Skip to content

Commit ce18a9b

Browse files
committed
Sync with GitHub Security Advisories
* Add advisories for fat_free_crm/CVE-2022-39281, google-protobuf/CVE-2022-3171, katello/CVE-2019-14825, nokogiri/GHSA-2qc6-mcvw-92cw, and sqlite3/GHSA-mgvv-5mxp-xq67 * Add CVSSv3 score for sanitize/CVE-2018-3740
1 parent 3169095 commit ce18a9b

6 files changed

Lines changed: 270 additions & 3 deletions

File tree

Lines changed: 50 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,50 @@
1+
---
2+
gem: fat_free_crm
3+
cve: 2022-39281
4+
ghsa: p75c-5x3h-cxcg
5+
url: https://github.com/fatfreecrm/fat_free_crm/security/advisories/GHSA-p75c-5x3h-cxcg
6+
title: Fat Free CRM vulnerable to Remote Denial of Service via Tasks endpoint
7+
date: 2022-10-07
8+
description: |+
9+
### Impact
10+
An authenticated user can perform a remote Denial of Service attack against
11+
Fat Free CRM.
12+
13+
This vulnerability has been assigned the CVE identifier: CVE-2022-39281
14+
15+
Affected versions: All
16+
Not affected: None
17+
Fixed versions: 0.20.1
18+
19+
All users running an affected release should either upgrade or apply the patch
20+
immediately.
21+
22+
### Releases
23+
Fixed versions: 0.20.1 and above
24+
25+
### Patches
26+
27+
If you are unable to upgrade immediately, you should apply the following
28+
patch.
29+
30+
```
31+
diff --git a/app/models/polymorphic/task.rb b/app/models/polymorphic/task.rb
32+
index d3d5c32c..7cdb24d6 100644
33+
--- a/app/models/polymorphic/task.rb
34+
+++ b/app/models/polymorphic/task.rb
35+
@@ -189,6 +189,7 @@ class Task < ActiveRecord::Base
36+
#----------------------------------------------------------------------------
37+
def self.bucket_empty?(bucket, user, view = "pending")
38+
return false if bucket.blank? || !ALLOWED_VIEWS.include?(view)
39+
+ return false unless Setting.task_bucket.map(&:to_s).include?(bucket.to_s)
40+
41+
if view == "assigned"
42+
assigned_by(user).send(bucket).pending.count
43+
```
44+
cvss_v3: 6.5
45+
patched_versions:
46+
- ">= 0.20.1"
47+
related:
48+
url:
49+
- https://github.com/fatfreecrm/fat_free_crm/commit/c85a2546348c2692d32f952c753f7f0b43d1ca71
50+
- https://github.com/fatfreecrm/fat_free_crm/releases/tag/v0.20.1
Lines changed: 51 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,51 @@
1+
---
2+
gem: google-protobuf
3+
platform: jruby
4+
cve: 2022-3171
5+
ghsa: h4h5-3hr4-j3g2
6+
url: https://github.com/protocolbuffers/protobuf/security/advisories/GHSA-h4h5-3hr4-j3g2
7+
title: protobuf-java has a potential Denial of Service issue
8+
date: 2022-10-04
9+
description: |
10+
## Summary
11+
A potential Denial of Service issue in `protobuf-java` core and lite was
12+
discovered in the parsing procedure for binary and text format data.
13+
Input streams containing multiple instances of non-repeated [embedded
14+
messages](http://developers.google.com/protocol-buffers/docs/encoding#embedded)
15+
with repeated or unknown fields causes objects to be converted back-n-forth
16+
between mutable and immutable forms, resulting in potentially long garbage
17+
collection pauses.
18+
19+
Reporter: [OSS Fuzz](https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=48771)
20+
21+
Affected versions: This issue affects both the Java full and lite Protobuf
22+
runtimes, as well as Protobuf for Kotlin and JRuby, which themselves use the
23+
Java Protobuf runtime.
24+
25+
## Severity
26+
27+
[CVE-2022-3171](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-3171)
28+
Medium - CVSS Score: 5.7 (NOTE: there may be a delay in publication)
29+
30+
## Remediation and Mitigation
31+
32+
Please update to the latest available versions of the following packages:
33+
34+
* protobuf-java (3.21.7, 3.20.3, 3.19.6, 3.16.3)
35+
* protobuf-javalite (3.21.7, 3.20.3, 3.19.6, 3.16.3)
36+
* protobuf-kotlin (3.21.7, 3.20.3, 3.19.6, 3.16.3)
37+
* protobuf-kotlin-lite (3.21.7, 3.20.3, 3.19.6, 3.16.3)
38+
* google-protobuf [JRuby gem only] (3.21.7, 3.20.3, 3.19.6)
39+
cvss_v3: 5.7
40+
patched_versions:
41+
- "~> 3.16.3"
42+
- "~> 3.19.6"
43+
- "~> 3.20.3"
44+
- ">= 3.21.7"
45+
related:
46+
url:
47+
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=48771
48+
- https://github.com/protocolbuffers/protobuf/releases/tag/v21.7
49+
- https://github.com/protocolbuffers/protobuf/releases/tag/v3.16.3
50+
- https://github.com/protocolbuffers/protobuf/releases/tag/v3.19.6
51+
- https://github.com/protocolbuffers/protobuf/releases/tag/v3.20.3

