ALT-BU-2022-4437-1
Branch sisyphus_mipsel update bulletin.
Package strongswan updated to version 5.9.5-alt1 for branch sisyphus_mipsel.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-45079
In strongSwan before 5.9.5, a malicious responder can send an EAP-Success message too early without actually authenticating the client and (in the case of EAP methods with mutual authentication and EAP-only authentication for IKEv2) even without server authentication.
Package gnome-builder updated to version 42.0-alt1 for branch sisyphus_mipsel.
Closed bugs
Кнопка Начать новый проект -> нет пробела между словами
Package eepm updated to version 3.15.3-alt1 for branch sisyphus_mipsel.
Closed bugs
Удаляет chromium-gost
Package python3-module-zmq updated to version 22.3.0-alt4 for branch sisyphus_mipsel.
Closed bugs
python3-module-zmq-22.3.0-alt3 сломал пересборку примерно десятка пакетов на python3
Package squashfs-tools updated to version 4.5.1-alt1 for branch sisyphus_mipsel.
Closed vulnerabilities
BDU:2021-05217
Уязвимость функции squashfs_opendir компонента unsquash-1.c набора инструментов для создания и извлечения файловых систем Squashfs Squashfs-Tools, связанная с недостатками ограничения имени пути к каталогу, позволяющая нарушителю нарушить целостность данных, а также вызвать отказ в обслуживании
BDU:2021-06307
Уязвимость функции squashfs_opendir компонента unsquash-2.c набора инструментов для создания и извлечения файловых систем Squashfs Squashfs-Tools, связанная с неверным определением символических ссылок перед доступом к файлу, позволяющая нарушителю нарушить целостность данных, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-40153
squashfs_opendir in unsquash-1.c in Squashfs-Tools 4.5 stores the filename in the directory entry; this is then used by unsquashfs to create the new file during the unsquash. The filename is not validated for traversal outside of the destination directory, and thus allows writing to locations outside of the destination.
- https://bugs.launchpad.net/ubuntu/+source/squashfs-tools/+bug/1941790
- https://bugs.launchpad.net/ubuntu/+source/squashfs-tools/+bug/1941790
- https://github.com/plougher/squashfs-tools/commit/79b5a555058eef4e1e7ff220c344d39f8cd09646
- https://github.com/plougher/squashfs-tools/commit/79b5a555058eef4e1e7ff220c344d39f8cd09646
- https://github.com/plougher/squashfs-tools/issues/72
- https://github.com/plougher/squashfs-tools/issues/72
- [debian-lts-announce] 20210831 [SECURITY] [DLA 2752-1] squashfs-tools security update
- [debian-lts-announce] 20210831 [SECURITY] [DLA 2752-1] squashfs-tools security update
- FEDORA-2021-9fb6da134f
- FEDORA-2021-9fb6da134f
- FEDORA-2021-cdbd827c1e
- FEDORA-2021-cdbd827c1e
- GLSA-202305-29
- GLSA-202305-29
- DSA-4967
- DSA-4967
Modified: 2024-11-21
CVE-2021-41072
squashfs_opendir in unsquash-2.c in Squashfs-Tools 4.5 allows Directory Traversal, a different vulnerability than CVE-2021-40153. A squashfs filesystem that has been crafted to include a symbolic link and then contents under the same filename in a filesystem can cause unsquashfs to first create the symbolic link pointing outside the expected directory, and then the subsequent write operation will cause the unsquashfs process to write through the symbolic link elsewhere in the filesystem.
- https://github.com/plougher/squashfs-tools/commit/e0485802ec72996c20026da320650d8362f555bd
- https://github.com/plougher/squashfs-tools/commit/e0485802ec72996c20026da320650d8362f555bd
- https://github.com/plougher/squashfs-tools/issues/72#issuecomment-913833405
- https://github.com/plougher/squashfs-tools/issues/72#issuecomment-913833405
- [debian-lts-announce] 20211020 [SECURITY] [DLA 2789-1] squashfs-tools security update
- [debian-lts-announce] 20211020 [SECURITY] [DLA 2789-1] squashfs-tools security update
- GLSA-202305-29
- GLSA-202305-29
- DSA-4987
- DSA-4987
Package crun updated to version 1.4.4-alt1 for branch sisyphus_mipsel.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-27650
A flaw was found in crun where containers were incorrectly started with non-empty default permissions. A vulnerability was found in Moby (Docker Engine) where containers were started incorrectly with non-empty inheritable Linux process capabilities. This flaw allows an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs.
- https://bugzilla.redhat.com/show_bug.cgi?id=2066845
- https://bugzilla.redhat.com/show_bug.cgi?id=2066845
- https://github.com/containers/crun/commit/1aeeed2e4fdeffb4875c0d0b439915894594c8c6
- https://github.com/containers/crun/commit/1aeeed2e4fdeffb4875c0d0b439915894594c8c6
- https://github.com/containers/crun/security/advisories/GHSA-wr4f-w546-m398
- https://github.com/containers/crun/security/advisories/GHSA-wr4f-w546-m398
- FEDORA-2022-10fd054d40
- FEDORA-2022-10fd054d40
Package kiwix-lib updated to version 10.1.0-alt1 for branch sisyphus_mipsel.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-27920
libkiwix 10.0.0 and 10.0.1 allows XSS in the built-in webserver functionality via the search suggestions URL parameter. This is fixed in 10.1.0.
Package libisoburn updated to version 1.5.4-alt2 for branch sisyphus_mipsel.
Closed bugs
xorriso requires sudo
Package bluez updated to version 5.64-alt1 for branch sisyphus_mipsel.
Closed vulnerabilities
BDU:2022-05666
Уязвимость реализации протокола GATT (Generic ATTribute Profile) стека протоколов Bluetooth для ОС Linux BlueZ, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
Modified: 2024-11-21
CVE-2022-0204
A heap overflow vulnerability was found in bluez in versions prior to 5.63. An attacker with local network access could pass specially crafted files causing an application to halt or crash, leading to a denial of service.
- https://bugzilla.redhat.com/show_bug.cgi?id=2039807
- https://bugzilla.redhat.com/show_bug.cgi?id=2039807
- https://github.com/bluez/bluez/commit/591c546c536b42bef696d027f64aa22434f8c3f0
- https://github.com/bluez/bluez/commit/591c546c536b42bef696d027f64aa22434f8c3f0
- https://github.com/bluez/bluez/security/advisories/GHSA-479m-xcq5-9g2q
- https://github.com/bluez/bluez/security/advisories/GHSA-479m-xcq5-9g2q
- [debian-lts-announce] 20221024 [SECURITY] [DLA 3157-1] bluez security update
- [debian-lts-announce] 20221024 [SECURITY] [DLA 3157-1] bluez security update
- GLSA-202209-16
- GLSA-202209-16