Introduction
Introduction Statistics Contact Development Disclaimer Help
oss-sec - sfeed_tests - sfeed tests and RSS and Atom files
git clone git://git.codemadness.org/sfeed_tests
Log
Files
Refs
README
LICENSE
---
oss-sec (14380B)
---
1 <?xml version="1.0" encoding="utf-8"?>
2 <rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom">
3 <channel>
4 <title>Open Source Security</title>
5 <link>http://seclists.org/#oss-sec</link>
6 <atom:link href="http://seclists.org/rss/oss-sec.rss" rel="self" typ…
7 <language>en-us</language>
8 <description>Discussion of security flaws, concepts, and practices i…
9 <pubDate>Thu, 17 Sep 2020 11:00:03 GMT</pubDate>
10 <lastBuildDate>Thu, 17 Sep 2020 11:00:03 GMT</lastBuildDate>
11 <!-- MHonArc v2.6.19 -->
12
13
14
15 <item>
16 <title>Apache + PHP &lt;= 7.4.10 open_basedir bypass</title>
17 <link>http://seclists.org/oss-sec/2020/q3/184</link>
18 <description>&lt;p&gt;Posted by Havijoori on Sep 17&lt;/p&gt;Introdu…
19 ============&lt;br&gt;
20 open_basedir security feature can be bypassed when Apache web server run…
21 &lt;br&gt;
22 Proof of Concept&lt;br&gt;
23 ================&lt;br&gt;
24 1. Set open_basedir as a security feature in php.ini file :&lt;br&gt;
25 open_basedir = /var/www/html:/tmp&lt;br&gt;
26 2. Make a directory with the name of your web server&amp;apos;s home dir…
27 mkdir -p /var/www/html/var/www/html&lt;br&gt;
28 3. Make a symlink to a restricted writable...&lt;br&gt;</description>
29 <pubDate>Thu, 17 Sep 2020 10:50:42 GMT</pubDate>
30 <guid isPermaLink="true">http://seclists.org/oss-sec/2020/q3/184</gu…
31 </item>
32 <item>
33 <title>Samba and CVE-2020-1472 (&quot;Zerologon&quot;)</title>
34 <link>http://seclists.org/oss-sec/2020/q3/183</link>
35 <description>&lt;p&gt;Posted by Douglas Bagnall on Sep 17&lt;/p&gt;I…
36 access to an unauthenticated user on a Domain Controller. Microsoft gav…
37 it a CVSS score of 10.&lt;br&gt;
38 &lt;br&gt;
39 &lt;a rel=&quot;nofollow&quot; href=&quot;https://portal.msrc.microsoft…
40 &lt;br&gt;
41 The Samba security team was not contacted before the announcement, which…
42 is very sparse on detail, and was unable to learn much through an&lt;br&…
43 established (and generally quite useful) channel for...&lt;br&gt;</descr…
44 <pubDate>Thu, 17 Sep 2020 10:48:56 GMT</pubDate>
45 <guid isPermaLink="true">http://seclists.org/oss-sec/2020/q3/183</gu…
46 </item>
47 <item>
48 <title>CVE-2020-25625 QEMU: usb: hcd-ohci: infinite loop issue while…
49 <link>http://seclists.org/oss-sec/2020/q3/182</link>
50 <description>&lt;p&gt;Posted by P J P on Sep 17&lt;/p&gt; Hello,&l…
51 &lt;br&gt;
52 An infinite loop issue was found in the USB OHCI controller emulator of …
53 It could occur while servicing OHCI isochronous transfer descriptors (TD…
54 ohci_service_iso_td routine, as it retires a TD if it has passed its tim…
55 frame. While doing so it does not check if the TD was already processed …
56 and holds an error code in TD_CC. It may happen if the TD list has a loo…
57 &lt;br&gt;
58 A guest user/process may use this flaw to consume cpu...&lt;br&gt;</desc…
59 <pubDate>Thu, 17 Sep 2020 10:15:23 GMT</pubDate>
60 <guid isPermaLink="true">http://seclists.org/oss-sec/2020/q3/182</gu…
61 </item>
62
63
64 <item>
65 <title>CVE-2020-25085 QEMU: sdhci: out-of-bounds access issue while …
66 <link>http://seclists.org/oss-sec/2020/q3/181</link>
