ALT-BU-2020-4066-1
Branch p9 update bulletin.
Closed vulnerabilities
BDU:2019-00693
Уязвимость демона avahi-daemon системы обнаружения сервисов в локальной сети Avahi, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2017-6519
avahi-daemon in Avahi through 0.6.32 and 0.7 inadvertently responds to IPv6 unicast queries with source addresses that are not on-link, which allows remote attackers to cause a denial of service (traffic amplification) and may cause information leakage by obtaining potentially sensitive information from the responding device via port-5353 UDP packets. NOTE: this may overlap CVE-2015-2809.
- https://bugzilla.redhat.com/show_bug.cgi?id=1426712
- https://bugzilla.redhat.com/show_bug.cgi?id=1426712
- https://github.com/lathiat/avahi/issues/203
- https://github.com/lathiat/avahi/issues/203
- https://github.com/lathiat/avahi/issues/203#issuecomment-449536790
- https://github.com/lathiat/avahi/issues/203#issuecomment-449536790
- [bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image
- [bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image
- USN-3876-1
- USN-3876-1
- USN-3876-2
- USN-3876-2
- https://www.secfu.net/advisories
- https://www.secfu.net/advisories
No data currently available.
Closed bugs
После обновления перестал работать mdns
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-15173
In ACCEL-PPP (an implementation of PPTP/PPPoE/L2TP/SSTP), there is a buffer overflow when receiving an l2tp control packet ith an AVP which type is a string and no hidden flags, length set to less than 6. If your application is used in open networks or there are untrusted nodes in the network it is highly recommended to apply the patch. The problem was patched with commit 2324bcd5ba12cf28f47357a8f03cd41b7c04c52b As a workaround changes of commit 2324bcd5ba12cf28f47357a8f03cd41b7c04c52b can be applied to older versions.
- https://github.com/accel-ppp/accel-ppp/commit/2324bcd5ba12cf28f47357a8f03cd41b7c04c52b
- https://github.com/accel-ppp/accel-ppp/commit/2324bcd5ba12cf28f47357a8f03cd41b7c04c52b
- https://github.com/accel-ppp/accel-ppp/security/advisories/GHSA-rr68-fchr-69vf
- https://github.com/accel-ppp/accel-ppp/security/advisories/GHSA-rr68-fchr-69vf
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-15953
LibEtPan through 1.9.4, as used in MailCore 2 through 0.6.3 and other products, has a STARTTLS buffering issue that affects IMAP, SMTP, and POP3. When a server sends a "begin TLS" response, the client reads additional data (e.g., from a meddler-in-the-middle attacker) and evaluates it in a TLS context, aka "response injection."
- openSUSE-SU-2020:1454
- openSUSE-SU-2020:1454
- openSUSE-SU-2020:1505
- openSUSE-SU-2020:1505
- https://github.com/dinhvh/libetpan/issues/386
- https://github.com/dinhvh/libetpan/issues/386
- [debian-lts-announce] 20200816 [SECURITY] [DLA 2329-1] libetpan security update
- [debian-lts-announce] 20200816 [SECURITY] [DLA 2329-1] libetpan security update
- FEDORA-2020-44e52ef729
- FEDORA-2020-44e52ef729
- FEDORA-2020-13ae5f7221
- FEDORA-2020-13ae5f7221
- GLSA-202007-55
- GLSA-202007-55