ALT-BU-2023-4958-1
Branch sisyphus update bulletin.
Package multimon-ng updated to version 1.2.0-alt1 for branch sisyphus in task 327199.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-36619
A vulnerability was found in multimon-ng. It has been rated as critical. This issue affects the function add_ch of the file demod_flex.c. The manipulation of the argument ch leads to format string. Upgrading to version 1.2.0 is able to address this issue. The name of the patch is e5a51c508ef952e81a6da25b43034dd1ed023c07. It is recommended to upgrade the affected component. The identifier VDB-216269 was assigned to this vulnerability.
- https://github.com/EliasOenal/multimon-ng/commit/e5a51c508ef952e81a6da25b43034dd1ed023c07
- https://github.com/EliasOenal/multimon-ng/commit/e5a51c508ef952e81a6da25b43034dd1ed023c07
- https://github.com/EliasOenal/multimon-ng/pull/160
- https://github.com/EliasOenal/multimon-ng/pull/160
- https://github.com/EliasOenal/multimon-ng/releases/tag/1.2.0
- https://github.com/EliasOenal/multimon-ng/releases/tag/1.2.0
- https://vuldb.com/?id.216269
- https://vuldb.com/?id.216269
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-47012
Use of uninitialized variable in function gen_eth_recv in GNS3 dynamips 0.2.21.
Closed bugs
python3-module-zeitgeist2.0 приобретает unmet при пересборке
Package docs-alt-server updated to version 10.1-alt17 for branch sisyphus in task 327222.
Closed bugs
Пунктуационные и орфографические ошибки в docs-alt-server
Closed vulnerabilities
BDU:2022-06395
Уязвимость библиотеки предоставляющей функции для работы с сертификатами X.509 LibKSBA, связанная с целочисленным переполнением в синтаксическом анализаторе CRL, позволяющая нарушителю выполнить произвольный код в целевой системе
BDU:2023-03850
Уязвимость функции write_status_text_and_buffer компонента cpr.c программы для шифрования информации и создания электронных цифровых подписей GnuPG, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность
Modified: 2024-11-21
CVE-2022-34903
GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim's keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery via injection into the status line.
- [oss-security] 20220702 Re: GnuPG signature spoofing via status line injection
- [oss-security] 20220702 Re: GnuPG signature spoofing via status line injection
- https://bugs.debian.org/1014157
- https://bugs.debian.org/1014157
- https://dev.gnupg.org/T6027
- https://dev.gnupg.org/T6027
- FEDORA-2022-0dbfb7e270
- FEDORA-2022-0dbfb7e270
- FEDORA-2022-aa14d396dd
- FEDORA-2022-aa14d396dd
- FEDORA-2022-1124e5882d
- FEDORA-2022-1124e5882d
- FEDORA-2022-1747eea46c
- FEDORA-2022-1747eea46c
- https://security.netapp.com/advisory/ntap-20220826-0005/
- https://security.netapp.com/advisory/ntap-20220826-0005/
- DSA-5174
- DSA-5174
- https://www.openwall.com/lists/oss-security/2022/06/30/1
- https://www.openwall.com/lists/oss-security/2022/06/30/1
Modified: 2024-11-21
CVE-2022-3515
A vulnerability was found in the Libksba library due to an integer overflow within the CRL parser. The vulnerability can be exploited remotely for code execution on the target system by passing specially crafted data to the application, for example, a malicious S/MIME attachment.
- https://access.redhat.com/security/cve/CVE-2022-3515
- https://access.redhat.com/security/cve/CVE-2022-3515
- https://bugzilla.redhat.com/show_bug.cgi?id=2135610
- https://bugzilla.redhat.com/show_bug.cgi?id=2135610
- https://dev.gnupg.org/rK4b7d9cd4a018898d7714ce06f3faf2626c14582b
- https://dev.gnupg.org/rK4b7d9cd4a018898d7714ce06f3faf2626c14582b
- https://security.netapp.com/advisory/ntap-20230706-0008/
- https://security.netapp.com/advisory/ntap-20230706-0008/
- https://www.gnupg.org/blog/20221017-pepe-left-the-ksba.html
- https://www.gnupg.org/blog/20221017-pepe-left-the-ksba.html