Professional OVAL Repository
[Eng]
[Rus]
[Sign-In]
OVAL
Search
Categories
RedCheck
About
OVAL Definitions
OVAL Items
FSTEC Data Bank Information Security Threats
NKCKI
EOL (End Of Life)
Linux Security Advisories
Mozilla Foundation Security Advisory
IBM
VMware
Cisco
Check Point Software Technologies
Apache
Solaris
FreeBSD
Development
GitHub Enterprise
Google Chrome Security Advisories
Oracle Security Advisories
Adobe Security Advisories
OpenSSL Security Advisories
Microsoft
CVE
CWE
CPE
Latest Updates
OS ROSA
ALT Linux
Astra Linux
RED OS
DSA (Debian Security Advisory) Patсh Statistics
DSA (Debian Security Advisory) Patсh Feed
DSA (Debian Security Advisory) Vulnerability Feed
DLA (Debian Security Advisory) Patсh Statistics
DLA (Debian Security Advisory) Patсh Feed
DLA (Debian Security Advisory) Vulnerability Feed
ALT Linux (Security Bulletins) Patсh Statistics
ALT Linux (Security Bulletins) Patсh Feed
ALT Linux (Security Bulletins) Vulnerability Feed
RED OS (Security Bulletins) Patсh Statistics
RED OS (Security Bulletins) Patсh Feed
RED OS (Security Bulletins) Vulnerability Feed
USN (Ubuntu Security Notice) Patсh Statistics
USN (Ubuntu Security Notice) Patсh Feed
USN (Ubuntu Security Notice) Vulnerability Feed
RHSA (RedHat Security Advisory) Patсh Statistics
RHSA (RedHat Security Advisory) Patсh Feed
RHSA (RedHat Security Advisory) Vulnerability Feed
ELSA (Oracle Linux Security Advisory) Patсh Statistics
ELSA (Oracle Linux Security Advisory) Patсh Feed
ELSA (Oracle Linux Security Advisory) Vulnerability Feed
SUSE (SUSE Security Advisories) Patсh Statistics
SUSE (SUSE Security Advisories) Patсh Feed
SUSE (SUSE Security Advisories) Vulnerability Feed
openSUSE (openSUSE Security Advisories) Patсh Statistics
openSUSE (openSUSE Security Advisories) Patсh Feed
openSUSE (openSUSE Security Advisories) Vulnerability Feed
Amazon Linux AMI (Security Bulletins) Patсh Statistics
Amazon Linux AMI (Security Bulletins) Patсh Feed
Amazon Linux AMI (Security Bulletins) Vulnerability Feed
Mageia Linux (Security Bulletins) Patсh Statistics
Mageia Linux (Security Bulletins) Patсh Feed
Mageia Linux (Security Bulletins) Vulnerability Feed
OS ROSA SX COBALT 1.0
OS ROSA DX COBALT 1.0
ROSA 7.3 (Security Advisories) Patсh Statistics
ROSA 7.3 (Security Advisories) Patсh Feed
ROSA 7.3 (Security Advisories) Vulnerability Feed
ALT Linux SPT 6.0
ALT Linux SPT 7.0
ALT 8 SP
ALT 9
Astra Linux SE 1.5
Astra Linux SE 1.6
Astra Linux SE 1.7
Astra Linux SE 1.8
RED OS Murom 7.1
RED OS Murom 7.2
IBM DB2
VMware Vulnerabilities Advisory (VMSA)
VMware vCenter Patch Advisories
VMware ESXi Patch Advisories
VMware NSX Patches
VMware NSX Vulnerabilities
VMware Photon OS 1.0 Patches
VMware Photon OS 1.0 Vulnerabilities
VMware Photon OS 2.0 Patches
VMware Photon OS 2.0 Vulnerabilities
Cisco ASA
Cisco IOS/NX-OS Advisory
Cisco NX-OS Vulnerabilities
Check Point Gaia
Apache Tomcat Advisories
Apache Tomcat Server
Apache HTTP Server
Python
Node.js
RubyGems
Qt
Microsoft Security Bulletin
Microsoft Knowledge Base Article
Microsoft SharePoint
Microsoft SharePoint Foundation 2013
Microsoft SharePoint Server 2013
Microsoft SharePoint Server 2016
About OVALdb
User manual
Pricing
Contact us
OVAL Definitions
>
OVAL Definition Details
Id
oval:ru.altx-soft.nix:def:240672
[Eng]
Version
1
Class
patch
ALTXid
468882
Language
Russian
Severity
High
Title
Обновление RHSA-2019:2437 : устранение уязвимостей в Red Hat Virtualization
Description
python: regression of CVE-2019-9636 due to functional fix to allow port numbers in netloc.
