ALT-BU-2019-3833-3
Branch sisyphus update bulletin.
Closed bugs
Невозмжно удалить файлы за пределами $HOME
Closed vulnerabilities
Modified: 2024-04-03
BDU:2021-01494
Уязвимость диссектора ASN.1 BER анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-13619
In Wireshark 3.0.0 to 3.0.2, 2.6.0 to 2.6.9, and 2.4.0 to 2.4.15, the ASN.1 BER dissector and related dissectors could crash. This was addressed in epan/asn1.c by properly restricting buffer increments.
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00068.html
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html
- http://www.securityfocus.com/bid/109293
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15870
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=7e90aed666e809c0db5de9d1816802a7dcea28d9
- https://lists.debian.org/debian-lts-announce/2021/02/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JY52XAC2UNC4X4ZPIXYMK5SVXV2PO5I3/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q4QVJALLGVVC7MBUT4B4SHQVDXGJKGI7/
- https://usn.ubuntu.com/4133-1/
- https://www.wireshark.org/security/wnpa-sec-2019-20.html
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00068.html
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00027.html
- http://www.securityfocus.com/bid/109293
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=15870
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=7e90aed666e809c0db5de9d1816802a7dcea28d9
- https://lists.debian.org/debian-lts-announce/2021/02/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JY52XAC2UNC4X4ZPIXYMK5SVXV2PO5I3/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Q4QVJALLGVVC7MBUT4B4SHQVDXGJKGI7/
- https://usn.ubuntu.com/4133-1/
- https://www.wireshark.org/security/wnpa-sec-2019-20.html
Package libwlocate updated to version 1.1-alt1_10.git20130127 for branch sisyphus in task 235018.
Closed bugs
Содержит devel файлы
Closed vulnerabilities
Modified: 2024-11-07
BDU:2019-03593
Уязвимость библиотеки libavformat мультимедийной среды Ffmpeg, позволяющая нарушителю оказать воздействие на целостность данных, получить несанкционированный доступ к защищаемой информации, а также вызвать отказ в обслуживании
Modified: 2023-11-21
BDU:2021-02001
Уязвимость функции adx_write_trailer библиотеки libavformat мультимедийной среды Ffmpeg, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-09043
Уязвимость компонента libavcodec/ratecontrol.c мультимедийной библиотеки FFmpeg, связанная с отсутствием проверки деления на ноль, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-12730
aa_read_header in libavformat/aadec.c in FFmpeg before 3.2.14 and 4.x before 4.1.4 does not check for sscanf failure and consequently allows use of uninitialized variables.
- http://www.securityfocus.com/bid/109317
- https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/9b4004c054964a49c7ba44583f4cee22486dd8f2
- https://git.ffmpeg.org/gitweb/ffmpeg.git/shortlog/n4.1.4
- https://github.com/FFmpeg/FFmpeg/commit/ed188f6dcdf0935c939ed813cf8745d50742014b
- https://github.com/FFmpeg/FFmpeg/compare/a97ea53...ba11e40
- https://seclists.org/bugtraq/2019/Aug/30
- https://security.gentoo.org/glsa/202003-65
- https://usn.ubuntu.com/4431-1/
- https://www.debian.org/security/2019/dsa-4502
- http://www.securityfocus.com/bid/109317
- https://git.ffmpeg.org/gitweb/ffmpeg.git/commit/9b4004c054964a49c7ba44583f4cee22486dd8f2
- https://git.ffmpeg.org/gitweb/ffmpeg.git/shortlog/n4.1.4
- https://github.com/FFmpeg/FFmpeg/commit/ed188f6dcdf0935c939ed813cf8745d50742014b
- https://github.com/FFmpeg/FFmpeg/compare/a97ea53...ba11e40
- https://seclists.org/bugtraq/2019/Aug/30
- https://security.gentoo.org/glsa/202003-65
- https://usn.ubuntu.com/4431-1/
- https://www.debian.org/security/2019/dsa-4502
Modified: 2024-11-21
CVE-2019-13312
block_cmp() in libavcodec/zmbvenc.c in FFmpeg 4.1.3 has a heap-based buffer over-read.
Modified: 2024-11-21
CVE-2019-13390
In FFmpeg 4.1.3, there is a division by zero at adx_write_trailer in libavformat/rawenc.c.
- http://www.securityfocus.com/bid/109090
- https://lists.debian.org/debian-lts-announce/2020/07/msg00022.html
- https://security.gentoo.org/glsa/202003-65
- https://trac.ffmpeg.org/ticket/7979
- https://usn.ubuntu.com/4431-1/
- https://www.debian.org/security/2020/dsa-4722
- http://www.securityfocus.com/bid/109090
- https://lists.debian.org/debian-lts-announce/2020/07/msg00022.html
- https://security.gentoo.org/glsa/202003-65
- https://trac.ffmpeg.org/ticket/7979
- https://usn.ubuntu.com/4431-1/
- https://www.debian.org/security/2020/dsa-4722
Modified: 2024-11-21
CVE-2020-20448
FFmpeg 4.1.3 is affected by a Divide By Zero issue via libavcodec/ratecontrol.c, which allows a remote malicious user to cause a Denial of Service.
