ALT-BU-2020-4135-1
Branch sisyphus update bulletin.
Package firecracker updated to version 0.23.0-alt1 for branch sisyphus in task 261408.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-16843
In Firecracker 0.20.x before 0.20.1 and 0.21.x before 0.21.2, the network stack can freeze under heavy ingress traffic. This can result in a denial of service on the microVM when it is configured with a single network interface, and an availability problem for the microVM network interface on which the issue is triggered.
- [oss-security] 20200813 CVE-2020-16843: Firecracker v0.20.0, v0.21.0 and v0.21.1 network stack can freeze under heavy ingress traffic
- [oss-security] 20200813 CVE-2020-16843: Firecracker v0.20.0, v0.21.0 and v0.21.1 network stack can freeze under heavy ingress traffic
- https://github.com/firecracker-microvm/firecracker/issues/2057
- https://github.com/firecracker-microvm/firecracker/issues/2057
- https://www.openwall.com/lists/oss-security/2020/08/13/1
- https://www.openwall.com/lists/oss-security/2020/08/13/1
Modified: 2024-11-21
CVE-2020-27174
In Amazon AWS Firecracker before 0.21.3, and 0.22.x before 0.22.1, the serial console buffer can grow its memory usage without limit when data is sent to the standard input. This can result in a memory leak on the microVM emulation thread, possibly occupying more memory than intended on the host.
- [oss-security] 20201023 CVE-2020-27174: Firecracker serial console emulation may allocate an unbounded amount of memory
- [oss-security] 20201023 CVE-2020-27174: Firecracker serial console emulation may allocate an unbounded amount of memory
- https://github.com/firecracker-microvm/firecracker/issues/2177
- https://github.com/firecracker-microvm/firecracker/issues/2177
- https://github.com/firecracker-microvm/firecracker/pull/2178
- https://github.com/firecracker-microvm/firecracker/pull/2178
- https://github.com/firecracker-microvm/firecracker/pull/2179
- https://github.com/firecracker-microvm/firecracker/pull/2179
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-7943
Puppet Server and PuppetDB provide useful performance and debugging information via their metrics API endpoints. For PuppetDB this may contain things like hostnames. Puppet Server reports resource names and titles for defined types (which may contain sensitive information) as well as function names and class names. Previously, these endpoints were open to the local network. PE 2018.1.13 & 2019.5.0, Puppet Server 6.9.2 & 5.3.12, and PuppetDB 6.9.1 & 5.2.13 disable trapperkeeper-metrics /v1 metrics API and only allows /v2 access on localhost by default. This affects software versions: Puppet Enterprise 2018.1.x stream prior to 2018.1.13 Puppet Enterprise prior to 2019.5.0 Puppet Server prior to 6.9.2 Puppet Server prior to 5.3.12 PuppetDB prior to 6.9.1 PuppetDB prior to 5.2.13 Resolved in: Puppet Enterprise 2018.1.13 Puppet Enterprise 2019.5.0 Puppet Server 6.9.2 Puppet Server 5.3.12 PuppetDB 6.9.1 PuppetDB 5.2.13
Package puppetserver updated to version 6.13.0-alt1 for branch sisyphus in task 260432.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-7943
Puppet Server and PuppetDB provide useful performance and debugging information via their metrics API endpoints. For PuppetDB this may contain things like hostnames. Puppet Server reports resource names and titles for defined types (which may contain sensitive information) as well as function names and class names. Previously, these endpoints were open to the local network. PE 2018.1.13 & 2019.5.0, Puppet Server 6.9.2 & 5.3.12, and PuppetDB 6.9.1 & 5.2.13 disable trapperkeeper-metrics /v1 metrics API and only allows /v2 access on localhost by default. This affects software versions: Puppet Enterprise 2018.1.x stream prior to 2018.1.13 Puppet Enterprise prior to 2019.5.0 Puppet Server prior to 6.9.2 Puppet Server prior to 5.3.12 PuppetDB prior to 6.9.1 PuppetDB prior to 5.2.13 Resolved in: Puppet Enterprise 2018.1.13 Puppet Enterprise 2019.5.0 Puppet Server 6.9.2 Puppet Server 5.3.12 PuppetDB 6.9.1 PuppetDB 5.2.13
Closed bugs
inkscape: error while loading shared libraries: libinkscape_base.so: cannot open shared object file: No such file or directory
Package python3-module-trio updated to version 0.10.0-alt2 for branch sisyphus in task 261454.
Closed bugs
Запакованы тесты
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-24994
Stack overflow in the parse_tag function in libass/ass_parse.c in libass before 0.15.0 allows remote attackers to cause a denial of service or remote code execution via a crafted file.
- https://github.com/libass/libass/commit/6835731c2fe4164a0c50bc91d12c43b2a2b4e
- https://github.com/libass/libass/commit/6835731c2fe4164a0c50bc91d12c43b2a2b4e
- https://github.com/libass/libass/issues/422
- https://github.com/libass/libass/issues/422
- https://github.com/libass/libass/issues/422#issuecomment-806002919
- https://github.com/libass/libass/issues/422#issuecomment-806002919
- https://github.com/libass/libass/issues/423
- https://github.com/libass/libass/issues/423
Modified: 2024-11-21
CVE-2020-26682
In libass 0.14.0, the `ass_outline_construct`'s call to `outline_stroke` causes a signed integer overflow.
