安全公告详情

NS-SA-2021-0045

2021-03-09 14:13:24

简介

moderate: python-rtslib/ipa security update

严重级别

moderate

主题

An update for python-rtslib/ipa is now available for NewStart CGSL MAIN 5.04/CGSL CORE 5.04.
NewStart Security has rated this update as having a security impact of moderate. A Common Vunlnerability Scoring System(CVSS)base score, which gives a detailed severity rating, is available for each vulnerability from the CVElink(s) in the References section.

详细描述

python-rtslib: API for generic Linux SCSI kernel target. Includes the 'target' service and targetctl tool for restoring configuration.
ipa: IPA integrated DNS server with support for automatic DNSSEC signing. Integrated DNS server is BIND 9. OpenDNSSEC provides key management.


Security Fix(es):
python-rtslib: A flaw was found in Open-iSCSI rtslib-fb through versions 2.1.72, where it has weak permissions for /etc/target/saveconfig.json because the shutil.copyfile, instead of shutil.copy is used, and permissions are not preserved upon editing. This flaw allows an attacker with prior access to /etc/target/saveconfig.json to access a later version, resulting in a loss of integrity, depending on their permission settings. The highest threat from this vulnerability is to confidentiality.(CVE-2020-14019)
python-rtslib: bugfix
ipa: A flaw was found in IPA. When sending a very long password (>= 1,000,000 characters) to the server, the password hashing process could exhaust memory and CPU leading to a denial of service and the website becoming unresponsive. The highest threat from this vulnerability is to system availability.(CVE-2020-1722)
ipa: A Prototype Pollution vulnerability was found in jquery. Untrusted JSON passed to the `extend` function could lead to modifying objects up the prototype chain, including the global Object. A crafted JSON object passed to a vulnerable method could lead to denial of service or data injection, with various consequences.(CVE-2019-11358)
ipa: A cross-site scripting vulnerability was discovered in bootstrap. If an attacker could control the data given to tooltip or popover, they could inject HTML or Javascript into the rendered page when tooltip or popover events fired.(CVE-2019-8331)
ipa: In Bootstrap before 3.4.0, XSS is possible in the tooltip data-viewport attribute.(CVE-2018-20676)
ipa: In Bootstrap 3.x before 3.4.0 and 4.x-beta before 4.0.0-beta.2, XSS is possible in the data-target attribute, a different vulnerability than CVE-2018-14041.(CVE-2016-10735)
ipa: In Bootstrap before 3.4.0, XSS is possible in the affix configuration target property.(CVE-2018-20677)
ipa: jQuery before 3.0.0 is vulnerable to Cross-site Scripting (XSS) attacks when a cross-domain Ajax request is performed without the dataType option, causing text/javascript responses to be executed.(CVE-2015-9251)
ipa: A Cross-site scripting (XSS) vulnerability exists in JQuery. This flaw allows an attacker with the ability to supply input to the ‘HTML’ function to inject Javascript into the page where that input is rendered, and have it delivered by the browser.(CVE-2020-11022)
ipa: In Bootstrap before 4.1.2, XSS is possible in the collapse data-parent attribute.(CVE-2018-14040)
ipa: In Bootstrap before 4.1.2, XSS is possible in the data-container property of tooltip.(CVE-2018-14042)
ipa: bugfix


Solution:
For details on how to apply this update, which includes the changes described in this advisory, refer to:
http://security.gd-linux.com/how_to_apply_patch.html
Remember the build tag is 5.04.F30B3.

影响组件

  • python-rtslib
  • ipa

影响产品

  • CGSL MAIN 5.04
  • CGSL CORE 5.04

更新包

{"fix":[{"product":"CGSL MAIN 5.04","pkgs":[{"binary":["python-rtslib-doc-2.1.74-1.el7_9.noarch.rpm","python-rtslib-2.1.74-1.el7_9.noarch.rpm"],"source":"python-rtslib-2.1.74-1.el7_9.src.rpm"},{"binary":["ipa-server-common-4.6.8-5.el7.centos.noarch.rpm","ipa-server-trust-ad-4.6.8-5.el7.centos.x86_64.rpm","ipa-client-common-4.6.8-5.el7.centos.noarch.rpm","python2-ipalib-4.6.8-5.el7.centos.noarch.rpm","ipa-python-compat-4.6.8-5.el7.centos.noarch.rpm","python2-ipaserver-4.6.8-5.el7.centos.noarch.rpm","ipa-common-4.6.8-5.el7.centos.noarch.rpm","ipa-client-4.6.8-5.el7.centos.x86_64.rpm","ipa-server-4.6.8-5.el7.centos.x86_64.rpm","ipa-server-dns-4.6.8-5.el7.centos.noarch.rpm","python2-ipaclient-4.6.8-5.el7.centos.noarch.rpm"],"source":"ipa-4.6.8-5.el7.centos.src.rpm"}]},{"product":"CGSL CORE 5.04","pkgs":[{"binary":["python-rtslib-2.1.74-1.el7_9.noarch.rpm","python-rtslib-doc-2.1.74-1.el7_9.noarch.rpm"],"source":"python-rtslib-2.1.74-1.el7_9.src.rpm"},{"binary":["ipa-server-dns-4.6.8-5.el7.centos.noarch.rpm","ipa-common-4.6.8-5.el7.centos.noarch.rpm","ipa-server-4.6.8-5.el7.centos.x86_64.rpm","ipa-server-common-4.6.8-5.el7.centos.noarch.rpm","python2-ipaclient-4.6.8-5.el7.centos.noarch.rpm","python2-ipalib-4.6.8-5.el7.centos.noarch.rpm","ipa-client-common-4.6.8-5.el7.centos.noarch.rpm","ipa-server-trust-ad-4.6.8-5.el7.centos.x86_64.rpm","python2-ipaserver-4.6.8-5.el7.centos.noarch.rpm","ipa-client-4.6.8-5.el7.centos.x86_64.rpm","ipa-python-compat-4.6.8-5.el7.centos.noarch.rpm"],"source":"ipa-4.6.8-5.el7.centos.src.rpm"}]}]}

CVE

参考