Closed vulnerabilities
Modified: 2021-03-23
BDU:2015-10225
Уязвимость FTP-сервера ProFTPD, позволяющая удалённому нарушителю получить доступ к защищаемой информации
Modified: 2021-03-23
BDU:2016-00938
Уязвимость FTP-сервера ProFTPd, позволяющая нарушителю повлиять на целостность, доступность и конфиденциальность информации
Modified: 2021-03-23
BDU:2019-02747
Уязвимость модуля mod_copy FTP-сервера ProFTPD, позволяющая нарушителю выполнить произвольный код в целевой системе посредством передачи команд CPFR и CPTO на сервер ProFTPD
BDU:2025-13427
Уязвимость FTP-сервера ProFTPD, связанная с ошибками процедуры подтверждения подлинности сертификата, позволяющая нарушителю манипулировать данными
BDU:2025-13428
Уязвимость FTP-сервера ProFTPD, связанная с разыменованием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-04-12
CVE-2015-3306
The mod_copy module in ProFTPD 1.3.5 allows remote attackers to read and write to arbitrary files via the site cpfr and site cpto commands.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157053.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157054.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157581.html
- http://lists.opensuse.org/opensuse-updates/2015-06/msg00020.html
- http://packetstormsecurity.com/files/131505/ProFTPd-1.3.5-File-Copy.html
- http://packetstormsecurity.com/files/131555/ProFTPd-1.3.5-Remote-Command-Execution.html
- http://packetstormsecurity.com/files/131567/ProFTPd-CPFR-CPTO-Proof-Of-Concept.html
- http://packetstormsecurity.com/files/132218/ProFTPD-1.3.5-Mod_Copy-Command-Execution.html
- http://packetstormsecurity.com/files/162777/ProFTPd-1.3.5-Remote-Command-Execution.html
- http://www.debian.org/security/2015/dsa-3263
- http://www.rapid7.com/db/modules/exploit/unix/ftp/proftpd_modcopy_exec
- http://www.securityfocus.com/bid/74238
- https://www.exploit-db.com/exploits/36742/
- https://www.exploit-db.com/exploits/36803/
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157053.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157054.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/157581.html
- http://lists.opensuse.org/opensuse-updates/2015-06/msg00020.html
- http://packetstormsecurity.com/files/131505/ProFTPd-1.3.5-File-Copy.html
- http://packetstormsecurity.com/files/131555/ProFTPd-1.3.5-Remote-Command-Execution.html
- http://packetstormsecurity.com/files/131567/ProFTPd-CPFR-CPTO-Proof-Of-Concept.html
- http://packetstormsecurity.com/files/132218/ProFTPD-1.3.5-Mod_Copy-Command-Execution.html
- http://packetstormsecurity.com/files/162777/ProFTPd-1.3.5-Remote-Command-Execution.html
- http://www.debian.org/security/2015/dsa-3263
- http://www.rapid7.com/db/modules/exploit/unix/ftp/proftpd_modcopy_exec
- http://www.securityfocus.com/bid/74238
- https://www.exploit-db.com/exploits/36742/
- https://www.exploit-db.com/exploits/36803/
Modified: 2025-04-12
CVE-2016-3125
The mod_tls module in ProFTPD before 1.3.5b and 1.3.6 before 1.3.6rc2 does not properly handle the TLSDHParamFile directive, which might cause a weaker than intended Diffie-Hellman (DH) key to be used and consequently allow attackers to have unspecified impact via unknown vectors.
- http://bugs.proftpd.org/show_bug.cgi?id=4230
- http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179109.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179143.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179905.html
- http://lists.opensuse.org/opensuse-updates/2016-05/msg00080.html
- http://lists.opensuse.org/opensuse-updates/2016-06/msg00045.html
- http://proftpd.org/docs/NEWS-1.3.5b
- http://proftpd.org/docs/NEWS-1.3.6rc2
- http://www.openwall.com/lists/oss-security/2016/03/11/14
- http://www.openwall.com/lists/oss-security/2016/03/11/3
- http://bugs.proftpd.org/show_bug.cgi?id=4230
- http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179109.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179143.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-March/179905.html
- http://lists.opensuse.org/opensuse-updates/2016-05/msg00080.html
- http://lists.opensuse.org/opensuse-updates/2016-06/msg00045.html
- http://proftpd.org/docs/NEWS-1.3.5b
- http://proftpd.org/docs/NEWS-1.3.6rc2
- http://www.openwall.com/lists/oss-security/2016/03/11/14
- http://www.openwall.com/lists/oss-security/2016/03/11/3
Modified: 2025-11-04
CVE-2019-12815
An arbitrary file copy vulnerability in mod_copy in ProFTPD up to 1.3.5b allows for remote code execution and information disclosure without authentication, a related issue to CVE-2015-3306.
