ALT-BU-2021-4039-1
Branch c9f1 update bulletin.
Closed vulnerabilities
BDU:2020-02035
Уязвимость функции hpack_dht_insert (hpack-tbl.c) библиотеки сетевого программного обеспечения HAProxy, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным, вызвать отказ в обслуживании или оказать воздействие на целостность данных
Modified: 2024-11-21
CVE-2020-11100
In hpack_dht_insert in hpack-tbl.c in the HPACK decoder in HAProxy 1.8 through 2.x before 2.1.4, a remote attacker can write arbitrary bytes around a certain location on the heap via a crafted HTTP/2 request, possibly causing remote code execution.
- openSUSE-SU-2020:0444
- http://packetstormsecurity.com/files/157323/haproxy-hpack-tbl.c-Out-Of-Bounds-Write.html
- http://www.haproxy.org
- https://bugzilla.redhat.com/show_bug.cgi?id=1819111
- https://bugzilla.suse.com/show_bug.cgi?id=1168023
- https://git.haproxy.org/?p=haproxy.git%3Ba=commit%3Bh=5dfc5d5cd0d2128d77253ead3acf03a421ab5b88
- https://lists.debian.org/debian-security-announce/2020/msg00052.html
- FEDORA-2020-13fd8b1721
- FEDORA-2020-16cd111544
- GLSA-202012-22
- USN-4321-1
- DSA-4649
- https://www.haproxy.org/download/2.1/src/CHANGELOG
- https://www.mail-archive.com/haproxy%40formilux.org/msg36876.html
- openSUSE-SU-2020:0444
- https://www.mail-archive.com/haproxy%40formilux.org/msg36876.html
- https://www.haproxy.org/download/2.1/src/CHANGELOG
- DSA-4649
- USN-4321-1
- GLSA-202012-22
- FEDORA-2020-16cd111544
- FEDORA-2020-13fd8b1721
- https://lists.debian.org/debian-security-announce/2020/msg00052.html
- https://git.haproxy.org/?p=haproxy.git%3Ba=commit%3Bh=5dfc5d5cd0d2128d77253ead3acf03a421ab5b88
- https://bugzilla.suse.com/show_bug.cgi?id=1168023
- https://bugzilla.redhat.com/show_bug.cgi?id=1819111
- http://www.haproxy.org
- http://packetstormsecurity.com/files/157323/haproxy-hpack-tbl.c-Out-Of-Bounds-Write.html
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-9366
A buffer overflow was found in the way GNU Screen before 4.8.0 treated the special escape OSC 49. Specially crafted output, or a special program, could corrupt memory and crash Screen or possibly have unspecified other impact.
- [oss-security] 20200225 Re: Re: GNU screen "out of bounds access when setting w_xtermosc after OSC 49"
- [oss-security] 20200225 Re: Re: GNU screen "out of bounds access when setting w_xtermosc after OSC 49"
- https://lists.gnu.org/archive/html/screen-devel/2020-02/msg00007.html
- https://lists.gnu.org/archive/html/screen-devel/2020-02/msg00007.html
- GLSA-202003-62
- GLSA-202003-62
- https://www.openwall.com/lists/oss-security/2020/02/06/3
- https://www.openwall.com/lists/oss-security/2020/02/06/3
Closed vulnerabilities
BDU:2020-03947
Уязвимость реализации функций read_fru_area(), read_fru_area_section(), ipmi_spd_print_fru(), ipmi_get_session_info(), ipmi_get_channel_cipher_suites() и get_lan_param_select() утилиты для управления и настройки устройств с поддержкой IPMI ipmitool, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2020-04640
Уязвимость функции read_fru_area_section (lib/ipmi_fru.c) утилиты для управления и настройки устройств с поддержкой IPMI ipmitool, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2020-5208
It's been found that multiple functions in ipmitool before 1.8.19 neglect proper checking of the data received from a remote LAN party, which may lead to buffer overflows and potentially to remote code execution on the ipmitool side. This is especially dangerous if ipmitool is run as a privileged user. This problem is fixed in version 1.8.19.
- openSUSE-SU-2020:0247
- openSUSE-SU-2020:0247
- https://github.com/ipmitool/ipmitool/commit/e824c23316ae50beb7f7488f2055ac65e8b341f2
- https://github.com/ipmitool/ipmitool/commit/e824c23316ae50beb7f7488f2055ac65e8b341f2
- https://github.com/ipmitool/ipmitool/security/advisories/GHSA-g659-9qxw-p7cp
- https://github.com/ipmitool/ipmitool/security/advisories/GHSA-g659-9qxw-p7cp
- [debian-lts-announce] 20200209 [SECURITY] [DLA 2098-1] ipmitool security update
- [debian-lts-announce] 20200209 [SECURITY] [DLA 2098-1] ipmitool security update
- [debian-lts-announce] 20210630 [SECURITY] [DLA 2699-1] ipmitool security update
- [debian-lts-announce] 20210630 [SECURITY] [DLA 2699-1] ipmitool security update
- FEDORA-2020-eb0cf4d268
- FEDORA-2020-eb0cf4d268
- FEDORA-2020-92cc67ff5a
- FEDORA-2020-92cc67ff5a
- GLSA-202101-03
- GLSA-202101-03
Closed vulnerabilities
BDU:2022-05961
Уязвимость компонента packet.c библиотеки реализации протокола SSH2 Libssh2, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-17498
In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server.
