aboutsummaryrefslogtreecommitdiff
path: root/security/vuxml/vuln-2019.xml
diff options
context:
space:
mode:
authorBaptiste Daroussin <bapt@FreeBSD.org>2021-01-21 13:18:49 +0000
committerBaptiste Daroussin <bapt@FreeBSD.org>2021-01-21 13:18:49 +0000
commitb91e44cfc66a6287c2e1b170d0a9f38ad8a235ea (patch)
tree81b2adaa0557e96a4e0c4f2be100073dd0ea920d /security/vuxml/vuln-2019.xml
parentec6c6eaa839dbaedc8366eb2d9fda3bcbaecae5f (diff)
downloadports-b91e44cfc66a6287c2e1b170d0a9f38ad8a235ea.tar.gz
ports-b91e44cfc66a6287c2e1b170d0a9f38ad8a235ea.zip
Split vuln.xml file [1/2]
The vuln.xml file has grown a lot since 2003. To avoid having to unlock the svn size limitation, the file is now split into 1 file per year up to the current year + previous one. The split is made based on the date when the entry has been added. In order to achieve the split without breaking any consumer we use a standard XML mechanism via the definition of entities. While here add a new target make vuln-flat.xml which will expand the entities in order to be able to regenerate a one uniq file if needed. This useful to for example allow to test with pkg audit directly given the XML parser used in pkg does not support custom entities. The vuxml web site generator has been modified to ensure the vuln.xml file it provides is the expanded version, so for consumers it is still only one single file to download.
Notes
Notes: svn path=/head/; revision=562203
Diffstat (limited to 'security/vuxml/vuln-2019.xml')
-rw-r--r--security/vuxml/vuln-2019.xml11406
1 files changed, 11406 insertions, 0 deletions
diff --git a/security/vuxml/vuln-2019.xml b/security/vuxml/vuln-2019.xml
new file mode 100644
index 000000000000..4917d18c0858
--- /dev/null
+++ b/security/vuxml/vuln-2019.xml
@@ -0,0 +1,11406 @@
+<!--
+Copyright 2003-2021 Jacques Vidrine and contributors
+
+Redistribution and use in source (VuXML) and 'compiled' forms (SGML,
+HTML, PDF, PostScript, RTF and so forth) with or without modification,
+are permitted provided that the following conditions are met:
+1. Redistributions of source code (VuXML) must retain the above
+ copyright notice, this list of conditions and the following
+ disclaimer as the first lines of this file unmodified.
+2. Redistributions in compiled form (transformed to other DTDs,
+ published online in any format, converted to PDF, PostScript,
+ RTF and other formats) must reproduce the above copyright
+ notice, this list of conditions and the following disclaimer
+ in the documentation and/or other materials provided with the
+ distribution.
+
+THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS "AS IS"
+AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
+THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
+PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS
+BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
+OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT
+OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
+BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
+WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
+OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,
+EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+
+ $FreeBSD$
+-->
+
+ <vuln vid="66e4dc99-28b3-11ea-8dde-08002728f74c">
+ <topic>rack -- information leak / session hijack vulnerability</topic>
+ <affects>
+ <package>
+ <name>rubygem-rack</name>
+ <range><ge>2.0.0</ge><lt>2.0.8,3</lt></range>
+ </package>
+ <package>
+ <name>rubygem-rack16</name>
+ <range><ge>1.6.0</ge><lt>1.6.12</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>National Vulnerability Database:</p>
+ <blockquote cite="https://nvd.nist.gov/vuln/detail/CVE-2019-16782">
+ <p>There's a possible information leak / session hijack vulnerability in
+ Rack (RubyGem rack). This vulnerability is patched in versions 1.6.12
+ and 2.0.8. Attackers may be able to find and hijack sessions by using
+ timing attacks targeting the session id. Session ids are usually stored
+ and indexed in a database that uses some kind of scheme for speeding up
+ lookups of that session id. By carefully measuring the amount of time
+ it takes to look up a session, an attacker may be able to find a valid
+ session id and hijack the session. The session id itself may be
+ generated randomly, but the way the session is indexed by the backing
+ store does not use a secure comparison.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://nvd.nist.gov/vuln/detail/CVE-2019-16782</url>
+ <url>https://github.com/rack/rack/blob/master/CHANGELOG.md</url>
+ <cvename>CVE-2019-16782</cvename>
+ </references>
+ <dates>
+ <discovery>2019-12-08</discovery>
+ <entry>2019-12-29</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="e4d9dffb-2a32-11ea-9693-e1b3f6feec79">
+ <topic>OpenEXR -- heap buffer overflow, and out-of-memory bugs</topic>
+ <affects>
+ <package>
+ <name>ilmbase</name>
+ <range><lt>2.3.0_4</lt></range>
+ </package>
+ <package>
+ <name>openexr</name>
+ <range><lt>2.3.0_3</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Cary Phillips reports:</p>
+ <blockquote cite="https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v2.4.0">
+ <p>OpenEXR (IlmBase) v2.4.0 fixes the following security vulnerabilities:</p>
+ <ul>
+ <li>CVE-2018-18444 Issue #351 Out of Memory</li>
+ <li>CVE-2018-18443 Issue #350 heap-buffer-overflow</li>
+ </ul>
+ <p>The relevant patches have been backported to the FreeBSD ports.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://github.com/AcademySoftwareFoundation/openexr/releases/tag/v2.4.0</url>
+ <url>https://github.com/AcademySoftwareFoundation/openexr/issues/350</url>
+ <url>https://github.com/AcademySoftwareFoundation/openexr/issues/351</url>
+ <cvename>CVE-2018-18443</cvename>
+ <cvename>CVE-2018-18444</cvename>
+ </references>
+ <dates>
+ <discovery>2018-10-17</discovery>
+ <entry>2019-12-29</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="7b97b32e-27c4-11ea-9673-4c72b94353b5">
+ <topic>wordpress -- multiple issues</topic>
+ <affects>
+ <package>
+ <name>wordpress</name>
+ <name>fr-wordpress</name>
+ <range><lt>5.3.1,1</lt></range>
+ </package>
+ <package>
+ <name>de-wordpress</name>
+ <name>zh_CN-wordpress</name>
+ <name>zh_TW-wordpress</name>
+ <name>ja-wordpress</name>
+ <name>ru-wordpress</name>
+ <range><lt>5.3.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>wordpress developers reports:</p>
+ <blockquote cite="https://wordpress.org/news/2019/12/wordpress-5-3-1-security-and-maintenance-release/">
+ <p>Four security issues affect WordPress versions 5.3 and earlier; version 5.3.1 fixes them, so youll want to upgrade.
+ If you havent yet updated to 5.3, there are also updated versions of 5.2 and earlier that fix the security issues.
+ -Props to Daniel Bachhuber for finding an issue where an unprivileged user could make a post sticky via the REST API.
+ -Props to Simon Scannell of RIPS Technologies for finding and disclosing an issue where cross-site scripting (XSS)
+ could be stored in well-crafted links.
+ -Props to the WordPress.org Security Team for hardening wp_kses_bad_protocol() to ensure that it is aware of the named
+ colon attribute.
+ -Props to Nguyen The Duc for discovering a stored XSS vulnerability using block editor content.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://wordpress.org/news/2019/12/wordpress-5-3-1-security-and-maintenance-release/</url>
+ </references>
+ <dates>
+ <discovery>2019-12-13</discovery>
+ <entry>2019-12-26</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="1c9178aa-2709-11ea-9673-4c72b94353b5">
+ <topic>typo3 -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>typo3-8</name>
+ <range><lt>8.7.30</lt></range>
+ </package>
+ <package>
+ <name>typo3-9</name>
+ <range><lt>9.5.13</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Typo3 core team reports:</p>
+ <blockquote cite="https://typo3.org/article/typo3-10-2-1-9-5-12-and-8-7-30-security-releases-published">
+ <p>It has been discovered that the output of field validation errors in the Form Framework is vulnerable
+ to cross-site scripting.</p>
+ <p>It has been discovered that t3:// URL handling and typolink functionality are vulnerable to cross-site
+ scripting. Not only regular backend forms are affected but also frontend extensions which use the rendering
+ with typolink.</p>
+ <p>It has been discovered that the output table listing in the Files backend module is vulnerable to cross-site
+ scripting when a file extension contains malicious sequences. Access to the file system of the server - either
+ directly or through synchronization - is required to exploit the vulnerability.</p>
+ <p>It has been discovered that the extraction of manually uploaded ZIP archives in Extension Manager is vulnerable
+ to directory traversal. Admin privileges are required in order to exploit this vulnerability. Since TYPO3 v9 LTS,
+ System Maintainer privileges are required as well.</p>
+ <p>Failing to properly escape user submitted content, class QueryGenerator is vulnerable to SQL injection.
+ Having system extension ext:lowlevel installed and a valid backend user having administrator privileges are
+ required to exploit this vulnerability.</p>
+ <p>It has been discovered that classes QueryGenerator and QueryView are vulnerable to insecure deserialization.
+ Requirements for successfully exploiting this vulnerability (one of the following):
+ - having system extension ext:lowlevel (Backend Module: DB Check) installed and valid backend user having
+ administrator privileges
+ - having system extension ext:sys_action installed and valid backend user having limited privileges</p>
+ <p>TYPO3 allows to upload files either in the backend user interface as well as in custom developed extensions.
+ To reduce the possibility to upload potential malicious code TYPO3 uses the fileDenyPattern to deny e.g. user
+ submitted PHP scripts from being persisted. Besides that it is possible for any editor to upload file assets
+ using the file module (fileadmin) or changing their avatar image shown in the TYPO3 backend.
+
+ Per default TYPO3 allows to upload and store HTML and SVG files as well using the mentioned functionalities.
+ Custom extension implementations probably would also accept those files when only the fileDenyPattern is evaluated.
+
+ Since HTML and SVG files - which might contain executable JavaScript code per W3C standard - could be directly
+ displayed in web clients, the whole web application is exposed to be vulnerable concerning Cross-Site Scripting.
+ Currently the following scenarios are known - given an authenticated regular editor is able to upload files using
+ the TYPO3 backend:
+ - directly target a potential victim to a known public resource in a URL, e.g. /fileadmin/malicious.svg or
+ /fileadmin/malicious.html
+ - using the TypoScript content object “SVG” (implemented in class ScalableVectorGraphicsContentObject)
+ having renderMode set to inline for SVG files (available since TYPO3 v9.0)
+ - custom implementations that directly output and render markup of HTML and SVG files
+
+ SVG files that are embedded using an img src=”malicious.svg” tag are not vulnerable since potential
+ scripts are not executed in these scenarios (see https://www.w3.org/wiki/SVG_Security). The icon API of TYPO3
+ is not scope of this announcement since SVG icons need to be registered using an individual implementation,
+ which is not considered as user submitted content.</p>
+ <p>It has been discovered that request handling in Extbase can be vulnerable to insecure deserialization.
+ User submitted payload has to be signed with a corresponding HMAC-SHA1 using the sensitive TYPO3 encryptionKey
+ as secret - invalid or unsigned payload is not deserialized.
+
+ However, since sensitive information could have been leaked by accident (e.g. in repositories or in commonly
+ known and unprotected backup files), there is the possibility that attackers know the private encryptionKey
+ and are able to calculate the required HMAC-SHA1 to allow a malicious payload to be deserialized.
+
+ Requirements for successfully exploiting this vulnerability (all of the following):
+ - rendering at least one Extbase plugin in the frontend
+ - encryptionKey has been leaked (from LocalConfiguration.php or corresponding .env file). </p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://typo3.org/security/advisory/typo3-core-sa-2019-021/</url>
+ <url>https://typo3.org/security/advisory/typo3-core-sa-2019-022/</url>
+ <url>https://typo3.org/security/advisory/typo3-core-sa-2019-023/</url>
+ <url>https://typo3.org/security/advisory/typo3-core-sa-2019-024/</url>
+ <url>https://typo3.org/security/advisory/typo3-core-sa-2019-025/</url>
+ <url>https://typo3.org/security/advisory/typo3-core-sa-2019-026/</url>
+ <url>https://typo3.org/security/advisory/typo3-psa-2019-010/</url>
+ <url>https://typo3.org/security/advisory/typo3-psa-2019-011/</url>
+ </references>
+ <dates>
+ <discovery>2019-12-17</discovery>
+ <entry>2019-12-25</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="ad3451b9-23e0-11ea-8b36-f1925a339a82">
+ <topic>e2fsprogs -- maliciously corrupted file systems can trigger buffer overruns in the quota code used by e2fsck</topic>
+ <affects>
+ <package>
+ <name>e2fsprogs</name>
+ <range><lt>1.45.4</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Ted Y. Ts'o reports:</p>
+ <blockquote cite="http://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.45.4">
+ <p>A maliciously corrupted file systems can trigger buffer overruns in the quota code used by e2fsck.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://e2fsprogs.sourceforge.net/e2fsprogs-release.html#1.45.4</url>
+ <cvename>CVE-2019-5094</cvename>
+ </references>
+ <dates>
+ <discovery>2019-09-23</discovery>
+ <entry>2019-12-21</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="3da0352f-2397-11ea-966e-000ffec0b3e1">
+ <topic>drupal -- Drupal Core - Multiple Vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>drupal7</name>
+ <range><lt>7.69</lt></range>
+ </package>
+ <package>
+ <name>drupal8</name>
+ <range><lt>8.8.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Drupal Security Team reports:</p>
+ <blockquote cite="https://www.drupal.org/sa-core-2019-009">
+ <p>A visit to install.php can cause cached data to become corrupted.
+ This could cause a site to be impaired until caches are rebuilt.</p>
+ </blockquote>
+ <blockquote cite="https://www.drupal.org/sa-core-2019-010">
+ <p>Drupal 8 core's file_save_upload() function does not strip the
+ leading and trailing dot ('.') from filenames, like Drupal 7 did.
+ Users with the ability to upload files with any extension in
+ conjunction with contributed modules may be able to use this to
+ upload system files such as .htaccess in order to bypass protections
+ afforded by Drupal's default .htaccess file. After this fix,
+ file_save_upload() now trims leading and trailing dots from filenames.
+ </p>
+ </blockquote>
+ <blockquote cite="https://www.drupal.org/sa-core-2019-011">
+ <p>The Media Library module has a security vulnerability whereby it
+ doesn't sufficiently restrict access to media items in certain
+ configurations.
+ </p>
+ </blockquote>
+ <blockquote cite="https://www.drupal.org/sa-core-2019-012">
+ <p>The Drupal project uses the third-party library Archive_Tar, which
+ has released a security-related feature that impacts some Drupal
+ configurations. Multiple vulnerabilities are possible if Drupal is
+ configured to allow .tar, .tar.gz, .bz2 or .tlz file uploads and
+ processes them. The latest versions of Drupal update Archive_Tar to
+ 1.4.9 to mitigate the file processing vulnerabilities.
+ </p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.drupal.org/sa-core-2019-009</url>
+ <url>https://www.drupal.org/sa-core-2019-010</url>
+ <url>https://www.drupal.org/sa-core-2019-011</url>
+ <url>https://www.drupal.org/sa-core-2019-012</url>
+ </references>
+ <dates>
+ <discovery>2019-12-18</discovery>
+ <entry>2019-12-21</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="ed8cbad5-21a8-11ea-9b6d-901b0e934d69">
+ <topic>py-matrix-synapse -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>py35-matrix-synapse</name>
+ <name>py36-matrix-synapse</name>
+ <name>py37-matrix-synapse</name>
+ <range><lt>1.7.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Matrix developers report:</p>
+ <blockquote cite="https://github.com/matrix-org/synapse/releases/tag/v1.7.1">
+ <p>The [synapse 1.7.1] release includes several security fixes as well
+ as a fix to a bug exposed by the security fixes. All previous releases
+ of Synapse are affected. Administrators are encouraged to upgrade as
+ soon as possible.</p>
+ <ul>
+ <li>Fix a bug which could cause room events to be incorrectly authorized
+ using events from a different room.</li>
+ <li>Fix a bug causing responses to the /context client endpoint to not
+ use the pruned version of the event.</li>
+ <li>Fix a cause of state resets in room versions 2 onwards.</li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://github.com/matrix-org/synapse/releases/tag/v1.7.1</url>
+ </references>
+ <dates>
+ <discovery>2019-12-18</discovery>
+ <entry>2019-12-18</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="d778ddb0-2338-11ea-a1c7-b499baebfeaf">
+ <topic>OpenSSL -- Overflow vulnerability</topic>
+ <affects>
+ <package>
+ <name>openssl</name>
+ <range><lt>1.0.2u,1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The OpenSSL project reports:</p>
+ <blockquote cite="https://www.openssl.org/news/secadv/20191206.txt">
+ <p>rsaz_512_sqr overflow bug on x86_64 (CVE-2019-1551) (Low)<br/>
+ There is an overflow bug in the x64_64 Montgomery squaring procedure
+ used in exponentiation with 512-bit moduli. No EC algorithms are
+ affected. Analysis suggests that attacks against 2-prime RSA1024,
+ 3-prime RSA1536, and DSA1024 as a result of this defect would be very
+ difficult to perform and are not believed likely. Attacks against
+ DH512 are considered just feasible. However, for an attack the target
+ would have to re-use the DH512 private key, which is not recommended
+ anyway. Also applications directly using the low level API BN_mod_exp
+ may be affected if they use BN_FLG_CONSTTIME.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.openssl.org/news/secadv/20191206.txt</url>
+ <cvename>CVE-2019-1551</cvename>
+ </references>
+ <dates>
+ <discovery>2019-12-06</discovery>
+ <entry>2019-12-20</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="70111759-1dae-11ea-966a-206a8a720317">
+ <topic>spamassassin -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>spamassassin</name>
+ <range><lt>3.4.3</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>the Apache Spamassassin project reports:</p>
+ <blockquote cite="https://www.cybersecurity-help.cz/vdb/SB2019121311">
+ <p>An input validation error of user-supplied input parsing
+ multipart emails. Specially crafted emails can consume all
+ resources on the system.</p>
+ <p>A local user is able to execute arbitrary shell commands
+ through specially crafted nefarious CF files.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.cybersecurity-help.cz/vdb/SB2019121311</url>
+ <cvename>CVE-2019-12420</cvename>
+ <cvename>CVE-2018-11805</cvename>
+ </references>
+ <dates>
+ <discovery>2019-12-11</discovery>
+ <entry>2019-12-13</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="1edae47e-1cdd-11ea-8c2a-08002743b791">
+ <topic>samba -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>samba48</name>
+ <range><ge>4.8.0</ge></range>
+ </package>
+ <package>
+ <name>samba410</name>
+ <range><lt>4.10.11</lt></range>
+ </package>
+ <package>
+ <name>samba411</name>
+ <range><lt>4.11.3</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Samba Team reports:</p>
+ <blockquote cite="https://www.samba.org/samba/history/samba-4.10.11.html">
+ <p>CVE-2019-14861:</p>
+ <p>An authenticated user can crash the DCE/RPC DNS management server by creating records with matching the zone name.</p>
+ <p>CVE-2019-14870:</p>
+ <p>The DelegationNotAllowed Kerberos feature restriction was not being applied when processing protocol transition requests (S4U2Self), in the AD DC KDC.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.samba.org/samba/history/samba-4.10.11.html</url>
+ <cvename>CVE-2019-14861</cvename>
+ <cvename>CVE-2019-14870</cvename>
+ </references>
+ <dates>
+ <discovery>2019-12-10</discovery>
+ <entry>2019-12-12</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="b7dc4dde-2e48-43f9-967a-c68461537cf2">
+ <topic>dovecot -- null pointer deref in notify with empty headers</topic>
+ <affects>
+ <package>
+ <name>dovecot</name>
+ <range><ge>2.3.9</ge><lt>2.3.9.2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Aki Tuomi reports</p>
+ <blockquote cite="https://dovecot.org/pipermail/dovecot/2019-December/117894.html">
+ <p>Mail with group address as sender will cause a signal 11 crash in push
+ notification drivers. Group address as recipient can cause crash in some
+ drivers.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://dovecot.org/pipermail/dovecot/2019-December/117894.html</url>
+ <cvename>CVE-2019-19722</cvename>
+ </references>
+ <dates>
+ <discovery>2019-12-10</discovery>
+ <entry>2019-12-13</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="21944144-1b90-11ea-a2d4-001b217b3468">
+ <topic>Gitlab -- Multiple Vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>gitlab-ce</name>
+ <range><ge>12.5.0</ge><lt>12.5.4</lt></range>
+ <range><ge>12.4.0</ge><lt>12.4.6</lt></range>
+ <range><ge>10.5.0</ge><lt>12.3.9</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Gitlab reports:</p>
+ <blockquote cite="https://about.gitlab.com/blog/2019/12/10/critical-security-release-gitlab-12-5-4-released/">
+ <p>Path traversal with potential remote code execution</p>
+ <p>Disclosure of private code via Elasticsearch integration</p>
+ <p>Update Git dependency</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://about.gitlab.com/blog/2019/12/10/critical-security-release-gitlab-12-5-4-released/</url>
+ <cvename>CVE-2019-19628</cvename>
+ <cvename>CVE-2019-19629</cvename>
+ <cvename>CVE-2019-19604</cvename>
+ </references>
+ <dates>
+ <discovery>2019-12-10</discovery>
+ <entry>2019-12-10</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="22ae307a-1ac4-11ea-b267-001cc0382b2f">
+ <topic>Ghostscript -- Security bypass vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>ghostscript9-agpl-base</name>
+ <name>ghostscript9-agpl-x11</name>
+ <range><lt>9.50</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Cedric Buissart (Red Hat) reports:</p>
+ <blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14811">
+ <p>A flaw was found in, ghostscript versions prior to 9.50, in the
+ .pdf_hook_DSC_Creator procedure where it did not properly secure
+ its privileged calls, enabling scripts to bypass `-dSAFER`
+ restrictions. A specially crafted PostScript file could disable
+ security protection and then have access to the file system, or
+ execute arbitrary commands.</p>
+ </blockquote>
+ <blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14812">
+ <p>A flaw was found in all ghostscript versions 9.x before 9.50, in
+ the .setuserparams2 procedure where it did not properly secure its
+ privileged calls, enabling scripts to bypass `-dSAFER`
+ restrictions. A specially crafted PostScript file could disable
+ security protection and then have access to the file system, or
+ execute arbitrary commands.</p>
+ </blockquote>
+ <blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14813">
+ <p>A flaw was found in ghostscript, versions 9.x before 9.50, in the
+ setsystemparams procedure where it did not properly secure its
+ privileged calls, enabling scripts to bypass `-dSAFER`
+ restrictions. A specially crafted PostScript file could disable
+ security protection and then have access to the file system, or
+ execute arbitrary commands.</p>
+ </blockquote>
+ <blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-14817">
+ <p>A flaw was found in, ghostscript versions prior to 9.50, in the
+ .pdfexectoken and other procedures where it did not properly secure
+ its privileged calls, enabling scripts to bypass `-dSAFER`
+ restrictions. A specially crafted PostScript file could disable
+ security protection and then have access to the file system, or
+ execute arbitrary commands.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-14811</cvename>
+ <cvename>CVE-2019-14812</cvename>
+ <cvename>CVE-2019-14813</cvename>
+ <cvename>CVE-2019-14817</cvename>
+ </references>
+ <dates>
+ <discovery>2019-08-20</discovery>
+ <entry>2019-12-09</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="ca3fe5b3-185e-11ea-9673-4c72b94353b5">
+ <topic>phpmyadmin -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>phpmyadmin</name>
+ <range><lt>4.9.2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>the phpmyadmin team reports:</p>
+ <blockquote cite="https://www.phpmyadmin.net/news/2019/11/22/phpmyadmin-492-released/">
+ <p>This security fix is part of an ongoing effort to improve the security of the Designer feature
+ and is designated PMASA-2019-5. There is also an improvement for how we sanitize git version
+ information shown on the home page.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.phpmyadmin.net/news/2019/11/22/phpmyadmin-492-released/</url>
+ </references>
+ <dates>
+ <discovery>2019-11-22</discovery>
+ <entry>2019-12-06</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="4e3fa78b-1577-11ea-b66e-080027bdabe8">
+ <topic>Django -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>py35-django21</name>
+ <name>py36-django21</name>
+ <name>py37-django21</name>
+ <name>py38-django21</name>
+ <range><lt>2.1.15</lt></range>
+ </package>
+ <package>
+ <name>py35-django22</name>
+ <name>py36-django22</name>
+ <name>py37-django22</name>
+ <name>py38-django22</name>
+ <range><lt>2.2.8</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Django release reports:</p>
+ <blockquote cite="https://www.djangoproject.com/weblog/2019/dec/02/security-releases/">
+ <p>CVE-2019-19118: Privilege escalation in the Django admin.</p>
+ <p>Since Django 2.1, a Django model admin displaying a parent model with related
+ model inlines, where the user has view-only permissions to a parent model but
+ edit permissions to the inline model, would display a read-only view of the parent
+ model but editable forms for the inline.</p>
+ <p>Submitting these forms would not allow direct edits to the parent model, but would
+ trigger the parent model's save() method, and cause pre and post-save signal handlers
+ to be invoked. This is a privilege escalation as a user who lacks permission to edit
+ a model should not be able to trigger its save-related signals.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.djangoproject.com/weblog/2019/dec/02/security-releases/</url>
+ <cvename>CVE-2019-19118</cvename>
+ </references>
+ <dates>
+ <discovery>2019-11-25</discovery>
+ <entry>2019-12-03</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="9c36d41c-11df-11ea-9b6d-901b0e934d69">
+ <topic>py-matrix-synapse -- incomplete cleanup of 3rd-party-IDs on user deactivation</topic>
+ <affects>
+ <package>
+ <name>py35-matrix-synapse</name>
+ <name>py36-matrix-synapse</name>
+ <name>py37-matrix-synapse</name>
+ <range><lt>1.6.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Matrix developers report:</p>
+ <blockquote cite="https://github.com/matrix-org/synapse/releases/tag/v1.6.1">
+ <p>Clean up local threepids from user on account deactivation.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://github.com/matrix-org/synapse/releases/tag/v1.6.1</url>
+ <url>https://github.com/matrix-org/synapse/pull/6426</url>
+ </references>
+ <dates>
+ <discovery>2019-11-28</discovery>
+ <entry>2019-11-28</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="42675046-fa70-11e9-ba4e-901b0e934d69">
+ <topic>py-matrix-synapse -- missing signature checks on some federation APIs</topic>
+ <affects>
+ <package>
+ <name>py35-matrix-synapse</name>
+ <name>py36-matrix-synapse</name>
+ <name>py37-matrix-synapse</name>
+ <range><lt>1.5.0</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Matrix developers report:</p>
+ <blockquote cite="https://github.com/matrix-org/synapse/pull/6262">
+ <p>Make sure that [...] events sent over /send_join, /send_leave, and
+ /invite, are correctly signed and come from the expected servers.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://github.com/matrix-org/synapse/pull/6262</url>
+ <url>https://github.com/matrix-org/synapse/releases/tag/v1.5.0</url>
+ </references>
+ <dates>
+ <discovery>2019-10-29</discovery>
+ <entry>2019-10-29</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="4ce7c28a-11ac-11ea-b537-001b217b3468">
+ <topic>Gitlab -- Multiple Vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>gitlab-ce</name>
+ <range><ge>12.5.0</ge><lt>12.5.2</lt></range>
+ <range><ge>12.4.0</ge><lt>12.4.5</lt></range>
+ <range><ge>11.9.0</ge><lt>12.3.8</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Gitlab reports:</p>
+ <blockquote cite="https://about.gitlab.com/blog/2019/11/27/security-release-gitlab-12-5-2-released/">
+ <p>Unauthorized access to grafana metrics</p>
+ <p>Update Mattermost dependency</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://about.gitlab.com/blog/2019/11/27/security-release-gitlab-12-5-2-released/</url>
+ <cvename>CVE-2019-19262</cvename>
+ </references>
+ <dates>
+ <discovery>2019-11-27</discovery>
+ <entry>2019-11-28</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="1aa7a094-1147-11ea-b537-001b217b3468">
+ <topic>Gitlab -- Multiple Vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>gitlab-ce</name>
+ <range><ge>12.5.0</ge><lt>12.5.1</lt></range>
+ <range><ge>12.4.0</ge><lt>12.4.4</lt></range>
+ <range><lt>12.3.7</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Gitlab reports:</p>
+ <blockquote cite="https://about.gitlab.com/blog/2019/11/27/security-release-gitlab-12-5-1-released/">
+ <p>Path traversal with potential remote code execution</p>
+ <p>Private objects exposed through project import</p>
+ <p>Disclosure of notes via Elasticsearch integration</p>
+ <p>Disclosure of comments via Elasticsearch integration</p>
+ <p>DNS Rebind SSRF in various chat notifications</p>
+ <p>Disclosure of vulnerability status in dependency list</p>
+ <p>Disclosure of commit count in Cycle Analytics</p>
+ <p>Exposure of related branch names</p>
+ <p>Tags pushes from blocked users</p>
+ <p>Branches and Commits exposed to Guest members via integration</p>
+ <p>IDOR when adding users to protected environments</p>
+ <p>Former project members able to access repository information</p>
+ <p>Unauthorized access to grafana metrics</p>
+ <p>Todos created for former project members</p>
+ <p>Update Mattermost dependency</p>
+ <p>Disclosure of AWS secret keys on certain Admin pages</p>
+ <p>Stored XSS in Group and User profile fields</p>
+ <p>Forked project information disclosed via Project API</p>
+ <p>Denial of Service in the issue and commit comment pages</p>
+ <p>Tokens stored in plaintext</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://about.gitlab.com/blog/2019/11/27/security-release-gitlab-12-5-1-released/</url>
+ <cvename>CVE-2019-19088</cvename>
+ <cvename>CVE-2019-19309</cvename>
+ <cvename>CVE-2019-19086</cvename>
+ <cvename>CVE-2019-19087</cvename>
+ <cvename>CVE-2019-19261</cvename>
+ <cvename>CVE-2019-19256</cvename>
+ <cvename>CVE-2019-19254</cvename>
+ <cvename>CVE-2019-19257</cvename>
+ <cvename>CVE-2019-19263</cvename>
+ <cvename>CVE-2019-19258</cvename>
+ <cvename>CVE-2019-19259</cvename>
+ <cvename>CVE-2019-19260</cvename>
+ <cvename>CVE-2019-19262</cvename>
+ <cvename>CVE-2019-19255</cvename>
+ <cvename>CVE-2019-19310</cvename>
+ <cvename>CVE-2019-19311</cvename>
+ <cvename>CVE-2019-19312</cvename>
+ <cvename>CVE-2019-19313</cvename>
+ <cvename>CVE-2019-19314</cvename>
+ </references>
+ <dates>
+ <discovery>2019-11-27</discovery>
+ <entry>2019-11-27</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="3e748551-c732-45f6-bd88-928da16f23a8">
+ <topic>webkit2-gtk3 -- Multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>webkit2-gtk3</name>
+ <range><lt>2.26.2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The WebKitGTK project reports multiple vulnerabilities.</p>
+ </body>
+ </description>
+ <references>
+ <url>https://webkitgtk.org/security/WSA-2019-0006.html</url>
+ <cvename>CVE-2019-8710</cvename>
+ <cvename>CVE-2019-8743</cvename>
+ <cvename>CVE-2019-8764</cvename>
+ <cvename>CVE-2019-8765</cvename>
+ <cvename>CVE-2019-8766</cvename>
+ <cvename>CVE-2019-8782</cvename>
+ <cvename>CVE-2019-8783</cvename>
+ <cvename>CVE-2019-8808</cvename>
+ <cvename>CVE-2019-8811</cvename>
+ <cvename>CVE-2019-8812</cvename>
+ <cvename>CVE-2019-8813</cvename>
+ <cvename>CVE-2019-8814</cvename>
+ <cvename>CVE-2019-8815</cvename>
+ <cvename>CVE-2019-8816</cvename>
+ <cvename>CVE-2019-8819</cvename>
+ <cvename>CVE-2019-8820</cvename>
+ <cvename>CVE-2019-8821</cvename>
+ <cvename>CVE-2019-8822</cvename>
+ <cvename>CVE-2019-8823</cvename>
+ </references>
+ <dates>
+ <discovery>2019-11-08</discovery>
+ <entry>2019-11-27</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="87270ba5-03d3-11ea-b81f-3085a9a95629">
+ <topic>urllib3 -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>py27-urllib3</name>
+ <name>py35-urllib3</name>
+ <name>py36-urllib3</name>
+ <name>py37-urllib3</name>
+ <name>py38-urllib3</name>
+ <range><lt>1.24.3,1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>NIST reports: (by search in the range 2018/01/01 - 2019/11/10):</p>
+ <blockquote cite="https://nvd.nist.gov/vuln/search/results?form_type=Advanced&amp;results_type=overview&amp;query=urllib3&amp;search_type=all&amp;pub_start_date=01%2F01%2F2018&amp;pub_end_date=11%2F10%2F2019">
+ <p>urllib3 before version 1.23 does not remove the Authorization HTTP header when following a cross-origin redirect (i.e., a redirect that differs in host, port, or scheme). This can allow for credentials in the Authorization header to be exposed to unintended hosts or transmitted in cleartext.</p>
+ <p>In the urllib3 library through 1.24.1 for Python, CRLF injection is possible if the attacker controls the request parameter.</p>
+ <p>The urllib3 library before 1.24.2 for Python mishandles certain cases where the desired set of CA certificates is different from the OS store of CA certificates, which results in SSL connections succeeding in situations where a verification failure is the correct outcome. This is related to use of the ssl_context, ca_certs, or ca_certs_dir argument.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://nvd.nist.gov/vuln/search/results?form_type=Advanced&amp;results_type=overview&amp;query=urllib3&amp;search_type=all&amp;pub_start_date=01%2F01%2F2018&amp;pub_end_date=11%2F10%2F2019</url>
+ <cvename>CVE-2018-20060</cvename>
+ <cvename>CVE-2019-11236</cvename>
+ <cvename>CVE-2019-11324</cvename>
+ <freebsdpr>ports/229322</freebsdpr>
+ </references>
+ <dates>
+ <discovery>2018-12-11</discovery>
+ <entry>2019-11-26</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="fbe10a8a-05a1-11ea-9dfa-f8b156ac3ff9">
+ <topic>FreeBSD -- Intel CPU Microcode Update</topic>
+ <affects>
+ <package>
+ <name>FreeBSD-kernel</name>
+ <range><ge>12.1</ge><lt>12.1_1</lt></range>
+ <range><ge>12.0</ge><lt>12.0_12</lt></range>
+ <range><ge>11.3</ge><lt>11.3_5</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Starting with version 1.26, the devcpu-data port/package includes
+ updates and mitigations for the following technical and security
+ advisories (depending on CPU model).</p>
+ <p>Intel TSX Updates (TAA) CVE-2019-11135 Voltage Modulation
+ Vulnerability CVE-2019-11139 MD_CLEAR Operations
+ CVE-2018-12126 CVE-2018-12127 CVE-2018-12130 CVE-2018-11091
+ TA Indirect Sharing CVE-2017-5715 EGETKEY CVE-2018-12126
+ CVE-2018-12127 CVE-2018-12130 CVE-2018-11091 JCC SKX102
+ Erratum </p>
+ <p>Updated microcode includes mitigations for
+ CPU issues, but may also cause a performance regression due
+ to the JCC erratum mitigation. Please visit
+ http://www.intel.com/benchmarks for further information.
+ </p>
+ <p>Please visit http://www.intel.com/security for
+ detailed information on these advisories as well as a list of
+ CPUs that are affected.</p>
+ <p>Operating a CPU without the latest microcode may result in erratic or
+ unpredictable behavior, including system crashes and lock ups.
+ Certain issues listed in this advisory may result in the leakage of
+ privileged system information to unprivileged users. Please refer to
+ the security advisories listed above for detailed information.</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-11135</cvename>
+ <cvename>CVE-2019-11139</cvename>
+ <cvename>CVE-2018-12126</cvename>
+ <cvename>CVE-2018-12127</cvename>
+ <cvename>CVE-2018-12130</cvename>
+ <cvename>CVE-2018-11091</cvename>
+ <cvename>CVE-2017-5715</cvename>
+ <freebsdsa>SA-19:26.mcu</freebsdsa>
+ </references>
+ <dates>
+ <discovery>2019-11-14</discovery>
+ <entry>2019-11-25</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="edc0bf7e-05a1-11ea-9dfa-f8b156ac3ff9">
+ <topic>FreeBSD -- Machine Check Exception on Page Size Change</topic>
+ <affects>
+ <package>
+ <name>FreeBSD-kernel</name>
+ <range><ge>12.1</ge><lt>12.1_1</lt></range>
+ <range><ge>12.0</ge><lt>12.0_12</lt></range>
+ <range><ge>11.3</ge><lt>11.3_5</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Intel discovered a previously published erratum on some Intel
+ platforms can be exploited by malicious software to potentially cause
+ a denial of service by triggering a machine check that will crash or
+ hang the system.</p>
+ <p>Malicious guest operating systems may be able to crash the host.</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2018-12207</cvename>
+ <freebsdsa>SA-19:25.mcepsc</freebsdsa>
+ </references>
+ <dates>
+ <discovery>2019-11-14</discovery>
+ <entry>2019-11-25</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="6ade62d9-0f62-11ea-9673-4c72b94353b5">
+ <topic>clamav -- Denial-of-Service (DoS) vulnerability</topic>
+ <affects>
+ <package>
+ <name>clamav</name>
+ <range><lt>0.102.1,1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Micah Snyder reports:</p>
+ <blockquote cite="https://blog.clamav.net/2019/11/clamav-01021-and-01015-patches-have.html">
+ <p>A Denial-of-Service (DoS) vulnerability may occur when scanning a specially crafted email
+ file as a result of excessively long scan times. The issue is resolved by implementing
+ several maximums in parsing MIME messages and by optimizing use of memory allocation.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://blog.clamav.net/2019/11/clamav-01021-and-01015-patches-have.html</url>
+ <cvename>CVE-2019-15961</cvename>
+ </references>
+ <dates>
+ <discovery>2019-09-06</discovery>
+ <entry>2019-11-25</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="ffc80e58-0dcb-11ea-9673-4c72b94353b5">
+ <topic>unbound -- parsing vulnerability</topic>
+ <affects>
+ <package>
+ <name>unbound</name>
+ <range><lt>1.9.5</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Unbound Security Advisories:</p>
+ <blockquote cite="https://nlnetlabs.nl/projects/unbound/security-advisories/#vulnerability-in-ipsec-module">
+ <p>Recent versions of Unbound contain a vulnerability that can cause shell
+ code execution after receiving a specially crafted answer. This issue
+ can only be triggered if unbound was compiled with --enable-ipsecmod
+ support, and ipsecmod is enabled and used in the configuration.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://nlnetlabs.nl/projects/unbound/security-advisories/#vulnerability-in-ipsec-module</url>
+ <cvename>CVE-2019-18934</cvename>
+ </references>
+ <dates>
+ <discovery>2019-11-19</discovery>
+ <entry>2019-11-23</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="b12a341a-0932-11ea-bf09-080027e0baa0">
+ <topic>gitea -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>gitea</name>
+ <range><lt>1.9.10</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Gitea Team reports:</p>
+ <blockquote cite="https://blog.gitea.io/2019/11/gitea-1.10.0-is-released/">
+ <p>This release contains five security fixes, so we recommend updating:</p>
+ <ul>
+ <li>Fix issue with user.fullname</li>
+ <li>Ignore mentions for users with no access</li>
+ <li>Be more strict with git arguments</li>
+ <li>Extract the username and password from the mirror url</li>
+ <li>Reserve .well-known username</li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://blog.gitea.io/2019/11/gitea-1.10.0-is-released/</url>
+ <freebsdpr>ports/241981</freebsdpr>
+ </references>
+ <dates>
+ <discovery>2019-11-17</discovery>
+ <entry>2019-11-22</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="94c6951a-0d04-11ea-87ca-001999f8d30b">
+ <topic>asterisk -- Re-invite with T.38 and malformed SDP causes crash</topic>
+ <affects>
+ <package>
+ <name>asterisk13</name>
+ <range><lt>13.29.2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Asterisk project reports:</p>
+ <blockquote cite="https://www.asterisk.org/downloads/security-advisories">
+ <p>If Asterisk receives a re-invite initiating T.38 faxing
+ and has a port of 0 and no c line in the SDP, a crash
+ will occur.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://downloads.asterisk.org/pub/security/AST-2019-008.html</url>
+ <cvename>CVE-2019-18976</cvename>
+ </references>
+ <dates>
+ <discovery>2019-11-07</discovery>
+ <entry>2019-11-22</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="49b61ab6-0d04-11ea-87ca-001999f8d30b">
+ <topic>asterisk -- AMI user could execute system commands</topic>
+ <affects>
+ <package>
+ <name>asterisk13</name>
+ <range><lt>13.29.2</lt></range>
+ </package>
+ <package>
+ <name>asterisk16</name>
+ <range><lt>16.6.2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Asterisk project reports:</p>
+ <blockquote cite="https://www.asterisk.org/downloads/security-advisories">
+ <p>A remote authenticated Asterisk Manager Interface (AMI)
+ user without system authorization could use a specially
+ crafted Originate AMI request to execute arbitrary system
+ commands.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://downloads.asterisk.org/pub/security/AST-2019-007.html</url>
+ <cvename>CVE-2019-18610</cvename>
+ </references>
+ <dates>
+ <discovery>2019-10-10</discovery>
+ <entry>2019-11-22</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="a8d94711-0d03-11ea-87ca-001999f8d30b">
+ <topic>asterisk -- SIP request can change address of a SIP peer</topic>
+ <affects>
+ <package>
+ <name>asterisk13</name>
+ <range><lt>13.29.2</lt></range>
+ </package>
+ <package>
+ <name>asterisk16</name>
+ <range><lt>16.6.2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Asterisk project reports:</p>
+ <blockquote cite="https://www.asterisk.org/downloads/security-advisories">
+ <p>A SIP request can be sent to Asterisk that can change
+ a SIP peers IP address. A REGISTER does not need to occur,
+ and calls can be hijacked as a result. The only thing
+ that needs to be known is the peers name; authentication
+ details such as passwords do not need to be known. This
+ vulnerability is only exploitable when the nat option is
+ set to the default, or auto_force_rport.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://downloads.asterisk.org/pub/security/AST-2019-006.html</url>
+ <cvename>CVE-2019-18790</cvename>
+ </references>
+ <dates>
+ <discovery>2019-10-17</discovery>
+ <entry>2019-11-22</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="ecb7fdec-0b82-11ea-874d-0c9d925bbbc0">
+ <topic>drm graphics drivers -- Local privilege escalation and denial of service</topic>
+ <affects>
+ <package>
+ <name>drm-current-kmod</name>
+ <range><lt>4.16.g20191120</lt></range>
+ </package>
+ <package>
+ <name>drm-devel-kmod</name>
+ <range><lt>5.0.g20191120</lt></range>
+ </package>
+ <package>
+ <name>drm-fbsd12.0-kmod</name>
+ <range><lt>4.16.g20191120</lt></range>
+ </package>
+ <package>
+ <name>drm-fbsd11.2-kmod</name>
+ <range><lt>4.11.g20191204</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Intel reports:</p>
+ <blockquote cite="https://blogs.intel.com/technology/2019/11/ipas-november-2019-intel-platform-update-ipu">
+ <p>As part of IPU 2019.2, INTEL-SA-00242 advises that insufficient
+ access control may allow an authenticated user to potentially
+ enable escalation of privilege via local access.</p>
+ <p>INTEL-SA-00260 advises that insufficient access control may
+ allow an authenticated user to potentially enable denial of
+ service via local access.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://blogs.intel.com/technology/2019/11/ipas-november-2019-intel-platform-update-ipu</url>
+ <url>https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00242.html</url>
+ <url>https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00260.html</url>
+ <cvename>CVE-2019-0154</cvename>
+ <cvename>CVE-2019-11112</cvename>
+ </references>
+ <dates>
+ <discovery>2019-11-12</discovery>
+ <entry>2019-11-20</entry>
+ <modified>2019-12-04</modified>
+ </dates>
+ </vuln>
+
+ <vuln vid="620685d6-0aa3-11ea-9673-4c72b94353b5">
+ <topic>squid -- Vulnerable to HTTP Digest Authentication</topic>
+ <affects>
+ <package>
+ <name>squid</name>
+ <range><lt>4.9</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Squid Team reports:</p>
+ <blockquote cite="http://www.squid-cache.org/Advisories/SQUID-2019_11.txt">
+ <p>Problem Description: Due to incorrect data management Squid is
+ vulnerable to a information disclosure when processing HTTP Digest
+ Authentication.</p>
+ <p>Severity: Nonce tokens contain the raw byte value of a pointer which sits
+ within heap memory allocation. This information reduces ASLR protections
+ and may aid attackers isolating memory areas to target for remote code
+ execution attacks.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://www.squid-cache.org/Advisories/SQUID-2019_11.txt</url>
+ <url>http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18679</url>
+ <cvename>CVE-2019-18679</cvename>
+ </references>
+ <dates>
+ <discovery>2019-11-05</discovery>
+ <entry>2019-11-19</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="f04f840d-0840-11ea-8d66-75d3253ef913">
+ <topic>libidn2 -- roundtrip check vulnerability</topic>
+ <affects>
+ <package>
+ <name>libidn2</name>
+ <range><lt>2.2.0</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>CVE list:</p>
+ <blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290">
+ <p>GNU libidn2 before 2.2.0 fails to perform the roundtrip checks
+ specified in RFC3490 Section 4.2 when converting A-labels to U-labels.
