ALT-BU-2022-3546-1
Branch sisyphus_e2k update bulletin.
Package xfce4-dev-tools updated to version 4.17.0-alt2 for branch sisyphus_e2k.
Closed bugs
[FR] xfce4-dev-tools should not depend on docker
Package libspf2 updated to version 1.2.11-alt1.git.4915c30 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2021-04420
Уязвимость библиотеки протоколов SPF libspf2, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2021-20314
Stack buffer overflow in libspf2 versions below 1.2.11 when processing certain SPF macros can lead to Denial of service and potentially code execution via malicious crafted SPF explanation messages.
- https://bugzilla.redhat.com/show_bug.cgi?id=1993070
- https://bugzilla.redhat.com/show_bug.cgi?id=1993070
- FEDORA-2021-aa8637c985
- FEDORA-2021-aa8637c985
- FEDORA-2021-994751581f
- FEDORA-2021-994751581f
- FEDORA-2021-044be3d54e
- FEDORA-2021-044be3d54e
- https://security.gentoo.org/glsa/202401-22
- https://security.gentoo.org/glsa/202401-22
Modified: 2024-11-21
CVE-2021-33912
libspf2 before 1.2.11 has a four-byte heap-based buffer overflow that might allow remote attackers to execute arbitrary code (via an unauthenticated e-mail message from anywhere on the Internet) with a crafted SPF DNS record, because of incorrect sprintf usage in SPF_record_expand_data in spf_expand.c. The vulnerable code may be part of the supply chain of a site's e-mail infrastructure (e.g., with additional configuration, Exim can use libspf2; the Postfix web site links to unofficial patches for use of libspf2 with Postfix; older versions of spfquery relied on libspf2) but most often is not.
- https://github.com/shevek/libspf2/tree/8131fe140704eaae695e76b5cd09e39bd1dd220b
- https://github.com/shevek/libspf2/tree/8131fe140704eaae695e76b5cd09e39bd1dd220b
- [debian-lts-announce] 20220121 [SECURITY] [DLA 2890-1] libspf2 security update
- [debian-lts-announce] 20220121 [SECURITY] [DLA 2890-1] libspf2 security update
- https://nathanielbennett.com/blog/libspf2-cve-jan-2022-disclosure
- https://nathanielbennett.com/blog/libspf2-cve-jan-2022-disclosure
- GLSA-202401-22
- GLSA-202401-22
Modified: 2024-11-21
CVE-2021-33913
libspf2 before 1.2.11 has a heap-based buffer overflow that might allow remote attackers to execute arbitrary code (via an unauthenticated e-mail message from anywhere on the Internet) with a crafted SPF DNS record, because of SPF_record_expand_data in spf_expand.c. The amount of overflowed data depends on the relationship between the length of an entire domain name and the length of its leftmost label. The vulnerable code may be part of the supply chain of a site's e-mail infrastructure (e.g., with additional configuration, Exim can use libspf2; the Postfix web site links to unofficial patches for use of libspf2 with Postfix; older versions of spfquery relied on libspf2) but most often is not.
- https://github.com/shevek/libspf2/tree/8131fe140704eaae695e76b5cd09e39bd1dd220b
- https://github.com/shevek/libspf2/tree/8131fe140704eaae695e76b5cd09e39bd1dd220b
- [debian-lts-announce] 20220121 [SECURITY] [DLA 2890-1] libspf2 security update
- [debian-lts-announce] 20220121 [SECURITY] [DLA 2890-1] libspf2 security update
- https://nathanielbennett.com/blog/libspf2-cve-jan-2022-disclosure
- https://nathanielbennett.com/blog/libspf2-cve-jan-2022-disclosure
- GLSA-202401-22
- GLSA-202401-22
Package wireshark updated to version 3.6.1-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2022-02437
Уязвимость диссектора RTMPT анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02438
Уязвимость диссектора BitTorrent DHT анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02439
Уязвимость диссектора Sysdig Event анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-4181
Crash in the Sysdig Event dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-4181.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-4181.json
- https://gitlab.com/wireshark/wireshark/-/merge_requests/5429
- https://gitlab.com/wireshark/wireshark/-/merge_requests/5429
- [debian-lts-announce] 20220331 [SECURITY] [DLA 2967-1] wireshark security update
- [debian-lts-announce] 20220331 [SECURITY] [DLA 2967-1] wireshark security update
- FEDORA-2022-30411cb3c4
- FEDORA-2022-30411cb3c4
- FEDORA-2022-1daf93c51d
- FEDORA-2022-1daf93c51d
- GLSA-202210-04
- GLSA-202210-04
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.wireshark.org/security/wnpa-sec-2021-21.html
- https://www.wireshark.org/security/wnpa-sec-2021-21.html
