ALT-BU-2021-4005-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-21404
Syncthing is a continuous file synchronization program. In Syncthing before version 1.15.0, the relay server `strelaysrv` can be caused to crash and exit by sending a relay message with a negative length field. Similarly, Syncthing itself can crash for the same reason if given a malformed message from a malicious relay server when attempting to join the relay. Relay joins are essentially random (from a subset of low latency relays) and Syncthing will by default restart when crashing, at which point it's likely to pick another non-malicious relay. This flaw is fixed in version 1.15.0.
- https://github.com/syncthing/syncthing/commit/fb4fdaf4c0a79c22cad000c42ac1394e3ccb6a97
- https://github.com/syncthing/syncthing/commit/fb4fdaf4c0a79c22cad000c42ac1394e3ccb6a97
- https://github.com/syncthing/syncthing/releases/tag/v1.15.0
- https://github.com/syncthing/syncthing/releases/tag/v1.15.0
- https://github.com/syncthing/syncthing/security/advisories/GHSA-x462-89pf-6r5h
- https://github.com/syncthing/syncthing/security/advisories/GHSA-x462-89pf-6r5h
- https://pkg.go.dev/github.com/syncthing/syncthing
- https://pkg.go.dev/github.com/syncthing/syncthing
Closed bugs
Прошу собрать версию 6.2.4
Closed vulnerabilities
Modified: 2024-11-21
CVE-2011-3354
The CtcpParser::packedReply method in core/ctcpparser.cpp in Quassel before 0.7.3 allows remote attackers to cause a denial of service (crash) via a crafted Client-To-Client Protocol (CTCP) request, as demonstrated in the wild in September 2011.
- http://bugs.quassel-irc.org/projects/quassel-irc/repository/revisions/da215fcb9cd3096a3e223c87577d5d4ab8f8518b/diff/src/core/ctcpparser.cpp
- 75351
- 45970
- [oss-security] 20110908 CVE request: Quassel < 0.7.3 CTCP request core DoS
- [oss-security] 20110909 Re: CVE request: Quassel < 0.7.3 CTCP request core DoS
- 49526
- USN-1200-1
- https://bugs.gentoo.org/show_bug.cgi?id=382313
- quasselirc-ctcp-dos(69682)
- http://bugs.quassel-irc.org/projects/quassel-irc/repository/revisions/da215fcb9cd3096a3e223c87577d5d4ab8f8518b/diff/src/core/ctcpparser.cpp
- quasselirc-ctcp-dos(69682)
- https://bugs.gentoo.org/show_bug.cgi?id=382313
- USN-1200-1
- 49526
- [oss-security] 20110909 Re: CVE request: Quassel < 0.7.3 CTCP request core DoS
- [oss-security] 20110908 CVE request: Quassel < 0.7.3 CTCP request core DoS
- 45970
- 75351
Modified: 2024-11-21
CVE-2015-2778
Quassel before 0.12-rc1 uses an incorrect data-type size when splitting a message, which allows remote attackers to cause a denial of service (crash) via a long CTCP query containing only multibyte characters.
- openSUSE-SU-2015:0687
- openSUSE-SU-2015:0687
- [oss-security] 20150320 CVE request: denial of service in Quassel
- [oss-security] 20150320 CVE request: denial of service in Quassel
- [oss-security] 20150327 Re: CVE request: denial of service in Quassel
- [oss-security] 20150327 Re: CVE request: denial of service in Quassel
- [oss-security] 20150328 Re: CVE request: denial of service in Quassel
- [oss-security] 20150328 Re: CVE request: denial of service in Quassel
- 73305
- 73305
- https://github.com/quassel/quassel/commit/b5e38970ffd55e2dd9f706ce75af9a8d7730b1b8
- https://github.com/quassel/quassel/commit/b5e38970ffd55e2dd9f706ce75af9a8d7730b1b8
Modified: 2024-11-21
CVE-2015-2779
Stack consumption vulnerability in the message splitting functionality in Quassel before 0.12-rc1 allows remote attackers to cause a denial of service (uncontrolled recursion) via a crafted massage.