+ This makes it possible in some circumstances for one domain to
+ impersonate another. By creating a malicious domain that matches a
+ target domain except for the inclusion of certain punycoded Unicode
+ characters (that would be discarded when converted first to a Unicode
+ label and then back to an ASCII label), arbitrary domains can be
+ impersonated.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://gitlab.com/libidn/libidn2/blob/master/NEWS</url>
+ <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12290</url>
+ <cvename>CVE-2019-12290</cvename>
+ </references>
+ <dates>
+ <discovery>2019-11-14</discovery>
+ <entry>2019-11-18</entry>
+ <modified>2020-06-24</modified>
+ </dates>
+ </vuln>
+
+ <vuln vid="f59af308-07f3-11ea-8c56-f8b156b6dcc8">
+ <topic>GNU cpio -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>gcpio</name>
+ <range><lt>2.13</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Sergey Poznyakoff reports:</p>
+ <blockquote cite="https://lists.gnu.org/archive/html/bug-cpio/2019-11/msg00000.html">
+ <p>This stable release fixes several potential vulnerabilities</p>
+ <p>CVE-2015-1197: cpio, when using the --no-absolute-filenames
+ option, allows local users to write to arbitrary files
+ via a symlink attack on a file in an archive.</p>
+ <p>CVE-2016-2037: The cpio_safer_name_suffix function in
+ util.c allows remote attackers to cause a denial of service
+ (out-of-bounds write) via a crafted cpio file.</p>
+ <p>CVE-2019-14866: Improper input validation when writing
+ tar header fields leads to unexpected tar generation.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://lists.gnu.org/archive/html/bug-cpio/2019-11/msg00000.html</url>
+ <cvename>CVE-2015-1197</cvename>
+ <cvename>CVE-2016-2037</cvename>
+ <cvename>CVE-2019-14866</cvename>
+ </references>
+ <dates>
+ <discovery>2019-11-06</discovery>
+ <entry>2019-11-15</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="b48e7b14-052a-11ea-a1de-53b029d2b061">
+ <topic>libmad -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>libmad</name>
+ <range><lt>0.15.1b_7</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>National Vulnerability Database:</p>
+ <blockquote cite="https://nvd.nist.gov/vuln/detail/CVE-2017-8372">
+ <p>CVE-2017-8372: The mad_layer_III function in layer3.c in Underbit MAD
+ libmad 0.15.1b, if NDEBUG is omitted, allows remote attackers to cause a
+ denial of service (assertion failure and application exit) via a crafted
+ audio file.</p>
+ </blockquote>
+ <blockquote cite="https://nvd.nist.gov/vuln/detail/CVE-2017-8373">
+ <p>CVE-2017-8373: The mad_layer_III function in layer3.c in Underbit MAD
+ libmad 0.15.1b allows remote attackers to cause a denial of service
+ (heap-based buffer overflow and application crash) or possibly have
+ unspecified other impact via a crafted audio file.</p>
+ </blockquote>
+ <blockquote cite="https://nvd.nist.gov/vuln/detail/CVE-2017-8374">
+ <p>CVE-2017-8374: The mad_bit_skip function in bit.c in Underbit MAD
+ libmad 0.15.1b allows remote attackers to cause a denial of service
+ (heap-based buffer over-read and application crash) via a crafted audio
+ file.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=508133#15</url>
+ <url>https://nvd.nist.gov/vuln/detail/CVE-2017-8372</url>
+ <url>https://nvd.nist.gov/vuln/detail/CVE-2017-8373</url>
+ <url>https://nvd.nist.gov/vuln/detail/CVE-2017-8374</url>
+ <url>https://blogs.gentoo.org/ago/2017/04/30/libmad-assertion-failure-in-layer3-c/</url>
+ <url>https://blogs.gentoo.org/ago/2017/04/30/libmad-heap-based-buffer-overflow-in-mad_layer_iii-layer3-c/</url>
+ <url>https://blogs.gentoo.org/ago/2017/04/30/libmad-heap-based-buffer-overflow-in-mad_bit_skip-bit-c/</url>
+ <cvename>CVE-2017-8372</cvename>
+ <cvename>CVE-2017-8373</cvename>
+ <cvename>CVE-2017-8374</cvename>
+ </references>
+ <dates>
+ <discovery>2017-04-30</discovery>
+ <entry>2019-11-13</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="88d00176-058e-11ea-bd1c-3065ec8fd3ec">
+ <topic>chromium -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>chromium</name>
+ <range><lt>78.0.3904.97</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Google Chrome Releases reports:</p>
+ <blockquote cite="https://chromereleases.googleblog.com/2019/11/stable-channel-update-for-desktop.html">
+ <p>Four security issues were fixed, including:</p>
+ <ul>
+ <li>[1021723] Various fixes from internal audits, fuzzing and other
+ initiatives</li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://chromereleases.googleblog.com/2019/11/stable-channel-update-for-desktop.html</url>
+ </references>
+ <dates>
+ <discovery>2019-11-06</discovery>
+ <entry>2019-11-12</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="459df1ba-051c-11ea-9673-4c72b94353b5">
+ <topic>wordpress -- multiple issues</topic>
+ <affects>
+ <package>
+ <name>wordpress</name>
+ <name>fr-wordpress</name>
+ <range><lt>5.2.4,1</lt></range>
+ </package>
+ <package>
+ <name>de-wordpress</name>
+ <name>zh_CN-wordpress</name>
+ <name>zh_TW-wordpress</name>
+ <name>ja-wordpress</name>
+ <name>ru-wordpress</name>
+ <range><lt>5.2.4</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>wordpress developers reports:</p>
+ <blockquote cite="https://wordpress.org/news/2019/10/wordpress-5-2-4-security-release/">
+ <p>Props to Evan Ricafort for finding an issue where stored XSS (cross-site scripting)
+ could be added via the Customizer.</p>
+ <p>rops to J.D. Grimes who found and disclosed a method of viewing unauthenticated posts.</p>
+ <p>Props to Weston Ruter for finding a way to create a stored XSS to inject Javascript
+ into style tags.</p>
+ <p>rops to David Newman for highlighting a method to poison the cache of JSON GET requests
+ via the Vary: Origin header.</p>
+ <p>Props to Eugene Kolodenker who found a server-side request forgery in the way that URLs
+ are validated.</p>
+ <p>Props to Ben Bidner of the WordPress Security Team who discovered issues related to
+ referrer validation in the admin.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://wordpress.org/news/2019/10/wordpress-5-2-4-security-release/</url>
+ </references>
+ <dates>
+ <discovery>2019-10-14</discovery>
+ <entry>2019-11-12</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="b2f9573a-008c-11ea-9801-10c37b4ac2ea">
+ <topic>nexus2-oss -- Multiple vulerabilities</topic>
+ <affects>
+ <package>
+ <name>nexus2-oss</name>
+ <range><lt>2.14.15</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Sonatype reports:</p>
+ <blockquote cite="https://help.sonatype.com/repomanager2/release-notes/2019-release-notes#id-2019ReleaseNotes-RepositoryManager2.14.15">
+ <p>Several RCE vulnerabilities have been found and corrected in 2.14.15:</p>
+ <p>CVE-2019-16530: An attacker with elevated privileges can upload a
+ specially crafted file. That file can contain commands that will
+ be executed on the system, with the same privileges as the user
+ running the server.</p>
+ <p>CVE-2019-15893: A Remote Code Execution vulnerability has been
+ discovered in Nexus Repository Manager requiring immediate
+ action. The vulnerability allows for an attacker with
+ administrative access to NXRM to create repostories that can
+ grant access to read/execute system data outside the scope of
+ NXRM.</p>
+ <p>CVE-2019-5475: A vulnerability has been found that can allow
+ user's with administrative privileges to run processes on the
+ target server, that the nxrm os user has access to.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-16530</cvename>
+ <cvename>CVE-2019-15893</cvename>
+ <cvename>CVE-2019-5475</cvename>
+ </references>
+ <dates>
+ <discovery>2019-09-19</discovery>
+ <entry>2019-11-07</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="6a7c2ab0-00dd-11ea-83ce-705a0f828759">
+ <topic>php -- env_path_info underflow in fpm_main.c can lead to RCE</topic>
+ <affects>
+ <package>
+ <name>php71</name>
+ <range><lt>7.1.33</lt></range>
+ </package>
+ <package>
+ <name>php72</name>
+ <range><lt>7.2.24</lt></range>
+ </package>
+ <package>
+ <name>php73</name>
+ <range><lt>7.3.11</lt></range>
+ </package>
+ <package>
+ <name>php74</name>
+ <range><lt>7.4.0.rc5</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The PHP project reports:</p>
+ <blockquote cite="https://www.php.net/archive/2019.php#2019-10-24-2">
+ <p>The PHP development team announces the immediate availability of PHP 7.3.11. This is a security release which also contains several bug fixes.</p>
+ </blockquote>
+ <blockquote cite="https://www.php.net/archive/2019.php#2019-10-24-1">
+ <p>The PHP development team announces the immediate availability of PHP 7.2.24. This is a security release which also contains several bug fixes.</p>
+ </blockquote>
+ <blockquote cite="https://www.php.net/archive/2019.php#2019-10-24-3">
+ <p>The PHP development team announces the immediate availability of PHP 7.1.33. This is a security release which also contains several bug fixes.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-11043</cvename>
+ <url>https://www.php.net/archive/2019.php#2019-10-24-1</url>
+ <url>https://www.php.net/archive/2019.php#2019-10-24-2</url>
+ <url>https://www.php.net/archive/2019.php#2019-10-24-3</url>
+ </references>
+ <dates>
+ <discovery>2019-10-24</discovery>
+ <entry>2019-11-06</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="c32285fe-fde4-11e9-9525-000c29c4dc65">
+ <topic>mediawiki -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>mediawiki131</name>
+ <range><lt>1.31.5</lt></range>
+ </package>
+ <package>
+ <name>mediawiki132</name>
+ <range><lt>1.32.5</lt></range>
+ </package>
+ <package>
+ <name>mediawiki133</name>
+ <range><lt>1.33.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Mediawiki reports:</p>
+ <blockquote cite="https://lists.wikimedia.org/pipermail/mediawiki-announce/2019-October/000236.html">
+ <p>Security fixes:
+ T230402, CVE-2019-16738 SECURITY: Add permission check for suppressed account
+ to Special:Redirect.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-16738</cvename>
+ <url>https://lists.wikimedia.org/pipermail/mediawiki-announce/2019-October/000236.html</url>
+ </references>
+ <dates>
+ <discovery>2019-08-13</discovery>
+ <entry>2019-11-03</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="fc91f2ef-fd7b-11e9-a1c7-b499baebfeaf">
+ <topic>MySQL -- Multiple vulerabilities</topic>
+ <affects>
+ <package>
+ <name>mariadb55-server</name>
+ <range><lt>5.5.66</lt></range>
+ </package>
+ <package>
+ <name>mariadb101-server</name>
+ <range><lt>10.1.42</lt></range>
+ </package>
+ <package>
+ <name>mariadb102-server</name>
+ <range><lt>10.2.28</lt></range>
+ </package>
+ <package>
+ <name>mariadb103-server</name>
+ <range><lt>10.3.19</lt></range>
+ </package>
+ <package>
+ <name>mariadb104-server</name>
+ <range><lt>10.4.9</lt></range>
+ </package>
+ <package>
+ <name>mysql56-server</name>
+ <range><lt>5.6.46</lt></range>
+ </package>
+ <package>
+ <name>mysql57-server</name>
+ <range><lt>5.7.28</lt></range>
+ </package>
+ <package>
+ <name>mysql80-server</name>
+ <range><lt>8.0.18</lt></range>
+ </package>
+ <package>
+ <name>percona55-server</name>
+ <range><lt>5.5.66</lt></range>
+ </package>
+ <package>
+ <name>percona56-server</name>
+ <range><lt>5.6.46</lt></range>
+ </package>
+ <package>
+ <name>percona57-server</name>
+ <range><lt>5.7.28</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Oracle reports:</p>
+ <blockquote cite="https://www.oracle.com/security-alerts/cpuoct2019.html">
+ <p>This Critical Patch Update contains 31 new security fixes for
+ Oracle MySQL. 6 of these vulnerabilities may be remotely exploitable
+ without authentication, i.e., may be exploited over a network without
+ requiring user credentials.
+ </p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.oracle.com/security-alerts/cpuoct2019.html</url>
+ <cvename>CVE-2019-5443</cvename>
+ <cvename>CVE-2019-1543</cvename>
+ <cvename>CVE-2019-3011</cvename>
+ <cvename>CVE-2019-2966</cvename>
+ <cvename>CVE-2019-2967</cvename>
+ <cvename>CVE-2019-2974</cvename>
+ <cvename>CVE-2019-2946</cvename>
+ <cvename>CVE-2019-3004</cvename>
+ <cvename>CVE-2019-2914</cvename>
+ <cvename>CVE-2019-2969</cvename>
+ <cvename>CVE-2019-2991</cvename>
+ <cvename>CVE-2019-2920</cvename>
+ <cvename>CVE-2019-2993</cvename>
+ <cvename>CVE-2019-2922</cvename>
+ <cvename>CVE-2019-2923</cvename>
+ <cvename>CVE-2019-2924</cvename>
+ <cvename>CVE-2019-2963</cvename>
+ <cvename>CVE-2019-2968</cvename>
+ <cvename>CVE-2019-3003</cvename>
+ <cvename>CVE-2019-2997</cvename>
+ <cvename>CVE-2019-2948</cvename>
+ <cvename>CVE-2019-2950</cvename>
+ <cvename>CVE-2019-2982</cvename>
+ <cvename>CVE-2019-2998</cvename>
+ <cvename>CVE-2019-2960</cvename>
+ <cvename>CVE-2019-2957</cvename>
+ <cvename>CVE-2019-2938</cvename>
+ <cvename>CVE-2019-3018</cvename>
+ <cvename>CVE-2019-3009</cvename>
+ <cvename>CVE-2019-2910</cvename>
+ <cvename>CVE-2019-2911</cvename>
+ </references>
+ <dates>
+ <discovery>2019-10-15</discovery>
+ <entry>2019-11-02</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="381deebb-f5c9-11e9-9c4f-74d435e60b7c">
+ <topic>file -- Heap buffer overflow possible</topic>
+ <affects>
+ <package>
+ <name>file</name>
+ <range><lt>5.37</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>mitre reports</p>
+ <blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-18218">
+ <p>cdf_read_property_info in cdf.c in file through 5.37 does not
+ restrict the number of CDF_VECTOR elements, which allows a heap-based
+ buffer overflow (4-byte out-of-bounds write).</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16780</url>
+ <url>https://github.com/file/file/commit/46a8443f76cec4b41ec736eca396984c74664f84</url>
+ </references>
+ <dates>
+ <discovery>2019-08-26</discovery>
+ <entry>2019-11-02</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="92243b6a-5775-4aea-8727-a938058df5ba">
+ <topic>webkit2-gtk3 -- Multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>webkit2-gtk3</name>
+ <range><lt>2.26.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The WebKitGTK project reports multiple vulnerabilities.</p>
+ </body>
+ </description>
+ <references>
+ <url>https://webkitgtk.org/security/WSA-2019-0005.html</url>
+ <cvename>CVE-2019-8625</cvename>
+ <cvename>CVE-2019-8674</cvename>
+ <cvename>CVE-2019-8707</cvename>
+ <cvename>CVE-2019-8719</cvename>
+ <cvename>CVE-2019-8720</cvename>
+ <cvename>CVE-2019-8726</cvename>
+ <cvename>CVE-2019-8733</cvename>
+ <cvename>CVE-2019-8735</cvename>
+ <cvename>CVE-2019-8763</cvename>
+ <cvename>CVE-2019-8768</cvename>
+ <cvename>CVE-2019-8769</cvename>
+ <cvename>CVE-2019-8771</cvename>
+ </references>
+ <dates>
+ <discovery>2019-10-29</discovery>
+ <entry>2019-10-31</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="fd10aa77-fb5e-11e9-af7b-0800274e5f20">
+ <topic>gitea -- information disclosure</topic>
+ <affects>
+ <package>
+ <name>gitea</name>
+ <range><lt>1.9.5</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Gitea Team reports:</p>
+ <blockquote cite="https://github.com/go-gitea/gitea/issues/8303">
+ <p>When a comment in an issue or PR mentions a user using
+ @username, the mentioned user receives a mail notification even if
+ they don't have permission to see the originating repository.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://github.com/go-gitea/gitea/releases/tag/v1.9.5</url>
+ <url>https://blog.gitea.io/2019/10/gitea-1.9.5-is-released/</url>
+ </references>
+ <dates>
+ <discovery>2019-09-27</discovery>
+ <entry>2019-10-30</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="50a1bbc9-fb80-11e9-9e70-005056a311d1">
+ <topic>samba -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>samba48</name>
+ <range><le>4.8.12</le></range>
+ </package>
+ <package>
+ <name>samba410</name>
+ <range><lt>4.10.10</lt></range>
+ </package>
+ <package>
+ <name>samba411</name>
+ <range><lt>4.11.2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The samba project reports:</p>
+ <blockquote cite="https://www.samba.org/samba/security/CVE-2019-10218.html">
+ <p>Malicious servers can cause Samba client code to return filenames containing
+ path separators to calling code.</p>
+ </blockquote>
+ <blockquote cite="https://www.samba.org/samba/security/CVE-2019-14833.html">
+ <p>When the password contains multi-byte (non-ASCII) characters, the check
+ password script does not receive the full password string.</p>
+ </blockquote>
+ <blockquote cite="https://www.samba.org/samba/security/CVE-2019-14847.html">
+ <p>Users with the "get changes" extended access right can crash the AD DC LDAP
+ server by requesting an attribute using the range= syntax.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.samba.org/samba/security/CVE-2019-10218.html</url>
+ <cvename>CVE-2019-10218</cvename>
+ <url>https://www.samba.org/samba/security/CVE-2019-14833.html</url>
+ <cvename>CVE-2019-14833</cvename>
+ <url>https://www.samba.org/samba/security/CVE-2019-14847.html</url>
+ <cvename>CVE-2019-14847</cvename>
+ </references>
+ <dates>
+ <discovery>2019-09-29</discovery>
+ <entry>2019-10-29</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="6eddfa51-fb44-11e9-86e9-001b217b3468">
+ <topic>Gitlab -- Disclosure Vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>gitlab-ce</name>
+ <range><ge>12.4.0</ge><lt>12.4.1</lt></range>
+ <range><ge>12.3.0</ge><lt>12.3.6</lt></range>
+ <range><ge>0</ge><lt>12.2.9</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Gitlab reports:</p>
+ <blockquote cite="https://about.gitlab.com/blog/2019/10/30/security-release-gitlab-12-dot-4-dot-1-released/">
+ <p>Source branch of a MR could be removed by an unauthorised user</p>
+ <p>Private group members could be listed</p>
+ <p>Disclosure of System Notes via Elasticsearch integration</p>
+ <p>Disclosure of Private Comments via Elasticsearch integration</p>
+ <p>Confirm existence of private repositories</p>
+ <p>Private group membership could be disclosed</p>
+ <p>Disclosure of Project Labels</p>
+ <p>Disclosure of Private Project Path and Labels</p>
+ <p>Uncontrolled Resource Consumption due to Nested GraphQL Queries</p>
+ <p>Improper access control on comments</p>
+ <p>Sentry Token Access Control</p>
+ <p>Authorisation check for Project Transfer option</p>
+ <p>XSS in Wiki Pages Using RDoc</p>
+ <p>Untrusted Input could be used for Internal Redirect</p>
+ <p>Access control for protected environments</p>
+ <p>Private Sub Group path Disclosure</p>
+ <p>Disclosure of Group Packages List</p>
+ <p>Private Repository Name Disclosure</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://about.gitlab.com/blog/2019/10/30/security-release-gitlab-12-dot-4-dot-1-released/</url>
+ <cvename>CVE-2019-18446</cvename>
+ <cvename>CVE-2019-18447</cvename>
+ <cvename>CVE-2019-18460</cvename>
+ <cvename>CVE-2019-18456</cvename>
+ <cvename>CVE-2019-18448</cvename>
+ <cvename>CVE-2019-18449</cvename>
+ <cvename>CVE-2019-18450</cvename>
+ <cvename>CVE-2019-18452</cvename>
+ <cvename>CVE-2019-18455</cvename>
+ <cvename>CVE-2019-18453</cvename>
+ <cvename>CVE-2019-18457</cvename>
+ <cvename>CVE-2019-18458</cvename>
+ <cvename>CVE-2019-18454</cvename>
+ <cvename>CVE-2019-18451</cvename>
+ <cvename>CVE-2019-18459</cvename>
+ <cvename>CVE-2019-18461</cvename>
+ <cvename>CVE-2019-18463</cvename>
+ <cvename>CVE-2019-18462</cvename>
+ </references>
+ <dates>
+ <discovery>2019-10-30</discovery>
+ <entry>2019-10-30</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="53b3474c-f680-11e9-a87f-a4badb2f4699">
+ <topic>FreeBSD -- Reference count overflow in mqueue filesystem 32-bit compat</topic>
+ <affects>
+ <package>
+ <name>FreeBSD-kernel</name>
+ <range><ge>12.0</ge><lt>12.0_10</lt></range>
+ <range><ge>11.3</ge><lt>11.3_3</lt></range>
+ <range><ge>11.2</ge><lt>11.2_14</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <h1>Problem Description:</h1>
+ <p>System calls operating on file descriptors obtain a
+ reference to relevant struct file which due to a programming
+ error was not always put back, which in turn could be used
+ to overflow the counter of affected struct file.</p>
+ <h1>Impact:</h1>
+ <p>A local user can use this flaw to obtain access to files,
+ directories, sockets, etc., opened by processes owned by
+ other users. If obtained struct file represents a directory
+ from outside of user's jail, it can be used to access files
+ outside of the jail. If the user in question is a jailed
+ root they can obtain root privileges on the host system.</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-5603</cvename>
+ <freebsdsa>SA-19:24.mqueuefs</freebsdsa>
+ </references>
+ <dates>
+ <discovery>2019-08-20</discovery>
+ <entry>2019-10-24</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="5027b62e-f680-11e9-a87f-a4badb2f4699">
+ <topic>FreeBSD -- kernel memory disclosure from /dev/midistat</topic>
+ <affects>
+ <package>
+ <name>FreeBSD-kernel</name>
+ <range><ge>12.0</ge><lt>12.0_10</lt></range>
+ <range><ge>11.3</ge><lt>11.3_3</lt></range>
+ <range><ge>11.2</ge><lt>11.2_14</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <h1>Problem Description:</h1>
+ <p>The kernel driver for /dev/midistat implements a handler
+ for read(2). This handler is not thread-safe, and a
+ multi-threaded program can exploit races in the handler to
+ cause it to copy out kernel memory outside the boundaries
+ of midistat's data buffer.</p>
+ <h1>Impact:</h1>
+ <p>The races allow a program to read kernel memory within
+ a 4GB window centered at midistat's data buffer. The buffer
+ is allocated each time the device is opened, so an attacker
+ is not limited to a static 4GB region of memory.</p>
+ <p>On 32-bit platforms, an attempt to trigger the race may
+ cause a page fault in kernel mode, leading to a panic.</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-5612</cvename>
+ <freebsdsa>SA-19:23.midi</freebsdsa>
+ </references>
+ <dates>
+ <discovery>2019-08-20</discovery>
+ <entry>2019-10-24</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="4d3d4f64-f680-11e9-a87f-a4badb2f4699">
+ <topic>FreeBSD -- IPv6 remote Denial-of-Service</topic>
+ <affects>
+ <package>
+ <name>FreeBSD-kernel</name>
+ <range><ge>12.0</ge><lt>12.0_10</lt></range>
+ <range><ge>11.3</ge><lt>11.3_3</lt></range>
+ <range><ge>11.2</ge><lt>11.2_14</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <h1>Problem Description:</h1>
+ <p>Due do a missing check in the code of m_pulldown(9) data
+ returned may not be contiguous as requested by the caller.</p>
+ <h1>Impact:</h1>
+ <p>Extra checks in the IPv6 code catch the error condition
+ and trigger a kernel panic leading to a remote DoS
+ (denial-of-service) attack with certain Ethernet interfaces.
+ At this point it is unknown if any other than the IPv6 code
+ paths can trigger a similar condition.</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-5611</cvename>
+ <freebsdsa>SA-19:22.mbuf</freebsdsa>
+ </references>
+ <dates>
+ <discovery>2019-08-20</discovery>
+ <entry>2019-10-24</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="499b22a3-f680-11e9-a87f-a4badb2f4699">
+ <topic>FreeBSD -- Insufficient validation of guest-supplied data (e1000 device)</topic>
+ <affects>
+ <package>
+ <name>FreeBSD-kernel</name>
+ <range><ge>12.0</ge><lt>12.0_9</lt></range>
+ <range><ge>11.3</ge><lt>11.3_2</lt></range>
+ <range><ge>11.2</ge><lt>11.2_13</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <h1>Problem Description:</h1>
+ <p>The e1000 network adapters permit a variety of modifications
+ to an Ethernet packet when it is being transmitted. These
+ include the insertion of IP and TCP checksums, insertion
+ of an Ethernet VLAN header, and TCP segmentation offload
+ ("TSO"). The e1000 device model uses an on-stack buffer to
+ generate the modified packet header when simulating these
+ modifications on transmitted packets.</p>
+ <p>When TCP segmentation offload is requested for a transmitted
+ packet, the e1000 device model used a guest-provided value
+ to determine the size of the on-stack buffer without
+ validation. The subsequent header generation could overflow
+ an incorrectly sized buffer or indirect a pointer composed
+ of stack garbage.</p>
+ <h1>Impact:</h1>
+ <p>A misbehaving bhyve guest could overwrite memory in the
+ bhyve process on the host.</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-5609</cvename>
+ <freebsdsa>SA-19:21.bhyve</freebsdsa>
+ </references>
+ <dates>
+ <discovery>2019-08-06</discovery>
+ <entry>2019-10-24</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="45a95fdd-f680-11e9-a87f-a4badb2f4699">
+ <topic>FreeBSD -- Insufficient message length validation in bsnmp library</topic>
+ <affects>
+ <package>
+ <name>FreeBSD</name>
+ <range><ge>12.0</ge><lt>12.0_9</lt></range>
+ <range><ge>11.3</ge><lt>11.3_2</lt></range>
+ <range><ge>11.2</ge><lt>11.2_13</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <h1>Problem Description:</h1>
+ <p>A function extracting the length from type-length-value
+ encoding is not properly validating the submitted length.</p>
+ <h1>Impact:</h1>
+ <p>A remote user could cause, for example, an out-of-bounds
+ read, decoding of unrelated data, or trigger a crash of the
+ software such as bsnmpd resulting in a denial of service.</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-5610</cvename>
+ <freebsdsa>SA-19:20.bsnmp</freebsdsa>
+ </references>
+ <dates>
+ <discovery>2019-08-06</discovery>
+ <entry>2019-10-24</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="41d2f3e6-f680-11e9-a87f-a4badb2f4699">
+ <topic>FreeBSD -- ICMPv6 / MLDv2 out-of-bounds memory access</topic>
+ <affects>
+ <package>
+ <name>FreeBSD-kernel</name>
+ <range><ge>12.0</ge><lt>12.0_9</lt></range>
+ <range><ge>11.3</ge><lt>11.3_2</lt></range>
+ <range><ge>11.2</ge><lt>11.2_13</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <h1>Problem Description:</h1>
+ <p>The ICMPv6 input path incorrectly handles cases where
+ an MLDv2 listener query packet is internally fragmented
+ across multiple mbufs.</p>
+ <h1>Impact:</h1>
+ <p>A remote attacker may be able to cause an out-of-bounds
+ read or write that may cause the kernel to attempt to access
+ an unmapped page and subsequently panic.</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-5608</cvename>
+ <freebsdsa>SA-19:19.mldv2</freebsdsa>
+ </references>
+ <dates>
+ <discovery>2019-08-06</discovery>
+ <entry>2019-10-24</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="3c7edc7a-f680-11e9-a87f-a4badb2f4699">
+ <topic>FreeBSD -- Multiple vulnerabilities in bzip2</topic>
+ <affects>
+ <package>
+ <name>FreeBSD</name>
+ <range><ge>12.0</ge><lt>12.0_9</lt></range>
+ <range><ge>11.3</ge><lt>11.3_2</lt></range>
+ <range><ge>11.2</ge><lt>11.2_13</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <h1>Problem Description:</h1>
+ <p>The decompressor used in bzip2 contains a bug which can
+ lead to an out-of-bounds write when processing a specially
+ crafted bzip2(1) file.</p>
+ <p>bzip2recover contains a heap use-after-free bug which
+ can be triggered when processing a specially crafted bzip2(1)
+ file.</p>
+ <h1>Impact:</h1>
+ <p>An attacker who can cause maliciously crafted input to
+ be processed may trigger either of these bugs. The bzip2recover
+ bug may cause a crash, permitting a denial-of-service. The
+ bzip2 decompressor bug could potentially be exploited to
+ execute arbitrary code.</p>
+ <p>Note that some utilities, including the tar(1) archiver
+ and the bspatch(1) binary patching utility (used in portsnap(8)
+ and freebsd-update(8)) decompress bzip2(1)-compressed data
+ internally; system administrators should assume that their
+ systems will at some point decompress bzip2(1)-compressed
+ data even if they never explicitly invoke the bunzip2(1)
+ utility.</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2016-3189</cvename>
+ <cvename>CVE-2019-1290</cvename>
+ <freebsdsa>SA-19:18.bzip2</freebsdsa>
+ </references>
+ <dates>
+ <discovery>2019-08-06</discovery>
+ <entry>2019-10-24</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="2d4076eb-f679-11e9-a87f-a4badb2f4699">
+ <topic>varnish -- Information Disclosure Vulnerability</topic>
+ <affects>
+ <package>
+ <name>varnish6</name>
+ <range><lt>6.3.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Varnish Software reports:</p>
+ <blockquote cite="https://varnish-cache.org/security/VSV00004.html#vsv00004">
+ <p>A bug has been discovered in Varnish Cache where we fail to
+ clear a pointer between the handling of one client requests and the next
+ on the same connection. This can under specific circumstances lead to
+ information being leaked from the connection workspace.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://varnish-cache.org/security/VSV00004.html#vsv00004</url>
+ </references>
+ <dates>
+ <discovery>2019-10-21</discovery>
+ <entry>2019-10-24</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="3a1474ba-f646-11e9-b0af-b888e347c638">
+ <topic>sudo -- Potential bypass of Runas user restrictions</topic>
+ <affects>
+ <package>
+ <name>sudo</name>
+ <range><lt>1.8.28</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Todd C. Miller reports:</p>
+ <blockquote cite="https://www.sudo.ws/alerts/minus_1_uid.html">
+ <p>When sudo is configured to allow a user to run commands as an
+ arbitrary user via the ALL keyword in a Runas specification, it
+ is possible to run commands as root by specifying the user ID -1
+ or 4294967295.</p>
+ <p>This can be used by a user with sufficient sudo privileges to
+ run commands as root even if the Runas specification explicitly
+ disallows root access as long as the ALL keyword is listed first
+ in the Runas specification.</p>
+ <p>Log entries for commands run this way will list the target user
+ as 4294967295 instead of root. In addition, PAM session modules
+ will not be run for the command.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.sudo.ws/alerts/minus_1_uid.html</url>
+ <cvename>CVE-2019-14287</cvename>
+ </references>
+ <dates>
+ <discovery>2019-10-15</discovery>
+ <entry>2019-10-24</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="a90d040e-f5b0-11e9-acc4-4576b265fda6">
+ <topic>Loofah -- XSS vulnerability</topic>
+ <affects>
+ <package>
+ <name>rubygem-loofah</name>
+ <range><lt>2.3.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>GitHub issue:</p>
+ <blockquote cite="https://github.com/flavorjones/loofah/issues/171">
+ <p>This issue has been created for public disclosure of an XSS
+ vulnerability that was responsibly reported by
+ https://hackerone.com/vxhex</p>
+ <p>In the Loofah gem, through v2.3.0, unsanitized JavaScript may occur in
+ sanitized output when a crafted SVG element is republished.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://github.com/flavorjones/loofah/releases</url>
+ <url>https://github.com/flavorjones/loofah/issues/171</url>
+ <cvename>CVE-2019-15587</cvename>
+ </references>
+ <dates>
+ <discovery>2019-10-22</discovery>
+ <entry>2019-10-23</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="9b7491fb-f253-11e9-a50c-000c29c4dc65">
+ <topic>python 3.7 -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>python37</name>
+ <range><lt>3.7.5</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Python changelog:</p>
+ <blockquote cite="https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-5-final">
+ <p>bpo-38243: Escape the server title of xmlrpc.server.DocXMLRPCServer when rendering
+ the document page as HTML.</p>
+ <p>bpo-38174: Update vendorized expat library version to 2.2.8, which resolves
+ CVE-2019-15903.</p>
+ <p>bpo-37764: Fixes email._header_value_parser.get_unstructured going into an infinite
+ loop for a specific case in which the email header does not have trailing whitespace,
+ and the case in which it contains an invalid encoded word.</p>
+ <p>bpo-37461: Fix an infinite loop when parsing specially crafted email headers.</p>
+ <p>bpo-34155: Fix parsing of invalid email addresses with more than one @
+ (e.g. a@b@c.com.) to not return the part before 2nd @ as valid email address.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-5-final</url>
+ <cvename>CVE-2019-15903</cvename>
+ </references>
+ <dates>
+ <discovery>2019-09-14</discovery>
+ <entry>2019-10-19</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="998ca824-ef55-11e9-b81f-3085a9a95629">
+ <topic>Pillow -- Allocation of resources without limits or throttling</topic>
+ <affects>
+ <package>
+ <name>py27-pillow</name>
+ <name>py35-pillow</name>
+ <name>py36-pillow</name>
+ <name>py37-pillow</name>
+ <range><lt>6.2.0</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Mitre reports:</p>
+ <blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16865">
+ <p>An issue was discovered in Pillow before 6.2.0. When reading specially
+ crafted invalid image files, the library can either allocate very large
+ amounts of memory or take an extremely long period of time to process
+ the image.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://github.com/python-pillow/Pillow/issues/4123</url>
+ <cvename>CVE-2019-16865</cvename>
+ <freebsdpr>ports/241268</freebsdpr>
+ </references>
+ <dates>
+ <discovery>2019-09-24</discovery>
+ <entry>2019-10-15</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="fd2e0ca8-e3ae-11e9-8af7-08002720423d">
+ <topic>mongodb -- Bump Windows package dependencies</topic>
+ <affects>
+ <package>
+ <name>mongodb34</name>
+ <range><lt>3.4.22</lt></range>
+ </package>
+ <package>
+ <name>mongodb36</name>
+ <range><lt>3.6.14</lt></range>
+ </package>
+ <package>
+ <name>mongodb40</name>
+ <range><lt>4.0.11</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Rich Mirch reports:</p>
+ <blockquote cite="https://jira.mongodb.org/browse/SERVER-42233">
+ <p>An unprivileged user or program on Microsoft Windows which can create OpenSSL configuration files in a fixed location may cause utility programs shipped with MongoDB server versions less than 4.0.11, 3.6.14, and 3.4.22 to run attacker defined code as the user running the utility.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-2390</cvename>
+ <url>https://jira.mongodb.org/browse/SERVER-42233</url>
+ </references>
+ <dates>
+ <discovery>2019-08-06</discovery>
+ <entry>2019-09-30</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="273c6c43-e3ad-11e9-8af7-08002720423d">
+ <topic>mongodb -- Our init scripts check /proc/[pid]/stat should validate that `(${procname})` is the process' command name.</topic>
+ <affects>
+ <package>
+ <name>mongodb34</name>
+ <range><lt>3.4.22</lt></range>
+ </package>
+ <package>
+ <name>mongodb36</name>
+ <range><lt>3.6.14</lt></range>
+ </package>
+ <package>
+ <name>mongodb40</name>
+ <range><lt>4.0.11</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Sicheng Liu of Beijing DBSEC Technology Co., Ltd reports:</p>
+ <blockquote cite="https://jira.mongodb.org/browse/SERVER-40563">
+ <p>Incorrect scoping of kill operations in MongoDB Server's packaged SysV init scripts allow users with write access to the PID file to insert arbitrary PIDs to be killed when the root user stops the MongoDB process via SysV init.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-2389</cvename>
+ <url>https://jira.mongodb.org/browse/SERVER-40563</url>
+ </references>
+ <dates>
+ <discovery>2019-08-06</discovery>
+ <entry>2019-09-30</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="880bca8f-e201-11e9-8af7-08002720423d">
+ <topic>mongodb -- Attach IDs to users</topic>
+ <affects>
+ <package>
+ <name>mongodb34</name>
+ <range><lt>3.4.22</lt></range>
+ </package>
+ <package>
+ <name>mongodb36</name>
+ <range><lt>3.6.13</lt></range>
+ </package>
+ <package>
+ <name>mongodb40</name>
+ <range><lt>4.0.9</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Mitch Wasson of Cisco's Advanced Malware Protection Group reports:</p>
+ <blockquote cite="https://jira.mongodb.org/browse/SERVER-38984">
+ <p>After user deletion in MongoDB Server the improper invalidation of authorization sessions allows an authenticated user's session to persist and become conflated with new accounts, if those accounts reuse the names of deleted ones.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-2386</cvename>
+ <url>https://jira.mongodb.org/browse/SERVER-38984</url>
+ </references>
+ <dates>
+ <discovery>2019-08-06</discovery>
+ <entry>2019-09-28</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="c360d057-ea8b-11e9-859b-b885849ded8e">
+ <topic>mod_perl2 -- execute arbitrary Perl code</topic>
+ <affects>
+ <package>
+ <name>ap24-mod_perl2</name>
+ <range><lt>2.0.11,3</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>mod_perl2 2.0.11 fixes Arbitrary Perl code execution in the context
+ of the user account via a user-owned .htaccess.</p>
+ <blockquote cite="https://nvd.nist.gov/vuln/detail/CVE-2011-2767">
+ <p>mod_perl 2.0 through 2.0.10 allows attackers to execute arbitrary
+ Perl code by placing it in a user-owned .htaccess file, because
+ (contrary to the documentation) there is no configuration option
+ that permits Perl code for the administrator's control of HTTP
+ request processing without also permitting unprivileged users
+ to run Perl code in the context of the user account that runs
+ Apache HTTP Server processes.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-2767</url>
+ <url>https://www.securityfocus.com/bid/105195</url>
+ <url>https://access.redhat.com/errata/RHSA-2018:2826</url>
+ <url>https://bugs.debian.org/644169</url>
+ <url>https://usn.ubuntu.com/3825-2/</url>
+ </references>
+ <dates>
+ <discovery>2011-07-19</discovery>
+ <entry>2019-10-09</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="791e8f79-e7d1-11e9-8b31-206a8a720317">
+ <topic>Xpdf -- Multiple Vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>xpdf</name>
+ <range><lt>4.02,1</lt></range>
+ </package>
+ <package>
+ <name>xpdf4</name>
+ <range><lt>4.02,1</lt></range>
+ </package>
+ <package>
+ <name>xpdf3</name>
+ <range><lt>3.04_11</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Xpdf 4.02 fixes two vulnerabilities. Both fixes have been
+ backported to 3.04.</p>
+ <blockquote cite="https://nvd.nist.gov/vuln/detail/CVE-2019-9877">
+ <p>An invalid memory access vulnerability in TextPage::findGaps()
+ in Xpdf 4.01 through a crafted PDF document can cause a
+ segfault.</p>
+ </blockquote>
+ <blockquote cite="https://nvd.nist.gov/vuln/detail/CVE-2019-16927">
+ <p>An out of bounds write exists in TextPage::findGaps() of
+ Xpdf 4.01.01 </p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://nvd.nist.gov/vuln/detail/CVE-2019-9877</url>
+ <url>https://nvd.nist.gov/vuln/detail/CVE-2019-16927</url>
+ <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9877</url>
+ <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1692</url>
+ </references>
+ <dates>
+ <discovery>2019-10-01</discovery>
+ <entry>2019-10-06</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="108a4be3-e612-11e9-9963-5f1753e0aca0">
+ <topic>unbound -- parsing vulnerability</topic>
+ <affects>
+ <package>
+ <name>unbound</name>
+ <range><ge>1.7.1</ge><lt>1.9.4</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Unbound Security Advisories:</p>
+ <blockquote cite="https://www.nlnetlabs.nl/projects/unbound/security-advisories/#vulnerability-in-parsing-notify-queries">
+ <p>Due to an error in parsing NOTIFY queries, it is possible for Unbound
+ to continue processing malformed queries and may ultimately result in a
+ pointer dereference in uninitialized memory. This results in a crash of
+ the Unbound daemon.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.nlnetlabs.nl/projects/unbound/security-advisories/#vulnerability-in-parsing-notify-queries</url>
+ <cvename>CVE-2019-16866</cvename>
+ </references>
+ <dates>
+ <discovery>2019-10-03</discovery>
+ <entry>2019-10-03</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="f7fcb75c-e537-11e9-863e-b9b7af01ba9e">
+ <topic>ruby -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>ruby</name>
+ <range><ge>2.4.0,1</ge><lt>2.4.9,1</lt></range>
+ <range><ge>2.5.0,1</ge><lt>2.5.7,1</lt></range>
+ <range><ge>2.6.0,1</ge><lt>2.6.5,1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Ruby news:</p>
+ <blockquote cite="https://www.ruby-lang.org/en/news/2019/10/01/ruby-2-6-5-released/">
+ <p>This release includes security fixes. Please check the topics below for
+ details.</p>
+ <p>CVE-2019-15845: A NUL injection vulnerability of File.fnmatch and
+ File.fnmatch?</p>
+ <p>A NUL injection vulnerability of Ruby built-in methods (File.fnmatch
+ and File.fnmatch?) was found. An attacker who has the control of the
+ path pattern parameter could exploit this vulnerability to make path
+ matching pass despite the intention of the program author.</p>
+ <p>CVE-2019-16201: Regular Expression Denial of Service vulnerability of
+ WEBrick's Digest access authentication</p>
+ <p>Regular expression denial of service vulnerability of WEBrick's Digest
+ authentication module was found. An attacker can exploit this
+ vulnerability to cause an effective denial of service against a WEBrick
+ service.</p>
+ <p>CVE-2019-16254: HTTP response splitting in WEBrick (Additional fix)</p>
+ <p>There is an HTTP response splitting vulnerability in WEBrick bundled
+ with Ruby.</p>
+ <p>CVE-2019-16255: A code injection vulnerability of Shell#[] and
+ Shell#test</p>
+ <p>A code injection vulnerability of Shell#[] and Shell#test in a standard
+ library (lib/shell.rb) was found.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.ruby-lang.org/en/news/2019/10/01/ruby-2-6-5-released/</url>
+ <url>https://www.ruby-lang.org/en/news/2019/10/01/ruby-2-5-7-released/</url>
+ <url>https://www.ruby-lang.org/en/news/2019/10/01/ruby-2-4-8-released/</url>
+ <url>https://www.ruby-lang.org/en/news/2019/10/02/ruby-2-4-9-released/</url>
+ <url>https://www.ruby-lang.org/en/news/2019/10/01/nul-injection-file-fnmatch-cve-2019-15845/</url>
+ <url>https://www.ruby-lang.org/en/news/2019/10/01/webrick-regexp-digestauth-dos-cve-2019-16201/</url>
+ <url>https://www.ruby-lang.org/en/news/2019/10/01/http-response-splitting-in-webrick-cve-2019-16254/</url>
+ <url>https://www.ruby-lang.org/en/news/2019/10/01/code-injection-shell-test-cve-2019-16255/</url>
+ <cvename>CVE-2019-15845</cvename>
+ <cvename>CVE-2019-16201</cvename>
+ <cvename>CVE-2019-16254</cvename>
+ <cvename>CVE-2019-16255</cvename>
+ </references>
+ <dates>
+ <discovery>2019-10-01</discovery>
+ <entry>2019-10-02</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="0762fa72-e530-11e9-86e9-001b217b3468">
+ <topic>Gitlab -- Disclosure Vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>gitlab-ce</name>
+ <range><ge>12.3.0</ge><lt>12.3.3</lt></range>
+ <range><ge>12.2.0</ge><lt>12.2.7</lt></range>
+ <range><ge>8.17.0</ge><lt>12.1.13</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Gitlab reports:</p>
+ <blockquote cite="https://about.gitlab.com/2019/10/02/security-release-gitlab-12-dot-3-dot-3-released/">
+ <p>Disclosure of Private Code, Merge Requests and Commits via Elasticsearch integration</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://about.gitlab.com/2019/10/02/security-release-gitlab-12-dot-3-dot-3-released/</url>
+ </references>
+ <dates>
+ <discovery>2019-10-02</discovery>
+ <entry>2019-10-02</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="b17c86b9-e52e-11e9-86e9-001b217b3468">
+ <topic>Gitlab -- Multiple Vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>gitlab-ce</name>
+ <range><ge>12.3.0</ge><lt>12.3.2</lt></range>
+ <range><ge>12.2.0</ge><lt>12.2.6</lt></range>
+ <range><ge>7.12.0</ge><lt>12.1.12</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>SO-AND-SO reports:</p>
+ <blockquote cite="https://about.gitlab.com/2019/09/30/security-release-gitlab-12-dot-3-dot-2-released/">
+ <p>XSS in Markdown Preview Using Mermaid</p>
+ <p>Bypass Email Verification using Salesforce Authentication</p>
+ <p>Account Takeover using SAML</p>
+ <p>Uncontrolled Resource Consumption in Markdown using Mermaid</p>
+ <p>Disclosure of Private Project Path and Labels</p>
+ <p>Disclosure of Assignees via Milestones</p>
+ <p>Disclosure of Project Path via Unsubscribe Link</p>
+ <p>Disclosure of Project Milestones via Groups</p>
+ <p>Disclosure of Private System Notes via GraphQL</p>
+ <p>GIT Command Injection via API</p>
+ <p>Bypass User Blocking via CI/CD token</p>
+ <p>IDOR Adding Groups to Protected Environments</p>
+ <p>Disclosure of Group Membership via Merge Request Approval Rules</p>
+ <p>Disclosure of Head Pipeline via Blocking Merge Request Feature</p>
+ <p>Grafana update</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://about.gitlab.com/2019/09/30/security-release-gitlab-12-dot-3-dot-2-released/</url>
+ <cvename>CVE-2019-19039</cvename>
+ </references>
+ <dates>
+ <discovery>2019-09-30</discovery>
+ <entry>2019-10-02</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="ed18aa92-e4f4-11e9-b6fa-3085a9a95629">
+ <topic>cacti -- Authenticated users may bypass authorization checks</topic>
+ <affects>
+ <package>
+ <name>cacti</name>
+ <range><lt>1.2.7</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The cacti developers reports:</p>
+ <blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-16723">
+ <p>In Cacti through 1.2.6, authenticated users may bypass authorization checks
+ (for viewing a graph) via a direct graph_json.php request with a modified
+ local_graph_id parameter.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-16723</cvename>
+ <url>https://github.com/Cacti/cacti/releases/tag/release%2F1.2.7</url>
+ </references>
+ <dates>
+ <discovery>2019-09-23</discovery>
+ <entry>2019-10-02</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="e917caba-e291-11e9-89f1-152fed202bb7">
+ <topic>Exim -- heap-based buffer overflow in string_vformat leading to RCE</topic>
+ <affects>
+ <package>
+ <name>exim</name>
+ <range><ge>4.92</ge><lt>4.92.3</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Exim developers team report:</p>
+ <blockquote cite="https://lists.exim.org/lurker/message/20190927.032457.c1044d4c.en.html">
+ <p>There is a heap overflow in string_vformat().Using a EHLO message, remote code
+execution seems to be possible.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.openwall.com/lists/oss-security/2019/09/28/1</url>
+ </references>
+ <dates>
+ <discovery>2019-09-28</discovery>
+ <entry>2019-09-29</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="a92dcc5c-e05c-11e9-b589-10c37b4ac2ea">
+ <topic>go -- invalid headers are normalized, allowing request smuggling</topic>
+ <affects>
+ <package>
+ <name>go</name>
+ <range><lt>1.13.1,1</lt></range>
+ </package>
+ <package>
+ <name>go-devel</name>
+ <range><lt>g20190925</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Go project reports:</p>
+ <blockquote cite="https://github.com/golang/go/issues/34540">
+ <p>net/http (through net/textproto) used to accept and normalize invalid
+ HTTP/1.1 headers with a space before the colon, in violation of RFC 7230.
