ALT-BU-2022-3501-1
Branch sisyphus_riscv64 update bulletin.
Package firejail updated to version 0.9.66-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2021-03745
Уязвимость компонента OverlayFS SUID песочницы Firejail, связанная с недостаточной проверкой состояния совместно используемого ресурса, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-26910
Firejail before 0.9.64.4 allows attackers to bypass intended access restrictions because there is a TOCTOU race condition between a stat operation and an OverlayFS mount operation.
- [oss-security] 20210209 Re: [cve-pending] Firejail: root privilege escalation in OverlayFS code
- [oss-security] 20210209 Re: [cve-pending] Firejail: root privilege escalation in OverlayFS code
- https://github.com/netblue30/firejail/commit/97d8a03cad19501f017587cc4e47d8418273834b
- https://github.com/netblue30/firejail/commit/97d8a03cad19501f017587cc4e47d8418273834b
- https://github.com/netblue30/firejail/releases/tag/0.9.64.4
- https://github.com/netblue30/firejail/releases/tag/0.9.64.4
- [debian-lts-announce] 20210211 [SECURITY] [DLA 2554-1] firejail security update
- [debian-lts-announce] 20210211 [SECURITY] [DLA 2554-1] firejail security update
- GLSA-202105-19
- GLSA-202105-19
- https://unparalleled.eu/blog/2021/20210208-rigged-race-against-firejail-for-local-root/
- https://unparalleled.eu/blog/2021/20210208-rigged-race-against-firejail-for-local-root/
- https://unparalleled.eu/publications/2021/advisory-unpar-2021-0.txt
- https://unparalleled.eu/publications/2021/advisory-unpar-2021-0.txt
- DSA-4849
- DSA-4849
Package gifsicle updated to version 1.93-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2022-02071
Уязвимость функции find_color_or_error пакета программ для создания, редактирования и оптимизации GIF-файлов Gifsicle, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-19752
The find_color_or_error function in gifsicle 1.92 contains a NULL pointer dereference.
Package libiec61850 updated to version 1.5.0-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2022-05635
Уязвимость библиотеки libIEC61850, связанная с чтением данных за границами буфера в памяти, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2022-05636
Уязвимость библиотеки libIEC61850, связанная с чтением данных за границами буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2022-05637
Уязвимость библиотеки libIEC61850, связанная с доступом к ресурсу через несовместимые типы, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05638
Уязвимость библиотеки libIEC61850, связанная с ошибками разыменования указателей, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-15158
In libIEC61850 before version 1.4.3, when a message with COTP message length field with value < 4 is received an integer underflow will happen leading to heap buffer overflow. This can cause an application crash or on some platforms even the execution of remote code. If your application is used in open networks or there are untrusted nodes in the network it is highly recommend to apply the patch. This was patched with commit 033ab5b. Users of version 1.4.x should upgrade to version 1.4.3 when available. As a workaround changes of commit 033ab5b can be applied to older versions.
- https://github.com/mz-automation/libiec61850/commit/033ab5b6488250c8c3b838f25a7cbc3e099230bb
- https://github.com/mz-automation/libiec61850/commit/033ab5b6488250c8c3b838f25a7cbc3e099230bb
- https://github.com/mz-automation/libiec61850/issues/250
- https://github.com/mz-automation/libiec61850/issues/250
- https://github.com/mz-automation/libiec61850/security/advisories/GHSA-pq77-fmf7-hjw8
- https://github.com/mz-automation/libiec61850/security/advisories/GHSA-pq77-fmf7-hjw8
Modified: 2024-11-21
CVE-2022-2970
MZ Automation's libIEC61850 (versions 1.4 and prior; version 1.5 prior to commit a3b04b7bc4872a5a39e5de3fdc5fbde52c09e10e) does not sanitize input before memcpy is used, which could allow an attacker to crash the device or remotely execute arbitrary code.
Modified: 2024-11-21
CVE-2022-2971
MZ Automation's libIEC61850 (versions 1.4 and prior; version 1.5 prior to commit a3b04b7bc4872a5a39e5de3fdc5fbde52c09e10e) accesses a resource using an incompatible type, which could allow an attacker to crash the server with a malicious payload.
Modified: 2024-11-21
CVE-2022-2972
MZ Automation's libIEC61850 (versions 1.4 and prior; version 1.5 prior to commit a3b04b7bc4872a5a39e5de3fdc5fbde52c09e10e) is vulnerable to a stack-based buffer overflow, which could allow an attacker to crash the device or remotely execute arbitrary code.
Modified: 2024-11-21
CVE-2022-2973
MZ Automation's libIEC61850 (versions 1.4 and prior; version 1.5 prior to commit a3b04b7bc4872a5a39e5de3fdc5fbde52c09e10e) uses a NULL pointer in certain situations. which could allow an attacker to crash the server.
Modified: 2024-11-21
CVE-2022-3976
A vulnerability has been found in MZ Automation libiec61850 up to 1.4 and classified as critical. This vulnerability affects unknown code of the file src/mms/iso_mms/client/mms_client_files.c of the component MMS File Services. The manipulation of the argument filename leads to path traversal. Upgrading to version 1.5 is able to address this issue. The name of the patch is 10622ba36bb3910c151348f1569f039ecdd8786f. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-213556.
