ALT-BU-2020-4163-1
Branch p9 update bulletin.
Closed vulnerabilities
BDU:2022-05695
Уязвимость пакета программ сетевого взаимодействия Samba, связанная с непроверенным состоянием ошибки, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05767
Уязвимость пакета программ сетевого взаимодействия Samba, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05769
Уязвимость пакета программ сетевого взаимодействия Samba, связанная с некорректным присваиванием привилегий, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2023-00716
Уязвимость пакета программ сетевого взаимодействия Samba, связанная с отсутствием защиты служебных данных, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2024-11-21
CVE-2020-14318
A flaw was found in the way samba handled file and directory permissions. An authenticated user could use this flaw to gain access to certain file and directory information which otherwise would be unavailable to the attacker.
- https://bugzilla.redhat.com/show_bug.cgi?id=1892631
- https://bugzilla.redhat.com/show_bug.cgi?id=1892631
- [debian-lts-announce] 20240422 [SECURITY] [DLA 3792-1] samba security update
- [debian-lts-announce] 20240422 [SECURITY] [DLA 3792-1] samba security update
- GLSA-202012-24
- GLSA-202012-24
- https://www.samba.org/samba/security/CVE-2020-14318.html
- https://www.samba.org/samba/security/CVE-2020-14318.html
Modified: 2024-11-21
CVE-2020-14323
A null pointer dereference flaw was found in samba's Winbind service in versions before 4.11.15, before 4.12.9 and before 4.13.1. A local user could use this flaw to crash the winbind service causing denial of service.
- openSUSE-SU-2020:1811
- openSUSE-SU-2020:1811
- openSUSE-SU-2020:1819
- openSUSE-SU-2020:1819
- https://bugzilla.redhat.com/show_bug.cgi?id=1891685
- https://bugzilla.redhat.com/show_bug.cgi?id=1891685
- [debian-lts-announce] 20201123 [SECURITY] [DLA 2463-1] samba security update
- [debian-lts-announce] 20201123 [SECURITY] [DLA 2463-1] samba security update
- [debian-lts-announce] 20240422 [SECURITY] [DLA 3792-1] samba security update
- [debian-lts-announce] 20240422 [SECURITY] [DLA 3792-1] samba security update
- FEDORA-2020-c1e9ae02d2
- FEDORA-2020-c1e9ae02d2
- FEDORA-2020-2e1a1489be
- FEDORA-2020-2e1a1489be
- GLSA-202012-24
- GLSA-202012-24
- https://security.netapp.com/advisory/ntap-20201103-0001/
- https://security.netapp.com/advisory/ntap-20201103-0001/
- https://www.samba.org/samba/security/CVE-2020-14323.html
- https://www.samba.org/samba/security/CVE-2020-14323.html
Modified: 2024-11-21
CVE-2020-14383
A flaw was found in samba's DNS server. An authenticated user could use this flaw to the RPC server to crash. This RPC server, which also serves protocols other than dnsserver, will be restarted after a short delay, but it is easy for an authenticated non administrative attacker to crash it again as soon as it returns. The Samba DNS server itself will continue to operate, but many RPC services will not.
- https://bugzilla.redhat.com/show_bug.cgi?id=1892636
- https://bugzilla.redhat.com/show_bug.cgi?id=1892636
- [debian-lts-announce] 20240422 [SECURITY] [DLA 3792-1] samba security update
- [debian-lts-announce] 20240422 [SECURITY] [DLA 3792-1] samba security update
- GLSA-202012-24
- GLSA-202012-24
- https://www.samba.org/samba/security/CVE-2020-14383.html
- https://www.samba.org/samba/security/CVE-2020-14383.html
Modified: 2024-11-21
CVE-2021-20251
A flaw was found in samba. A race condition in the password lockout code may lead to the risk of brute force attacks being successful if special conditions are met.