+ If a Go server is used behind a reverse proxy that accepts and forwards
+ but doesn't normalize such invalid headers, the reverse proxy and the
+ server can interpret the headers differently. This can lead to filter
+ bypasses or request smuggling, the latter if requests from separate clients
+ are multiplexed onto the same connection by the proxy. Such invalid headers
+ are now rejected by Go servers, and passed without normalization to Go
+ client applications.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-16276</cvename>
+ <url>https://github.com/golang/go/issues/34540</url>
+ </references>
+ <dates>
+ <discovery>2019-09-25</discovery>
+ <entry>2019-09-26</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="81fcc2f9-e15a-11e9-abbf-800dd28b22bd">
+ <topic>mantis -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>mantis-php71</name>
+ <name>mantis-php72</name>
+ <name>mantis-php73</name>
+ <name>mantis-php74</name>
+ <range><lt>2.22.1,1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Mantis developers report:</p>
+ <blockquote cite="https://mantisbt.org/bugs/changelog_page.php?project=mantisbt&amp;version=2.22.1">
+ <p>CVE-2019-15715: [Admin Required - Post Authentication] Command Execution / Injection Vulnerability</p>
+ <p>CVE-2019-8331: In Bootstrap before 3.4.1, XSS is possible in the tooltip or popover data-template attribute</p>
+ <p>Missing integrity hashes for CSS resources from CDNs</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://mantisbt.org/bugs/changelog_page.php?project=mantisbt&amp;version=2.22.1</url>
+ <cvename>CVE-2019-15715</cvename>
+ <cvename>CVE-2019-8331</cvename>
+ </references>
+ <dates>
+ <discovery>2019-08-28</discovery>
+ <entry>2019-09-27</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="9720bb39-f82a-402f-9fe4-e2c875bdda83">
+ <topic>jenkins -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>jenkins</name>
+ <range><le>2.196</le></range>
+ </package>
+ <package>
+ <name>jenkins-lts</name>
+ <range><le>2.176.3</le></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Jenkins Security Advisory:</p>
+ <blockquote cite="https://jenkins.io/security/advisory/2019-09-25/">
+ <h1>Description</h1>
+ <h5>(Medium) SECURITY-1498 / CVE-2019-10401</h5>
+ <p>Stored XSS vulnerability in expandable textbox form control</p>
+ <h5>(Medium) SECURITY-1525 / CVE-2019-10402</h5>
+ <p>XSS vulnerability in combobox form control</p>
+ <h5>(Medium) SECURITY-1537 (1) / CVE-2019-10403</h5>
+ <p>Stored XSS vulnerability in SCM tag action tooltip</p>
+ <h5>(Medium) SECURITY-1537 (2) / CVE-2019-10404</h5>
+ <p>Stored XSS vulnerability in queue item tooltip</p>
+ <h5>(Medium) SECURITY-1505 / CVE-2019-10405</h5>
+ <p>Diagnostic web page exposed Cookie HTTP header</p>
+ <h5>(Medium) SECURITY-1471 / CVE-2019-10406</h5>
+ <p>XSS vulnerability in Jenkins URL setting</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-10401</cvename>
+ <cvename>CVE-2019-10402</cvename>
+ <cvename>CVE-2019-10403</cvename>
+ <cvename>CVE-2019-10404</cvename>
+ <cvename>CVE-2019-10405</cvename>
+ <cvename>CVE-2019-10406</cvename>
+ <url>https://jenkins.io/security/advisory/2019-09-25/</url>
+ </references>
+ <dates>
+ <discovery>2019-09-25</discovery>
+ <entry>2019-09-25</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="20b92374-d62a-11e9-af73-001b217e4ee5">
+ <topic>ISC KEA -- Multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>kea</name>
+ <range><lt>1.6.0</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Internet Systems Consortium, Inc. reports:</p>
+ <blockquote cite="https://gitlab.isc.org/isc-projects/kea/issues">
+ <p>A packet containing a malformed DUID can cause the kea-dhcp6 server to terminate (CVE-2019-6472) [Medium]</p>
+ <p>An invalid hostname option can cause the kea-dhcp4 server to terminate (CVE-2019-6473) [Medium]</p>
+ <p>An oversight when validating incoming client requests can lead to a situation where the Kea server<br/>
+ will exit when trying to restart (CVE-2019-6474) [Medium]</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://gitlab.isc.org/isc-projects/kea/issues</url>
+ <cvename>CVE-2019-6472</cvename>
+ <cvename>CVE-2019-6473</cvename>
+ <cvename>CVE-2019-6474</cvename>
+ </references>
+ <dates>
+ <discovery>2019-08-28</discovery>
+ <entry>2019-09-20</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="6856d798-d950-11e9-aae4-f079596b62f9">
+ <topic>expat2 -- Fix extraction of namespace prefixes from XML names</topic>
+ <affects>
+ <package>
+ <name>expat</name>
+ <range><lt>2.2.8</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>expat project reports:</p>
+ <blockquote cite="https://github.com/libexpat/libexpat/blob/R_2_2_8/expat/Changes">
+ <p>
+ Fix heap overflow triggered by
+ XML_GetCurrentLineNumber (or XML_GetCurrentColumnNumber),
+ and deny internal entities closing the doctype
+ </p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://github.com/libexpat/libexpat/blob/R_2_2_8/expat/Changes</url>
+ </references>
+ <dates>
+ <discovery>2019-09-13</discovery>
+ <entry>2019-09-17</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="b2789b2d-d521-11e9-86e9-001b217b3468">
+ <topic>Gitlab -- Multiple Vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>gitlab-ce</name>
+ <range><ge>12.2.0</ge><lt>12.2.5</lt></range>
+ <range><ge>12.1.0</ge><lt>12.1.9</lt></range>
+ <range><ge>11.6.0</ge><lt>12.0.9</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Gitlab reports:</p>
+ <blockquote cite="https://about.gitlab.com/2019/09/10/critical-security-release-gitlab-12-dot-2-dot-5-released/">
+ <p>Project Template Functionality Could Be Used to Access Restricted Project Data</p>
+ <p>Security Enhancements in GitLab Pages</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://about.gitlab.com/2019/09/10/critical-security-release-gitlab-12-dot-2-dot-5-released/</url>
+ <cvename>CVE-2019-16170</cvename>
+ </references>
+ <dates>
+ <discovery>2019-09-10</discovery>
+ <entry>2019-09-12</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="1c948fd3-dac0-11e9-81b2-0011d823eebd">
+ <topic>Mbed TLS -- Side channel attack on deterministic ECDSA</topic>
+ <affects>
+ <package>
+ <name>mbedtls</name>
+ <range><lt>2.16.3</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Janos Follath reports:</p>
+ <blockquote cite="https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2019-10">
+ <p>Mbed TLS does not have a constant-time/constant-trace arithmetic
+ library and uses blinding to protect against side channel
+ attacks.</p>
+ <p>In the ECDSA signature routine previous Mbed TLS versions used the
+ same RNG object for generating the ephemeral key pair and for
+ generating the blinding values. The deterministic ECDSA function
+ reused this by passing the RNG object created from the private key
+ and the message to be signed as prescribed by RFC 6979. This meant
+ that the same RNG object was used whenever the same message was
+ signed, rendering the blinding ineffective.</p>
+ <p>If the victim can be tricked to sign the same message repeatedly,
+ the private key may be recoverable through side channels.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2019-10</url>
+ </references>
+ <dates>
+ <discovery>2019-09-06</discovery>
+ <entry>2019-09-19</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="55571619-454e-4769-b1e5-28354659e152">
+ <topic>bro -- invalid memory access or heap buffer over-read</topic>
+ <affects>
+ <package>
+ <name>bro</name>
+ <range><lt>2.6.4</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Jon Siwek of Corelight reports:</p>
+ <blockquote cite="https://raw.githubusercontent.com/zeek/zeek/3b5a9f88ece1d274edee897837e280ef751bde94/NEWS">
+ <p>This is a security patch release to address a potential
+ Denial of Service vulnerability:</p>
+ <ul>
+ <li>
+ The NTLM analyzer did not properly handle AV Pair sequences
+ that were either empty or unterminated, resulting in
+ invalid memory access or heap buffer over-read. The NTLM
+ analyzer is enabled by default and used in the analysis
+ of SMB, DCE/RPC, and GSSAPI protocols.</li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://raw.githubusercontent.com/zeek/zeek/3b5a9f88ece1d274edee897837e280ef751bde94/NEWS</url>
+ </references>
+ <dates>
+ <discovery>2019-08-28</discovery>
+ <entry>2019-09-17</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="c5bd8a25-99a6-11e9-a598-f079596b62f9">
+ <topic>expat2 -- Fix extraction of namespace prefixes from XML names</topic>
+ <affects>
+ <package>
+ <name>expat</name>
+ <range><lt>2.2.7</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>expat project reports:</p>
+ <blockquote cite="https://github.com/libexpat/libexpat/blob/R_2_2_7/expat/Changes">
+ <p>
+ XML names with multiple colons could end up in the
+ wrong namespace, and take a high amount of RAM and CPU
+ resources while processing, opening the door to
+ use for denial-of-service attacks
+ </p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://github.com/libexpat/libexpat/blob/R_2_2_7/expat/Changes</url>
+ </references>
+ <dates>
+ <discovery>2019-06-19</discovery>
+ <entry>2019-09-16</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="9fb4e57b-d65a-11e9-8a5f-e5c82b486287">
+ <topic>curl -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>curl</name>
+ <range><ge>7.19.4</ge><lt>7.66.0</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>curl security problems:</p>
+ <blockquote cite="https://curl.haxx.se/docs/security.html">
+ <p>CVE-2019-5481: FTP-KRB double-free</p>
+ <p>libcurl can be told to use kerberos over FTP to a server, as set with
+ the CURLOPT_KRBLEVEL option.</p>
+ <p>During such kerberos FTP data transfer, the server sends data to curl
+ in blocks with the 32 bit size of each block first and then that amount
+ of data immediately following.</p>
+ <p>A malicious or just broken server can claim to send a very large block
+ and if by doing that it makes curl's subsequent call to realloc() to
+ fail, curl would then misbehave in the exit path and double-free the
+ memory.</p>
+ <p>In practical terms, an up to 4 GB memory area may very well be fine to
+ allocate on a modern 64 bit system but on 32 bit systems it will fail.</p>
+ <p>Kerberos FTP is a rarely used protocol with curl. Also, Kerberos
+ authentication is usually only attempted and used with servers that the
+ client has a previous association with.</p>
+ <p>CVE-2019-5482: TFTP small blocksize heap buffer overflow</p>
+ <p>libcurl contains a heap buffer overflow in the function
+ (tftp_receive_packet()) that receives data from a TFTP server. It can
+ call recvfrom() with the default size for the buffer rather than with
+ the size that was used to allocate it. Thus, the content that might
+ overwrite the heap memory is controlled by the server.</p>
+ <p>This flaw is only triggered if the TFTP server sends an OACK without
+ the BLKSIZE option, when a BLKSIZE smaller than 512 bytes was requested
+ by the TFTP client. OACK is a TFTP extension and is not used by all
+ TFTP servers.</p>
+ <p>Users choosing a smaller block size than default should be rare as the
+ primary use case for changing the size is to make it larger.</p>
+ <p>It is rare for users to use TFTP across the Internet. It is most
+ commonly used within local networks. TFTP as a protocol is always
+ inherently insecure.</p>
+ <p>This issue was introduced by the add of the TFTP BLKSIZE option
+ handling. It was previously incompletely fixed by an almost identical
+ issue called CVE-2019-5436.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://curl.haxx.se/docs/security.html</url>
+ <url>https://curl.haxx.se/docs/CVE-2019-5481.html</url>
+ <url>https://curl.haxx.se/docs/CVE-2019-5482.html</url>
+ <cvename>CVE-2019-5481</cvename>
+ <cvename>CVE-2019-5482</cvename>
+ </references>
+ <dates>
+ <discovery>2019-09-11</discovery>
+ <entry>2019-09-14</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="9e0c6f7a-d46d-11e9-a1c7-b499baebfeaf">
+ <topic>OpenSSL -- Multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>openssl</name>
+ <range><lt>1.0.2t,1</lt></range>
+ </package>
+ <package>
+ <name>openssl111</name>
+ <range><lt>1.1.1d</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The OpenSSL project reports:</p>
+ <blockquote cite="https://www.openssl.org/news/secadv/20190910.txt">
+ <p>ECDSA remote timing attack (CVE-2019-1547) [Low]</p>
+ <p>Fork Protection (CVE-2019-1549) [Low]<br/>
+ (OpenSSL 1.1.1 only)</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.openssl.org/news/secadv/20190910.txt</url>
+ <cvename>CVE-2019-1547</cvename>
+ <cvename>CVE-2019-1549</cvename>
+ </references>
+ <dates>
+ <discovery>2019-09-10</discovery>
+ <entry>2019-09-11</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="c6f19fe6-d42a-11e9-b4f9-6451062f0f7a">
+ <topic>Flash Player -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>linux-flashplayer</name>
+ <range><lt>32.0.0.255</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Adobe reports:</p>
+ <blockquote cite="https://helpx.adobe.com/security/products/flash-player/apsb19-46.html">
+ <ul>
+ <li>This update resolves a same origin method execution
+ vulnerability that could lead to arbitrary code execution
+ (CVE-2019-8069).</li>
+ <li>This update resolves a use-after-free vulnerability that
+ could lead to arbitrary code execution (CVE-2019-8070).</li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-8069</cvename>
+ <cvename>CVE-2019-8070</cvename>
+ <url>https://helpx.adobe.com/security/products/flash-player/apsb19-46.html</url>
+ </references>
+ <dates>
+ <discovery>2019-09-10</discovery>
+ <entry>2019-09-10</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="a8d87c7a-d1b1-11e9-a616-0992a4564e7c">
+ <topic>oniguruma -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>oniguruma</name>
+ <range><lt>6.9.3</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13224">
+ <p>
+ A use-after-free in onig_new_deluxe() in regext.c in Oniguruma 6.9.2 allows attackers to potentially cause information disclosure, denial of service, or possibly code execution by providing a crafted regular expression. The attacker provides a pair of a regex pattern and a string, with a multi-byte encoding that gets handled by onig_new_deluxe().
+ </p>
+ </blockquote>
+ <blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13225">
+ <p>A NULL Pointer Dereference in match_at() in regexec.c in Oniguruma 6.9.2 allows attackers to potentially cause denial of service by providing a crafted regular expression.</p>
+ <p>Oniguruma issues often affect Ruby, as well as common optional libraries for PHP and Rust.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-13224</cvename>
+ <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13224</url>
+ <url>https://github.com/kkos/oniguruma/commit/0f7f61ed1b7b697e283e37bd2d731d0bd57adb55</url>
+ <cvename>CVE-2019-13225</cvename>
+ <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13225</url>
+ <url>https://github.com/kkos/oniguruma/commit/c509265c5f6ae7264f7b8a8aae1cfa5fc59d108c</url>
+ </references>
+ <dates>
+ <discovery>2019-07-03</discovery>
+ <entry>2019-09-07</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="10e1d580-d174-11e9-a87f-a4badb2f4699">
+ <topic>xymon-server -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>xymon-server</name>
+ <range><lt>4.3.29</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Japheth Cleaver reports:</p>
+ <blockquote cite="https://lists.xymon.com/archive/2019-July/046570.html">
+ <p>Several buffer overflows were reported by University of
+ Cambridge Computer Security Incident Response Team.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://lists.xymon.com/archive/2019-July/046570.html</url>
+ <cvename>CVE-2019-13451</cvename>
+ <cvename>CVE-2019-13452</cvename>
+ <cvename>CVE-2019-13455</cvename>
+ <cvename>CVE-2019-13273</cvename>
+ <cvename>CVE-2019-13274</cvename>
+ <cvename>CVE-2019-13484</cvename>
+ <cvename>CVE-2019-13485</cvename>
+ <cvename>CVE-2019-13486</cvename>
+ </references>
+ <dates>
+ <discovery>2019-07-23</discovery>
+ <entry>2019-09-07</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="8a9f86de-d080-11e9-9051-4c72b94353b5">
+ <topic>wordpress -- multiple issues</topic>
+ <affects>
+ <package>
+ <name>wordpress</name>
+ <name>fr-wordpress</name>
+ <range><lt>5.2.3,1</lt></range>
+ </package>
+ <package>
+ <name>de-wordpress</name>
+ <name>zh_CN-wordpress</name>
+ <name>zh_TW-wordpress</name>
+ <name>ja-wordpress</name>
+ <name>ru-wordpress</name>
+ <range><lt>5.2.3</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>wordpress developers reports:</p>
+ <blockquote cite="https://wordpress.org/news/2019/09/wordpress-5-2-3-security-and-maintenance-release/">
+ <p>Props to Simon Scannell of RIPS Technologies for finding and disclosing two issues.
+ The first, a cross-site scripting (XSS) vulnerability found in post previews by contributors.
+ The second was a cross-site scripting vulnerability in stored comments.</p>
+ <p>Props to Tim Coen for disclosing an issue where validation and sanitization
+ of a URL could lead to an open redirect.</p>
+ <p>Props to Anshul Jain for disclosing reflected cross-site scripting during media uploads.</p>
+ <p>Props to Zhouyuan Yang of Fortinets FortiGuard Labs who disclosed a vulnerability
+ for cross-site scripting (XSS) in shortcode previews.</p>
+ <p>Props to Ian Dunn of the Core Security Team for finding and disclosing a case where
+ reflected cross-site scripting could be found in the dashboard.</p>
+ <p>Props to Soroush Dalilifrom NCC Group for disclosing an issue with URL
+ sanitization that can lead to cross-site scripting (XSS) attacks.</p>
+ <p>In addition to the above changes, we are also updating jQuery on older versions of WordPress.
+ This change was added in 5.2.1 and is now being brought to older versions.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://wordpress.org/news/2019/09/wordpress-5-2-3-security-and-maintenance-release/</url>
+ </references>
+ <dates>
+ <discovery>2019-09-05</discovery>
+ <entry>2019-09-06</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="61db9b88-d091-11e9-8d41-97657151f8c2">
+ <topic>Exim -- RCE with root privileges in TLS SNI handler</topic>
+ <affects>
+ <package>
+ <name>exim</name>
+ <range><lt>4.92.2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Exim developers report:</p>
+ <blockquote cite="https://git.exim.org/exim.git/blob/2600301ba6dbac5c9d640c87007a07ee6dcea1f4:/doc/doc-txt/cve-2019-15846/cve.txt">
+ <p>If your Exim server accepts TLS connections, it is vulnerable. This does
+ not depend on the TLS libray, so both, GnuTLS and OpenSSL are affected.</p>
+ <p>The vulnerability is exploitable by sending a SNI ending in a
+backslash-null sequence during the initial TLS handshake. The exploit
+exists as a POC. For more details see the document qualys.mbx</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://git.exim.org/exim.git/blob_plain/2600301ba6dbac5c9d640c87007a07ee6dcea1f4:/doc/doc-txt/cve-2019-15846/cve.txt</url>
+ </references>
+ <dates>
+ <discovery>2019-09-02</discovery>
+ <entry>2019-09-06</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="7d53d8da-d07a-11e9-8f1a-001999f8d30b">
+ <topic>asterisk -- Remote Crash Vulnerability in audio transcoding</topic>
+ <affects>
+ <package>
+ <name>asterisk13</name>
+ <range><lt>13.28.1</lt></range>
+ </package>
+ <package>
+ <name>asterisk16</name>
+ <range><lt>16.5.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Asterisk project reports:</p>
+ <blockquote cite="http://www.asterisk.org/downloads/security-advisories">
+ <p>When audio frames are given to the audio transcoding
+ support in Asterisk the number of samples are examined
+ and as part of this a message is output to indicate that
+ no samples are present. A change was done to suppress
+ this message for a particular scenario in which the message
+ was not relevant. This change assumed that information
+ about the origin of a frame will always exist when in
+ reality it may not.</p>
+ <p>This issue presented itself when an RTP packet containing
+ no audio (and thus no samples) was received. In a particular
+ transcoding scenario this audio frame would get turned
+ into a frame with no origin information. If this new frame
+ was then given to the audio transcoding support a crash
+ would occur as no samples and no origin information would
+ be present. The transcoding scenario requires the genericplc
+ option to be set to enabled (the default) and a transcoding
+ path from the source format into signed linear and then
+ from signed linear into another format.</p>
+ <p>Note that there may be other scenarios that have not
+ been found which can cause an audio frame with no origin
+ to be given to the audio transcoding support and thus
+ cause a crash.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://downloads.asterisk.org/pub/security/AST-2019-005.html</url>
+ <cvename>CVE-2019-15639</cvename>
+ </references>
+ <dates>
+ <discovery>2019-08-07</discovery>
+ <entry>2019-09-06</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="d94c08d2-d079-11e9-8f1a-001999f8d30b">
+ <topic>asterisk -- Crash when negotiating for T.38 with a declined stream</topic>
+ <affects>
+ <package>
+ <name>asterisk15</name>
+ <range><lt>15.7.4</lt></range>
+ </package>
+ <package>
+ <name>asterisk16</name>
+ <range><lt>16.5.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Asterisk project reports:</p>
+ <blockquote cite="http://www.asterisk.org/downloads/security-advisories">
+ <p>When Asterisk sends a re-invite initiating T.38 faxing,
+ and the endpoint responds with a declined media stream a
+ crash will then occur in Asterisk.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://downloads.asterisk.org/pub/security/AST-2019-004.html</url>
+ <cvename>CVE-2019-15297</cvename>
+ </references>
+ <dates>
+ <discovery>2019-08-05</discovery>
+ <entry>2019-09-06</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="145a3e17-cea2-11e9-81e2-005056a311d1">
+ <topic>samba -- combination of parameters and permissions can allow user to escape from the share path definition</topic>
+ <affects>
+ <package>
+ <name>samba410</name>
+ <range><lt>4.10.8</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The samba project reports:</p>
+ <blockquote cite="https://www.samba.org/samba/security/CVE-2019-10197.html">
+ <p>On a Samba SMB server for all versions of Samba from 4.9.0 clients are
+ able to escape outside the share root directory if certain
+ configuration parameters set in the smb.conf file.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-10197</cvename>
+ <url>https://www.samba.org/samba/security/CVE-2019-10197.html</url>
+ </references>
+ <dates>
+ <discovery>2019-09-01</discovery>
+ <entry>2019-09-03</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="05463e0a-abd3-4fa4-bd5f-cd5ed132d4c6">
+ <topic>mozilla -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>firefox</name>
+ <range><lt>69.0,1</lt></range>
+ </package>
+ <package>
+ <name>waterfox</name>
+ <range><lt>56.2.14</lt></range>
+ </package>
+ <package>
+ <name>seamonkey</name>
+ <name>linux-seamonkey</name>
+ <range><lt>2.53.0</lt></range>
+ </package>
+ <package>
+ <name>firefox-esr</name>
+ <range><ge>61.0,1</ge><lt>68.1.0,1</lt></range>
+ <range><lt>60.9.0,1</lt></range>
+ </package>
+ <package>
+ <name>linux-firefox</name>
+ <range><ge>61.0,2</ge><lt>68.1.0,2</lt></range>
+ <range><lt>60.9.0,2</lt></range>
+ </package>
+ <package>
+ <name>libxul</name>
+ <name>thunderbird</name>
+ <name>linux-thunderbird</name>
+ <range><ge>61.0</ge><lt>68.1.0</lt></range>
+ <range><lt>60.9.0</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Mozilla Foundation reports:</p>
+ <blockquote cite="https://www.mozilla.org/en-US/security/advisories/mfsa2019-25/">
+ <p>CVE-2019-11751: Malicious code execution through command line parameters</p>
+ <p>CVE-2019-11746: Use-after-free while manipulating video</p>
+ <p>CVE-2019-11744: XSS by breaking out of title and textarea elements using innerHTML</p>
+ <p>CVE-2019-11742: Same-origin policy violation with SVG filters and canvas to steal cross-origin images</p>
+ <p>CVE-2019-11736: File manipulation and privilege escalation in Mozilla Maintenance Service</p>
+ <p>CVE-2019-11753: Privilege escalation with Mozilla Maintenance Service in custom Firefox installation location</p>
+ <p>CVE-2019-11752: Use-after-free while extracting a key value in IndexedDB</p>
+ <p>CVE-2019-9812: Sandbox escape through Firefox Sync</p>
+ <p>CVE-2019-11741: Isolate addons.mozilla.org and accounts.firefox.com</p>
+ <p>CVE-2019-11743: Cross-origin access to unload event attributes</p>
+ <p>CVE-2019-11748: Persistence of WebRTC permissions in a third party context</p>
+ <p>CVE-2019-11749: Camera information available without prompting using getUserMedia</p>
+ <p>CVE-2019-5849: Out-of-bounds read in Skia</p>
+ <p>CVE-2019-11750: Type confusion in Spidermonkey</p>
+ <p>CVE-2019-11737: Content security policy directives ignore port and path if host is a wildcard</p>
+ <p>CVE-2019-11738: Content security policy bypass through hash-based sources in directives</p>
+ <p>CVE-2019-11747: 'Forget about this site' removes sites from pre-loaded HSTS list</p>
+ <p>CVE-2019-11734: Memory safety bugs fixed in Firefox 69</p>
+ <p>CVE-2019-11735: Memory safety bugs fixed in Firefox 69 and Firefox ESR 68.1</p>
+ <p>CVE-2019-11740: Memory safety bugs fixed in Firefox 69, Firefox ESR 68.1, and Firefox ESR 60.9</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-11734</cvename>
+ <cvename>CVE-2019-11735</cvename>
+ <cvename>CVE-2019-11736</cvename>
+ <cvename>CVE-2019-11737</cvename>
+ <cvename>CVE-2019-11738</cvename>
+ <cvename>CVE-2019-11740</cvename>
+ <cvename>CVE-2019-11741</cvename>
+ <cvename>CVE-2019-11742</cvename>
+ <cvename>CVE-2019-11743</cvename>
+ <cvename>CVE-2019-11744</cvename>
+ <cvename>CVE-2019-11746</cvename>
+ <cvename>CVE-2019-11747</cvename>
+ <cvename>CVE-2019-11748</cvename>
+ <cvename>CVE-2019-11749</cvename>
+ <cvename>CVE-2019-11750</cvename>
+ <cvename>CVE-2019-11751</cvename>
+ <cvename>CVE-2019-11752</cvename>
+ <cvename>CVE-2019-11753</cvename>
+ <cvename>CVE-2019-5849</cvename>
+ <cvename>CVE-2019-9812</cvename>
+ <url>https://www.mozilla.org/security/advisories/mfsa2019-25/</url>
+ <url>https://www.mozilla.org/security/advisories/mfsa2019-26/</url>
+ <url>https://www.mozilla.org/security/advisories/mfsa2019-27/</url>
+ </references>
+ <dates>
+ <discovery>2019-09-03</discovery>
+ <entry>2019-09-03</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="ce231189-ce56-11e9-9fa0-0050569f0b83">
+ <topic>www/varnish6 -- Denial of Service</topic>
+ <affects>
+ <package>
+ <name>varnish6</name>
+ <range><lt>6.2.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Varnish Team reports:</p>
+ <blockquote cite="https://varnish-cache.org/security/VSV00003.html">
+ <p>A failure in HTTP/1 parsing can allow a remote attacker to trigger
+ an assertion in varnish, restarting the daemon and clearing the cache.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://varnish-cache.org/security/VSV00003.html</url>
+ </references>
+ <dates>
+ <discovery>2019-09-02</discovery>
+ <entry>2019-09-03</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="c9c6c2f8-cd54-11e9-af89-080027ef1a23">
+ <topic>libgcrypt -- ECDSA timing attack</topic>
+ <affects>
+ <package>
+ <name>libgcrypt</name>
+ <range><lt>1.8.5</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>GnuPG reports:</p>
+ <blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627">
+ <p>Mitigate an ECDSA timing attack.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-13627</cvename>
+ <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-13627</url>
+ </references>
+ <dates>
+ <discovery>2019-08-29</discovery>
+ <entry>2019-09-02</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="e45c3669-caf2-11e9-851a-dcf3aaa3f3ff">
+ <topic>webkit2-gtk3 -- Multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>webkit2-gtk3</name>
+ <range><lt>2.24.4</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The WebKitGTK project reports many vulnerabilities,
+ including several arbitrary code execution vulnerabilities.</p>
+ </body>
+ </description>
+ <references>
+ <url>https://webkitgtk.org/security/WSA-2019-0004.html</url>
+ <cvename>CVE-2019-8644</cvename>
+ <cvename>CVE-2019-8649</cvename>
+ <cvename>CVE-2019-8658</cvename>
+ <cvename>CVE-2019-8666</cvename>
+ <cvename>CVE-2019-8669</cvename>
+ <cvename>CVE-2019-8671</cvename>
+ <cvename>CVE-2019-8672</cvename>
+ <cvename>CVE-2019-8673</cvename>
+ <cvename>CVE-2019-8676</cvename>
+ <cvename>CVE-2019-8677</cvename>
+ <cvename>CVE-2019-8678</cvename>
+ <cvename>CVE-2019-8679</cvename>
+ <cvename>CVE-2019-8680</cvename>
+ <cvename>CVE-2019-8681</cvename>
+ <cvename>CVE-2019-8683</cvename>
+ <cvename>CVE-2019-8684</cvename>
+ <cvename>CVE-2019-8686</cvename>
+ <cvename>CVE-2019-8687</cvename>
+ <cvename>CVE-2019-8688</cvename>
+ <cvename>CVE-2019-8689</cvename>
+ <cvename>CVE-2019-8690</cvename>
+ </references>
+ <dates>
+ <discovery>2019-08-29</discovery>
+ <entry>2019-08-30</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="b68cc195-cae7-11e9-86e9-001b217b3468">
+ <topic>Gitlab -- Multiple Vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>gitlab-ce</name>
+ <range><ge>12.2.0</ge><lt>12.2.3</lt></range>
+ <range><ge>12.1.0</ge><lt>12.1.8</lt></range>
+ <range><ge>0.0.0</ge><lt>12.0.8</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Gitlab reports:</p>
+ <blockquote cite="https://about.gitlab.com/2019/08/29/security-release-gitlab-12-dot-2-dot-3-released/">
+ <p>Kubernetes Integration Server-Side Request Forgery</p>
+ <p>Server-Side Request Forgery in Jira Integration</p>
+ <p>Improved Protection Against Credential Stuffing Attacks</p>
+ <p>Markdown Clientside Resource Exhaustion</p>
+ <p>Pipeline Status Disclosure</p>
+ <p>Group Runner Authorization Issue</p>
+ <p>CI Metrics Disclosure</p>
+ <p>User IP Disclosed by Embedded Image and Media</p>
+ <p>Label Description HTML Injection</p>
+ <p>IDOR in Epic Notes API</p>
+ <p>Push Rule Bypass</p>
+ <p>Project Visibility Restriction Bypass</p>
+ <p>Merge Request Discussion Restriction Bypass</p>
+ <p>Disclosure of Merge Request IDs</p>
+ <p>Weak Authentication In Certain Account Actions</p>
+ <p>Disclosure of Commit Title and Comments</p>
+ <p>Stored XSS via Markdown</p>
+ <p>EXIF Geolocation Data Exposure</p>
+ <p>Multiple SSRF Regressions on Gitaly</p>
+ <p>Default Branch Name Exposure</p>
+ <p>Potential Denial of Service via CI Pipelines</p>
+ <p>Privilege Escalation via Logrotate</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://about.gitlab.com/2019/08/29/security-release-gitlab-12-dot-2-dot-3-released/</url>
+ <cvename>CVE-2019-15728</cvename>
+ <cvename>CVE-2019-15730</cvename>
+ <cvename>CVE-2019-15722</cvename>
+ <cvename>CVE-2019-15729</cvename>
+ <cvename>CVE-2019-15721</cvename>
+ <cvename>CVE-2019-15727</cvename>
+ <cvename>CVE-2019-15726</cvename>
+ <cvename>CVE-2019-15724</cvename>
+ <cvename>CVE-2019-15725</cvename>
+ <cvename>CVE-2019-15723</cvename>
+ <cvename>CVE-2019-15732</cvename>
+ <cvename>CVE-2019-15731</cvename>
+ <cvename>CVE-2019-15738</cvename>
+ <cvename>CVE-2019-15737</cvename>
+ <cvename>CVE-2019-15734</cvename>
+ <cvename>CVE-2019-15739</cvename>
+ <cvename>CVE-2019-15740</cvename>
+ <cvename>CVE-2019-15733</cvename>
+ <cvename>CVE-2019-15736</cvename>
+ <cvename>CVE-2019-15741</cvename>
+ </references>
+ <dates>
+ <discovery>2019-08-29</discovery>
+ <entry>2019-08-30</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="ed8d5535-ca78-11e9-980b-999ff59c22ea">
+ <topic>RDoc -- multiple jQuery vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>ruby</name>
+ <range><ge>2.4.0,1</ge><lt>2.4.7,1</lt></range>
+ <range><ge>2.5.0,1</ge><lt>2.5.6,1</lt></range>
+ <range><ge>2.6.0,1</ge><lt>2.6.3,1</lt></range>
+ </package>
+ <package>
+ <name>rubygem-rdoc</name>
+ <range><lt>6.1.2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Ruby news:</p>
+ <blockquote cite="https://www.ruby-lang.org/en/news/2019/08/28/multiple-jquery-vulnerabilities-in-rdoc/">
+ <p>There are multiple vulnerabilities about Cross-Site Scripting (XSS) in
+ jQuery shipped with RDoc which bundled in Ruby. All Ruby users are
+ recommended to update Ruby to the latest release which includes the
+ fixed version of RDoc.</p>
+ <p>The following vulnerabilities have been reported.</p>
+ <p>CVE-2012-6708</p>
+ <p>CVE-2015-9251</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.ruby-lang.org/en/news/2019/08/28/multiple-jquery-vulnerabilities-in-rdoc/</url>
+ <cvename>CVE-2012-6708</cvename>
+ <cvename>CVE-2015-9251</cvename>
+ </references>
+ <dates>
+ <discovery>2019-08-28</discovery>
+ <entry>2019-08-29</entry>
+ <modified>2019-08-31</modified>
+ </dates>
+ </vuln>
+
+ <vuln vid="abaaecda-ea16-43e2-bad0-d34a9ac576b1">
+ <topic>Dovecot -- improper input validation</topic>
+ <affects>
+ <package>
+ <name>dovecot</name>
+ <range><lt>2.3.7.2</lt></range>
+ </package>
+ <package>
+ <name>dovecot-pigeonhole</name>
+ <range><lt>0.5.7.2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Aki Tuomi reports:</p>
+ <blockquote cite="https://dovecot.org/pipermail/dovecot/2019-August/116874.html">
+ <p>Vulnerability Details:
+
+IMAP and ManageSieve protocol parsers do not properly handle NUL byte
+when scanning data in quoted strings, leading to out of bounds heap
+memory writes.
+
+Risk:
+
+This vulnerability allows for out-of-bounds writes to objects stored on
+the heap up to 8096 bytes in pre-login phase, and 65536 bytes post-login
+phase, allowing sufficiently skilled attacker to perform complicated
+attacks that can lead to leaking private information or remote code
+execution. Abuse of this bug is very difficult to observe, as it does
+not necessarily cause a crash. Attempts to abuse this bug are not
+directly evident from logs.
+</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://dovecot.org/pipermail/dovecot/2019-August/116874.html</url>
+ <cvename>CVE-2019-11500</cvename>
+ </references>
+ <dates>
+ <discovery>2019-04-13</discovery>
+ <entry>2019-08-28</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="7a7891fc-6318-447a-ba45-31d525ec11a0">
+ <topic>jenkins -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>jenkins</name>
+ <range><le>2.191</le></range>
+ </package>
+ <package>
+ <name>jenkins-lts</name>
+ <range><le>2.176.2</le></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Jenkins Security Advisory:</p>
+ <blockquote cite="https://jenkins.io/security/advisory/2019-08-28/">
+ <h1>Description</h1>
+ <h5>(Medium) SECURITY-1453 / CVE-2019-10383</h5>
+ <p>Stored XSS vulnerability in update center</p>
+ <h5>(High) SECURITY-1491 / CVE-2019-10384</h5>
+ <p>CSRF protection tokens for anonymous users did not expire in some circumstances</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-10383</cvename>
+ <cvename>CVE-2019-10384</cvename>
+ <url>https://jenkins.io/security/advisory/2019-08-28/</url>
+ </references>
+ <dates>
+ <discovery>2019-08-28</discovery>
+ <entry>2019-08-28</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="0f31b4e9-c827-11e9-9626-589cfc01894a">
+ <topic>Mozilla -- Stored passwords in 'Saved Logins' can be copied without master password entry</topic>
+ <affects>
+ <package>
+ <name>cliqz</name>
+ <range><lt>1.28.2</lt></range>
+ </package>
+ <package>
+ <name>firefox</name>
+ <range><lt>68.0.2,1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Mozilla Foundation reports:</p>
+ <blockquote cite="https://www.mozilla.org/en-US/security/advisories/mfsa2019-19/">
+ <h1>CVE-2019-11733: Stored passwords in 'Saved Logins' can
+ be copied without master password entry</h1>
+ <p>When a master password is set, it is required to be
+ entered again before stored passwords can be accessed in the 'Saved
+ Logins' dialog. It was found that locally stored passwords can be
+ copied to the clipboard thorough the 'copy password' context menu item
+ without re-entering the master password if the master password had
+ been previously entered in the same session, allowing for potential
+ theft of stored passwords.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.mozilla.org/security/advisories/mfsa2019-24/</url>
+ <cvename>CVE-2019-11733</cvename>
+ </references>
+ <dates>
+ <discovery>2019-08-14</discovery>
+ <entry>2019-08-28</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="72a5579e-c765-11e9-8052-0028f8d09152">
+ <topic>h2o -- multiple HTTP/2 vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>h2o-devel</name>
+ <range><lt>2.3.0.b2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Jonathon Loomey of Netflix reports:</p>
+ <blockquote cite="https://www.kb.cert.org/vuls/id/605641/">
+ <p>HTTP/2 implementations do not robustly handle abnormal traffic and resource exhaustion</p>
+ <p>Recently, a series of DoS attack vulnerabilities have been reported on a broad range of HTTP/2 stacks. Among the vulnerabilities, H2O is exposed to the following:</p>
+ <ul>
+ <li>CVE-2019-9512 "Ping Flood": The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both, potentially leading to a denial of service.</li>
+ <li>CVE-2019-9514 "Reset Flood": The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both, potentially leading to a denial of service.</li>
+ <li>CVE-2019-9515 "Settings Flood": The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both, potentially leading to a denial of service.</li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://github.com/h2o/h2o/issues/2090</url>
+ <url>https://www.kb.cert.org/vuls/id/605641/</url>
+ <cvename>CVE-2019-9512</cvename>
+ <cvename>CVE-2019-9514</cvename>
+ <cvename>CVE-2019-9515</cvename>
+ </references>
+ <dates>
+ <discovery>2019-08-13</discovery>
+ <entry>2019-08-25</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="73b1e734-c74e-11e9-8052-0028f8d09152">
+ <topic>h2o -- multiple HTTP/2 vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>h2o</name>
+ <range><lt>2.2.6</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Jonathon Loomey of Netflix reports:</p>
+ <blockquote cite="https://www.kb.cert.org/vuls/id/605641/">
+ <p>HTTP/2 implementations do not robustly handle abnormal traffic and resource exhaustion</p>
+ <p>Recently, a series of DoS attack vulnerabilities have been reported on a broad range of HTTP/2 stacks. Among the vulnerabilities, H2O is exposed to the following:</p>
+ <ul>
+ <li>CVE-2019-9512 "Ping Flood": The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both, potentially leading to a denial of service.</li>
+ <li>CVE-2019-9514 "Reset Flood": The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both, potentially leading to a denial of service.</li>
+ <li>CVE-2019-9515 "Settings Flood": The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both, potentially leading to a denial of service.</li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://github.com/h2o/h2o/issues/2090</url>
+ <url>https://www.kb.cert.org/vuls/id/605641/</url>
+ <cvename>CVE-2019-9512</cvename>
+ <cvename>CVE-2019-9514</cvename>
+ <cvename>CVE-2019-9515</cvename>
+ </references>
+ <dates>
+ <discovery>2019-08-13</discovery>
+ <entry>2019-08-25</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="e7392840-c520-11e9-a4ef-0800274e5f20">
+ <topic>gitea -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>gitea</name>
+ <range><lt>1.9.2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Gitea Team reports:</p>
+ <blockquote cite="https://blog.gitea.io/2019/08/gitea-1.9.2-is-released/">
+ <p>This release contains two security fixes, so we highly recommend updating.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://github.com/go-gitea/gitea/releases/tag/v1.9.2</url>
+ <url>https://blog.gitea.io/2019/08/gitea-1.9.2-is-released/</url>
+ </references>
+ <dates>
+ <discovery>2019-08-22</discovery>
+ <entry>2019-08-22</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="dbd1f627-c43b-11e9-a923-9c5c8e75236a">
+ <topic>clamav -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>clamav</name>
+ <range><lt>0.101.4,1</lt></range>
+ </package>
+ <package>
+ <name>clamav-milter</name>
+ <range><lt>0.101.4,1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Micah Snyder reports:</p>
+ <blockquote cite="https://blog.clamav.net/2019/08/clamav-01014-security-patch-release-has.html">
+ <ul>
+ <li>An out of bounds write was possible within ClamAV&amp;s NSIS bzip2 library when attempting decompression in cases where the number of selectors exceeded the max limit set by the library (CVE-2019-12900). The issue has been resolved by respecting that limit.</li>
+ <li> The zip bomb vulnerability mitigated in 0.101.3 has been assigned the CVE identifier CVE-2019-12625. Unfortunately, a workaround for the zip-bomb mitigation was immediately identified. To remediate the zip-bomb scan time issue, a scan time limit has been introduced in 0.101.4. This limit now resolves ClamAV's vulnerability to CVE-2019-12625.</li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://blog.clamav.net/2019/08/clamav-01014-security-patch-release-has.html</url>
+ <cvename>CVE-2019-12625</cvename>
+ <cvename>CVE-2019-12900</cvename>
+ </references>
+ <dates>
+ <discovery>2019-08-21</discovery>
+ <entry>2019-08-21</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="c97a940b-c392-11e9-bb38-000d3ab229d6">
+ <topic>Node.js -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>node</name>
+ <range><lt>12.8.1</lt></range>
+ </package>
+ <package>
+ <name>node10</name>
+ <range><lt>10.16.3</lt></range>
+ </package>
+ <package>
+ <name>node8</name>
+ <range><lt>8.16.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Node.js reports:</p>
+ <blockquote cite="https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/">
+ <p>Node.js, as well as many other implementations of HTTP/2, have been found vulnerable to Denial of Service attacks. See https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md for more information.</p>
+ <p>Updates are now available for all active Node.js release lines, including Linux ARMv6 builds for Node.js 8.x (which had been delayed).</p>
+ <p>We recommend that all Node.js users upgrade to a version listed below as soon as possible.</p>
+ <h1>Vulnerabilities Fixed</h1>
+ <p>Impact: All versions of Node.js 8 (LTS "Carbon"), Node.js 10 (LTS "Dubnium"), and Node.js 12 (Current) are vulnerable to the following:</p>
+ <ul>
+ <li>CVE-2019-9511 "Data Dribble": The attacker requests a large amount of data from a specified resource over multiple streams. They manipulate window size and stream priority to force the server to queue the data in 1-byte chunks. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both, potentially leading to a denial of service.</li>
+ <li>CVE-2019-9512 "Ping Flood": The attacker sends continual pings to an HTTP/2 peer, causing the peer to build an internal queue of responses. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both, potentially leading to a denial of service.</li>
+ <li>CVE-2019-9513 "Resource Loop": The attacker creates multiple request streams and continually shuffles the priority of the streams in a way that causes substantial churn to the priority tree. This can consume excess CPU, potentially leading to a denial of service.</li>
+ <li>CVE-2019-9514 "Reset Flood": The attacker opens a number of streams and sends an invalid request over each stream that should solicit a stream of RST_STREAM frames from the peer. Depending on how the peer queues the RST_STREAM frames, this can consume excess memory, CPU, or both, potentially leading to a denial of service.</li>
+ <li>CVE-2019-9515 "Settings Flood": The attacker sends a stream of SETTINGS frames to the peer. Since the RFC requires that the peer reply with one acknowledgement per SETTINGS frame, an empty SETTINGS frame is almost equivalent in behavior to a ping. Depending on how efficiently this data is queued, this can consume excess CPU, memory, or both, potentially leading to a denial of service.</li>
+ <li>CVE-2019-9516 "0-Length Headers Leak": The attacker sends a stream of headers with a 0-length header name and 0-length header value, optionally Huffman encoded into 1-byte or greater headers. Some implementations allocate memory for these headers and keep the allocation alive until the session dies. This can consume excess memory, potentially leading to a denial of service.</li>
+ <li>CVE-2019-9517 "Internal Data Buffering": The attacker opens the HTTP/2 window so the peer can send without constraint; however, they leave the TCP window closed so the peer cannot actually write (many of) the bytes on the wire. The attacker then sends a stream of requests for a large response object. Depending on how the servers queue the responses, this can consume excess memory, CPU, or both, potentially leading to a denial of service.</li>
+ <li>CVE-2019-9518 "Empty Frames Flood": The attacker sends a stream of frames with an empty payload and without the end-of-stream flag. These frames can be DATA, HEADERS, CONTINUATION and/or PUSH_PROMISE. The peer spends time processing each frame disproportionate to attack bandwidth. This can consume excess CPU, potentially leading to a denial of service. (Discovered by Piotr Sikora of Google)</li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://nodejs.org/en/blog/vulnerability/aug-2019-security-releases/</url>
+ <cvename>CVE-2019-9511</cvename>
+ <cvename>CVE-2019-9512</cvename>
+ <cvename>CVE-2019-9513</cvename>
+ <cvename>CVE-2019-9514</cvename>
+ <cvename>CVE-2019-9515</cvename>
+ <cvename>CVE-2019-9516</cvename>
+ <cvename>CVE-2019-9517</cvename>
+ <cvename>CVE-2019-9518</cvename>
+ </references>
+ <dates>
+ <discovery>2019-08-16</discovery>
+ <entry>2019-08-21</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="795442e7-c355-11e9-8224-5404a68ad561">
+ <topic>vlc -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>vlc</name>
+ <range><lt>3.0.8,4</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The VLC project reports:</p>
+ <blockquote cite="https://www.videolan.org/developers/vlc-branch/NEWS">
+ <p>Security:
+ * Fix a buffer overflow in the MKV demuxer (CVE-2019-14970)
+ * Fix a read buffer overflow in the avcodec decoder (CVE-2019-13962)
+ * Fix a read buffer overflow in the FAAD decoder
+ * Fix a read buffer overflow in the OGG demuxer (CVE-2019-14437, CVE-2019-14438)
+ * Fix a read buffer overflow in the ASF demuxer (CVE-2019-14776)
+ * Fix a use after free in the MKV demuxer (CVE-2019-14777, CVE-2019-14778)
+ * Fix a use after free in the ASF demuxer (CVE-2019-14533)
+ * Fix a couple of integer underflows in the MP4 demuxer (CVE-2019-13602)
+ * Fix a null dereference in the dvdnav demuxer
+ * Fix a null dereference in the ASF demuxer (CVE-2019-14534)
+ * Fix a null dereference in the AVI demuxer
+ * Fix a division by zero in the CAF demuxer (CVE-2019-14498)
+ * Fix a division by zero in the ASF demuxer (CVE-2019-14535)</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.videolan.org/developers/vlc-branch/NEWS</url>
+ <cvename>CVE-2019-13602</cvename>
+ <cvename>CVE-2019-13962</cvename>
+ <cvename>CVE-2019-14437</cvename>
+ <cvename>CVE-2019-14438</cvename>
+ <cvename>CVE-2019-14498</cvename>
+ <cvename>CVE-2019-14533</cvename>
+ <cvename>CVE-2019-14534</cvename>
+ <cvename>CVE-2019-14535</cvename>
+ <cvename>CVE-2019-14776</cvename>
+ <cvename>CVE-2019-14777</cvename>
+ <cvename>CVE-2019-14778</cvename>
+ <cvename>CVE-2019-14970</cvename>
+ </references>
+ <dates>
+ <discovery>2019-07-14</discovery>
+ <entry>2019-08-20</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="56778a31-c2a1-11e9-9051-4c72b94353b5">
+ <topic>nsd -- Stack-based Buffer Overflow</topic>
+ <affects>
+ <package>
+ <name>nsd</name>
+ <range><lt>4.2.2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>SO-AND-SO reports:</p>
+ <blockquote cite="https://nvd.nist.gov/vuln/detail/CVE-2019-13207">
+ <p>nsd-checkzone in NLnet Labs NSD 4.2.0 has a Stack-based Buffer
+ Overflow in the dname_concatenate() function in dname.c.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://nvd.nist.gov/vuln/detail/CVE-2019-13207</url>
+ <url>https://github.com/NLnetLabs/nsd/issues/20</url>
+ <cvename>CVE-2019-13207</cvename>
+ </references>
+ <dates>
+ <discovery>2019-07-28</discovery>
+ <entry>2019-08-19</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="ece65d3b-c20c-11e9-8af4-bcaec55be5e5">
+ <topic>webmin -- unauthenticated remote code execution</topic>
+ <affects>
+ <package>
+ <name>webmin</name>
+ <range><lt>1.930</lt></range>
+ </package>
+ <package>
+ <name>usermin</name>
+ <range><lt>1.780</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Joe Cooper reports:</p>
+ <blockquote cite="https://virtualmin.com/node/66890">
+ <p>I've rolled out Webmin version 1.930 and Usermin version 1.780
+ for all repositories. This release includes several security
+ fixes, including one potentially serious one caused by malicious
+ code inserted into Webmin and Usermin at some point on our build
+ infrastructure. We're still investigating how and when, but the
+ exploitable code has never existed in our github repositories, so
+ we've rebuilt from git source on new infrastructure (and checked
+ to be sure the result does not contain the malicious code).</p>
+
+ <p>I don't have a changelog for these releases yet, but I wanted
+ to announce them immediately due to the severity of this issue.
+ To exploit the malicious code, your Webmin installation must have
+ Webmin -&gt; Webmin Configuration -&gt; Authentication -&gt; Password
+ expiry policy set to Prompt users with expired passwords to enter
+ a new one. This option is not set by default, but if it is set,
+ it allows remote code execution.</p>
+
+ <p>This release addresses CVE-2019-15107, which was disclosed
+ earlier today. It also addresses a handful of XSS issues that we
+ were notified about, and a bounty was awarded to the researcher
+ (a different one) who found them.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://virtualmin.com/node/66890</url>
+ <cvename>CVE-2019-15107</cvename>
+ </references>
+ <dates>
+ <discovery>2019-08-17</discovery>
+ <entry>2019-08-17</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="3b2ee737-c12d-11e9-aabc-0800274e5f20">
+ <topic>gitea -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>gitea</name>
+ <range><lt>1.9.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Gitea Team reports:</p>
+ <blockquote cite="https://blog.gitea.io/2019/08/gitea-1.9.1-is-released/">
+ <p>This release contains two security fixes, so we highly recommend updating.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://blog.gitea.io/2019/08/gitea-1.9.1-is-released/</url>
+ <url>https://github.com/go-gitea/gitea/releases/tag/v1.9.1</url>
+ </references>
+ <dates>
+ <discovery>2019-07-31</discovery>
+ <entry>2019-07-31</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="d905b219-c1ca-11e9-8c46-0c9d925bbbc0">
+ <topic>xdm -- remote denial of service</topic>
+ <affects>
+ <package>
+ <name>xdm</name>
+ <range><lt>1.1.12</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>nvd.nist.gov reports</p>
+ <blockquote cite="https://nvd.nist.gov/vuln/detail/CVE-2013-2179">
+ <p>X.Org xdm 1.1.10, 1.1.11, and possibly other versions,
+ when performing authentication using certain implementations of
+ the crypt API function that can return NULL, allows remote
+ attackers to cause a denial of service (NULL pointer dereference
+ and crash) by attempting to log into an account whose password
+ field contains invalid characters, as demonstrated using the crypt
+ function from glibc 2.17 and later with (1) the "!" character in
+ the salt portion of a password field or (2) a password that has
+ been encrypted using DES or MD5 in FIPS-140 mode.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://nvd.nist.gov/vuln/detail/CVE-2013-2179</url>
+ <cvename>CVE-2013-2179</cvename>
+ </references>
+ <dates>
+ <discovery>2013-06-07</discovery>
+ <entry>2019-08-18</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="d51b52cf-c199-11e9-b13f-001b217b3468">
+ <topic>Libgit2 -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>libgit2</name>
+ <range><lt>0.28.3</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Git community reports:</p>
+ <blockquote cite="https://github.com/libgit2/libgit2/releases/tag/v0.28.3">
+ <p>A carefully constructed commit object with a very large number
+of parents may lead to potential out-of-bounds writes or
+potential denial of service.</p>
+ <p>The ProgramData configuration file is always read for compatibility
+with Git for Windows and Portable Git installations. The ProgramData
+location is not necessarily writable only by administrators, so we
+now ensure that the configuration file is owned by the administrator
+or the current user.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://github.com/libgit2/libgit2/releases/tag/v0.28.3</url>
+ </references>
+ <dates>
+ <discovery>2019-08-13</discovery>
+ <entry>2019-08-18</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="caf545f2-c0d9-11e9-9051-4c72b94353b5">
+ <topic>Apache -- Multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>apache24</name>
+ <range><lt>2.4.41</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>SO-AND-SO reports:</p>
+ <blockquote cite="http://www.apache.org/dist/httpd/CHANGES_2.4">
+ <h1>SECURITY: CVE-2019-10081</h1>
+ <p>mod_http2: HTTP/2 very early pushes, for example configured with "H2PushResource",
+ could lead to an overwrite of memory in the pushing request's pool,
+ leading to crashes. The memory copied is that of the configured push
+ link header values, not data supplied by the client.</p>
+ <h1>SECURITY: CVE-2019-9517</h1>
+ <p>mod_http2: a malicious client could perform a DoS attack by flooding
+ a connection with requests and basically never reading responses
+ on the TCP connection. Depending on h2 worker dimensioning, it was
+ possible to block those with relatively few connections.</p>
+ <h1>SECURITY: CVE-2019-10098</h1>
+ <p>rewrite, core: Set PCRE_DOTALL flag by default to avoid unpredictable
+ matches and substitutions with encoded line break characters.</p>
+ <h1>SECURITY: CVE-2019-10092</h1>
+ <p>Remove HTML-escaped URLs from canned error responses to prevent misleading
+ text/links being displayed via crafted links.</p>
+ <h1>SECURITY: CVE-2019-10097</h1>
+ <p>mod_remoteip: Fix stack buffer overflow and NULL pointer deference
+ when reading the PROXY protocol header.</p>
+ <h1>CVE-2019-10082</h1>
+ <p>mod_http2: Using fuzzed network input, the http/2 session
+ handling could be made to read memory after being freed,
+ during connection shutdown.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://www.apache.org/dist/httpd/CHANGES_2.4</url>
+ <cvename>CVE-2019-10081</cvename>
+ <cvename>CVE-2019-9517</cvename>
+ <cvename>CVE-2019-10098</cvename>
+ <cvename>CVE-2019-10092</cvename>
+ <cvename>CVE-2019-10082</cvename>
+ </references>
+ <dates>
+ <discovery>2019-08-14</discovery>
+ <entry>2019-08-17</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="121fec01-c042-11e9-a73f-b36f5969f162">
+ <topic>nghttp2 -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>libnghttp2</name>
+ <name>nghttp2</name>
+ <range><lt>1.39.2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>nghttp2 GitHub releases:</p>
+ <blockquote cite="https://github.com/nghttp2/nghttp2/releases">
+ <p>This release fixes CVE-2019-9511 "Data Dribble" and CVE-2019-9513
+ "Resource Loop" vulnerability in nghttpx and nghttpd. Specially crafted
+ HTTP/2 frames cause Denial of Service by consuming CPU time. Check out
+ https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md
+ for details. For nghttpx, additionally limiting inbound traffic by
+ --read-rate and --read-burst options is quite effective against this
+ kind of attack.</p>
+ <p>CVE-2019-9511 "Data Dribble": The attacker requests a large amount of
+ data from a specified resource over multiple streams. They manipulate
+ window size and stream priority to force the server to queue the data in
+ 1-byte chunks. Depending on how efficiently this data is queued, this
+ can consume excess CPU, memory, or both, potentially leading to a
+ denial of service.</p>
+ <p>CVE-2019-9513 "Ping Flood": The attacker sends continual pings to an
+ HTTP/2 peer, causing the peer to build an internal queue of responses.