rsyslog: imptcp: integer overflow when Octet-Counted TCP Framing is enabled.
edk2: stack overflow in XHCI causing denial of service.
openssl: 0-byte record padding oracle.
cockpit-ovirt: admin and appliance passwords saved in plain text variable file during HE deployment.
sssd: improper implementation of GPOs due to too restrictive permissions.
Family
unix
Platform
Red Hat Enterprise Linux 7
Product
Red Hat Virtualization
Reference
VENDOR: RHSA-2019:2437
VENDOR: RHSA-2019:2437
Id:
RHSA-2019:2437
Reference:
https://access.redhat.com/errata/RHSA-2019:2437
CVE: CVE-2018-16838
CVE: CVE-2018-16838
Id:
CVE-2018-16838
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16838
Comment
: A flaw was found in sssd Group Policy Objects implementation. When the GPO is not readable by SSSD due to a too strict permission settings on the server side, SSSD will allow all authenticated users to login instead of denying access.
CVSSv2 Score:
5.5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
SINGLE
Confidentiality impact:
PARTIAL
Integrity impact:
PARTIAL
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:L/Au:S/C:P/I:P/A:N
CVSSv3 Score:
5.4
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
LOW
Integrity impact:
LOW
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
CWE:
269 (Improper Privilege Management)
References:
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16838 (CONFIRM)
openSUSE-SU-2019:1576 (SUSE)
openSUSE-SU-2019:1589 (SUSE)
RHSA-2019:2177 (REDHAT)
RHSA-2019:2437 (REDHAT)
RHSA-2019:3651 (REDHAT)
https://lists.debian.org/debian-lts-announce/2023/05/msg00028.html (MISC)
CVE: CVE-2018-16881
CVE: CVE-2018-16881
Id:
CVE-2018-16881
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-16881
Comment
: A denial of service vulnerability was found in rsyslog in the imptcp module. An attacker could send a specially crafted message to the imptcp socket, which would cause rsyslog to crash. Versions before 8.27.0 are vulnerable.
CVSSv2 Score:
5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSSv3 Score:
7.5
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
CWE:
190 (Integer Overflow or Wraparound)
References:
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16881 (CONFIRM)
RHSA-2019:2110 (REDHAT)
RHSA-2019:2439 (REDHAT)
RHSA-2019:2437 (REDHAT)
RHBA-2019:2501 (REDHAT)
[debian-lts-announce] 20220520 [SECURITY] [DLA 3016-1] rsyslog security update (MLIST)
CVE: CVE-2019-0161
CVE: CVE-2019-0161
Id:
CVE-2019-0161
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-0161
Comment
: Stack overflow in XHCI for EDK II may allow an unauthenticated user to potentially enable denial of service via local access.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
PARTIAL
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:N/I:N/A:P
CVSSv3 Score:
5.5
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
NONE
Integrity impact:
NONE
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CWE:
787 (Out-of-bounds Write)
References:
https://edk2-docs.gitbooks.io/security-advisory/content/xhci-stack-local-stack-overflow.html (CONFIRM)
openSUSE-SU-2019:1352 (SUSE)
openSUSE-SU-2019:1425 (SUSE)
RHSA-2019:2125 (REDHAT)
RHSA-2019:2437 (REDHAT)
[debian-lts-announce] 20210429 [SECURITY] [DLA 2645-1] edk2 security update (MLIST)
FEDORA-2019-d47a9d4b8b ()
CVE: CVE-2019-1559
CVE: CVE-2019-1559
Id:
CVE-2019-1559
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-1559
Comment
: If an application encounters a fatal protocol error and then calls SSL_shutdown() twice (once to send a close_notify, and once to receive one) then OpenSSL can respond differently to the calling application if a 0 byte record is received with invalid padding compared to if a 0 byte record is received with an invalid MAC. If the application then behaves differently based on that in a way that is detectable to the remote peer, then this amounts to a padding oracle that could be used to decrypt data. In order for this to be exploitable "non-stitched" ciphersuites must be in use. Stitched ciphersuites are optimised implementations of certain commonly used ciphersuites. Also the application must call SSL_shutdown() twice even if a protocol error has occurred (applications should not do this but some do anyway). Fixed in OpenSSL 1.0.2r (Affected 1.0.2-1.0.2q).
