ALT-BU-2020-3817-1
Branch sisyphus update bulletin.
Package openconnect updated to version 8.10-alt1 for branch sisyphus in task 251779.
Closed vulnerabilities
Modified: 2024-04-27
BDU:2020-04472
Уязвимость функции get_cert_name (gnutls.c) приложения для подключения к виртуальным частным сетям OpenConnect, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
Modified: 2024-11-21
CVE-2020-12823
OpenConnect 8.09 has a buffer overflow, causing a denial of service (application crash) or possibly unspecified other impact, via crafted certificate data to get_cert_name in gnutls.c.
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00039.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00056.html
- https://bugs.gentoo.org/721570
- https://gitlab.com/openconnect/openconnect/-/merge_requests/108
- https://lists.debian.org/debian-lts-announce/2020/05/msg00015.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/25MFX4AZE7RDCUWOL4ZOE73YBOPUMQDX/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AYSXLXAPXD2T73T6JMHI5G2WP7KHAGMN/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEVTIH5UFX35CC7MVSYBGRM3D66ACFD5/
- https://security.gentoo.org/glsa/202006-15
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00039.html
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00056.html
- https://bugs.gentoo.org/721570
- https://gitlab.com/openconnect/openconnect/-/merge_requests/108
- https://lists.debian.org/debian-lts-announce/2020/05/msg00015.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/25MFX4AZE7RDCUWOL4ZOE73YBOPUMQDX/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AYSXLXAPXD2T73T6JMHI5G2WP7KHAGMN/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/BEVTIH5UFX35CC7MVSYBGRM3D66ACFD5/
- https://security.gentoo.org/glsa/202006-15
Package edk2-tools updated to version 20200229-alt1 for branch sisyphus in task 251783.
Closed vulnerabilities
Modified: 2024-09-16
BDU:2020-04779
Уязвимость микропрограммного обеспечения BIOS процессоров Intel, связанная с ошибками управления привилегиями, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-14558
Insufficient control flow management in BIOS firmware for 8th, 9th, 10th Generation Intel(R) Core(TM), Intel(R) Celeron(R) Processor 4000 & 5000 Series Processors may allow an authenticated user to potentially enable denial of service via adjacent access.
- https://lists.debian.org/debian-lts-announce/2021/04/msg00032.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00356.html
- https://lists.debian.org/debian-lts-announce/2021/04/msg00032.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00356.html
Modified: 2024-11-21
CVE-2019-14559
Uncontrolled resource consumption in EDK II may allow an unauthenticated user to potentially enable denial of service via network access.
Modified: 2024-11-21
CVE-2019-14563
Integer truncation in EDK II may allow an authenticated user to potentially enable escalation of privilege via local access.
Modified: 2024-11-21
CVE-2019-14575
Logic issue in DxeImageVerificationHandler() for EDK II may allow an authenticated user to potentially enable escalation of privilege via local access.
Modified: 2024-11-21
CVE-2019-14586
Use after free vulnerability in EDK II may allow an authenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via adjacent access.
Modified: 2024-11-21
CVE-2019-14587
Logic issue EDK II may allow an unauthenticated user to potentially enable denial of service via adjacent access.
Closed vulnerabilities
Modified: 2024-09-16
BDU:2020-04779
Уязвимость микропрограммного обеспечения BIOS процессоров Intel, связанная с ошибками управления привилегиями, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-14558
Insufficient control flow management in BIOS firmware for 8th, 9th, 10th Generation Intel(R) Core(TM), Intel(R) Celeron(R) Processor 4000 & 5000 Series Processors may allow an authenticated user to potentially enable denial of service via adjacent access.
- https://lists.debian.org/debian-lts-announce/2021/04/msg00032.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00356.html
- https://lists.debian.org/debian-lts-announce/2021/04/msg00032.html
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00356.html
Modified: 2024-11-21
CVE-2019-14559
Uncontrolled resource consumption in EDK II may allow an unauthenticated user to potentially enable denial of service via network access.
Modified: 2024-11-21
CVE-2019-14563
Integer truncation in EDK II may allow an authenticated user to potentially enable escalation of privilege via local access.
Modified: 2024-11-21
CVE-2019-14575
Logic issue in DxeImageVerificationHandler() for EDK II may allow an authenticated user to potentially enable escalation of privilege via local access.
Modified: 2024-11-21
CVE-2019-14586
Use after free vulnerability in EDK II may allow an authenticated user to potentially enable escalation of privilege, information disclosure and/or denial of service via adjacent access.
Modified: 2024-11-21
CVE-2019-14587
Logic issue EDK II may allow an unauthenticated user to potentially enable denial of service via adjacent access.
Closed vulnerabilities
Modified: 2020-06-01
BDU:2020-01963
Уязвимость браузера Tor, связанная с неконтролируемым расходом ресурса, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-10592
Tor before 0.3.5.10, 0.4.x before 0.4.1.9, and 0.4.2.x before 0.4.2.7 allows remote attackers to cause a Denial of Service (CPU consumption), aka TROVE-2020-002.
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00045.html
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00052.html
- https://security.gentoo.org/glsa/202003-50
- https://trac.torproject.org/projects/tor/ticket/33120
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00045.html
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00052.html
- https://security.gentoo.org/glsa/202003-50
- https://trac.torproject.org/projects/tor/ticket/33120
Modified: 2024-11-21
CVE-2020-10593
Tor before 0.3.5.10, 0.4.x before 0.4.1.9, and 0.4.2.x before 0.4.2.7 allows remote attackers to cause a Denial of Service (memory leak), aka TROVE-2020-004. This occurs in circpad_setup_machine_on_circ because a circuit-padding machine can be negotiated twice on the same circuit.
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00045.html
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00052.html
- https://security.gentoo.org/glsa/202003-50
- https://trac.torproject.org/projects/tor/ticket/33619
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00045.html
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00052.html
- https://security.gentoo.org/glsa/202003-50
- https://trac.torproject.org/projects/tor/ticket/33619
Package LibreOffice-still updated to version 6.3.6.2-alt2 for branch sisyphus in task 251766.
Closed bugs
В программной группе LibreOffice Сalc отображается с той же иконкой, что и у калькулятора