- http://bugs.proftpd.org/show_bug.cgi?id=4372
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00009.html
- http://www.securityfocus.com/bid/109339
- https://cert-portal.siemens.com/productcert/pdf/ssa-940889.pdf
- https://github.com/proftpd/proftpd/pull/816
- https://lists.debian.org/debian-lts-announce/2019/08/msg00006.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OJDQ3XUYWO42TJBO53NUWDZRA35QMVEI/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XM5FPBAGSIKV6YJZEPM6GPGJO5JFT7XU/
- https://seclists.org/bugtraq/2019/Aug/3
- https://security.gentoo.org/glsa/201908-16
- https://tbspace.de/cve201912815proftpd.html
- https://www.debian.org/security/2019/dsa-4491
- http://bugs.proftpd.org/show_bug.cgi?id=4372
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00022.html
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00009.html
- http://seclists.org/fulldisclosure/2024/Aug/35
- http://www.securityfocus.com/bid/109339
- https://cert-portal.siemens.com/productcert/pdf/ssa-940889.pdf
- https://github.com/proftpd/proftpd/pull/816
- https://lists.debian.org/debian-lts-announce/2019/08/msg00006.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OJDQ3XUYWO42TJBO53NUWDZRA35QMVEI/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XM5FPBAGSIKV6YJZEPM6GPGJO5JFT7XU/
- https://seclists.org/bugtraq/2019/Aug/3
- https://security.gentoo.org/glsa/201908-16
- https://tbspace.de/cve201912815proftpd.html
- https://www.debian.org/security/2019/dsa-4491
Modified: 2024-11-21
CVE-2019-19271
An issue was discovered in tls_verify_crl in ProFTPD before 1.3.6. A wrong iteration variable, used when checking a client certificate against CRL entries (installed by a system administrator), can cause some CRL entries to be ignored, and can allow clients whose certificates have been revoked to proceed with a connection to the server.
Modified: 2024-11-21
CVE-2019-19272
An issue was discovered in tls_verify_crl in ProFTPD before 1.3.6. Direct dereference of a NULL pointer (a variable initialized to NULL) leads to a crash when validating the certificate of a client connecting to the server in a TLS client/server mutual-authentication setup.
Closed bugs
CVE-2019-12815
Closed bugs
SEGFAULT (zero dereference) в /usr/lib64/X11/modules/extensions/libvnc.so
Closed bugs
Некорректно отображается пункт программы в меню xfce: значение поля Comment на английском
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-5068
An exploitable shared memory permissions vulnerability exists in the functionality of X11 Mesa 3D Graphics Library 19.1.2. An attacker can access the shared memory without any specific permissions to trigger this vulnerability.
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00037.html
- https://gitlab.freedesktop.org/mesa/mesa/-/commit/02c3dad0f3b4d26e0faa5cc51d06bc50d693dcdc
- https://lists.debian.org/debian-lts-announce/2019/11/msg00013.html
- https://lists.freedesktop.org/pipermail/mesa-dev/2019-October/223704.html
- https://talosintelligence.com/vulnerability_reports/TALOS-2019-0857
- https://usn.ubuntu.com/4271-1/
- http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00037.html
- https://gitlab.freedesktop.org/mesa/mesa/-/commit/02c3dad0f3b4d26e0faa5cc51d06bc50d693dcdc
- https://lists.debian.org/debian-lts-announce/2019/11/msg00013.html
- https://lists.freedesktop.org/pipermail/mesa-dev/2019-October/223704.html
- https://talosintelligence.com/vulnerability_reports/TALOS-2019-0857
- https://usn.ubuntu.com/4271-1/
Closed vulnerabilities
BDU:2019-03792
Уязвимость библиотеки libcurl, связанная с неверным управлением генерацией кода, позволяющая нарушителю повысить свои привилегии или выполнить произвольный код
Modified: 2024-11-21
CVE-2019-5443
A non-privileged user or program can put code and a config file in a known non-privileged path (under C:/usr/local/) that will make curl <= 7.65.1 automatically run the code (as an openssl "engine") on invocation. If that curl is invoked by a privileged user it can do anything it wants.
- http://www.openwall.com/lists/oss-security/2019/06/24/1
- http://www.securityfocus.com/bid/108881
- https://curl.haxx.se/docs/CVE-2019-5443.html
- https://security.netapp.com/advisory/ntap-20191017-0002/
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- http://www.openwall.com/lists/oss-security/2019/06/24/1
- http://www.securityfocus.com/bid/108881
- https://curl.haxx.se/docs/CVE-2019-5443.html
- https://security.netapp.com/advisory/ntap-20191017-0002/
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
