ALT-BU-2021-3995-1
Branch p9 update bulletin.
Package kernel-image-un-def updated to version 5.10.45-alt1 for branch p9 in task 274787.
Closed vulnerabilities
BDU:2021-04862
Уязвимость функции hci_dev_do_open() подсистемы инициализации устройства HCI ядра операционной системы Linux, связанная с повторным освобождением памяти, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-28691
Guest triggered use-after-free in Linux xen-netback A malicious or buggy network PV frontend can force Linux netback to disable the interface and terminate the receive kernel thread associated with queue 0 in response to the frontend sending a malformed packet. Such kernel thread termination will lead to a use-after-free in Linux netback when the backend is destroyed, as the kernel thread associated with queue 0 will have already exited and thus the call to kthread_stop will be performed against a stale pointer.
Modified: 2024-11-21
CVE-2021-3564
A flaw double-free memory corruption in the Linux kernel HCI device initialization subsystem was found in the way user attach malicious HCI TTY Bluetooth device. A local user could use this flaw to crash the system. This flaw affects all the Linux kernel versions starting from 3.13.
- [oss-security] 20210525 CVE-2021-3564 Linux Bluetooth device initialization implementation bug
- [oss-security] 20210525 CVE-2021-3564 Linux Bluetooth device initialization implementation bug
- [oss-security] 20210601 Re: CVE-2021-3564 Linux Bluetooth device initialization implementation bug
- [oss-security] 20210601 Re: CVE-2021-3564 Linux Bluetooth device initialization implementation bug
- https://bugzilla.redhat.com/show_bug.cgi?id=1964139
- https://bugzilla.redhat.com/show_bug.cgi?id=1964139
- [debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update
- [debian-lts-announce] 20210623 [SECURITY] [DLA 2690-1] linux-4.19 security update
- [debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update
- [debian-lts-announce] 20210623 [SECURITY] [DLA 2689-1] linux security update
- https://www.openwall.com/lists/oss-security/2021/05/25/1
- https://www.openwall.com/lists/oss-security/2021/05/25/1
Closed vulnerabilities
Modified: 2024-11-21
CVE-2002-2196
Samba before 2.2.5 does not properly terminate the enum_csc_policy data structure, which may allow remote attackers to execute arbitrary code via a buffer overflow attack.
Closed vulnerabilities
BDU:2021-02099
Уязвимость программного обеспечения Samba, связанная со считыванием данных за пределами заданного буфера, позволяющая нарушителю вызвать аварийное завершение работы приложения
BDU:2021-03130
Уязвимость файловой системы Samba, связанная с чтением за границами буфера, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации
BDU:2022-05713
Уязвимость unix-расширений SMB1, NFS пакета программ сетевого взаимодействия Samba, позволяющая нарушителю оказать воздействие на целостность данных
Modified: 2024-11-21
CVE-2020-27840
A flaw was found in samba. Spaces used in a string around a domain name (DN), while supposed to be ignored, can cause invalid DN strings with spaces to instead write a zero-byte into out-of-bounds memory, resulting in a crash. The highest threat from this vulnerability is to system availability.
- https://bugzilla.redhat.com/show_bug.cgi?id=1941400
- https://bugzilla.redhat.com/show_bug.cgi?id=1941400
- [debian-lts-announce] 20210331 [SECURITY] [DLA 2611-1] ldb security update
- [debian-lts-announce] 20210331 [SECURITY] [DLA 2611-1] ldb security update
- FEDORA-2021-c93a3a5d3f
- FEDORA-2021-c93a3a5d3f
- FEDORA-2021-c2d8628d33
- FEDORA-2021-c2d8628d33
- FEDORA-2021-1a8e93a285
- FEDORA-2021-1a8e93a285
- GLSA-202105-22
- GLSA-202105-22
- https://security.netapp.com/advisory/ntap-20210326-0007/
- https://security.netapp.com/advisory/ntap-20210326-0007/
- DSA-4884
- DSA-4884
- https://www.samba.org/samba/security/CVE-2020-27840.html
- https://www.samba.org/samba/security/CVE-2020-27840.html
Modified: 2024-11-21
CVE-2021-20254
A flaw was found in samba. The Samba smbd file server must map Windows group identities (SIDs) into unix group ids (gids). The code that performs this had a flaw that could allow it to read data beyond the end of the array in the case where a negative cache entry had been added to the mapping cache. This could cause the calling code to return those values into the process token that stores the group membership for a user. The highest threat from this vulnerability is to data confidentiality and integrity.
- https://bugzilla.redhat.com/show_bug.cgi?id=1949442
- https://bugzilla.redhat.com/show_bug.cgi?id=1949442
- [debian-lts-announce] 20210529 [SECURITY] [DLA 2668-1] samba security update
- [debian-lts-announce] 20210529 [SECURITY] [DLA 2668-1] samba security update
- FEDORA-2021-1d0807008b
- FEDORA-2021-1d0807008b
- FEDORA-2021-7026246ea9
- FEDORA-2021-7026246ea9
- GLSA-202105-22
- GLSA-202105-22
- https://security.netapp.com/advisory/ntap-20210430-0001/
- https://security.netapp.com/advisory/ntap-20210430-0001/
- https://www.samba.org/samba/security/CVE-2021-20254.html
- https://www.samba.org/samba/security/CVE-2021-20254.html
Modified: 2024-11-21
CVE-2021-20277
A flaw was found in Samba's libldb. Multiple, consecutive leading spaces in an LDAP attribute can lead to an out-of-bounds memory write, leading to a crash of the LDAP server process handling the request. The highest threat from this vulnerability is to system availability.
