ALT-BU-2022-6511-1
Branch sisyphus_mipsel update bulletin.
Package python3-module-paramiko updated to version 2.11.0-alt1 for branch sisyphus_mipsel.
Closed vulnerabilities
BDU:2022-01897
Уязвимость реализации протокола SSHv2 библиотеки Paramiko, связанная с ошибками синхронизации при использовании общего ресурса, позволяющая нарушителю получить доступ к конфиденциальной информации
Modified: 2024-11-21
CVE-2022-24302
In Paramiko before 2.10.1, a race condition (between creation and chmod) in the write_private_key_file function could allow unauthorized information disclosure.
- https://github.com/paramiko/paramiko/blob/363a28d94cada17f012c1604a3c99c71a2bda003/paramiko/pkey.py#L546
- https://github.com/paramiko/paramiko/blob/363a28d94cada17f012c1604a3c99c71a2bda003/paramiko/pkey.py#L546
- [debian-lts-announce] 20220321 [SECURITY] [DLA 2959-1] paramiko security update
- [debian-lts-announce] 20220321 [SECURITY] [DLA 2959-1] paramiko security update
- [debian-lts-announce] 20220912 [SECURITY] [DLA 3104-1] paramiko security update
- [debian-lts-announce] 20220912 [SECURITY] [DLA 3104-1] paramiko security update
- FEDORA-2022-8eb95d8611
- FEDORA-2022-8eb95d8611
- FEDORA-2022-806492f1d1
- FEDORA-2022-806492f1d1
- FEDORA-2022-bb5c461682
- FEDORA-2022-bb5c461682
- https://www.paramiko.org/changelog.html
- https://www.paramiko.org/changelog.html
Package unzip updated to version 6.0-alt5 for branch sisyphus_mipsel.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-4217
A flaw was found in unzip. The vulnerability occurs due to improper handling of Unicode strings, which can lead to a null pointer dereference. This flaw allows an attacker to input a specially crafted zip file, leading to a crash or code execution.
- https://access.redhat.com/security/cve/CVE-2021-4217
- https://access.redhat.com/security/cve/CVE-2021-4217
- https://bugs.launchpad.net/ubuntu/+source/unzip/+bug/1957077
- https://bugs.launchpad.net/ubuntu/+source/unzip/+bug/1957077
- https://bugzilla.redhat.com/show_bug.cgi?id=2044583
- https://bugzilla.redhat.com/show_bug.cgi?id=2044583
Package lrzsz updated to version 0.12.20-alt2 for branch sisyphus_mipsel.
Closed vulnerabilities
BDU:2021-04617
Уязвимость функции zsdata инструментов для передачи файлов zmodem/xmodem/ymodem Lrzsz, связанная с целочисленным переполнением, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-10195
lrzsz before version 0.12.21~rc can leak information to the receiving side due to an incorrect length check in the function zsdata that causes a size_t to wrap around.
- http://www.ohse.de/uwe/software/lrzsz.html
- http://www.ohse.de/uwe/software/lrzsz.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1572058
- https://bugzilla.redhat.com/show_bug.cgi?id=1572058
- [debian-lts-announce] 20220125 [SECURITY] [DLA 2900-1] lrzsz security update
- [debian-lts-announce] 20220125 [SECURITY] [DLA 2900-1] lrzsz security update
- https://lists.suse.com/pipermail/sle-security-updates/2018-April/003955.html?_ga=2.81625751.1026327980.1622040648-1950393542.1547130931
- https://lists.suse.com/pipermail/sle-security-updates/2018-April/003955.html?_ga=2.81625751.1026327980.1622040648-1950393542.1547130931
- https://lists.suse.com/pipermail/sle-security-updates/2018-April/003956.html?_ga=2.81625751.1026327980.1622040648-1950393542.1547130931
- https://lists.suse.com/pipermail/sle-security-updates/2018-April/003956.html?_ga=2.81625751.1026327980.1622040648-1950393542.1547130931