ALT-BU-2021-4139-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2021-04601
Уязвимость обработчика регулярных выражений парсера Mime-типа функционала Action Dispatch фреймворка actionpack ruby gem программной платформы Ruby on Rails, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-05203
Уязвимость логики Token Authentication компонента Action Controller плагина actionpack программной платформы Ruby on Rails, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-05269
Уязвимость справок redirect_to и polymorphic_url компонента Action Pack программной платформы Ruby on Rails, связанная с утечкой информации в сообщениях об ошибках, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2022-00323
Уязвимость адаптера PostgreSQL фреймворка rails, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-8166
A CSRF forgery vulnerability exists in rails < 5.2.5, rails < 6.0.4 that makes it possible for an attacker to, given a global CSRF token such as the one present in the authenticity_token meta tag, forge a per-form CSRF token.
Modified: 2024-11-21
CVE-2020-8167
A CSRF vulnerability exists in rails <= 6.0.3 rails-ujs module that could allow attackers to send CSRF tokens to wrong domains.
Modified: 2024-11-21
CVE-2020-8185
A denial of service vulnerability exists in Rails <6.0.3.2 that allowed an untrusted user to run any pending migrations on a Rails app running in production.
Modified: 2024-11-21
CVE-2021-22880
The PostgreSQL adapter in Active Record before 6.1.2.1, 6.0.3.5, 5.2.4.5 suffers from a regular expression denial of service (REDoS) vulnerability. Carefully crafted input can cause the input validation in the `money` type of the PostgreSQL adapter in Active Record to spend too much time in a regular expression, resulting in the potential for a DoS attack. This only impacts Rails applications that are using PostgreSQL along with money type columns that take user input.
- https://discuss.rubyonrails.org/t/cve-2021-22880-possible-dos-vulnerability-in-active-record-postgresql-adapter/77129
- https://discuss.rubyonrails.org/t/cve-2021-22880-possible-dos-vulnerability-in-active-record-postgresql-adapter/77129
- https://hackerone.com/reports/1023899
- https://hackerone.com/reports/1023899
- FEDORA-2021-def0e32233
- FEDORA-2021-def0e32233
- FEDORA-2021-b571fca1b8
- FEDORA-2021-b571fca1b8
- https://security.netapp.com/advisory/ntap-20210805-0009/
- https://security.netapp.com/advisory/ntap-20210805-0009/
- DSA-4929
- DSA-4929
Modified: 2024-11-21
CVE-2021-22885
A possible information disclosure / unintended method execution vulnerability in Action Pack >= 2.0.0 when using the `redirect_to` or `polymorphic_url`helper with untrusted user input.
Modified: 2024-11-21
CVE-2021-22902
The actionpack ruby gem (a framework for handling and responding to web requests in Rails) before 6.0.3.7, 6.1.3.2 suffers from a possible denial of service vulnerability in the Mime type parser of Action Dispatch. Carefully crafted Accept headers can cause the mime type parser in Action Dispatch to do catastrophic backtracking in the regular expression engine.
- https://discuss.rubyonrails.org/t/cve-2021-22902-possible-denial-of-service-vulnerability-in-action-dispatch/77866
- https://discuss.rubyonrails.org/t/cve-2021-22902-possible-denial-of-service-vulnerability-in-action-dispatch/77866
- https://hackerone.com/reports/1138654
- https://hackerone.com/reports/1138654
Modified: 2024-11-21
CVE-2021-22904
The actionpack ruby gem before 6.1.3.2, 6.0.3.7, 5.2.4.6, 5.2.6 suffers from a possible denial of service vulnerability in the Token Authentication logic in Action Controller due to a too permissive regular expression. Impacted code uses `authenticate_or_request_with_http_token` or `authenticate_with_http_token` for request authentication.
- https://discuss.rubyonrails.org/t/cve-2021-22904-possible-dos-vulnerability-in-action-controller-token-authentication/77869
- https://discuss.rubyonrails.org/t/cve-2021-22904-possible-dos-vulnerability-in-action-controller-token-authentication/77869
- https://hackerone.com/reports/1101125
- https://hackerone.com/reports/1101125
- https://security.netapp.com/advisory/ntap-20210805-0009/
- https://security.netapp.com/advisory/ntap-20210805-0009/
Closed vulnerabilities
BDU:2020-04071
Уязвимость HTTP-сервера для Ruby/Rack приложений Puma, связанная с недостатками обработки HTTP-запросов, позволяющая нарушителю оказать влияние на целостность информации
BDU:2021-05079
Уязвимость HTTP-сервера для Ruby/Rack приложений Puma, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-11076
In Puma (RubyGem) before 4.3.4 and 3.12.5, an attacker could smuggle an HTTP response, by using an invalid transfer-encoding header. The problem has been fixed in Puma 3.12.5 and Puma 4.3.4.
