptions at all), which could lead to a denial of service.
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14853
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14853
- https://github.com/warner/python-ecdsa/releases/tag/python-ecdsa-0.13.3
- https://github.com/warner/python-ecdsa/releases/tag/python-ecdsa-0.13.3
- 20191218 [SECURITY] [DSA 4588-1] python-ecdsa security update
- 20191218 [SECURITY] [DSA 4588-1] python-ecdsa security update
- DSA-4588
- DSA-4588
Modified: 2024-11-21
CVE-2019-14859
A flaw was found in all python-ecdsa versions before 0.13.3, where it did not correctly verify whether signatures used DER encoding. Without this verification, a malformed signature could be accepted, making the signature malleable. Without proper verification, an attacker could use a malleable signature to create false transactions.
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14859
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14859
- https://github.com/warner/python-ecdsa/issues/114
- https://github.com/warner/python-ecdsa/issues/114
- https://github.com/warner/python-ecdsa/releases/tag/python-ecdsa-0.13.3
- https://github.com/warner/python-ecdsa/releases/tag/python-ecdsa-0.13.3
- https://pypi.org/project/ecdsa/0.13.3/
- https://pypi.org/project/ecdsa/0.13.3/