+ Depending on how efficiently this data is queued, this can consume
+ excess CPU, memory, or both, potentially leading to a denial of service.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://github.com/nghttp2/nghttp2/releases</url>
+ <url>https://github.com/Netflix/security-bulletins/blob/master/advisories/third-party/2019-002.md</url>
+ <cvename>CVE-2019-9511</cvename>
+ <cvename>CVE-2019-9513</cvename>
+ </references>
+ <dates>
+ <discovery>2019-08-13</discovery>
+ <entry>2019-08-16</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="60e991ac-c013-11e9-b662-001cc0382b2f">
+ <topic>CUPS -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>cups</name>
+ <range><lt>2.2.12</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Apple reports:</p>
+ <blockquote cite="https://github.com/apple/cups/releases/tag/v2.2.12">
+ <ul>
+ <li>CVE-2019-8696 and CVE-2019-8675: SNMP buffer overflows.</li>
+ <li>IPP buffer overflow.</li>
+ <li>Memory disclosure in the scheduler.</li>
+ <li>DoS issues in the scheduler.</li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://github.com/apple/cups/releases/tag/v2.2.12</url>
+ <cvename>CVE-2019-8675</cvename>
+ <cvename>CVE-2019-8696</cvename>
+ </references>
+ <dates>
+ <discovery>2019-08-15</discovery>
+ <entry>2019-08-16</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="41f4baac-bf77-11e9-8d2f-5404a68ad561">
+ <topic>traefik -- Denial of service in HTTP/2</topic>
+ <affects>
+ <package>
+ <name>traefik</name>
+ <range><lt>1.7.14</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The traefik project reports:</p>
+ <blockquote cite="https://github.com/containous/traefik/releases/tag/v1.7.14">
+ <p>Update of dependency to go go1.12.8 resolves potential HTTP/2
+ denial of service in traefik.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://github.com/containous/traefik/releases/tag/v1.7.14</url>
+ <cvename>CVE-2019-9512</cvename>
+ <cvename>CVE-2019-9514</cvename>
+ </references>
+ <dates>
+ <discovery>2019-08-13</discovery>
+ <entry>2019-08-15</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="87679fcb-be60-11e9-9051-4c72b94353b5">
+ <topic>NGINX -- Multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>nginx</name>
+ <range><lt>1.16.1,2</lt></range>
+ </package>
+ <package>
+ <name>nginx-devel</name>
+ <range><lt>1.17.3</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>NGINX Team reports:</p>
+ <blockquote cite="http://nginx.org/en/security_advisories.html">
+ <p>Several security issues were identified in nginx HTTP/2
+ implementation which might cause excessive memory consumption
+ and CPU usage (CVE-2019-9511, CVE-2019-9513, CVE-2019-9516).
+ The issues affect nginx compiled with the ngx_http_v2_module (not
+ compiled by default) if the http2 option of the listen directive
+ is used in a configuration file.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://nginx.org/en/security_advisories.html</url>
+ <cvename>CVE-2019-9511</cvename>
+ <cvename>CVE-2019-9513</cvename>
+ <cvename>CVE-2019-9516</cvename>
+ </references>
+ <dates>
+ <discovery>2019-08-13</discovery>
+ <entry>2019-08-14</entry>
+ <modified>2019-08-14</modified>
+ </dates>
+ </vuln>
+
+ <vuln vid="0569146e-bdef-11e9-bd31-8de4a4470bbb">
+ <topic>Nokogiri -- injection vulnerability</topic>
+ <affects>
+ <package>
+ <name>rubygem-nokogiri</name>
+ <range><lt>1.10.4</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Nokogiri GitHub release:</p>
+ <blockquote cite="https://github.com/sparklemotion/nokogiri/releases">
+ <p>A command injection vulnerability in Nokogiri v1.10.3 and earlier
+ allows commands to be executed in a subprocess by Ruby's Kernel.open
+ method. Processes are vulnerable only if the undocumented method
+ Nokogiri::CSS::Tokenizer#load_file is being passed untrusted user input.</p>
+ <p>This vulnerability appears in code generated by the Rexical gem
+ versions v1.0.6 and earlier. Rexical is used by Nokogiri to generate
+ lexical scanner code for parsing CSS queries. The underlying
+ vulnerability was addressed in Rexical v1.0.7 and Nokogiri upgraded to
+ this version of Rexical in Nokogiri v1.10.4.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://github.com/sparklemotion/nokogiri/releases</url>
+ <url>https://github.com/sparklemotion/nokogiri/issues/1915</url>
+ <cvename>CVE-2019-5477</cvename>
+ </references>
+ <dates>
+ <discovery>2019-08-11</discovery>
+ <entry>2019-08-13</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="ddd48087-bd86-11e9-b13f-001b217b3468">
+ <topic>Gitlab -- Multiple Vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>gitlab-ce</name>
+ <range><ge>12.1.0</ge><lt>12.1.6</lt></range>
+ <range><ge>12.0.0</ge><lt>12.0.6</lt></range>
+ <range><ge>10.0.0</ge><lt>11.11.8</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Gitlab reports:</p>
+ <blockquote cite="https://about.gitlab.com/2019/08/12/critical-security-release-gitlab-12-dot-1-dot-6-released/">
+ <p>Insecure Authentication Methods Disabled for Grafana By Default</p>
+ <p>Multiple Command-Line Flag Injection Vulnerabilities</p>
+ <p>Insecure Cookie Handling on GitLab Pages</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://about.gitlab.com/2019/08/12/critical-security-release-gitlab-12-dot-1-dot-6-released/</url>
+ <cvename>CVE-2019-14943</cvename>
+ <cvename>CVE-2019-14944</cvename>
+ <cvename>CVE-2019-14942</cvename>
+ </references>
+ <dates>
+ <discovery>2019-08-12</discovery>
+ <entry>2019-08-13</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="f5f0a640-bae8-11e9-bb3a-001e2a3f778d">
+ <topic>KDE Frameworks -- malicious .desktop files execute code</topic>
+ <affects>
+ <package>
+ <name>kf5-kconfig</name>
+ <range><lt>5.60.0_2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The KDE Community has released a security announcement:</p>
+ <blockquote cite="https://kde.org/info/security/advisory-20190807-1.txt">
+ <p>The syntax Key[$e]=$(shell command) in *.desktop files, .directory files, and configuration files
+(typically found in ~/.config) was an intentional feature of KConfig, to allow flexible configuration.
+This could however be abused by malicious people to make the users install such files and get code
+executed even without intentional action by the user.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-14744</cvename>
+ <url>https://kde.org/info/security/advisory-20190807-1.txt</url>
+ </references>
+ <dates>
+ <discovery>2019-08-07</discovery>
+ <entry>2019-08-09</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="7f7d6412-bae5-11e9-be92-3085a9a95629">
+ <topic>doas -- Prevent passing of environment variables</topic>
+ <affects>
+ <package>
+ <name>doas</name>
+ <range><lt>6.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Jesse Smith (upstream author of the doas program) reported:</p>
+ <blockquote cite="https://github.com/slicer69/doas/releases/tag/6.1">
+ <p>Previous versions of "doas" transferred most environment variables, such
+ as USER, HOME, and PATH from the original user to the target user.
+
+ Passing these variables could cause files in the wrong path or
+ home directory to be read (or written to), which resulted in potential
+ security problems.</p>
+ <p>Many thanks to Sander Bos for reporting this issue and explaining
+ how it can be exploited.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <mlist msgid="2a5cda45ef35e885c9a8b1e@tedunangst.com">https://marc.info/?l=openbsd-tech&amp;m=156105665713340&amp;w=2</mlist>
+ <url>https://github.com/slicer69/doas/releases/tag/6.1</url>
+ </references>
+ <dates>
+ <discovery>2019-08-03</discovery>
+ <entry>2019-08-09</entry>
+ <modified>2019-08-15</modified>
+ </dates>
+ </vuln>
+
+ <vuln vid="f56669f5-d799-4ff5-9174-64a6d571c451">
+ <topic>bro -- Null pointer dereference and Signed integer overflow</topic>
+ <affects>
+ <package>
+ <name>bro</name>
+ <range><lt>2.6.3</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Jon Siwek of Corelight reports:</p>
+ <blockquote cite="https://raw.githubusercontent.com/zeek/zeek/1d874e5548a58b3b8fd2a342fe4aa0944e779809/NEWS">
+ <p>This is a security patch release to address potential
+ Denial of Service vulnerabilities:</p>
+ <ul>
+ <li>
+ Null pointer dereference in the RPC analysis code. RPC
+ analyzers (e.g. MOUNT or NFS) are not enabled in the
+ default configuration.</li>
+
+ <li>
+ Signed integer overflow in BinPAC-generated parser code.
+ The result of this is Undefined Behavior with respect to
+ the array bounds checking conditions that BinPAC generates,
+ so it's unpredictable what an optimizing compiler may
+ actually do under the assumption that signed integer
+ overlows should never happen. The specific symptom which
+ lead to finding this issue was with the PE analyzer causing
+ out-of-memory crashes due to large allocations that were
+ otherwise prevented when the array bounds checking logic
+ was changed to prevent any possible signed integer overlow.</li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://raw.githubusercontent.com/zeek/zeek/1d874e5548a58b3b8fd2a342fe4aa0944e779809/NEWS</url>
+ </references>
+ <dates>
+ <discovery>2019-06-22</discovery>
+ <entry>2019-08-09</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="9de4c1c1-b9ee-11e9-82aa-6cc21735f730">
+ <topic>PostgresSQL -- TYPE in pg_temp execute arbitrary SQL during `SECURITY DEFINER` execution</topic>
+ <affects>
+ <package>
+ <name>postgresql11-server</name>
+ <range><lt>11.5</lt></range>
+ </package>
+ <package>
+ <name>postgresql10-server</name>
+ <range><lt>10.10</lt></range>
+ </package>
+ <package>
+ <name>postgresql96-server</name>
+ <range><lt>9.6.15</lt></range>
+ </package>
+ <package>
+ <name>postgresql95-server</name>
+ <range><lt>9.5.19</lt></range>
+ </package>
+ <package>
+ <name>postgresql94-server</name>
+ <range><lt>9.4.24</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The PostgreSQL project reports:</p>
+ <blockquote cite="https://www.postgresql.org/about/news/1960/">
+ <p>
+ Versions Affected: 9.4 - 11
+ </p>
+ <p>
+ Given a suitable `SECURITY DEFINER` function, an attacker can execute arbitrary
+ SQL under the identity of the function owner. An attack requires `EXECUTE`
+ permission on the function, which must itself contain a function call having
+ inexact argument type match. For example, `length('foo'::varchar)` and
+ `length('foo')` are inexact, while `length('foo'::text)` is exact.
+ As part of exploiting this vulnerability, the attacker uses `CREATE DOMAIN`
+ to create a type in a `pg_temp` schema. The attack pattern and fix are similar
+ to that for CVE-2007-2138.
+ </p>
+ <p>
+ Writing `SECURITY DEFINER` functions continues to require following
+ the considerations noted in the documentation:
+ </p>
+ <p>
+ https://www.postgresql.org/docs/devel/sql-createfunction.html#SQL-CREATEFUNCTION-SECURITY
+ </p>
+ </blockquote>
+ <blockquote cite="https://www.postgresql.org/about/news/1960/">
+ <p>
+ Versions Affected: 11
+ </p>
+ <p>
+ In a database containing hypothetical, user-defined hash equality operators,
+ an attacker could read arbitrary bytes of server memory. For an attack to
+ become possible, a superuser would need to create unusual operators.
+ It is possible for operators not purpose-crafted for attack to have
+ the properties that enable an attack, but we are not aware of specific examples.
+ </p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.postgresql.org/about/news/1960/</url>
+ <cvename>CVE-2019-10208</cvename>
+ <cvename>CVE-2019-10209</cvename>
+ </references>
+ <dates>
+ <discovery>2019-08-08</discovery>
+ <entry>2019-08-08</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="6e65dfea-b614-11e9-a3a2-1506e15611cc">
+ <topic>Django -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>py27-django111</name>
+ <name>py35-django111</name>
+ <name>py36-django111</name>
+ <name>py37-django111</name>
+ <range><lt>1.11.23</lt></range>
+ </package>
+ <package>
+ <name>py27-django21</name>
+ <name>py35-django21</name>
+ <name>py36-django21</name>
+ <name>py37-django21</name>
+ <range><lt>2.1.11</lt></range>
+ </package>
+ <package>
+ <name>py27-django22</name>
+ <name>py35-django22</name>
+ <name>py36-django22</name>
+ <name>py37-django22</name>
+ <range><lt>2.2.4</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Django release notes:</p>
+ <blockquote cite="https://docs.djangoproject.com/en/1.11/releases/1.11.23/">
+ <p>CVE-2019-14232: Denial-of-service possibility in
+ django.utils.text.Truncator</p>
+ <p>If django.utils.text.Truncator's chars() and words() methods were
+ passed the html=True argument, they were extremely slow to evaluate
+ certain inputs due to a catastrophic backtracking vulnerability in a
+ regular expression. The chars() and words() methods are used to
+ implement the truncatechars_html and truncatewords_html template
+ filters, which were thus vulnerable</p>
+ <p>The regular expressions used by Truncator have been simplified in
+ order to avoid potential backtracking issues. As a consequence, trailing
+ punctuation may now at times be included in the truncated output.</p>
+ <p>CVE-2019-14233: Denial-of-service possibility in strip_tags()</p>
+ <p>Due to the behavior of the underlying HTMLParser,
+ django.utils.html.strip_tags() would be extremely slow to evaluate
+ certain inputs containing large sequences of nested incomplete HTML
+ entities. The strip_tags() method is used to implement the corresponding
+ striptags template filter, which was thus also vulnerable.</p>
+ <p>strip_tags() now avoids recursive calls to HTMLParser when progress
+ removing tags, but necessarily incomplete HTML entities, stops being
+ made.</p>
+ <p>Remember that absolutely NO guarantee is provided about the results of
+ strip_tags() being HTML safe. So NEVER mark safe the result of a
+ strip_tags() call without escaping it first, for example with
+ django.utils.html.escape().</p>
+ <p>CVE-2019-14234: SQL injection possibility in key and index lookups for
+ JSONField/HStoreField</p>
+ <p>Key and index lookups for JSONField and key lookups for HStoreField
+ were subject to SQL injection, using a suitably crafted dictionary,
+ with dictionary expansion, as the **kwargs passed to QuerySet.filter().</p>
+ <p>CVE-2019-14235: Potential memory exhaustion in
+ django.utils.encoding.uri_to_iri()</p>
+ <p>If passed certain inputs, django.utils.encoding.uri_to_iri() could lead
+ to significant memory usage due to excessive recursion when
+ re-percent-encoding invalid UTF-8 octet sequences.</p>
+ <p>uri_to_iri() now avoids recursion when re-percent-encoding invalid
+ UTF-8 octet sequences.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://docs.djangoproject.com/en/1.11/releases/1.11.23/</url>
+ <url>https://docs.djangoproject.com/en/2.1/releases/2.1.11/</url>
+ <url>https://docs.djangoproject.com/en/2.2/releases/2.2.4/</url>
+ <cvename>CVE-2019-14232</cvename>
+ <cvename>CVE-2019-14233</cvename>
+ <cvename>CVE-2019-14234</cvename>
+ <cvename>CVE-2019-14235</cvename>
+ </references>
+ <dates>
+ <discovery>2019-08-01</discovery>
+ <entry>2019-08-03</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="e7b69694-b3b5-11e9-9bb6-0800274e5f20">
+ <topic>gitea -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>gitea</name>
+ <range><lt>1.9.0</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Gitea Team reports:</p>
+ <blockquote cite="https://blog.gitea.io/2019/07/gitea-1.9.0-is-released/">
+ <p>This version of Gitea contains security fixes that could not be
+ backported to 1.8. For this reason, we strongly recommend updating.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://blog.gitea.io/2019/07/gitea-1.9.0-is-released/</url>
+ <url>https://github.com/go-gitea/gitea/releases/tag/v1.9.0</url>
+ </references>
+ <dates>
+ <discovery>2019-07-31</discovery>
+ <entry>2019-07-31</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="0d3f99f7-b30c-11e9-a87f-a4badb2f4699">
+ <topic>FreeBSD -- File description reference count leak</topic>
+ <affects>
+ <package>
+ <name>FreeBSD-kernel</name>
+ <range><ge>12.0</ge><lt>12.0_8</lt></range>
+ <range><ge>11.2</ge><lt>11.2_12</lt></range>
+ <range><ge>11.3</ge><lt>11.3_1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <h1>Problem Description:</h1>
+ <p>If a process attempts to transmit rights over a UNIX-domain
+ socket and an error causes the attempt to fail, references
+ acquired on the rights are not released and are leaked.
+ This bug can be used to cause the reference counter to wrap
+ around and free the corresponding file structure.</p>
+ <h1>Impact:</h1>
+ <p>A local user can exploit the bug to gain root privileges
+ or escape from a jail.</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-5607</cvename>
+ <freebsdsa>SA-19:17.fd</freebsdsa>
+ </references>
+ <dates>
+ <discovery>2019-07-24</discovery>
+ <entry>2019-07-30</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="edf064fb-b30b-11e9-a87f-a4badb2f4699">
+ <topic>FreeBSD -- Bhyve out-of-bounds read in XHCI device</topic>
+ <affects>
+ <package>
+ <name>FreeBSD-kernel</name>
+ <range><ge>12.0</ge><lt>12.0_8</lt></range>
+ <range><ge>11.2</ge><lt>11.2_12</lt></range>
+ <range><ge>11.3</ge><lt>11.3_1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <h1>Problem Description:</h1>
+ <p>The pci_xhci_device_doorbell() function does not validate
+ the 'epid' and 'streamid' provided by the guest, leading
+ to an out-of-bounds read.</p>
+ <h1>Impact:</h1>
+ <p>A misbehaving bhyve guest could crash the system or
+ access memory that it should not be able to.</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-5604</cvename>
+ <freebsdsa>SA-19:16.bhyve</freebsdsa>
+ </references>
+ <dates>
+ <discovery>2019-07-24</discovery>
+ <entry>2019-07-30</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="deb6e164-b30b-11e9-a87f-a4badb2f4699">
+ <topic>FreeBSD -- Reference count overflow in mqueue filesystem</topic>
+ <affects>
+ <package>
+ <name>FreeBSD-kernel</name>
+ <range><ge>12.0</ge><lt>12.0_8</lt></range>
+ <range><ge>11.2</ge><lt>11.2_12</lt></range>
+ <range><ge>11.3</ge><lt>11.3_1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <h1>Problem Description:</h1>
+ <p>System calls operating on file descriptors obtain a
+ reference to relevant struct file which due to a programming
+ error was not always put back, which in turn could be used
+ to overflow the counter of affected struct file.</p>
+ <h1>Impact:</h1>
+ <p>A local user can use this flaw to obtain access to files,
+ directories, sockets etc. opened by processes owned by other
+ users. If obtained struct file represents a directory from
+ outside of user's jail, it can be used to access files
+ outside of the jail. If the user in question is a jailed
+ root they can obtain root privileges on the host system.</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-5603</cvename>
+ <freebsdsa>SA-19:15.mqueuefs</freebsdsa>
+ </references>
+ <dates>
+ <discovery>2019-07-24</discovery>
+ <entry>2019-07-30</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="6b856e00-b30a-11e9-a87f-a4badb2f4699">
+ <topic>FreeBSD -- Kernel memory disclosure in freebsd32_ioctl</topic>
+ <affects>
+ <package>
+ <name>FreeBSD-kernel</name>
+ <range><ge>11.2</ge><lt>11.2_12</lt></range>
+ <range><ge>11.3</ge><lt>11.3_1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <h1>Problem Description:</h1>
+ <p>Due to insufficient initialization of memory copied to
+ userland in the components listed above small amounts of
+ kernel memory may be disclosed to userland processes.</p>
+ <h1>Impact:</h1>
+ <p>A user who can invoke 32-bit FreeBSD ioctls may be able
+ to read the contents of small portions of kernel memory.</p>
+ <p>Such memory might contain sensitive information, such
+ as portions of the file cache or terminal buffers. This
+ information might be directly useful, or it might be leveraged
+ to obtain elevated privileges in some way; for example, a
+ terminal buffer might include a user-entered password.</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-5605</cvename>
+ <freebsdsa>SA-19:14.freebsd32</freebsdsa>
+ </references>
+ <dates>
+ <discovery>2019-07-24</discovery>
+ <entry>2019-07-30</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="5721ae65-b30a-11e9-a87f-a4badb2f4699">
+ <topic>FreeBSD -- pts(4) write-after-free</topic>
+ <affects>
+ <package>
+ <name>FreeBSD-kernel</name>
+ <range><ge>12.0</ge><lt>12.0_8</lt></range>
+ <range><ge>11.2</ge><lt>11.2_12</lt></range>
+ <range><ge>11.3</ge><lt>11.3_1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <h1>Problem Description:</h1>
+ <p>The code which handles a close(2) of a descriptor created
+ by posix_openpt(2) fails to undo the configuration which
+ causes SIGIO to be raised. This bug can lead to a
+ write-after-free of kernel memory.</p>
+ <h1>Impact:</h1>
+ <p>The bug permits malicious code to trigger a write-after-free,
+ which may be used to gain root privileges or escape a
+ jail.</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-5606</cvename>
+ <freebsdsa>SA-19:13.pts</freebsdsa>
+ </references>
+ <dates>
+ <discovery>2019-07-24</discovery>
+ <entry>2019-07-30</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="39f6cbff-b30a-11e9-a87f-a4badb2f4699">
+ <topic>FreeBSD -- telnet(1) client multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>FreeBSD</name>
+ <range><ge>12.0</ge><lt>12.0_8</lt></range>
+ <range><ge>11.2</ge><lt>11.2_12</lt></range>
+ <range><ge>11.3</ge><lt>11.3_1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <h1>Problem Description:</h1>
+ <p>Insufficient validation of environment variables in the
+ telnet client supplied in FreeBSD can lead to stack-based
+ buffer overflows. A stack- based overflow is present in the
+ handling of environment variables when connecting via the
+ telnet client to remote telnet servers.</p>
+ <p>This issue only affects the telnet client. Inbound telnet
+ sessions to telnetd(8) are not affected by this issue.</p>
+ <h1>Impact:</h1>
+ <p>These buffer overflows may be triggered when connecting
+ to a malicious server, or by an active attacker in the
+ network path between the client and server. Specially crafted
+ TELNET command sequences may cause the execution of arbitrary
+ code with the privileges of the user invoking telnet(1).</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-0053</cvename>
+ <freebsdsa>SA-19:12.telnet</freebsdsa>
+ </references>
+ <dates>
+ <discovery>2019-07-24</discovery>
+ <entry>2019-07-30</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="14a3b376-b30a-11e9-a87f-a4badb2f4699">
+ <topic>FreeBSD -- Privilege escalation in cd(4) driver</topic>
+ <affects>
+ <package>
+ <name>FreeBSD-kernel</name>
+ <range><ge>12.0</ge><lt>12.0_7</lt></range>
+ <range><ge>11.2</ge><lt>11.2_11</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <h1>Problem Description:</h1>
+ <p>To implement one particular ioctl, the Linux emulation
+ code used a special interface present in the cd(4) driver
+ which allows it to copy subchannel information directly to
+ a kernel address. This interface was erroneously made
+ accessible to userland, allowing users with read access to
+ a cd(4) device to arbitrarily overwrite kernel memory when
+ some media is present in the device.</p>
+ <h1>Impact:</h1>
+ <p>A user in the operator group can make use of this interface
+ to gain root privileges on a system with a cd(4) device
+ when some media is present in the device.</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-5602</cvename>
+ <freebsdsa>SA-19:11.cd_ioctl</freebsdsa>
+ </references>
+ <dates>
+ <discovery>2019-07-02</discovery>
+ <entry>2019-07-30</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="ff82610f-b309-11e9-a87f-a4badb2f4699">
+ <topic>FreeBSD -- Kernel stack disclosure in UFS/FFS</topic>
+ <affects>
+ <package>
+ <name>FreeBSD-kernel</name>
+ <range><ge>12.0</ge><lt>12.0_7</lt></range>
+ <range><ge>11.2</ge><lt>11.2_11</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <h1>Problem Description:</h1>
+ <p>A bug causes up to three bytes of kernel stack memory
+ to be written to disk as uninitialized directory entry
+ padding. This data can be viewed by any user with read
+ access to the directory. Additionally, a malicious user
+ with write access to a directory can cause up to 254 bytes
+ of kernel stack memory to be exposed.</p>
+ <h1>Impact:</h1>
+ <p>Some amount of the kernel stack is disclosed and written
+ out to the filesystem.</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-5601</cvename>
+ <freebsdsa>SA-19:10.ufs</freebsdsa>
+ </references>
+ <dates>
+ <discovery>2019-07-02</discovery>
+ <entry>2019-07-30</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="f62bba56-b309-11e9-a87f-a4badb2f4699">
+ <topic>FreeBSD -- iconv buffer overflow</topic>
+ <affects>
+ <package>
+ <name>FreeBSD</name>
+ <range><ge>12.0</ge><lt>12.0_7</lt></range>
+ <range><ge>11.2</ge><lt>11.2_11</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <h1>Problem Description:</h1>
+ <p>With certain inputs, iconv may write beyond the end of
+ the output buffer.</p>
+ <h1>Impact:</h1>
+ <p>Depending on the way in which iconv is used, an attacker
+ may be able to create a denial of service, provoke incorrect
+ program behavior, or induce a remote code execution. iconv
+ is a libc library function and the nature of possible attacks
+ will depend on the way in which iconv is used by applications
+ or daemons.</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-5600</cvename>
+ <freebsdsa>SA-19:09.iconv</freebsdsa>
+ </references>
+ <dates>
+ <discovery>2019-07-02</discovery>
+ <entry>2019-07-30</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="c294c2e6-b309-11e9-a87f-a4badb2f4699">
+ <topic>FreeBSD -- Resource exhaustion in non-default RACK TCP stack</topic>
+ <affects>
+ <package>
+ <name>FreeBSD-kernel</name>
+ <range><ge>12.0</ge><lt>12.0_6</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <h1>Problem Description:</h1>
+ <p>While processing acknowledgements, the RACK code uses
+ several linked lists to maintain state entries. A malicious
+ attacker can cause the lists to grow unbounded. This can
+ cause an expensive list traversal on every packet being
+ processed, leading to resource exhaustion and a denial of
+ service.</p>
+ <h1>Impact:</h1>
+ <p>An attacker with the ability to send specially crafted
+ TCP traffic to a victim system can degrade network performance
+ and/or consume excessive CPU by exploiting the inefficiency
+ of traversing the potentially very large RACK linked lists
+ with relatively small bandwidth cost.</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-5599</cvename>
+ <freebsdsa>SA-19:08.rack</freebsdsa>
+ </references>
+ <dates>
+ <discovery>2019-06-19</discovery>
+ <entry>2019-07-30</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="a633651b-b309-11e9-a87f-a4badb2f4699">
+ <topic>FreeBSD -- Microarchitectural Data Sampling (MDS)</topic>
+ <affects>
+ <package>
+ <name>FreeBSD-kernel</name>
+ <range><ge>12.0</ge><lt>12.0_5</lt></range>
+ <range><ge>11.2</ge><lt>11.2_10</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <h1>Problem Description:</h1>
+ <p>On some Intel processors utilizing speculative execution
+ a local process may be able to infer stale information from
+ microarchitectural buffers to obtain a memory disclosure.</p>
+ <h1>Impact:</h1>
+ <p>An attacker may be able to read secret data from the
+ kernel or from a process when executing untrusted code (for
+ example, in a web browser).</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2018-1212</cvename>
+ <cvename>CVE-2018-1213</cvename>
+ <cvename>CVE-2019-1109</cvename>
+ <freebsdsa>SA-19:07.mds</freebsdsa>
+ </references>
+ <dates>
+ <discovery>2019-05-14</discovery>
+ <entry>2019-07-30</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="59c5f255-b309-11e9-a87f-a4badb2f4699">
+ <topic>FreeBSD -- ICMP/ICMP6 packet filter bypass in pf</topic>
+ <affects>
+ <package>
+ <name>FreeBSD-kernel</name>
+ <range><ge>12.0</ge><lt>12.0_4</lt></range>
+ <range><ge>11.2</ge><lt>11.2_10</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <h1>Problem Description:</h1>
+ <p>States in pf(4) let ICMP and ICMP6 packets pass if they
+ have a packet in their payload matching an existing condition.
+ pf(4) does not check if the outer ICMP or ICMP6 packet has
+ the same destination IP as the source IP of the inner
+ protocol packet.</p>
+ <h1>Impact:</h1>
+ <p>A maliciously crafted ICMP/ICMP6 packet could bypass the
+ packet filter rules and be passed to a host that would
+ otherwise be unavailable.</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-5598</cvename>
+ <freebsdsa>SA-19:06.pf</freebsdsa>
+ </references>
+ <dates>
+ <discovery>2019-05-14</discovery>
+ <entry>2019-07-30</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="3d02520d-b309-11e9-a87f-a4badb2f4699">
+ <topic>FreeBSD -- IPv6 fragment reassembly panic in pf(4)</topic>
+ <affects>
+ <package>
+ <name>FreeBSD-kernel</name>
+ <range><ge>12.0</ge><lt>12.0_4</lt></range>
+ <range><ge>11.2</ge><lt>11.2_10</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <h1>Problem Description:</h1>
+ <p>A bug in the pf(4) IPv6 fragment reassembly logic
+ incorrectly uses the last extension header offset from the
+ last received packet instead of from the first packet.</p>
+ <h1>Impact:</h1>
+ <p>Malicious IPv6 packets with different IPv6 extensions
+ could cause a kernel panic or potentially a filtering rule
+ bypass.</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-5597</cvename>
+ <freebsdsa>SA-19:05.pf</freebsdsa>
+ </references>
+ <dates>
+ <discovery>2019-05-14</discovery>
+ <entry>2019-07-30</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="1cd89254-b2db-11e9-8001-001b217b3468">
+ <topic>Gitlab -- Multiple Vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>gitlab-ce</name>
+ <range><ge>12.1.0</ge><lt>12.1.2</lt></range>
+ <range><ge>12.0.0</ge><lt>12.0.4</lt></range>
+ <range><ge>8.9.0</ge><lt>11.11.7</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Gitlab reports:</p>
+ <blockquote cite="https://about.gitlab.com/2019/07/29/security-release-gitlab-12-dot-1-dot-2-released/">
+ <p>GitHub Integration SSRF</p>
+ <p>Trigger Token Impersonation</p>
+ <p>Build Status Disclosure</p>
+ <p>SSRF Mitigation Bypass</p>
+ <p>Information Disclosure New Issue ID</p>
+ <p>IDOR Label Name Enumeration</p>
+ <p>Persistent XSS Wiki Pages</p>
+ <p>User Revokation Bypass with Mattermost Integration</p>
+ <p>Arbitrary File Upload via Import Project Archive</p>
+ <p>Information Disclosure Vulnerability Feedback</p>
+ <p>Persistent XSS via Email</p>
+ <p>Denial Of Service Epic Comments</p>
+ <p>Email Verification Bypass</p>
+ <p>Override Merge Request Approval Rules</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://about.gitlab.com/2019/07/29/security-release-gitlab-12-dot-1-dot-2-released/</url>
+ </references>
+ <dates>
+ <discovery>2019-07-29</discovery>
+ <entry>2019-07-30</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="38d2df4d-b143-11e9-87e7-901b0e934d69">
+ <topic>py-matrix-synapse -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>py27-matrix-synapse</name>
+ <name>py35-matrix-synapse</name>
+ <name>py36-matrix-synapse</name>
+ <name>py37-matrix-synapse</name>
+ <range><lt>1.2.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Matrix developers report:</p>
+ <blockquote cite="https://matrix.org/blog/2019/07/26/critical-security-update-synapse-1-2-1-released">
+ <p>The matrix team releases Synapse 1.2.1 as a critical security update. It contains patches relating to redactions and event federation:</p>
+ <ul>
+ <li>Prevent an attack where a federated server could send redactions for arbitrary events in v1 and v2 rooms.</li>
+ <li>Prevent a denial-of-service attack where cycles of redaction events would make Synapse spin infinitely.</li>
+ <li>Prevent an attack where users could be joined or parted from public rooms without their consent.</li>
+ <li>Fix a vulnerability where a federated server could spoof read-receipts from users on other servers. </li>
+ <li>It was possible for a room moderator to send a redaction for an m.room.create event, which would downgrade the room to version 1.</li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://matrix.org/blog/2019/07/26/critical-security-update-synapse-1-2-1-released</url>
+ <url>https://github.com/matrix-org/synapse/releases/tag/v1.2.1</url>
+ </references>
+ <dates>
+ <discovery>2019-07-26</discovery>
+ <entry>2019-07-28</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="3e0da406-aece-11e9-8d41-97657151f8c2">
+ <topic>Exim -- RCE in ${sort} expansion</topic>
+ <affects>
+ <package>
+ <name>exim</name>
+ <range><ge>4.85</ge><lt>4.92.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Exim team report:</p>
+ <blockquote cite="https://www.exim.org/static/doc/security/CVE-2019-13917.txt">
+ <p>
+ A local or remote attacker can execute programs with root privileges - if you've an unusual configuration.
+ </p>
+ <p>
+ If your configuration uses the ${sort } expansion for items that can be controlled by an attacker (e.g. $local_part, $domain). The default config, as shipped by the Exim developers, does not contain ${sort }.
+ </p>
+ <p>
+ The vulnerability is exploitable either remotely or locally and could
+be used to execute other programs with root privilege. The ${sort }
+expansion re-evaluates its items.
+ </p>
+ <p>
+ Exim 4.92.1 is not vulnerable.
+ </p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-13917</cvename>
+ <url>https://www.exim.org/static/doc/security/CVE-2019-13917.txt</url>
+ </references>
+ <dates>
+ <discovery>2019-07-18</discovery>
+ <entry>2019-07-25</entry>
+ <modified>2019-07-26</modified>
+ </dates>
+ </vuln>
+
+ <vuln vid="198e6220-ac8b-11e9-a1c7-b499baebfeaf">
+ <topic>MySQL -- Multiple vulerabilities</topic>
+ <affects>
+ <package>
+ <name>mariadb55-server</name>
+ <range><lt>5.5.65</lt></range>
+ </package>
+ <package>
+ <name>mariadb101-server</name>
+ <range><lt>10.1.41</lt></range>
+ </package>
+ <package>
+ <name>mariadb102-server</name>
+ <range><lt>10.2.26</lt></range>
+ </package>
+ <package>
+ <name>mariadb103-server</name>
+ <range><lt>10.3.17</lt></range>
+ </package>
+ <package>
+ <name>mariadb104-server</name>
+ <range><lt>10.4.7</lt></range>
+ </package>
+ <package>
+ <name>mysql56-server</name>
+ <range><lt>5.6.45</lt></range>
+ </package>
+ <package>
+ <name>mysql57-server</name>
+ <range><lt>5.7.27</lt></range>
+ </package>
+ <package>
+ <name>mysql80-server</name>
+ <range><lt>8.0.17</lt></range>
+ </package>
+ <package>
+ <name>percona55-server</name>
+ <range><lt>5.5.65</lt></range>
+ </package>
+ <package>
+ <name>percona56-server</name>
+ <range><lt>5.6.45</lt></range>
+ </package>
+ <package>
+ <name>percona57-server</name>
+ <range><lt>5.7.27</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Oracle reports:</p>
+ <blockquote cite="https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html">
+ <p>This Critical Patch Update contains 45 new security fixes for
+ Oracle MySQL. 4 of these vulnerabilities may be remotely exploitable
+ without authentication, i.e., may be exploited over a network without
+ requiring user credentials.
+ </p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html</url>
+ <cvename>CVE-2019-2730</cvename>
+ <cvename>CVE-2019-2731</cvename>
+ <cvename>CVE-2019-2737</cvename>
+ <cvename>CVE-2019-2738</cvename>
+ <cvename>CVE-2019-2739</cvename>
+ <cvename>CVE-2019-2740</cvename>
+ <cvename>CVE-2019-2741</cvename>
+ <cvename>CVE-2019-2743</cvename>
+ <cvename>CVE-2019-2746</cvename>
+ <cvename>CVE-2019-2747</cvename>
+ <cvename>CVE-2019-2752</cvename>
+ <cvename>CVE-2019-2755</cvename>
+ <cvename>CVE-2019-2757</cvename>
+ <cvename>CVE-2019-2758</cvename>
+ <cvename>CVE-2019-2774</cvename>
+ <cvename>CVE-2019-2778</cvename>
+ <cvename>CVE-2019-2780</cvename>
+ <cvename>CVE-2019-2784</cvename>
+ <cvename>CVE-2019-2785</cvename>
+ <cvename>CVE-2019-2789</cvename>
+ <cvename>CVE-2019-2791</cvename>
+ <cvename>CVE-2019-2795</cvename>
+ <cvename>CVE-2019-2796</cvename>
+ <cvename>CVE-2019-2797</cvename>
+ <cvename>CVE-2019-2798</cvename>
+ <cvename>CVE-2019-2800</cvename>
+ <cvename>CVE-2019-2801</cvename>
+ <cvename>CVE-2019-2802</cvename>
+ <cvename>CVE-2019-2803</cvename>
+ <cvename>CVE-2019-2805</cvename>
+ <cvename>CVE-2019-2808</cvename>
+ <cvename>CVE-2019-2810</cvename>
+ <cvename>CVE-2019-2811</cvename>
+ <cvename>CVE-2019-2812</cvename>
+ <cvename>CVE-2019-2814</cvename>
+ <cvename>CVE-2019-2815</cvename>
+ <cvename>CVE-2019-2819</cvename>
+ <cvename>CVE-2019-2822</cvename>
+ <cvename>CVE-2019-2826</cvename>
+ <cvename>CVE-2019-2830</cvename>
+ <cvename>CVE-2019-2834</cvename>
+ <cvename>CVE-2019-2879</cvename>
+ <cvename>CVE-2019-3822</cvename>
+ </references>
+ <dates>
+ <discovery>2019-07-16</discovery>
+ <entry>2019-07-22</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="19d648e0-ab69-11e9-bfef-000ffec0b3e1">
+ <topic>drupal -- Drupal core - Access bypass</topic>
+ <affects>
+ <package>
+ <name>drupal8</name>
+ <range><lt>8.7.5</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Drupal Security Team reports:</p>
+ <blockquote cite="https://www.drupal.org/SA-CORE-2019-008">
+ <p>In Drupal 8.7.4, when the experimental Workspaces module is enabled,
+ an access bypass condition is created.</p>
+ <p>This can be mitigated by disabling the Workspaces module. It does
+ not affect any release other than Drupal 8.7.4.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.drupal.org/SA-CORE-2019-008</url>
+ </references>
+ <dates>
+ <discovery>2019-07-17</discovery>
+ <entry>2019-07-21</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="5914705c-ab03-11e9-a4f9-080027ac955c">
+ <topic>PuTTY 0.72 -- buffer overflow in SSH-1 and integer overflow in SSH client</topic>
+ <affects>
+ <package>
+ <name>putty</name> <range><lt>0.72</lt></range>
+ </package><package>
+ <name>putty-gtk2</name> <range><lt>0.72</lt></range>
+ </package><package>
+ <name>putty-nogtk</name> <range><lt>0.72</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Simon Tatham reports:</p>
+ <blockquote cite="https://lists.tartarus.org/pipermail/putty-announce/2019/000028.html">
+ <p>Vulnerabilities fixed in this release include:</p>
+ <ul>
+ <li>A malicious SSH-1 server could trigger a buffer overrun by sending
+ extremely short RSA keys, or certain bad packet length fields.
+ Either of these could happen before host key verification, so even
+ if you trust the server you *intended* to connect to, you would
+ still be at risk.
+ <br/>
+ (However, the SSH-1 protocol is obsolete, and recent versions of
+ PuTTY do not try it by default, so you are only at risk if you work
+ with old servers and have explicitly configured SSH-1.)</li>
+ <li>If a malicious process found a way to impersonate Pageant, then it
+ could cause an integer overflow in any of the SSH client tools
+ (PuTTY, Plink, PSCP, PSFTP) which accessed the malicious Pageant.</li>
+ </ul>
+ <p>Other security-related bug fixes include:</p>
+ <ul>
+ <li>The 'trust sigil' system introduced in PuTTY 0.71 to protect
+ against server spoofing attacks had multiple bugs. Trust sigils
+ were not turned off after login in the SSH-1 and Rlogin protocols,
+ and not turned back on if you used the Restart Session command.
+ Both are now fixed.</li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://lists.tartarus.org/pipermail/putty-announce/2019/000028.html</url>
+ </references>
+ <dates>
+ <discovery>2019-07-14</discovery>
+ <entry>2019-07-20</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="df3db21d-1a4d-4c78-acf7-4639e5a795e0">
+ <topic>jenkins -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>jenkins</name>
+ <range><lt>2.186</lt></range>
+ </package>
+ <package>
+ <name>jenkins-lts</name>
+ <range><lt>2.176.2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Jenkins Security Advisory:</p>
+ <blockquote cite="https://jenkins.io/security/advisory/2019-07-17/">
+ <h1>Description</h1>
+ <h5>(Medium) SECURITY-1424 / CVE-2019-10352</h5>
+ <p>Arbitrary file write vulnerability using file parameter definitions</p>
+ <h5>(High) SECURITY-626 / CVE-2019-10353</h5>
+ <p>CSRF protection tokens did not expire</p>
+ <h5>(Medium) SECURITY-534 / CVE-2019-10354</h5>
+ <p>Unauthorized view fragment access</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-10352</cvename>
+ <cvename>CVE-2019-10353</cvename>
+ <cvename>CVE-2019-10354</cvename>
+ <url>https://jenkins.io/security/advisory/2019-07-17/</url>
+ </references>
+ <dates>
+ <discovery>2019-07-17</discovery>
+ <entry>2019-07-17</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="93167bef-9752-11e9-b61c-b885849ded8e">
+ <topic>libxslt -- security framework bypass</topic>
+ <affects>
+ <package>
+ <name>libxslt</name>
+ <range><lt>1.1.33</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Mitre report:</p>
+ <blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11068">
+ <p>libxslt through 1.1.33 allows bypass of a protection mechanism because callers of xsltCheckRead and xsltCheckWrite permit access even upon receiving a -1 error code. xsltCheckRead can return -1 for a crafted URL that is not actually invalid and is subsequently loaded.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11068</url>
+ </references>
+ <dates>
+ <discovery>2019-04-10</discovery>
+ <entry>2019-07-16</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="818b2bcb-a46f-11e9-bed9-001999f8d30b">
+ <topic>asterisk -- Remote crash vulnerability with MESSAGE messages</topic>
+ <affects>
+ <package>
+ <name>asterisk13</name>
+ <range><lt>13.27.1</lt></range>
+ </package>
+ <package>
+ <name>asterisk15</name>
+ <range><lt>15.7.3</lt></range>
+ </package>
+ <package>
+ <name>asterisk16</name>
+ <range><lt>16.4.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Asterisk project reports:</p>
+ <blockquote cite="http://www.asterisk.org/downloads/security-advisories">
+ <p>A specially crafted SIP in-dialog MESSAGE message can cause Asterisk to crash.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://downloads.asterisk.org/pub/security/AST-2019-002.html</url>
+ <cvename>CVE-2019-12827</cvename>
+ </references>
+ <dates>
+ <discovery>2019-06-13</discovery>
+ <entry>2019-07-12</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="e9d2e981-a46d-11e9-bed9-001999f8d30b">
+ <topic>asterisk -- Remote Crash Vulnerability in chan_sip channel driver</topic>
+ <affects>
+ <package>
+ <name>asterisk13</name>
+ <range><lt>13.27.1</lt></range>
+ </package>
+ <package>
+ <name>asterisk15</name>
+ <range><lt>15.7.3</lt></range>
+ </package>
+ <package>
+ <name>asterisk16</name>
+ <range><lt>16.4.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Asterisk project reports:</p>
+ <blockquote cite="http://www.asterisk.org/downloads/security-advisories">
+ <p>When T.38 faxing is done in Asterisk a T.38 reinvite
+ may be sent to an endpoint to switch it to T.38. If the
+ endpoint responds with an improperly formatted SDP answer
+ including both a T.38 UDPTL stream and an audio or video
+ stream containing only codecs not allowed on the SIP peer
+ or user a crash will occur. The code incorrectly assumes
+ that there will be at least one common codec when T.38
+ is also in the SDP answer.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://downloads.asterisk.org/pub/security/AST-2019-003.html</url>
+ <cvename>CVE-2019-13161</cvename>
+ </references>
+ <dates>
+ <discovery>2019-06-28</discovery>
+ <entry>2019-07-12</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="a449c604-a43a-11e9-b422-fcaa147e860e">
+ <topic>python 3.7 -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>python37</name>
+ <range><lt>3.7.4</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Python changelog:</p>
+ <blockquote cite="https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-4-final">
+ <p>bpo-37463: ssl.match_hostname() no longer accepts IPv4 addresses with additional text
+ after the address and only quad-dotted notation without trailing whitespaces. Some
+ inet_aton() implementations ignore whitespace and all data after whitespace, e.g.'127.0.0.1
+ whatever'.</p>
+ <p>bpo-35907: CVE-2019-9948: Avoid file reading by disallowing local-file:// and
+ local_file:// URL schemes in URLopener().open() and URLopener().retrieve() of
+ urllib.request.</p>
+ <p>bpo-36742: Fixes mishandling of pre-normalization characters in urlsplit().</p>
+ <p>bpo-30458: Address CVE-2019-9740 by disallowing URL paths with embedded whitespace
+ or control characters through into the underlying http client request. Such potentially
+ malicious header injection URLs now cause an http.client.InvalidURL exception to be
+ raised.</p>
+ <p>bpo-33529: Prevent fold function used in email header encoding from entering infinite
+ loop when there are too many non-ASCII characters in a header.</p>
+ <p>bpo-35755: shutil.which() now uses os.confstr("CS_PATH") if available and if the PATH
+ environment variable is not set. Remove also the current directory from posixpath.defpath.