67 <description>&lt;p&gt;Posted by P J P on Sep 16&lt;/p&gt; Hello,&l…
68 &lt;br&gt;
69 An out-of-bounds r/w access issue was found in the SDHCI Controller emul…
70 of QEMU. It may occur while doing multi block SDMA, if transfer block si…
71 exceeds the &amp;apos;s-&amp;gt;fifo_buffer[s-&amp;gt;buf_maxsz]&amp;apo…
72 element pointer &amp;apos;s-&amp;gt;data_count&amp;apos; pointing out of…
73 DMA r/w operation to OOB access issue. A guest user/process may use this…
74 to crash the QEMU...&lt;br&gt;</description>
75 <pubDate>Wed, 16 Sep 2020 18:56:48 GMT</pubDate>
76 <guid isPermaLink="true">http://seclists.org/oss-sec/2020/q3/181</gu…
77 </item>
78 <item>
79 <title>CVE-2020-25084 QEMU: usb: use-after-free issue while setting …
80 <link>http://seclists.org/oss-sec/2020/q3/180</link>
81 <description>&lt;p&gt;Posted by P J P on Sep 16&lt;/p&gt; Hello,&l…
82 &lt;br&gt;
83 An use-after-free issue was found in USB(xHCI/eHCI) controller emulators…
84 QEMU. It occurs while setting up USB packet, as usb_packet_map() routine…
85 return an error, which was not checked. A guest user/process may use thi…
86 to crash the QEMU process resulting in DoS scenario.&lt;br&gt;
87 &lt;br&gt;
88 Upstream patches:&lt;br&gt;
89 -----------------&lt;br&gt;
90 -&amp;gt; &lt;a rel=&quot;nofollow&quot; href=&quot;https://lists.no…
91 -&amp;gt;...&lt;br&gt;</description>
92 <pubDate>Wed, 16 Sep 2020 18:29:25 GMT</pubDate>
93 <guid isPermaLink="true">http://seclists.org/oss-sec/2020/q3/180</gu…
94 </item>
95 <item>
96 <title>Re: [CVE-2020-13944] Apache Airflow Reflected XSS via Origin …
97 <link>http://seclists.org/oss-sec/2020/q3/179</link>
98 <description>&lt;p&gt;Posted by Kaxil Naik on Sep 16&lt;/p&gt;Correc…
99 <pubDate>Wed, 16 Sep 2020 14:54:19 GMT</pubDate>
100 <guid isPermaLink="true">http://seclists.org/oss-sec/2020/q3/179</gu…
101 </item>
102 <item>
103 <title>Multiple vulnerabilities in Jenkins plugins</title>
104 <link>http://seclists.org/oss-sec/2020/q3/178</link>
105 <description>&lt;p&gt;Posted by Daniel Beck on Sep 16&lt;/p&gt;Jenki…
106 the world to reliably build, test, and deploy their software.&lt;br&gt;
107 &lt;br&gt;
108 The following releases contain fixes for security vulnerabilities:&lt;br…
109 &lt;br&gt;
110 * Blue Ocean Plugin 1.23.3&lt;br&gt;
111 * computer-queue-plugin Plugin 1.6&lt;br&gt;
112 * Email Extension Plugin 2.76&lt;br&gt;
113 * Health Advisor by CloudBees Plugin 3.2.1&lt;br&gt;
114 * Mailer Plugin 1.32.1&lt;br&gt;
115 * Perfecto Plugin 1.18&lt;br&gt;
116 * Pipeline Maven Integration Plugin 3.9.3&lt;br&gt;
117 * Validating String...&lt;br&gt;</description>
118 <pubDate>Wed, 16 Sep 2020 13:14:57 GMT</pubDate>
119 <guid isPermaLink="true">http://seclists.org/oss-sec/2020/q3/178</gu…
120 </item>
121 <item>
122 <title>[CVE-2020-13944] Apache Airflow Reflected XSS via Origin Para…
123 <link>http://seclists.org/oss-sec/2020/q3/177</link>
124 <description>&lt;p&gt;Posted by Kaxil Naik on Sep 16&lt;/p&gt;Versio…
125 Description:&lt;br&gt;
126 The &amp;quot;origin&amp;quot; parameter passed to some of the endpoints…
127 vulnerable to XSS exploit.&lt;br&gt;
128 &lt;br&gt;
129 Credit:&lt;br&gt;
130 The issue was independently discovered and reported by Ali Al-Habsi of&l…
131 Accellion &amp;amp; Everardo Padilla Saca.&lt;br&gt;
132 &lt;br&gt;
133 Thanks,&lt;br&gt;