CVSSv2 Score:
4.3
Access vector:
NETWORK
Access complexity:
MEDIUM
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:M/Au:N/C:P/I:N/A:N
CVSSv3 Score:
5.9
Attack vector:
NETWORK
Attack complexity:
HIGH
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
NONE
Availability impact:
NONE
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
CWE:
203 (Information Exposure Through Discrepancy)
References:
https://www.openssl.org/news/secadv/20190226.txt (CONFIRM)
USN-3899-1 (UBUNTU)
107174 (BID)
DSA-4400 (DEBIAN)
https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html (MISC)
RHSA-2019:3929 (REDHAT)
RHSA-2019:3931 (REDHAT)
https://www.oracle.com/security-alerts/cpujan2020.html (MISC)
USN-4376-2 (UBUNTU)
https://www.oracle.com/security-alerts/cpujan2021.html (MISC)
RHSA-2019:2471 (REDHAT)
RHSA-2019:2439 (REDHAT)
RHSA-2019:2437 (REDHAT)
RHSA-2019:2304 (REDHAT)
https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html (MISC)
openSUSE-SU-2019:1637 (SUSE)
openSUSE-SU-2019:1432 (SUSE)
https://kc.mcafee.com/corporate/index?page=content&id=SB10282 (CONFIRM)
https://www.tenable.com/security/tns-2019-03 (CONFIRM)
https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html (MISC)
https://security.netapp.com/advisory/ntap-20190423-0002/ (CONFIRM)
openSUSE-SU-2019:1173 (SUSE)
openSUSE-SU-2019:1175 (SUSE)
openSUSE-SU-2019:1105 (SUSE)
openSUSE-SU-2019:1076 (SUSE)
https://www.tenable.com/security/tns-2019-02 (CONFIRM)
https://support.f5.com/csp/article/K18549143 (CONFIRM)
GLSA-201903-10 (GENTOO)
https://security.netapp.com/advisory/ntap-20190301-0001/ (CONFIRM)
https://security.netapp.com/advisory/ntap-20190301-0002/ (CONFIRM)
[debian-lts-announce] 20190301 [SECURITY] [DLA 1701-1] openssl security update (MLIST)
FEDORA-2019-db06efdea1 ()
FEDORA-2019-00c25b9379 ()
FEDORA-2019-9a0a7c0986 ()
https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=e9bbefbf0f24c57645e7ad6a5a71ae649d18ac8e ()
https://support.f5.com/csp/article/K18549143?utm_source=f5support&%3Butm_medium=RSS ()
CVE: CVE-2019-10139
CVE: CVE-2019-10139
Id:
CVE-2019-10139
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10139
Comment
: During HE deployment via cockpit-ovirt, cockpit-ovirt generates an ansible variable file `/var/lib/ovirt-hosted-engine-setup/cockpit/ansibleVarFileXXXXXX.var` which contains the admin and the appliance passwords as plain-text. At the of the deployment procedure, these files are deleted.