- FEDORA-2015-4689
- FEDORA-2015-4689
- FEDORA-2015-4531
- FEDORA-2015-4531
- openSUSE-SU-2015:0687
- openSUSE-SU-2015:0687
- [oss-security] 20150320 CVE request: denial of service in Quassel
- [oss-security] 20150320 CVE request: denial of service in Quassel
- [oss-security] 20150327 Re: CVE request: denial of service in Quassel
- [oss-security] 20150327 Re: CVE request: denial of service in Quassel
- [oss-security] 20150328 Re: CVE request: denial of service in Quassel
- [oss-security] 20150328 Re: CVE request: denial of service in Quassel
- 74048
- 74048
- https://github.com/quassel/quassel/commit/b5e38970ffd55e2dd9f706ce75af9a8d7730b1b8
- https://github.com/quassel/quassel/commit/b5e38970ffd55e2dd9f706ce75af9a8d7730b1b8
Modified: 2024-11-21
CVE-2015-3427
Quassel before 0.12.2 does not properly re-initialize the database session when the PostgreSQL database is restarted, which allows remote attackers to conduct SQL injection attacks via a \ (backslash) in a message. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-4422.
Modified: 2024-11-21
CVE-2015-8547
The CoreUserInputHandler::doMode function in core/coreuserinputhandler.cpp in Quassel 0.10.0 allows remote attackers to cause a denial of service (application crash) via the "/op *" command in a query.
- FEDORA-2016-7f0b1e47ac
- FEDORA-2016-7f0b1e47ac
- FEDORA-2016-3bc3d7f66e
- FEDORA-2016-3bc3d7f66e
- openSUSE-SU-2015:2345
- openSUSE-SU-2015:2345
- [oss-security] 20151212 CVE request: Remote DoS in Quassel
- [oss-security] 20151212 CVE request: Remote DoS in Quassel
- [oss-security] 20151212 Re: CVE request: Remote DoS in Quassel
- [oss-security] 20151212 Re: CVE request: Remote DoS in Quassel
- https://github.com/quassel/quassel/commit/b8edbda019eeb99da8663193e224efc9d1265dc7
- https://github.com/quassel/quassel/commit/b8edbda019eeb99da8663193e224efc9d1265dc7
- https://github.com/quassel/quassel/pull/153
- https://github.com/quassel/quassel/pull/153
Modified: 2024-11-21
CVE-2016-4414
The onReadyRead function in core/coreauthhandler.cpp in Quassel before 0.12.4 allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via invalid handshake data.
- FEDORA-2016-42f30d76a0
- FEDORA-2016-42f30d76a0
- FEDORA-2016-0431acaa78
- FEDORA-2016-0431acaa78
- FEDORA-2016-bf916bcc04
- FEDORA-2016-bf916bcc04
- openSUSE-SU-2016:1314
- openSUSE-SU-2016:1314
- http://quassel-irc.org/node/129
- http://quassel-irc.org/node/129
- [oss-security] 20160430 CVE request - Quassel IRC denial of service
- [oss-security] 20160430 CVE request - Quassel IRC denial of service
- [oss-security] 20160430 Re: CVE request - Quassel IRC denial of service
- [oss-security] 20160430 Re: CVE request - Quassel IRC denial of service
- https://github.com/quassel/quassel/commit/e678873
- https://github.com/quassel/quassel/commit/e678873
Closed bugs
Прошу собрать 0ad
Closed vulnerabilities
BDU:2022-00655
Уязвимость модуля snapper системы управления конфигурациями и удалённого выполнения операций SaltStack Salt, позволяющая нарушителю повысить свои привилегии
Modified: 2024-11-21
CVE-2021-31607
In SaltStack Salt 2016.9 through 3002.6, a command injection vulnerability exists in the snapper module that allows for local privilege escalation on a minion. The attack requires that a file is created with a pathname that is backed up by snapper, and that the master calls the snapper.diff function (which executes popen unsafely).
- [debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update
- [debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update
- FEDORA-2021-158e9c6eb9
- FEDORA-2021-158e9c6eb9
- FEDORA-2021-93a7c8b7c6
- FEDORA-2021-93a7c8b7c6
- FEDORA-2021-5aaebdae8e
- FEDORA-2021-5aaebdae8e
- FEDORA-2021-00ada7e667
- FEDORA-2021-00ada7e667
- https://sec.stealthcopter.com/saltstack-snapper-minion-privledge-escaltion/
- https://sec.stealthcopter.com/saltstack-snapper-minion-privledge-escaltion/
- GLSA-202310-22
- GLSA-202310-22
- DSA-5011
- DSA-5011
Modified: 2025-03-18
CVE-2021-33226
Buffer Overflow vulnerability in Saltstack v.3003 and before allows attacker to execute arbitrary code via the func variable in salt/salt/modules/status.py file. NOTE: this is disputed by third parties because an attacker cannot influence the eval input
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-31804
LeoCAD before 21.03 sometimes allows a use-after-free during the opening of a new document.
Closed bugs
[FR] Обновить версию
Очень старая версия утилиты диагностики pgcenter