ALT-BU-2018-3609-1
Branch sisyphus update bulletin.
Closed bugs
Невозможно выбрать синтезатор звука в настройках речи
Package cinnamon-meta updated to version 4.0.0-alt1 for branch sisyphus in task 217014.
Closed bugs
Добавить зависимость на yelp
Closed vulnerabilities
Modified: 2021-03-23
BDU:2015-09474
Уязвимость операционной системы Gentoo Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2025-04-03
CVE-2005-0769
Multiple buffer overflows in OpenSLP before 1.1.5 allow remote attackers to have an unknown impact via malformed SLP packets.
- http://secunia.com/advisories/14561
- http://secunia.com/advisories/22128
- http://www.gentoo.org/security/en/glsa/glsa-200503-25.xml
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:055
- http://www.novell.com/linux/security/advisories/2005_15_openslp.html
- http://www.securityfocus.com/archive/1/447537/100/0/threaded
- http://www.securityfocus.com/bid/12792
- http://www.vupen.com/english/advisories/2006/3879
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19683
- https://usn.ubuntu.com/98-1/
- http://secunia.com/advisories/14561
- http://secunia.com/advisories/22128
- http://www.gentoo.org/security/en/glsa/glsa-200503-25.xml
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:055
- http://www.novell.com/linux/security/advisories/2005_15_openslp.html
- http://www.securityfocus.com/archive/1/447537/100/0/threaded
- http://www.securityfocus.com/bid/12792
- http://www.vupen.com/english/advisories/2006/3879
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19683
- https://usn.ubuntu.com/98-1/
Modified: 2025-04-11
CVE-2010-3609
The extension parser in slp_v2message.c in OpenSLP 1.2.1, and other versions before SVN revision 1647, as used in Service Location Protocol daemon (SLPD) in VMware ESX 4.0 and 4.1 and ESXi 4.0 and 4.1, allows remote attackers to cause a denial of service (infinite loop) via a packet with a "next extension offset" that references this extension or a previous extension. NOTE: some of these details are obtained from third party information.
- http://lists.vmware.com/pipermail/security-announce/2011/000126.html
- http://secunia.com/advisories/43601
- http://secunia.com/advisories/43742
- http://securityreason.com/securityalert/8127
- http://securitytracker.com/id?1025168
- http://www.kb.cert.org/vuls/id/393783
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:141
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:111
- http://www.osvdb.org/71019
- http://www.securityfocus.com/archive/1/516909/100/0/threaded
- http://www.securityfocus.com/bid/46772
- http://www.vmware.com/security/advisories/VMSA-2011-0004.html
- http://www.vupen.com/english/advisories/2011/0606
- http://www.vupen.com/english/advisories/2011/0729
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65931
- https://security.gentoo.org/glsa/201707-05
- https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0227
- http://lists.vmware.com/pipermail/security-announce/2011/000126.html
- http://secunia.com/advisories/43601
- http://secunia.com/advisories/43742
- http://securityreason.com/securityalert/8127
- http://securitytracker.com/id?1025168
- http://www.kb.cert.org/vuls/id/393783
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:141
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:111
- http://www.osvdb.org/71019
- http://www.securityfocus.com/archive/1/516909/100/0/threaded
- http://www.securityfocus.com/bid/46772
- http://www.vmware.com/security/advisories/VMSA-2011-0004.html
- http://www.vupen.com/english/advisories/2011/0606
- http://www.vupen.com/english/advisories/2011/0729
- https://exchange.xforce.ibmcloud.com/vulnerabilities/65931
- https://security.gentoo.org/glsa/201707-05
- https://wiki.mageia.org/en/Support/Advisories/MGASA-2012-0227
Modified: 2024-11-21
CVE-2012-4428
openslp: SLPIntersectStringList()' Function has a DoS vulnerability
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/159059.html
- http://www.openwall.com/lists/oss-security/2012/09/13/27
- http://www.securityfocus.com/bid/55540
- http://www.ubuntu.com/usn/USN-2730-1
- https://access.redhat.com/security/cve/cve-2012-4428
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-4428
- https://bugzilla.suse.com/show_bug.cgi?id=CVE-2012-4428
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78732
- https://security-tracker.debian.org/tracker/CVE-2012-4428
- https://security.gentoo.org/glsa/201707-05
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/159059.html
- http://www.openwall.com/lists/oss-security/2012/09/13/27
- http://www.securityfocus.com/bid/55540
- http://www.ubuntu.com/usn/USN-2730-1
- https://access.redhat.com/security/cve/cve-2012-4428
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2012-4428
- https://bugzilla.suse.com/show_bug.cgi?id=CVE-2012-4428
- https://exchange.xforce.ibmcloud.com/vulnerabilities/78732
- https://security-tracker.debian.org/tracker/CVE-2012-4428
- https://security.gentoo.org/glsa/201707-05
Modified: 2025-04-20
CVE-2015-5177
Double free vulnerability in the SLPDKnownDAAdd function in slpd/slpd_knownda.c in OpenSLP 1.2.1 allows remote attackers to cause a denial of service (crash) via a crafted package.
