ALT-BU-2020-3838-1
Branch p9 update bulletin.
Package xfce4-whiskermenu-plugin updated to version 2.3.5-alt2 for branch p9 in task 252279.
Closed bugs
Для настроек Меню Whisker требуется пакет menulibre (не установлен по умолчанию)
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-3327
A vulnerability in the ARJ archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.102.2 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a heap buffer overflow read. An attacker could exploit this vulnerability by sending a crafted ARJ file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.
- https://blog.clamav.net/2020/05/clamav-01023-security-patch-released.html
- https://blog.clamav.net/2020/05/clamav-01023-security-patch-released.html
- [debian-lts-announce] 20200519 [SECURITY] [DLA 2215-1] clamav security update
- [debian-lts-announce] 20200519 [SECURITY] [DLA 2215-1] clamav security update
- [debian-lts-announce] 20200806 [SECURITY] [DLA 2314-1] clamav security update
- [debian-lts-announce] 20200806 [SECURITY] [DLA 2314-1] clamav security update
- FEDORA-2020-b0acd7b66e
- FEDORA-2020-b0acd7b66e
- FEDORA-2020-6584a641ae
- FEDORA-2020-6584a641ae
- FEDORA-2020-bca44487a1
- FEDORA-2020-bca44487a1
- FEDORA-2020-dd0c20d985
- FEDORA-2020-dd0c20d985
- FEDORA-2020-d98d2cbae1
- FEDORA-2020-d98d2cbae1
- GLSA-202007-23
- GLSA-202007-23
- USN-4370-1
- USN-4370-1
- USN-4370-2
- USN-4370-2
- USN-4435-1
- USN-4435-1
- USN-4435-2
- USN-4435-2
Modified: 2024-11-21
CVE-2020-3341
A vulnerability in the PDF archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.101 - 0.102.2 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a stack buffer overflow read. An attacker could exploit this vulnerability by sending a crafted PDF file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.
- https://blog.clamav.net/2020/05/clamav-01023-security-patch-released.html
- https://blog.clamav.net/2020/05/clamav-01023-security-patch-released.html
- [debian-lts-announce] 20200519 [SECURITY] [DLA 2215-1] clamav security update
- [debian-lts-announce] 20200519 [SECURITY] [DLA 2215-1] clamav security update
- FEDORA-2020-b0acd7b66e
- FEDORA-2020-b0acd7b66e
- FEDORA-2020-bca44487a1
- FEDORA-2020-bca44487a1
- FEDORA-2020-d98d2cbae1
- FEDORA-2020-d98d2cbae1
- USN-4370-1
- USN-4370-1
- USN-4370-2
- USN-4370-2
Closed vulnerabilities
BDU:2020-04388
Уязвимость диссектора BACapp анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю выполнить произвольный код
BDU:2022-00277
Уязвимость программы для анализа трафика wireshark, связанная с неконтролируемой рекурсией, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-11647
In Wireshark 3.2.0 to 3.2.2, 3.0.0 to 3.0.9, and 2.6.0 to 2.6.15, the BACapp dissector could crash. This was addressed in epan/dissectors/packet-bacapp.c by limiting the amount of recursion.
- openSUSE-SU-2020:1188
- openSUSE-SU-2020:1199
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16474
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6f56fc9496db158218243ea87e3660c874a0bab0
- [debian-lts-announce] 20210206 [SECURITY] [DLA 2547-1] wireshark security update
- GLSA-202007-13
- https://www.wireshark.org/security/wnpa-sec-2020-07.html
- openSUSE-SU-2020:1188
- https://www.wireshark.org/security/wnpa-sec-2020-07.html
- GLSA-202007-13
- [debian-lts-announce] 20210206 [SECURITY] [DLA 2547-1] wireshark security update
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=6f56fc9496db158218243ea87e3660c874a0bab0
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16474
- openSUSE-SU-2020:1199
Modified: 2024-11-21
CVE-2020-13164
In Wireshark 3.2.0 to 3.2.3, 3.0.0 to 3.0.10, and 2.6.0 to 2.6.16, the NFS dissector could crash. This was addressed in epan/dissectors/packet-nfs.c by preventing excessive recursion, such as for a cycle in the directory graph on a filesystem.
- openSUSE-SU-2020:1188
- openSUSE-SU-2020:1199
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16476
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=e6e98eab8e5e0bbc982cfdc808f2469d7cab6c5a
- [debian-lts-announce] 20210206 [SECURITY] [DLA 2547-1] wireshark security update
- FEDORA-2020-4f5588cf97
- FEDORA-2020-ca3d3f15f0
- GLSA-202007-13
- https://www.wireshark.org/security/wnpa-sec-2020-08.html
- openSUSE-SU-2020:1188
- https://www.wireshark.org/security/wnpa-sec-2020-08.html
- GLSA-202007-13
- FEDORA-2020-ca3d3f15f0
- FEDORA-2020-4f5588cf97
- [debian-lts-announce] 20210206 [SECURITY] [DLA 2547-1] wireshark security update
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=e6e98eab8e5e0bbc982cfdc808f2469d7cab6c5a
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=16476
- openSUSE-SU-2020:1199