+ On Unix, shutil.which() and the subprocess module no longer search the executable in the
+ current directory if the PATH environment variable is not set.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://docs.python.org/3.7/whatsnew/changelog.html#python-3-7-4-final</url>
+ <cvename>CVE-2019-9740</cvename>
+ <cvename>CVE-2019-9948</cvename>
+ </references>
+ <dates>
+ <discovery>2019-03-13</discovery>
+ <entry>2019-07-12</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="0592f49f-b3b8-4260-b648-d1718762656c">
+ <topic>mozilla -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>firefox</name>
+ <range><lt>68.0_4,1</lt></range>
+ </package>
+ <package>
+ <name>waterfox</name>
+ <range><lt>56.2.12</lt></range>
+ </package>
+ <package>
+ <name>seamonkey</name>
+ <name>linux-seamonkey</name>
+ <range><lt>2.53.0</lt></range>
+ </package>
+ <package>
+ <name>firefox-esr</name>
+ <range><lt>60.8.0,1</lt></range>
+ </package>
+ <package>
+ <name>linux-firefox</name>
+ <range><lt>60.8.0,2</lt></range>
+ </package>
+ <package>
+ <name>libxul</name>
+ <name>thunderbird</name>
+ <name>linux-thunderbird</name>
+ <range><lt>60.8.0</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Mozilla Foundation reports:</p>
+ <blockquote cite="https://www.mozilla.org/en-US/security/advisories/mfsa2019-21/">
+ <p>CVE-2019-9811: Sandbox escape via installation of malicious language pack</p>
+ <p>CVE-2019-11711: Script injection within domain through inner window reuse</p>
+ <p>CVE-2019-11712: Cross-origin POST requests can be made with NPAPI plugins by following 308 redirects</p>
+ <p>CVE-2019-11713: Use-after-free with HTTP/2 cached stream</p>
+ <p>CVE-2019-11714: NeckoChild can trigger crash when accessed off of main thread</p>
+ <p>CVE-2019-11729: Empty or malformed p256-ECDH public keys may trigger a segmentation fault</p>
+ <p>CVE-2019-11715: HTML parsing error can contribute to content XSS</p>
+ <p>CVE-2019-11716: globalThis not enumerable until accessed</p>
+ <p>CVE-2019-11717: Caret character improperly escaped in origins</p>
+ <p>CVE-2019-11718: Activity Stream writes unsanitized content to innerHTML</p>
+ <p>CVE-2019-11719: Out-of-bounds read when importing curve25519 private key</p>
+ <p>CVE-2019-11720: Character encoding XSS vulnerability</p>
+ <p>CVE-2019-11721: Domain spoofing through unicode latin 'kra' character</p>
+ <p>CVE-2019-11730: Same-origin policy treats all files in a directory as having the same-origin</p>
+ <p>CVE-2019-11723: Cookie leakage during add-on fetching across private browsing boundaries</p>
+ <p>CVE-2019-11724: Retired site input.mozilla.org has remote troubleshooting permissions</p>
+ <p>CVE-2019-11725: Websocket resources bypass safebrowsing protections</p>
+ <p>CVE-2019-11727: PKCS#1 v1.5 signatures can be used for TLS 1.3</p>
+ <p>CVE-2019-11728: Port scanning through Alt-Svc header</p>
+ <p>CVE-2019-11710: Memory safety bugs fixed in Firefox 68</p>
+ <p>CVE-2019-11709: Memory safety bugs fixed in Firefox 68 and Firefox ESR 60.8</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-11709</cvename>
+ <cvename>CVE-2019-11710</cvename>
+ <cvename>CVE-2019-11711</cvename>
+ <cvename>CVE-2019-11712</cvename>
+ <cvename>CVE-2019-11713</cvename>
+ <cvename>CVE-2019-11714</cvename>
+ <cvename>CVE-2019-11715</cvename>
+ <cvename>CVE-2019-11716</cvename>
+ <cvename>CVE-2019-11717</cvename>
+ <cvename>CVE-2019-11718</cvename>
+ <cvename>CVE-2019-11719</cvename>
+ <cvename>CVE-2019-11720</cvename>
+ <cvename>CVE-2019-11721</cvename>
+ <cvename>CVE-2019-11723</cvename>
+ <cvename>CVE-2019-11724</cvename>
+ <cvename>CVE-2019-11725</cvename>
+ <cvename>CVE-2019-11727</cvename>
+ <cvename>CVE-2019-11728</cvename>
+ <cvename>CVE-2019-11729</cvename>
+ <cvename>CVE-2019-11730</cvename>
+ <cvename>CVE-2019-9811</cvename>
+ <url>https://www.mozilla.org/security/advisories/mfsa2019-21/</url>
+ <url>https://www.mozilla.org/security/advisories/mfsa2019-22/</url>
+ </references>
+ <dates>
+ <discovery>2019-07-09</discovery>
+ <entry>2019-07-09</entry>
+ <modified>2019-07-23</modified>
+ </dates>
+ </vuln>
+
+ <vuln vid="23f65f58-a261-11e9-b444-002590acae31">
+ <topic>GnuPG -- denial of service</topic>
+ <affects>
+ <package>
+ <name>gnupg</name>
+ <range><lt>2.2.17</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>From the GnuPG 2.2.17 changelog:</p>
+ <blockquote cite="https://dev.gnupg.org/T4606">
+ <p>gpg: Ignore all key-signatures received from keyservers. This
+ change is required to mitigate a DoS due to keys flooded with
+ faked key-signatures.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://dev.gnupg.org/T4606</url>
+ <url>https://dev.gnupg.org/T4607</url>
+ </references>
+ <dates>
+ <discovery>2019-07-03</discovery>
+ <entry>2019-07-09</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="18ed9650-a1d6-11e9-9b17-fcaa147e860e">
+ <topic>python 3.6 -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>python36</name>
+ <range><lt>3.6.9</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Python changelog:</p>
+ <blockquote cite="https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-9-final">
+ <p>bpo-35907: CVE-2019-9948: Avoid file reading by disallowing local-file://
+ and local_file:// URL schemes in URLopener().open() and URLopener().retrieve()
+ of urllib.request.</p>
+ <p>bpo-36742: Fixes mishandling of pre-normalization characters in urlsplit().</p>
+ <p>bpo-30458: Address CVE-2019-9740 by disallowing URL paths with embedded
+ whitespace or control characters through into the underlying http client
+ request. Such potentially malicious header injection URLs now cause an
+ http.client.InvalidURL exception to be raised.</p>
+ <p>bpo-36216: Changes urlsplit() to raise ValueError when the URL contains
+ characters that decompose under IDNA encoding (NFKC-normalization) into
+ characters that affect how the URL is parsed.</p>
+ <p>bpo-33529: Prevent fold function used in email header encoding from
+ entering infinite loop when there are too many non-ASCII characters in
+ a header.</p>
+ <p>bpo-35121: Don't send cookies of domain A without Domain attribute to
+ domain B when domain A is a suffix match of domain B while using a cookiejar
+ with http.cookiejar.DefaultCookiePolicy policy. Patch by Karthikeyan
+ Singaravelan.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://docs.python.org/3.6/whatsnew/changelog.html#python-3-6-9-final</url>
+ <cvename>CVE-2019-9948</cvename>
+ <cvename>CVE-2019-9740</cvename>
+ </references>
+ <dates>
+ <discovery>2019-03-13</discovery>
+ <entry>2019-07-08</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="3dd46e05-9fb0-11e9-bf65-00012e582166">
+ <topic>webkit2-gtk3 -- Multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>webkit2-gtk3</name>
+ <range><lt>2.24.2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The WebKitGTK project reports many vulnerabilities,
+ including several arbitrary code execution vulnerabilities.</p>
+ </body>
+ </description>
+ <references>
+ <url>https://webkitgtk.org/security/WSA-2019-0002.html</url>
+ <cvename>CVE-2019-6201</cvename>
+ <cvename>CVE-2019-6251</cvename>
+ <cvename>CVE-2019-7285</cvename>
+ <cvename>CVE-2019-7292</cvename>
+ <cvename>CVE-2019-8503</cvename>
+ <cvename>CVE-2019-8506</cvename>
+ <cvename>CVE-2019-8515</cvename>
+ <cvename>CVE-2019-8518</cvename>
+ <cvename>CVE-2019-8523</cvename>
+ <cvename>CVE-2019-8524</cvename>
+ <cvename>CVE-2019-8535</cvename>
+ <cvename>CVE-2019-8536</cvename>
+ <cvename>CVE-2019-8544</cvename>
+ <cvename>CVE-2019-8551</cvename>
+ <cvename>CVE-2019-8558</cvename>
+ <cvename>CVE-2019-8559</cvename>
+ <cvename>CVE-2019-8563</cvename>
+ <cvename>CVE-2019-11070</cvename>
+ <url>https://webkitgtk.org/security/WSA-2019-0003.html</url>
+ <cvename>CVE-2019-6237</cvename>
+ <cvename>CVE-2019-8571</cvename>
+ <cvename>CVE-2019-8583</cvename>
+ <cvename>CVE-2019-8584</cvename>
+ <cvename>CVE-2019-8586</cvename>
+ <cvename>CVE-2019-8587</cvename>
+ <cvename>CVE-2019-8594</cvename>
+ <cvename>CVE-2019-8595</cvename>
+ <cvename>CVE-2019-8596</cvename>
+ <cvename>CVE-2019-8597</cvename>
+ <cvename>CVE-2019-8601</cvename>
+ <cvename>CVE-2019-8607</cvename>
+ <cvename>CVE-2019-8608</cvename>
+ <cvename>CVE-2019-8609</cvename>
+ <cvename>CVE-2019-8610</cvename>
+ <cvename>CVE-2019-8615</cvename>
+ <cvename>CVE-2019-8611</cvename>
+ <cvename>CVE-2019-8619</cvename>
+ <cvename>CVE-2019-8622</cvename>
+ <cvename>CVE-2019-8623</cvename>
+ </references>
+ <dates>
+ <discovery>2019-04-10</discovery>
+ <entry>2019-07-06</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="3c5a4fe0-9ebb-11e9-9169-fcaa147e860e">
+ <topic>mediawiki -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>mediawiki131</name>
+ <range><lt>1.31.3</lt></range>
+ </package>
+ <package>
+ <name>mediawiki132</name>
+ <range><lt>1.32.3</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Mediawiki reports:</p>
+ <blockquote cite="https://lists.wikimedia.org/pipermail/mediawiki-announce/2019-June/000230.html">
+ <p>Security fixes:
+ T197279, CVE-2019-12468: Directly POSTing to Special:ChangeEmail would allow
+ for bypassing reauthentication, allowing for potential account takeover.
+ T204729, CVE-2019-12473: Passing invalid titles to the API could cause a DoS
+ by querying the entire `watchlist` table.
+ T207603, CVE-2019-12471: Loading user JavaScript from a non-existent account
+ allows anyone to create the account, and XSS the users' loading that script.
+ T208881: blacklist CSS var().
+ T199540, CVE-2019-12472: It is possible to bypass the limits on IP range
+ blocks (`$wgBlockCIDRLimit`) by using the API.
+ T212118, CVE-2019-12474: Privileged API responses that include whether a
+ recent change has been patrolled may be cached publicly.
+ T209794, CVE-2019-12467: A spammer can use Special:ChangeEmail to send out
+ spam with no rate limiting or ability to block them.
+ T25227, CVE-2019-12466: An account can be logged out without using a token(CRRF)
+ T222036, CVE-2019-12469: Exposed suppressed username or log in Special:EditTags.
+ T222038, CVE-2019-12470: Exposed suppressed log in RevisionDelete page.
+ T221739, CVE-2019-11358: Fix potential XSS in jQuery.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-11358</cvename>
+ <cvename>CVE-2019-12466</cvename>
+ <cvename>CVE-2019-12467</cvename>
+ <cvename>CVE-2019-12468</cvename>
+ <cvename>CVE-2019-12469</cvename>
+ <cvename>CVE-2019-12470</cvename>
+ <cvename>CVE-2019-12471</cvename>
+ <cvename>CVE-2019-12472</cvename>
+ <cvename>CVE-2019-12473</cvename>
+ <cvename>CVE-2019-12474</cvename>
+ <url>https://lists.wikimedia.org/pipermail/mediawiki-announce/2019-June/000230.html</url>
+ </references>
+ <dates>
+ <discovery>2019-04-23</discovery>
+ <entry>2019-07-05</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="b79ec16b-9da7-11e9-a0ea-a92fe7db4867">
+ <topic>ettercap -- out-of-bound read vulnerability</topic>
+ <affects>
+ <package>
+ <name>ettercap</name>
+ <range><lt>0.8.3,1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Ettercap GitHub issue:</p>
+ <blockquote cite="https://github.com/Ettercap/ettercap/issues/782">
+ <p>Etterfilter results in an invalid read of 8 bytes when parsing a crafted file.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://github.com/Ettercap/ettercap/issues/782</url>
+ <url>https://nvd.nist.gov/vuln/detail/CVE-2017-6430</url>
+ <cvename>CVE-2017-6430</cvename>
+ </references>
+ <dates>
+ <discovery>2019-07-01</discovery>
+ <entry>2019-07-03</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="4ea507d1-9da8-11e9-a759-001b217b3468">
+ <topic>Gitlab -- Multiple Vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>gitlab-ce</name>
+ <range><ge>12.0.0</ge><lt>12.0.3</lt></range>
+ <range><ge>11.11.0</ge><lt>11.11.5</lt></range>
+ <range><ge>8.3.0</ge><lt>11.10.8</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Gitlab reports:</p>
+ <blockquote cite="https://about.gitlab.com/2019/07/03/security-release-gitlab-12-dot-0-dot-3-released/">
+ <p>Ability to Write a Note to a Private Snippet</p>
+ <p>Recent Pipeline Information Disclosed to Unauthorised Users</p>
+ <p>Resource Exhaustion Attack</p>
+ <p>Error Caused by Encoded Characters in Comments</p>
+ <p>Authorization Issues in GraphQL</p>
+ <p>Number of Merge Requests was Accessible</p>
+ <p>Enabling One of the Service Templates Could Cause Resource Depletion</p>
+ <p>Broken Access Control for the Content of Personal Snippets</p>
+ <p>Decoding Color Codes Caused Resource Depletion</p>
+ <p>Merge Request Template Name Disclosure</p>
+ <p>SSRF Vulnerability in Project GitHub Integration</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://about.gitlab.com/2019/07/03/security-release-gitlab-12-dot-0-dot-3-released/</url>
+ <cvename>CVE-2019-13001</cvename>
+ <cvename>CVE-2019-13002</cvename>
+ <cvename>CVE-2019-13003</cvename>
+ <cvename>CVE-2019-13004</cvename>
+ <cvename>CVE-2019-13005</cvename>
+ <cvename>CVE-2019-13006</cvename>
+ <cvename>CVE-2019-13007</cvename>
+ <cvename>CVE-2019-13009</cvename>
+ <cvename>CVE-2019-13010</cvename>
+ <cvename>CVE-2019-13011</cvename>
+ <cvename>CVE-2019-13121</cvename>
+ </references>
+ <dates>
+ <discovery>2019-07-03</discovery>
+ <entry>2019-07-03</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="3394bc2b-9da4-11e9-951e-14dae9d5a9d2">
+ <topic>SDL2_image -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>sdl2_image</name>
+ <range><lt>2.0.5</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>SDL_image developers report:</p>
+ <blockquote cite="https://www.libsdl.org/projects/SDL_image/">
+ <p>Fixed a number of security issues:</p>
+ <ul>
+ <li>TALOS-2019-0820</li>
+ <li>TALOS-2019-0821</li>
+ <li>TALOS-2019-0841</li>
+ <li>TALOS-2019-0842</li>
+ <li>TALOS-2019-0843</li>
+ <li>TALOS-2019-0844</li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0820</url>
+ <url>https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0821</url>
+ <url>https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0841</url>
+ <url>https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0842</url>
+ <url>https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0843</url>
+ <url>https://www.talosintelligence.com/vulnerability_reports/TALOS-2019-0844</url>
+ <cvename>CVE-2019-5051</cvename>
+ <cvename>CVE-2019-5052</cvename>
+ <cvename>CVE-2019-5057</cvename>
+ <cvename>CVE-2019-5058</cvename>
+ <cvename>CVE-2019-5059</cvename>
+ <cvename>CVE-2019-5060</cvename>
+ </references>
+ <dates>
+ <discovery>2019-07-02</discovery>
+ <entry>2019-07-03</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="475f952c-9b29-11e9-a8a5-6805ca0b38e8">
+ <topic>irssi -- Use after free when sending SASL login to the server</topic>
+ <affects>
+ <package>
+ <name>irssi</name>
+ <range><lt>1.2.1,1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Irssi reports:</p>
+ <blockquote cite="https://irssi.org/security/irssi_sa_2019_06.txt">
+ <p>Use after free when sending SASL login to the server found by ilbelkyr. (CWE-416, CWE-825)</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://irssi.org/security/irssi_sa_2019_06.txt</url>
+ <cvename>CVE-2019-13045</cvename>
+ </references>
+ <dates>
+ <discovery>2019-06-29</discovery>
+ <entry>2019-07-01</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="b805d7b4-9c0c-11e9-97f0-000c29e96db4">
+ <topic>Django -- Incorrect HTTP detection with reverse-proxy connecting via HTTPS</topic>
+ <affects>
+ <package>
+ <name>py27-django111</name>
+ <name>py35-django111</name>
+ <name>py36-django111</name>
+ <name>py37-django111</name>
+ <range><lt>1.11.22</lt></range>
+ </package>
+ <package>
+ <name>py35-django21</name>
+ <name>py36-django21</name>
+ <name>py37-django21</name>
+ <range><lt>2.1.10</lt></range>
+ </package>
+ <package>
+ <name>py35-django22</name>
+ <name>py36-django22</name>
+ <name>py37-django22</name>
+ <range><lt>2.2.3</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Django security releases issued:</p>
+ <blockquote cite="https://www.djangoproject.com/weblog/2019/jul/01/security-releases/">
+ <p>When deployed behind a reverse-proxy connecting to Django via HTTPS,
+ django.http.HttpRequest.scheme would incorrectly detect client requests
+ made via HTTP as using HTTPS. This entails incorrect results for is_secure(),
+ and build_absolute_uri(), and that HTTP requests would not be redirected to
+ HTTPS in accordance with SECURE_SSL_REDIRECT.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-12781</cvename>
+ <url>https://www.djangoproject.com/weblog/2019/jul/01/security-releases/</url>
+ </references>
+ <dates>
+ <discovery>2019-07-01</discovery>
+ <entry>2019-07-01</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="4b6cb45d-881e-447a-a4e0-c97a954ea758">
+ <topic>bzip2 -- multiple issues</topic>
+ <affects>
+ <package>
+ <name>bzip2</name>
+ <range><lt>1.0.7</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>bzip2 developers reports:</p>
+ <blockquote cite="https://gitlab.com/federicomenaquintero/bzip2/blob/master/NEWS">
+ <p>CVE-2016-3189 - Fix use-after-free in bzip2recover (Jakub Martisko)</p>
+ <p>CVE-2019-12900 - Detect out-of-range nSelectors in corrupted files (Albert Astals Cid). Found through fuzzing karchive.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://gitlab.com/federicomenaquintero/bzip2/blob/master/NEWS</url>
+ <url>https://bugzilla.redhat.com/show_bug.cgi?id=1319648</url>
+ <cvename>CVE-2016-3189</cvename>
+ <cvename>CVE-2019-12900</cvename>
+ </references>
+ <dates>
+ <discovery>2019-06-23</discovery>
+ <entry>2019-06-30</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="1c21f6a3-9415-11e9-95ec-6805ca2fa271">
+ <topic>powerdns -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>powerdns</name>
+ <range><lt>4.1.10</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>PowerDNS Team reports:</p>
+ <blockquote cite="https://doc.powerdns.com/authoritative/changelog/4.1.html#change-4.1.10">
+ <p>CVE-2019-10162: An issue has been found in PowerDNS Authoritative Server allowing an authorized user to
+ cause the server to exit by inserting a crafted record in a MASTER type zone under their control. The
+ issue is due to the fact that the Authoritative Server will exit when it runs into a parsing error while
+ looking up the NS/A/AAAA records it is about to use for an outgoing notify.</p>
+ <p>CVE-2019-10163: An issue has been found in PowerDNS Authoritative Server allowing a remote, authorized
+ master server to cause a high CPU load or even prevent any further updates to any slave zone by sending
+ a large number of NOTIFY messages. Note that only servers configured as slaves are affected by this issue.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://doc.powerdns.com/authoritative/changelog/4.1.html#change-4.1.10</url>
+ <cvename>CVE-2019-10162</cvename>
+ <cvename>CVE-2019-10163</cvename>
+ </references>
+ <dates>
+ <discovery>2019-06-21</discovery>
+ <entry>2019-06-21</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="5e35cfba-9994-11e9-b07f-df5abf8b84d6">
+ <topic>TYPO3 -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>typo3-8-php71</name>
+ <name>typo3-8-php72</name>
+ <name>typo3-8-php73</name>
+ <range><lt>8.7.27</lt></range>
+ </package>
+ <package>
+ <name>typo3-9-php71</name>
+ <name>typo3-9-php72</name>
+ <name>typo3-9-php73</name>
+ <range><lt>9.5.8</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>TYPO3 news:</p>
+ <blockquote cite="https://typo3.org/article/typo3-958-and-8727-security-releases-published/">
+ <p>Please read the corresponding Security Advisories for details.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://typo3.org/article/typo3-958-and-8727-security-releases-published/</url>
+ <url>https://get.typo3.org/release-notes/8.7.27</url>
+ <url>https://get.typo3.org/release-notes/9.5.8</url>
+ <cvename>CVE-2019-10912</cvename>
+ <cvename>CVE-2019-12747</cvename>
+ <cvename>CVE-2019-12748</cvename>
+ </references>
+ <dates>
+ <discovery>2019-06-28</discovery>
+ <entry>2019-06-28</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="245629d4-991e-11e9-82aa-6cc21735f730">
+ <topic>PostgreSQL -- Stack-based buffer overflow via setting a password</topic>
+ <affects>
+ <package>
+ <name>postgresql11-server</name>
+ <range><lt>11.4</lt></range>
+ </package>
+ <package>
+ <name>postgresql10-server</name>
+ <range><lt>10.9</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The PostgreSQL project reports:</p>
+ <blockquote cite="https://www.postgresql.org/about/news/1949/">
+ <p>
+ An authenticated user could create a stack-based buffer overflow
+ by changing their own password to a purpose-crafted value. In addition
+ to the ability to crash the PostgreSQL server, this could be further
+ exploited to execute arbitrary code as the PostgreSQL operating system account.
+ </p>
+ <p>
+ Additionally, a rogue server could send a specifically crafted
+ message during the SCRAM authentication process and cause a libpq-enabled client
+ to either crash or execute arbitrary code as the client's operating system account.
+ </p>
+ <p>
+ This issue is fixed by upgrading and restarting your PostgreSQL
+ server as well as your libpq installations. All users running
+ PostgreSQL 10, 11, and 12 beta are encouraged to upgrade as soon as possible.
+ </p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.postgresql.org/about/news/1949/</url>
+ <cvename>CVE-2019-10164</cvename>
+ </references>
+ <dates>
+ <discovery>2019-06-20</discovery>
+ <entry>2019-06-27</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="6f15730d-94ea-11e9-a83e-641c67a117d8">
+ <topic>znc -- privilege escalation</topic>
+ <affects>
+ <package>
+ <name>znc</name>
+ <range><lt>1.7.4</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Mitre reports:</p>
+ <blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12816">
+ <p>Modules.cpp in ZNC before 1.7.4-rc1 allows remote authenticated
+ non-admin users to escalate privileges and execute arbitrary
+ code by loading a module with a crafted name.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-12816</cvename>
+ <url>https://wiki.znc.in/ChangeLog/1.7.4</url>
+ </references>
+ <dates>
+ <discovery>2019-06-13</discovery>
+ <entry>2019-06-22</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="49beb00f-a6e1-4a42-93df-9cb14b4c2bee">
+ <topic>Mozilla -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>thunderbird</name>
+ <range><lt>thunderbird-60.7.2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Mozilla Foundation reports:</p>
+ <blockquote cite="https://www.mozilla.org/en-US/security/advisories/mfsa2019-20/">
+ <h1>CVE-2019-11707: Type confusion in Array.pop</h1>
+ <p>A type confusion vulnerability can occur when manipulating
+ JavaScript objects due to issues in Array.pop. This can allow
+ for an exploitable crash. We are aware of targeted attacks in
+ the wild abusing this flaw.</p>
+ <h1>CVE-2019-11708: sandbox escape using Prompt:Open</h1>
+ <p>Insufficient vetting of parameters passed with the
+ Prompt:Open IPC message between child and parent processes can
+ result in the non-sandboxed parent process opening web content
+ chosen by a compromised child process. When combined with
+ additional vulnerabilities this could result in executing
+ arbitrary code on the user's computer.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.mozilla.org/en-US/security/advisories/mfsa2019-20/</url>
+ <cvename>CVE-2019-11707</cvename>
+ <cvename>CVE-2019-11708</cvename>
+ </references>
+ <dates>
+ <discovery>2019-06-20</discovery>
+ <entry>2019-06-21</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="39bc2294-ff32-4972-9ecb-b9f40b4ccb74">
+ <topic>Mozilla -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>firefox</name>
+ <range><lt>67.0.4,1</lt></range>
+ </package>
+ <package>
+ <name>waterfox</name>
+ <range><lt>56.2.12</lt></range>
+ </package>
+ <package>
+ <name>firefox-esr</name>
+ <range><lt>60.7.2,1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Mozilla Foundation reports:</p>
+ <blockquote cite="https://www.mozilla.org/en-US/security/advisories/mfsa2019-19/">
+ <h1>CVE-2019-11708: sandbox escape using Prompt:Open</h1>
+ <p>Insufficient vetting of parameters passed with the
+ Prompt:Open IPC message between child and parent processes
+ can result in the non-sandboxed parent process opening web
+ content chosen by a compromised child process. When combined
+ with additional vulnerabilities this could result in executing
+ arbitrary code on the user's computer.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.mozilla.org/en-US/security/advisories/mfsa2019-19/</url>
+ <cvename>CVE-2019-11708</cvename>
+ </references>
+ <dates>
+ <discovery>2019-06-20</discovery>
+ <entry>2019-06-21</entry>
+ <modified>2019-07-09</modified>
+ </dates>
+ </vuln>
+
+ <vuln vid="98f1241f-8c09-4237-ad0d-67fb4158ea7a">
+ <topic>Mozilla -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>thunderbird</name>
+ <range><lt>60.7.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Mozilla Foundation reports:</p>
+ <blockquote cite="https://www.mozilla.org/en-US/security/advisories/mfsa2019-17/">
+ <h1>CVE-2019-11703: Heap buffer overflow in icalparser.c</h1>
+ <p>A flaw in Thunderbird's implementation of iCal causes a heap
+ buffer overflow in parser_get_next_char when processing certain
+ email messages, resulting in a potentially exploitable crash.</p>
+ <h1>CVE-2019-11704: Heap buffer overflow in icalvalue.c</h1>
+ <p>A flaw in Thunderbird's implementation of iCal causes a heap
+ buffer overflow in icalmemory_strdup_and_dequote when processing
+ certain email messages, resulting in a potentially exploitable
+ crash.</p>
+ <h1>CVE-2019-11705: Stack buffer overflow in icalrecur.c</h1>
+ <p>A flaw in Thunderbird's implementation of iCal causes a stack
+ buffer overflow in icalrecur_add_bydayrules when processing
+ certain email messages, resulting in a potentially exploitable
+ crash.</p>
+ <h1>CVE-2019-11706: Type confusion in icalproperty.c</h1>
+ <p>A flaw in Thunderbird's implementation of iCal causes a type
+ confusion in icaltimezone_get_vtimezone_properties when
+ processing certain email messages, resulting in a crash.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.mozilla.org/en-US/security/advisories/mfsa2019-17/</url>
+ <cvename>CVE-2019-11703</cvename>
+ <cvename>CVE-2019-11704</cvename>
+ <cvename>CVE-2019-11705</cvename>
+ <cvename>CVE-2019-11706</cvename>
+ </references>
+ <dates>
+ <discovery>2019-06-13</discovery>
+ <entry>2019-06-21</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="5b218581-9372-11e9-8fc4-5404a68ad561">
+ <topic>vlc -- Double free in Matroska demuxer</topic>
+ <affects>
+ <package>
+ <name>vlc</name>
+ <range><lt>3.0.7.1,4</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The VLC project reports:</p>
+ <blockquote cite="http://git.videolan.org/?p=vlc.git;a=commit;h=81023659c7de5ac2637b4a879195efef50846102">
+ <p>mkv: Fix potential double free</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-12874</cvename>
+ <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12874</url>
+ <url>http://git.videolan.org/?p=vlc.git;a=commit;h=81023659c7de5ac2637b4a879195efef50846102</url>
+ </references>
+ <dates>
+ <discovery>2019-05-20</discovery>
+ <entry>2019-06-20</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="f2144530-936f-11e9-8fc4-5404a68ad561">
+ <topic>vlc -- Buffer overflow vulnerability</topic>
+ <affects>
+ <package>
+ <name>vlc</name>
+ <range><lt>3.0.7,4</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>zhangyang reports:</p>
+ <blockquote cite="https://hackerone.com/reports/484398">
+ <p>The ReadFrame function in the avi.c file uses a variable i_width_bytes,
+ which is obtained directly from the file. It is a signed integer.
+ It does not do a strict check before the memory operation(memmove, memcpy),
+ which may cause a buffer overflow.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-5439</cvename>
+ <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5439</url>
+ <url>https://hackerone.com/reports/484398</url>
+ </references>
+ <dates>
+ <discovery>2019-01-23</discovery>
+ <entry>2019-06-20</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="0cea6e0a-7a39-4dac-b3ec-dbc13d404f76">
+ <topic>mozilla -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>firefox</name>
+ <range><lt>67.0.3,1</lt></range>
+ </package>
+ <package>
+ <name>waterfox</name>
+ <range><lt>56.2.11</lt></range>
+ </package>
+ <package>
+ <name>firefox-esr</name>
+ <range><lt>60.7.1,1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Mozilla Foundation reports:</p>
+ <blockquote cite="https://www.mozilla.org/en-US/security/advisories/mfsa2019-18/">
+ <h1>CVE-2019-11707: Type confusion in Array.pop</h1>
+ <p>A type confusion vulnerability can occur when
+ manipulating JavaScript objects due to issues in
+ Array.pop. This can allow for an exploitable crash. We are
+ aware of targeted attacks in the wild abusing this flaw.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-11707</cvename>
+ <url>https://www.mozilla.org/security/advisories/mfsa2019-18/</url>
+ </references>
+ <dates>
+ <discovery>2019-06-18</discovery>
+ <entry>2019-06-19</entry>
+ <modified>2019-06-20</modified>
+ </dates>
+ </vuln>
+
+ <vuln vid="9c9023ff-9057-11e9-b764-00505632d232">
+ <topic>netatalk3 -- remote code execution vulnerability</topic>
+ <affects>
+ <package>
+ <name>netatalk3</name>
+ <range><lt>3.1.12,1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>NIST reports:</p>
+ <blockquote cite="https://nvd.nist.gov/vuln/detail/CVE-2018-1160">
+ <p>Netatalk before 3.1.12 is vulnerable to an out of bounds write in dsi_opensess.c. This is due to lack of bounds checking on attacker controlled data. A remote unauthenticated attacker can leverage this vulnerability to achieve arbitrary code execution.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://nvd.nist.gov/vuln/detail/CVE-2018-1160</url>
+ <url>https://medium.com/tenable-techblog/exploiting-an-18-year-old-bug-b47afe54172</url>
+ </references>
+ <dates>
+ <discovery>2018-11-10</discovery>
+ <entry>2019-06-16</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="82c07dfa-9016-11e9-af2f-712c38aa3e4c">
+ <topic>GraphicsMagick -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>GraphicsMagick</name>
+ <range><lt>1.3.32,1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>GraphicsMagick News:</p>
+ <blockquote cite="http://www.graphicsmagick.org/NEWS.html">
+ <p>Read "Security Fixes:" section for details.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://www.graphicsmagick.org/NEWS.html</url>
+ </references>
+ <dates>
+ <discovery>2019-06-15</discovery>
+ <entry>2019-06-16</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="d4fc4599-8f75-11e9-8d9f-3065ec8fd3ec">
+ <topic>chromium -- use after free</topic>
+ <affects>
+ <package>
+ <name>chromium</name>
+ <range><lt>75.0.3770.90</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Google Chrome Releases reports:</p>
+ <blockquote cite="https://chromereleases.googleblog.com/2019/06/stable-channel-update-for-desktop_13.html">
+ <p>[961413] High CVE-2019-5842: Use-after-free in Blink. Reported by BUGFENSE Anonymous Bug Bounties https://bugfense.io on 2019-05-09</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://chromereleases.googleblog.com/2019/06/stable-channel-update-for-desktop_13.html</url>
+ <cvename>CVE-2019-5842</cvename>
+ </references>
+ <dates>
+ <discovery>2019-05-09</discovery>
+ <entry>2019-06-15</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="a5681027-8e03-11e9-85f4-6805ca0b3d42">
+ <topic>phpMyAdmin -- CSRF vulnerability in login form</topic>
+ <affects>
+ <package>
+ <name>phpMyAdmin</name>
+ <name>phpMyAdmin-php56</name>
+ <name>phpMyAdmin-php70</name>
+ <name>phpMyAdmin-php71</name>
+ <name>phpMyAdmin-php72</name>
+ <range><lt>4.9.0</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The phpMyAdmin development team reports:</p>
+ <blockquote cite="https://www.phpmyadmin.net/security/PMASA-2019-4/">
+ <h3>Summary</h3>
+ <p>CSRF vulnerability in login form</p>
+
+ <h3>Description</h3>
+ <p>A vulnerability was found that allows an attacker to
+ trigger a CSRF attack against a phpMyAdmin user. The
+ attacker can trick the user, for instance through a broken
+ <code>&lt;img&gt;</code> tag pointing at the victim's
+ phpMyAdmin database, and the attacker can potentially
+ deliver a payload (such as a specific INSERT or DELETE
+ statement) through the victim.</p>
+
+ <h3>Severity</h3>
+ <p>We consider this vulnerability to be severe.</p>
+
+
+ <h3>Mitigation factor</h3> <p>Only the 'cookie'
+ auth_type is affected; users can temporary use
+ phpMyAdmin's http authentication as a workaround.</p>
+
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.phpmyadmin.net/security/PMASA-2019-4/</url>
+ <cvename>CVE-2019-12616</cvename>
+ </references>
+ <dates>
+ <discovery>2019-06-04</discovery>
+ <entry>2019-06-13</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="bbdb9713-8e09-11e9-87bc-002590acae31">
+ <topic>Vim/NeoVim -- Security vulnerability</topic>
+ <affects>
+ <package>
+ <name>vim</name>
+ <name>vim-console</name>
+ <name>vim-tiny</name>
+ <range><lt>8.1.1365</lt></range>
+ </package>
+ <package>
+ <name>neovim</name>
+ <range><lt>0.3.6</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Security releases for Vim/NeoVim:</p>
+ <blockquote cite="https://nvd.nist.gov/vuln/detail/CVE-2019-12735">
+ <p>Sandbox escape allows for arbitrary code execution.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://nvd.nist.gov/vuln/detail/CVE-2019-12735</url>
+ </references>
+ <dates>
+ <discovery>2019-05-22</discovery>
+ <entry>2019-06-13</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="13960f55-8d35-11e9-9ba0-4c72b94353b5">
+ <topic>mybb -- vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>mybb</name>
+ <range><lt>1.8.21</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>mybb Team reports:</p>
+ <blockquote cite="https://blog.mybb.com/2019/06/10/mybb-1-8-21-released-security-maintenance-release/">
+ <p>High risk: Theme import stylesheet name RCE</p>
+ <p>High risk: Nested video MyCode persistent XSS</p>
+ <p>Medium risk: Find Orphaned Attachments reflected XSS</p>
+ <p>Medium risk: Post edit reflected XSS</p>
+ <p>Medium risk: Private Messaging folders SQL injection</p>
+ <p>Low risk: Potential phar deserialization through Upload Path</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://blog.mybb.com/2019/06/10/mybb-1-8-21-released-security-maintenance-release/</url>
+ </references>
+ <dates>
+ <discovery>2019-06-10</discovery>
+ <entry>2019-06-12</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="ab099d2c-8c8c-11e9-8ba7-6451062f0f7a">
+ <topic>Flash Player -- arbitrary code execution</topic>
+ <affects>
+ <package>
+ <name>linux-flashplayer</name>
+ <range><lt>32.0.0.207</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Adobe reports:</p>
+ <blockquote cite="https://helpx.adobe.com/security/products/flash-player/apsb19-30.html">
+ <ul>
+ <li>This update resolves a use-after-free vulnerability that
+ could lead to arbitrary code execution (CVE-2019-7845).</li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-7845</cvename>
+ <url>https://helpx.adobe.com/security/products/flash-player/apsb19-30.html</url>
+ </references>
+ <dates>
+ <discovery>2019-06-11</discovery>
+ <entry>2019-06-11</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="9b8a52fc-89c1-11e9-9ba0-4c72b94353b5">
+ <topic>drupal -- Drupal core - Moderately critical</topic>
+ <affects>
+ <package>
+ <name>drupal7</name>
+ <range><lt>7.67</lt></range>
+ </package>
+ <package>
+ <name>drupal8</name>
+ <range><lt>8.7.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Drupal Security Team reports:</p>
+ <blockquote cite="https://www.drupal.org/SA-CORE-2019-007">
+ <p>CVE-2019-11831: By-passing protection of Phar Stream Wrapper Interceptor.</p>
+ <p>In order to intercept file invocations like file_exists or stat on compromised Phar archives
+ the base name has to be determined and checked before allowing to be handled by PHP
+ Phar stream handling.
+ The current implementation is vulnerable to path traversal leading to scenarios where the
+ Phar archive to be assessed is not the actual (compromised) file.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.drupal.org/SA-CORE-2019-007</url>
+ </references>
+ <dates>
+ <discovery>2019-05-08</discovery>
+ <entry>2019-06-08</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="45bea6b5-8855-11e9-8d41-97657151f8c2">
+ <topic>Exim -- RCE in deliver_message() function</topic>
+ <affects>
+ <package>
+ <name>exim</name>
+ <range><ge>4.87</ge><lt>4.92</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Exim team and Qualys report:</p>
+ <blockquote cite="https://www.exim.org/static/doc/security/CVE-2019-10149.txt">
+ <p>
+ We received a report of a possible remote exploit. Currently there is no evidence of an active use of this exploit.
+ </p>
+ <p>
+ A patch exists already, is being tested, and backported to all
+ versions we released since (and including) 4.87.
+ </p>
+ <p>
+ The severity depends on your configuration. It depends on how close to
+ the standard configuration your Exim runtime configuration is. The
+ closer the better.
+ </p>
+ <p>
+ Exim 4.92 is not vulnerable.
+ </p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-10149</cvename>
+ <url>https://www.exim.org/static/doc/security/CVE-2019-10149.txt</url>
+ </references>
+ <dates>
+ <discovery>2019-05-27</discovery>
+ <entry>2019-06-06</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="ffc73e87-87f0-11e9-ad56-fcaa147e860e">
+ <topic>Django -- AdminURLFieldWidget XSS</topic>
+ <affects>
+ <package>
+ <name>py27-django111</name>
+ <name>py35-django111</name>
+ <name>py36-django111</name>
+ <name>py37-django111</name>
+ <range><lt>1.11.21</lt></range>
+ </package>
+ <package>
+ <name>py35-django21</name>
+ <name>py36-django21</name>
+ <name>py37-django21</name>
+ <range><lt>2.1.9</lt></range>
+ </package>
+ <package>
+ <name>py35-django22</name>
+ <name>py36-django22</name>
+ <name>py37-django22</name>
+ <range><lt>2.2.2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Django security releases issued:</p>
+ <blockquote cite="https://www.djangoproject.com/weblog/2019/jun/03/security-releases/">
+ <p>The clickable "Current URL" link generated by AdminURLFieldWidget displayed the
+ provided value without validating it as a safe URL. Thus, an unvalidated value stored
+ in the database, or a value provided as a URL query parameter payload, could result
+ in an clickable JavaScript link..</p>
+ <p>jQuery before 3.4.0, mishandles jQuery.extend(true, {}, ...) because of Object.prototype
+ pollution. If an unsanitized source object contained an enumerable __proto__ property,
+ it could extend the native Object.prototype.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-12308</cvename>
+ <cvename>CVE-2019-11358</cvename>
+ <url>https://www.djangoproject.com/weblog/2019/jun/03/security-releases/</url>
+ </references>
+ <dates>
+ <discovery>2019-06-03</discovery>
+ <entry>2019-06-06</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="4091069e-860b-11e9-a05f-001b217b3468">
+ <topic>Gitlab -- Multiple Vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>gitlab-ce</name>
+ <range><ge>11.11.0</ge><lt>11.11.1</lt></range>
+ <range><ge>11.10.0</ge><lt>11.10.5</lt></range>
+ <range><ge>6.8.0</ge><lt>11.9.12</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Gitlab reports:</p>
+ <blockquote cite="https://about.gitlab.com/2019/06/03/security-release-gitlab-11-dot-11-dot-1-released/">
+ <p>Remote Command Execution Vulnerability on Repository Download Feature</p>
+ <p>Confidential Issue Titles Revealed to Restricted Users on Unsubscribe</p>
+ <p>Disclosure of Milestone Metadata through the Search API</p>
+ <p>Private Project Discovery via Comment Links</p>
+ <p>Metadata of Confidential Issues Disclosed to Restricted Users</p>
+ <p>Mandatory External Authentication Provider Sign-In Restrictions Bypass</p>
+ <p>Internal Projects Allowed to Be Created on in Private Groups</p>
+ <p>Server-Side Request Forgery Through DNS Rebinding</p>
+ <p>Stored Cross-Site Scripting on Wiki Pages</p>
+ <p>Stored Cross-Site Scripting on Notes</p>
+ <p>Repository Password Disclosed on Import Error Page</p>
+ <p>Protected Branches Restriction Rules Bypass</p>
+ <p>Stored Cross-Site Scripting Vulnerability on Child Epics</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://about.gitlab.com/2019/06/03/security-release-gitlab-11-dot-11-dot-1-released/</url>
+ <cvename>CVE-2019-12430</cvename>
+ <cvename>CVE-2019-12432</cvename>
+ <cvename>CVE-2019-12431</cvename>
+ <cvename>CVE-2019-12434</cvename>
+ <cvename>CVE-2019-12429</cvename>
+ <cvename>CVE-2019-12428</cvename>
+ <cvename>CVE-2019-12433</cvename>
+ <cvename>CVE-2019-12443</cvename>
+ <cvename>CVE-2019-12444</cvename>
+ <cvename>CVE-2019-12445</cvename>
+ <cvename>CVE-2019-12446</cvename>
+ <cvename>CVE-2019-12441</cvename>
+ <cvename>CVE-2019-12442</cvename>
+ </references>
+ <dates>
+ <discovery>2019-06-03</discovery>
+ <entry>2019-06-03</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="ada8db8a-8471-11e9-8170-0050562a4d7b">
+ <topic>buildbot -- OAuth Authentication Vulnerability</topic>
+ <affects>
+ <package>
+ <name>py27-buildbot</name>
+ <name>py35-buildbot</name>
+ <name>py36-buildbot</name>
+ <name>py37-buildbot</name>
+ <range><lt>2.3.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <blockquote cite="https://github.com/buildbot/buildbot/wiki/OAuth-vulnerability-in-using-submitted-authorization-token-for-authentication">
+ <p>Buildbot accepted user-submitted authorization token from OAuth and used
+ it to authenticate user.</p>
+ <p>The vulnerability can lead to malicious attackers to authenticate as legitimate users
+ of a Buildbot instance without knowledge of the victim's login credentials on certain
+ scenarios.</p>
+ <p>If an attacker has an application authorized to access data of another user at the
+ same Identity Provider as the used by the Buildbot instance, then he can acquire a token
+ to access the data of that user, supply the token to the Buildbot instance and successfully
+ login as the victim.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://github.com/buildbot/buildbot/wiki/OAuth-vulnerability-in-using-submitted-authorization-token-for-authentication</url>
+ <url>https://github.com/buildbot/buildbot/pull/4763</url>
+ <cvename>CVE-2019-12300</cvename>
+ </references>
+ <dates>
+ <discovery>2019-05-07</discovery>
+ <entry>2019-06-01</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="177fa455-48fc-4ded-ba1b-9975caa7f62a">
+ <topic>bro -- Unsafe integer conversions can cause unintentional code paths to be executed</topic>
+ <affects>
+ <package>
+ <name>bro</name>
+ <range><lt>2.6.2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Jon Siwek of Corelight reports:</p>
+ <blockquote cite="https://raw.githubusercontent.com/zeek/zeek/bb979702cf9a2fa67b8d1a1c7f88d0b56c6af104/NEWS">
+ <p>The following Denial of Service vulnerabilities are addressed:</p>
+ <ul>
+ <li>Integer type mismatches in BinPAC-generated parser code
+ and Bro analyzer code may allow for crafted packet data
+ to cause unintentional code paths in the analysis logic
+ to be taken due to unsafe integer conversions causing the
+ parser and analysis logic to each expect different fields
+ to have been parsed. One such example, reported by Maksim
+ Shudrak, causes the Kerberos analyzer to dereference a
+ null pointer. CVE-2019-12175 was assigned for this issue.</li>
+
+ <li>The Kerberos parser allows for several fields to be left
+ uninitialized, but they were not marked with an &amp;optional
+ attribute and several usages lacked existence checks.
