ALT-BU-2021-4005-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-21404
Syncthing is a continuous file synchronization program. In Syncthing before version 1.15.0, the relay server `strelaysrv` can be caused to crash and exit by sending a relay message with a negative length field. Similarly, Syncthing itself can crash for the same reason if given a malformed message from a malicious relay server when attempting to join the relay. Relay joins are essentially random (from a subset of low latency relays) and Syncthing will by default restart when crashing, at which point it's likely to pick another non-malicious relay. This flaw is fixed in version 1.15.0.
- https://github.com/syncthing/syncthing/commit/fb4fdaf4c0a79c22cad000c42ac1394e3ccb6a97
- https://github.com/syncthing/syncthing/releases/tag/v1.15.0
- https://github.com/syncthing/syncthing/security/advisories/GHSA-x462-89pf-6r5h
- https://pkg.go.dev/github.com/syncthing/syncthing
- https://github.com/syncthing/syncthing/commit/fb4fdaf4c0a79c22cad000c42ac1394e3ccb6a97
- https://github.com/syncthing/syncthing/releases/tag/v1.15.0
- https://github.com/syncthing/syncthing/security/advisories/GHSA-x462-89pf-6r5h
- https://pkg.go.dev/github.com/syncthing/syncthing
Closed bugs
Прошу собрать версию 6.2.4
Closed vulnerabilities
Modified: 2025-04-11
CVE-2011-3354
The CtcpParser::packedReply method in core/ctcpparser.cpp in Quassel before 0.7.3 allows remote attackers to cause a denial of service (crash) via a crafted Client-To-Client Protocol (CTCP) request, as demonstrated in the wild in September 2011.
- http://bugs.quassel-irc.org/projects/quassel-irc/repository/revisions/da215fcb9cd3096a3e223c87577d5d4ab8f8518b/diff/src/core/ctcpparser.cpp
- http://osvdb.org/75351
- http://secunia.com/advisories/45970
- http://www.openwall.com/lists/oss-security/2011/09/08/7
- http://www.openwall.com/lists/oss-security/2011/09/09/7
- http://www.securityfocus.com/bid/49526
- http://www.ubuntu.com/usn/USN-1200-1
- https://bugs.gentoo.org/show_bug.cgi?id=382313
- https://exchange.xforce.ibmcloud.com/vulnerabilities/69682
- http://bugs.quassel-irc.org/projects/quassel-irc/repository/revisions/da215fcb9cd3096a3e223c87577d5d4ab8f8518b/diff/src/core/ctcpparser.cpp
- http://osvdb.org/75351
- http://secunia.com/advisories/45970
- http://www.openwall.com/lists/oss-security/2011/09/08/7
- http://www.openwall.com/lists/oss-security/2011/09/09/7
- http://www.securityfocus.com/bid/49526
- http://www.ubuntu.com/usn/USN-1200-1
- https://bugs.gentoo.org/show_bug.cgi?id=382313
- https://exchange.xforce.ibmcloud.com/vulnerabilities/69682
Modified: 2025-04-12
CVE-2015-2778
Quassel before 0.12-rc1 uses an incorrect data-type size when splitting a message, which allows remote attackers to cause a denial of service (crash) via a long CTCP query containing only multibyte characters.
- http://lists.opensuse.org/opensuse-updates/2015-04/msg00018.html
- http://www.openwall.com/lists/oss-security/2015/03/20/12
- http://www.openwall.com/lists/oss-security/2015/03/27/11
- http://www.openwall.com/lists/oss-security/2015/03/28/3
- http://www.securityfocus.com/bid/73305
- https://github.com/quassel/quassel/commit/b5e38970ffd55e2dd9f706ce75af9a8d7730b1b8
- http://lists.opensuse.org/opensuse-updates/2015-04/msg00018.html
- http://www.openwall.com/lists/oss-security/2015/03/20/12
- http://www.openwall.com/lists/oss-security/2015/03/27/11
- http://www.openwall.com/lists/oss-security/2015/03/28/3
- http://www.securityfocus.com/bid/73305
- https://github.com/quassel/quassel/commit/b5e38970ffd55e2dd9f706ce75af9a8d7730b1b8
Modified: 2025-04-12
CVE-2015-2779
Stack consumption vulnerability in the message splitting functionality in Quassel before 0.12-rc1 allows remote attackers to cause a denial of service (uncontrolled recursion) via a crafted massage.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163054.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158666.html
- http://lists.opensuse.org/opensuse-updates/2015-04/msg00018.html
- http://www.openwall.com/lists/oss-security/2015/03/20/12
- http://www.openwall.com/lists/oss-security/2015/03/27/11
- http://www.openwall.com/lists/oss-security/2015/03/28/3
- http://www.securityfocus.com/bid/74048
- https://github.com/quassel/quassel/commit/b5e38970ffd55e2dd9f706ce75af9a8d7730b1b8
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163054.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-May/158666.html
- http://lists.opensuse.org/opensuse-updates/2015-04/msg00018.html
- http://www.openwall.com/lists/oss-security/2015/03/20/12
- http://www.openwall.com/lists/oss-security/2015/03/27/11
- http://www.openwall.com/lists/oss-security/2015/03/28/3
- http://www.securityfocus.com/bid/74048
- https://github.com/quassel/quassel/commit/b5e38970ffd55e2dd9f706ce75af9a8d7730b1b8
Modified: 2025-04-12
CVE-2015-3427
Quassel before 0.12.2 does not properly re-initialize the database session when the PostgreSQL database is restarted, which allows remote attackers to conduct SQL injection attacks via a \ (backslash) in a message. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-4422.
