ALT-BU-2022-3470-1
Branch sisyphus_riscv64 update bulletin.
Package libxdg-basedir updated to version 1.2.3-alt1 for branch sisyphus_riscv64.
Closed bugs
Прошу пересобрать libxdg-basedir
Package livecd-save-nfs updated to version 0.4.2-alt1 for branch sisyphus_riscv64.
Closed bugs
livecd-save-nfs: тупит около 30 секунд при загрузке системы
Package newt52 updated to version 0.52.21-alt3 for branch sisyphus_riscv64.
Closed bugs
newt52: no devel-static any more
Package unixODBC updated to version 2.3.7-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2021-01498
Уязвимость функции unicode_to_ansi_copy() файла DriverManager/__info.c библиотеки ODBC для UNIX UnixODBC, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-7409
In unixODBC before 2.3.5, there is a buffer overflow in the unicode_to_ansi_copy() function in DriverManager/__info.c.
Closed bugs
Сломана сборка unixODBC
Package design-bootloader-source updated to version 7.3-alt1 for branch sisyphus_riscv64.
Closed bugs
Больно длинный русский перевод
Package ldap-user-tools updated to version 0.9.5-alt1 for branch sisyphus_riscv64.
Closed bugs
ldap-groupmod не добавляет пользователя в группу, когда в ней есть пользователь с более коротким именем
Package klibc updated to version 2.0.9-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2021-05232
Уязвимость функции malloc() библиотеки среды выполнения Klibc, связанная с целочисленным переполнением, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-05239
Уязвимость команды cpio библиотеки среды выполнения Klibc на 64-битных системах, связанная с целочисленным переполнением, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-05247
Уязвимость функции calloc() библиотеки среды выполнения Klibc, связанная с целочисленным переполнением, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-31870
An issue was discovered in klibc before 2.0.9. Multiplication in the calloc() function may result in an integer overflow and a subsequent heap buffer overflow.
- [oss-security] 20210430 [ANNOUNCE] klibc 2.0.9
- [oss-security] 20210430 [ANNOUNCE] klibc 2.0.9
- https://git.kernel.org/pub/scm/libs/klibc/klibc.git/commit/?id=292650f04c2b5348b4efbad61fb014ed09b4f3f2
- https://git.kernel.org/pub/scm/libs/klibc/klibc.git/commit/?id=292650f04c2b5348b4efbad61fb014ed09b4f3f2
- https://kernel.org/pub/linux/libs/klibc/2.0/
- https://kernel.org/pub/linux/libs/klibc/2.0/
- [debian-lts-announce] 20210628 [SECURITY] [DLA 2695-1] klibc security update
- [debian-lts-announce] 20210628 [SECURITY] [DLA 2695-1] klibc security update
- https://lists.zytor.com/archives/klibc/2021-April/004593.html
- https://lists.zytor.com/archives/klibc/2021-April/004593.html
Modified: 2024-11-21
CVE-2021-31871
An issue was discovered in klibc before 2.0.9. An integer overflow in the cpio command may result in a NULL pointer dereference on 64-bit systems.
- [oss-security] 20210430 [ANNOUNCE] klibc 2.0.9
- [oss-security] 20210430 [ANNOUNCE] klibc 2.0.9
- https://git.kernel.org/pub/scm/libs/klibc/klibc.git/commit/?id=2e48a12ab1e30d43498c2d53e878a11a1b5102d5
- https://git.kernel.org/pub/scm/libs/klibc/klibc.git/commit/?id=2e48a12ab1e30d43498c2d53e878a11a1b5102d5
- https://kernel.org/pub/linux/libs/klibc/2.0/
- https://kernel.org/pub/linux/libs/klibc/2.0/
- [debian-lts-announce] 20210628 [SECURITY] [DLA 2695-1] klibc security update
- [debian-lts-announce] 20210628 [SECURITY] [DLA 2695-1] klibc security update
- https://lists.zytor.com/archives/klibc/2021-April/004593.html
- https://lists.zytor.com/archives/klibc/2021-April/004593.html
Modified: 2024-11-21
CVE-2021-31873
An issue was discovered in klibc before 2.0.9. Additions in the malloc() function may result in an integer overflow and a subsequent heap buffer overflow.