+ Crafted packet data could potentially cause an attempt
+ to access such uninitialized fields, generate a runtime
+ error/exception, and leak memory. Existence checks and
+ &amp;optional attributes have been added to the relevent
+ Kerberos fields.</li>
+
+ <li>BinPAC-generated protocol parsers commonly contain fields
+ whose length is derived from other packet input, and for
+ those that allow for incremental parsing, BinPAC did not
+ impose a limit on how large such a field could grow,
+ allowing for remotely-controlled packet data to cause
+ growth of BinPAC's flowbuffer bounded only by the numeric
+ limit of an unsigned 64-bit integer, leading to memory
+ exhaustion. There is now a generalized limit for how
+ large flowbuffers are allowed to grow, tunable by setting
+ "BinPAC::flowbuffer_capacity_max".</li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2017-12175</cvename>
+ </references>
+ <dates>
+ <discovery>2019-05-29</discovery>
+ <entry>2019-05-31</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="183d700e-ec70-487e-a9c4-632324afa934">
+ <topic>ImageMagick -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>ImageMagick7</name>
+ <range><lt>7.0.8.47</lt></range>
+ </package>
+ <package>
+ <name>ImageMagick7-nox11</name>
+ <range><lt>7.0.8.47</lt></range>
+ </package>
+ <package>
+ <name>ImageMagick6</name>
+ <range><lt>6.9.10.47,1</lt></range>
+ </package>
+ <package>
+ <name>ImageMagick6-nox11</name>
+ <range><lt>6.9.10.47,1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>cvedetails.com reports:</p>
+ <blockquote cite="https://www.cvedetails.com/vulnerability-list/vendor_id-1749/Imagemagick.html">
+ <p>CVE-2019-7175: In ImageMagick before 7.0.8-25, some memory leaks exist in DecodeImage in coders/pcd.c.</p>
+ <p>CVE-2019-7395: In ImageMagick before 7.0.8-25, a memory leak exists in WritePSDChannel in coders/psd.c.</p>
+ <p>CVE-2019-7396: In ImageMagick before 7.0.8-25, a memory leak exists in ReadSIXELImage in coders/sixel.c.</p>
+ <p>CVE-2019-7397: In ImageMagick before 7.0.8-25 and GraphicsMagick through 1.3.31, several memory leaks exist in WritePDFImage in coders/pdf.c.</p>
+ <p>CVE-2019-7398: In ImageMagick before 7.0.8-25, a memory leak exists in WriteDIBImage in coders/dib.c.</p>
+ <p>CVE-2019-9956: In ImageMagick 7.0.8-35 Q16, there is a stack-based buffer overflow in the function PopHexPixel of coders/ps.c, which allows an attacker to cause a denial of service or code execution via a crafted image file.</p>
+ <p>CVE-2019-10131: An off-by-one read vulnerability was discovered in ImageMagick before version 7.0.7-28 in the formatIPTCfromBuffer function in coders/meta.c. A local attacker may use this flaw to read beyond the end of the buffer or to crash the program.</p>
+ <p>CVE-2019-10649: In ImageMagick 7.0.8-36 Q16, there is a memory leak in the function SVGKeyValuePairs of coders/svg.c, which allows an attacker to cause a denial of service via a crafted image file.</p>
+ <p>CVE-2019-10650: In ImageMagick 7.0.8-36 Q16, there is a heap-based buffer over-read in the function WriteTIFFImage of coders/tiff.c, which allows an attacker to cause a denial of service or information disclosure via a crafted image file.</p>
+ <p>CVE-2019-10714: LocaleLowercase in MagickCore/locale.c in ImageMagick before 7.0.8-32 allows out-of-bounds access, leading to a SIGSEGV.</p>
+ <p>CVE-2019-11470: The cineon parsing component in ImageMagick 7.0.8-26 Q16 allows attackers to cause a denial-of-service (uncontrolled resource consumption) by crafting a Cineon image with an incorrect claimed image size. This occurs because ReadCINImage in coders/cin.c lacks a check for insufficient image data in a file.</p>
+ <p>CVE-2019-11472: ReadXWDImage in coders/xwd.c in the XWD image parsing component of ImageMagick 7.0.8-41 Q16 allows attackers to cause a denial-of-service (divide-by-zero error) by crafting an XWD image file in which the header indicates neither LSB first nor MSB first.</p>
+ <p>CVE-2019-11597: In ImageMagick 7.0.8-43 Q16, there is a heap-based buffer over-read in the function WriteTIFFImage of coders/tiff.c, which allows an attacker to cause a denial of service or possibly information disclosure via a crafted image file.</p>
+ <p>CVE-2019-11598: In ImageMagick 7.0.8-40 Q16, there is a heap-based buffer over-read in the function WritePNMImage of coders/pnm.c, which allows an attacker to cause a denial of service or possibly information disclosure via a crafted image file. This is related to SetGrayscaleImage in MagickCore/quantize.c.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.cvedetails.com/vulnerability-list/vendor_id-1749/Imagemagick.html</url>
+ <cvename>CVE-2019-7175</cvename>
+ <cvename>CVE-2019-7395</cvename>
+ <cvename>CVE-2019-7396</cvename>
+ <cvename>CVE-2019-7397</cvename>
+ <cvename>CVE-2019-7398</cvename>
+ <cvename>CVE-2019-9956</cvename>
+ <cvename>CVE-2019-10131</cvename>
+ <cvename>CVE-2019-10649</cvename>
+ <cvename>CVE-2019-10650</cvename>
+ <cvename>CVE-2019-10714</cvename>
+ <cvename>CVE-2019-11470</cvename>
+ <cvename>CVE-2019-11472</cvename>
+ <cvename>CVE-2019-11597</cvename>
+ <cvename>CVE-2019-11598</cvename>
+ </references>
+ <dates>
+ <discovery>2019-03-07</discovery>
+ <entry>2019-05-30</entry>
+ <modified>2019-06-17</modified>
+ </dates>
+ </vuln>
+
+ <vuln vid="10fd731c-8088-11e9-b6ae-001871ec5271">
+ <topic>cyrus-imapd -- buffer overrun in httpd</topic>
+ <affects>
+ <package>
+ <name>cyrus-imapd30</name>
+ <range><ge>3.0.0</ge><lt>3.0.10</lt></range>
+ </package>
+ <package>
+ <name>cyrus-imapd25</name>
+ <range><ge>2.5.0</ge><lt>2.5.13</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Cyrus IMAP 3.0.10 Release Notes states:</p>
+ <blockquote cite="https://www.cyrusimap.org/imap/download/release-notes/3.0/x/3.0.10.html">
+ <p>Fixed CVE-2019-11356: buffer overrun in httpd</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-11356</cvename>
+ <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11356</url>
+ </references>
+ <dates>
+ <discovery>2019-04-19</discovery>
+ <entry>2019-05-27</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="3ba87032-7fbd-11e9-8a5f-c85b76ce9b5a">
+ <topic>serendipity -- XSS</topic>
+ <affects>
+ <package>
+ <name>serendipity</name>
+ <range><lt>2.1.5</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>MITRE:</p>
+ <blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-11870">
+ <p>Serendipity before 2.1.5 has XSS via EXIF data that is mishandled in the templates/2k11/admin/media_choose.tpl Editor Preview feature or the templates/2k11/admin/media_items.tpl Media Library feature.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://blog.s9y.org/archives/282-Serendipity-2.1.5-released.html</url>
+ <cvename>CVE-2019-11870</cvename>
+ </references>
+ <dates>
+ <discovery>2019-05-01</discovery>
+ <entry>2019-05-26</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="36b905ad-7fbb-11e9-8a5f-c85b76ce9b5a">
+ <topic>sqlite3 -- use after free</topic>
+ <affects>
+ <package>
+ <name>sqlite3</name>
+ <range><eq>3.26.0</eq></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>MITRE reports:</p>
+ <blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5018">
+ <p>An exploitable use after free vulnerability exists in the window function functionality of Sqlite3 3.26.0. A specially crafted SQL command can cause a use after free vulnerability, potentially resulting in remote code execution. An attacker can send a malicious SQL command to trigger this vulnerability.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://talosintelligence.com/vulnerability_reports/TALOS-2019-0777</url>
+ <cvename>CVE-2019-5018</cvename>
+ </references>
+ <dates>
+ <discovery>2019-05-09</discovery>
+ <entry>2019-05-26</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="3b903bf3-7f94-11e9-8a5f-c85b76ce9b5a">
+ <topic>suricata -- buffer over-read</topic>
+ <affects>
+ <package>
+ <name>suricata</name>
+ <range><lt>4.1.4</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Mitre reports:</p>
+ <blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10053">
+ <p>An issue was discovered in Suricata 4.1.x before 4.1.4. If the input of the function SSHParseBanner is composed only of a \n character, then the program runs into a heap-based buffer over-read. This occurs because the erroneous search for \r results in an integer underflow.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://suricata-ids.org/2019/04/30/suricata-4-1-4-released/</url>
+ <cvename>CVE-2019-10053</cvename>
+ </references>
+ <dates>
+ <discovery>2019-03-15</discovery>
+ <entry>2019-05-26</entry>
+ <modified>2019-05-26</modified>
+ </dates>
+ </vuln>
+
+ <vuln vid="dd343a2b-7ee7-11e9-a290-8ddc52868fa9">
+ <topic>curl -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>curl</name>
+ <range><ge>7.19.4</ge><lt>7.65.0</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>curl security problems:</p>
+ <blockquote cite="https://curl.haxx.se/docs/security.html">
+ <p>CVE-2019-5435: Integer overflows in curl_url_set()</p>
+ <p>libcurl contains two integer overflows in the curl_url_set()
+ function that if triggered, can lead to a too small buffer
+ allocation and a subsequent heap buffer overflow.</p>
+ <p>The flaws only exist on 32 bit architectures and require
+ excessive string input lengths.</p>
+ <p>CVE-2019-5436: TFTP receive buffer overflow</p>
+ <p>libcurl contains a heap buffer overflow in the function
+ (tftp_receive_packet()) that recevives data from a TFTP server. It
+ calls recvfrom() with the default size for the buffer rather than
+ with the size that was used to allocate it. Thus, the content that
+ might overwrite the heap memory is entirely controlled by the server.</p>
+ <p>The flaw exists if the user selects to use a "blksize" of 504 or
+ smaller (default is 512). The smaller size that is used, the larger
+ the possible overflow becomes.</p>
+ <p>Users chosing a smaller size than default should be rare as the
+ primary use case for changing the size is to make it larger.</p>
+ <p>It is rare for users to use TFTP across the Internet. It is most
+ commonly used within local networks.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://curl.haxx.se/docs/security.html</url>
+ <url>https://curl.haxx.se/docs/CVE-2019-5435.html</url>
+ <url>https://curl.haxx.se/docs/CVE-2019-5436.html</url>
+ <cvename>CVE-2019-5435</cvename>
+ <cvename>CVE-2019-5436</cvename>
+ </references>
+ <dates>
+ <discovery>2019-05-22</discovery>
+ <entry>2019-05-25</entry>
+ <modified>2019-05-26</modified>
+ </dates>
+ </vuln>
+
+ <vuln vid="8d2af843-7d8e-11e9-8464-c85b76ce9b5a">
+ <topic>OCaml -- Multiple Security Vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>ocaml</name>
+ <range><lt>4.03.0</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>MITRE reports:</p>
+ <blockquote cite="INSERT URL HERE">
+ <p>OCaml before 4.03.0 does not properly handle sign extensions, which allows remote attackers to conduct buffer overflow attacks or obtain sensitive information as demonstrated by a long string to the String.copy function.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://nvd.nist.gov/vuln/detail/CVE-2015-8869</url>
+ <url>https://github.com/ocaml/ocaml/commit/659615c7b100a89eafe6253e7a5b9d84d0e8df74#diff-a97df53e3ebc59bb457191b496c90762</url>
+ <cvename>CVE-2015-8869</cvename>
+ </references>
+ <dates>
+ <discovery>2016-06-13</discovery>
+ <entry>2019-05-23</entry>
+ <modified>2019-05-26</modified>
+ </dates>
+ </vuln>
+
+ <vuln vid="44b6dfbf-4ef7-4d52-ad52-2b1b05d81272">
+ <topic>mozilla -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>firefox</name>
+ <range><lt>67.0,1</lt></range>
+ </package>
+ <package>
+ <name>waterfox</name>
+ <range><lt>56.2.10</lt></range>
+ </package>
+ <package>
+ <name>seamonkey</name>
+ <name>linux-seamonkey</name>
+ <range><lt>2.53.0</lt></range>
+ </package>
+ <package>
+ <name>firefox-esr</name>
+ <range><lt>60.7.0,1</lt></range>
+ </package>
+ <package>
+ <name>linux-firefox</name>
+ <range><lt>60.7.0,2</lt></range>
+ </package>
+ <package>
+ <name>libxul</name>
+ <name>thunderbird</name>
+ <name>linux-thunderbird</name>
+ <range><lt>60.7.0</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Mozilla Foundation reports:</p>
+ <blockquote cite="https://www.mozilla.org/en-US/security/advisories/mfsa2019-13/">
+ <p>CVE-2019-9815: Disable hyperthreading on content JavaScript threads on macOS</p>
+ <p>CVE-2019-9816: Type confusion with object groups and UnboxedObjects</p>
+ <p>CVE-2019-9817: Stealing of cross-domain images using canvas</p>
+ <p>CVE-2019-9818: Use-after-free in crash generation server</p>
+ <p>CVE-2019-9819: Compartment mismatch with fetch API</p>
+ <p>CVE-2019-9820: Use-after-free of ChromeEventHandler by DocShell</p>
+ <p>CVE-2019-9821: Use-after-free in AssertWorkerThread</p>
+ <p>CVE-2019-11691: Use-after-free in XMLHttpRequest</p>
+ <p>CVE-2019-11692: Use-after-free removing listeners in the event listener manager</p>
+ <p>CVE-2019-11693: Buffer overflow in WebGL bufferdata on Linux</p>
+ <p>CVE-2019-7317: Use-after-free in png_image_free of libpng library</p>
+ <p>CVE-2019-11694: Uninitialized memory memory leakage in Windows sandbox</p>
+ <p>CVE-2019-11695: Custom cursor can render over user interface outside of web content</p>
+ <p>CVE-2019-11696: Java web start .JNLP files are not recognized as executable files for download prompts</p>
+ <p>CVE-2019-11697: Pressing key combinations can bypass installation prompt delays and install extensions</p>
+ <p>CVE-2019-11698: Theft of user history data through drag and drop of hyperlinks to and from bookmarks</p>
+ <p>CVE-2019-11700: res: protocol can be used to open known local files</p>
+ <p>CVE-2019-11699: Incorrect domain name highlighting during page navigation</p>
+ <p>CVE-2019-11701: webcal: protocol default handler loads vulnerable web page</p>
+ <p>CVE-2019-9814: Memory safety bugs fixed in Firefox 67</p>
+ <p>CVE-2019-9800: Memory safety bugs fixed in Firefox 67 and Firefox ESR 60.7</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-9815</cvename>
+ <cvename>CVE-2019-9816</cvename>
+ <cvename>CVE-2019-9817</cvename>
+ <cvename>CVE-2019-9818</cvename>
+ <cvename>CVE-2019-9819</cvename>
+ <cvename>CVE-2019-9820</cvename>
+ <cvename>CVE-2019-9821</cvename>
+ <cvename>CVE-2019-11691</cvename>
+ <cvename>CVE-2019-11692</cvename>
+ <cvename>CVE-2019-11693</cvename>
+ <cvename>CVE-2019-7317</cvename>
+ <cvename>CVE-2019-11694</cvename>
+ <cvename>CVE-2019-11695</cvename>
+ <cvename>CVE-2019-11696</cvename>
+ <cvename>CVE-2019-11697</cvename>
+ <cvename>CVE-2019-11698</cvename>
+ <cvename>CVE-2019-11700</cvename>
+ <cvename>CVE-2019-11699</cvename>
+ <cvename>CVE-2019-11701</cvename>
+ <cvename>CVE-2019-9814</cvename>
+ <cvename>CVE-2019-9800</cvename>
+ <url>https://www.mozilla.org/security/advisories/mfsa2019-13/</url>
+ <url>https://www.mozilla.org/security/advisories/mfsa2019-14/</url>
+ <url>https://www.mozilla.org/security/advisories/mfsa2019-15/</url>
+ </references>
+ <dates>
+ <discovery>2019-05-21</discovery>
+ <entry>2019-05-22</entry>
+ <modified>2019-07-23</modified>
+ </dates>
+ </vuln>
+
+ <vuln vid="793a0072-7822-11e9-81e2-005056a311d1">
+ <topic>samba -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>samba46</name>
+ <range><le>4.6.16</le></range>
+ </package>
+ <package>
+ <name>samba47</name>
+ <range><le>4.7.12</le></range>
+ </package>
+ <package>
+ <name>samba48</name>
+ <range><lt>4.8.12</lt></range>
+ </package>
+ <package>
+ <name>samba49</name>
+ <range><lt>4.9.8</lt></range>
+ </package>
+ <package>
+ <name>samba410</name>
+ <range><lt>4.10.3</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The samba project reports:</p>
+ <blockquote cite="https://www.samba.org/samba/security/CVE-2018-16860.html">
+ <p>The checksum validation in the S4U2Self handler in the embedded Heimdal KDC
+ did not first confirm that the checksum was keyed, allowing replacement of the
+ requested target (client) principal</p>
+ </blockquote>
+ <blockquote cite="https://www.samba.org/samba/security/CVE-2019-3880.html">
+ <p>Authenticated users with write permission can trigger a symlink traversal to write
+ or detect files outside the Samba share.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.samba.org/samba/security/CVE-2018-16860.html</url>
+ <cvename>CVE-2018-16860</cvename>
+ <url>https://www.samba.org/samba/security/CVE-2019-3880.html</url>
+ <cvename>CVE-2019-3880</cvename>
+ </references>
+ <dates>
+ <discovery>2019-05-14</discovery>
+ <entry>2019-05-14</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="37528379-76a8-11e9-a4fd-00012e582166">
+ <topic>Rust -- violation of Rust's safety guarantees</topic>
+ <affects>
+ <package>
+ <name>rust</name>
+ <range><ge>1.34.0</ge><lt>1.34.2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Sean McArthur reports:</p>
+ <blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12083">
+ <p>
+ The Rust Programming Language Standard Library 1.34.x
+ before 1.34.2 contains a stabilized method which, if
+ overridden, can violate Rust's safety guarantees and
+ cause memory unsafety. If the Error::type_id method
+ is overridden then any type can be safely cast to any
+ other type, causing memory safety vulnerabilities in
+ safe code (e.g., out-of-bounds write or read). Code
+ that does not manually implement Error::type_id is
+ unaffected.
+ </p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://blog.rust-lang.org/2019/05/13/Security-advisory.html</url>
+ <cvename>CVE-2019-12083</cvename>
+ </references>
+ <dates>
+ <discovery>2019-05-09</discovery>
+ <entry>2019-05-15</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="a99923a9-768c-11e9-885a-6451062f0f7a">
+ <topic>Flash Player -- arbitrary code execution</topic>
+ <affects>
+ <package>
+ <name>linux-flashplayer</name>
+ <range><lt>32.0.0.192</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Adobe reports:</p>
+ <blockquote cite="https://helpx.adobe.com/security/products/flash-player/apsb19-26.html">
+ <ul>
+ <li>This update resolves a use-after-free vulnerability that
+ could lead to arbitrary code execution (CVE-2019-7837).</li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-7837</cvename>
+ <url>https://helpx.adobe.com/security/products/flash-player/apsb19-26.html</url>
+ </references>
+ <dates>
+ <discovery>2019-05-14</discovery>
+ <entry>2019-05-14</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="c2d1693b-73cb-11e9-a1c7-b499baebfeaf">
+ <topic>PHP -- Multiple vulnerabilities in EXIF module</topic>
+ <affects>
+ <package>
+ <name>php71-exif</name>
+ <range><lt>7.1.28</lt></range>
+ </package>
+ <package>
+ <name>php72-exif</name>
+ <range><lt>7.2.17</lt></range>
+ </package>
+ <package>
+ <name>php73-exif</name>
+ <range><lt>7.3.4</lt></range>
+ </package>
+
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The PHP project reports:</p>
+ <blockquote cite="https://www.php.net/ChangeLog-7.php">
+ <p>Heap-buffer-overflow in php_ifd_get32s (CVE-2019-11034)</p>
+ <p>Heap-buffer-overflow in exif_iif_add_value (CVE-2019-11035)</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.php.net/ChangeLog-7.php</url>
+ <cvename>CVE-2019-11034</cvename>
+ <cvename>CVE-2019-11035</cvename>
+ </references>
+ <dates>
+ <discovery>2019-04-04</discovery>
+ <entry>2019-05-11</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="065890c3-725e-11e9-b0e1-6cc21735f730">
+ <topic>PostgreSQL -- Selectivity estimators bypass row security policies</topic>
+ <affects>
+ <package>
+ <name>postgresql11-server</name>
+ <range><lt>11.3</lt></range>
+ </package>
+ <package>
+ <name>postgresql10-server</name>
+ <range><lt>10.8</lt></range>
+ </package>
+ <package>
+ <name>postgresql96-server</name>
+ <range><lt>9.6.13</lt></range>
+ </package>
+ <package>
+ <name>postgresql95-server</name>
+ <range><lt>9.5.17</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The PostgreSQL project reports:</p>
+ <blockquote cite="https://www.postgresql.org/about/news/1939/">
+ <p>
+ PostgreSQL maintains statistics for tables by sampling
+ data available in columns; this data is consulted during
+ the query planning process. Prior to this release, a user
+ able to execute SQL queries with permissions to read a
+ given column could craft a leaky operator that could
+ read whatever data had been sampled from that column.
+ If this happened to include values from rows that the user
+ is forbidden to see by a row security policy, the user
+ could effectively bypass the policy. This is fixed by only
+ allowing a non-leakproof operator to use this data if
+ there are no relevant row security policies for the table.
+ </p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.postgresql.org/about/news/1939/</url>
+ <cvename>CVE-2019-10130</cvename>
+ </references>
+ <dates>
+ <discovery>2019-05-09</discovery>
+ <entry>2019-05-09</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="e66a5440-7258-11e9-b0e1-6cc21735f730">
+ <topic>PostgreSQL -- Memory disclosure in partition routing</topic>
+ <affects>
+ <package>
+ <name>postgresql11-server</name>
+ <range><lt>11.3</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The PostgreSQL project reports:</p>
+ <blockquote cite="https://www.postgresql.org/about/news/1939/">
+ <p>
+ Prior to this release, a user running PostgreSQL 11 can read
+ arbitrary bytes of server memory by executing a purpose-crafted
+ INSERT statement to a partitioned table.
+ </p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.postgresql.org/about/news/1939/</url>
+ <cvename>CVE-2019-10129</cvename>
+ </references>
+ <dates>
+ <discovery>2019-05-09</discovery>
+ <entry>2019-05-09</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="a1de4ae9-6fda-11e9-9ba0-4c72b94353b5">
+ <topic>gitea -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>gitea</name>
+ <range><lt>1.8.0</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Gitea Team reports:</p>
+ <blockquote cite="https://blog.gitea.io/2019/04/gitea-1.8.0-is-released">
+ <p>This release contains two new security fixes which cannot be backported
+ to the 1.7.0 branch, so it is recommended to update to this version.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://blog.gitea.io/2019/04/gitea-1.8.0-is-released/</url>
+ </references>
+ <dates>
+ <discovery>2019-04-21</discovery>
+ <entry>2019-05-06</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="3df5a920-6edc-11e9-a44b-0050562a4d7b">
+ <topic>comms/hylafax -- Malformed fax sender remote code execution in JPEG support</topic>
+ <affects>
+ <package>
+ <name>hylafax</name>
+ <range><lt>6.0.7</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <blockquote cite="ftp://ftp.hylafax.org/security/CVE-2018-17141.html">
+ <p>A malicious sender that sets both JPEG and MH,MR,MMR or JBIG in
+ the same DCS signal or sends a large JPEG page could lead to remote code execution.
+ </p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2018-17141</cvename>
+ <url>ftp://ftp.hylafax.org/security/CVE-2018-17141.html</url>
+ <url>https://www.x41-dsec.de/lab/advisories/x41-2018-008-hylafax/</url>
+ <url>http://bugs.hylafax.org/show_bug.cgi?id=974</url>
+ <url>http://git.hylafax.org/HylaFAX?a=commit;h=c6cac8d8cd0dbe313689ba77023e12bc5b3027be</url>
+ </references>
+ <dates>
+ <discovery>2018-08-24</discovery>
+ <entry>2019-05-05</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="4faac805-6be0-11e9-a685-001b217b3468">
+ <topic>Gitlab -- Information Disclosure</topic>
+ <affects>
+ <package>
+ <name>gitlab-ce</name>
+ <range><ge>11.10.0</ge><lt>11.10.3</lt></range>
+ <range><ge>11.9.0</ge><lt>11.9.11</lt></range>
+ <range><ge>11.8.0</ge><lt>11.8.10</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Gitlab reports:</p>
+ <blockquote cite="https://about.gitlab.com/2019/04/30/security-release-gitlab-11-dot-10-dot-3-released/">
+ <p>Information Disclosure with Limited Scope Token</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://about.gitlab.com/2019/04/30/security-release-gitlab-11-dot-10-dot-3-released/</url>
+ <cvename>CVE-2019-11605</cvename>
+ </references>
+ <dates>
+ <discovery>2019-04-30</discovery>
+ <entry>2019-05-01</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="3f98ccb3-6b8a-11e9-9b5c-a4badb296695">
+ <topic>Dovecot -- Multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>dovecot</name>
+ <range><ge>2.3.0</ge><lt>2.3.6</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Aki Tuomi reports:</p>
+ <blockquote cite="https://dovecot.org/list/dovecot-news/2019-April/000409.html">
+ <p>Submission-login crashes with signal 11 due to null pointer access when authentication is aborted by disconnecting. This can lead to denial-of-service attack by persistent attacker(s).</p>
+ </blockquote>
+ <p>Aki Tuomi reports:</p>
+ <blockquote cite="https://dovecot.org/list/dovecot-news/2019-April/000410.html">
+ <p>Submission-login crashes when authentication is started over TLS secured channel and invalid authentication message is sent. This can lead to denial-of-service attack by persistent attacker(s).</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://dovecot.org/list/dovecot-news/2019-April/000409.html</url>
+ <cvename>CVE-2019-11494</cvename>
+ <url>https://dovecot.org/list/dovecot-news/2019-April/000410.html</url>
+ <cvename>CVE-2019-11499</cvename>
+ </references>
+ <dates>
+ <discovery>2019-03-11</discovery>
+ <entry>2019-04-30</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="1138b39e-6abb-11e9-a685-001b217b3468">
+ <topic>Gitlab -- Multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>gitlab-ce</name>
+ <range><ge>11.10.0</ge><lt>11.10.2</lt></range>
+ <range><ge>11.9.0</ge><lt>11.9.10</lt></range>
+ <range><ge>6.0.0</ge><lt>11.8.9</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Gitlab reports:</p>
+ <blockquote cite="https://about.gitlab.com/2019/04/29/security-release-gitlab-11-dot-10-dot-2-released/">
+ <p>Moving an Issue to Private Repo Leaks Project Namespace</p>
+ <p>Notification Emails Sent to Restricted Users</p>
+ <p>Unauthorized Comments on Confidential Issues</p>
+ <p>Merge Request Approval Count Inflation</p>
+ <p>Unsanitized Branch Names on New Merge Request Notification Emails</p>
+ <p>Improper Sanitation of Credentials in Gitaly</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://about.gitlab.com/2019/04/29/security-release-gitlab-11-dot-10-dot-2-released/</url>
+ <cvename>CVE-2019-11545</cvename>
+ <cvename>CVE-2019-11544</cvename>
+ <cvename>CVE-2019-11548</cvename>
+ <cvename>CVE-2019-11546</cvename>
+ <cvename>CVE-2019-11547</cvename>
+ <cvename>CVE-2019-11549</cvename>
+ </references>
+ <dates>
+ <discovery>2019-04-29</discovery>
+ <entry>2019-04-29</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="5536ea5f-6814-11e9-a8f7-0050562a4d7b">
+ <topic>buildbot -- CRLF injection in Buildbot login and logout redirect code</topic>
+ <affects>
+ <package>
+ <name>py27-buildbot</name>
+ <name>py35-buildbot</name>
+ <name>py36-buildbot</name>
+ <name>py37-buildbot</name>
+ <range><lt>1.8.0</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <blockquote cite="https://github.com/buildbot/buildbot/wiki/CRLF-injection-in-Buildbot-login-and-logout-redirect-code">
+ <p>A CRLF can be injected in Location header of /auth/login and /auth/logout
+ This is due to lack of input validation in the buildbot redirection code.
+ </p>
+ <p>It was not found a way to impact Buildbot product own security through
+ this vulnerability, but it could be used to compromise other sites
+ hosted on the same domain as Buildbot.
+
+ - cookie injection a master domain (ie if your buildbot is on
+ buildbot.buildbot.net, one can inject a cookie on *.buildbot.net,
+ which could impact another website hosted in your domain)
+
+ - HTTP response splitting and cache poisoning (browser or proxy) are
+ also typical impact of this vulnerability class, but might be impractical
+ to exploit.
+ </p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://github.com/buildbot/buildbot/wiki/CRLF-injection-in-Buildbot-login-and-logout-redirect-code</url>
+ <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-7313</url>
+ <cvename>CVE-2019-7313</cvename>
+ </references>
+ <dates>
+ <discovery>2019-01-29</discovery>
+ <entry>2019-04-26</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="2bad8b5d-66fb-11e9-9815-78acc0a3b880">
+ <topic>drupal -- Drupal core - Moderately critical</topic>
+ <affects>
+ <package>
+ <name>drupal7</name>
+ <range><lt>7.66</lt></range>
+ </package>
+ <package>
+ <name>drupal8</name>
+ <range><lt>8.6.15</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Drupal Security Team reports:</p>
+ <blockquote cite="https://www.drupal.org/SA-CORE-2019-005">
+ <p>CVE-2019-10909: Escape validation messages in the PHP templating engine.</p>
+ <p>CVE-2019-10910: Check service IDs are valid.</p>
+ <p>CVE-2019-10911: Add a separator in the remember me cookie hash.</p>
+ </blockquote>
+ <blockquote cite="https://www.drupal.org/sa-core-2019-006">
+ <p>jQuery 3.4.0 includes a fix for some unintended behavior when using
+ jQuery.extend(true, {}, ...). If an unsanitized source object contained
+ an enumerable __proto__ property, it could extend the native Object.prototype.
+ This fix is included in jQuery 3.4.0, but patch diffs exist to patch previous
+ jQuery versions.</p>
+
+ <p>It's possible that this vulnerability is exploitable with some Drupal modules.
+ As a precaution, this Drupal security release backports the fix to jQuery.extend(),
+ without making any other changes to the jQuery version that is included in
+ Drupal core (3.2.1 for Drupal 8 and 1.4.4 for Drupal 7) or running on the site
+ via some other module such as jQuery Update.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.drupal.org/SA-CORE-2019-005</url>
+ <url>https://www.drupal.org/SA-CORE-2019-006</url>
+ </references>
+ <dates>
+ <discovery>2019-04-17</discovery>
+ <entry>2019-04-25</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="f6ea18bb-65b9-11e9-8b31-002590045d9c">
+ <topic>py-yaml -- arbitrary code execution</topic>
+ <affects>
+ <package>
+ <name>py27-yaml</name>
+ <name>py35-yaml</name>
+ <name>py36-yaml</name>
+ <name>py37-yaml</name>
+ <range><lt>4.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>pyyaml reports:</p>
+ <blockquote cite="https://github.com/yaml/pyyaml/wiki/PyYAML-yaml.load(input)-Deprecation">
+ <p>the PyYAML.load function could be easily exploited to call any Python
+ function. That means it could call any system command using os.system()</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2017-18342</cvename>
+ <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-18342</url>
+ <url>https://github.com/yaml/pyyaml/pull/74</url>
+ </references>
+ <dates>
+ <discovery>2018-06-27</discovery>
+ <entry>2019-04-23</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="a207bbd8-6572-11e9-8e67-206a8a720317">
+ <topic>FreeBSD -- EAP-pwd message reassembly issue with unexpected fragment</topic>
+ <affects>
+ <package>
+ <name>FreeBSD</name>
+ <range><ge>12.0</ge><lt>12.0_3</lt></range>
+ <range><ge>11.2</ge><lt>11.2_9</lt></range>
+ </package>
+ <package>
+ <name>wpa_supplicant</name>
+ <range><lt>2.8</lt></range>
+ </package>
+ <package>
+ <name>hostapd</name>
+ <range><lt>2.8</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <h1>Problem Description:</h1>
+ <p>EAP-pwd implementation in hostapd (EAP server) and wpa_supplicant
+ (EAP peer) does not to validate fragmentation reassembly state
+ properly for a case where an unexpected fragment could be received.
+ This could result in process termination due to NULL pointer
+ dereference.</p>
+ <p>See
+ https://w1.fi/security/2019-5/eap-pwd-message-reassembly-issue-with-unexpected-fragment.txt
+ for a detailed description of the bug.</p>
+ <h1>Impact:</h1>
+ <p>All wpa_supplicant and hostapd versions with EAP-pwd support could
+ suffer a denial of service attack through process termination.</p>
+ </body>
+ </description>
+ <references>
+ <url>https://w1.fi/security/2019-5/eap-pwd-message-reassembly-issue-with-unexpected-fragment.txt</url>
+ </references>
+ <dates>
+ <discovery>2019-04-18</discovery>
+ <entry>2019-04-23</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="2da3cb25-6571-11e9-8e67-206a8a720317">
+ <topic>FreeBSD -- EAP-pwd missing commit validation</topic>
+ <affects>
+ <package>
+ <name>FreeBSD</name>
+ <range><ge>12.0</ge><lt>12.0_3</lt></range>
+ <range><ge>11.2</ge><lt>11.2_9</lt></range>
+ </package>
+ <package>
+ <name>wpa_supplicant</name>
+ <range><lt>2.8</lt></range>
+ </package>
+ <package>
+ <name>hostapd</name>
+ <range><lt>2.8</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <h1>Problem Description:</h1>
+ <p>EAP-pwd implementation in hostapd (EAP server) and wpa_supplicant
+ (EAP peer) does not to validate the received scalar and element values
+ in EAP-pwd-Commit messages properly. This could result in attacks that
+ would be able to complete EAP-pwd authentication exchange without the
+ attacker having to know the used password.</p>
+ <p>See
+ https://w1.fi/security/2019-4/eap-pwd-missing-commit-validation.txt
+ for a detailed description of the bug.</p>
+ <h1>Impact:</h1>
+ <p>All wpa_supplicant and hostapd versions with EAP-pwd support.</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-9497</cvename>
+ <cvename>CVE-2019-9498</cvename>
+ <cvename>CVE-2019-9499</cvename>
+ <freebsdsa>SA-19:03.wpa</freebsdsa>
+ </references>
+ <dates>
+ <discovery>2019-04-10</discovery>
+ <entry>2019-04-23</entry>
+ <modified>2019-07-30</modified>
+ </dates>
+ </vuln>
+
+ <vuln vid="98b71436-656d-11e9-8e67-206a8a720317">
+ <topic>FreeBSD -- SAE confirm missing state validation</topic>
+ <affects>
+ <package>
+ <name>FreeBSD</name>
+ <range><ge>12.0</ge><lt>12.0_3</lt></range>
+ <range><ge>11.2</ge><lt>11.2_9</lt></range>
+ </package>
+ <package>
+ <name>wpa_supplicant</name>
+ <range><lt>2.8</lt></range>
+ </package>
+ <package>
+ <name>hostapd</name>
+ <range><lt>2.8</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <h1>Problem Description:</h1>
+ <p>When hostapd is used to operate an access point with SAE
+ (Simultaneous Authentication of Equals; also known as WPA3-Personal),
+ an invalid authentication sequence could result in the hostapd process
+ terminating due to a NULL pointer dereference when processing SAE
+ confirm message. This was caused by missing state validation steps
+ when processing the SAE confirm message in hostapd/AP mode.</p>
+ <p>See
+ https://w1.fi/security/2019-3/sae-confirm-missing-state-validation.txt
+ for a detailed description of the bug.</p>
+ <h1>Impact:</h1>
+ <p>All hostapd versions with SAE support (CONFIG_SAE=y in the build
+ configuration and SAE being enabled in the runtime configuration).</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-9496</cvename>
+ </references>
+ <dates>
+ <discovery>2019-04-10</discovery>
+ <entry>2019-04-23</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="60129efe-656d-11e9-8e67-206a8a720317">
+ <topic>FreeBSD -- EAP-pwd side-channel attack</topic>
+ <affects>
+ <package>
+ <name>FreeBSD</name>
+ <range><ge>12.0</ge><lt>12.0_3</lt></range>
+ <range><ge>11.2</ge><lt>11.2_9</lt></range>
+ </package>
+ <package>
+ <name>wpa_supplicant</name>
+ <range><lt>2.8</lt></range>
+ </package>
+ <package>
+ <name>hostapd</name>
+ <range><lt>2.8</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <h1>Problem Description:</h1>
+ <p>Potential side channel attacks in the SAE implementations used
+ by both hostapd and wpa_supplicant (see CVE-2019-9494 and VU#871675).
+ EAP-pwd uses a similar design for deriving PWE from the password and
+ while a specific attack against EAP-pwd is not yet known to be tested,
+ there is no reason to believe that the EAP-pwd implementation would
+ be immune against the type of cache attack that was identified for the
+ SAE implementation. Since the EAP-pwd implementation in hostapd (EAP
+ server) and wpa_supplicant (EAP peer) does not support MODP groups,
+ the timing attack described against SAE is not applicable for the
+ EAP-pwd implementation.</p>
+ <p>See
+ https://w1.fi/security/2019-2/eap-pwd-side-channel-attack.txt
+ for a detailed description of the bug.</p>
+ <h1>Impact:</h1>
+ <p>All wpa_supplicant and hostapd versions with EAP-pwd support
+ (CONFIG_EAP_PWD=y in the build configuration and EAP-pwd being enabled
+ in the runtime configuration).</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-9495</cvename>
+ </references>
+ <dates>
+ <discovery>2019-04-10</discovery>
+ <entry>2019-04-23</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="7e53f9cc-656d-11e9-8e67-206a8a720317">
+ <topic>FreeBSD -- SAE side-channel attacks</topic>
+ <affects>
+ <package>
+ <name>FreeBSD</name>
+ <range><ge>12.0</ge><lt>12.0_3</lt></range>
+ <range><ge>11.2</ge><lt>11.2_9</lt></range>
+ </package>
+ <package>
+ <name>wpa_supplicant</name>
+ <range><lt>2.8</lt></range>
+ </package>
+ <package>
+ <name>hostapd</name>
+ <range><lt>2.8</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <h1>Problem Description:</h1>
+ <p>Side channel attacks in the SAE implementations used by both
+ hostapd (AP) and wpa_supplicant (infrastructure BSS station/mesh
+ station). SAE (Simultaneous Authentication of Equals) is also known
+ as WPA3-Personal. The discovered side channel attacks may be able to
+ leak information about the used password based on observable timing
+ differences and cache access patterns. This might result in full
+ password recovery when combined with an offline dictionary attack and
+ if the password is not strong enough to protect against dictionary
+ attacks.</p>
+ <p>See
+ https://w1.fi/security/2019-1/sae-side-channel-attacks.txt
+ for a detailed description of the bug.</p>
+ <h1>Impact:</h1>
+ <p>All wpa_supplicant and hostapd versions with SAE support
+ (CONFIG_SAE=y in the build configuration and SAE being enabled in
+ the runtime configuration).</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-9494</cvename>
+ </references>
+ <dates>
+ <discovery>2019-04-10</discovery>
+ <entry>2019-04-23</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="484d3f5e-653a-11e9-b0e3-1c39475b9f84">
+ <topic>Istio -- Security vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>istio</name>
+ <range><lt>1.1.2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Istio reports:</p>
+ <blockquote cite="https://istio.io/blog/2019/announcing-1.1.2/#security-update">
+ <p>Two security vulnerabilities have recently been identified in the Envoy proxy.
+ The vulnerabilities are centered on the fact that Envoy did not normalize
+ HTTP URI paths and did not fully validate HTTP/1.1 header values. These
+ vulnerabilities impact Istio features that rely on Envoy to enforce any of
+ authorization, routing, or rate limiting.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-9900</cvename>
+ <cvename>CVE-2019-9901</cvename>
+ <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9900</url>
+ <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9901</url>
+ <url>https://github.com/envoyproxy/envoy/issues/6434</url>
+ <url>https://github.com/envoyproxy/envoy/issues/6435</url>
+ </references>
+ <dates>
+ <discovery>2019-03-29</discovery>
+ <entry>2019-04-22</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="5ed7102e-6454-11e9-9a3a-001cc0382b2f">
+ <topic>Ghostscript -- Security bypass vulnerability</topic>
+ <affects>
+ <package>
+ <name>ghostscript9-agpl-base</name>
+ <name>ghostscript9-agpl-x11</name>
+ <range><lt>9.27</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Cedric Buissart (Red Hat) reports:</p>
+ <blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3835">
+ <p>It was found that the superexec operator was available in the
+ internal dictionary in ghostscript before 9.27. A specially crafted
+ PostScript file could use this flaw in order to, for example, have
+ access to the file system outside of the constrains imposed by
+ -dSAFER.</p>
+ </blockquote>
+ <blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3838">
+ <p>It was found that the forceput operator could be extracted from
+ the DefineResource method in ghostscript before 9.27. A specially
+ crafted PostScript file could use this flaw in order to, for
+ example, have access to the file system outside of the constrains
+ imposed by -dSAFER.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3835</url>
+ <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-3838</url>
+ <cvename>CVE-2019-3835</cvename>
+ <cvename>CVE-2019-3838</cvename>
+ </references>
+ <dates>
+ <discovery>2019-03-21</discovery>
+ <entry>2019-04-21</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="fb30db8f-62af-11e9-b0de-001cc0382b2f">
+ <topic>GnuTLS -- double free, invalid pointer access</topic>
+ <affects>
+ <package>
+ <name>gnutls</name>
+ <range><lt>3.6.7</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The GnuTLS project reports:</p>
+ <blockquote cite="https://www.gnutls.org/security-new.html#GNUTLS-SA-2019-03-27">
+ <ul>
+ <li>Tavis Ormandy from Google Project Zero found a memory
+ corruption (double free) vulnerability in the certificate
+ verification API. Any client or server application that verifies
+ X.509 certificates with GnuTLS 3.5.8 or later is affected.</li>
+ <li>It was found using the TLS fuzzer tools that decoding a
+ malformed TLS1.3 asynchronous message can cause a server crash
+ via an invalid pointer access. The issue affects GnuTLS server
+ applications since 3.6.4.</li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.gnutls.org/security-new.html#GNUTLS-SA-2019-03-27</url>
+ <cvename>CVE-2019-3829</cvename>
+ <cvename>CVE-2019-3836</cvename>
+ </references>
+ <dates>
+ <discovery>2019-03-27</discovery>
+ <entry>2019-04-19</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="a64aa22f-61ec-11e9-85b9-a4badb296695">
+ <topic>dovecot -- json encoder crash</topic>
+ <affects>
+ <package>
+ <name>dovecot</name>
+ <range><ge>2.3.0</ge><lt>2.3.5.2</lt></range>
+ </package>
+ <package>
+ <name>dovecot2</name>
+ <range><ge>2.3.0</ge><lt>2.3.5.2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Aki Tuomi reports:</p>
+ <blockquote cite="https://dovecot.org/pipermail/dovecot-news/2019-April/000407.html">
+ <p>* CVE-2019-10691: Trying to login with 8bit username containing
+ invalid UTF8 input causes auth process to crash if auth policy is
+ enabled. This could be used rather easily to cause a DoS. Similar
+ crash also happens during mail delivery when using invalid UTF8 in
+ From or Subject header when OX push notification driver is used.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://dovecot.org/pipermail/dovecot-news/2019-April/000407.html</url>
+ <cvename>CVE-2019-10691</cvename>
+ </references>
+ <dates>
+ <discovery>2019-04-09</discovery>
+ <entry>2019-04-18</entry>
+ <modified>2019-05-26</modified>
+ </dates>
+ </vuln>
+
+ <vuln vid="6e58e1e9-2636-413e-9f84-4c0e21143628">
+ <topic>libssh2 -- multiple issues</topic>
+ <affects>
+ <package>
+ <name>libssh2</name>
+ <range><lt>1.8.1,3</lt></range>
+ </package>
+ <package>
+ <name>linux-c6-libssh2</name>
+ <range><lt>1.4.2_7</lt></range>
+ </package>
+ <package>
+ <name>linux-c7-libssh2</name>
+ <range><lt>1.4.3_3</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>libssh2 developers report:</p>
+ <blockquote cite="https://github.com/libssh2/libssh2/releases/tag/libssh2-1.8.1">
+ <ul>
+ <li>Defend against possible integer overflows in comp_method_zlib_decomp.</li>
+ <li>Defend against writing beyond the end of the payload in _libssh2_transport_read().</li>
+ <li>Sanitize padding_length - _libssh2_transport_read().</li>
+ <li>This prevents an underflow resulting in a potential out-of-bounds read if a server sends a too-large padding_length, possibly with malicious intent.</li>
+ <li>Prevent zero-byte allocation in sftp_packet_read() which could lead to an out-of-bounds read.</li>
+ <li>Check the length of data passed to sftp_packet_add() to prevent out-of-bounds reads.</li>
+ <li>Add a required_size parameter to sftp_packet_require et. al. to require callers of these functions to handle packets that are too short.</li>
+ <li>Additional length checks to prevent out-of-bounds reads and writes in _libssh2_packet_add().</li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://github.com/libssh2/libssh2/releases/tag/libssh2-1.8.1</url>
+ <url>https://libssh2.org/CVE-2019-3855.html</url>
+ <url>https://libssh2.org/CVE-2019-3856.html</url>
+ <url>https://libssh2.org/CVE-2019-3857.html</url>
+ <url>https://libssh2.org/CVE-2019-3858.html</url>
+ <url>https://libssh2.org/CVE-2019-3859.html</url>
+ <url>https://libssh2.org/CVE-2019-3860.html</url>
+ <url>https://libssh2.org/CVE-2019-3861.html</url>
+ <url>https://libssh2.org/CVE-2019-3862.html</url>
+ <url>https://libssh2.org/CVE-2019-3863.html</url>
+ <cvename>CVE-2019-3855</cvename>
+ <cvename>CVE-2019-3856</cvename>
+ <cvename>CVE-2019-3857</cvename>
+ <cvename>CVE-2019-3858</cvename>
+ <cvename>CVE-2019-3859</cvename>
+ <cvename>CVE-2019-3860</cvename>
+ <cvename>CVE-2019-3861</cvename>
+ <cvename>CVE-2019-3862</cvename>
+ <cvename>CVE-2019-3863</cvename>
+ </references>
+ <dates>
+ <discovery>2019-03-14</discovery>
+ <entry>2019-04-18</entry>
+ <modified>2019-07-07</modified>
+ </dates>
+ </vuln>
+
+ <vuln vid="b747783f-5fb6-11e9-b2ac-08002705f877">
+ <topic>gitea -- remote code execution</topic>
+ <affects>
+ <package>
+ <name>gitea</name>
+ <range><lt>1.7.5</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Gitea team reports:</p>
+ <blockquote cite="https://blog.gitea.io/2019/04/gitea-1.7.6-is-released/">
+ <p>Prevent remote code execution vulnerability with mirror repo URL settings.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://blog.gitea.io/2019/04/gitea-1.7.6-is-released/</url>
+ </references>
+ <dates>
+ <discovery>2019-04-13</discovery>
+ <entry>2019-04-17</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="4e1997e8-5de0-11e9-b95c-b499baebfeaf">
+ <topic>MySQL -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>mariadb55-server</name>
+ <range><lt>5.5.64</lt></range>
+ </package>
+ <package>
+ <name>mariadb101-server</name>
+ <range><lt>10.1.39</lt></range>
+ </package>
+ <package>
+ <name>mariadb102-server</name>
+ <range><lt>10.2.23</lt></range>
+ </package>
+ <package>
+ <name>mariadb103-server</name>
+ <range><lt>10.3.14</lt></range>
+ </package>
+ <package>
+ <name>mysql56-server</name>
+ <range><lt>5.6.44</lt></range>
+ </package>
+ <package>
+ <name>mysql57-server</name>
+ <range><lt>5.7.26</lt></range>
+ </package>
+ <package>
+ <name>mysql80-server</name>
+ <range><lt>8.0.15</lt></range>
+ </package>
+ <package>
+ <name>percona55-server</name>
+ <range><lt>5.5.64</lt></range>
+ </package>
+ <package>
+ <name>percona56-server</name>
+ <range><lt>5.6.44</lt></range>
+ </package>
+ <package>
+ <name>percona57-server</name>
+ <range><lt>5.7.26</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Oracle reports:</p>
+ <blockquote cite="https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html">
+ <p>Critical Patch Update Oracle MySQL Executive Summary</p>
+ <p>This Critical Patch Update contains 44 new security fixes for
+ Oracle MySQL. 3 of these vulnerabilities may be remotely exploitable
+ without authentication, i.e., may be exploited over a network without
+ requiring user credentials.</p>
+ <p>The Oracle MySQL products and versions affected by vulnerabilities
+ that are fixed in this Critical Patch Update are: MySQL Server, versions
+ 5.6.43 and prior, 5.7.25 and prior, 8.0.15 and prior</p>
+ <p>Further details will be published by Oracle on 2019-04-16</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html</url>
+ </references>
+ <dates>
+ <discovery>2019-04-13</discovery>
+ <entry>2019-04-13</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="a737eb11-5cfc-11e9-ab87-8cec4bf8fcfb">
+ <topic>wget -- security flaw in caching credentials passed as a part of the URL</topic>
+ <affects>
+ <package>
+ <name>wget</name>
+ <range><ge>1.19</ge><lt>1.20.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Gynvael Coldwind reports:</p>
+ <blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20483">
+ <p>
+ set_file_metadata in xattr.c in GNU Wget before 1.20.1 stores a
+ file's origin URL in the user.xdg.origin.url metadata attribute
+ of the extended attributes of the downloaded file, which allows
+ local users to obtain sensitive information (e.g., credentials
+ contained in the URL) by reading this attribute, as demonstrated
+ by getfattr. This also applies to Referer information in the
+ user.xdg.referrer.url metadata attribute.
+ </p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-20483</url>
+ <cvename>CVE-2018-20483</cvename>
+ </references>
+ <dates>
+ <discovery>2018-12-25</discovery>
+ <entry>2019-04-12</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="a0602fa0-5c1c-11e9-abd6-001b217b3468">
+ <topic>Gitlab -- Group Runner Registration Token Exposure</topic>
+ <affects>
+ <package>
+ <name>gitlab-ce</name>
+ <range><ge>11.9.0</ge><lt>11.9.7</lt></range>
+ <range><ge>11.8.0</ge><lt>11.8.7</lt></range>
+ <range><ge>10.4.0</ge><lt>11.7.11</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Gitlab reports:</p>
+ <blockquote cite="https://about.gitlab.com/2019/04/10/critical-security-release-gitlab-11-dot-9-dot-7-released/">
+ <p>Group Runner Registration Token Exposure</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://about.gitlab.com/2019/04/10/critical-security-release-gitlab-11-dot-9-dot-7-released/</url>
+ <cvename>CVE-2019-11000</cvename>
+ </references>
+ <dates>
+ <discovery>2019-04-10</discovery>
+ <entry>2019-04-11</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="8e9c3f5a-715b-4336-8d05-19babef55e9e">
+ <topic>jenkins -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>jenkins</name>
+ <range><lt>2.172</lt></range>
+ </package>
+ <package>
+ <name>jenkins-lts</name>
+ <range><lt>2.164.2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Jenkins Security Advisory:</p>
+ <blockquote cite="https://jenkins.io/security/advisory/2019-04-10/">
+ <h1>Description</h1>
+ <h5>(Medium) SECURITY-1289</h5>
+ <p>Jenkins accepted cached legacy CLI authentication</p>
+ <h5>(Medium) SECURITY-1327</h5>
+ <p>XSS vulnerability in form validation button</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://jenkins.io/security/advisory/2019-04-10/</url>
+ </references>
+ <dates>
+ <discovery>2019-04-10</discovery>
+ <entry>2019-04-10</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="45d89773-5b64-11e9-80ed-d43d7ef03aa6">
+ <topic>Flash Player -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>linux-flashplayer</name>
+ <range><lt>32.0.0.171</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Adobe reports:</p>
+ <blockquote cite="https://helpx.adobe.com/security/products/flash-player/apsb19-19.html">
+ <ul>
+ <li>This update resolves a use-after-free vulnerability that
+ could lead to arbitrary code execution (CVE-2019-7096).</li>
+ <li>This update resolves an out-of-bounds read vulnerability that
+ could lead to information disclosure (CVE-2019-7108).</li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-7096</cvename>
+ <cvename>CVE-2019-7108</cvename>
+ <url>https://helpx.adobe.com/security/products/flash-player/apsb19-19.html</url>
+ </references>
+ <dates>
+ <discovery>2019-04-09</discovery>
+ <entry>2019-04-10</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="84ce26c3-5769-11e9-abd6-001b217b3468">
+ <topic>clamav -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>clamav</name>
+ <range><lt>0.101.2,1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Clamav reports:</p>
+ <blockquote cite="https://blog.clamav.net/2019/03/clamav-01012-and-01003-patches-have.html">
+ <p>An out-of-bounds heap read condition may occur when scanning PDF documents</p>
+ <p>An out-of-bounds heap read condition may occur when scanning PE files</p>
+ <p>An out-of-bounds heap write condition may occur when scanning OLE2 files</p>
+ <p>An out-of-bounds heap read condition may occur when scanning malformed PDF documents</p>
+ <p>A path-traversal write condition may occur as a result of improper input validation when scanning RAR archives</p>
+ <p>A use-after-free condition may occur as a result of improper error handling when scanning nested RAR archives</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://blog.clamav.net/2019/03/clamav-01012-and-01003-patches-have.html</url>
+ <cvename>CVE-2019-1787</cvename>
+ <cvename>CVE-2019-1789</cvename>
+ <cvename>CVE-2019-1788</cvename>
+ <cvename>CVE-2019-1786</cvename>
+ <cvename>CVE-2019-1785</cvename>
+ <cvename>CVE-2019-1798</cvename>
+ </references>
+ <dates>
+ <discovery>2019-03-29</discovery>
+ <entry>2019-04-05</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="da459dbc-5586-11e9-abd6-001b217b3468">
+ <topic>Gitlab -- Multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>gitlab-ce</name>
+ <range><ge>11.9.0</ge><lt>11.9.4</lt></range>
+ <range><ge>11.8.0</ge><lt>11.8.6</lt></range>
+ <range><lt>11.7.10</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Gitlab reports:</p>
+ <blockquote cite="https://about.gitlab.com/2019/04/01/security-release-gitlab-11-dot-9-dot-4-released/">
+ <p>DoS potential for regex in CI/CD refs</p>
+ <p>Related branches visible in issues for guests</p>
+ <p>Persistent XSS at merge request resolve conflicts</p>
+ <p>Improper authorization control "move issue"</p>
+ <p>Guest users of private projects have access to releases</p>
+ <p>DoS potential on project languages page</p>
+ <p>Recurity assessment: information exposure through timing discrepancy</p>
+ <p>Recurity assessment: loginState HMAC issues</p>
+ <p>Recurity assessment: open redirect</p>
+ <p>PDF.js vulnerable to CVE-2018-5158</p>
+ <p>IDOR labels of private projects/groups</p>
+ <p>EXIF geolocation data not stripped from uploaded images</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://about.gitlab.com/2019/04/01/security-release-gitlab-11-dot-9-dot-4-released/</url>
+ <cvename>CVE-2019-10640</cvename>
+ <cvename>CVE-2019-10116</cvename>
+ <cvename>CVE-2019-10111</cvename>
+ <cvename>CVE-2019-10110</cvename>
+ <cvename>CVE-2019-10115</cvename>
+ <cvename>CVE-2019-10113</cvename>
+ <cvename>CVE-2019-10114</cvename>
+ <cvename>CVE-2019-10112</cvename>
+ <cvename>CVE-2019-10117</cvename>
+ <cvename>CVE-2018-5158</cvename>
+ <cvename>CVE-2019-10108</cvename>
+ <cvename>CVE-2019-10109</cvename>
+ </references>
+ <dates>
+ <discovery>2019-04-01</discovery>
+ <entry>2019-04-02</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="cf2105c6-551b-11e9-b95c-b499baebfeaf">
+ <topic>Apache -- Multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>apache24</name>
+ <range><lt>2.4.39</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Apache httpd Project reports:</p>
+ <blockquote cite="https://httpd.apache.org/security/vulnerabilities_24.html">
+ <p>Apache HTTP Server privilege escalation from modules' scripts
+ (CVE-2019-0211) (important)</p>
+ <p>mod_auth_digest access control bypass (CVE-2019-0217)
+ (important)</p>
+ <p>mod_ssl access control bypass (CVE-2019-0215) (important)</p>
+ <p>mod_http2, possible crash on late upgrade (CVE-2019-0197) (low)</p>
+ <p>mod_http2, read-after-free on a string compare (CVE-2019-0196)
+ (low)</p>
+ <p>Apache httpd URL normalization inconsistincy (CVE-2019-0220)
+ (low)</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.apache.org/dist/httpd/CHANGES_2.4.39</url>
+ <url>https://httpd.apache.org/security/vulnerabilities_24.html</url>
+ <cvename>CVE-2019-0211</cvename>
+ <cvename>CVE-2019-0217</cvename>
+ <cvename>CVE-2019-0215</cvename>
+ <cvename>CVE-2019-0196</cvename>
+ <cvename>CVE-2019-0220</cvename>
+ </references>
+ <dates>
+ <discovery>2019-04-01</discovery>
+ <entry>2019-04-02</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="6a0129bf-54ad-11e9-987c-1c39475b9f84">
+ <topic>Kubectl -- Potential directory traversal</topic>
+ <affects>
+ <package>
+ <name>kubectl</name>
+ <range><lt>1.11.9</lt></range>
+ <range><ge>1.12.0</ge><lt>1.12.7</lt></range>
+ <range><ge>1.13.0</ge><lt>1.13.5</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Kubernetes.io reports:</p>
+ <blockquote cite="https://discuss.kubernetes.io/t/announce-security-release-of-kubernetes-kubectl-potential-directory-traversal-releases-1-11-9-1-12-7-1-13-5-and-1-14-0-cve-2019-1002101/5712">
+ <p>A security issue was discovered with the Kubernetes kubectl cp
+ command that could enable a directory traversal replacing or
+ deleting files on a user’s workstation.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-1002101</cvename>
+ <url>https://nvd.nist.gov/vuln/detail/CVE-2019-1002101</url>
+ </references>
+ <dates>
+ <discovery>2019-03-28</discovery>
+ <entry>2019-04-01</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="b22d6d4c-53b9-11e9-9310-28d244aee256">
+ <topic>znc -- Denial of Service</topic>
+ <affects>
+ <package>
+ <name>znc</name>
+ <range><lt>1.7.3</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Mitre reports:</p>
+ <blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-9917">
+ <p>ZNC before 1.7.3-rc1 allows an existing remote user to cause a Denial
+ of Service (crash) via invalid encoding.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-9917</cvename>
+ <url>https://wiki.znc.in/ChangeLog/1.7.3</url>
+ </references>
+ <dates>
+ <discovery>2019-03-21</discovery>
+ <entry>2019-03-31</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="fe7e322f-522d-11e9-98b5-216e512dad89">
+ <topic>Jupyter notebook -- open redirect vulnerability</topic>
+ <affects>
+ <package>
+ <name>py27-notebook</name>
+ <name>py35-notebook</name>
+ <name>py36-notebook</name>
+ <name>py37-notebook</name>
+ <range><lt>5.7.8</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Jupyter blog:</p>
+ <blockquote cite="https://blog.jupyter.org/open-redirect-vulnerability-in-jupyter-jupyterhub-adf43583f1e4">
+ <p>Login pages tend to take a parameter for redirecting back to a page
+ after successful login, e.g. /login?next=/notebooks/mynotebook.ipynb, so
+ that you aren't disrupted too much if you try to visit a page, but have
+ to authenticate first. An Open Redirect Vulnerability is when a
+ malicious person crafts a link pointing to the login page of a trusted
+ site, but setting the "redirect after successful login" parameter to
+ send the user to their own site, instead of a page on the authenticated
+ site (the notebook or JupyterHub server), e.g.
