ALT-BU-2022-6080-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-31001
Sofia-SIP is an open-source Session Initiation Protocol (SIP) User-Agent library. Prior to version 1.13.8, an attacker can send a message with evil sdp to FreeSWITCH, which may cause crash. This type of crash may be caused by `#define MATCH(s, m) (strncmp(s, m, n = sizeof(m) - 1) == 0)`, which will make `n` bigger and trigger out-of-bound access when `IS_NON_WS(s[n])`. Version 1.13.8 contains a patch for this issue.
- https://github.com/freeswitch/sofia-sip/commit/a99804b336d0e16d26ab7119d56184d2d7110a36
- https://github.com/freeswitch/sofia-sip/commit/a99804b336d0e16d26ab7119d56184d2d7110a36
- https://github.com/freeswitch/sofia-sip/security/advisories/GHSA-79jq-hh82-cv9g
- https://github.com/freeswitch/sofia-sip/security/advisories/GHSA-79jq-hh82-cv9g
- [debian-lts-announce] 20220902 [SECURITY] [DLA 3091-1] sofia-sip security update
- [debian-lts-announce] 20220902 [SECURITY] [DLA 3091-1] sofia-sip security update
- GLSA-202210-18
- GLSA-202210-18
- DSA-5410
- DSA-5410
Package zoneminder updated to version 1.36.25-alt1 for branch sisyphus in task 306383.
Closed vulnerabilities
BDU:2023-01774
Уязвимость программного обеспечения для организации видеонаблюдения ZoneMinder, связанная с неверным ограничением имени пути к каталогу с ограниченным доступом, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2022-29806
ZoneMinder before 1.36.13 allows remote code execution via an invalid language. Ability to create a debug log file at an arbitrary pathname contributes to exploitability.
- http://packetstormsecurity.com/files/166980/ZoneMinder-Language-Settings-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/166980/ZoneMinder-Language-Settings-Remote-Code-Execution.html
- https://forums.zoneminder.com/viewtopic.php?t=31638
- https://forums.zoneminder.com/viewtopic.php?t=31638
- https://github.com/ZoneMinder/zoneminder/commit/9fee64b62fbdff5bf5ece1d617f1f53c7b1967cb
- https://github.com/ZoneMinder/zoneminder/commit/9fee64b62fbdff5bf5ece1d617f1f53c7b1967cb
- https://github.com/ZoneMinder/zoneminder/releases/tag/1.36.13
- https://github.com/ZoneMinder/zoneminder/releases/tag/1.36.13
- https://krastanoel.com/cve/2022-29806
- https://krastanoel.com/cve/2022-29806
Modified: 2024-11-21
CVE-2022-30768
A Stored Cross Site Scripting (XSS) issue in ZoneMinder 1.36.12 allows an attacker to execute HTML or JavaScript code via the Username field when an Admin (or non-Admin users that can see other users logged into the platform) clicks on Logout. NOTE: this exists in later versions than CVE-2019-7348 and requires a different attack method.
Modified: 2024-11-21
CVE-2022-30769
Session fixation exists in ZoneMinder through 1.36.12 as an attacker can poison a session cookie to the next logged-in user.
Closed bugs
Взаимоблокировка (?) resolvconf и dnsmasq-helper при подключении/отключении интерфейса через NetworkManager
Closed bugs
пара недочетов в работе epm
epm play teamviewer: программа не запускается на Workstation 10