- openSUSE-SU-2020:0990
- openSUSE-SU-2020:1001
- https://github.com/puma/puma/blob/master/History.md#434435-and-31253126--2020-05-22
- https://github.com/puma/puma/commit/f24d5521295a2152c286abb0a45a1e1e2bd275bd
- https://github.com/puma/puma/security/advisories/GHSA-x7jg-6pwg-fx5h
- [debian-lts-announce] 20201007 [SECURITY] [DLA 2398-1] puma security update
- FEDORA-2020-fe354f24e8
- openSUSE-SU-2020:0990
- FEDORA-2020-fe354f24e8
- [debian-lts-announce] 20201007 [SECURITY] [DLA 2398-1] puma security update
- https://github.com/puma/puma/security/advisories/GHSA-x7jg-6pwg-fx5h
- https://github.com/puma/puma/commit/f24d5521295a2152c286abb0a45a1e1e2bd275bd
- https://github.com/puma/puma/blob/master/History.md#434435-and-31253126--2020-05-22
- openSUSE-SU-2020:1001
Modified: 2024-11-21
CVE-2020-11077
In Puma (RubyGem) before 4.3.5 and 3.12.6, a client could smuggle a request through a proxy, causing the proxy to send a response back to another unknown client. If the proxy uses persistent connections and the client adds another request in via HTTP pipelining, the proxy may mistake it as the first request's body. Puma, however, would see it as two requests, and when processing the second request, send back a response that the proxy does not expect. If the proxy has reused the persistent connection to Puma to send another request for a different client, the second response from the first client will be sent to the second client. This is a similar but different vulnerability from CVE-2020-11076. The problem has been fixed in Puma 3.12.6 and Puma 4.3.5.
- openSUSE-SU-2020:0990
- openSUSE-SU-2020:1001
- https://github.com/puma/puma/blob/master/History.md#434435-and-31253126--2020-05-22
- https://github.com/puma/puma/security/advisories/GHSA-w64w-qqph-5gxm
- [debian-lts-announce] 20201007 [SECURITY] [DLA 2398-1] puma security update
- FEDORA-2020-fe354f24e8
- openSUSE-SU-2020:0990
- FEDORA-2020-fe354f24e8
- [debian-lts-announce] 20201007 [SECURITY] [DLA 2398-1] puma security update
- https://github.com/puma/puma/security/advisories/GHSA-w64w-qqph-5gxm
- https://github.com/puma/puma/blob/master/History.md#434435-and-31253126--2020-05-22
- openSUSE-SU-2020:1001
Modified: 2024-11-21
CVE-2021-29509
Puma is a concurrent HTTP 1.1 server for Ruby/Rack applications. The fix for CVE-2019-16770 was incomplete. The original fix only protected existing connections that had already been accepted from having their requests starved by greedy persistent-connections saturating all threads in the same process. However, new connections may still be starved by greedy persistent-connections saturating all threads in all processes in the cluster. A `puma` server which received more concurrent `keep-alive` connections than the server had threads in its threadpool would service only a subset of connections, denying service to the unserved connections. This problem has been fixed in `puma` 4.3.8 and 5.3.1. Setting `queue_requests false` also fixes the issue. This is not advised when using `puma` without a reverse proxy, such as `nginx` or `apache`, because you will open yourself to slow client attacks (e.g. slowloris). The fix is very small and a git patch is available for those using unsupported versions of Puma.
- https://gist.github.com/nateberkopec/4b3ea5676c0d70cbb37c82d54be25837
- https://gist.github.com/nateberkopec/4b3ea5676c0d70cbb37c82d54be25837
- https://github.com/puma/puma/security/advisories/GHSA-q28m-8xjw-8vr5
- https://github.com/puma/puma/security/advisories/GHSA-q28m-8xjw-8vr5
- https://github.com/puma/puma/security/policy
- https://github.com/puma/puma/security/policy
- [debian-lts-announce] 20220827 [SECURITY] [DLA 3083-1] puma security update
- [debian-lts-announce] 20220827 [SECURITY] [DLA 3083-1] puma security update
- https://rubygems.org/gems/puma
- https://rubygems.org/gems/puma
- GLSA-202208-28
- GLSA-202208-28
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-3469
Foreman versions before 2.3.4 and before 2.4.0 is affected by an improper authorization handling flaw. An authenticated attacker can impersonate the foreman-proxy if product enable the Puppet Certificate authority (CA) to sign certificate requests that have subject alternative names (SANs). Foreman do not enable SANs by default and `allow-authorization-extensions` is set to `false` unless user change `/etc/puppetlabs/puppetserver/conf.d/ca.conf` configuration explicitly.
