ALT-BU-2020-4061-1
Branch p9 update bulletin.
Package claws-mail updated to version 3.17.6-alt1 for branch p9 in task 258835.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-15917
common/session.c in Claws Mail before 3.17.6 has a protocol violation because suffix data after STARTTLS is mishandled.
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00090.html
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00060.html
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00051.html
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00013.html
- https://git.claws-mail.org/?p=claws.git%3Ba=blob%3Bf=RELEASE_NOTES
- https://git.claws-mail.org/?p=claws.git%3Ba=commit%3Bh=fcc25329049b6f9bd8d890f1197ed61eb12e14d5
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6YVQB7NRBHO67Q74RS7RZCMW4ENRVBB4/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G7UX65342HRVDQML4G4GEVEUB764EUM5/
- https://security.gentoo.org/glsa/202007-56
- http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00090.html
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00002.html
- http://lists.opensuse.org/opensuse-security-announce/2020-08/msg00060.html
- http://lists.opensuse.org/opensuse-security-announce/2020-09/msg00051.html
- http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00013.html
- https://git.claws-mail.org/?p=claws.git%3Ba=blob%3Bf=RELEASE_NOTES
- https://git.claws-mail.org/?p=claws.git%3Ba=commit%3Bh=fcc25329049b6f9bd8d890f1197ed61eb12e14d5
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6YVQB7NRBHO67Q74RS7RZCMW4ENRVBB4/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G7UX65342HRVDQML4G4GEVEUB764EUM5/
- https://security.gentoo.org/glsa/202007-56
Package xapian-core updated to version 1.4.15-alt1 for branch p9 in task 258827.
Closed vulnerabilities
Modified: 2021-03-23
BDU:2019-00444
Уязвимость функции Xapian::MSet::snippet() библиотеки для полнотекстового поиска Xapian (xapian-core), позволяющая нарушителю осуществить межсайтовое выполнение сценариев
Modified: 2024-11-21
CVE-2018-0499
A cross-site scripting vulnerability in queryparser/termgenerator_internal.cc in Xapian xapian-core before 1.4.6 exists due to incomplete HTML escaping by Xapian::MSet::snippet().
- https://lists.xapian.org/pipermail/xapian-discuss/2018-July/009652.html
- https://trac.xapian.org/wiki/SecurityFixes/2018-07-02
- https://usn.ubuntu.com/3709-1/
- https://lists.xapian.org/pipermail/xapian-discuss/2018-July/009652.html
- https://trac.xapian.org/wiki/SecurityFixes/2018-07-02
- https://usn.ubuntu.com/3709-1/
Package libextractor updated to version 1.10-alt1 for branch p9 in task 258833.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-15531
GNU Libextractor through 1.9 has a heap-based buffer over-read in the function EXTRACTOR_dvi_extract_method in plugins/dvi_extractor.c.
- https://bugs.gnunet.org/view.php?id=5846
- https://lists.debian.org/debian-lts-announce/2019/08/msg00038.html
- https://lists.debian.org/debian-lts-announce/2021/12/msg00016.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DV5YBIS2UUNUUKQOEKDWUKEEWJIKWFMZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GRQUHTSNOCKGRKPRXPUJ6FGTVZ2K5POL/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MUJWNWDGGXQLTNQNELKERJ7DLW7E22BK/
- https://bugs.gnunet.org/view.php?id=5846
- https://lists.debian.org/debian-lts-announce/2019/08/msg00038.html
- https://lists.debian.org/debian-lts-announce/2021/12/msg00016.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DV5YBIS2UUNUUKQOEKDWUKEEWJIKWFMZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GRQUHTSNOCKGRKPRXPUJ6FGTVZ2K5POL/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MUJWNWDGGXQLTNQNELKERJ7DLW7E22BK/
Closed vulnerabilities
Modified: 2025-04-17
CVE-2022-44940
Patchelf v0.9 was discovered to contain an out-of-bounds read via the function modifyRPath at src/patchelf.cc.
Package subversion updated to version 1.14.0-alt1 for branch p9 in task 258831.
Closed vulnerabilities
Modified: 2021-03-23
BDU:2016-01127
Уязвимость централизованной системы управления версиями Subversion, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
Modified: 2021-03-23
BDU:2017-02070
Уязвимость служб svn:externals и svn:sync-from-url централизованной системы управления версиями Subversion, позволяющая нарушителю выполнить произвольную shell-команду
Modified: 2024-11-28
BDU:2019-02929
Уязвимость серверного процесса svnserve централизованной системы управления версиями Subversion, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-28
BDU:2019-02960
Уязвимость серверного процесса svnserve централизованной системы управления версиями Subversion, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-04-12
CVE-2015-5259
Integer overflow in the read_string function in libsvn_ra_svn/marshal.c in Apache Subversion 1.9.x before 1.9.3 allows remote attackers to execute arbitrary code via an svn:// protocol string, which triggers a heap-based buffer overflow and an out-of-bounds read.
