ALT-BU-2020-3742-1
Branch sisyphus update bulletin.
Package firefox-esr updated to version 68.6.1-alt1 for branch sisyphus in task 249357.
Closed vulnerabilities
BDU:2020-01392
Уязвимость деструктора nsDocShell веб-браузеров Firefox ESR и Firefox и почтового клиента Thunderbird, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-01393
Уязвимость компонента ReadableStream веб-браузеров Firefox ESR и Firefox и почтового клиента Thunderbird, связанная с повторном освобождении области памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2025-03-21
CVE-2020-6819
Under certain conditions, when running the nsDocShell destructor, a race condition can cause a use-after-free. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Thunderbird < 68.7.0, Firefox < 74.0.1, and Firefox ESR < 68.6.1.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1620818
- https://bugzilla.mozilla.org/show_bug.cgi?id=1620818
- USN-4335-1
- USN-4335-1
- https://www.mozilla.org/security/advisories/mfsa2020-11/
- https://www.mozilla.org/security/advisories/mfsa2020-11/
- https://www.mozilla.org/security/advisories/mfsa2020-14/
- https://www.mozilla.org/security/advisories/mfsa2020-14/
Modified: 2025-03-21
CVE-2020-6820
Under certain conditions, when handling a ReadableStream, a race condition can cause a use-after-free. We are aware of targeted attacks in the wild abusing this flaw. This vulnerability affects Thunderbird < 68.7.0, Firefox < 74.0.1, and Firefox ESR < 68.6.1.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1626728
- https://bugzilla.mozilla.org/show_bug.cgi?id=1626728
- USN-4335-1
- USN-4335-1
- https://www.mozilla.org/security/advisories/mfsa2020-11/
- https://www.mozilla.org/security/advisories/mfsa2020-11/
- https://www.mozilla.org/security/advisories/mfsa2020-14/
- https://www.mozilla.org/security/advisories/mfsa2020-14/
Closed vulnerabilities
BDU:2019-02520
Уязвимость IRC-клиента Irssi для операционных систем Debian GNU/Linux и Ubuntu, связанная с использованием памяти после её освобождения, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
Modified: 2024-11-21
CVE-2017-10965
An issue was discovered in Irssi before 1.0.4. When receiving messages with invalid time stamps, Irssi would try to dereference a NULL pointer.
Modified: 2024-11-21
CVE-2017-10966
An issue was discovered in Irssi before 1.0.4. While updating the internal nick list, Irssi could incorrectly use the GHashTable interface and free the nick while updating it. This would then result in use-after-free conditions on each access of the hash table.
Modified: 2024-11-21
CVE-2017-15227
Irssi before 1.0.5, while waiting for the channel synchronisation, may incorrectly fail to remove destroyed channels from the query list, resulting in use-after-free conditions when updating the state later on.
- http://openwall.com/lists/oss-security/2017/10/22/4
- http://openwall.com/lists/oss-security/2017/10/22/4
- https://irssi.org/security/irssi_sa_2017_10.txt
- https://irssi.org/security/irssi_sa_2017_10.txt
- [debian-lts-announce] 20171223 [SECURITY] [DLA 1217-1] irssi security update
- [debian-lts-announce] 20171223 [SECURITY] [DLA 1217-1] irssi security update
- DSA-4016
- DSA-4016
Modified: 2024-11-21
CVE-2017-15228
Irssi before 1.0.5, when installing themes with unterminated colour formatting sequences, may access data beyond the end of the string.
- http://openwall.com/lists/oss-security/2017/10/22/4
- http://openwall.com/lists/oss-security/2017/10/22/4
- https://irssi.org/security/irssi_sa_2017_10.txt
- https://irssi.org/security/irssi_sa_2017_10.txt
- [debian-lts-announce] 20171223 [SECURITY] [DLA 1217-1] irssi security update
- [debian-lts-announce] 20171223 [SECURITY] [DLA 1217-1] irssi security update
- DSA-4016
- DSA-4016
Modified: 2024-11-21
CVE-2017-15721
In Irssi before 1.0.5, certain incorrectly formatted DCC CTCP messages could cause a NULL pointer dereference. This is a separate, but similar, issue relative to CVE-2017-9468.