Modified: 2024-11-21
CVE-2021-3494
A smart proxy that provides a restful API to various sub-systems of the Foreman is affected by the flaw which can cause a Man-in-the-Middle attack. The FreeIPA module of Foreman smart proxy does not check the SSL certificate, thus, an unauthenticated attacker can perform actions in FreeIPA if certain conditions are met. The highest threat from this flaw is to system confidentiality. This flaw affects Foreman versions before 2.5.0.
Closed vulnerabilities
BDU:2021-04238
Уязвимость библиотеки ANGLE браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2021-04239
Уязвимость компонента WebAudio браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2021-04240
Уязвимость компонента Extensions API браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2021-04241
Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2021-04242
Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2021-04243
Уязвимость функции печати браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2021-05181
Уязвимость компонента WebRTC веб-браузера Google Chrome, связанная с использованием памяти после её освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-30598
Type confusion in V8 in Google Chrome prior to 92.0.4515.159 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html
- https://crbug.com/1234764
- https://crbug.com/1234764
- FEDORA-2021-78b9d84299
- FEDORA-2021-78b9d84299
- FEDORA-2021-02b301441f
- FEDORA-2021-02b301441f
- FEDORA-2021-6225d60814
- FEDORA-2021-6225d60814
Modified: 2024-11-21
CVE-2021-30599
Type confusion in V8 in Google Chrome prior to 92.0.4515.159 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html
- https://crbug.com/1234770
- https://crbug.com/1234770
- FEDORA-2021-78b9d84299
- FEDORA-2021-78b9d84299
- FEDORA-2021-02b301441f
- FEDORA-2021-02b301441f
- FEDORA-2021-6225d60814
- FEDORA-2021-6225d60814
Modified: 2024-11-21
CVE-2021-30600
Use after free in Printing in Google Chrome prior to 92.0.4515.159 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html
- https://crbug.com/1231134
- https://crbug.com/1231134
- FEDORA-2021-78b9d84299
- FEDORA-2021-78b9d84299
- FEDORA-2021-02b301441f
- FEDORA-2021-02b301441f
- FEDORA-2021-6225d60814
- FEDORA-2021-6225d60814
Modified: 2024-11-21
CVE-2021-30601
Use after free in Extensions API in Google Chrome prior to 92.0.4515.159 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html
- https://crbug.com/1234009
- https://crbug.com/1234009
- FEDORA-2021-78b9d84299
- FEDORA-2021-78b9d84299
- FEDORA-2021-02b301441f
- FEDORA-2021-02b301441f
- FEDORA-2021-6225d60814
- FEDORA-2021-6225d60814
Modified: 2024-11-21
CVE-2021-30602
Use after free in WebRTC in Google Chrome prior to 92.0.4515.159 allowed an attacker who convinced a user to visit a malicious website to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html
- https://crbug.com/1230767
- https://crbug.com/1230767
- FEDORA-2021-78b9d84299
- FEDORA-2021-78b9d84299
- FEDORA-2021-02b301441f
- FEDORA-2021-02b301441f
- FEDORA-2021-6225d60814
- FEDORA-2021-6225d60814
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1348
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1348
Modified: 2024-11-21
CVE-2021-30603
Data race in WebAudio in Google Chrome prior to 92.0.4515.159 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- http://packetstormsecurity.com/files/164259/Chrome-HRTFDatabaseLoader-WaitForLoaderThreadCompletion-Data-Race.html
- http://packetstormsecurity.com/files/164259/Chrome-HRTFDatabaseLoader-WaitForLoaderThreadCompletion-Data-Race.html
- https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html
- https://crbug.com/1233564
- https://crbug.com/1233564
- FEDORA-2021-78b9d84299
- FEDORA-2021-78b9d84299
- FEDORA-2021-02b301441f
- FEDORA-2021-02b301441f
- FEDORA-2021-6225d60814
- FEDORA-2021-6225d60814
Modified: 2024-11-21
CVE-2021-30604
Use after free in ANGLE in Google Chrome prior to 92.0.4515.159 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html
- https://crbug.com/1234829
- https://crbug.com/1234829
- FEDORA-2021-78b9d84299
- FEDORA-2021-78b9d84299
- FEDORA-2021-02b301441f
- FEDORA-2021-02b301441f
- FEDORA-2021-6225d60814
- FEDORA-2021-6225d60814
Closed bugs
приложение outwiker неработоспособно в окружении sisyphus