CVSSv2 Score:
2.1
Access vector:
LOCAL
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:L/AC:L/Au:N/C:P/I:N/A:N
CVSSv3 Score:
7.8
Attack vector:
LOCAL
Attack complexity:
LOW
Privileges required:
LOW
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CWE:
522 (Insufficiently Protected Credentials)
References:
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10139 (CONFIRM)
108396 (BID)
RHSA-2019:2433 (REDHAT)
RHSA-2019:2437 (REDHAT)
CVE: CVE-2019-10160
CVE: CVE-2019-10160
Id:
CVE-2019-10160
Reference:
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-10160
Comment
: A security regression of CVE-2019-9636 was discovered in python since commit d537ab0ff9767ef024f26246899728f0116b1ec3 affecting versions 2.7, 3.5, 3.6, 3.7 and from v3.8.0a4 through v3.8.0b1, which still allows an attacker to exploit CVE-2019-9636 by abusing the user and password parts of a URL. When an application parses user-supplied URLs to store cookies, authentication credentials, or other kind of information, it is possible for an attacker to provide specially crafted URLs to make the application locate host-related information (e.g. cookies, authentication data) and send them to a different host than where it should, unlike if the URLs had been correctly parsed. The result of an attack may vary based on the application.
CVSSv2 Score:
5
Access vector:
NETWORK
Access complexity:
LOW
Authentication:
NONE
Confidentiality impact:
PARTIAL
Integrity impact:
NONE
Availability impact:
NONE
CVSSv2 Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N
CVSSv3 Score:
9.8
Attack vector:
NETWORK
Attack complexity:
LOW
Privileges required:
NONE
User interaction:
NONE
Scope:
UNCHANGED
Confidentiality impact:
HIGH
Integrity impact:
HIGH
Availability impact:
HIGH
CVSSv3 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CWE:
172 (Encoding Error)
References:
https://python-security.readthedocs.io/vuln/urlsplit-nfkc-normalization2.html (MISC)
https://github.com/python/cpython/commit/8d0ef0b5edeae52960c7ed05ae8a12388324f87e (CONFIRM)
https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10160 (CONFIRM)
https://github.com/python/cpython/commit/fd1771dbdd28709716bd531580c40ae5ed814468 (CONFIRM)
https://github.com/python/cpython/commit/f61599b050c621386a3fc6bc480359e2d3bb93de (CONFIRM)
https://github.com/python/cpython/commit/250b62acc59921d399f0db47db3b462cd6037e09 (CONFIRM)
https://security.netapp.com/advisory/ntap-20190617-0003/ (CONFIRM)
RHSA-2019:1587 (REDHAT)
[debian-lts-announce] 20190625 [SECURITY] [DLA 1834-1] python2.7 security update (MLIST)
RHSA-2019:1700 (REDHAT)
RHSA-2019:2437 (REDHAT)
openSUSE-SU-2019:1906 (SUSE)
USN-4127-2 (UBUNTU)
USN-4127-1 (UBUNTU)
openSUSE-SU-2020:0086 (SUSE)
[debian-lts-announce] 20200715 [SECURITY] [DLA 2280-1] python3.5 security update (MLIST)
[debian-lts-announce] 20200822 [SECURITY] [DLA 2337-1] python2.7 security update (MLIST)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ER6LONC2B2WYIO56GBQUDU6QTWZDPUNQ/ (MISC)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NF3DRDGMVIRYNZMSLJIHNW47HOUQYXVG/ (MISC)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4X3HW5JRZ7GCPSR7UHJOLD7AWLTQCDVR/ (MISC)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/HQEQLXLOCR3SNM3AA5RRYJFQ5AZBYJ4L/ (MISC)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ORNTF62QPLMJXIQ7KTZQ2776LMIXEKL/ (MISC)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E2HP37NUVLQSBW3J735A2DQDOZ4ZGBLY/ (MISC)
https://lists.apache.org/thread.html/r1b103833cb5bc8466e24ff0ecc5e75b45a705334ab6a444e64e840a0%40%3Cissues.bookkeeper.apache.org%3E (MISC)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JCPGLTTOBB3QEARDX4JOYURP6ELNNA2V/ (MISC)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KRYFIMISZ47NTAU3XWZUOFB7CYL62KES/ (MISC)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/44TS66GJMO5H3RLMVZEBGEFTB6O2LJJU/ (MISC)
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/M34WOYCDKTDE5KLUACE2YIEH7D37KHRX/ (MISC)
Content available only for registered users!
ovaldb@altx-soft.com