ALT-BU-2019-3889-1
Branch sisyphus update bulletin.
Closed bugs
Обновить xclip
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-13207
nsd-checkzone in NLnet Labs NSD 4.2.0 has a Stack-based Buffer Overflow in the dname_concatenate() function in dname.c.
- https://github.com/NLnetLabs/nsd/issues/20
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FDS4H7WVHQGCX3LF72F5K22VJXN7HDBB/
- https://github.com/NLnetLabs/nsd/issues/20
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FDS4H7WVHQGCX3LF72F5K22VJXN7HDBB/
Closed vulnerabilities
Modified: 2025-04-17
CVE-2022-44940
Patchelf v0.9 was discovered to contain an out-of-bounds read via the function modifyRPath at src/patchelf.cc.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-18594
nse_libssh2.cc in Nmap 7.70 is subject to a denial of service condition due to a double free when an SSH connection fails, as demonstrated by a leading \n character to ssh-brute.nse or ssh-auth-methods.nse.
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00073.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00075.html
- https://github.com/AMatchandaHaystack/Research/blob/master/Nmap%26libsshDF
- https://github.com/nmap/nmap/commit/350bbe0597d37ad67abe5fef8fba984707b4e9ad
- https://github.com/nmap/nmap/issues/1077
- https://github.com/nmap/nmap/issues/1227
- https://seclists.org/nmap-announce/2019/0
- https://seclists.org/nmap-dev/2018/q2/45
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00073.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00075.html
- https://github.com/AMatchandaHaystack/Research/blob/master/Nmap%26libsshDF
- https://github.com/nmap/nmap/commit/350bbe0597d37ad67abe5fef8fba984707b4e9ad
- https://github.com/nmap/nmap/issues/1077
- https://github.com/nmap/nmap/issues/1227
- https://seclists.org/nmap-announce/2019/0
- https://seclists.org/nmap-dev/2018/q2/45
Modified: 2024-11-21
CVE-2018-15173
Nmap through 7.70, when the -sV option is used, allows remote attackers to cause a denial of service (stack consumption and application crash) via a crafted TCP-based service.
- http://code610.blogspot.com/2018/07/crashing-nmap-760.html
- http://code610.blogspot.com/2018/07/crashing-nmap-770.html
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00067.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00073.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00075.html
- https://security.netapp.com/advisory/ntap-20200827-0004/
- http://code610.blogspot.com/2018/07/crashing-nmap-760.html
- http://code610.blogspot.com/2018/07/crashing-nmap-770.html
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00067.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00073.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00075.html
- https://security.netapp.com/advisory/ntap-20200827-0004/
Package gear-uupdate updated to version 0.28.0-alt1 for branch sisyphus in task 236363.
Closed bugs
Вызывать gear-update --ignore-exclude по умолчанию
Closed bugs
Не находит файл smart.ini при каждом запуске
Closed bugs
not ready for wxGTK3.1 version 3.1.2