ALT-BU-2019-4119-1
Branch sisyphus update bulletin.
Closed bugs
Падение браузера при скачивании файлов
Closed vulnerabilities
BDU:2020-02642
Уязвимость функции ssh_scp_new() библиотеки libssh, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2019-14889
A flaw was found with the libssh API function ssh_scp_new() in versions before 0.9.3 and before 0.8.8. When the libssh SCP client connects to a server, the scp command, which includes a user-provided path, is executed on the server-side. In case the library is used in a way where users can influence the third parameter of the function, it would become possible for an attacker to inject arbitrary commands, leading to a compromise of the remote target.
- openSUSE-SU-2019:2689
- openSUSE-SU-2019:2689
- openSUSE-SU-2020:0102
- openSUSE-SU-2020:0102
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14889
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14889
- [debian-lts-announce] 20191217 [SECURITY] [DLA 2038-1] libssh security update
- [debian-lts-announce] 20191217 [SECURITY] [DLA 2038-1] libssh security update
- [debian-lts-announce] 20230529 [SECURITY] [DLA 3437-1] libssh security update
- [debian-lts-announce] 20230529 [SECURITY] [DLA 3437-1] libssh security update
- FEDORA-2019-8b0ad69829
- FEDORA-2019-8b0ad69829
- FEDORA-2019-46b6bd2459
- FEDORA-2019-46b6bd2459
- GLSA-202003-27
- GLSA-202003-27
- USN-4219-1
- USN-4219-1
- https://www.libssh.org/security/advisories/CVE-2019-14889.txt
- https://www.libssh.org/security/advisories/CVE-2019-14889.txt
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
Closed bugs
Не запускается приложение blueberry (UI)
Closed vulnerabilities
BDU:2022-05966
Уязвимость компонента checkout.c реализации методов Git на языке C Libgit2, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-05967
Уязвимость компонента path.c реализации методов Git на языке C Libgit2, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-12278
An issue was discovered in libgit2 before 0.28.4 and 0.9x before 0.99.0. path.c mishandles equivalent filenames that exist because of NTFS Alternate Data Streams. This may allow remote code execution when cloning a repository. This issue is similar to CVE-2019-1352.
- https://github.com/git/git/security/advisories/GHSA-5wph-8frv-58vj
- https://github.com/libgit2/libgit2/commit/3f7851eadca36a99627ad78cbe56a40d3776ed01
- https://github.com/libgit2/libgit2/commit/e1832eb20a7089f6383cfce474f213157f5300cb
- https://github.com/libgit2/libgit2/releases/tag/v0.28.4
- https://github.com/libgit2/libgit2/releases/tag/v0.99.0
- [debian-lts-announce] 20220321 [SECURITY] [DLA 2936-1] libgit2 security update
- [debian-lts-announce] 20230223 [SECURITY] [DLA 3340-1] libgit2 security update
- https://github.com/git/git/security/advisories/GHSA-5wph-8frv-58vj
- [debian-lts-announce] 20230223 [SECURITY] [DLA 3340-1] libgit2 security update
- [debian-lts-announce] 20220321 [SECURITY] [DLA 2936-1] libgit2 security update
- https://github.com/libgit2/libgit2/releases/tag/v0.99.0
- https://github.com/libgit2/libgit2/releases/tag/v0.28.4
- https://github.com/libgit2/libgit2/commit/e1832eb20a7089f6383cfce474f213157f5300cb
- https://github.com/libgit2/libgit2/commit/3f7851eadca36a99627ad78cbe56a40d3776ed01
Modified: 2024-11-21
CVE-2020-12279
An issue was discovered in libgit2 before 0.28.4 and 0.9x before 0.99.0. checkout.c mishandles equivalent filenames that exist because of NTFS short names. This may allow remote code execution when cloning a repository. This issue is similar to CVE-2019-1353.
- https://github.com/git/git/security/advisories/GHSA-589j-mmg9-733v
- https://github.com/libgit2/libgit2/commit/64c612cc3e25eff5fb02c59ef5a66ba7a14751e4
- https://github.com/libgit2/libgit2/releases/tag/v0.28.4
- https://github.com/libgit2/libgit2/releases/tag/v0.99.0
- [debian-lts-announce] 20220321 [SECURITY] [DLA 2936-1] libgit2 security update
- [debian-lts-announce] 20230223 [SECURITY] [DLA 3340-1] libgit2 security update
- https://github.com/git/git/security/advisories/GHSA-589j-mmg9-733v
- [debian-lts-announce] 20230223 [SECURITY] [DLA 3340-1] libgit2 security update
- [debian-lts-announce] 20220321 [SECURITY] [DLA 2936-1] libgit2 security update
- https://github.com/libgit2/libgit2/releases/tag/v0.99.0
- https://github.com/libgit2/libgit2/releases/tag/v0.28.4
- https://github.com/libgit2/libgit2/commit/64c612cc3e25eff5fb02c59ef5a66ba7a14751e4
Package slick-greeter updated to version 1.3.0-alt2 for branch sisyphus in task 242734.