Modified: 2025-04-12
CVE-2015-8547
The CoreUserInputHandler::doMode function in core/coreuserinputhandler.cpp in Quassel 0.10.0 allows remote attackers to cause a denial of service (application crash) via the "/op *" command in a query.
- http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174938.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174976.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00099.html
- http://www.openwall.com/lists/oss-security/2015/12/12/1
- http://www.openwall.com/lists/oss-security/2015/12/13/1
- https://github.com/quassel/quassel/commit/b8edbda019eeb99da8663193e224efc9d1265dc7
- https://github.com/quassel/quassel/pull/153
- http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174938.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-January/174976.html
- http://lists.opensuse.org/opensuse-updates/2015-12/msg00099.html
- http://www.openwall.com/lists/oss-security/2015/12/12/1
- http://www.openwall.com/lists/oss-security/2015/12/13/1
- https://github.com/quassel/quassel/commit/b8edbda019eeb99da8663193e224efc9d1265dc7
- https://github.com/quassel/quassel/pull/153
Modified: 2025-04-12
CVE-2016-4414
The onReadyRead function in core/coreauthhandler.cpp in Quassel before 0.12.4 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via invalid handshake data.
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183571.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183585.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183746.html
- http://lists.opensuse.org/opensuse-updates/2016-05/msg00063.html
- http://quassel-irc.org/node/129
- http://www.openwall.com/lists/oss-security/2016/04/30/2
- http://www.openwall.com/lists/oss-security/2016/04/30/4
- https://github.com/quassel/quassel/commit/e678873
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183571.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183585.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183746.html
- http://lists.opensuse.org/opensuse-updates/2016-05/msg00063.html
- http://quassel-irc.org/node/129
- http://www.openwall.com/lists/oss-security/2016/04/30/2
- http://www.openwall.com/lists/oss-security/2016/04/30/4
- https://github.com/quassel/quassel/commit/e678873
Closed bugs
Прошу собрать 0ad
Closed vulnerabilities
Modified: 2023-02-15
BDU:2022-00655
Уязвимость модуля snapper системы управления конфигурациями и удалённого выполнения операций SaltStack Salt, позволяющая нарушителю повысить свои привилегии
Modified: 2024-11-21
CVE-2021-31607
In SaltStack Salt 2016.9 through 3002.6, a command injection vulnerability exists in the snapper module that allows for local privilege escalation on a minion. The attack requires that a file is created with a pathname that is backed up by snapper, and that the master calls the snapper.diff function (which executes popen unsafely).
- https://lists.debian.org/debian-lts-announce/2021/11/msg00009.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6BUWUF5VTENNP2ZYZBVFKPSUHLKLUBD5/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ACVT7M4YLZRLWWQ6SGRK3C6TOF4FXOXT/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LDKMAJXYFHM4USVX3H5V2GCCBGASWUSM/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MBAHHSGZLEJRCG4DX6J4RBWJAAWH55RQ/
- https://sec.stealthcopter.com/saltstack-snapper-minion-privledge-escaltion/
- https://security.gentoo.org/glsa/202310-22
- https://www.debian.org/security/2021/dsa-5011
- https://lists.debian.org/debian-lts-announce/2021/11/msg00009.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/6BUWUF5VTENNP2ZYZBVFKPSUHLKLUBD5/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ACVT7M4YLZRLWWQ6SGRK3C6TOF4FXOXT/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LDKMAJXYFHM4USVX3H5V2GCCBGASWUSM/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MBAHHSGZLEJRCG4DX6J4RBWJAAWH55RQ/
- https://sec.stealthcopter.com/saltstack-snapper-minion-privledge-escaltion/
- https://security.gentoo.org/glsa/202310-22
- https://www.debian.org/security/2021/dsa-5011
Modified: 2025-03-18
CVE-2021-33226
Buffer Overflow vulnerability in Saltstack v.3003 and before allows attacker to execute arbitrary code via the func variable in salt/salt/modules/status.py file. NOTE: this is disputed by third parties because an attacker cannot influence the eval input
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-31804
LeoCAD before 21.03 sometimes allows a use-after-free during the opening of a new document.
Closed bugs
[FR] Обновить версию
Очень старая версия утилиты диагностики pgcenter