ALT-BU-2016-3194-2
Branch sisyphus update bulletin.
Package perl-Log-Log4perl updated to version 1.48-alt2 for branch sisyphus in task 174014.
Closed bugs
Тянущая Иксы зависимость на perl-RRD
Closed vulnerabilities
Modified: 2025-04-12
CVE-2016-9888
An error within the "tar_directory_for_file()" function (gsf-infile-tar.c) in GNOME Structured File Library before 1.14.41 can be exploited to trigger a Null pointer dereference and subsequently cause a crash via a crafted TAR file.
- http://www.securityfocus.com/bid/94860
- https://github.com/GNOME/libgsf/commit/95a8351a75758cf10b3bf6abae0b6b461f90d9e5
- https://lists.debian.org/debian-lts-announce/2020/04/msg00016.html
- https://secunia.com/advisories/71201/
- https://secunia.com/secunia_research/2016-17/
- http://www.securityfocus.com/bid/94860
- https://github.com/GNOME/libgsf/commit/95a8351a75758cf10b3bf6abae0b6b461f90d9e5
- https://lists.debian.org/debian-lts-announce/2020/04/msg00016.html
- https://secunia.com/advisories/71201/
- https://secunia.com/secunia_research/2016-17/
Package supervisor updated to version 3.3.1-alt1 for branch sisyphus in task 174007.
Closed vulnerabilities
Modified: 2021-03-23
BDU:2017-02043
Уязвимость компонента XML-RPC веб-сервера Supervisor и операционных систем Fedora, Debian GNU/Linux , позволяющая нарушителю выполнить произвольные команды
Modified: 2025-04-20
CVE-2017-11610
The XML-RPC server in supervisor before 3.0.1, 3.1.x before 3.1.4, 3.2.x before 3.2.4, and 3.3.x before 3.3.3 allows remote authenticated users to execute arbitrary commands via a crafted XML-RPC request, related to nested supervisord namespace lookups.
- http://www.debian.org/security/2017/dsa-3942
- https://access.redhat.com/errata/RHSA-2017:3005
- https://github.com/Supervisor/supervisor/blob/3.0.1/CHANGES.txt
- https://github.com/Supervisor/supervisor/blob/3.1.4/CHANGES.txt
- https://github.com/Supervisor/supervisor/blob/3.2.4/CHANGES.txt
- https://github.com/Supervisor/supervisor/blob/3.3.3/CHANGES.txt
- https://github.com/Supervisor/supervisor/issues/964
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4GMSCGMM477N64Z3BM34RWYBGSLK466B/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DTPDZV4ZRICDYAYZVUHSYZAYDLRMG2IM/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JXGWOJNSWWK2TTWQJZJUP66FLFIWDMBQ/
- https://security.gentoo.org/glsa/201709-06
- https://www.exploit-db.com/exploits/42779/
- http://www.debian.org/security/2017/dsa-3942
- https://access.redhat.com/errata/RHSA-2017:3005
- https://github.com/Supervisor/supervisor/blob/3.0.1/CHANGES.txt
- https://github.com/Supervisor/supervisor/blob/3.1.4/CHANGES.txt
- https://github.com/Supervisor/supervisor/blob/3.2.4/CHANGES.txt
- https://github.com/Supervisor/supervisor/blob/3.3.3/CHANGES.txt
- https://github.com/Supervisor/supervisor/issues/964
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4GMSCGMM477N64Z3BM34RWYBGSLK466B/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DTPDZV4ZRICDYAYZVUHSYZAYDLRMG2IM/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JXGWOJNSWWK2TTWQJZJUP66FLFIWDMBQ/
- https://security.gentoo.org/glsa/201709-06
- https://www.exploit-db.com/exploits/42779/