ALT-BU-2019-3657-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2019-04696
Уязвимость компонента dhcp6.c DHCP-сервера dhcpcd, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-11766
dhcp6.c in dhcpcd before 6.11.7 and 7.x before 7.2.2 has a buffer over-read in the D6_OPTION_PD_EXCLUDE feature.
- 108172
- 108172
- https://bugs.debian.org/928440
- https://bugs.debian.org/928440
- https://roy.marples.name/archives/dhcpcd-discuss/0002428.html
- https://roy.marples.name/archives/dhcpcd-discuss/0002428.html
- https://roy.marples.name/cgit/dhcpcd.git/commit/?h=dhcpcd-7&id=896ef4a54b0578985e5e1360b141593f1d62837b
- https://roy.marples.name/cgit/dhcpcd.git/commit/?h=dhcpcd-7&id=896ef4a54b0578985e5e1360b141593f1d62837b
- https://roy.marples.name/cgit/dhcpcd.git/commit/?h=dhcpcd-7&id=c1ebeaafeb324bac997984abdcee2d4e8b61a8a8
- https://roy.marples.name/cgit/dhcpcd.git/commit/?h=dhcpcd-7&id=c1ebeaafeb324bac997984abdcee2d4e8b61a8a8
Package TiMidity++ updated to version 2.15.0-alt1 for branch sisyphus in task 229371.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-11546
The insert_note_steps function in readmidi.c in TiMidity++ 2.14.0 allows remote attackers to cause a denial of service (divide-by-zero error and application crash) via a crafted mid file. NOTE: a crash might be relevant when using the --background option.
Modified: 2024-11-21
CVE-2017-11547
The resample_gauss function in resample.c in TiMidity++ 2.14.0 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted mid file. NOTE: a crash might be relevant when using the --background option. NOTE: the TiMidity++ README.alsaseq documentation suggests a setuid-root installation.
Modified: 2024-11-21
CVE-2017-11549
The play_midi function in playmidi.c in TiMidity++ 2.14.0 allows remote attackers to cause a denial of service (large loop and CPU consumption) via a crafted mid file. NOTE: CPU consumption might be relevant when using the --background option.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-20795
iproute2 before 5.1.0 has a use-after-free in get_netnsid_from_name in ip/ipnetns.c. NOTE: security relevance may be limited to certain uses of setuid that, although not a default, are sometimes a configuration option offered to end users. Even when setuid is used, other factors (such as C library configuration) may block exploitability.
- https://bugzilla.suse.com/show_bug.cgi?id=1171452
- https://bugzilla.suse.com/show_bug.cgi?id=1171452
- https://git.kernel.org/pub/scm/network/iproute2/iproute2.git/commit/?id=9bf2c538a0eb10d66e2365a655bf6c52f5ba3d10
- https://git.kernel.org/pub/scm/network/iproute2/iproute2.git/commit/?id=9bf2c538a0eb10d66e2365a655bf6c52f5ba3d10
- GLSA-202008-06
- GLSA-202008-06
- USN-4357-1
- USN-4357-1