134 Kaxil,&lt;br&gt;
135 on behalf of Apache Airflow PMC&lt;br&gt;</description>
136 <pubDate>Wed, 16 Sep 2020 12:08:37 GMT</pubDate>
137 <guid isPermaLink="true">http://seclists.org/oss-sec/2020/q3/177</gu…
138 </item>
139 <item>
140 <title>Linux Kernel: out-of-bounds reading in vgacon_scrolldelta</ti…
141 <link>http://seclists.org/oss-sec/2020/q3/176</link>
142 <description>&lt;p&gt;Posted by NopNop Nop on Sep 16&lt;/p&gt;Hi,&lt…
143 &lt;br&gt;
144 We found a out-of-bounds reading in vgacon_scrolldelta. This BUG is caus…
145 by &amp;quot;soff&amp;quot; being negative after VT_RESIZE.&lt;br&gt;
146 &lt;br&gt;
147 Our PoC (panic with CONFIG_KASAN=y):&lt;br&gt;
148 &lt;br&gt;
149 #include &amp;lt;stdio.h&amp;gt;&lt;br&gt;
150 #include &amp;lt;stdlib.h&amp;gt;&lt;br&gt;
151 #include &amp;lt;unistd.h&amp;gt;&lt;br&gt;
152 #include &amp;lt;sys/types.h&amp;gt;&lt;br&gt;
153 #include &amp;lt;sys/stat.h&amp;gt;&lt;br&gt;
154 #include &amp;lt;sys/ioctl.h&amp;gt;&lt;br&gt;
155 #include &amp;lt;fcntl.h&amp;gt;&lt;br&gt;
156 &lt;br&gt;
157 int main(int argc, char** argv)&lt;br&gt;
158 {&lt;br&gt;
159 int fd = open(&amp;quot;/dev/tty1&amp;quot;, O_RDWR, 0);...&lt;b…
160 <pubDate>Wed, 16 Sep 2020 10:14:45 GMT</pubDate>
161 <guid isPermaLink="true">http://seclists.org/oss-sec/2020/q3/176</gu…
162 </item>
163
164
165 <item>
166 <title>[CVE-2020-13948] Apache Superset Remote Code Execution Vulner…
167 <link>http://seclists.org/oss-sec/2020/q3/175</link>
168 <description>&lt;p&gt;Posted by William Barrett on Sep 15&lt;/p&gt;A…
169 &lt;br&gt;
170 While investigating a bug report on Apache Superset, it was determined t…
171 via a number of templated text fields in the product that would allow ar…
172 web application process. It was thus possible for an authenticated user …
173 variables, and process information. Additionally...&lt;br&gt;</descripti…
174 <pubDate>Tue, 15 Sep 2020 18:26:51 GMT</pubDate>
175 <guid isPermaLink="true">http://seclists.org/oss-sec/2020/q3/175</gu…
176 </item>
177 <item>
178 <title>CVE-2020-14390: Linux kernel: slab-out-of-bounds in fbcon</ti…
179 <link>http://seclists.org/oss-sec/2020/q3/174</link>
180 <description>&lt;p&gt;Posted by Minh Yuan on Sep 15&lt;/p&gt;Hi,&lt;…
181 &lt;br&gt;
182 I found a out-of-bound write in fbcon_redraw_softback while the kernel&l…
183 version &amp;lt;= 5.9.rc5. The oldest affected kernel version is 2.2.3.&…
184 The root cause of this vulnerability is that the value of vc-&amp;gt;vc_…
185 not updated in time while invoking vc_do_resize.&lt;br&gt;
186 &lt;br&gt;
187 This is my PoC (need the permission to open and write the tty, and need …
188 have a fbcon driver):&lt;br&gt;
189 &lt;br&gt;
190 // author by ziiiro@thu&lt;br&gt;
191 #include &amp;lt;stdio.h&amp;gt;&lt;br&gt;
192 #include &amp;lt;stdlib.h&amp;gt;...&lt;br&gt;</description>
193 <pubDate>Tue, 15 Sep 2020 11:08:01 GMT</pubDate>
194 <guid isPermaLink="true">http://seclists.org/oss-sec/2020/q3/174</gu…
195 </item>
196 <item>
197 <title>Fwd: [CVE-2020-13928 ] Apache Atlas Multiple XSS Vulnerabilit…
198 <link>http://seclists.org/oss-sec/2020/q3/173</link>
199 <description>&lt;p&gt;Posted by Keval Bhatt on Sep 15&lt;/p&gt;Hello…
200 &lt;br&gt;
201 Please find below details on CVE fixed in Apache Atlas releases *2.1.0*&…
202 &lt;br&gt;
203 ------------------------------------------------------------------------…