- https://bugzilla.redhat.com/show_bug.cgi?id=1929800
- https://bugzilla.redhat.com/show_bug.cgi?id=1929800
- https://bugzilla.samba.org/show_bug.cgi?id=14611
- https://bugzilla.samba.org/show_bug.cgi?id=14611
- GLSA-202309-06
- GLSA-202309-06
- https://security.netapp.com/advisory/ntap-20230331-0005/
- https://security.netapp.com/advisory/ntap-20230331-0005/
Closed bugs
Файловые конфликты с пакетом gnustep-gworkspace
Closed vulnerabilities
BDU:2023-00526
Уязвимость пакета libsss_certmap сервиса управления доступом к удаленным каталогам и механизма аутентификации sssd, позволяющая нарушителю повысить свои привилегии
Modified: 2025-03-27
CVE-2022-4254
sssd: libsss_certmap fails to sanitise certificate data used in LDAP filters
- https://access.redhat.com/security/cve/CVE-2022-4254
- https://access.redhat.com/security/cve/CVE-2022-4254
- https://bugzilla.redhat.com/show_bug.cgi?id=2149894
- https://bugzilla.redhat.com/show_bug.cgi?id=2149894
- https://github.com/SSSD/sssd/commit/a2b9a84460429181f2a4fa7e2bb5ab49fd561274
- https://github.com/SSSD/sssd/commit/a2b9a84460429181f2a4fa7e2bb5ab49fd561274
- https://github.com/SSSD/sssd/issues/5135
- https://github.com/SSSD/sssd/issues/5135
- [debian-lts-announce] 20230529 [SECURITY] [DLA 3436-1] sssd security update
- [debian-lts-announce] 20230529 [SECURITY] [DLA 3436-1] sssd security update
Package kernel-image-std-debug updated to version 5.4.80-alt1 for branch p9 in task 262429.
Closed vulnerabilities
BDU:2021-03412
Уязвимость ядра операционной системы Linux, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным
Modified: 2024-11-21
CVE-2020-4788
IBM Power9 (AIX 7.1, 7.2, and VIOS 3.1) processors could allow a local user to obtain sensitive information from the data in the L1 cache under extenuating circumstances. IBM X-Force ID: 189296.
- [oss-security] 20201120 CVE-2020-4788: Speculation on incompletely validated data on IBM Power9
- [oss-security] 20201120 CVE-2020-4788: Speculation on incompletely validated data on IBM Power9
- [oss-security] 20201123 Re: CVE-2020-4788: Speculation on incompletely validated data on IBM Power9
- [oss-security] 20201123 Re: CVE-2020-4788: Speculation on incompletely validated data on IBM Power9
- ibm-i-cve20204788-info-disc (189296)
- ibm-i-cve20204788-info-disc (189296)
- FEDORA-2020-8c15928d23
- FEDORA-2020-8c15928d23
- FEDORA-2020-4700a73bd5
- FEDORA-2020-4700a73bd5
- https://www.ibm.com/support/pages/node/6370729
- https://www.ibm.com/support/pages/node/6370729
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
Closed vulnerabilities
BDU:2020-00835
Уязвимость реализации метода интерпретатора языка программирования Ruby, позволяющая нарушителю выполнить произвольный код
BDU:2020-00863
Уязвимость метода File.fnmatch интерпретатора языка программирования Ruby, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2020-00865
Уязвимость реализации класса WEBrick::HTTPAuth::DigestAuth библиотеки WEBrick интерпретатора языка программирования Ruby, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00866
Уязвимость библиотеки WEBrick интерпретатора языка программирования Ruby, позволяющая нарушителю осуществить межсайтовые сценарные атаки
BDU:2020-04073
Уязвимость HTTP-сервера для Ruby/Rack приложений Puma, связанная с некорректной нейтрализацией символов CR, LF, /r и /n перед внесением данных в HTTP-заголовки, позволяющая нарушителю осуществлять межсайтовые сценарные атаки
BDU:2021-01472
Уязвимость библиотеки WEBrick языка программирования Ruby, связанная с некорректной проверкой значения заголовка, позволяющая нарушителю оказать воздействие на целостность данных
Modified: 2024-11-21
CVE-2019-15845
Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 mishandles path checking within File.fnmatch functions.
