ALT-BU-2020-4116-1
Branch sisyphus update bulletin.
Closed bugs
Репозиторий сборки выполнен странно
Package qutebrowser updated to version 1.14.0-alt1 for branch sisyphus in task 260583.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-11054
In qutebrowser versions less than 1.11.1, reloading a page with certificate errors shows a green URL. After a certificate error was overridden by the user, qutebrowser displays the URL as yellow (colors.statusbar.url.warn.fg). However, when the affected website was subsequently loaded again, the URL was mistakenly displayed as green (colors.statusbar.url.success_https). While the user already has seen a certificate error prompt at this point (or set content.ssl_strict to false, which is not recommended), this could still provide a false sense of security. This has been fixed in 1.11.1 and 1.12.0. All versions of qutebrowser are believed to be affected, though versions before v0.11.x couldn't be tested. Backported patches for older versions (greater than or equal to 1.4.0 and less than or equal to 1.10.2) are available, but no further releases are planned.
- https://bugs.kde.org/show_bug.cgi?id=420902
- https://github.com/qutebrowser/qutebrowser/commit/021ab572a319ca3db5907a33a59774f502b3b975
- https://github.com/qutebrowser/qutebrowser/commit/19f01bb42d02da539446a52a25bb0c1232b86327
- https://github.com/qutebrowser/qutebrowser/commit/1b7946ed14b386a24db050f2d6dba81ba6518755
- https://github.com/qutebrowser/qutebrowser/commit/2281a205c3e70ec20f35ec8fafecee0d5c4f3478
- https://github.com/qutebrowser/qutebrowser/commit/4020210b193f77cf1785b21717f6ef7c5de5f0f8
- https://github.com/qutebrowser/qutebrowser/commit/6821c236f9ae23adf21d46ce0d56768ac8d0c467
- https://github.com/qutebrowser/qutebrowser/commit/9bd1cf585fccdfe8318fff7af793730e74a04db3
- https://github.com/qutebrowser/qutebrowser/commit/a45ca9c788f648d10cccce2af41405bf25ee2948
- https://github.com/qutebrowser/qutebrowser/commit/d28ed758d077a5bf19ddac4da468f7224114df23
- https://github.com/qutebrowser/qutebrowser/commit/f5d801251aa5436aff44660c87d7013e29ac5864
- https://github.com/qutebrowser/qutebrowser/issues/5403
- https://github.com/qutebrowser/qutebrowser/security/advisories/GHSA-4rcq-jv2f-898j
- FEDORA-2020-fcd5fd47bd
- FEDORA-2020-f0812d6aad
- https://tracker.die-offenbachs.homelinux.org/eric/issue328
- https://bugs.kde.org/show_bug.cgi?id=420902
- https://tracker.die-offenbachs.homelinux.org/eric/issue328
- FEDORA-2020-f0812d6aad
- FEDORA-2020-fcd5fd47bd
- https://github.com/qutebrowser/qutebrowser/security/advisories/GHSA-4rcq-jv2f-898j
- https://github.com/qutebrowser/qutebrowser/issues/5403
- https://github.com/qutebrowser/qutebrowser/commit/f5d801251aa5436aff44660c87d7013e29ac5864
- https://github.com/qutebrowser/qutebrowser/commit/d28ed758d077a5bf19ddac4da468f7224114df23
- https://github.com/qutebrowser/qutebrowser/commit/a45ca9c788f648d10cccce2af41405bf25ee2948
- https://github.com/qutebrowser/qutebrowser/commit/9bd1cf585fccdfe8318fff7af793730e74a04db3
- https://github.com/qutebrowser/qutebrowser/commit/6821c236f9ae23adf21d46ce0d56768ac8d0c467
- https://github.com/qutebrowser/qutebrowser/commit/4020210b193f77cf1785b21717f6ef7c5de5f0f8
- https://github.com/qutebrowser/qutebrowser/commit/2281a205c3e70ec20f35ec8fafecee0d5c4f3478
- https://github.com/qutebrowser/qutebrowser/commit/1b7946ed14b386a24db050f2d6dba81ba6518755
- https://github.com/qutebrowser/qutebrowser/commit/19f01bb42d02da539446a52a25bb0c1232b86327
- https://github.com/qutebrowser/qutebrowser/commit/021ab572a319ca3db5907a33a59774f502b3b975
Modified: 2024-11-21
CVE-2021-41146
qutebrowser is an open source keyboard-focused browser with a minimal GUI. Starting with qutebrowser v1.7.0, the Windows installer for qutebrowser registers a `qutebrowserurl:` URL handler. With certain applications, opening a specially crafted `qutebrowserurl:...` URL can lead to execution of qutebrowser commands, which in turn allows arbitrary code execution via commands such as `:spawn` or `:debug-pyeval`. Only Windows installs where qutebrowser is registered as URL handler are affected. The issue has been fixed in qutebrowser v2.4.0. The fix also adds additional hardening for potential similar issues on Linux (by adding the new --untrusted-args flag to the .desktop file), though no such vulnerabilities are known.