Modified: 2024-11-21
CVE-2021-4182
Crash in the RFC 7468 dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-4182.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-4182.json
- https://gitlab.com/wireshark/wireshark/-/issues/17801
- https://gitlab.com/wireshark/wireshark/-/issues/17801
- FEDORA-2022-30411cb3c4
- FEDORA-2022-30411cb3c4
- FEDORA-2022-1daf93c51d
- FEDORA-2022-1daf93c51d
- GLSA-202210-04
- GLSA-202210-04
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.wireshark.org/security/wnpa-sec-2021-20.html
- https://www.wireshark.org/security/wnpa-sec-2021-20.html
Modified: 2024-11-21
CVE-2021-4183
Crash in the pcapng file parser in Wireshark 3.6.0 allows denial of service via crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-4183.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-4183.json
- https://gitlab.com/wireshark/wireshark/-/issues/17755
- https://gitlab.com/wireshark/wireshark/-/issues/17755
- FEDORA-2022-30411cb3c4
- FEDORA-2022-30411cb3c4
- FEDORA-2022-1daf93c51d
- FEDORA-2022-1daf93c51d
- GLSA-202210-04
- GLSA-202210-04
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.wireshark.org/security/wnpa-sec-2021-19.html
- https://www.wireshark.org/security/wnpa-sec-2021-19.html
Modified: 2024-11-21
CVE-2021-4184
Infinite loop in the BitTorrent DHT dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-4184.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-4184.json
- https://gitlab.com/wireshark/wireshark/-/issues/17754
- https://gitlab.com/wireshark/wireshark/-/issues/17754
- [debian-lts-announce] 20220331 [SECURITY] [DLA 2967-1] wireshark security update
- [debian-lts-announce] 20220331 [SECURITY] [DLA 2967-1] wireshark security update
- FEDORA-2022-30411cb3c4
- FEDORA-2022-30411cb3c4
- FEDORA-2022-1daf93c51d
- FEDORA-2022-1daf93c51d
- GLSA-202210-04
- GLSA-202210-04
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.wireshark.org/security/wnpa-sec-2021-18.html
- https://www.wireshark.org/security/wnpa-sec-2021-18.html
Modified: 2024-11-21
CVE-2021-4185
Infinite loop in the RTMPT dissector in Wireshark 3.6.0 and 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-4185.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-4185.json
- https://gitlab.com/wireshark/wireshark/-/issues/17745
- https://gitlab.com/wireshark/wireshark/-/issues/17745
- [debian-lts-announce] 20220331 [SECURITY] [DLA 2967-1] wireshark security update
- [debian-lts-announce] 20220331 [SECURITY] [DLA 2967-1] wireshark security update
- FEDORA-2022-30411cb3c4
- FEDORA-2022-30411cb3c4
- FEDORA-2022-1daf93c51d
- FEDORA-2022-1daf93c51d
- GLSA-202210-04
- GLSA-202210-04
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.wireshark.org/security/wnpa-sec-2021-17.html
- https://www.wireshark.org/security/wnpa-sec-2021-17.html
Modified: 2024-11-21
CVE-2021-4186
Crash in the Gryphon dissector in Wireshark 3.4.0 to 3.4.10 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-4186.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-4186.json
- https://gitlab.com/wireshark/wireshark/-/issues/17737
- https://gitlab.com/wireshark/wireshark/-/issues/17737
- FEDORA-2022-a3d70b50f0
- FEDORA-2022-a3d70b50f0
- FEDORA-2022-48b86d586f
- FEDORA-2022-48b86d586f
- FEDORA-2022-30411cb3c4
- FEDORA-2022-30411cb3c4
- FEDORA-2022-1daf93c51d
- FEDORA-2022-1daf93c51d
- GLSA-202210-04
- GLSA-202210-04
- https://www.wireshark.org/security/wnpa-sec-2021-16.html
- https://www.wireshark.org/security/wnpa-sec-2021-16.html
Modified: 2024-11-21
CVE-2021-4190
Large loop in the Kafka dissector in Wireshark 3.6.0 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-4190.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2021/CVE-2021-4190.json
- https://gitlab.com/wireshark/wireshark/-/issues/17811
- https://gitlab.com/wireshark/wireshark/-/issues/17811
- FEDORA-2022-30411cb3c4
- FEDORA-2022-30411cb3c4
- FEDORA-2022-1daf93c51d
- FEDORA-2022-1daf93c51d
- GLSA-202210-04
- GLSA-202210-04
- https://www.wireshark.org/security/wnpa-sec-2021-22.html
- https://www.wireshark.org/security/wnpa-sec-2021-22.html
Package wolfssl updated to version 5.1.1-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-23408
wolfSSL 5.x before 5.1.1 uses non-random IV values in certain situations. This affects connections (without AEAD) using AES-CBC or DES3 with TLS 1.1 or 1.2 or DTLS 1.1 or 1.2. This occurs because of misplaced memory initialization in BuildMessage in internal.c.