- openSUSE-SU-2020:0395
- openSUSE-SU-2020:0395
- https://hackerone.com/reports/449617
- https://hackerone.com/reports/449617
- [debian-lts-announce] 20191125 [SECURITY] [DLA 2007-1] ruby2.1 security update
- [debian-lts-announce] 20191125 [SECURITY] [DLA 2007-1] ruby2.1 security update
- 20191217 [SECURITY] [DSA 4587-1] ruby2.3 security update
- 20191217 [SECURITY] [DSA 4587-1] ruby2.3 security update
- 20191217 [SECURITY] [DSA 4586-1] ruby2.5 security update
- 20191217 [SECURITY] [DSA 4586-1] ruby2.5 security update
- GLSA-202003-06
- GLSA-202003-06
- USN-4201-1
- USN-4201-1
- DSA-4587
- DSA-4587
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
Modified: 2024-11-21
CVE-2019-16201
WEBrick::HTTPAuth::DigestAuth in Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 has a regular expression Denial of Service cause by looping/backtracking. A victim must expose a WEBrick server that uses DigestAuth to the Internet or a untrusted network.
- openSUSE-SU-2020:0395
- openSUSE-SU-2020:0395
- https://hackerone.com/reports/661722
- https://hackerone.com/reports/661722
- https://lists.debian.org/debian-lts-announce/2019/11/msg00025.html
- https://lists.debian.org/debian-lts-announce/2019/11/msg00025.html
- [debian-lts-announce] 20191210 [SECURITY] [DLA 2027-1] jruby security update
- [debian-lts-announce] 20191210 [SECURITY] [DLA 2027-1] jruby security update
- [debian-lts-announce] 20200816 [SECURITY] [DLA 2330-1] jruby security update
- [debian-lts-announce] 20200816 [SECURITY] [DLA 2330-1] jruby security update
- [debian-lts-announce] 20230430 [SECURITY] [DLA 3408-1] jruby security update
- [debian-lts-announce] 20230430 [SECURITY] [DLA 3408-1] jruby security update
- 20191217 [SECURITY] [DSA 4587-1] ruby2.3 security update
- 20191217 [SECURITY] [DSA 4587-1] ruby2.3 security update
- 20191217 [SECURITY] [DSA 4586-1] ruby2.5 security update
- 20191217 [SECURITY] [DSA 4586-1] ruby2.5 security update
- GLSA-202003-06
- GLSA-202003-06
- DSA-4587
- DSA-4587
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
Modified: 2024-11-21
CVE-2019-16254
Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows HTTP Response Splitting. If a program using WEBrick inserts untrusted input into the response header, an attacker can exploit it to insert a newline character to split a header, and inject malicious content to deceive clients. NOTE: this issue exists because of an incomplete fix for CVE-2017-17742, which addressed the CRLF vector, but did not address an isolated CR or an isolated LF.
- openSUSE-SU-2020:0395
- openSUSE-SU-2020:0395
- https://hackerone.com/reports/331984
- https://hackerone.com/reports/331984
- https://lists.debian.org/debian-lts-announce/2019/11/msg00025.html
- https://lists.debian.org/debian-lts-announce/2019/11/msg00025.html
- [debian-lts-announce] 20191210 [SECURITY] [DLA 2027-1] jruby security update
- [debian-lts-announce] 20191210 [SECURITY] [DLA 2027-1] jruby security update
- [debian-lts-announce] 20200816 [SECURITY] [DLA 2330-1] jruby security update
- [debian-lts-announce] 20200816 [SECURITY] [DLA 2330-1] jruby security update
- [debian-lts-announce] 20230430 [SECURITY] [DLA 3408-1] jruby security update
- [debian-lts-announce] 20230430 [SECURITY] [DLA 3408-1] jruby security update
- 20191217 [SECURITY] [DSA 4587-1] ruby2.3 security update
- 20191217 [SECURITY] [DSA 4587-1] ruby2.3 security update
- 20191217 [SECURITY] [DSA 4586-1] ruby2.5 security update
- 20191217 [SECURITY] [DSA 4586-1] ruby2.5 security update
- GLSA-202003-06
- GLSA-202003-06
- DSA-4586
- DSA-4586
- DSA-4587
- DSA-4587
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.ruby-lang.org/ja/news/2019/10/01/http-response-splitting-in-webrick-cve-2019-16254/
- https://www.ruby-lang.org/ja/news/2019/10/01/http-response-splitting-in-webrick-cve-2019-16254/
- https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-4-8-released/
- https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-4-8-released/
- https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-5-7-released/
- https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-5-7-released/
- https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-6-5-released/
- https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-6-5-released/
Modified: 2024-11-21
CVE-2019-16255
Ruby through 2.4.7, 2.5.x through 2.5.6, and 2.6.x through 2.6.4 allows code injection if the first argument (aka the "command" argument) to Shell#[] or Shell#test in lib/shell.rb is untrusted data. An attacker can exploit this to call an arbitrary Ruby method.