- http://sourceforge.net/p/openslp/mercurial/ci/2bc15d0494f886d9c4fe342d23bc160605aea51d/
- http://www.securityfocus.com/bid/76635
- http://www.securitytracker.com/id/1033719
- https://bugzilla.redhat.com/show_bug.cgi?id=1251064
- https://www.debian.org/security/2015/dsa-3353
- http://sourceforge.net/p/openslp/mercurial/ci/2bc15d0494f886d9c4fe342d23bc160605aea51d/
- http://www.securityfocus.com/bid/76635
- http://www.securitytracker.com/id/1033719
- https://bugzilla.redhat.com/show_bug.cgi?id=1251064
- https://www.debian.org/security/2015/dsa-3353
Package libextractor updated to version 1.8-alt1 for branch sisyphus in task 217031.
Closed vulnerabilities
Modified: 2021-03-23
BDU:2018-01561
Уязвимость метода EXTRACTOR_zip_extract_method() библиотеки GNU Libextractor, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
Modified: 2024-11-21
CVE-2018-16430
GNU Libextractor through 1.7 has an out-of-bounds read vulnerability in EXTRACTOR_zip_extract_method() in zip_extractor.c.
- http://www.securityfocus.com/bid/105254
- https://gnunet.org/bugs/view.php?id=5405
- https://gnunet.org/git/libextractor.git/commit/?id=24c8d489797499c0331f4d1039e357ece1ae98a7
- https://lists.debian.org/debian-lts-announce/2018/09/msg00011.html
- https://www.debian.org/security/2018/dsa-4290
- http://www.securityfocus.com/bid/105254
- https://gnunet.org/bugs/view.php?id=5405
- https://gnunet.org/git/libextractor.git/commit/?id=24c8d489797499c0331f4d1039e357ece1ae98a7
- https://lists.debian.org/debian-lts-announce/2018/09/msg00011.html
- https://www.debian.org/security/2018/dsa-4290
Closed vulnerabilities
Modified: 2023-11-21
BDU:2021-01483
Уязвимость пакета SNMP прокси-сервера Squid, связанная с отсутствием освобождения ресурса после истечения действительного срока его эксплуатирования, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-19131
Squid before 4.4 has XSS via a crafted X.509 certificate during HTTP(S) error page generation for certificate errors.
- http://www.squid-cache.org/Advisories/SQUID-2018_4.txt
- http://www.squid-cache.org/Versions/v5/changesets/squid-5-6feeb15ff312f3e145763adf8d234ed6a0b3f11d.patch
- https://github.com/squid-cache/squid/pull/306
- http://www.squid-cache.org/Advisories/SQUID-2018_4.txt
- http://www.squid-cache.org/Versions/v5/changesets/squid-5-6feeb15ff312f3e145763adf8d234ed6a0b3f11d.patch
- https://github.com/squid-cache/squid/pull/306
Modified: 2024-11-21
CVE-2018-19132
Squid before 4.4, when SNMP is enabled, allows a denial of service (Memory Leak) via an SNMP packet.
- http://www.squid-cache.org/Advisories/SQUID-2018_5.txt
- http://www.squid-cache.org/Versions/v5/changesets/squid-5-644131ff1e00c1895d77561f561d29c104ba6b11.patch
- https://github.com/squid-cache/squid/pull/313
- https://lists.debian.org/debian-lts-announce/2018/11/msg00032.html
- https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html
- https://usn.ubuntu.com/4059-1/
- http://www.squid-cache.org/Advisories/SQUID-2018_5.txt
- http://www.squid-cache.org/Versions/v5/changesets/squid-5-644131ff1e00c1895d77561f561d29c104ba6b11.patch
- https://github.com/squid-cache/squid/pull/313
- https://lists.debian.org/debian-lts-announce/2018/11/msg00032.html
- https://lists.debian.org/debian-lts-announce/2020/07/msg00009.html
- https://usn.ubuntu.com/4059-1/
Closed bugs
connman 1.35 не заполняет /etc/resolv.conf из DHCP