gems/katello/CVE-2019-14825.yml

Lines changed: 24 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,24 @@
1+
---
2+
gem: katello
3+
cve: 2019-14825
4+
ghsa: m4wh-848j-9w2r
5+
url: https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14825
6+
title: Katello cleartext password storage issue
7+
date: 2022-05-24
8+
description: |
9+
A cleartext password storage issue was discovered in Katello, versions
10+
3.x.x.x before katello 3.12.2. Registry credentials used during container image
11+
discovery were inadvertently logged without being masked. This flaw could expose
12+
the registry credentials to other privileged users.
13+
cvss_v3: 2.7
14+
patched_versions:
15+
- ">= 3.12.2"
16+
related:
17+
url:
18+
- https://github.com/Katello/katello/pull/8244
19+
- https://github.com/Katello/katello/pull/8253
20+
- https://github.com/Katello/katello/commit/332484232b66b7907a8104a19ea97eb697b75c79
21+
- https://github.com/Katello/katello/commit/4eefa678a905140620ca8b390d48fe318d36e4ea
22+
- https://bugzilla.redhat.com/show_bug.cgi?id=1730668
23+
- https://github.com/Katello/katello/commits/3.12.2
24+
- https://projects.theforeman.org/issues/27485
Lines changed: 87 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,87 @@
1+
---
2+
gem: nokogiri
3+
ghsa: 2qc6-mcvw-92cw
4+
url: https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-2qc6-mcvw-92cw
5+
title: Update bundled libxml2 to v2.10.3 to resolve multiple CVEs
6+
date: 2022-10-18
7+
description: |
8+
### Summary
9+
10+
Nokogiri v1.13.9 upgrades the packaged version of its dependency libxml2 to
11+
[v2.10.3](https://gitlab.gnome.org/GNOME/libxml2/-/releases/v2.10.3) from
12+
v2.9.14.
13+
14+
libxml2 v2.10.3 addresses the following known vulnerabilities:
15+
16+
- [CVE-2022-2309](https://nvd.nist.gov/vuln/detail/CVE-2022-2309)
17+
- [CVE-2022-40304](https://nvd.nist.gov/vuln/detail/CVE-2022-40304)
18+
- [CVE-2022-40303](https://nvd.nist.gov/vuln/detail/CVE-2022-40303)
19+
20+
Please note that this advisory only applies to the CRuby implementation of
21+
Nokogiri `< 1.13.9`, and only if the _packaged_ libraries are being used. If
22+
you've overridden defaults at installation time to use _system_ libraries
23+
instead of packaged libraries, you should instead pay attention to your
24+
distro's `libxml2` release announcements.
25+
26+
27+
### Mitigation
28+
29+
Upgrade to Nokogiri `>= 1.13.9`.
30+
31+
Users who are unable to upgrade Nokogiri may also choose a more complicated
32+
mitigation: compile and link Nokogiri against external libraries libxml2
33+
`>= 2.10.3` which will also address these same issues.
34+
35+
36+
### Impact
37+
38+
#### libxml2 [CVE-2022-2309](https://nvd.nist.gov/vuln/detail/CVE-2022-2309)
39+
40+
- **CVSS3 score**: Under evaluation
41+
- **Type**: Denial of service
42+
- **Description**: NULL Pointer Dereference allows attackers to cause a denial
43+
of service (or application crash). This only applies when lxml is used
44+
together with libxml2 2.9.10 through 2.9.14. libxml2 2.9.9 and earlier are not
45+
affected. It allows triggering crashes through forged input data, given a
46+
vulnerable code sequence in the application. The vulnerability is caused by
47+
the iterwalk function (also used by the canonicalize function). Such code
48+
shouldn't be in wide-spread use, given that parsing + iterwalk would usually
49+
be replaced with the more efficient iterparse function. However, an XML
50+
converter that serialises to C14N would also be vulnerable, for example, and
51+
there are legitimate use cases for this code sequence. If untrusted input is
52+
received (also remotely) and processed via iterwalk function, a crash can be
53+
triggered.
54+
55+
Nokogiri maintainers investigated at #2620 and determined this CVE does not
56+
affect Nokogiri users.
57+
58+
59+
#### libxml2 [CVE-2022-40304](https://nvd.nist.gov/vuln/detail/CVE-2022-40304)
60+
61+
- **CVSS3 score**: Unspecified upstream
62+
- **Type**: Data corruption, denial of service
63+
- **Description**: When an entity reference cycle is detected, the entity
64+
content is cleared by setting its first byte to zero. But the entity content
65+
might be allocated from a dict. In this case, the dict entry becomes corrupted
66+
leading to all kinds of logic errors, including memory errors like
67+
double-frees.
68+
69+
See https://gitlab.gnome.org/GNOME/libxml2/-/commit/644a89e080bced793295f61f18aac8cfad6bece2
70+
71+
72+
#### libxml2 [CVE-2022-40303](https://nvd.nist.gov/vuln/detail/CVE-2022-40303)
73+
74+
- **CVSS3 score**: Unspecified upstream
75+
- **Type**: Integer overflow
76+
- **Description**: Integer overflows with XML_PARSE_HUGE
77+
78+
See https://gitlab.gnome.org/GNOME/libxml2/-/commit/c846986356fc149915a74972bf198abc266bc2c0
79+
patched_versions:
80+
- ">= 1.13.19"
81+
related:
82+
url:
83+
- https://gitlab.gnome.org/GNOME/libxml2/-/releases
84+
cve:
85+
- 2022-2309
86+
- 2022-40304
87+
- 2022-40303