- http://openwall.com/lists/oss-security/2017/10/22/4
- http://openwall.com/lists/oss-security/2017/10/22/4
- https://irssi.org/security/irssi_sa_2017_10.txt
- https://irssi.org/security/irssi_sa_2017_10.txt
- [debian-lts-announce] 20171223 [SECURITY] [DLA 1217-1] irssi security update
- [debian-lts-announce] 20171223 [SECURITY] [DLA 1217-1] irssi security update
- DSA-4016
- DSA-4016
Modified: 2024-11-21
CVE-2017-15722
In certain cases, Irssi before 1.0.5 may fail to verify that a Safe channel ID is long enough, causing reads beyond the end of the string.
- http://openwall.com/lists/oss-security/2017/10/22/4
- http://openwall.com/lists/oss-security/2017/10/22/4
- https://irssi.org/security/irssi_sa_2017_10.txt
- https://irssi.org/security/irssi_sa_2017_10.txt
- [debian-lts-announce] 20171223 [SECURITY] [DLA 1217-1] irssi security update
- [debian-lts-announce] 20171223 [SECURITY] [DLA 1217-1] irssi security update
- DSA-4016
- DSA-4016
Modified: 2024-11-21
CVE-2017-15723
In Irssi before 1.0.5, overlong nicks or targets may result in a NULL pointer dereference while splitting the message.
Modified: 2024-11-21
CVE-2017-7191
The netjoin processing in Irssi 1.x before 1.0.2 allows attackers to cause a denial of service (use-after-free) and possibly execute arbitrary code via unspecified vectors.
Modified: 2024-11-21
CVE-2017-9468
In Irssi before 1.0.3, when receiving a DCC message without source nick/host, it attempts to dereference a NULL pointer. Thus, remote IRC servers can cause a crash.
Modified: 2024-11-21
CVE-2017-9469
In Irssi before 1.0.3, when receiving certain incorrectly quoted DCC files, it tries to find the terminating quote one byte before the allocated memory. Thus, remote attackers might be able to cause a crash.
Modified: 2024-11-21
CVE-2018-5205
When using incomplete escape codes, Irssi before 1.0.6 may access data beyond the end of the string.
Modified: 2024-11-21
CVE-2018-5206
When the channel topic is set without specifying a sender, Irssi before 1.0.6 may dereference a NULL pointer.
Modified: 2024-11-21
CVE-2018-5207
When using an incomplete variable argument, Irssi before 1.0.6 may access data beyond the end of the string.
Modified: 2024-11-21
CVE-2018-5208
In Irssi before 1.0.6, a calculation error in the completion code could cause a heap buffer overflow when completing certain strings.
Modified: 2024-11-21
CVE-2018-7050
An issue was discovered in Irssi before 1.0.7 and 1.1.x before 1.1.1. A NULL pointer dereference occurs for an "empty" nick.
Modified: 2024-11-21
CVE-2018-7051
An issue was discovered in Irssi before 1.0.7 and 1.1.x before 1.1.1. Certain nick names could result in out-of-bounds access when printing theme strings.
- http://openwall.com/lists/oss-security/2018/02/15/1
- http://openwall.com/lists/oss-security/2018/02/15/1
- https://irssi.org/security/irssi_sa_2018_02.txt
- https://irssi.org/security/irssi_sa_2018_02.txt
- [debian-lts-announce] 20180326 [SECURITY] [DLA 1318-1] irssi security update
- [debian-lts-announce] 20180326 [SECURITY] [DLA 1318-1] irssi security update
- USN-3590-1
- USN-3590-1
- DSA-4162
- DSA-4162
Modified: 2024-11-21
CVE-2018-7052
An issue was discovered in Irssi before 1.0.7 and 1.1.x before 1.1.1. When the number of windows exceeds the available space, a crash due to a NULL pointer dereference would occur.
Modified: 2024-11-21
CVE-2018-7053
An issue was discovered in Irssi before 1.0.7 and 1.1.x before 1.1.1. There is a use-after-free when SASL messages are received in an unexpected order.
Modified: 2024-11-21
CVE-2018-7054
An issue was discovered in Irssi before 1.0.7 and 1.1.x before 1.1.1. There is a use-after-free when a server is disconnected during netsplits. NOTE: this issue exists because of an incomplete fix for CVE-2017-7191.
Package virtualbox updated to version 6.1.4-alt5 for branch sisyphus in task 249332.
Closed bugs
Не открывается справка для Virtualbox - Ошибка выполнения команды
Closed bugs
Задать жёсткую зависимость на версию openssl у бинарного пакета ntp
Нужно изменить алгоритм по умолчанию у ntp-keygen