ALT-BU-2020-4140-1
Branch sisyphus update bulletin.
Package installer-distro-cliff updated to version 8.2-alt7 for branch sisyphus in task 261526.
Closed bugs
s/e2k/%e2k/g
Closed vulnerabilities
BDU:2020-05020
Уязвимость системы управления базами данных MariaDB, компонента Server: FTS СУБД MySQL, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05076
Уязвимость компонента Server: Locking системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05078
Уязвимость компонента Server: FTS системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05084
Уязвимость компонента InnoDB системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-02469
Уязвимость компонента InnoDB системы управления базами данных Oracle MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03502
Уязвимость компонента mysql-wsrep СУБД MariaDB, связанная с ошибками обработки входных данных при выполнении синтаксического анализа кода, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-14765
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 5.6.49 and prior, 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows low privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H).
- [debian-lts-announce] 20210131 [SECURITY] [DLA 2538-1] mariadb-10.1 security update
- [debian-lts-announce] 20210131 [SECURITY] [DLA 2538-1] mariadb-10.1 security update
- FEDORA-2020-4f9ee82bc5
- FEDORA-2020-4f9ee82bc5
- FEDORA-2020-b995eb2973
- FEDORA-2020-b995eb2973
- FEDORA-2020-eee64a579c
- FEDORA-2020-eee64a579c
- FEDORA-2020-561eed63ef
- FEDORA-2020-561eed63ef
- FEDORA-2020-ac2d47d89a
- FEDORA-2020-ac2d47d89a
- FEDORA-2020-53df1c05be
- FEDORA-2020-53df1c05be
- GLSA-202105-27
- GLSA-202105-27
- https://security.netapp.com/advisory/ntap-20201023-0003/
- https://security.netapp.com/advisory/ntap-20201023-0003/
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
Modified: 2024-11-21
CVE-2020-14776
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
- FEDORA-2020-4f9ee82bc5
- FEDORA-2020-4f9ee82bc5
- FEDORA-2020-b995eb2973
- FEDORA-2020-b995eb2973
- FEDORA-2020-eee64a579c
- FEDORA-2020-eee64a579c
- FEDORA-2020-561eed63ef
- FEDORA-2020-561eed63ef
- FEDORA-2020-ac2d47d89a
- FEDORA-2020-ac2d47d89a
- FEDORA-2020-53df1c05be
- FEDORA-2020-53df1c05be
- GLSA-202105-27
- GLSA-202105-27
- https://security.netapp.com/advisory/ntap-20201023-0003/
- https://security.netapp.com/advisory/ntap-20201023-0003/
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
Modified: 2024-11-21
CVE-2020-14789
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: FTS). Supported versions that are affected are 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
- FEDORA-2020-4f9ee82bc5
- FEDORA-2020-4f9ee82bc5
- FEDORA-2020-b995eb2973
- FEDORA-2020-b995eb2973
- FEDORA-2020-eee64a579c
- FEDORA-2020-eee64a579c
- FEDORA-2020-561eed63ef
- FEDORA-2020-561eed63ef
- FEDORA-2020-ac2d47d89a
- FEDORA-2020-ac2d47d89a
- FEDORA-2020-53df1c05be
- FEDORA-2020-53df1c05be
- GLSA-202105-27
- GLSA-202105-27
- https://security.netapp.com/advisory/ntap-20201023-0003/
- https://security.netapp.com/advisory/ntap-20201023-0003/
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
Modified: 2024-11-21
CVE-2020-14812
Vulnerability in the MySQL Server product of Oracle MySQL (component: Server: Locking). Supported versions that are affected are 5.6.49 and prior, 5.7.31 and prior and 8.0.21 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
- [debian-lts-announce] 20210131 [SECURITY] [DLA 2538-1] mariadb-10.1 security update
- [debian-lts-announce] 20210131 [SECURITY] [DLA 2538-1] mariadb-10.1 security update
- FEDORA-2020-b995eb2973
- FEDORA-2020-b995eb2973
- FEDORA-2020-561eed63ef
- FEDORA-2020-561eed63ef
- FEDORA-2020-ac2d47d89a
- FEDORA-2020-ac2d47d89a
- GLSA-202105-27
- GLSA-202105-27
- https://security.netapp.com/advisory/ntap-20201023-0003/
- https://security.netapp.com/advisory/ntap-20201023-0003/
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
Modified: 2024-11-21
CVE-2020-15180
A flaw was found in the mysql-wsrep component of mariadb. Lack of input sanitization in `wsrep_sst_method` allows for command injection that can be exploited by a remote attacker to execute arbitrary commands on galera cluster nodes. This threatens the system's confidentiality, integrity, and availability. This flaw affects mariadb versions before 10.1.47, before 10.2.34, before 10.3.25, before 10.4.15 and before 10.5.6.
