ALT-BU-2020-3778-13
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2020-05806
Уязвимость функции urldecode() интерпретатора языка программирования PHP, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к защищаемой информации
Modified: 2024-11-21
CVE-2020-7067
In PHP versions 7.2.x below 7.2.30, 7.3.x below 7.3.17 and 7.4.x below 7.4.5, if PHP is compiled with EBCDIC support (uncommon), urldecode() function can be made to access locations past the allocated memory, due to erroneously using signed numbers as array indexes.
- https://bugs.php.net/bug.php?id=79465
- https://bugs.php.net/bug.php?id=79465
- https://security.netapp.com/advisory/ntap-20200504-0001/
- https://security.netapp.com/advisory/ntap-20200504-0001/
- DSA-4717
- DSA-4717
- DSA-4719
- DSA-4719
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.tenable.com/security/tns-2021-14
- https://www.tenable.com/security/tns-2021-14
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-14891
A flaw was found in cri-o, as a result of all pod-related processes being placed in the same memory cgroup. This can result in container management (conmon) processes being killed if a workload process triggers an out-of-memory (OOM) condition for the cgroup. An attacker could abuse this flaw to get host network access on an cri-o host.
Closed bugs
После обновления перестал работать mdns
Closed vulnerabilities
Modified: 2024-12-08
CVE-2020-35357
A buffer overflow can occur when calculating the quantile value using the Statistics Library of GSL (GNU Scientific Library), versions 2.5 and 2.6. Processing a maliciously crafted input data for gsl_stats_quantile_from_sorted_data of the library may lead to unexpected application termination or arbitrary code execution.
- https://git.savannah.gnu.org/cgit/gsl.git/commit/?id=989a193268b963aa1047814f7f1402084fb7d859
- https://git.savannah.gnu.org/cgit/gsl.git/commit/?id=989a193268b963aa1047814f7f1402084fb7d859
- [debian-lts-announce] 20230921 [SECURITY] [DLA 3576-1] gsl security update
- [debian-lts-announce] 20230921 [SECURITY] [DLA 3576-1] gsl security update
- https://lists.debian.org/debian-lts-announce/2024/12/msg00006.html
- https://savannah.gnu.org/bugs/?59624
- https://savannah.gnu.org/bugs/?59624