ALT-BU-2021-3732-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-21287
MinIO is a High Performance Object Storage released under Apache License v2.0. In MinIO before version RELEASE.2021-01-30T00-20-58Z there is a server-side request forgery vulnerability. The target application may have functionality for importing data from a URL, publishing data to a URL, or otherwise reading data from a URL that can be tampered with. The attacker modifies the calls to this functionality by supplying a completely different URL or by manipulating how URLs are built (path traversal etc.). In a Server-Side Request Forgery (SSRF) attack, the attacker can abuse functionality on the server to read or update internal resources. The attacker can supply or modify a URL which the code running on the server will read or submit data, and by carefully selecting the URLs, the attacker may be able to read server configuration such as AWS metadata, connect to internal services like HTTP enabled databases, or perform post requests towards internal services which are not intended to be exposed. This is fixed in version RELEASE.2021-01-30T00-20-58Z, all users are advised to upgrade. As a workaround you can disable the browser front-end with "MINIO_BROWSER=off" environment variable.
- https://github.com/minio/minio/commit/eb6871ecd960d570f70698877209e6db181bf276
- https://github.com/minio/minio/commit/eb6871ecd960d570f70698877209e6db181bf276
- https://github.com/minio/minio/pull/11337
- https://github.com/minio/minio/pull/11337
- https://github.com/minio/minio/releases/tag/RELEASE.2021-01-30T00-20-58Z
- https://github.com/minio/minio/releases/tag/RELEASE.2021-01-30T00-20-58Z
- https://github.com/minio/minio/security/advisories/GHSA-m4qq-5f7c-693q
- https://github.com/minio/minio/security/advisories/GHSA-m4qq-5f7c-693q
Closed bugs
Shutter - в хинте при наведении мышью на открытое приложение присутствуют нечитаемые символы
Package python3-module-cryptography updated to version 3.4.1-alt1 for branch sisyphus in task 265976.
Closed vulnerabilities
BDU:2022-05229
Уязвимость пакета cryptography интерпретатора языка программирования Python, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2020-36242
In the cryptography package before 3.3.2 for Python, certain sequences of update calls to symmetrically encrypt multi-GB values could result in an integer overflow and buffer overflow, as demonstrated by the Fernet class.
- https://github.com/pyca/cryptography/blob/master/CHANGELOG.rst
- https://github.com/pyca/cryptography/blob/master/CHANGELOG.rst
- https://github.com/pyca/cryptography/compare/3.3.1...3.3.2
- https://github.com/pyca/cryptography/compare/3.3.1...3.3.2
- https://github.com/pyca/cryptography/issues/5615
- https://github.com/pyca/cryptography/issues/5615
- FEDORA-2021-8e36e7ed1a
- FEDORA-2021-8e36e7ed1a
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
Package chromium-gost updated to version 88.0.4324.150-alt1 for branch sisyphus in task 265982.
Closed vulnerabilities
BDU:2021-00913
Уязвимость графической библиотеки Skia браузера Google Chrome, позволяющая нарушителю проводить спуфинг-атаки
BDU:2021-00915
Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01022
Уязвимость компонента Fonts браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2021-01043
Уязвимость компонента Extensions браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2021-01048
Уязвимость компонента Tab Groups браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2021-01049
Уязвимость компонента Payments браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2021-01065
Уязвимость компонента Navigation браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
Modified: 2024-11-21
CVE-2021-21142
Use after free in Payments in Google Chrome on Mac prior to 88.0.4324.146 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/02/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/02/stable-channel-update-for-desktop.html
- https://crbug.com/1169317
- https://crbug.com/1169317
- FEDORA-2021-7fb30b9381
- FEDORA-2021-7fb30b9381
- FEDORA-2021-05afa65d39
- FEDORA-2021-05afa65d39
- GLSA-202104-08
- GLSA-202104-08
Modified: 2024-11-21
CVE-2021-21143
Heap buffer overflow in Extensions in Google Chrome prior to 88.0.4324.146 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.
- https://chromereleases.googleblog.com/2021/02/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/02/stable-channel-update-for-desktop.html
- https://crbug.com/1163504
- https://crbug.com/1163504
- FEDORA-2021-7fb30b9381
- FEDORA-2021-7fb30b9381
- FEDORA-2021-05afa65d39
- FEDORA-2021-05afa65d39
- GLSA-202104-08
- GLSA-202104-08
Modified: 2024-11-21
CVE-2021-21144
Heap buffer overflow in Tab Groups in Google Chrome prior to 88.0.4324.146 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.
- https://chromereleases.googleblog.com/2021/02/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/02/stable-channel-update-for-desktop.html
- https://crbug.com/1163845
- https://crbug.com/1163845
- FEDORA-2021-7fb30b9381
- FEDORA-2021-7fb30b9381
- FEDORA-2021-05afa65d39
- FEDORA-2021-05afa65d39
- GLSA-202104-08
- GLSA-202104-08
Modified: 2024-11-21
CVE-2021-21145
Use after free in Fonts in Google Chrome prior to 88.0.4324.146 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/02/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/02/stable-channel-update-for-desktop.html
- https://crbug.com/1154965
- https://crbug.com/1154965
- FEDORA-2021-7fb30b9381
- FEDORA-2021-7fb30b9381
- FEDORA-2021-05afa65d39
- FEDORA-2021-05afa65d39
- GLSA-202104-08
- GLSA-202104-08
Modified: 2024-11-21
CVE-2021-21146
Use after free in Navigation in Google Chrome prior to 88.0.4324.146 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/02/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/02/stable-channel-update-for-desktop.html
- https://crbug.com/1161705
- https://crbug.com/1161705
- FEDORA-2021-7fb30b9381
- FEDORA-2021-7fb30b9381
- FEDORA-2021-05afa65d39
- FEDORA-2021-05afa65d39
- GLSA-202104-08
- GLSA-202104-08
Modified: 2024-11-21
CVE-2021-21147
Inappropriate implementation in Skia in Google Chrome prior to 88.0.4324.146 allowed a local attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/02/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/02/stable-channel-update-for-desktop.html
- https://crbug.com/1162942
- https://crbug.com/1162942
- FEDORA-2021-7fb30b9381
- FEDORA-2021-7fb30b9381
- FEDORA-2021-05afa65d39
- FEDORA-2021-05afa65d39
- GLSA-202104-08
- GLSA-202104-08
Modified: 2025-02-05
CVE-2021-21148
Heap buffer overflow in V8 in Google Chrome prior to 88.0.4324.150 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- http://packetstormsecurity.com/files/162579/Chrome-Array-Transfer-Bypass.html
- http://packetstormsecurity.com/files/162579/Chrome-Array-Transfer-Bypass.html
- https://chromereleases.googleblog.com/2021/02/stable-channel-update-for-desktop_4.html
- https://chromereleases.googleblog.com/2021/02/stable-channel-update-for-desktop_4.html
- https://crbug.com/1170176
- https://crbug.com/1170176
- FEDORA-2021-7fb30b9381
- FEDORA-2021-7fb30b9381
- FEDORA-2021-05afa65d39
- FEDORA-2021-05afa65d39
- GLSA-202104-08
- GLSA-202104-08
- DSA-4858
- DSA-4858