+ /login?next=http://badwebsite.biz. This doesn't necessarily compromise
+ anything immediately, but it enables phishing if users don't notice
+ that the domain has changed, e.g. by showing a fake "re-enter your
+ password" page. Servers generally have to validate the redirect URL to
+ avoid this. Both JupyterHub and Notebook already do this, but the
+ validation didn't take into account all possible ways to redirect to
+ other sites, so some malicious URLs could still be crafted to redirect
+ away from the server (the above example does not work in any recent
+ version of either package). Only certain browsers (Chrome and Firefox,
+ not Safari) could be redirected from the JupyterHub login page, but all
+ browsers could be redirected away from a standalone notebook server.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://blog.jupyter.org/open-redirect-vulnerability-in-jupyter-jupyterhub-adf43583f1e4</url>
+ <url>https://github.com/jupyter/notebook/blob/master/docs/source/changelog.rst</url>
+ <cvename>CVE-2019-10255</cvename>
+ </references>
+ <dates>
+ <discovery>2019-03-28</discovery>
+ <entry>2019-03-29</entry>
+ <modified>2019-04-06</modified>
+ </dates>
+ </vuln>
+
+ <vuln vid="7862213c-5152-11e9-8b26-a4badb296695">
+ <topic>dovecot -- Buffer overflow reading extension header</topic>
+ <affects>
+ <package>
+ <name>dovecot</name>
+ <range><lt>2.3.5.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Aki Tuomi reports:</p>
+ <blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-7524">
+ <p>Vulnerability Details:
+When reading FTS or POP3-UIDL header from dovecot index, the input
+buffer size is not bound, and data is copied to target structure causing
+stack overflow.
+
+Risk:
+This can be used for local root privilege escalation or executing
+arbitrary code in dovecot process context. This requires ability to
+directly modify dovecot indexes.
+Steps to reproduce:
+Produce dovecot.index.log entry that creates an FTS header which has
+more than 12 bytes of data.
+Trigger dovecot indexer-worker or run doveadm index.
+Dovecot will crash.
+
+Mitigations:
+Since 2.3.0 dovecot has been compiled with stack smash protection, ASLR,
+read-only GOT tables and other techniques that make exploiting this bug
+much harder.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://cve.mitre.org/cgi-bin/cvename.cgi?name=2019-7524</url>
+ <url>https://dovecot.org/list/dovecot-news/2019-March/000401.html</url>
+ <cvename>CVE-2019-7524</cvename>
+ </references>
+ <dates>
+ <discovery>2019-02-05</discovery>
+ <entry>2019-03-28</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="94d63fd7-508b-11e9-9ba0-4c72b94353b5">
+ <topic>drupal -- Drupal core - Moderately critical - Cross Site Scripting</topic>
+ <affects>
+ <package>
+ <name>drupal7</name>
+ <range><lt>7.65</lt></range>
+ </package>
+ <package>
+ <name>drupal8</name>
+ <range><lt>8.6.13</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Drupal Security Team reports:</p>
+ <blockquote cite="https://www.drupal.org/SA-CORE-2019-004">
+ <p>Under certain circumstances the File module/subsystem allows a malicious
+ user to upload a file that can trigger a cross-site scripting (XSS) vulnerability.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.drupal.org/project/drupal/releases/8.6.13</url>
+ <url>https://www.drupal.org/project/drupal/releases/7.65</url>
+ <url>https://www.drupal.org/SA-CORE-2019-004</url>
+ <cvename>CVE-2019-6341</cvename>
+ </references>
+ <dates>
+ <discovery>2019-03-20</discovery>
+ <entry>2019-03-27</entry>
+ <modified>2019-03-28</modified>
+ </dates>
+ </vuln>
+
+ <vuln vid="d74371d2-4fee-11e9-a5cd-1df8a848de3d">
+ <topic>Python -- NULL pointer dereference vulnerability</topic>
+ <affects>
+ <package>
+ <name>python27</name>
+ <range><lt>2.7.16</lt></range>
+ </package>
+ <package>
+ <name>python35</name>
+ <range><lt>3.5.7</lt></range>
+ </package>
+ <package>
+ <name>python36</name>
+ <range><lt>3.6.8_1</lt></range>
+ </package>
+ <package>
+ <name>python37</name>
+ <range><lt>3.7.3</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Python Changelog:</p>
+ <blockquote cite="https://docs.python.org/3.7/whatsnew/changelog.html">
+ <p>bpo-35746: [CVE-2019-5010] Fix a NULL pointer deref in ssl module. The
+ cert parser did not handle CRL distribution points with empty DP or URI
+ correctly. A malicious or buggy certificate can result into segfault.
+ Vulnerability (TALOS-2018-0758) reported by Colin Read and Nicolas Edet
+ of Cisco.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://docs.python.org/3.7/whatsnew/changelog.html</url>
+ <url>https://bugs.python.org/issue35746</url>
+ <cvename>CVE-2019-5010</cvename>
+ </references>
+ <dates>
+ <discovery>2019-01-15</discovery>
+ <entry>2019-03-26</entry>
+ <modified>2019-03-27</modified>
+ </dates>
+ </vuln>
+
+ <vuln vid="15ee0e93-4bbb-11e9-9ba0-4c72b94353b5">
+ <topic>wordpress -- multiple issues</topic>
+ <affects>
+ <package>
+ <name>wordpress</name>
+ <name>fr-wordpress</name>
+ <range><lt>5.1.1,1</lt></range>
+ </package>
+ <package>
+ <name>de-wordpress</name>
+ <name>zh_CN-wordpress</name>
+ <name>zh_TW-wordpress</name>
+ <name>ja-wordpress</name>
+ <name>ru-wordpress</name>
+ <range><lt>5.1.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>wordpress developers reports:</p>
+ <blockquote cite="https://wordpress.org/news/2019/03/wordpress-5-1-1-security-and-maintenance-release/">
+ <p>Hosts can now offer a button for their users to update PHP.</p>
+ <p>The recommended PHP version used by the Update PHP notice can now be filtered.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://wordpress.org/news/2019/03/wordpress-5-1-1-security-and-maintenance-release/</url>
+ </references>
+ <dates>
+ <discovery>2019-03-12</discovery>
+ <entry>2019-03-21</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="e0382fde-4bb0-11e9-adcb-001b217b3468">
+ <topic>Gitlab -- Vulnerability</topic>
+ <affects>
+ <package>
+ <name>gitlab-ce</name>
+ <range><ge>11.8.0</ge><lt>11.8.3</lt></range>
+ <range><lt>11.7.7</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Gitlab reports:</p>
+ <blockquote cite="https://about.gitlab.com/2019/03/20/critical-security-release-gitlab-11-dot-8-dot-3-released/">
+ <p>Project Runner Token Exposed Through Issues Quick Actions</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://about.gitlab.com/2019/03/20/critical-security-release-gitlab-11-dot-8-dot-3-released/</url>
+ <cvename>CVE-2019-9866</cvename>
+ </references>
+ <dates>
+ <discovery>2019-03-20</discovery>
+ <entry>2019-03-21</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="1b6a10e9-4b7b-11e9-9e89-54e1ad3d6335">
+ <topic>libXdmcp -- insufficient entropy generating session keys</topic>
+ <affects>
+ <package>
+ <name>libXdmcp</name>
+ <range><lt>1.1.3</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The freedesktop and x.org project reports:</p>
+ <blockquote cite="https://nvd.nist.gov/vuln/detail/CVE-2017-2625">
+ <p>It was discovered that libXdmcp before 1.1.3 used weak
+ entropy to generate session keys on platforms without
+ arc4random_buf() but with getentropy(). On a multi-user system using
+ xdmcp, a local attacker could potentially use information available
+ from the process list to brute force the key, allowing them to
+ hijack other users' sessions.</p>
+ <p>Please note, that since FreeBSD provides arc4random_buf(), it is
+ unknown if FreeBSD is affected by this vulnerability</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://nvd.nist.gov/vuln/detail/CVE-2017-2625</url>
+ <url>https://lists.x.org/archives/xorg-announce/2019-March/002974.html</url>
+ <cvename>CVE-2017-2625</cvename>
+ </references>
+ <dates>
+ <discovery>2017-04-04</discovery>
+ <entry>2019-03-21</entry>
+ <modified>2019-03-22</modified>
+ </dates>
+ </vuln>
+
+ <vuln vid="7ba5a3d0-4b18-11e9-adcb-001b217b3468">
+ <topic>Gitlab -- Vulnerability</topic>
+ <affects>
+ <package>
+ <name>gitlab-ce</name>
+ <range><lt>11.8.2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Gitlab reports:</p>
+ <blockquote cite="https://about.gitlab.com/2019/03/14/gitlab-11-8-2-released/">
+ <p>Public project in a private group makes the group page publicly accessible</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://about.gitlab.com/2019/03/14/gitlab-11-8-2-released/</url>
+ <cvename>CVE-2019-9732</cvename>
+ </references>
+ <dates>
+ <discovery>2019-03-14</discovery>
+ <entry>2019-03-20</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="a8ba7358-4b02-11e9-9ba0-4c72b94353b5">
+ <topic>gitea -- XSS vulnerability</topic>
+ <affects>
+ <package>
+ <name>gitea</name>
+ <range><lt>1.7.4</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Gitea Team reports:</p>
+ <blockquote cite="https://blog.gitea.io/2019/03/gitea-1.7.4-is-released/">
+ <p>Fix potential XSS vulnerability in repository description.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://blog.gitea.io/2019/03/gitea-1.7.4-is-released/</url>
+ </references>
+ <dates>
+ <discovery>2019-03-12</discovery>
+ <entry>2019-03-20</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="05da6b56-3e66-4306-9ea3-89fafe939726">
+ <topic>mozilla -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>firefox</name>
+ <range><lt>66.0_3,1</lt></range>
+ </package>
+ <package>
+ <name>waterfox</name>
+ <range><lt>56.2.9</lt></range>
+ </package>
+ <package>
+ <name>seamonkey</name>
+ <name>linux-seamonkey</name>
+ <range><lt>2.53.0</lt></range>
+ </package>
+ <package>
+ <name>firefox-esr</name>
+ <range><lt>60.6.0,1</lt></range>
+ </package>
+ <package>
+ <name>linux-firefox</name>
+ <range><lt>60.6.0,2</lt></range>
+ </package>
+ <package>
+ <name>libxul</name>
+ <name>thunderbird</name>
+ <name>linux-thunderbird</name>
+ <range><lt>60.6.0</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Mozilla Foundation reports:</p>
+ <blockquote cite="https://www.mozilla.org/en-US/security/advisories/mfsa2019-07/">
+ <p>CVE-2019-9790: Use-after-free when removing in-use DOM elements</p>
+ <p>CVE-2019-9791: Type inference is incorrect for constructors entered through on-stack replacement with IonMonkey</p>
+ <p>CVE-2019-9792: IonMonkey leaks JS_OPTIMIZED_OUT magic value to script</p>
+ <p>CVE-2019-9793: Improper bounds checks when Spectre mitigations are disabled</p>
+ <p>CVE-2019-9794: Command line arguments not discarded during execution</p>
+ <p>CVE-2019-9795: Type-confusion in IonMonkey JIT compiler</p>
+ <p>CVE-2019-9796: Use-after-free with SMIL animation controller</p>
+ <p>CVE-2019-9797: Cross-origin theft of images with createImageBitmap</p>
+ <p>CVE-2019-9798: Library is loaded from world writable APITRACE_LIB location</p>
+ <p>CVE-2019-9799: Information disclosure via IPC channel messages</p>
+ <p>CVE-2019-9801: Windows programs that are not 'URL Handlers' are exposed to web content</p>
+ <p>CVE-2019-9802: Chrome process information leak</p>
+ <p>CVE-2019-9803: Upgrade-Insecure-Requests incorrectly enforced for same-origin navigation</p>
+ <p>CVE-2019-9804: Code execution through 'Copy as cURL' in Firefox Developer Tools on macOS</p>
+ <p>CVE-2019-9805: Potential use of uninitialized memory in Prio</p>
+ <p>CVE-2019-9806: Denial of service through successive FTP authorization prompts</p>
+ <p>CVE-2019-9807: Text sent through FTP connection can be incorporated into alert messages</p>
+ <p>CVE-2019-9809: Denial of service through FTP modal alert error messages</p>
+ <p>CVE-2019-9808: WebRTC permissions can display incorrect origin with data: and blob: URLs</p>
+ <p>CVE-2019-9789: Memory safety bugs fixed in Firefox 66</p>
+ <p>CVE-2019-9788: Memory safety bugs fixed in Firefox 66 and Firefox ESR 60.6</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-9788</cvename>
+ <cvename>CVE-2019-9789</cvename>
+ <cvename>CVE-2019-9790</cvename>
+ <cvename>CVE-2019-9791</cvename>
+ <cvename>CVE-2019-9792</cvename>
+ <cvename>CVE-2019-9793</cvename>
+ <cvename>CVE-2019-9794</cvename>
+ <cvename>CVE-2019-9795</cvename>
+ <cvename>CVE-2019-9796</cvename>
+ <cvename>CVE-2019-9797</cvename>
+ <cvename>CVE-2019-9798</cvename>
+ <cvename>CVE-2019-9799</cvename>
+ <cvename>CVE-2019-9801</cvename>
+ <cvename>CVE-2019-9802</cvename>
+ <cvename>CVE-2019-9803</cvename>
+ <cvename>CVE-2019-9804</cvename>
+ <cvename>CVE-2019-9805</cvename>
+ <cvename>CVE-2019-9806</cvename>
+ <cvename>CVE-2019-9807</cvename>
+ <cvename>CVE-2019-9808</cvename>
+ <cvename>CVE-2019-9809</cvename>
+ <url>https://www.mozilla.org/security/advisories/mfsa2019-07/</url>
+ <url>https://www.mozilla.org/security/advisories/mfsa2019-08/</url>
+ </references>
+ <dates>
+ <discovery>2019-03-19</discovery>
+ <entry>2019-03-19</entry>
+ <modified>2019-07-23</modified>
+ </dates>
+ </vuln>
+
+ <vuln vid="6001cfc6-9f0f-4fae-9b4f-9b8fae001425">
+ <topic>PowerDNS -- Insufficient validation in the HTTP remote backend</topic>
+ <affects>
+ <package>
+ <name>powerdns</name>
+ <range><lt>4.1.7</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>PowerDNS developers report:</p>
+ <blockquote cite="https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-03.html">
+ <p>An issue has been found in PowerDNS Authoritative Server when the HTTP remote backend is used in RESTful mode (without post=1 set), allowing a remote user to cause the HTTP backend to connect to an attacker-specified host instead of the configured one, via a crafted DNS query. This can be used to cause a denial of service by preventing the remote backend from getting a response, content spoofing if the attacker can time its own query so that subsequent queries will use an attacker-controlled HTTP server instead of the configured one, and possibly information disclosure if the Authoritative Server has access to internal servers.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://doc.powerdns.com/authoritative/security-advisories/powerdns-advisory-2019-03.html</url>
+ <cvename>CVE-2019-3871</cvename>
+ </references>
+ <dates>
+ <discovery>2019-03-18</discovery>
+ <entry>2019-03-19</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="1396a74a-4997-11e9-b5f1-83edb3f89ba1">
+ <topic>Rails -- Action View vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>rubygem-actionview4</name>
+ <range><lt>4.2.11.1</lt></range>
+ </package>
+ <package>
+ <name>rubygem-actionview50</name>
+ <range><lt>5.0.7.2</lt></range>
+ </package>
+ <package>
+ <name>rubygem-actionview5</name>
+ <range><lt>5.1.6.2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Ruby on Rails blog:</p>
+ <blockquote cite="https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/">
+ <p>Rails 4.2.11.1, 5.0.7.2, 5.1.6.2, 5.2.2.1, and 6.0.0.beta3 have been released! These contain the following important security fixes. It is recommended that users upgrade as soon as possible:</p>
+ <p>CVE-2019-5418 File Content Disclosure in Action View</p>
+ <p>CVE-2019-5419 Denial of Service Vulnerability in Action View</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://weblog.rubyonrails.org/2019/3/13/Rails-4-2-5-1-5-1-6-2-have-been-released/</url>
+ <cvename>CVE-2019-5418</cvename>
+ <cvename>CVE-2019-5419</cvename>
+ </references>
+ <dates>
+ <discovery>2019-03-13</discovery>
+ <entry>2019-03-18</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="46e1ece5-48bd-11e9-9c40-080027ac955c">
+ <topic>PuTTY -- security fixes in new release</topic>
+ <affects>
+ <package>
+ <name>putty</name>
+ <range><lt>0.71</lt></range>
+ </package>
+ <package>
+ <name>putty-gtk2</name>
+ <range><lt>0.71</lt></range>
+ </package>
+ <package>
+ <name>putty-nogtk</name>
+ <range><lt>0.71</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The PuTTY team reports:</p>
+ <blockquote cite="https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html">
+ <p>New in 0.71:</p>
+ <ul>
+ <li>Security fixes found by an EU-funded bug bounty programme:</li>
+ <li>+ a remotely triggerable memory overwrite in RSA key exchange, which can occur before host key verification</li>
+ <li>+ potential recycling of random numbers used in cryptography</li>
+ <li>+ on Unix, remotely triggerable buffer overflow in any kind of server-to-client forwarding</li>
+ <li>+ multiple denial-of-service attacks that can be triggered by writing to the terminal</li>
+ <li>Other security enhancements: major rewrite of the crypto code to remove cache and timing side channels.</li>
+ <li>User interface changes to protect against fake authentication prompts from a malicious server.</li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.chiark.greenend.org.uk/~sgtatham/putty/changes.html</url>
+ </references>
+ <dates>
+ <discovery>2019-03-16</discovery>
+ <entry>2019-03-17</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="72a6e3be-483a-11e9-92d7-f1590402501e">
+ <topic>Jupyter notebook -- cross-site inclusion (XSSI) vulnerability</topic>
+ <affects>
+ <package>
+ <name>py27-notebook</name>
+ <name>py35-notebook</name>
+ <name>py36-notebook</name>
+ <name>py37-notebook</name>
+ <range><lt>5.7.6</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Jupyter notebook Changelog:</p>
+ <blockquote cite="https://github.com/jupyter/notebook/blob/master/docs/source/changelog.rst">
+ <p>5.7.6 contains a security fix for a cross-site inclusion (XSSI)
+ vulnerability, where files at a known URL could be included in a page
+ from an unauthorized website if the user is logged into a Jupyter
+ server. The fix involves setting the X-Content-Type-Options: nosniff
+ header, and applying CSRF checks previously on all non-GET API requests
+ to GET requests to API endpoints and the /files/ endpoint.</p>
+ <p>The attacking page is able to access some contents of files when using
+ Internet Explorer through script errors, but this has not been
+ demonstrated with other browsers. A CVE has been requested for this
+ vulnerability.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://github.com/jupyter/notebook/blob/master/docs/source/changelog.rst</url>
+ <url>https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-auth-prompt-spoofing.html</url>
+ <url>https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-fd-set-overflow.html</url>
+ <url>https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-rng-reuse.html</url>
+ <url>https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-rsa-kex-integer-overflow.html</url>
+ <url>https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-terminal-dos-combining-chars.html</url>
+ <url>https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-terminal-dos-combining-chars-double-width-gtk.html</url>
+ <url>https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-terminal-dos-one-column-cjk.html</url>
+ <url>https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/pscp-unsanitised-server-output.html</url>
+ <url>https://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/side-channels.html</url>
+ </references>
+ <dates>
+ <discovery>2019-03-10</discovery>
+ <entry>2019-03-16</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="27b12d04-4722-11e9-8b7c-b5e01141761f">
+ <topic>RubyGems -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>ruby23-gems</name>
+ <name>ruby24-gems</name>
+ <name>ruby25-gems</name>
+ <range><lt>3.0.2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>RubyGems Security Advisories:</p>
+ <blockquote cite="https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html">
+ <p>CVE-2019-8320: Delete directory using symlink when decompressing tar</p>
+ <p>CVE-2019-8321: Escape sequence injection vulnerability in 'verbose'</p>
+ <p>CVE-2019-8322: Escape sequence injection vulnerability in 'gem owner'</p>
+ <p>CVE-2019-8323: Escape sequence injection vulnerability in API response handling</p>
+ <p>CVE-2019-8324: Installing a malicious gem may lead to arbitrary code execution</p>
+ <p>CVE-2019-8325: Escape sequence injection vulnerability in errors</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://blog.rubygems.org/2019/03/05/security-advisories-2019-03.html</url>
+ <url>https://github.com/rubygems/rubygems/blob/master/History.txt</url>
+ <cvename>CVE-2019-8320</cvename>
+ <cvename>CVE-2019-8321</cvename>
+ <cvename>CVE-2019-8322</cvename>
+ <cvename>CVE-2019-8323</cvename>
+ <cvename>CVE-2019-8324</cvename>
+ <cvename>CVE-2019-8325</cvename>
+ </references>
+ <dates>
+ <discovery>2019-03-05</discovery>
+ <entry>2019-03-15</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="e56f2f7c-410e-11e9-b95c-b499baebfeaf">
+ <topic>OpenSSL -- ChaCha20-Poly1305 nonce vulnerability</topic>
+ <affects>
+ <package>
+ <name>openssl111</name>
+ <range><lt>1.1.1b_1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The OpenSSL project reports:</p>
+ <blockquote cite="https://www.openssl.org/news/secadv/20190306.txt">
+ <p>Low: ChaCha20-Poly1305 with long nonces (CVE-2019-1543)</p>
+ <p>ChaCha20-Poly1305 is an AEAD cipher, and requires a unique nonce
+ input for every encryption operation. RFC 7539 specifies that the nonce
+ value (IV) should be 96 bits (12 bytes). OpenSSL allows a variable nonce
+ length and front pads the nonce with 0 bytes if it is less than 12 bytes.
+ However it also incorrectly allows a nonce to be set of up to 16 bytes.
+ In this case only the last 12 bytes are significant and any additional
+ leading bytes are ignored.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.openssl.org/news/secadv/20190306.txt</url>
+ <cvename>CVE-2019-1543</cvename>
+ </references>
+ <dates>
+ <discovery>2019-03-06</discovery>
+ <entry>2019-03-07</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="c2576e14-36e2-11e9-9eda-206a8a720317">
+ <topic>ntp -- Crafted null dereference attack from a trusted source with an authenticated mode 6 packet</topic>
+ <affects>
+ <package>
+ <name>ntp</name>
+ <range><lt>4.2.8p13</lt></range>
+ </package>
+ <package>
+ <name>FreeBSD</name>
+ <range><ge>12.0</ge><lt>12.0_2</lt></range>
+ <range><ge>11.2</ge><lt>11.2_8</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Network Time Foundation reports:</p>
+ <blockquote cite="http://support.ntp.org/bin/view/Main/SecurityNotice#March_2019_ntp_4_2_8p13_NTP_Rele">
+ <p>A crafted malicious authenticated mode 6 (ntpq) packet from a
+ permitted network address can trigger a NULL pointer dereference,
+ crashing ntpd.</p>
+ <p>Note that for this attack to work, the sending
+ system must be on an address that the target's ntpd accepts mode 6
+ packets from, and must use a private key that is specifically
+ listed as being used for mode 6 authorization.</p>
+ <p>Impact: The ntpd daemon can crash due to the NULL pointer
+ dereference, causing a denial of service.</p>
+ <p>Mitigation:</p>
+ <ul>
+ <li>Use restrict noquery to limit addresses that can send mode 6
+ queries.</li>
+ <li>Limit access to the private controlkey in ntp.keys.</li>
+ <li>Upgrade to 4.2.8p13, or later.</li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://bugs.ntp.org/3565</url>
+ <url>http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2019-8936</url>
+ <url>https://nvd.nist.gov/vuln-metrics/cvss/v2-calculator?vector=(AV:N/AC:H/Au:M/C:N/I:N/A:C)</url>
+ <url>https://nvd.nist.gov/vuln-metrics/cvss/v3-calculator?vector=AV:N/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:H</url>
+ <cvename>CVE-2019-8936</cvename>
+ <freebsdsa>SA-19:04.ntp</freebsdsa>
+ </references>
+ <dates>
+ <discovery>2019-01-15</discovery>
+ <entry>2019-03-07</entry>
+ <modified>2019-07-30</modified>
+ </dates>
+ </vuln>
+
+ <vuln vid="d193aa9f-3f8c-11e9-9a24-6805ca0b38e8">
+ <topic>rssh - multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>rssh</name>
+ <range><lt>2.3.4_2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>NVD reports:</p>
+ <blockquote cite="https://nvd.nist.gov/vuln/search/results?form_type=Advanced&amp;cves=on&amp;cpe_version=cpe%3a%2fa%3apizzashack%3arssh%3a2.3.4">
+ <p>rssh version 2.3.4 contains a CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') vulnerability in allowscp permission that can result in Local command execution. This attack appear to be exploitable via An authorized SSH user with the allowscp permission.</p>
+ <p>Insufficient sanitization of arguments passed to rsync can bypass the restrictions imposed by rssh, a restricted shell that should restrict users to perform only rsync operations, resulting in the execution of arbitrary shell commands.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://nvd.nist.gov/vuln/search/results?form_type=Advanced&amp;cves=on&amp;cpe_version=cpe%3a%2fa%3apizzashack%3arssh%3a2.3.4</url>
+ <cvename>CVE-2019-1000018</cvename>
+ <cvename>CVE-2019-3463</cvename>
+ <cvename>CVE-2019-3464</cvename>
+ </references>
+ <dates>
+ <discovery>2019-02-04</discovery>
+ <entry>2019-03-06</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="416ca0f4-3fe0-11e9-bbdd-6805ca0b3d42">
+ <topic>rt -- XSS via jQuery</topic>
+ <affects>
+ <package>
+ <name>rt42</name>
+ <range><ge>4.2.0</ge><lt>4.2.16</lt></range>
+ </package>
+ <package>
+ <name>rt44</name>
+ <range><ge>4.4.0</ge><lt>4.4.4</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>BestPractical reports:</p>
+ <blockquote cite="https://docs.bestpractical.com/release-notes/rt/4.4.4">
+
+ <p>The version of jQuery used in RT 4.2 and 4.4 has a
+ Cross-site Scripting (XSS) vulnerability when using
+ cross-domain Ajax requests. This vulnerability is assigned
+ <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2015-9251">CVE-2015-9251</a>. RT
+ does not use this jQuery feature so it is not directly
+ vulnerable. jQuery version 1.12 no longer receives official
+ updates, however a fix was posted with recommendations for
+ applications to patch locally, so RT will follow this
+ recommendation and ship with a patched version.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://docs.bestpractical.com/release-notes/rt/4.4.4</url>
+ <url>https://docs.bestpractical.com/release-notes/rt/4.2.16</url>
+ <cvename>CVE-2015-9251</cvename>
+ </references>
+ <dates>
+ <discovery>2019-03-05</discovery>
+ <entry>2019-03-06</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="526d9642-3ae7-11e9-a669-8c164582fbac">
+ <topic>slixmpp -- improper access control</topic>
+ <affects>
+ <package>
+ <name>py35-slixmpp</name>
+ <name>py36-slixmpp</name>
+ <name>py37-slixmpp</name>
+ <range><lt>1.4.2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>NVD reports:</p>
+ <blockquote cite="https://nvd.nist.gov/vuln/detail/CVE-2019-1000021">
+ <p>slixmpp version before commit 7cd73b594e8122dddf847953fcfc85ab4d316416
+ contains an incorrect Access Control vulnerability in XEP-0223 plugin
+ (Persistent Storage of Private Data via PubSub) options profile, used
+ for the configuration of default access model that can result in
+ all of the contacts of the victim can see private data having been
+ published to a PEP node. This attack appears to be exploitable
+ if the user of this library publishes any private data on PEP,
+ the node isn't configured to be private. This vulnerability appears
+ to have been fixed in commit 7cd73b594e8122dddf847953fcfc85ab4d316416
+ which is included in slixmpp 1.4.2.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://nvd.nist.gov/vuln/detail/CVE-2019-1000021</url>
+ <cvename>CVE-2019-1000021</cvename>
+ </references>
+ <dates>
+ <discovery>2019-02-04</discovery>
+ <entry>2019-03-05</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="11292460-3f2f-11e9-adcb-001b217b3468">
+ <topic>Gitlab -- Multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>gitlab-ce</name>
+ <range><ge>11.8.0</ge><lt>11.8.1</lt></range>
+ <range><ge>11.7.0</ge><lt>11.7.6</lt></range>
+ <range><ge>2.9.0</ge><lt>11.6.10</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Gitlab reports:</p>
+ <blockquote cite="https://about.gitlab.com/2019/03/04/security-release-gitlab-11-dot-8-dot-1-released/">
+ <p>Arbitrary file read via MergeRequestDiff</p>
+ <p>CSRF add Kubernetes cluster integration</p>
+ <p>Blind SSRF in prometheus integration</p>
+ <p>Merge request information disclosure</p>
+ <p>IDOR milestone name information disclosure</p>
+ <p>Burndown chart information disclosure</p>
+ <p>Private merge request titles in public project information disclosure</p>
+ <p>Private namespace disclosure in email notification when issue is moved</p>
+ <p>Milestone name disclosure</p>
+ <p>Issue board name disclosure</p>
+ <p>NPM automatic package referencer</p>
+ <p>Path traversal snippet mover</p>
+ <p>Information disclosure repo existence</p>
+ <p>Issue DoS via Mermaid</p>
+ <p>Privilege escalation impersonate user</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://about.gitlab.com/2019/03/04/security-release-gitlab-11-dot-8-dot-1-released/</url>
+ <cvename>CVE-2019-9221</cvename>
+ <cvename>CVE-2019-9176</cvename>
+ <cvename>CVE-2019-9174</cvename>
+ <cvename>CVE-2019-9172</cvename>
+ <cvename>CVE-2019-9170</cvename>
+ <cvename>CVE-2019-9175</cvename>
+ <cvename>CVE-2019-9178</cvename>
+ <cvename>CVE-2019-9179</cvename>
+ <cvename>CVE-2019-9171</cvename>
+ <cvename>CVE-2019-9224</cvename>
+ <cvename>CVE-2019-9225</cvename>
+ <cvename>CVE-2019-9219</cvename>
+ <cvename>CVE-2019-9217</cvename>
+ <cvename>CVE-2019-9222</cvename>
+ <cvename>CVE-2019-9223</cvename>
+ <cvename>CVE-2019-9220</cvename>
+ <cvename>CVE-2019-9485</cvename>
+ </references>
+ <dates>
+ <discovery>2019-03-04</discovery>
+ <entry>2019-03-05</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="a3e24de7-3f0c-11e9-87d1-00012e582166">
+ <topic>py-gunicorn -- CWE-113 vulnerability</topic>
+ <affects>
+ <package>
+ <name>py27-gunicorn</name>
+ <name>py35-gunicorn</name>
+ <name>py36-gunicorn</name>
+ <name>py37-gunicorn</name>
+ <range><lt>19.5.0</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Everardo reports:</p>
+ <blockquote cite="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1000164">
+ <p>gunicorn version 19.4.5 contains a CWE-113: Improper
+ Neutralization of CRLF Sequences in HTTP Headers vulnerability
+ in process_headers function in gunicorn/http/wsgi.py
+ that can result in an attacker causing the server to
+ return arbitrary HTTP headers.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2018-1000164</cvename>
+ <url>https://epadillas.github.io/2018/04/02/http-header-splitting-in-gunicorn-19.4.5</url>
+ </references>
+ <dates>
+ <discovery>2018-04-02</discovery>
+ <entry>2019-03-05</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="b71d7193-3c54-11e9-a3f9-00155d006b02">
+ <topic>Node.js -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>node</name>
+ <range><lt>11.10.1</lt></range>
+ </package>
+ <package>
+ <name>node10</name>
+ <range><lt>10.15.2</lt></range>
+ </package>
+ <package>
+ <name>node8</name>
+ <range><lt>8.15.1</lt></range>
+ </package>
+ <package>
+ <name>node6</name>
+ <range><lt>6.17.0</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Node.js reports:</p>
+ <blockquote cite="https://nodejs.org/en/blog/vulnerability/february-2019-security-releases/">
+ <p>Updates are now available for all active Node.js release lines. In addition to fixes for security flaws in Node.js, they also include upgrades of Node.js 6 and 8 to OpenSSL 1.0.2r which contains a fix for a moderate severity security vulnerability.</p>
+ <p>For these releases, we have decided to withhold the fix for the Misinterpretation of Input (CWE-115) flaw mentioned in the original announcement. This flaw is very low severity and we are not satisfied that we had a complete and stable fix ready for release. We will be seeking to address this flaw via alternate mechanisms in the near future. In addition, we have introduced an additional CVE for a change in Node.js 6 that we have decided to classify as a Denial of Service (CWE-400) flaw.</p>
+ <p>We recommend that all Node.js users upgrade to a version listed below as soon as possible.</p>
+ <h1>OpenSSL: 0-byte record padding oracle (CVE-2019-1559)</h1>
+ <p>OpenSSL 1.0.2r contains a fix for CVE-2019-1559 and is included in the releases for Node.js versions 6 and 8 only. Node.js 10 and 11 are not impacted by this vulnerability as they use newer versions of OpenSSL which do not contain the flaw.</p>
+ <p>Under certain circumstances, a TLS server can be forced to respond differently to a client if a zero-byte record is received with an invalid padding compared to a zero-byte record with an invalid MAC. This can be used as the basis of a padding oracle attack to decrypt data.</p>
+ <p>Only TLS connections using certain ciphersuites executing under certain conditions are exploitable. We are currently unable to determine whether the use of OpenSSL in Node.js exposes this vulnerability. We are taking a cautionary approach and recommend the same for users. For more information, see the advisory and a detailed write-up by the reporters of the vulnerability.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://nodejs.org/en/blog/vulnerability/february-2019-security-releases/</url>
+ <cvename>CVE-2019-5737</cvename>
+ <cvename>CVE-2019-5739</cvename>
+ <cvename>CVE-2019-1559</cvename>
+ </references>
+ <dates>
+ <discovery>2019-02-28</discovery>
+ <entry>2019-03-03</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="395ed9d5-3cca-11e9-9ba0-4c72b94353b5">
+ <topic>mybb -- vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>mybb</name>
+ <range><lt>1.8.20_1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>mybb Team reports:</p>
+ <blockquote cite="https://blog.mybb.com/2019/02/27/mybb-1-8-20-released-security-maintenance-release/">
+ <p>Medium risk: Reset Password reflected XSS</p>
+ <p>Medium risk: ModCP Profile Editor username reflected XSS</p>
+ <p>Low risk: Predictable CSRF token for guest users</p>
+ <p>Low risk: ACP Stylesheet Properties XSS</p>
+ <p>Low risk: Reset Password username enumeration via email</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://blog.mybb.com/2019/02/27/mybb-1-8-20-released-security-maintenance-release/</url>
+ </references>
+ <dates>
+ <discovery>2019-02-27</discovery>
+ <entry>2019-03-02</entry>
+ <modified>2019-03-04</modified>
+ </dates>
+ </vuln>
+
+ <vuln vid="be0e3817-3bfe-11e9-9cd6-001999f8d30b">
+ <topic>asterisk -- Remote crash vulnerability with SDP protocol violation</topic>
+ <affects>
+ <package>
+ <name>asterisk15</name>
+ <range><lt>15.7.2</lt></range>
+ </package>
+ <package>
+ <name>asterisk16</name>
+ <range><lt>16.2.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Asterisk project reports:</p>
+ <blockquote cite="https://www.asterisk.org/downloads/security-advisories">
+ <p>When Asterisk makes an outgoing call, a very specific
+ SDP protocol violation by the remote party can cause
+ Asterisk to crash.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://downloads.asterisk.org/pub/security/AST-2019-001.html</url>
+ <cvename>CVE-2019-7251</cvename>
+ </references>
+ <dates>
+ <discovery>2019-01-24</discovery>
+ <entry>2019-03-01</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="e3aacd6d-3d01-434c-9330-bc9efd40350f">
+ <topic>webkit-gtk -- Multiple vulnabilities</topic>
+ <affects>
+ <package>
+ <name>webkit2-gtk3</name>
+ <range><lt>2.22.6</lt></range>
+ </package>
+ <package>
+ <name>webkit-gtk2</name>
+ <name>webkit-gtk3</name>
+ <range><ge>0</ge></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Webkitgtk project reports:</p>
+ <blockquote cite="https://webkitgtk.org/security/WSA-2019-0001.html">
+ <p>CVE-2019-6212 - Processing maliciously crafted web content may lead to arbitrary code execution. Multiple memory corruption issues were addressed with improved memory handling.</p>
+ <p>CVE-2019-6215 - Processing maliciously crafted web content may lead to arbitrary code execution. A type confusion issue was addressed with improved memory handling.</p>
+ <p>CVE-2019-6216 - Processing maliciously crafted web content may lead to arbitrary code execution. Multiple memory corruption issues were addressed with improved memory handling.</p>
+ <p>CVE-2019-6217 - Processing maliciously crafted web content may lead to arbitrary code execution. Multiple memory corruption issues were addressed with improved memory handling.</p>
+ <p>CVE-2019-6226 - Processing maliciously crafted web content may lead to arbitrary code execution. Multiple memory corruption issues were addressed with improved memory handling.</p>
+ <p>CVE-2019-6227 - Processing maliciously crafted web content may lead to arbitrary code execution. A memory corruption issue was addressed with improved memory handling.</p>
+ <p>CVE-2019-6229 - Processing maliciously crafted web content may lead to universal cross site scripting. A logic issue was addressed with improved validation.</p>
+ <p>CVE-2019-6233 - Processing maliciously crafted web content may lead to arbitrary code execution. A memory corruption issue was addressed with improved memory handling.</p>
+ <p>CVE-2019-6234 - Processing maliciously crafted web content may lead to arbitrary code execution. A memory corruption issue was addressed with improved memory handling.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://webkitgtk.org/security/WSA-2019-0001.html</url>
+ <cvename>CVE-2019-6212</cvename>
+ <cvename>CVE-2019-6215</cvename>
+ <cvename>CVE-2019-6216</cvename>
+ <cvename>CVE-2019-6217</cvename>
+ <cvename>CVE-2019-6226</cvename>
+ <cvename>CVE-2019-6227</cvename>
+ <cvename>CVE-2019-6229</cvename>
+ <cvename>CVE-2019-6233</cvename>
+ <cvename>CVE-2019-6234</cvename>
+ </references>
+ <dates>
+ <discovery>2019-02-08</discovery>
+ <entry>2019-02-24</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="3e2c9b63-223c-4575-af5c-816acb14e445">
+ <topic>rdesktop - critical - Remote Code Execution</topic>
+ <affects>
+ <package>
+ <name>rdesktop</name>
+ <range><lt>1.8.4</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <blockquote cite="https://github.com/rdesktop/rdesktop/releases/tag/v1.8.4">
+ <ul>
+ <li>Fix memory corruption in process_bitmap_data - CVE-2018-8794
+ </li>
+ <li>Fix remote code execution in process_bitmap_data - CVE-2018-8795
+ </li>
+ <li>Fix remote code execution in process_plane - CVE-2018-8797
+ </li>
+ <li>Fix Denial of Service in mcs_recv_connect_response - CVE-2018-20175
+ </li>
+ <li>Fix Denial of Service in mcs_parse_domain_params - CVE-2018-20175
+ </li>
+ <li>Fix Denial of Service in sec_parse_crypt_info - CVE-2018-20176
+ </li>
+ <li>Fix Denial of Service in sec_recv - CVE-2018-20176
+ </li>
+ <li>Fix minor information leak in rdpdr_process - CVE-2018-8791
+ </li>
+ <li>Fix Denial of Service in cssp_read_tsrequest - CVE-2018-8792
+ </li>
+ <li>Fix remote code execution in cssp_read_tsrequest - CVE-2018-8793
+ </li>
+ <li>Fix Denial of Service in process_bitmap_data - CVE-2018-8796
+ </li>
+ <li>Fix minor information leak in rdpsnd_process_ping - CVE-2018-8798
+ </li>
+ <li>Fix Denial of Service in process_secondary_order - CVE-2018-8799
+ </li>
+ <li>Fix remote code execution in in ui_clip_handle_data - CVE-2018-8800
+ </li>
+ <li>Fix major information leak in ui_clip_handle_data - CVE-2018-20174
+ </li>
+ <li>Fix memory corruption in rdp_in_unistr - CVE-2018-20177
+ </li>
+ <li>Fix Denial of Service in process_demand_active - CVE-2018-20178
+ </li>
+ <li>Fix remote code execution in lspci_process - CVE-2018-20179
+ </li>
+ <li>Fix remote code execution in rdpsnddbg_process - CVE-2018-20180
+ </li>
+ <li>Fix remote code execution in seamless_process - CVE-2018-20181
+ </li>
+ <li>Fix remote code execution in seamless_process_line - CVE-2018-20182
+ </li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://github.com/rdesktop/rdesktop/releases/tag/v1.8.4</url>
+ <cvename>CVE-2018-20175</cvename>
+ <cvename>CVE-2018-20176</cvename>
+ <cvename>CVE-2018-8791</cvename>
+ <cvename>CVE-2018-8792</cvename>
+ <cvename>CVE-2018-8793</cvename>
+ <cvename>CVE-2018-8794</cvename>
+ <cvename>CVE-2018-8795</cvename>
+ <cvename>CVE-2018-8796</cvename>
+ <cvename>CVE-2018-8797</cvename>
+ <cvename>CVE-2018-8798</cvename>
+ <cvename>CVE-2018-8799</cvename>
+ <cvename>CVE-2018-8800</cvename>
+ <cvename>CVE-2018-20174</cvename>
+ <cvename>CVE-2018-20177</cvename>
+ <cvename>CVE-2018-20178</cvename>
+ <cvename>CVE-2018-20179</cvename>
+ <cvename>CVE-2018-20180</cvename>
+ <cvename>CVE-2018-20181</cvename>
+ <cvename>CVE-2018-20182</cvename>
+ </references>
+ <dates>
+ <discovery>2019-01-02</discovery>
+ <entry>2019-02-22</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="002b4b05-35dd-11e9-94a8-000ffec0b3e1">
+ <topic>drupal -- Drupal core - Highly critical - Remote Code Execution</topic>
+ <affects>
+ <package>
+ <name>drupal8</name>
+ <range><lt>8.6.10</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Drupal Security Team</p>
+ <blockquote cite="https://www.drupal.org/SA-CORE-2019-003">
+ <p>Some field types do not properly sanitize data from non-form sources.
+ This can lead to arbitrary PHP code execution in some cases..</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.drupal.org/sa-core-2019-002</url>
+ <cvename>CVE-2019-6340</cvename>
+ </references>
+ <dates>
+ <discovery>2019-02-20</discovery>
+ <entry>2019-02-21</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="7700061f-34f7-11e9-b95c-b499baebfeaf">
+ <topic>OpenSSL -- Padding oracle vulnerability</topic>
+ <affects>
+ <package>
+ <name>openssl</name>
+ <range><lt>1.0.2r,1</lt></range>
+ </package>
+ <package>
+ <name>linux-c6-openssl</name>
+ <range><lt>1.0.1e_16</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The OpenSSL project reports:</p>
+ <blockquote cite="https://www.openssl.org/news/secadv/20190226.txt">
+ <p>0-byte record padding oracle (CVE-2019-1559) (Moderate)<br/>
+ If an application encounters a fatal protocol error and then calls
+ SSL_shutdown() twice (once to send a close_notify, and once to receive
+ one) then OpenSSL can respond differently to the calling application if
+ a 0 byte record is received with invalid padding compared to if a 0 byte
+ record is received with an invalid MAC. If the application then behaves
+ differently based on that in a way that is detectable to the remote peer,
+ then this amounts to a padding oracle that could be used to decrypt data.
+ </p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.openssl.org/news/secadv/20190226.txt</url>
+ <cvename>CVE-2019-1559</cvename>
+ </references>
+ <dates>
+ <discovery>2019-02-19</discovery>
+ <entry>2019-02-20</entry>
+ <modified>2019-03-07</modified>
+ </dates>
+ </vuln>
+
+ <vuln vid="f0416fb5-3130-11e9-a5ba-e0d55e883e26">
+ <topic>msmtp -- certificate-verification issue</topic>
+ <affects>
+ <package>
+ <name>msmtp</name>
+ <range><gt>1.8.1</gt><lt>1.8.3</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>msmtp developers report:</p>
+ <blockquote cite="https://marlam.de/msmtp/news/msmtp-1-8-3/">
+ <p>In msmtp 1.8.2, when tls_trust_file has its default configuration,
+ certificate-verification results are not properly checked.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://marlam.de/msmtp/news/msmtp-1-8-3/</url>
+ <cvename>CVE-2019-8337</cvename>
+ </references>
+ <dates>
+ <discovery>2019-02-11</discovery>
+ <entry>2019-02-15</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="18211552-f650-4d86-ba4f-e6d5cbfcdbeb">
+ <topic>mozilla -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>firefox</name>
+ <range><lt>65.0.1,1</lt></range>
+ </package>
+ <package>
+ <name>firefox-esr</name>
+ <range><lt>60.5.1,1</lt></range>
+ </package>
+ <package>
+ <name>thunderbird</name>
+ <range><lt>60.5.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Mozilla Foundation reports:</p>
+ <blockquote cite="https://www.mozilla.org/en-US/security/advisories/mfsa2019-04/">
+ <p>CVE-2018-18356: Use-after-free in Skia</p>
+ <p>CVE-2019-5785: Integer overflow in Skia</p>
+ <p>CVE-2018-18511: Cross-origin theft of images with ImageBitmapRenderingContext</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2018-18511</cvename>
+ <cvename>CVE-2018-18356</cvename>
+ <cvename>CVE-2019-5785</cvename>
+ <url>https://www.mozilla.org/en-US/security/advisories/mfsa2019-04/</url>
+ <url>https://www.mozilla.org/en-US/security/advisories/mfsa2019-05/</url>
+ </references>
+ <dates>
+ <discovery>2019-02-13</discovery>
+ <entry>2019-02-13</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="de11a8fb-2eda-11e9-8fb5-6451062f0f7a">
+ <topic>Flash Player -- information disclosure</topic>
+ <affects>
+ <package>
+ <name>linux-flashplayer</name>
+ <range><lt>32.0.0.142</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Adobe reports:</p>
+ <blockquote cite="https://helpx.adobe.com/security/products/flash-player/apsb19-06.html">
+ <ul>
+ <li>This update resolves an out-of-bounds vulnerability that
+ could lead to information disclosure (CVE-2019-7090).</li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-7090</cvename>
+ <url>https://helpx.adobe.com/security/products/flash-player/apsb19-06.html</url>
+ </references>
+ <dates>
+ <discovery>2019-02-12</discovery>
+ <entry>2019-02-12</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="5efd7a93-2dfb-11e9-9549-e980e869c2e9">
+ <topic>OpenJPEG -- integer overflow</topic>
+ <affects>
+ <package>
+ <name>openjpeg</name>
+ <range><lt>2.3.0_4</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>NVD reports:</p>
+ <blockquote cite="https://nvd.nist.gov/vuln/detail/CVE-2018-5727">
+ <p>In OpenJPEG 2.3.0, there is an integer overflow vulnerability in the
+ opj_t1_encode_cblks function (openjp2/t1.c). Remote attackers could
+ leverage this vulnerability to cause a denial of service via a crafted
+ bmp file.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://nvd.nist.gov/vuln/detail/CVE-2018-5727</url>
+ <url>https://github.com/uclouvain/openjpeg/issues/1053</url>
+ <cvename>CVE-2018-5727</cvename>
+ </references>
+ <dates>
+ <discovery>2017-12-08</discovery>
+ <entry>2019-02-11</entry>
+ <modified>2019-03-29</modified>
+ </dates>
+ </vuln>
+
+ <vuln vid="86c89abf-2d91-11e9-bf3e-a4badb2f4699">
+ <topic>FreeBSD -- File description reference count leak</topic>
+ <affects>
+ <package>
+ <name>FreeBSD-kernel</name>
+ <range><ge>12.0</ge><lt>12.0_3</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <h1>Problem Description:</h1>
+ <p>FreeBSD 12.0 attempts to handle the case where the
+ receiving process does not provide a sufficiently large
+ buffer for an incoming control message containing rights.