- https://github.com/mz-automation/libiec61850
- https://github.com/mz-automation/libiec61850
- https://github.com/mz-automation/libiec61850/commit/10622ba36bb3910c151348f1569f039ecdd8786f
- https://github.com/mz-automation/libiec61850/commit/10622ba36bb3910c151348f1569f039ecdd8786f
- https://vuldb.com/?id.213556
- https://vuldb.com/?id.213556
Package libslirp updated to version 4.6.1-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2022-05822
Уязвимость функции udp6_input() библиотеки TCP-IP эмулятора Libslirp, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Modified: 2024-11-21
CVE-2021-3592
An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the bootp_input() function and could occur while processing a udp packet that is smaller than the size of the 'bootp_t' structure. A malicious guest could use this flaw to leak 10 bytes of uninitialized heap memory from the host. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.
- https://bugzilla.redhat.com/show_bug.cgi?id=1970484
- https://bugzilla.redhat.com/show_bug.cgi?id=1970484
- [debian-lts-announce] 20210902 [SECURITY] [DLA 2753-1] qemu security update
- [debian-lts-announce] 20210902 [SECURITY] [DLA 2753-1] qemu security update
- [debian-lts-announce] 20210911 [SECURITY] [DLA 2753-2] qemu regression update
- [debian-lts-announce] 20210911 [SECURITY] [DLA 2753-2] qemu regression update
- [debian-lts-announce] 20230314 [SECURITY] [DLA 3362-1] qemu security update
- [debian-lts-announce] 20230314 [SECURITY] [DLA 3362-1] qemu security update
- FEDORA-2021-71de23bedd
- FEDORA-2021-71de23bedd
- FEDORA-2021-7cd749f133
- FEDORA-2021-7cd749f133
- GLSA-202107-44
- GLSA-202107-44
- https://security.netapp.com/advisory/ntap-20210805-0004/
- https://security.netapp.com/advisory/ntap-20210805-0004/
Modified: 2024-11-21
CVE-2021-3593
An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the udp6_input() function and could occur while processing a udp packet that is smaller than the size of the 'udphdr' structure. This issue may lead to out-of-bounds read access or indirect host memory disclosure to the guest. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.
- https://bugzilla.redhat.com/show_bug.cgi?id=1970487
- https://bugzilla.redhat.com/show_bug.cgi?id=1970487
- [debian-lts-announce] 20220404 [SECURITY] [DLA 2970-1] qemu security update
- [debian-lts-announce] 20220404 [SECURITY] [DLA 2970-1] qemu security update
- [debian-lts-announce] 20230314 [SECURITY] [DLA 3362-1] qemu security update
- [debian-lts-announce] 20230314 [SECURITY] [DLA 3362-1] qemu security update
- FEDORA-2021-71de23bedd
- FEDORA-2021-71de23bedd
- FEDORA-2021-7cd749f133
- FEDORA-2021-7cd749f133
- GLSA-202107-44
- GLSA-202107-44
- https://security.netapp.com/advisory/ntap-20210805-0004/
- https://security.netapp.com/advisory/ntap-20210805-0004/
Modified: 2024-11-21
CVE-2021-3594
An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the udp_input() function and could occur while processing a udp packet that is smaller than the size of the 'udphdr' structure. This issue may lead to out-of-bounds read access or indirect host memory disclosure to the guest. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.
- https://bugzilla.redhat.com/show_bug.cgi?id=1970491
- https://bugzilla.redhat.com/show_bug.cgi?id=1970491
- [debian-lts-announce] 20210902 [SECURITY] [DLA 2753-1] qemu security update
- [debian-lts-announce] 20210902 [SECURITY] [DLA 2753-1] qemu security update
- [debian-lts-announce] 20230314 [SECURITY] [DLA 3362-1] qemu security update
- [debian-lts-announce] 20230314 [SECURITY] [DLA 3362-1] qemu security update
- FEDORA-2021-71de23bedd
- FEDORA-2021-71de23bedd
- FEDORA-2021-7cd749f133
- FEDORA-2021-7cd749f133
- GLSA-202107-44
- GLSA-202107-44
- https://security.netapp.com/advisory/ntap-20210805-0004/
- https://security.netapp.com/advisory/ntap-20210805-0004/
Modified: 2024-11-21
CVE-2021-3595
An invalid pointer initialization issue was found in the SLiRP networking implementation of QEMU. The flaw exists in the tftp_input() function and could occur while processing a udp packet that is smaller than the size of the 'tftp_t' structure. This issue may lead to out-of-bounds read access or indirect host memory disclosure to the guest. The highest threat from this vulnerability is to data confidentiality. This flaw affects libslirp versions prior to 4.6.0.
- https://bugzilla.redhat.com/show_bug.cgi?id=1970489
- https://bugzilla.redhat.com/show_bug.cgi?id=1970489
- [debian-lts-announce] 20210902 [SECURITY] [DLA 2753-1] qemu security update
- [debian-lts-announce] 20210902 [SECURITY] [DLA 2753-1] qemu security update
- [debian-lts-announce] 20230314 [SECURITY] [DLA 3362-1] qemu security update
- [debian-lts-announce] 20230314 [SECURITY] [DLA 3362-1] qemu security update
- FEDORA-2021-71de23bedd
- FEDORA-2021-71de23bedd
- FEDORA-2021-7cd749f133
- FEDORA-2021-7cd749f133
- GLSA-202107-44
- GLSA-202107-44
- https://security.netapp.com/advisory/ntap-20210805-0004/
- https://security.netapp.com/advisory/ntap-20210805-0004/