204 &lt;br&gt;
205 CVE-2020-13928: Atlas was found vulnerable to a Cross-Site&lt;br…
206 Scripting in Basic Search functionality.&lt;br&gt;
207 &lt;br&gt;
208 Severity: Critical&lt;br&gt;
209 &lt;br&gt;
210 Vendor: The Apache Software Foundation&lt;br&gt;
211 &lt;br&gt;
212 Versions affected: Apache Atlas versions 2.0.0...&lt;br&gt;</desc…
213 <pubDate>Tue, 15 Sep 2020 07:34:08 GMT</pubDate>
214 <guid isPermaLink="true">http://seclists.org/oss-sec/2020/q3/173</gu…
215 </item>
216
217
218 <item>
219 <title>[CVE-2020-11977] Apache Syncope: Remote Code Execution via Fl…
220 <link>http://seclists.org/oss-sec/2020/q3/172</link>
221 <description>&lt;p&gt;Posted by Francesco Chicchiriccò on Sep 14&lt…
222 When the Flowable extension is enabled, an administrator with workflow e…
223 perform malicious operations, including but not limited to file read, fi…
224 &lt;br&gt;
225 Severity: Low&lt;br&gt;
226 &lt;br&gt;
227 Vendor: The Apache Software Foundation&lt;br&gt;
228 &lt;br&gt;
229 Affects:&lt;br&gt;
230 2.1.X releases prior to 2.1.7&lt;br&gt;
231 &lt;br&gt;
232 Solution:&lt;br&gt;
233 2.1.X users: upgrade to 2.1.7&lt;br&gt;
234 &lt;br&gt;
235 Credit:&lt;br&gt;
236 This issue was discovered by ch0wn of Orz Lab.&lt;br&gt;</description>
237 <pubDate>Mon, 14 Sep 2020 10:57:54 GMT</pubDate>
238 <guid isPermaLink="true">http://seclists.org/oss-sec/2020/q3/172</gu…
239 </item>
240
241
242 <item>
243 <title>[CVE-2020-11991] Apache Cocoon security vulnerability</title>
244 <link>http://seclists.org/oss-sec/2020/q3/171</link>
245 <description>&lt;p&gt;Posted by Cédric Damioli on Sep 11&lt;/p&gt;[…
246 &lt;br&gt;
247 Severity: Important&lt;br&gt;
248 &lt;br&gt;
249 Vendor: The Apache Software Foundation&lt;br&gt;
250 &lt;br&gt;
251 Versions Affected: Apache Cocoon up to 2.1.12&lt;br&gt;
252 &lt;br&gt;
253 Description: When using the StreamGenerator, the code parse a &lt;br&gt;
254 user-provided XML.&lt;br&gt;
255 &lt;br&gt;
256 A specially crafted XML, including external system entities, could be &l…
257 used to access any file on the server system.&lt;br&gt;
258 &lt;br&gt;
259 Mitigation:&lt;br&gt;
260 &lt;br&gt;
261 The StreamGenerator now ignores external entities. 2.1.x users should...…
262 <pubDate>Fri, 11 Sep 2020 10:07:37 GMT</pubDate>
263 <guid isPermaLink="true">http://seclists.org/oss-sec/2020/q3/171</gu…
264 </item>
265
266
267 <item>
268 <title>Re: CVE Request: Linux kernel vsyscall page refcounting error…
269 <link>http://seclists.org/oss-sec/2020/q3/170</link>
270 <description>&lt;p&gt;Posted by Salvatore Bonaccorso on Sep 10&lt;/p…
271 cannot request anymore CVEs through that list but one can use&lt;br&gt;
272 &lt;a rel=&quot;nofollow&quot; href=&quot;https://cveform.mitre.org/&qu…
273 &lt;br&gt;
274 Regards,&lt;br&gt;
275 Salvatore&lt;br&gt;</description>
276 <pubDate>Thu, 10 Sep 2020 14:54:18 GMT</pubDate>
277 <guid isPermaLink="true">http://seclists.org/oss-sec/2020/q3/170</gu…
278 </item>
279
280
281
282 <!-- MHonArc v2.6.19 -->
283 </channel>
284 </rss>
You are viewing proxied material from codemadness.org. The copyright of proxied material belongs to its original authors. Any comments or complaints in relation to proxied material should be directed to the original authors of the content concerned. Please see the disclaimer for more details.