- [oss-security] 20210430 [ANNOUNCE] klibc 2.0.9
- [oss-security] 20210430 [ANNOUNCE] klibc 2.0.9
- https://git.kernel.org/pub/scm/libs/klibc/klibc.git/commit/?id=a31ae8c508fc8d1bca4f57e9f9f88127572d5202
- https://git.kernel.org/pub/scm/libs/klibc/klibc.git/commit/?id=a31ae8c508fc8d1bca4f57e9f9f88127572d5202
- https://github.com/huolinjue/klibc/commit/a31ae8c508fc8d1bca4f57e9f9f88127572d5202
- https://github.com/huolinjue/klibc/commit/a31ae8c508fc8d1bca4f57e9f9f88127572d5202
- https://kernel.org/pub/linux/libs/klibc/2.0/
- https://kernel.org/pub/linux/libs/klibc/2.0/
- [debian-lts-announce] 20210628 [SECURITY] [DLA 2695-1] klibc security update
- [debian-lts-announce] 20210628 [SECURITY] [DLA 2695-1] klibc security update
- https://lists.zytor.com/archives/klibc/2021-April/004593.html
- https://lists.zytor.com/archives/klibc/2021-April/004593.html
Package timeshift updated to version 21.09.1-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2020-02872
Уязвимость функции init_tmp (TeeJee.FileSystem.vala) приложения восстановления системы Timeshift, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2020-10174
init_tmp in TeeJee.FileSystem.vala in Timeshift before 20.03 unsafely reuses a preexisting temporary directory in the predictable location /tmp/timeshift. It follows symlinks in this location or uses directories owned by unprivileged users. Because Timeshift also executes scripts under this location, an attacker can attempt to win a race condition to replace scripts created by Timeshift with attacker-controlled scripts. Upon success, an attacker-controlled script is executed with full root privileges. This logic is practically always triggered when Timeshift runs regardless of the command-line arguments used.
- [oss-security] 20200306 CVE-2020-10174: timeshift: arbitrary local code execution due to unsafe usage of temporary directory in /tmp/timeshift
- https://bugzilla.suse.com/show_bug.cgi?id=1165802
- https://github.com/teejee2008/timeshift/commit/335b3d5398079278b8f7094c77bfd148b315b462
- https://github.com/teejee2008/timeshift/releases/tag/v20.03
- FEDORA-2020-1050d60507
- FEDORA-2020-6b3ae09449
- FEDORA-2020-c18248f61a
- USN-4312-1
- [oss-security] 20200306 CVE-2020-10174: timeshift: arbitrary local code execution due to unsafe usage of temporary directory in /tmp/timeshift
- USN-4312-1
- FEDORA-2020-c18248f61a
- FEDORA-2020-6b3ae09449
- FEDORA-2020-1050d60507
- https://github.com/teejee2008/timeshift/releases/tag/v20.03
- https://github.com/teejee2008/timeshift/commit/335b3d5398079278b8f7094c77bfd148b315b462
- https://bugzilla.suse.com/show_bug.cgi?id=1165802
Package libmaxminddb updated to version 1.6.0-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-28241
libmaxminddb before 1.4.3 has a heap-based buffer over-read in dump_entry_data_list in maxminddb.c.
- https://github.com/maxmind/libmaxminddb/compare/1.4.2...1.4.3
- https://github.com/maxmind/libmaxminddb/compare/1.4.2...1.4.3
- https://github.com/maxmind/libmaxminddb/issues/236
- https://github.com/maxmind/libmaxminddb/issues/236
- https://github.com/maxmind/libmaxminddb/pull/237
- https://github.com/maxmind/libmaxminddb/pull/237
- [debian-lts-announce] 20201110 [SECURITY] [DLA 2445-1] libmaxminddb security update
- [debian-lts-announce] 20201110 [SECURITY] [DLA 2445-1] libmaxminddb security update
- FEDORA-2020-8a8f8b244f
- FEDORA-2020-8a8f8b244f
- FEDORA-2020-1fb1785fa1
- FEDORA-2020-1fb1785fa1
- GLSA-202011-15
- GLSA-202011-15
Package libbotan updated to version 2.18.1-alt2 for branch sisyphus_riscv64.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-24115
In Botan before 2.17.3, constant-time computations are not used for certain decoding and encoding operations (base32, base58, base64, and hex).
Package resource-agents updated to version 4.10.0-alt1 for branch sisyphus_riscv64.
Closed bugs
Файловый конфликт с пакетом resource-agents
Package mtools updated to version 4.0.32-alt3 for branch sisyphus_riscv64.
Closed bugs
Сломался mcopy после обновления до версии 4.0.33-alt1