gems/sanitize/CVE-2018-3740.yml

Lines changed: 4 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -13,11 +13,12 @@ description: |
1313
1414
This can allow HTML and JavaScript injection, which could result in XSS
1515
if Sanitize's output is served to browsers.
16+
cvss_v3: 7.5
1617
unaffected_versions:
17-
- < 1.1.0
18+
- "< 1.1.0"
1819
patched_versions:
19-
- ~> 2.1.1
20-
- '>= 4.6.3'
20+
- "~> 2.1.1"
21+
- ">= 4.6.3"
2122
related:
2223
url:
2324
- https://github.com/rgrove/sanitize/commit/01629a162e448a83d901456d0ba8b65f3b03d46e
Lines changed: 54 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -0,0 +1,54 @@
1+
---
2+
gem: sqlite3
3+
ghsa: mgvv-5mxp-xq67
4+
url: https://github.com/sparklemotion/sqlite3-ruby/security/advisories/GHSA-mgvv-5mxp-xq67
5+
title: SQLite3 addresses vulnerability in packaged version of libsqlite
6+
date: 2022-10-03
7+
description: |-
8+
### Summary
9+
10+
The rubygem sqlite3 v1.5.1 upgrades the packaged version of libsqlite from
11+
v3.39.3 to [v3.39.4](https://sqlite.org/releaselog/3_39_4.html).
12+
13+
libsqlite v3.39.4 addresses a vulnerability described as follows in the
14+
release notification:
15+
16+
> Version 3.39.4 is a minimal patch against the prior release that addresses
17+
> issues found since the prior release. In particular, a potential
18+
> vulnerability in the FTS3 extension has been fixed, so this should be
19+
> considered a security update.
20+
>
21+
> In order to exploit the vulnerability, an attacker must have full SQL access
22+
> and must be able to construct a corrupt database with over 2GB of FTS3
23+
> content. The problem arises from a 32-bit signed integer overflow.
24+
25+
This vulnerability has not been assigned a CVE and does not have a severity
26+
declared.
27+
28+
Please note that this advisory only applies to the sqlite3 gem v1.5.0, and
29+
only if the packaged libsqlite is being used. If you've overridden defaults at
30+
installation time to use system libraries instead of packaged libraries, you
31+
should instead pay attention to your distro's libsqlite release announcements.
32+
33+
34+
### Mitigation
35+
36+
Upgrade to the rubygem sqlite3 v1.5.1 or later.
37+
38+
Users who are unable to upgrade the sqlite3 gem may also choose a more
39+
complicated mitigation: compile and link sqlite3 against external libsqlite >=
40+
3.39.4 which will also address these same issues.
41+
42+
43+
### References
44+
45+
- Upstream release notes: https://sqlite.org/releaselog/3_39_4.html
46+
- Instructions for compiling against system libraries:
47+
https://github.com/sparklemotion/sqlite3-ruby
48+
unaffected_versions:
49+
- "!= 1.5.0"
50+
patched_versions:
51+
- ">= 1.5.1"
52+
related:
53+
url:
54+
- https://github.com/sparklemotion/sqlite3-ruby/releases/tag/v1.5.1

0 commit comments

Comments
 (0)