- openSUSE-SU-2020:0395
- openSUSE-SU-2020:0395
- https://hackerone.com/reports/327512
- https://hackerone.com/reports/327512
- https://lists.debian.org/debian-lts-announce/2019/11/msg00025.html
- https://lists.debian.org/debian-lts-announce/2019/11/msg00025.html
- [debian-lts-announce] 20191210 [SECURITY] [DLA 2027-1] jruby security update
- [debian-lts-announce] 20191210 [SECURITY] [DLA 2027-1] jruby security update
- [debian-lts-announce] 20200816 [SECURITY] [DLA 2330-1] jruby security update
- [debian-lts-announce] 20200816 [SECURITY] [DLA 2330-1] jruby security update
- [debian-lts-announce] 20230430 [SECURITY] [DLA 3408-1] jruby security update
- [debian-lts-announce] 20230430 [SECURITY] [DLA 3408-1] jruby security update
- 20191217 [SECURITY] [DSA 4587-1] ruby2.3 security update
- 20191217 [SECURITY] [DSA 4587-1] ruby2.3 security update
- 20191217 [SECURITY] [DSA 4586-1] ruby2.5 security update
- 20191217 [SECURITY] [DSA 4586-1] ruby2.5 security update
- GLSA-202003-06
- GLSA-202003-06
- DSA-4587
- DSA-4587
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.ruby-lang.org/ja/news/2019/10/01/code-injection-shell-test-cve-2019-16255/
- https://www.ruby-lang.org/ja/news/2019/10/01/code-injection-shell-test-cve-2019-16255/
- https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-4-8-released/
- https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-4-8-released/
- https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-5-7-released/
- https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-5-7-released/
- https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-6-5-released/
- https://www.ruby-lang.org/ja/news/2019/10/01/ruby-2-6-5-released/
Modified: 2024-11-21
CVE-2020-25613
An issue was discovered in Ruby through 2.5.8, 2.6.x through 2.6.6, and 2.7.x through 2.7.1. WEBrick, a simple HTTP server bundled with Ruby, had not checked the transfer-encoding header value rigorously. An attacker may potentially exploit this issue to bypass a reverse proxy (which also has a poor header check), which may lead to an HTTP Request Smuggling attack.