+ In particular, to avoid leaking the corresponding descriptors
+ into the receiving process' descriptor table, the kernel
+ handles the truncation case by closing descriptors referenced
+ by the discarded message.</p>
+ <p>The code which performs this operation failed to release
+ a reference obtained on the file corresponding to a received
+ right. This bug can be used to cause the reference counter
+ to wrap around and free the file structure.</p>
+ <h1>Impact:</h1>
+ <p>A local user can exploit the bug to gain root privileges
+ or escape from a jail.</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-5596</cvename>
+ <freebsdsa>SA-19:02.fd</freebsdsa>
+ </references>
+ <dates>
+ <discovery>2019-02-05</discovery>
+ <entry>2019-02-11</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="683c714d-2d91-11e9-bf3e-a4badb2f4699">
+ <topic>FreeBSD -- System call kernel data register leak</topic>
+ <affects>
+ <package>
+ <name>FreeBSD-kernel</name>
+ <range><ge>12.0</ge><lt>12.0_3</lt></range>
+ <range><ge>11.2</ge><lt>11.2_9</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <h1>Problem Description:</h1>
+ <p>The callee-save registers are used by kernel and for
+ some of them (%r8, %r10, and for non-PTI configurations,
+ %r9) the content is not sanitized before return from syscalls,
+ potentially leaking sensitive information.</p>
+ <h1>Impact:</h1>
+ <p>Typically an address of some kernel data structure used
+ in the syscall implementation, is exposed.</p>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-5595</cvename>
+ <freebsdsa>SA-19:01.syscall</freebsdsa>
+ </references>
+ <dates>
+ <discovery>2019-02-05</discovery>
+ <entry>2019-02-11</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="e8bcac84-2d5c-11e9-9a74-e0d55e2a8bf9">
+ <topic>kf5-kauth -- Insecure handling of arguments in helpers</topic>
+ <affects>
+ <package>
+ <name>kf5-kauth</name>
+ <range><lt>5.54.0_2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Albert Astals Cid reports:</p>
+ <blockquote cite="https://www.kde.org/info/security/advisory-20190209-1.txt">
+ <p>KAuth allows to pass parameters with arbitrary types to helpers running as root over DBus.</p>
+ <p>Certain types can cause crashes and trigger decoding arbitrary images with dynamically loaded plugin</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.kde.org/info/security/advisory-20190209-1.txt</url>
+ <cvename>CVE-2019-7443</cvename>
+ </references>
+ <dates>
+ <discovery>2019-02-09</discovery>
+ <entry>2019-02-10</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="c95836a0-2b3b-11e9-9838-8c164567ca3c">
+ <topic>unit -- heap memory buffer overflow</topic>
+ <affects>
+ <package>
+ <name>unit</name>
+ <range><ge>0.3.0</ge><lt>1.7.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>unit security problems:</p>
+ <blockquote cite="http://mailman.nginx.org/pipermail/unit/2019-February/000112.html">
+ <p>CVE-2019-7401: a head memory buffer overflow might have</p>
+ <p>been caused in the router process by a specially crafted</p>
+ <p>request, potentially resulting in a segmentation fault</p>
+ <p>or other unspecified behavior.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://mailman.nginx.org/pipermail/unit/2019-February/000112.html</url>
+ <cvename>CVE-2019-7401</cvename>
+ </references>
+ <dates>
+ <discovery>2019-02-07</discovery>
+ <entry>2019-02-08</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="714b033a-2b09-11e9-8bc3-610fd6e6cd05">
+ <topic>curl -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>curl</name>
+ <range><lt>7.64.0</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>curl security problems:</p>
+ <blockquote cite="https://curl.haxx.se/docs/security.html">
+ <p>CVE-2018-16890: NTLM type-2 out-of-bounds buffer read</p>
+ <p>libcurl contains a heap buffer out-of-bounds read flaw.</p>
+ <p>The function handling incoming NTLM type-2 messages
+ (lib/vauth/ntlm.c:ntlm_decode_type2_target) does not validate incoming
+ data correctly and is subject to an integer overflow vulnerability.</p>
+ <p>Using that overflow, a malicious or broken NTLM server could trick
+ libcurl to accept a bad length + offset combination that would lead to a
+ buffer read out-of-bounds.</p>
+ <p>CVE-2019-3822: NTLMv2 type-3 header stack buffer overflow</p>
+ <p>libcurl contains a stack based buffer overflow vulnerability.</p>
+ <p>The function creating an outgoing NTLM type-3 header
+ (lib/vauth/ntlm.c:Curl_auth_create_ntlm_type3_message()), generates the
+ request HTTP header contents based on previously received data. The
+ check that exists to prevent the local buffer from getting overflowed is
+ implemented wrongly (using unsigned math) and as such it does not
+ prevent the overflow from happening.</p>
+ <p>This output data can grow larger than the local buffer if very large
+ "nt response" data is extracted from a previous NTLMv2 header provided
+ by the malicious or broken HTTP server.</p>
+ <p>Such a "large value" needs to be around 1000 bytes or more. The actual
+ payload data copied to the target buffer comes from the NTLMv2 type-2
+ response header.</p>
+ <p>CVE-2019-3823: SMTP end-of-response out-of-bounds read</p>
+ <p>libcurl contains a heap out-of-bounds read in the code handling the
+ end-of-response for SMTP.</p>
+ <p>If the buffer passed to smtp_endofresp() isn't NUL terminated and
+ contains no character ending the parsed number, and len is set to 5,
+ then the strtol() call reads beyond the allocated buffer. The read
+ contents will not be returned to the caller.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://curl.haxx.se/docs/security.html</url>
+ <url>https://curl.haxx.se/docs/CVE-2018-16890.html</url>
+ <url>https://curl.haxx.se/docs/CVE-2019-3822.html</url>
+ <url>https://curl.haxx.se/docs/CVE-2019-3823.html</url>
+ <cvename>CVE-2018-16890</cvename>
+ <cvename>CVE-2019-3822</cvename>
+ <cvename>CVE-2019-3823</cvename>
+ </references>
+ <dates>
+ <discovery>2019-02-07</discovery>
+ <entry>2019-02-07</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="43ee6c1d-29ee-11e9-82a1-001b217b3468">
+ <topic>Gitlab -- Multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>gitlab-ce</name>
+ <range><ge>11.7.0</ge><lt>11.7.4</lt></range>
+ <range><ge>11.6.0</ge><lt>11.6.9</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Gitlab reports:</p>
+ <blockquote cite="https://about.gitlab.com/2019/02/05/critical-security-release-gitlab-11-dot-7-dot-4-released/">
+ <p>Leak of Confidential Issue and Merge Request Titles</p>
+ <p>Persistent XSS in User Status</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://about.gitlab.com/2019/02/05/critical-security-release-gitlab-11-dot-7-dot-4-released/</url>
+ <cvename>CVE-2019-7353</cvename>
+ <cvename>CVE-2019-6796</cvename>
+ </references>
+ <dates>
+ <discovery>2019-02-05</discovery>
+ <entry>2019-02-06</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="1340fcc1-2953-11e9-bc44-a4badb296695">
+ <topic>mail/dovecot -- Suitable client certificate can be used to login as other user</topic>
+ <affects>
+ <package>
+ <name>dovecot</name>
+ <range><lt>2.3.4.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Aki Tuomi (Open-Xchange Oy) reports:</p>
+ <blockquote cite="https://www.mail-archive.com/dovecot@dovecot.org/msg76117.html">
+ <p>Normally Dovecot is configured to authenticate
+imap/pop3/managesieve/submission clients using regular username/password
+combination. Some installations have also required clients to present a
+trusted SSL certificate on top of that. It's also possible to configure
+Dovecot to take the username from the certificate instead of from the
+user provided authentication. It's also possible to avoid having a
+password at all, only trusting the SSL certificate.
+
+If the provided trusted SSL certificate is missing the username field,
+Dovecot should be failing the authentication. However, the earlier
+versions will take the username from the user provided authentication
+fields (e.g. LOGIN command). If there is no additional password
+verification, this allows the attacker to login as anyone else in the
+system.
+
+This affects only installations using:
+
+auth_ssl_require_client_cert = yes
+auth_ssl_username_from_cert = yes
+
+Attacker must also have access to a valid trusted certificate without
+the ssl_cert_username_field in it. The default is commonName, which
+almost certainly exists in all certificates. This could happen for
+example if ssl_cert_username_field is a field that normally doesn't
+exist, and attacker has access to a web server's certificate (and key),
+which is signed with the same CA.
+
+Attack can be migitated by having the certificates with proper Extended
+Key Usage, such as 'TLS Web Server' and 'TLS Web Server Client'.
+
+Also, ssl_cert_username_field setting was ignored with external SMTP
+AUTH, because none of the MTAs (Postfix, Exim) currently send the
+cert_username field. This may have allowed users with trusted
+certificate to specify any username in the authentication. This does not
+apply to Dovecot Submission service.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.mail-archive.com/dovecot@dovecot.org/msg76117.html</url>
+ <cvename>CVE-2019-3814</cvename>
+ </references>
+ <dates>
+ <discovery>2019-01-16</discovery>
+ <entry>2019-02-05</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="5d8c0876-2716-11e9-9446-b7f8544ce15c">
+ <topic>typo3 -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>typo3-8-php71</name>
+ <name>typo3-8-php72</name>
+ <name>typo3-8-php73</name>
+ <range><lt>8.7.24</lt></range>
+ </package>
+ <package>
+ <name>typo3-9-php71</name>
+ <name>typo3-9-php72</name>
+ <name>typo3-9-php73</name>
+ <range><lt>9.5.4</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Typo3 news:</p>
+ <blockquote cite="https://typo3.org/article/typo3-954-and-8723-security-releases-published/">
+ <p>Please read the corresponding Security Advisories for details.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://typo3.org/article/typo3-954-and-8723-security-releases-published/</url>
+ <url>https://typo3.org/article/typo3-v8724-lts-released/</url>
+ </references>
+ <dates>
+ <discovery>2019-01-22</discovery>
+ <entry>2019-02-02</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="41c1cd6f-2645-11e9-b5f1-080027fee39c">
+ <topic>gitea -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>gitea</name>
+ <range><lt>1.7.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Gitea Team reports:</p>
+ <blockquote cite="https://github.com/go-gitea/gitea/releases/tag/v1.7.0">
+ <p>Disable redirect for i18n</p>
+ <p>Only allow local login if password is non-empty</p>
+ <p>Fix go-get URL generation</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://github.com/go-gitea/gitea/releases/tag/v1.7.1</url>
+ </references>
+ <dates>
+ <discovery>2019-01-31</discovery>
+ <entry>2019-02-01</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="22b90fe6-258e-11e9-9c8d-6805ca0b3d42">
+ <topic>p5-Email-Address-List -- DDoS related vulnerability</topic>
+ <affects>
+ <package>
+ <name>p5-Email-Address-List</name>
+ <range><lt>0.06</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Best PRactical Solutions reports:</p>
+ <blockquote cite="https://metacpan.org/source/BPS/Email-Address-List-0.06/Changes">
+ <pre>
+ 0.06 2019-01-02
+
+ - Changes to address CVE-2018-18898 which could allow DDoS-type attacks.
+ Thanks to Lukas Kramer for reporting the issue and Alex Vandiver for
+ contributing fixes.
+ - Fix pathological backtracking for unkown regex
+ - Fix pathological backtracking in obs-phrase(i.e. obs-display-name)
+ - Fix pathological backtracking in cfws, quoted strings
+ </pre>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://metacpan.org/source/BPS/Email-Address-List-0.06/Changes</url>
+ <cvename>CVE-2018-18898</cvename>
+ </references>
+ <dates>
+ <discovery>2019-01-02</discovery>
+ <entry>2019-01-31</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="467b7cbe-257d-11e9-8573-001b217b3468">
+ <topic>Gitlab -- Multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>gitlab-ce</name>
+ <range><ge>11.7.0</ge><lt>11.7.3</lt></range>
+ <range><ge>11.6.0</ge><lt>11.6.8</lt></range>
+ <range><ge>0.0.0</ge><lt>11.5.10</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Gitlab reports:</p>
+ <blockquote cite="https://about.gitlab.com/2019/01/31/security-release-gitlab-11-dot-7-dot-3-released/">
+ <p>Remote Command Execution via GitLab Pages</p>
+ <p>Covert Redirect to Steal GitHub/Bitbucket Tokens</p>
+ <p>Remote Mirror Branches Leaked by Git Transfer Refs</p>
+ <p>Denial of Service with Markdown</p>
+ <p>Guests Can View List of Group Merge Requests</p>
+ <p>Guest Can View Merge Request Titles via System Notes</p>
+ <p>Persistent XSS via KaTeX</p>
+ <p>Emails Sent to Unauthorized Users</p>
+ <p>Hyperlink Injection in Notification Emails</p>
+ <p>Unauthorized Access to LFS Objects</p>
+ <p>Trigger Token Exposure</p>
+ <p>Upgrade Rails to 5.0.7.1 and 4.2.11</p>
+ <p>Contributed Project Information Visible in Private Profile</p>
+ <p>Imported Project Retains Prior Visibility Setting</p>
+ <p>Error disclosure on Project Import</p>
+ <p>Persistent XSS in User Status</p>
+ <p>Last Commit Status Leaked to Guest Users</p>
+ <p>Mitigations for IDN Homograph and RTLO Attacks</p>
+ <p>Access to Internal Wiki When External Wiki Enabled</p>
+ <p>User Can Comment on Locked Project Issues</p>
+ <p>Unauthorized Reaction Emojis by Guest Users</p>
+ <p>User Retains Project Role After Removal from Private Group</p>
+ <p>GitHub Token Leaked to Maintainers</p>
+ <p>Unauthenticated Blind SSRF in Jira Integration</p>
+ <p>Unauthorized Access to Group Membership</p>
+ <p>Validate SAML Response in Group SAML SSO</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://about.gitlab.com/2019/01/31/security-release-gitlab-11-dot-7-dot-3-released/</url>
+ <cvename>CVE-2019-6783</cvename>
+ <cvename>CVE-2019-6788</cvename>
+ <cvename>CVE-2019-6785</cvename>
+ <cvename>CVE-2019-6790</cvename>
+ <cvename>CVE-2019-6997</cvename>
+ <cvename>CVE-2019-6784</cvename>
+ <cvename>CVE-2019-6789</cvename>
+ <cvename>CVE-2019-6781</cvename>
+ <cvename>CVE-2019-6786</cvename>
+ <cvename>CVE-2019-6787</cvename>
+ <cvename>CVE-2018-16476</cvename>
+ <cvename>CVE-2019-6782</cvename>
+ <cvename>CVE-2019-6791</cvename>
+ <cvename>CVE-2019-6792</cvename>
+ <cvename>CVE-2019-6796</cvename>
+ <cvename>CVE-2019-6794</cvename>
+ <cvename>CVE-2019-6795</cvename>
+ <cvename>CVE-2019-6960</cvename>
+ <cvename>CVE-2019-6995</cvename>
+ <cvename>CVE-2019-7176</cvename>
+ <cvename>CVE-2019-7155</cvename>
+ <cvename>CVE-2019-6797</cvename>
+ <cvename>CVE-2019-6793</cvename>
+ <cvename>CVE-2019-6996</cvename>
+ </references>
+ <dates>
+ <discovery>2019-01-31</discovery>
+ <entry>2019-01-31</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="181beef6-2482-11e9-b4a3-00155d006b02">
+ <topic>turnserver -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>turnserver</name>
+ <range><lt>4.5.1.0</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Mihály Mészáros reports:</p>
+ <blockquote cite="https://github.com/coturn/coturn/blob/4.5.1.0/ChangeLog">
+ <p>We made 4.5.1.0 release public today that fixes many vulnerabilities.</p>
+ <p>It fix the following vulnerabilities:</p>
+ <ul>
+ <li>CVE-2018-4056</li>
+ <li>CVE-2018-4058</li>
+ <li>CVE-2018-4059</li>
+ </ul>
+ <p>They will be exposed very soon..</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://github.com/coturn/coturn/blob/4.5.1.0/ChangeLog</url>
+ <url>https://groups.google.com/d/msg/turn-server-project-rfc5766-turn-server/0RuCzcQa0ew/ebZfNEDqBwAJ</url>
+ <cvename>CVE-2018-4056</cvename>
+ <cvename>CVE-2018-4058</cvename>
+ <cvename>CVE-2018-4059</cvename>
+ </references>
+ <dates>
+ <discovery>2019-01-28</discovery>
+ <entry>2019-01-30</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="b1f7d52f-fc42-48e8-8403-87d4c9d26229">
+ <topic>mozilla -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>firefox</name>
+ <range><lt>65.0_1,1</lt></range>
+ </package>
+ <package>
+ <name>waterfox</name>
+ <range><lt>56.2.7</lt></range>
+ </package>
+ <package>
+ <name>seamonkey</name>
+ <name>linux-seamonkey</name>
+ <range><lt>2.53.0</lt></range>
+ </package>
+ <package>
+ <name>firefox-esr</name>
+ <range><lt>60.5.0_1,1</lt></range>
+ </package>
+ <package>
+ <name>linux-firefox</name>
+ <range><lt>60.5.0,2</lt></range>
+ </package>
+ <package>
+ <name>libxul</name>
+ <name>thunderbird</name>
+ <name>linux-thunderbird</name>
+ <range><lt>60.5.0</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Mozilla Foundation reports:</p>
+ <blockquote cite="https://www.mozilla.org/en-US/security/advisories/mfsa2019-01/">
+ <p>CVE-2018-18500: Use-after-free parsing HTML5 stream</p>
+ <p>CVE-2018-18503: Memory corruption with Audio Buffer</p>
+ <p>CVE-2018-18504: Memory corruption and out-of-bounds read of texture client buffer</p>
+ <p>CVE-2018-18505: Privilege escalation through IPC channel messages</p>
+ <p>CVE-2018-18506: Proxy Auto-Configuration file can define localhost access to be proxied</p>
+ <p>CVE-2018-18502: Memory safety bugs fixed in Firefox 65</p>
+ <p>CVE-2018-18501: Memory safety bugs fixed in Firefox 65 and Firefox ESR 60.5</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2018-18500</cvename>
+ <cvename>CVE-2018-18501</cvename>
+ <cvename>CVE-2018-18502</cvename>
+ <cvename>CVE-2018-18503</cvename>
+ <cvename>CVE-2018-18504</cvename>
+ <cvename>CVE-2018-18505</cvename>
+ <cvename>CVE-2018-18506</cvename>
+ <url>https://www.mozilla.org/en-US/security/advisories/mfsa2019-01/</url>
+ <url>https://www.mozilla.org/en-US/security/advisories/mfsa2019-02/</url>
+ </references>
+ <dates>
+ <discovery>2019-01-29</discovery>
+ <entry>2019-01-29</entry>
+ <modified>2019-07-23</modified>
+ </dates>
+ </vuln>
+
+ <vuln vid="40d92cc5-1e2b-11e9-bef6-6805ca2fa271">
+ <topic>powerdns-recursor -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>powerdns-recursor</name>
+ <range><lt>4.1.9</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>PowerDNS Team reports:</p>
+ <blockquote cite="https://doc.powerdns.com/recursor/changelog/4.1.html">
+ <p>CVE-2019-3806: An issue has been found in PowerDNS Recursor where Lua hooks are
+ not properly applied to queries received over TCP in some specific combination of
+ settings, possibly bypassing security policies enforced using Lua.
+
+ When the recursor is configured to run with more than one thread (threads=X) and to
+ do the distribution of incoming queries to the worker threads itself
+ (pdns-distributes-queries=yes), the Lua script is not properly loaded in the thread
+ handling incoming TCP queries, causing the Lua hooks to not be properly applied.</p>
+ <p>CVE-2019-3807: An issue has been found in PowerDNS Recursor where records in the
+ answer section of responses received from authoritative servers with the AA flag not
+ set were not properly validated, allowing an attacker to bypass DNSSEC validation.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://doc.powerdns.com/recursor/changelog/4.1.html</url>
+ <cvename>CVE-2019-3806</cvename>
+ <cvename>CVE-2019-3807</cvename>
+ </references>
+ <dates>
+ <discovery>2019-01-21</discovery>
+ <entry>2019-01-22</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="d3d02d3a-2242-11e9-b95c-b499baebfeaf">
+ <topic>MySQL -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>mariadb55-server</name>
+ <range><lt>5.5.63</lt></range>
+ </package>
+ <package>
+ <name>mariadb100-server</name>
+ <range><lt>10.0.38</lt></range>
+ </package>
+ <package>
+ <name>mariadb101-server</name>
+ <range><lt>10.1.38</lt></range>
+ </package>
+ <package>
+ <name>mariadb102-server</name>
+ <range><lt>10.2.22</lt></range>
+ </package>
+ <package>
+ <name>mariadb103-server</name>
+ <range><lt>10.3.13</lt></range>
+ </package>
+ <package>
+ <name>mysql55-server</name>
+ <range><lt>5.5.63</lt></range>
+ </package>
+ <package>
+ <name>mysql56-server</name>
+ <range><lt>5.6.43</lt></range>
+ </package>
+ <package>
+ <name>mysql57-server</name>
+ <range><lt>5.7.25</lt></range>
+ </package>
+ <package>
+ <name>mysql80-server</name>
+ <range><lt>8.0.14</lt></range>
+ </package>
+ <package>
+ <name>percona55-server</name>
+ <range><lt>5.5.63</lt></range>
+ </package>
+ <package>
+ <name>percona56-server</name>
+ <range><lt>5.6.43</lt></range>
+ </package>
+ <package>
+ <name>percona57-server</name>
+ <range><lt>5.7.25</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Oracle reports:</p>
+ <blockquote cite="https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html#AppendixMSQL">
+ <p>Please reference CVE/URL list for details</p>
+ <p>Not all listed CVE's are present in all versions/flavors</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html#AppendixMSQL</url>
+ <cvename>CVE-2019-2534</cvename>
+ <cvename>CVE-2019-2533</cvename>
+ <cvename>CVE-2019-2529</cvename>
+ <cvename>CVE-2019-2482</cvename>
+ <cvename>CVE-2019-2434</cvename>
+ <cvename>CVE-2019-2455</cvename>
+ <cvename>CVE-2019-2503</cvename>
+ <cvename>CVE-2019-2436</cvename>
+ <cvename>CVE-2019-2536</cvename>
+ <cvename>CVE-2019-2502</cvename>
+ <cvename>CVE-2019-2510</cvename>
+ <cvename>CVE-2019-2539</cvename>
+ <cvename>CVE-2019-2494</cvename>
+ <cvename>CVE-2019-2495</cvename>
+ <cvename>CVE-2019-2537</cvename>
+ <cvename>CVE-2019-2420</cvename>
+ <cvename>CVE-2019-2481</cvename>
+ <cvename>CVE-2019-2507</cvename>
+ <cvename>CVE-2019-2530</cvename>
+ <cvename>CVE-2019-2528</cvename>
+ <cvename>CVE-2019-2531</cvename>
+ <cvename>CVE-2019-2486</cvename>
+ <cvename>CVE-2019-2532</cvename>
+ <cvename>CVE-2019-2535</cvename>
+ <cvename>CVE-2019-2513</cvename>
+ </references>
+ <dates>
+ <discovery>2019-01-15</discovery>
+ <entry>2019-01-27</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="d8e7e854-17fa-11e9-bef6-6805ca2fa271">
+ <topic>botan2 -- Side channel during ECC key generation</topic>
+ <affects>
+ <package>
+ <name>botan2</name>
+ <range><lt>2.9.0</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>botan2 developers reports:</p>
+ <blockquote cite="https://botan.randombit.net/security.html#id1">
+ <p>A timing side channel during ECC key generation could leak information about the
+ high bits of the secret scalar. Such information allows an attacker to perform a
+ brute force attack on the key somewhat more efficiently than they would otherwise.
+ Found by Ján Jančár using ECTester.</p>
+ <p>Bug introduced in 1.11.20, fixed in 2.9.0</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://botan.randombit.net/security.html#id1</url>
+ <cvename>CVE-2018-20187</cvename>
+ </references>
+ <dates>
+ <discovery>2018-12-17</discovery>
+ <entry>2019-01-27</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="111aefca-2213-11e9-9c8d-6805ca0b3d42">
+ <topic>phpMyAdmin -- File disclosure and SQL injection</topic>
+ <affects>
+ <package>
+ <name>phpMyAdmin</name>
+ <name>phpMyAdmin-php56</name>
+ <name>phpMyAdmin-php70</name>
+ <name>phpMyAdmin-php71</name>
+ <name>phpMyAdmin-php72</name>
+ <range><lt>4.8.5</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The phpMyAdmin development team reports:</p>
+ <blockquote cite="https://www.phpmyadmin.net/security/PMASA-2019-1/">
+ <h3>Summary</h3>
+ <p>Arbitrary file read vulnerability</p>
+ <h3>Description</h3>
+ <p>When <code>AllowArbitraryServer</code> configuration set
+ to <code>true</code>, with the use of a rogue MySQL server,
+ an attacker can read any file on the server that the web
+ server's user can access.</p>
+ <p>phpMyadmin attempts to block the use of <code>LOAD DATA
+ INFILE</code>, but due to a <a href="https://bugs.php.net/bug.php?id=77496">bug in PHP</a>,
+ this check is not honored. Additionally, when using the
+ 'mysql' extension, <a href="http://php.net/manual/en/mysql.configuration.php#ini.mysql.allow-local-infile">mysql.allow_local_infile</a>
+ is enabled by default. Both of these conditions allow the
+ attack to occur.</p>
+ <h3>Severity</h3>
+ <p>We consider this vulnerability to be critical.</p>
+ <h3>Mitigation factor</h3>
+ <p>This attack can be mitigated by setting the
+ `AllowArbitraryServer` configuration directive to false
+ (which is the default value).</p>
+ <h3>Affected Versions</h3>
+ <p>phpMyAdmin versions from at least 4.0 through 4.8.4 are
+ affected</p>
+ </blockquote>
+ <blockquote cite="https://www.phpmyadmin.net/security/PMASA-2019-2/">
+ <h3>Summary</h3>
+ <p>SQL injection in Designer feature</p>
+ <h3>Description</h3>
+ <p>A vulnerability was reported where a specially crafted
+ username can be used to trigger an SQL injection attack
+ through the designer feature.</p>
+ <h3>Severity</h3>
+ <p>We consider this vulnerability to be serious.</p>
+ <h3>Affected Versions</h3>
+ <p>phpMyAdmin versions from 4.5.0 through 4.8.4 are affected</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.phpmyadmin.net/security/PMASA-2019-1/</url>
+ <url>https://www.phpmyadmin.net/security/PMASA-2019-2/</url>
+ </references>
+ <dates>
+ <discovery>2019-01-21</discovery>
+ <entry>2019-01-27</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="7f6146aa-2157-11e9-9ba0-4c72b94353b5">
+ <topic>gitea -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>gitea</name>
+ <range><lt>1.7.0</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Gitea Team reports:</p>
+ <blockquote cite="https://github.com/go-gitea/gitea/releases/tag/v1.7.0">
+ <p>Do not display the raw OpenID error in the UI</p>
+ <p>When redirecting clean the path to avoid redirecting to external site</p>
+ <p>Prevent DeleteFilePost doing arbitrary deletion</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://github.com/go-gitea/gitea/releases/tag/v1.7.0</url>
+ </references>
+ <dates>
+ <discovery>2019-01-22</discovery>
+ <entry>2019-01-26</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="8e48365a-214d-11e9-9f8a-0050562a4d7b">
+ <topic>libzmq4 -- Remote Code Execution Vulnerability</topic>
+ <affects>
+ <package>
+ <name>libzmq4</name>
+ <range><ge>4.2.0</ge><lt>4.3.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <blockquote cite="https://github.com/zeromq/libzmq/releases/tag/v4.3.1">
+ <p>A vulnerability has been found that would allow attackers to direct a peer to
+ jump to and execute from an address indicated by the attacker.
+ This issue has been present since v4.2.0. Older releases are not affected.
+
+ NOTE: The attacker needs to know in advance valid addresses in the peer's
+ memory to jump to, so measures like ASLR are effective mitigations.
+
+ NOTE: this attack can only take place after authentication, so peers behind
+ CURVE/GSSAPI are not vulnerable to unauthenticated attackers.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-6250</cvename>
+ <url>https://github.com/zeromq/libzmq/issues/3351</url>
+ <url>https://github.com/zeromq/libzmq/pull/3353</url>
+ <url>https://nvd.nist.gov/vuln/detail/CVE-2019-6250</url>
+ <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-6250</url>
+ </references>
+ <dates>
+ <discovery>2019-01-08</discovery>
+ <entry>2019-01-26</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="eb888ce5-1f19-11e9-be05-4c72b94353b5">
+ <topic>Apache -- vulnerability</topic>
+ <affects>
+ <package>
+ <name>apache24</name>
+ <range><lt>2.4.38</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Apache httpd Project reports:</p>
+ <blockquote cite="http://httpd.apache.org/security/vulnerabilities_24.html">
+ <p>SECURITY: CVE-2018-17199
+ mod_session: mod_session_cookie does not respect expiry time allowing
+ sessions to be reused.</p>
+ <p>SECURITY: CVE-2019-0190
+ mod_ssl: Fix infinite loop triggered by a client-initiated
+ renegotiation in TLSv1.2 (or earlier) with OpenSSL 1.1.1 and
+ later. PR 63052.</p>
+ <p>SECURITY: CVE-2018-17189
+ mod_http2: fixes a DoS attack vector. By sending slow request bodies
+ to resources not consuming them, httpd cleanup code occupies a server
+ thread unnecessarily. This was changed to an immediate stream reset
+ which discards all stream state and incoming data.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://www.apache.org/dist/httpd/CHANGES_2.4.38</url>
+ <url>http://httpd.apache.org/security/vulnerabilities_24.html</url>
+ <cvename>CVE-2018-17199</cvename>
+ <cvename>CVE-2018-17189</cvename>
+ <cvename>CVE-2019-0190</cvename>
+ </references>
+ <dates>
+ <discovery>2019-01-22</discovery>
+ <entry>2019-01-23</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="4af3241d-1f0c-11e9-b4bd-d43d7eed0ce2">
+ <topic>www/mod_dav_svn -- Malicious SVN clients can crash mod_dav_svn.</topic>
+ <affects>
+ <package>
+ <name>mod_dav_svn</name>
+ <range><ge>1.10.0</ge><lt>1.10.3</lt></range>
+ <range><eq>1.11.0</eq></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Subversion project reports:</p>
+ <blockquote cite="http://subversion.apache.org/security/CVE-2018-11803-advisory.txt">
+ <p>Malicious SVN clients can trigger a crash in mod_dav_svn by omitting
+ the root path from a recursive directory listing request.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>http://subversion.apache.org/security/CVE-2018-11803-advisory.txt</url>
+ </references>
+ <dates>
+ <discovery>2019-01-23</discovery>
+ <entry>2019-01-23</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="50ad9a9a-1e28-11e9-98d7-0050562a4d7b">
+ <topic>www/py-requests -- Information disclosure vulnerability</topic>
+ <affects>
+ <package>
+ <name>py27-requests</name>
+ <name>py35-requests</name>
+ <name>py36-requests</name>
+ <name>py37-requests</name>
+ <range><lt>2.20.0</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <blockquote cite="https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-18074">
+ <p>The Requests package before 2.20.0 for Python sends an HTTP Authorization header
+ to an http URI upon receiving a same-hostname https-to-http redirect, which makes
+ it easier for remote attackers to discover credentials by sniffing the network.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://cve.mitre.org/cgi-bin/cvename.cgi?name=2018-18074</url>
+ <url>https://nvd.nist.gov/vuln/detail/CVE-2018-18074</url>
+ <url>https://github.com/requests/requests/issues/4716</url>
+ <url>https://github.com/requests/requests/pull/4718</url>
+ <url>https://github.com/requests/requests/commit/c45d7c49ea75133e52ab22a8e9e13173938e36ff</url>
+ </references>
+ <dates>
+ <discovery>2018-06-27</discovery>
+ <entry>2019-01-22</entry>
+ <modified>2019-01-27</modified>
+ </dates>
+ </vuln>
+
+ <vuln vid="6aa398d0-1c4d-11e9-96dd-a4badb296695">
+ <topic>joomla3 -- vulnerabilitiesw</topic>
+ <affects>
+ <package>
+ <name>joomla3</name>
+ <range><lt>3.9.2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>JSST reports:</p>
+ <blockquote cite="https://developer.joomla.org/security-centre/760-00190101-core-stored-xss-in-mod-banners.html">
+ <p>Inadequate escaping in mod_banners leads to a stored XSS vulnerability.</p>
+ </blockquote>
+ <blockquote cite="https://developer.joomla.org/security-centre/761-20190102-core-stored-xss-in-com-contact.html">
+ <p>Inadequate escaping in com_contact leads to a stored XSS vulnerability</p>
+ </blockquote>
+ <blockquote cite="https://developer.joomla.org/security-centre/762-20190103-core-stored-xss-issue-in-the-global-configuration-textfilter-settings.html">
+ <p>Inadequate checks at the Global Configuration Text Filter settings allowed a stored XSS.</p>
+ </blockquote>
+ <blockquote cite="https://developer.joomla.org/security-centre/763-20190104-core-stored-xss-issue-in-the-global-configuration-help-url.html">
+ <p>Inadequate checks at the Global Configuration helpurl settings allowed a stored XSS.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://developer.joomla.org/security-centre/760-00190101-core-stored-xss-in-mod-banners.html</url>
+ <cvename>CVE-2019-6264</cvename>
+ <url>https://developer.joomla.org/security-centre/761-20190102-core-stored-xss-in-com-contact.html</url>
+ <cvename>CVE-2019-6261</cvename>
+ <url>https://developer.joomla.org/security-centre/762-20190103-core-stored-xss-issue-in-the-global-configuration-textfilter-settings.html</url>
+ <cvename>CVE-2019-6263</cvename>
+ <url>https://developer.joomla.org/security-centre/763-20190104-core-stored-xss-issue-in-the-global-configuration-help-url.html</url>
+ <cvename>CVE-2019-6262</cvename>
+ </references>
+ <dates>
+ <discovery>2018-12-01</discovery>
+ <entry>2019-01-20</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="e00ed3d9-1c27-11e9-a257-000ffec0b3e1">
+ <topic>drupal -- Drupal core - Arbitrary PHP code execution</topic>
+ <affects>
+ <package>
+ <name>drupal7</name>
+ <range><lt>7.63</lt></range>
+ </package>
+ <package>
+ <name>drupal8</name>
+ <range><lt>8.6.7</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Drupal Security Team reports:</p>
+ <blockquote cite="https://www.drupal.org/sa-core-2019-002">
+ <p>A remote code execution vulnerability exists in PHP's built-in
+ phar stream wrapper when performing file operations on an untrusted phar:// URI.</p>
+ <p>Some Drupal code (core, contrib, and custom) may be performing file operations on
+ insufficiently validated user input, thereby being exposed to this vulnerability.</p>
+ <p>This vulnerability is mitigated by the fact that such code paths typically require
+ access to an administrative permission or an atypical configuration.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://www.drupal.org/SA-CORE-2018-006</url>
+ </references>
+ <dates>
+ <discovery>2019-01-16</discovery>
+ <entry>2019-01-19</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="2a8b79c3-1b6e-11e9-8cf4-1c39475b9f84">
+ <topic>Helm -- client unpacking chart that contains malicious content</topic>
+ <affects>
+ <package>
+ <name>helm</name>
+ <range><ge>2.0.0</ge><lt>2.12.2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Helm security notice</p>
+ <blockquote cite="https://helm.sh/blog/helm-security-notice-2019/index.html">
+ <p>A specially crafted chart may be able to unpack content into locations on
+ the filesystem outside of the chart's path, potentially
+ overwriting existing files.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://helm.sh/blog/helm-security-notice-2019/index.html</url>
+ </references>
+ <dates>
+ <discovery>2019-01-14</discovery>
+ <entry>2019-01-18</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="ff50192c-19eb-11e9-8573-001b217b3468">
+ <topic>Gitlab -- Arbitrary repo read in Gitlab project import</topic>
+ <affects>
+ <package>
+ <name>gitlab-ce</name>
+ <range><ge>11.6.0</ge><lt>11.6.4</lt></range>
+ <range><ge>11.5.0</ge><lt>11.5.7</lt></range>
+ <range><ge>8.9.0</ge><lt>11.4.14</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Gitlab reports:</p>
+ <blockquote cite="https://about.gitlab.com/2019/01/16/critical-security-release-gitlab-11-dot-6-dot-4-released/">
+ <p>Arbitrary repo read in Gitlab project import</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://about.gitlab.com/2019/01/16/critical-security-release-gitlab-11-dot-6-dot-4-released/</url>
+ <cvename>CVE-2019-6240</cvename>
+ </references>
+ <dates>
+ <discovery>2019-01-16</discovery>
+ <entry>2019-01-17</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="debf6353-5753-4e9a-b710-a83ecdd743de">
+ <topic>jenkins -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>jenkins</name>
+ <range><lt>2.160</lt></range>
+ </package>
+ <package>
+ <name>jenkins-lts</name>
+ <range><lt>2.150.2</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Jenkins Security Advisory:</p>
+ <blockquote cite="https://jenkins.io/security/advisory/2019-01-16/">
+ <h1>Description</h1>
+ <h5>(High) SECURITY-868</h5>
+ <p>Administrators could persist access to Jenkins using crafted 'Remember me' cookie</p>
+ <h5>(Medium) SECURITY-901</h5>
+ <p>Deleting a user in an external security realm did not invalidate their session or 'Remember me' cookie</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://jenkins.io/security/advisory/2019-01-16/</url>
+ </references>
+ <dates>
+ <discovery>2019-01-16</discovery>
+ <entry>2019-01-16</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="383931ba-1818-11e9-92ea-448a5b29e8a9">
+ <topic>py-matrix-synapse -- undisclosed vulnerability</topic>
+ <affects>
+ <package>
+ <name>py27-matrix-synapse</name>
+ <name>py35-matrix-synapse</name>
+ <name>py36-matrix-synapse</name>
+ <name>py37-matrix-synapse</name>
+ <range><lt>0.34.1.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Matrix developers report:</p>
+ <blockquote cite="https://matrix.org/blog/2019/01/10/critical-security-update-synapse-0-34-0-1-synapse-0-34-1-1/">
+ <p>The matrix team announces the availablility of synapse security releases 0.34.0.1 and 0.34.1.1, fixing CVE-2019-5885.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-5885</cvename>
+ <url>https://matrix.org/blog/2019/01/10/critical-security-update-synapse-0-34-0-1-synapse-0-34-1-1/</url>
+ </references>
+ <dates>
+ <discovery>2019-01-10</discovery>
+ <entry>2019-01-15</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="d38bbb79-14f3-11e9-9ce2-28d244aee256">
+ <topic>irssi -- Use after free</topic>
+ <affects>
+ <package>
+ <name>irssi</name>
+ <range><ge>1.1.0,1</ge><lt>1.1.2,1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Irssi reports:</p>
+ <blockquote cite="https://irssi.org/security/irssi_sa_2019_01.txt">
+ <p>Use after free when hidden lines were expired from the scroll
+ buffer. It may affect the stability of Irssi. (CWE-417, CWE-825)</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://irssi.org/security/irssi_sa_2019_01.txt</url>
+ <cvename>CVE-2019-5882</cvename>
+ <freebsdpr>ports/234798</freebsdpr>
+ </references>
+ <dates>
+ <discovery>2019-01-09</discovery>
+ <entry>2019-01-10</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="924bd4f8-11e7-11e9-9fe8-5404a68ad561">
+ <topic>uriparser -- Out-of-bounds read</topic>
+ <affects>
+ <package>
+ <name>uriparser</name>
+ <range><lt>0.9.1</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Upstream project reports:</p>
+ <blockquote cite="https://github.com/uriparser/uriparser/blob/uriparser-0.9.1/ChangeLog">
+ <p>Out-of-bounds read in uriParse*Ex* for incomplete URIs with IPv6
+ addresses with embedded IPv4 address, e.g. "//[::44.1";
+ mitigated if passed parameter afterLast points to readable memory
+ containing a '\0' byte.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://github.com/uriparser/uriparser/blob/uriparser-0.9.1/ChangeLog</url>
+ </references>
+ <dates>
+ <discovery>2019-01-02</discovery>
+ <entry>2019-01-06</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="63e36475-119f-11e9-aba7-080027fee39c">
+ <topic>gitea -- insufficient privilege check</topic>
+ <affects>
+ <package>
+ <name>gitea</name>
+ <range><lt>1.6.3</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>The Gitea project reports:</p>
+ <blockquote cite="https://blog.gitea.io/2019/01/release-of-1.6.3/">
+ <p>Security</p>
+ <ul>
+ <li>Prevent DeleteFilePost doing arbitrary deletion</li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://github.com/go-gitea/gitea/issues/5631</url>
+ </references>
+ <dates>
+ <discovery>2019-01-04</discovery>
+ <entry>2019-01-06</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="720590df-10eb-11e9-b407-080027ef1a23">
+ <topic>chromium -- Use after free in PDFium</topic>
+ <affects>
+ <package>
+ <name>chromium</name>
+ <range><lt>71.0.3578.98</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Google Chrome Releases reports:</p>
+ <blockquote cite="https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop_12.html">
+ <p>1 security fix contributed by external researches:</p>
+ <ul>
+ <li>High CVE-2018-17481: Use after free in PDFium</li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2018-17481</cvename>
+ <url>https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop_12.html</url>
+ </references>
+ <dates>
+ <discovery>2018-12-12</discovery>
+ <entry>2019-01-05</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="546d4dd4-10ea-11e9-b407-080027ef1a23">
+ <topic>chromium -- multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>chromium</name>
+ <range><lt>71.0.3578.80</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Google Chrome Releases reports:</p>
+ <blockquote cite="https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html">
+ <p>43 security fixes in this release, including:</p>
+ <ul>
+ <li>High CVE-2018-17480: Out of bounds write in V8</li>
+ <li>High CVE-2018-17481: Use after free in PDFium</li>
+ <li>High CVE-2018-18335: Heap buffer overflow in Skia</li>
+ <li>High CVE-2018-18336: Use after free in PDFium</li>
+ <li>High CVE-2018-18337: Use after free in Blink</li>
+ <li>High CVE-2018-18338: Heap buffer overflow in Canvas</li>
+ <li>High CVE-2018-18339: Use after free in WebAudio</li>
+ <li>High CVE-2018-18340: Use after free in MediaRecorder</li>
+ <li>High CVE-2018-18341: Heap buffer overflow in Blink</li>
+ <li>High CVE-2018-18342: Out of bounds write in V8</li>
+ <li>High CVE-2018-18343: Use after free in Skia</li>
+ <li>High CVE-2018-18344: Inappropriate implementation in Extensions</li>
+ <li>High To be allocated: Multiple issues in SQLite via WebSQL</li>
+ <li>Medium CVE-2018-18345: Inappropriate implementation in Site Isolation</li>
+ <li>Medium CVE-2018-18346: Incorrect security UI in Blink</li>
+ <li>Medium CVE-2018-18347: Inappropriate implementation in Navigation</li>
+ <li>Medium CVE-2018-18348: Inappropriate implementation in Omnibox</li>
+ <li>Medium CVE-2018-18349: Insufficient policy enforcement in Blink</li>
+ <li>Medium CVE-2018-18350: Insufficient policy enforcement in Blink</li>
+ <li>Medium CVE-2018-18351: Insufficient policy enforcement in Navigation</li>
+ <li>Medium CVE-2018-18352: Inappropriate implementation in Media</li>
+ <li>Medium CVE-2018-18353: Inappropriate implementation in Network Authentication</li>
+ <li>Medium CVE-2018-18354: Insufficient data validation in Shell Integration</li>
+ <li>Medium CVE-2018-18355: Insufficient policy enforcement in URL Formatter</li>
+ <li>Medium CVE-2018-18356: Use after free in Skia</li>
+ <li>Medium CVE-2018-18357: Insufficient policy enforcement in URL Formatter</li>
+ <li>Medium CVE-2018-18358: Insufficient policy enforcement in Proxy</li>
+ <li>Medium CVE-2018-18359: Out of bounds read in V8</li>
+ <li>Low To be allocated: Inappropriate implementation in PDFium</li>
+ <li>Low To be allocated: Use after free in Extensions</li>
+ <li>Low To be allocated: Inappropriate implementation in Navigation</li>
+ <li>Low To be allocated: Inappropriate implementation in Navigation</li>
+ <li>Low To be allocated: Insufficient policy enforcement in Navigation</li>
+ <li>Low To be allocated: Insufficient policy enforcement in URL Formatter</li>
+ <li>Medium To be allocated: Insufficient policy enforcement in Payments</li>
+ <li>Various fixes from internal audits, fuzzing and other initiatives</li>
+ </ul>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2018-17480</cvename>
+ <cvename>CVE-2018-17481</cvename>
+ <cvename>CVE-2018-18335</cvename>
+ <cvename>CVE-2018-18336</cvename>
+ <cvename>CVE-2018-18337</cvename>
+ <cvename>CVE-2018-18338</cvename>
+ <cvename>CVE-2018-18339</cvename>
+ <cvename>CVE-2018-18340</cvename>
+ <cvename>CVE-2018-18341</cvename>
+ <cvename>CVE-2018-18342</cvename>
+ <cvename>CVE-2018-18343</cvename>
+ <cvename>CVE-2018-18344</cvename>
+ <cvename>CVE-2018-18345</cvename>
+ <cvename>CVE-2018-18346</cvename>
+ <cvename>CVE-2018-18347</cvename>
+ <cvename>CVE-2018-18348</cvename>
+ <cvename>CVE-2018-18349</cvename>
+ <cvename>CVE-2018-18350</cvename>
+ <cvename>CVE-2018-18351</cvename>
+ <cvename>CVE-2018-18352</cvename>
+ <cvename>CVE-2018-18353</cvename>
+ <cvename>CVE-2018-18354</cvename>
+ <cvename>CVE-2018-18355</cvename>
+ <cvename>CVE-2018-18356</cvename>
+ <cvename>CVE-2018-18357</cvename>
+ <cvename>CVE-2018-18358</cvename>
+ <cvename>CVE-2018-18359</cvename>
+ <url>https://chromereleases.googleblog.com/2018/12/stable-channel-update-for-desktop.html</url>
+ </references>
+ <dates>
+ <discovery>2018-12-04</discovery>
+ <entry>2019-01-05</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="3e41c1a6-10bc-11e9-bd85-fcaa147e860e">
+ <topic>Django -- Content spoofing possibility in the default 404 page</topic>
+ <affects>
+ <package>
+ <name>py27-django111</name>
+ <name>py35-django111</name>
+ <name>py36-django111</name>
+ <name>py37-django111</name>
+ <range><lt>1.11.18</lt></range>
+ </package>
+ <package>
+ <name>py35-django20</name>
+ <name>py36-django20</name>
+ <name>py37-django20</name>
+ <range><lt>2.0.10</lt></range>
+ </package>
+ <package>
+ <name>py35-django21</name>
+ <name>py36-django21</name>
+ <name>py37-django21</name>
+ <range><lt>2.1.5</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p> Django security releases issued reports:</p>
+ <blockquote cite="https://www.djangoproject.com/weblog/2019/jan/04/security-releases/">
+ <p>An attacker could craft a malicious URL that could make spoofed content
+ appear on the default page generated by the django.views.defaults.page_not_found()
+ view.</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <cvename>CVE-2019-3498</cvename>
+ <url>https://www.djangoproject.com/weblog/2019/jan/04/security-releases/</url>
+ </references>
+ <dates>
+ <discovery>2019-01-03</discovery>
+ <entry>2019-01-05</entry>
+ </dates>
+ </vuln>
+
+ <vuln vid="b2f4ab91-0e6b-11e9-8700-001b217b3468">
+ <topic>Gitlab -- Multiple vulnerabilities</topic>
+ <affects>
+ <package>
+ <name>gitlab-ce</name>
+ <range><ge>11.6.0</ge><lt>11.6.1</lt></range>
+ <range><ge>11.5.0</ge><lt>11.5.6</lt></range>
+ <range><ge>8.0.0</ge><lt>11.4.13</lt></range>
+ </package>
+ </affects>
+ <description>
+ <body xmlns="http://www.w3.org/1999/xhtml">
+ <p>Gitlab reports:</p>
+ <blockquote cite="https://about.gitlab.com/2018/12/31/security-release-gitlab-11-dot-6-dot-1-released/">
+ <p>Source code disclosure merge request diff</p>
+ <p>Todos improper access control</p>
+ <p>URL rel attribute not set</p>
+ <p>Persistent XSS Autocompletion</p>
+ <p>SSRF repository mirroring</p>
+ <p>CI job token LFS error message disclosure</p>
+ <p>Secret CI variable exposure</p>
+ <p>Guest user CI job disclosure</p>
+ <p>Persistent XSS label reference</p>
+ <p>Persistent XSS wiki in IE browser</p>
+ <p>SSRF in project imports with LFS</p>
+ <p>Improper access control CI/CD settings</p>
+ <p>Missing authorization control merge requests</p>
+ <p>Improper access control branches and tags</p>
+ <p>Missing authentication for Prometheus alert endpoint</p>
+ </blockquote>
+ </body>
+ </description>
+ <references>
+ <url>https://about.gitlab.com/2018/12/31/security-release-gitlab-11-dot-6-dot-1-released/</url>
+ <cvename>CVE-2018-20493</cvename>
+ <cvename>CVE-2018-20492</cvename>
+ <cvename>CVE-2018-20489</cvename>
+ <cvename>CVE-2018-20490</cvename>
+ <cvename>CVE-2018-20497</cvename>
+ <cvename>CVE-2018-20495</cvename>
+ <cvename>CVE-2018-20488</cvename>
+ <cvename>CVE-2018-20494</cvename>
+ <cvename>CVE-2018-20496</cvename>
+ <cvename>CVE-2018-20491</cvename>
+ <cvename>CVE-2018-20499</cvename>
+ <cvename>CVE-2018-20500</cvename>
+ <cvename>CVE-2018-20501</cvename>
+ <cvename>CVE-2018-20498</cvename>
+ <cvename>CVE-2018-20507</cvename>
+ </references>
+ <dates>
+ <discovery>2018-12-31</discovery>
+ <entry>2019-01-02</entry>
+ </dates>
+ </vuln>