ALT-BU-2020-3754-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-8955
irc_mode_channel_update in plugins/irc/irc-mode.c in WeeChat through 2.7 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a malformed IRC message 324 (channel mode).
- openSUSE-SU-2020:0248
- openSUSE-SU-2020:0248
- https://github.com/weechat/weechat/commit/6f4f147d8e86adf9ad34a8ffd7e7f1f23a7e74da
- https://github.com/weechat/weechat/commit/6f4f147d8e86adf9ad34a8ffd7e7f1f23a7e74da
- [debian-lts-announce] 20200324 [SECURITY] [DLA 2157-1] weechat security update
- [debian-lts-announce] 20200324 [SECURITY] [DLA 2157-1] weechat security update
- [debian-lts-announce] 20210930 [SECURITY] [DLA 2770-1] weechat security update
- [debian-lts-announce] 20210930 [SECURITY] [DLA 2770-1] weechat security update
- FEDORA-2020-4d232b48b8
- FEDORA-2020-4d232b48b8
- FEDORA-2020-db890b4800
- FEDORA-2020-db890b4800
- FEDORA-2020-d242130019
- FEDORA-2020-d242130019
- GLSA-202003-51
- GLSA-202003-51
- https://weechat.org/doc/security/
- https://weechat.org/doc/security/
Modified: 2024-11-21
CVE-2020-9760
An issue was discovered in WeeChat before 2.7.1 (0.3.4 to 2.7 are affected). When a new IRC message 005 is received with longer nick prefixes, a buffer overflow and possibly a crash can happen when a new mode is set for a nick.
- https://github.com/weechat/weechat/commit/40ccacb4330a64802b1f1e28ed9a6b6d3ca9197f
- https://github.com/weechat/weechat/commit/40ccacb4330a64802b1f1e28ed9a6b6d3ca9197f
- [debian-lts-announce] 20200324 [SECURITY] [DLA 2157-1] weechat security update
- [debian-lts-announce] 20200324 [SECURITY] [DLA 2157-1] weechat security update
- [debian-lts-announce] 20210930 [SECURITY] [DLA 2770-1] weechat security update
- [debian-lts-announce] 20210930 [SECURITY] [DLA 2770-1] weechat security update
- GLSA-202003-51
- GLSA-202003-51
- https://weechat.org/doc/security/
- https://weechat.org/doc/security/
Package fence-agents updated to version 4.3.3-alt2 for branch sisyphus in task 249667.
Closed bugs
По умолчанию ищет программу в /sbin/sbd, а должен - /usr/sbin/sbd
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-19821
A post-authentication privilege escalation in the web application of Combodo iTop allows regular authenticated users to access information and modify information with administrative privileges by not following the HTTP Location header in server responses. This is fixed in all iTop packages (community, essential, professional) in versions : 2.5.4, 2.6.3, 2.7.0
- https://github.com/Combodo/iTop/security/advisories/GHSA-2gfp-2qvh-9796
- https://github.com/Combodo/iTop/security/advisories/GHSA-2gfp-2qvh-9796
- https://www.combodo.com/itop-193
- https://www.combodo.com/itop-193
- https://www.pentagrid.ch/de/blog/security_issues_in_teampasswordmanager_and_combodo_itop/
- https://www.pentagrid.ch/de/blog/security_issues_in_teampasswordmanager_and_combodo_itop/