- https://github.com/ruby/webrick/commit/8946bb38b4d87549f0d99ed73c62c41933f97cc7
- https://github.com/ruby/webrick/commit/8946bb38b4d87549f0d99ed73c62c41933f97cc7
- https://hackerone.com/reports/965267
- https://hackerone.com/reports/965267
- [debian-lts-announce] 20230430 [SECURITY] [DLA 3408-1] jruby security update
- [debian-lts-announce] 20230430 [SECURITY] [DLA 3408-1] jruby security update
- FEDORA-2020-02ca18c2a0
- FEDORA-2020-02ca18c2a0
- FEDORA-2020-fe2a7d7390
- FEDORA-2020-fe2a7d7390
- GLSA-202401-27
- GLSA-202401-27
- https://security.netapp.com/advisory/ntap-20210115-0008/
- https://security.netapp.com/advisory/ntap-20210115-0008/
- https://www.ruby-lang.org/en/news/2020/09/29/http-request-smuggling-cve-2020-25613/
- https://www.ruby-lang.org/en/news/2020/09/29/http-request-smuggling-cve-2020-25613/
Modified: 2024-11-21
CVE-2020-5247
In Puma (RubyGem) before 4.3.2 and before 3.12.3, if an application using Puma allows untrusted input in a response header, an attacker can use newline characters (i.e. `CR`, `LF` or`/r`, `/n`) to end the header and inject malicious content, such as additional headers or an entirely new response body. This vulnerability is known as HTTP Response Splitting. While not an attack in itself, response splitting is a vector for several other attacks, such as cross-site scripting (XSS). This is related to CVE-2019-16254, which fixed this vulnerability for the WEBrick Ruby web server. This has been fixed in versions 4.3.2 and 3.12.3 by checking all headers for line endings and rejecting headers with those characters.
- https://github.com/puma/puma/security/advisories/GHSA-84j7-475p-hp8v
- https://github.com/puma/puma/security/advisories/GHSA-84j7-475p-hp8v
- [debian-lts-announce] 20220525 [SECURITY] [DLA 3023-1] puma security update
- [debian-lts-announce] 20220525 [SECURITY] [DLA 3023-1] puma security update
- FEDORA-2020-fd87f90634
- FEDORA-2020-fd87f90634
- FEDORA-2020-08092b4c97
- FEDORA-2020-08092b4c97
- FEDORA-2020-a3f26a9387
- FEDORA-2020-a3f26a9387
- https://owasp.org/www-community/attacks/HTTP_Response_Splitting
- https://owasp.org/www-community/attacks/HTTP_Response_Splitting
- https://www.ruby-lang.org/en/news/2019/10/01/http-response-splitting-in-webrick-cve-2019-16254
- https://www.ruby-lang.org/en/news/2019/10/01/http-response-splitting-in-webrick-cve-2019-16254
Closed bugs
Обновить
Closed bugs
настройки в /etc/default
Closed vulnerabilities
BDU:2022-05687
Уязвимость функции jbig2_image_compose компонента jbig2_image.c декодера формата сжатия изображений JBIG2 Jbig2dec, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2016-9601
ghostscript before version 9.21 is vulnerable to a heap based buffer overflow that was found in the ghostscript jbig2_decode_gray_scale_image function which is used to decode halftone segments in a JBIG2 image. A document (PostScript or PDF) with an embedded, specially crafted, jbig2 image could trigger a segmentation fault in ghostscript.
- http://git.ghostscript.com/?p=jbig2dec.git%3Ba=commit%3Bh=e698d5c11d27212aa1098bc5b1673a3378563092
- http://git.ghostscript.com/?p=jbig2dec.git%3Ba=commit%3Bh=e698d5c11d27212aa1098bc5b1673a3378563092
- 97095
- 97095
- https://bugs.ghostscript.com/show_bug.cgi?id=697457
- https://bugs.ghostscript.com/show_bug.cgi?id=697457
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9601
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9601
- GLSA-201706-24
- GLSA-201706-24
- DSA-3817
- DSA-3817
Modified: 2024-11-21
CVE-2020-12268
jbig2_image_compose in jbig2_image.c in Artifex jbig2dec before 0.18 has a heap-based buffer overflow.
- openSUSE-SU-2020:0653
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20332
- https://github.com/ArtifexSoftware/jbig2dec/commit/0726320a4b55078e9d8deb590e477d598b3da66e
- https://github.com/ArtifexSoftware/jbig2dec/compare/0.17...0.18
- [debian-lts-announce] 20211028 [SECURITY] [DLA 2796-1] jbig2dec security update
- openSUSE-SU-2020:0653
- [debian-lts-announce] 20211028 [SECURITY] [DLA 2796-1] jbig2dec security update
- https://github.com/ArtifexSoftware/jbig2dec/compare/0.17...0.18
- https://github.com/ArtifexSoftware/jbig2dec/commit/0726320a4b55078e9d8deb590e477d598b3da66e
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=20332
Closed vulnerabilities
BDU:2020-04039
Уязвимость интерпретатора языка программирования Perl, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-04040
Уязвимость параметра PL_regkind[OP(n)] == NOTHING интерпретатора языка программирования Perl, позволяющая нарушителю выполнить произвольный код
BDU:2020-04041
Уязвимость реализации функции S_study_chunk интерпретатора языка программирования Perl, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-10543
Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow.