- https://github.com/qutebrowser/qutebrowser/commit/8f46ba3f6dc7b18375f7aa63c48a1fe461190430
- https://github.com/qutebrowser/qutebrowser/commit/8f46ba3f6dc7b18375f7aa63c48a1fe461190430
- https://github.com/qutebrowser/qutebrowser/security/advisories/GHSA-vw27-fwjf-5qxm
- https://github.com/qutebrowser/qutebrowser/security/advisories/GHSA-vw27-fwjf-5qxm
Closed vulnerabilities
BDU:2018-00035
Уязвимость функции queue_push (queue/queuepush.c) пакета yodl, позволяющая нарушителю нарушить конфиденциальность, целостность и доступность данных
Modified: 2024-11-21
CVE-2016-10375
Yodl before 3.07.01 has a Buffer Over-read in the queue_push function in queue/queuepush.c.
- https://github.com/fbb-git/yodl/commit/fd85f8c94182558ff1480d06a236d6fb927979a3
- https://github.com/fbb-git/yodl/commit/fd85f8c94182558ff1480d06a236d6fb927979a3
- https://github.com/fbb-git/yodl/issues/1
- https://github.com/fbb-git/yodl/issues/1
- [debian-lts-announce] 20200430 [SECURITY] [DLA 2194-1] yodl security update
- [debian-lts-announce] 20200430 [SECURITY] [DLA 2194-1] yodl security update
Closed vulnerabilities
BDU:2016-00921
Уязвимость программного средства для монтирования образа диска FuseISO, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2016-00922
Уязвимость программного средства для монтирования образа диска FuseISO, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
Modified: 2024-11-21
CVE-2015-8836
Integer overflow in the isofs_real_read_zf function in isofs.c in FuseISO 20070708 might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a large ZF block size in an ISO file, leading to a heap-based buffer overflow.
- DSA-3551
- DSA-3551
- [oss-security] 20150206 older fuseiso stuff
- [oss-security] 20150206 older fuseiso stuff
- [oss-security] 20150223 Re: older fuseiso stuff
- [oss-security] 20150223 Re: older fuseiso stuff
- https://bugzilla.redhat.com/show_bug.cgi?id=861358
- https://bugzilla.redhat.com/show_bug.cgi?id=861358
- https://bugzilla.redhat.com/show_bug.cgi?id=863102
- https://bugzilla.redhat.com/show_bug.cgi?id=863102
Modified: 2024-11-21
CVE-2015-8837
Stack-based buffer overflow in the isofs_real_readdir function in isofs.c in FuseISO 20070708 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long pathname in an ISO file.