- https://bugzilla.redhat.com/show_bug.cgi?id=1894919
- https://bugzilla.redhat.com/show_bug.cgi?id=1894919
- [debian-lts-announce] 20201021 [SECURITY] [DLA 2409-1] mariadb-10.1 security update
- [debian-lts-announce] 20201021 [SECURITY] [DLA 2409-1] mariadb-10.1 security update
- GLSA-202011-14
- GLSA-202011-14
- DSA-4776
- DSA-4776
- https://www.percona.com/blog/2020/10/30/cve-2020-15180-affects-percona-xtradb-cluster/
- https://www.percona.com/blog/2020/10/30/cve-2020-15180-affects-percona-xtradb-cluster/
Modified: 2024-11-21
CVE-2021-2194
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.33 and prior and 8.0.23 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H).
- FEDORA-2021-01189f6361
- FEDORA-2021-01189f6361
- FEDORA-2021-b8b7829a83
- FEDORA-2021-b8b7829a83
- FEDORA-2021-5b6c69a73a
- FEDORA-2021-5b6c69a73a
- https://security.netapp.com/advisory/ntap-20210513-0002/
- https://security.netapp.com/advisory/ntap-20210513-0002/
- https://www.oracle.com/security-alerts/cpuapr2021.html
- https://www.oracle.com/security-alerts/cpuapr2021.html
Closed vulnerabilities
BDU:2018-00031
Уязвимость функции list_files (list.c) файлового архиватора Info-ZIP Unzip, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2018-00032
Уязвимость функции zi_short в (zipinfo.c) файлового архиватора Info-ZIP Unzip, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2018-01516
Уязвимость файла list.c архиватора Info-ZIP UnZip, позволяющая нарушителю выполнить произвольный код
BDU:2019-03340
Уязвимость файлового архиватора Info-ZIP Unzip, связанная с переполнением буфера на основе кучи, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2014-8139
Heap-based buffer overflow in the CRC32 verification in Info-ZIP UnZip 6.0 and earlier allows remote attackers to execute arbitrary code via a crafted zip file in the -t command argument to the unzip command.
- http://www.ocert.org/advisories/ocert-2014-011.html
- http://www.ocert.org/advisories/ocert-2014-011.html
- http://www.securitytracker.com/id/1031433
- http://www.securitytracker.com/id/1031433
- https://access.redhat.com/errata/RHSA-2015:0700
- https://access.redhat.com/errata/RHSA-2015:0700
- https://bugzilla.redhat.com/show_bug.cgi?id=1174844
- https://bugzilla.redhat.com/show_bug.cgi?id=1174844
Modified: 2024-11-21
CVE-2014-8140
Heap-based buffer overflow in the test_compr_eb function in Info-ZIP UnZip 6.0 and earlier allows remote attackers to execute arbitrary code via a crafted zip file in the -t command argument to the unzip command.
- http://www.ocert.org/advisories/ocert-2014-011.html
- http://www.ocert.org/advisories/ocert-2014-011.html
- http://www.securitytracker.com/id/1031433
- http://www.securitytracker.com/id/1031433
- https://access.redhat.com/errata/RHSA-2015:0700
- https://access.redhat.com/errata/RHSA-2015:0700
- https://bugzilla.redhat.com/show_bug.cgi?id=1174851
- https://bugzilla.redhat.com/show_bug.cgi?id=1174851
Modified: 2024-11-21
CVE-2014-8141
Heap-based buffer overflow in the getZip64Data function in Info-ZIP UnZip 6.0 and earlier allows remote attackers to execute arbitrary code via a crafted zip file in the -t command argument to the unzip command.
- http://www.ocert.org/advisories/ocert-2014-011.html
- http://www.ocert.org/advisories/ocert-2014-011.html
- http://www.securitytracker.com/id/1031433
- http://www.securitytracker.com/id/1031433
- https://access.redhat.com/errata/RHSA-2015:0700
- https://access.redhat.com/errata/RHSA-2015:0700
- https://bugzilla.redhat.com/show_bug.cgi?id=1174856
- https://bugzilla.redhat.com/show_bug.cgi?id=1174856
Modified: 2024-11-21
CVE-2014-9636
unzip 6.0 allows remote attackers to cause a denial of service (out-of-bounds read or write and crash) via an extra field with an uncompressed size smaller than the compressed field size in a zip archive that advertises STORED method compression.
- FEDORA-2015-1189
- FEDORA-2015-1189
- FEDORA-2015-1267
- FEDORA-2015-1267
- [oss-security] 20141222 Re: CVE Request: Info-ZIP unzip 6.0
- [oss-security] 20141222 Re: CVE Request: Info-ZIP unzip 6.0
- [oss-security] 20141102 unzip -t crasher
- [oss-security] 20141102 unzip -t crasher
- [oss-security] 20141103 Re: unzip -t crasher
- [oss-security] 20141103 Re: unzip -t crasher
- [oss-security] 20141222 CVE Request: Info-ZIP unzip 6.0
- [oss-security] 20141222 CVE Request: Info-ZIP unzip 6.0
- 62738
- 62738
- 62751
- 62751
- DSA-3152
- DSA-3152
- http://www.info-zip.org/phpBB3/viewtopic.php?f=7&t=450
- http://www.info-zip.org/phpBB3/viewtopic.php?f=7&t=450
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2015-2511959.html
- 71825
- 71825
- USN-2489-1
- USN-2489-1
- GLSA-201611-01
- GLSA-201611-01
Modified: 2024-11-21
CVE-2014-9913
Buffer overflow in the list_files function in list.c in Info-Zip UnZip 6.0 allows remote attackers to cause a denial of service (crash) via vectors related to the compression method.