- openSUSE-SU-2020:0850
- https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod
- https://github.com/perl/perl5/commit/897d1f7fd515b828e4b198d8b8bef76c6faf03ed
- https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3
- FEDORA-2020-fd73c08076
- GLSA-202006-03
- https://security.netapp.com/advisory/ntap-20200611-0001/
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- openSUSE-SU-2020:0850
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://security.netapp.com/advisory/ntap-20200611-0001/
- GLSA-202006-03
- FEDORA-2020-fd73c08076
- https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3
- https://github.com/perl/perl5/commit/897d1f7fd515b828e4b198d8b8bef76c6faf03ed
- https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod
Modified: 2024-11-21
CVE-2020-10878
Perl before 5.30.3 has an integer overflow related to mishandling of a "PL_regkind[OP(n)] == NOTHING" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.
- openSUSE-SU-2020:0850
- https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod
- https://github.com/perl/perl5/commit/0a320d753fe7fca03df259a4dfd8e641e51edaa8
- https://github.com/perl/perl5/commit/3295b48defa0f8570114877b063fe546dd348b3c
- https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3
- FEDORA-2020-fd73c08076
- GLSA-202006-03
- https://security.netapp.com/advisory/ntap-20200611-0001/
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- openSUSE-SU-2020:0850
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://security.netapp.com/advisory/ntap-20200611-0001/
- GLSA-202006-03
- FEDORA-2020-fd73c08076
- https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3
- https://github.com/perl/perl5/commit/3295b48defa0f8570114877b063fe546dd348b3c
- https://github.com/perl/perl5/commit/0a320d753fe7fca03df259a4dfd8e641e51edaa8
- https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod
Modified: 2024-11-21
CVE-2020-12723
regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.
- openSUSE-SU-2020:0850
- https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod
- https://github.com/perl/perl5/commit/66bbb51b93253a3f87d11c2695cfb7bdb782184a
- https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3
- https://github.com/Perl/perl5/issues/16947
- https://github.com/Perl/perl5/issues/17743
- FEDORA-2020-fd73c08076
- GLSA-202006-03
- https://security.netapp.com/advisory/ntap-20200611-0001/
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- openSUSE-SU-2020:0850
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://security.netapp.com/advisory/ntap-20200611-0001/
- GLSA-202006-03
- FEDORA-2020-fd73c08076
- https://github.com/Perl/perl5/issues/17743
- https://github.com/Perl/perl5/issues/16947
- https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3
- https://github.com/perl/perl5/commit/66bbb51b93253a3f87d11c2695cfb7bdb782184a
- https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod
Package cifs-utils updated to version 6.11-alt1 for branch p9 in task 262138.
Closed vulnerabilities
BDU:2023-00213
Уязвимость команды arbitrary утилит файловой системы CIFS CIFS-utils, связанная с отсутствием мер по очистке входных данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-14342
It was found that cifs-utils' mount.cifs was invoking a shell when requesting the Samba password, which could be used to inject arbitrary commands. An attacker able to invoke mount.cifs with special permission, such as via sudo rules, could use this flaw to escalate their privileges.
- openSUSE-SU-2020:1579
- openSUSE-SU-2020:1579
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14342
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-14342
- FEDORA-2020-ea0b9caac3
- FEDORA-2020-ea0b9caac3
- FEDORA-2020-cfdd73f1b4
- FEDORA-2020-cfdd73f1b4
- https://lists.samba.org/archive/samba-technical/2020-September/135747.html
- https://lists.samba.org/archive/samba-technical/2020-September/135747.html
- GLSA-202009-16
- GLSA-202009-16