- http://subversion.apache.org/security/CVE-2015-5259-advisory.txt
- http://www.securityfocus.com/bid/82300
- http://www.securitytracker.com/id/1034469
- https://security.gentoo.org/glsa/201610-05
- http://subversion.apache.org/security/CVE-2015-5259-advisory.txt
- http://www.securityfocus.com/bid/82300
- http://www.securitytracker.com/id/1034469
- https://security.gentoo.org/glsa/201610-05
Modified: 2025-04-12
CVE-2015-5343
Integer overflow in util.c in mod_dav_svn in Apache Subversion 1.7.x, 1.8.x before 1.8.15, and 1.9.x before 1.9.3 allows remote authenticated users to cause a denial of service (subversion server crash or memory consumption) and possibly execute arbitrary code via a skel-encoded request body, which triggers an out-of-bounds read and heap-based buffer overflow.
- http://subversion.apache.org/security/CVE-2015-5343-advisory.txt
- http://www.debian.org/security/2015/dsa-3424
- http://www.securitytracker.com/id/1034470
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.405261
- http://subversion.apache.org/security/CVE-2015-5343-advisory.txt
- http://www.debian.org/security/2015/dsa-3424
- http://www.securitytracker.com/id/1034470
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.405261
Modified: 2025-04-12
CVE-2016-2167
The canonicalize_username function in svnserve/cyrus_auth.c in Apache Subversion before 1.8.16 and 1.9.x before 1.9.4, when Cyrus SASL authentication is used, allows remote attackers to authenticate and bypass intended access restrictions via a realm string that is a prefix of an expected repository realm string.
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184545.html
- http://lists.opensuse.org/opensuse-updates/2016-05/msg00043.html
- http://lists.opensuse.org/opensuse-updates/2016-05/msg00044.html
- http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgJet+7_MAhomFVOXPgLtewcUw9w=k9zdPCkq5tvPxVMA%40mail.gmail.com%3E
- http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgfn1iKueW51EpmXzXi_URNfGNofZSgOyW1_jnSeNm5DQ%40mail.gmail.com%3E
- http://subversion.apache.org/security/CVE-2016-2167-advisory.txt
- http://www.debian.org/security/2016/dsa-3561
- http://www.securityfocus.com/bid/89417
- http://www.securitytracker.com/id/1035706
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.417496
- https://security.gentoo.org/glsa/201610-05
- https://www.oracle.com/security-alerts/cpuoct2020.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184545.html
- http://lists.opensuse.org/opensuse-updates/2016-05/msg00043.html
- http://lists.opensuse.org/opensuse-updates/2016-05/msg00044.html
- http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgJet+7_MAhomFVOXPgLtewcUw9w=k9zdPCkq5tvPxVMA%40mail.gmail.com%3E
- http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgfn1iKueW51EpmXzXi_URNfGNofZSgOyW1_jnSeNm5DQ%40mail.gmail.com%3E
- http://subversion.apache.org/security/CVE-2016-2167-advisory.txt
- http://www.debian.org/security/2016/dsa-3561
- http://www.securityfocus.com/bid/89417
- http://www.securitytracker.com/id/1035706
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.417496
- https://security.gentoo.org/glsa/201610-05
- https://www.oracle.com/security-alerts/cpuoct2020.html
Modified: 2025-04-12
CVE-2016-2168
The req_check_access function in the mod_authz_svn module in the httpd server in Apache Subversion before 1.8.16 and 1.9.x before 1.9.4 allows remote authenticated users to cause a denial of service (NULL pointer dereference and crash) via a crafted header in a (1) MOVE or (2) COPY request, involving an authorization check.
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184545.html
- http://lists.opensuse.org/opensuse-updates/2016-05/msg00043.html
- http://lists.opensuse.org/opensuse-updates/2016-05/msg00044.html
- http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgJet+7_MAhomFVOXPgLtewcUw9w=k9zdPCkq5tvPxVMA%40mail.gmail.com%3E
- http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgfn1iKueW51EpmXzXi_URNfGNofZSgOyW1_jnSeNm5DQ%40mail.gmail.com%3E
- http://subversion.apache.org/security/CVE-2016-2168-advisory.txt
- http://www.debian.org/security/2016/dsa-3561
- http://www.securityfocus.com/bid/89320
- http://www.securitytracker.com/id/1035707
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.417496
- https://security.gentoo.org/glsa/201610-05
- https://www.oracle.com/security-alerts/cpuoct2020.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184545.html
- http://lists.opensuse.org/opensuse-updates/2016-05/msg00043.html
- http://lists.opensuse.org/opensuse-updates/2016-05/msg00044.html
- http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgJet+7_MAhomFVOXPgLtewcUw9w=k9zdPCkq5tvPxVMA%40mail.gmail.com%3E
- http://mail-archives.apache.org/mod_mbox/subversion-announce/201604.mbox/%3CCAP_GPNgfn1iKueW51EpmXzXi_URNfGNofZSgOyW1_jnSeNm5DQ%40mail.gmail.com%3E
- http://subversion.apache.org/security/CVE-2016-2168-advisory.txt
- http://www.debian.org/security/2016/dsa-3561
- http://www.securityfocus.com/bid/89320
- http://www.securitytracker.com/id/1035707
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2016&m=slackware-security.417496
- https://security.gentoo.org/glsa/201610-05
- https://www.oracle.com/security-alerts/cpuoct2020.html
Modified: 2025-04-20
CVE-2016-8734
Apache Subversion's mod_dontdothat module and HTTP clients 1.4.0 through 1.8.16, and 1.9.0 through 1.9.4 are vulnerable to a denial-of-service attack caused by exponential XML entity expansion. The attack can cause the targeted process to consume an excessive amount of CPU resources or memory.