- [oss-security] 20141103 unzip -l crasher
- [oss-security] 20141103 unzip -l crasher
- [oss-security] 20161205 CVE Request: Info-Zip zipinfo buffer overflow
- [oss-security] 20161205 CVE Request: Info-Zip zipinfo buffer overflow
- [oss-security] 20161205 CVE Request: Info-Zip zipinfo buffer overflow
- [oss-security] 20161205 CVE Request: Info-Zip zipinfo buffer overflow
- [oss-security] 20161205 Re: CVE Request: Info-Zip zipinfo buffer overflow
- [oss-security] 20161205 Re: CVE Request: Info-Zip zipinfo buffer overflow
- 95081
- 95081
- https://bugs.launchpad.net/ubuntu/+source/unzip/+bug/1643750
- https://bugs.launchpad.net/ubuntu/+source/unzip/+bug/1643750
Modified: 2024-11-21
CVE-2015-7696
Info-ZIP UnZip 6.0 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) or possibly execute arbitrary code via a crafted password-protected ZIP archive, possibly related to an Extra-Field size value.
- DSA-3386
- DSA-3386
- [oss-security] 20150907 Heap overflow and DoS in unzip 6.0
- [oss-security] 20150907 Heap overflow and DoS in unzip 6.0
- [oss-security] 20150915 Re: Heap overflow and DoS in unzip 6.0
- [oss-security] 20150915 Re: Heap overflow and DoS in unzip 6.0
- [oss-security] 20150921 Re: Heap overflow and DoS in unzip 6.0
- [oss-security] 20150921 Re: Heap overflow and DoS in unzip 6.0
- [oss-security] 20151011 Re: Heap overflow and DoS in unzip 6.0
- [oss-security] 20151011 Re: Heap overflow and DoS in unzip 6.0
- 76863
- 76863
- 1034027
- 1034027
- USN-2788-1
- USN-2788-1
- USN-2788-2
- USN-2788-2
Modified: 2024-11-21
CVE-2015-7697
Info-ZIP UnZip 6.0 allows remote attackers to cause a denial of service (infinite loop) via empty bzip2 data in a ZIP archive.
- http://sourceforge.net/p/infozip/patches/23/
- http://sourceforge.net/p/infozip/patches/23/
- DSA-3386
- DSA-3386
- [oss-security] 20150907 Heap overflow and DoS in unzip 6.0
- [oss-security] 20150907 Heap overflow and DoS in unzip 6.0
- [oss-security] 20150915 Re: Heap overflow and DoS in unzip 6.0
- [oss-security] 20150915 Re: Heap overflow and DoS in unzip 6.0
- [oss-security] 20151011 Re: Heap overflow and DoS in unzip 6.0
- [oss-security] 20151011 Re: Heap overflow and DoS in unzip 6.0
- 76863
- 76863
- 1034027
- 1034027
- USN-2788-1
- USN-2788-1
- USN-2788-2
- USN-2788-2
Modified: 2024-11-21
CVE-2016-9844
Buffer overflow in the zi_short function in zipinfo.c in Info-Zip UnZip 6.0 allows remote attackers to cause a denial of service (crash) via a large compression method value in the central directory file header.
- [oss-security] 20161205 CVE Request: Info-Zip zipinfo buffer overflow
- [oss-security] 20161205 CVE Request: Info-Zip zipinfo buffer overflow
- [oss-security] 20161205 CVE Request: Info-Zip zipinfo buffer overflow
- [oss-security] 20161205 CVE Request: Info-Zip zipinfo buffer overflow
- [oss-security] 20161205 Re: CVE Request: Info-Zip zipinfo buffer overflow
- [oss-security] 20161205 Re: CVE Request: Info-Zip zipinfo buffer overflow
- 94728
- 94728
- https://bugs.launchpad.net/ubuntu/+source/unzip/+bug/1643750
- https://bugs.launchpad.net/ubuntu/+source/unzip/+bug/1643750
Modified: 2024-11-21
CVE-2018-1000035
A heap-based buffer overflow exists in Info-Zip UnZip version <= 6.00 in the processing of password-protected archives that allows an attacker to perform a denial of service or to possibly achieve code execution.
- [debian-lts-announce] 20200128 [SECURITY] [DLA 2082-1] unzip security update
- [debian-lts-announce] 20200128 [SECURITY] [DLA 2082-1] unzip security update
- https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-infozip-unzip/index.html
- https://sec-consult.com/en/blog/advisories/multiple-vulnerabilities-in-infozip-unzip/index.html
- GLSA-202003-58
- GLSA-202003-58
Modified: 2024-11-21
CVE-2018-18384
Info-ZIP UnZip 6.0 has a buffer overflow in list.c, when a ZIP archive has a crafted relationship between the compressed-size value and the uncompressed-size value, because a buffer size is 10 and is supposed to be 12.
Closed bugs
add requires on emacs-base-X11