Closed bugs
Не работает экранный диктор
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-1010301
jhead 3.03 is affected by: Buffer Overflow. The impact is: Denial of service. The component is: gpsinfo.c Line 151 ProcessGpsInfo(). The attack vector is: Open a specially crafted JPEG file.
- https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1838251
- https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1838251
- https://bugzilla.redhat.com/show_bug.cgi?id=1679952
- https://bugzilla.redhat.com/show_bug.cgi?id=1679952
- https://launchpadlibrarian.net/435112680/32_crash_in_gpsinfo
- https://launchpadlibrarian.net/435112680/32_crash_in_gpsinfo
- [debian-lts-announce] 20191231 [SECURITY] [DLA 2054-1] jhead security update
- [debian-lts-announce] 20191231 [SECURITY] [DLA 2054-1] jhead security update
- FEDORA-2019-17b95fecd3
- FEDORA-2019-17b95fecd3
- FEDORA-2019-441c2fb0d1
- FEDORA-2019-441c2fb0d1
- GLSA-202007-17
- GLSA-202007-17
Modified: 2024-11-21
CVE-2019-1010302
jhead 3.03 is affected by: Incorrect Access Control. The impact is: Denial of service. The component is: iptc.c Line 122 show_IPTC(). The attack vector is: the victim must open a specially crafted JPEG file.
- https://bugzilla.redhat.com/show_bug.cgi?id=1679978
- https://bugzilla.redhat.com/show_bug.cgi?id=1679978
- [debian-lts-announce] 20191231 [SECURITY] [DLA 2054-1] jhead security update
- [debian-lts-announce] 20191231 [SECURITY] [DLA 2054-1] jhead security update
- FEDORA-2019-17b95fecd3
- FEDORA-2019-17b95fecd3
- FEDORA-2019-441c2fb0d1
- FEDORA-2019-441c2fb0d1
- GLSA-202007-17
- GLSA-202007-17
Modified: 2024-11-21
CVE-2019-19035
jhead 3.03 is affected by: heap-based buffer over-read. The impact is: Denial of service. The component is: ReadJpegSections and process_SOFn in jpgfile.c. The attack vector is: Open a specially crafted JPEG file.
Modified: 2024-11-21
CVE-2020-26208
JHEAD is a simple command line tool for displaying and some manipulation of EXIF header data embedded in Jpeg images from digital cameras. In affected versions there is a heap-buffer-overflow on jhead-3.04/jpgfile.c:285 ReadJpegSections. Crafted jpeg images can be provided to the user resulting in a program crash or potentially incorrect exif information retrieval. Users are advised to upgrade. There is no known workaround for this issue.
- https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1900821
- https://bugs.launchpad.net/ubuntu/+source/jhead/+bug/1900821
- https://github.com/F-ZhaoYang/jhead/commit/5186ddcf9e35a7aa0ff0539489a930434a1325f4
- https://github.com/F-ZhaoYang/jhead/commit/5186ddcf9e35a7aa0ff0539489a930434a1325f4
- https://github.com/F-ZhaoYang/jhead/security/advisories/GHSA-7pr6-xq4f-qhgc
- https://github.com/F-ZhaoYang/jhead/security/advisories/GHSA-7pr6-xq4f-qhgc
- https://github.com/Matthias-Wandel/jhead/issues/7
- https://github.com/Matthias-Wandel/jhead/issues/7
Closed bugs
Некорректно отображается пункт программы в меню xfce (все на английском)
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-18837
An issue was discovered in crun before 0.10.5. With a crafted image, it doesn't correctly check whether a target is a symlink, resulting in access to files outside of the container. This occurs in libcrun/linux.c and libcrun/chroot_realpath.c.
- https://github.com/containers/crun/pull/173
- https://github.com/containers/crun/pull/173
- https://github.com/containers/crun/releases/tag/0.10.5
- https://github.com/containers/crun/releases/tag/0.10.5
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DTA5SJUAKQUK6HRY2CZVJUIZP5BO3EOG/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DTA5SJUAKQUK6HRY2CZVJUIZP5BO3EOG/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITB2UNEGHXZUR3ATYHWPSK5LJB36N7AP/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ITB2UNEGHXZUR3ATYHWPSK5LJB36N7AP/