- http://www.debian.org/security/2017/dsa-3932
- http://www.securityfocus.com/bid/94588
- http://www.securitytracker.com/id/1037361
- https://lists.apache.org/thread.html/7798f5cda1b2a3c70db4be77694b12dec8fcc1a441b00009d44f0e09%40%3Cannounce.apache.org%3E
- https://subversion.apache.org/security/CVE-2016-8734-advisory.txt
- https://www.oracle.com/security-alerts/cpuoct2020.html
- http://www.debian.org/security/2017/dsa-3932
- http://www.securityfocus.com/bid/94588
- http://www.securitytracker.com/id/1037361
- https://lists.apache.org/thread.html/7798f5cda1b2a3c70db4be77694b12dec8fcc1a441b00009d44f0e09%40%3Cannounce.apache.org%3E
- https://subversion.apache.org/security/CVE-2016-8734-advisory.txt
- https://www.oracle.com/security-alerts/cpuoct2020.html
Modified: 2025-04-20
CVE-2017-9800
A maliciously constructed svn+ssh:// URL would cause Subversion clients before 1.8.19, 1.9.x before 1.9.7, and 1.10.0.x through 1.10.0-alpha3 to run an arbitrary shell command. Such a URL could be generated by a malicious server, by a malicious user committing to a honest server (to attack another user of that server's repositories), or by a proxy server. The vulnerability affects all clients, including those that use file://, http://, and plain (untunneled) svn://.
- http://packetstormsecurity.com/files/143722/Apache-Subversion-Arbitrary-Code-Execution.html
- http://www.debian.org/security/2017/dsa-3932
- http://www.securityfocus.com/archive/1/540999/100/0/threaded
- http://www.securityfocus.com/bid/100259
- http://www.securitytracker.com/id/1039127
- https://access.redhat.com/errata/RHSA-2017:2480
- https://confluence.atlassian.com/sourcetreekb/sourcetree-security-advisory-2017-08-11-933099891.html
- https://lists.apache.org/thread.html/cb607dc2f13bab9769147759ddccb14a4f9d8e5cdcad5e99c0d03b63%40%3Cannounce.apache.org%3E
- https://lists.apache.org/thread.html/d8cf53affd700dfce90bad4968fb8b1dfb69cf7c443052c70398ff76%40%3Ccommits.subversion.apache.org%3E
- https://security.gentoo.org/glsa/201709-09
- https://subversion.apache.org/security/CVE-2017-9800-advisory.txt
- https://support.apple.com/HT208103
- https://www.oracle.com/security-alerts/cpuoct2020.html
- http://packetstormsecurity.com/files/143722/Apache-Subversion-Arbitrary-Code-Execution.html
- http://www.debian.org/security/2017/dsa-3932
- http://www.securityfocus.com/archive/1/540999/100/0/threaded
- http://www.securityfocus.com/bid/100259
- http://www.securitytracker.com/id/1039127
- https://access.redhat.com/errata/RHSA-2017:2480
- https://confluence.atlassian.com/sourcetreekb/sourcetree-security-advisory-2017-08-11-933099891.html
- https://lists.apache.org/thread.html/cb607dc2f13bab9769147759ddccb14a4f9d8e5cdcad5e99c0d03b63%40%3Cannounce.apache.org%3E
- https://lists.apache.org/thread.html/d8cf53affd700dfce90bad4968fb8b1dfb69cf7c443052c70398ff76%40%3Ccommits.subversion.apache.org%3E
- https://security.gentoo.org/glsa/201709-09
- https://subversion.apache.org/security/CVE-2017-9800-advisory.txt
- https://support.apple.com/HT208103
- https://www.oracle.com/security-alerts/cpuoct2020.html
Modified: 2024-11-21
CVE-2018-11782
In Apache Subversion versions up to and including 1.9.10, 1.10.4, 1.12.0, Subversion's svnserve server process may exit when a well-formed read-only request produces a particular answer. This can lead to disruption for users of the server.
Modified: 2024-11-21
CVE-2019-0203
In Apache Subversion versions up to and including 1.9.10, 1.10.4, 1.12.0, Subversion's svnserve server process may exit when a client sends certain sequences of protocol commands. This can lead to disruption for users of the server.
Closed bugs
Обновить subversion