ALT-BU-2020-3844-1
Branch p8 update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-3327
A vulnerability in the ARJ archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.102.2 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a heap buffer overflow read. An attacker could exploit this vulnerability by sending a crafted ARJ file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.
- https://blog.clamav.net/2020/05/clamav-01023-security-patch-released.html
- https://blog.clamav.net/2020/05/clamav-01023-security-patch-released.html
- [debian-lts-announce] 20200519 [SECURITY] [DLA 2215-1] clamav security update
- [debian-lts-announce] 20200519 [SECURITY] [DLA 2215-1] clamav security update
- [debian-lts-announce] 20200806 [SECURITY] [DLA 2314-1] clamav security update
- [debian-lts-announce] 20200806 [SECURITY] [DLA 2314-1] clamav security update
- FEDORA-2020-b0acd7b66e
- FEDORA-2020-b0acd7b66e
- FEDORA-2020-6584a641ae
- FEDORA-2020-6584a641ae
- FEDORA-2020-bca44487a1
- FEDORA-2020-bca44487a1
- FEDORA-2020-dd0c20d985
- FEDORA-2020-dd0c20d985
- FEDORA-2020-d98d2cbae1
- FEDORA-2020-d98d2cbae1
- GLSA-202007-23
- GLSA-202007-23
- USN-4370-1
- USN-4370-1
- USN-4370-2
- USN-4370-2
- USN-4435-1
- USN-4435-1
- USN-4435-2
- USN-4435-2
Modified: 2024-11-21
CVE-2020-3341
A vulnerability in the PDF archive parsing module in Clam AntiVirus (ClamAV) Software versions 0.101 - 0.102.2 could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to a stack buffer overflow read. An attacker could exploit this vulnerability by sending a crafted PDF file to an affected device. An exploit could allow the attacker to cause the ClamAV scanning process crash, resulting in a denial of service condition.
- https://blog.clamav.net/2020/05/clamav-01023-security-patch-released.html
- https://blog.clamav.net/2020/05/clamav-01023-security-patch-released.html
- [debian-lts-announce] 20200519 [SECURITY] [DLA 2215-1] clamav security update
- [debian-lts-announce] 20200519 [SECURITY] [DLA 2215-1] clamav security update
- FEDORA-2020-b0acd7b66e
- FEDORA-2020-b0acd7b66e
- FEDORA-2020-bca44487a1
- FEDORA-2020-bca44487a1
- FEDORA-2020-d98d2cbae1
- FEDORA-2020-d98d2cbae1
- USN-4370-1
- USN-4370-1
- USN-4370-2
- USN-4370-2
Closed bugs
Изменить URL на https://github.com/c-icap
Package postgresql11 updated to version 11.8-alt0.M80P.1 for branch p8 in task 252074.
Closed vulnerabilities
BDU:2023-00612
Уязвимость установщика Windows installer системы управления базами данных PostgreSQL, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код
Modified: 2024-11-21
CVE-2020-10733
The Windows installer for PostgreSQL 9.5 - 12 invokes system-provided executables that do not have fully-qualified paths. Executables in the directory where the installer loads or the current working directory take precedence over the intended executables. An attacker having permission to add files into one of those directories can use this to execute arbitrary code with the installer's administrative rights.
Package postgresql12 updated to version 12.3-alt0.M80P.1 for branch p8 in task 252074.
Closed vulnerabilities
BDU:2023-00612
Уязвимость установщика Windows installer системы управления базами данных PostgreSQL, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код
Modified: 2024-11-21
CVE-2020-10733
The Windows installer for PostgreSQL 9.5 - 12 invokes system-provided executables that do not have fully-qualified paths. Executables in the directory where the installer loads or the current working directory take precedence over the intended executables. An attacker having permission to add files into one of those directories can use this to execute arbitrary code with the installer's administrative rights.
Package freeswitch updated to version 1.10.2-alt1 for branch p8 in task 252357.
Closed vulnerabilities
BDU:2021-05742
Уязвимость реализации файла конфигурации event_socket.conf.xml программно-определяемого телекоммуникационного стека FreeSWITCH и приложения для унифицированного управления видео Victor, позволяющая нарушителю получить полный контроль над системой
Modified: 2024-11-21
CVE-2019-19492
FreeSWITCH 1.6.10 through 1.10.1 has a default password in event_socket.conf.xml.