- [oss-security] 20201119 Re: libass ass_outline.c signed integer overflow
- [oss-security] 20201119 Re: libass ass_outline.c signed integer overflow
- https://github.com/libass/libass/issues/431
- https://github.com/libass/libass/issues/431
- https://github.com/libass/libass/pull/432
- https://github.com/libass/libass/pull/432
- GLSA-202012-12
- GLSA-202012-12
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-26950
In certain circumstances, the MCallGetProperty opcode can be emitted with unmet assumptions resulting in an exploitable use-after-free condition. This vulnerability affects Firefox < 82.0.3, Firefox ESR < 78.4.1, and Thunderbird < 78.4.2.
- http://packetstormsecurity.com/files/166175/Firefox-MCallGetProperty-Write-Side-Effects-Use-After-Free.html
- http://packetstormsecurity.com/files/166175/Firefox-MCallGetProperty-Write-Side-Effects-Use-After-Free.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=1675905
- https://bugzilla.mozilla.org/show_bug.cgi?id=1675905
- https://www.mozilla.org/security/advisories/mfsa2020-49/
- https://www.mozilla.org/security/advisories/mfsa2020-49/
Package kernel-image-std-debug updated to version 5.4.76-alt1 for branch sisyphus in task 261481.
Closed vulnerabilities
BDU:2020-05831
Уязвимость ядра операционной системы Linux, связанная с использованием памяти после её освобождения, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2024-11-21
CVE-2020-25656
A flaw was found in the Linux kernel. A use-after-free was found in the way the console subsystem was using ioctls KDGKBSENT and KDSKBSENT. A local user could use this flaw to get read memory access out of bounds. The highest threat from this vulnerability is to data confidentiality.
- https://bugzilla.redhat.com/show_bug.cgi?id=1888726
- https://bugzilla.redhat.com/show_bug.cgi?id=1888726
- [debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update
- [debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update
- [debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update
- [debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update
- https://lkml.org/lkml/2020/10/16/84
- https://lkml.org/lkml/2020/10/16/84
- https://lkml.org/lkml/2020/10/29/528
- https://lkml.org/lkml/2020/10/29/528
- https://www.starwindsoftware.com/security/sw-20210325-0006/
- https://www.starwindsoftware.com/security/sw-20210325-0006/
Package kernel-image-un-def updated to version 5.9.7-alt1 for branch sisyphus in task 261490.
Closed vulnerabilities
BDU:2020-05544
Уязвимость функции KD_FONT_OP_COPY драйвера fbcon ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-27815
A flaw was found in the JFS filesystem code in the Linux Kernel which allows a local attacker with the ability to set extended attributes to panic the system, causing memory corruption or escalating privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
- [oss-security] 20201201 CVE-2020-27815 Linux kernel: jfs: array-index-out-of-bounds in dbAdjTree
- [oss-security] 20201201 CVE-2020-27815 Linux kernel: jfs: array-index-out-of-bounds in dbAdjTree
- [oss-security] 20201228 Re: CVE-2020-27815 Linux kernel: jfs: array-index-out-of-bounds in dbAdjTree
- [oss-security] 20201228 Re: CVE-2020-27815 Linux kernel: jfs: array-index-out-of-bounds in dbAdjTree
- https://bugzilla.redhat.com/show_bug.cgi?id=1897668%2C
- https://bugzilla.redhat.com/show_bug.cgi?id=1897668%2C
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c61b3e4839007668360ed8b87d7da96d2e59fc6c
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=c61b3e4839007668360ed8b87d7da96d2e59fc6c
- [debian-lts-announce] 20210212 [SECURITY] [DLA 2557-1] linux-4.19 security update
- [debian-lts-announce] 20210212 [SECURITY] [DLA 2557-1] linux-4.19 security update
- [debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update
- [debian-lts-announce] 20210309 [SECURITY] [DLA 2586-1] linux security update
- https://security.netapp.com/advisory/ntap-20210702-0004/
- https://security.netapp.com/advisory/ntap-20210702-0004/
- DSA-4843
- DSA-4843
- https://www.openwall.com/lists/oss-security/2020/11/30/5%2C
- https://www.openwall.com/lists/oss-security/2020/11/30/5%2C
- https://www.openwall.com/lists/oss-security/2020/12/28/1%2C
- https://www.openwall.com/lists/oss-security/2020/12/28/1%2C
Modified: 2024-11-21
CVE-2020-28974
A slab-out-of-bounds read in fbcon in the Linux kernel before 5.9.7 could be used by local attackers to read privileged information or potentially crash the kernel, aka CID-3c4e0dff2095. This occurs because KD_FONT_OP_COPY in drivers/tty/vt/vt.c can be used for manipulations such as font height.
- [oss-security] 20201124 Re: Linux kernel slab-out-of-bounds Read in fbcon
- [oss-security] 20201124 Re: Linux kernel slab-out-of-bounds Read in fbcon
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.9.7
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.9.7
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c4e0dff2095c579b142d5a0693257f1c58b4804
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c4e0dff2095c579b142d5a0693257f1c58b4804
- [debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update
- [debian-lts-announce] 20201210 [SECURITY] [DLA 2483-1] linux-4.19 security update
- [debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update
- [debian-lts-announce] 20201218 [SECURITY] [DLA 2494-1] linux security update
- https://seclists.org/oss-sec/2020/q4/104
- https://seclists.org/oss-sec/2020/q4/104
- https://security.netapp.com/advisory/ntap-20210108-0003/
- https://security.netapp.com/advisory/ntap-20210108-0003/