2021-08-10
ALT-BU-2021-4107-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Published: 2021-08-08
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2021-36221
Go before 1.15.15 and 1.16.x before 1.16.7 has a race condition that can lead to a net/http/httputil ReverseProxy panic upon an ErrAbortHandler abort.
Severity: MEDIUM (5.9)
Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
References:
- https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf
- https://groups.google.com/forum/#%21forum/golang-announce
- https://groups.google.com/forum/#%21forum/golang-announce
- https://groups.google.com/g/golang-announce/c/JvWG9FUUYT0
- https://groups.google.com/g/golang-announce/c/JvWG9FUUYT0
- https://groups.google.com/g/golang-announce/c/uHACNfXAZqk
- https://groups.google.com/g/golang-announce/c/uHACNfXAZqk
- [debian-lts-announce] 20220121 [SECURITY] [DLA 2891-1] golang-1.8 security update
- [debian-lts-announce] 20220121 [SECURITY] [DLA 2891-1] golang-1.8 security update
- [debian-lts-announce] 20220121 [SECURITY] [DLA 2892-1] golang-1.7 security update
- [debian-lts-announce] 20220121 [SECURITY] [DLA 2892-1] golang-1.7 security update
- [debian-lts-announce] 20230419 [SECURITY] [DLA 3395-1] golang-1.11 security update
- [debian-lts-announce] 20230419 [SECURITY] [DLA 3395-1] golang-1.11 security update
- FEDORA-2021-6a3024b3fd
- FEDORA-2021-6a3024b3fd
- FEDORA-2021-e71b05ba7b
- FEDORA-2021-e71b05ba7b
- FEDORA-2021-38b51d9fd3
- FEDORA-2021-38b51d9fd3
- GLSA-202208-02
- GLSA-202208-02
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
Closed vulnerabilities
Published: 2020-09-28
BDU:2021-05229
Уязвимость программного обеспечения для реализации VNC TigerVNC, связанная с ошибками процедуры подтверждения подлинности сертификата, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность
Severity: HIGH (8.1)
Vector: AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
References:
Published: 2020-09-27
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2020-26117
In rfb/CSecurityTLS.cxx and rfb/CSecurityTLS.java in TigerVNC before 1.11.0, viewers mishandle TLS certificate exceptions. They store the certificates as authorities, meaning that the owner of a certificate could impersonate any server after a client had added an exception.
Severity: HIGH (8.1)
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:N
References:
- openSUSE-SU-2020:1666
- openSUSE-SU-2020:1666
- openSUSE-SU-2020:1841
- openSUSE-SU-2020:1841
- https://bugzilla.opensuse.org/show_bug.cgi?id=1176733
- https://bugzilla.opensuse.org/show_bug.cgi?id=1176733
- https://github.com/TigerVNC/tigervnc/commit/20dea801e747318525a5859fe4f37c52b05310cb
- https://github.com/TigerVNC/tigervnc/commit/20dea801e747318525a5859fe4f37c52b05310cb
- https://github.com/TigerVNC/tigervnc/commit/7399eab79a4365434d26494fa1628ce1eb91562b
- https://github.com/TigerVNC/tigervnc/commit/7399eab79a4365434d26494fa1628ce1eb91562b
- https://github.com/TigerVNC/tigervnc/commit/b30f10c681ec87720cff85d490f67098568a9cba
- https://github.com/TigerVNC/tigervnc/commit/b30f10c681ec87720cff85d490f67098568a9cba
- https://github.com/TigerVNC/tigervnc/commit/f029745f63ac7d22fb91639b2cb5b3ab56134d6e
- https://github.com/TigerVNC/tigervnc/commit/f029745f63ac7d22fb91639b2cb5b3ab56134d6e
- https://github.com/TigerVNC/tigervnc/releases/tag/v1.11.0
- https://github.com/TigerVNC/tigervnc/releases/tag/v1.11.0
- [debian-lts-announce] 20201006 [SECURITY] [DLA 2396-1] tigervnc security update
- [debian-lts-announce] 20201006 [SECURITY] [DLA 2396-1] tigervnc security update