- openSUSE-SU-2019:2483
- openSUSE-SU-2019:2483
- http://packetstormsecurity.com/files/172835/libssh2-1.9.0-Out-Of-Bounds-Read.html
- http://packetstormsecurity.com/files/172835/libssh2-1.9.0-Out-Of-Bounds-Read.html
- https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
- https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
- https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
- https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
- https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
- https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
- https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
- https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
- [debian-lts-announce] 20191113 [SECURITY] [DLA 1991-1] libssh2 security update
- [debian-lts-announce] 20191113 [SECURITY] [DLA 1991-1] libssh2 security update
- [debian-lts-announce] 20211217 [SECURITY] [DLA 2848-1] libssh2 security update
- [debian-lts-announce] 20211217 [SECURITY] [DLA 2848-1] libssh2 security update
- [debian-lts-announce] 20230908 [SECURITY] [DLA 3559-1] libssh2 security update
- [debian-lts-announce] 20230908 [SECURITY] [DLA 3559-1] libssh2 security update
- FEDORA-2019-ec04c34768
- FEDORA-2019-ec04c34768
- FEDORA-2019-91529f19e4
- FEDORA-2019-91529f19e4
- https://security.netapp.com/advisory/ntap-20220909-0004/
- https://security.netapp.com/advisory/ntap-20220909-0004/
Closed vulnerabilities
BDU:2021-02749
Уязвимость функции ngx_resolver_copy() сервера nginx, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2021-03045
Уязвимость модуля фильтра диапазона nginx HTTP-сервера nginx, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2024-11-21
CVE-2021-23017
A security issue in nginx resolver was identified, which might allow an attacker who is able to forge UDP packets from the DNS server to cause 1-byte memory overwrite, resulting in worker process crash or potential other impact.
- http://mailman.nginx.org/pipermail/nginx-announce/2021/000300.html
- http://mailman.nginx.org/pipermail/nginx-announce/2021/000300.html
- http://packetstormsecurity.com/files/167720/Nginx-1.20.0-Denial-Of-Service.html
- http://packetstormsecurity.com/files/167720/Nginx-1.20.0-Denial-Of-Service.html
- [apisix-notifications] 20210608 [GitHub] [apisix-website] liuxiran commented on a change in pull request #362: docs: added "Apache APISIX not affected by NGINX CVE-2021-23017"
- [apisix-notifications] 20210608 [GitHub] [apisix-website] liuxiran commented on a change in pull request #362: docs: added "Apache APISIX not affected by NGINX CVE-2021-23017"
- [apisix-notifications] 20210608 [GitHub] [apisix-website] liuxiran merged pull request #362: docs: added "Apache APISIX not affected by NGINX CVE-2021-23017"
- [apisix-notifications] 20210608 [GitHub] [apisix-website] liuxiran merged pull request #362: docs: added "Apache APISIX not affected by NGINX CVE-2021-23017"
- [apisix-notifications] 20210607 [GitHub] [apisix-website] Serendipity96 opened a new pull request #362: feat: add new blog
- [apisix-notifications] 20210607 [GitHub] [apisix-website] Serendipity96 opened a new pull request #362: feat: add new blog
- [apisix-notifications] 20210608 [apisix-website] branch master updated: docs: added "Apache APISIX not affected by NGINX CVE-2021-23017" (#362)
- [apisix-notifications] 20210608 [apisix-website] branch master updated: docs: added "Apache APISIX not affected by NGINX CVE-2021-23017" (#362)
- [apisix-notifications] 20210608 [GitHub] [apisix-website] netlify[bot] edited a comment on pull request #362: docs: added "Apache APISIX not affected by NGINX CVE-2021-23017"
- [apisix-notifications] 20210608 [GitHub] [apisix-website] netlify[bot] edited a comment on pull request #362: docs: added "Apache APISIX not affected by NGINX CVE-2021-23017"
- FEDORA-2021-393d698493
- FEDORA-2021-393d698493
- FEDORA-2021-b37cffac0d
- FEDORA-2021-b37cffac0d
- https://security.netapp.com/advisory/ntap-20210708-0006/
- https://security.netapp.com/advisory/ntap-20210708-0006/
- https://support.f5.com/csp/article/K12331123%2C
- https://support.f5.com/csp/article/K12331123%2C
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
Closed vulnerabilities
BDU:2021-01776
Уязвимость компонента scan.c VNC-сервера X11vnc, связанная с отсутствием механизма авторизации, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-29074
scan.c in x11vnc 0.9.16 uses IPC_CREAT|0777 in shmget calls, which allows access by actors other than the current user.
- https://github.com/LibVNC/x11vnc/commit/69eeb9f7baa14ca03b16c9de821f9876def7a36a
- https://github.com/LibVNC/x11vnc/commit/69eeb9f7baa14ca03b16c9de821f9876def7a36a
- [debian-lts-announce] 20201210 [SECURITY] [DLA 2490-1] x11vnc security update
- [debian-lts-announce] 20201210 [SECURITY] [DLA 2490-1] x11vnc security update
- FEDORA-2021-93911302d6
- FEDORA-2021-93911302d6
- FEDORA-2021-c5b679877e
- FEDORA-2021-c5b679877e
- FEDORA-2021-069c0c3950
- FEDORA-2021-069c0c3950
- DSA-4799
- DSA-4799