- DSA-3551
- DSA-3551
- [oss-security] 20150206 older fuseiso stuff
- [oss-security] 20150206 older fuseiso stuff
- [oss-security] 20150223 Re: older fuseiso stuff
- [oss-security] 20150223 Re: older fuseiso stuff
- https://bugzilla.redhat.com/show_bug.cgi?id=862211
- https://bugzilla.redhat.com/show_bug.cgi?id=862211
- https://bugzilla.redhat.com/show_bug.cgi?id=863091
- https://bugzilla.redhat.com/show_bug.cgi?id=863091
- GLSA-202007-20
- GLSA-202007-20
Closed vulnerabilities
Modified: 2024-11-21
CVE-2015-2063
Integer overflow in unace 1.2b allows remote attackers to cause a denial of service (crash) via a small file header in an ace archive, which triggers a buffer overflow.
Closed bugs
mercurial is broken
Closed vulnerabilities
BDU:2015-01947
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2024-11-21
CVE-2013-6410
nbd-server in Network Block Device (nbd) before 3.5 does not properly check IP addresses, which might allow remote attackers to bypass intended access restrictions via an IP address that has a partial match in the authfile configuration file.
- [nbd-general] 20131201 [Nbd] 3.5 released
- [nbd-general] 20131201 [Nbd] 3.5 released
- DSA-2806
- DSA-2806
- [oss-security] 20131129 Re: CVE request: incorrect parsing of access control file in nbd-server
- [oss-security] 20131129 Re: CVE request: incorrect parsing of access control file in nbd-server
- 64002
- 64002
- USN-2676-1
- USN-2676-1
Modified: 2024-11-21
CVE-2013-7441
The modern style negotiation in Network Block Device (nbd-server) 2.9.22 through 3.3 allows remote attackers to cause a denial of service (root process termination) by (1) closing the connection during negotiation or (2) specifying a name for a non-existent export.
- openSUSE-SU-2015:0994
- openSUSE-SU-2015:0994
- [Nbd] 20130128 NBD server terminates on SIGPIPE during negotiation
- [Nbd] 20130128 NBD server terminates on SIGPIPE during negotiation
- DSA-3271
- DSA-3271
- [oss-security] 20150519 CVE Request: nbd denial of service
- [oss-security] 20150519 CVE Request: nbd denial of service
- [oss-security] 20150521 Re: CVE Request: nbd denial of service
- [oss-security] 20150521 Re: CVE Request: nbd denial of service
- 74808
- 74808
- USN-2676-1
- USN-2676-1
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781547
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=781547
- https://github.com/yoe/nbd/commit/741495cb08503fd32a9d22648e63b64390c601f4
- https://github.com/yoe/nbd/commit/741495cb08503fd32a9d22648e63b64390c601f4
Modified: 2024-11-21
CVE-2015-0847
nbd-server.c in Network Block Device (nbd-server) before 3.11 does not properly handle signals, which allows remote attackers to cause a denial of service (deadlock) via unspecified vectors.
- openSUSE-SU-2015:0994
- openSUSE-SU-2015:0994
- [Nbd] 20150507 [PATCH] nbd-server: fix unsafe signal handling
- [Nbd] 20150507 [PATCH] nbd-server: fix unsafe signal handling
- http://sourceforge.net/projects/nbd/files/nbd/3.11/
- http://sourceforge.net/projects/nbd/files/nbd/3.11/
- DSA-3271
- DSA-3271
- [oss-security] 20150507 CVE-2015-0847 in nbd-server
- [oss-security] 20150507 CVE-2015-0847 in nbd-server
- USN-2676-1
- USN-2676-1
Package kernel-image-std-def updated to version 5.4.73-alt1 for branch sisyphus in task 260628.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-27784
A vulnerability was found in the Linux kernel, where accessing a deallocated instance in printer_ioctl() printer_ioctl() tries to access of a printer_dev instance. However, use-after-free arises because it had been freed by gprinter_free().
Closed bugs
Изменить зависимость с php7-mysqli на php7-mysqlnd-mysqli