- https://bugzilla.redhat.com/show_bug.cgi?id=1941402
- https://bugzilla.redhat.com/show_bug.cgi?id=1941402
- [debian-lts-announce] 20210331 [SECURITY] [DLA 2611-1] ldb security update
- [debian-lts-announce] 20210331 [SECURITY] [DLA 2611-1] ldb security update
- FEDORA-2021-c93a3a5d3f
- FEDORA-2021-c93a3a5d3f
- FEDORA-2021-c2d8628d33
- FEDORA-2021-c2d8628d33
- FEDORA-2021-1a8e93a285
- FEDORA-2021-1a8e93a285
- GLSA-202105-22
- GLSA-202105-22
- https://security.netapp.com/advisory/ntap-20210326-0007/
- https://security.netapp.com/advisory/ntap-20210326-0007/
- DSA-4884
- DSA-4884
- https://www.samba.org/samba/security/CVE-2021-20277.html
- https://www.samba.org/samba/security/CVE-2021-20277.html
Modified: 2024-11-21
CVE-2021-43566
All versions of Samba prior to 4.13.16 are vulnerable to a malicious client using an SMB1 or NFS race to allow a directory to be created in an area of the server file system not exported under the share definition. Note that SMB1 has to be enabled, or the share also available via NFS in order for this attack to succeed.
- https://bugzilla.samba.org/show_bug.cgi?id=13979
- https://bugzilla.samba.org/show_bug.cgi?id=13979
- https://security.netapp.com/advisory/ntap-20220110-0001/
- https://security.netapp.com/advisory/ntap-20220110-0001/
- https://www.samba.org/samba/security/CVE-2021-43566.html
- https://www.samba.org/samba/security/CVE-2021-43566.html
Closed bugs
Миграция на /run и /run/lock
nmbd doesn't start if /var/run is link to /run
Миграция на /run и /run/lock
Closed vulnerabilities
BDU:2021-02749
Уязвимость функции ngx_resolver_copy() сервера nginx, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2021-03045
Уязвимость модуля фильтра диапазона nginx HTTP-сервера nginx, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2024-11-21
CVE-2021-23017
A security issue in nginx resolver was identified, which might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite, resulting in worker process crash or potential other impact.
- http://mailman.nginx.org/pipermail/nginx-announce/2021/000300.html
- http://mailman.nginx.org/pipermail/nginx-announce/2021/000300.html
- http://packetstormsecurity.com/files/167720/Nginx-1.20.0-Denial-Of-Service.html
- http://packetstormsecurity.com/files/167720/Nginx-1.20.0-Denial-Of-Service.html
- [apisix-notifications] 20210608 [GitHub] [apisix-website] liuxiran commented on a change in pull request #362: docs: added "Apache APISIX not affected by NGINX CVE-2021-23017"
- [apisix-notifications] 20210608 [GitHub] [apisix-website] liuxiran commented on a change in pull request #362: docs: added "Apache APISIX not affected by NGINX CVE-2021-23017"
- [apisix-notifications] 20210608 [GitHub] [apisix-website] liuxiran merged pull request #362: docs: added "Apache APISIX not affected by NGINX CVE-2021-23017"
- [apisix-notifications] 20210608 [GitHub] [apisix-website] liuxiran merged pull request #362: docs: added "Apache APISIX not affected by NGINX CVE-2021-23017"
- [apisix-notifications] 20210607 [GitHub] [apisix-website] Serendipity96 opened a new pull request #362: feat: add new blog
- [apisix-notifications] 20210607 [GitHub] [apisix-website] Serendipity96 opened a new pull request #362: feat: add new blog
- [apisix-notifications] 20210608 [apisix-website] branch master updated: docs: added "Apache APISIX not affected by NGINX CVE-2021-23017" (#362)
- [apisix-notifications] 20210608 [apisix-website] branch master updated: docs: added "Apache APISIX not affected by NGINX CVE-2021-23017" (#362)
- [apisix-notifications] 20210608 [GitHub] [apisix-website] netlify[bot] edited a comment on pull request #362: docs: added "Apache APISIX not affected by NGINX CVE-2021-23017"
- [apisix-notifications] 20210608 [GitHub] [apisix-website] netlify[bot] edited a comment on pull request #362: docs: added "Apache APISIX not affected by NGINX CVE-2021-23017"
- FEDORA-2021-393d698493
- FEDORA-2021-393d698493
- FEDORA-2021-b37cffac0d
- FEDORA-2021-b37cffac0d
- https://security.netapp.com/advisory/ntap-20210708-0006/
- https://security.netapp.com/advisory/ntap-20210708-0006/
- https://support.f5.com/csp/article/K12331123%2C
- https://support.f5.com/csp/article/K12331123%2C
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html