ALT-BU-2023-5736-1
Branch sisyphus_riscv64 update bulletin.
Package proftpd updated to version 1.3.8-alt0.1.ga3489a6c8 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2020-05776
Уязвимость реализации функции alloc_pool FTP-сервера ProFTPD, позволяющая нарушителю выполнить произвольный код
BDU:2023-05663
Уязвимость FTP-сервера ProFTPD , связанная с ошибкой освобождения памяти, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Modified: 2024-11-21
CVE-2020-9273
In ProFTPD 1.3.7, it is possible to corrupt the memory pool by interrupting the data transfer channel. This triggers a use-after-free in alloc_pool in pool.c, and possible remote code execution.
- openSUSE-SU-2020:0273
- openSUSE-SU-2020:0273
- [oss-security] 20210824 Possible memory leak on getspnam / getspnam_r
- [oss-security] 20210824 Possible memory leak on getspnam / getspnam_r
- [oss-security] 20210906 Re: Possible memory leak on getspnam / getspnam_r
- [oss-security] 20210906 Re: Possible memory leak on getspnam / getspnam_r
- https://cert-portal.siemens.com/productcert/pdf/ssa-679335.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-679335.pdf
- https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES
- https://github.com/proftpd/proftpd/blob/master/RELEASE_NOTES
- https://github.com/proftpd/proftpd/issues/903
- https://github.com/proftpd/proftpd/issues/903
- [debian-lts-announce] 20200221 [SECURITY] [DLA 2115-1] proftpd-dfsg security update
- [debian-lts-announce] 20200221 [SECURITY] [DLA 2115-1] proftpd-dfsg security update
- [debian-lts-announce] 20200302 [SECURITY] [DLA 2115-2] proftpd-dfsg regression update
- [debian-lts-announce] 20200302 [SECURITY] [DLA 2115-2] proftpd-dfsg regression update
- FEDORA-2020-876b1f664e
- FEDORA-2020-876b1f664e
- FEDORA-2020-76c707cff0
- FEDORA-2020-76c707cff0
- GLSA-202003-35
- GLSA-202003-35
- DSA-4635
- DSA-4635
Modified: 2024-11-21
CVE-2021-46854
mod_radius in ProFTPD before 1.3.7c allows memory disclosure to RADIUS servers because it copies blocks of 16 characters.
- http://www.proftpd.org/docs/RELEASE_NOTES-1.3.7e
- http://www.proftpd.org/docs/RELEASE_NOTES-1.3.7e
- https://bugs.gentoo.org/811495
- https://bugs.gentoo.org/811495
- https://github.com/proftpd/proftpd/issues/1284
- https://github.com/proftpd/proftpd/issues/1284
- https://github.com/proftpd/proftpd/pull/1285
- https://github.com/proftpd/proftpd/pull/1285
- GLSA-202305-03
- GLSA-202305-03
Package curl updated to version 8.3.0-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2023-38039
When curl retrieves an HTTP response, it stores the incoming headers so that they can be accessed later via the libcurl headers API. However, curl did not have a limit in how many or how large headers it would accept in a response, allowing a malicious server to stream an endless series of headers and eventually cause curl to run out of heap memory.
- http://seclists.org/fulldisclosure/2023/Oct/17
- http://seclists.org/fulldisclosure/2023/Oct/17
- http://seclists.org/fulldisclosure/2024/Jan/34
- http://seclists.org/fulldisclosure/2024/Jan/34
- http://seclists.org/fulldisclosure/2024/Jan/37
- http://seclists.org/fulldisclosure/2024/Jan/37
- http://seclists.org/fulldisclosure/2024/Jan/38
- http://seclists.org/fulldisclosure/2024/Jan/38
- https://hackerone.com/reports/2072338
- https://hackerone.com/reports/2072338
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DCZMYODALBLVOXVJEN2LF2MLANEYL4F/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5DCZMYODALBLVOXVJEN2LF2MLANEYL4F/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6KGKB2JNZVT276JYSKI6FV2VFJUGDOJ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/M6KGKB2JNZVT276JYSKI6FV2VFJUGDOJ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEAWTYHC3RT6ZRS5OZRHLAIENVN6CCIS/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TEAWTYHC3RT6ZRS5OZRHLAIENVN6CCIS/
- https://security.gentoo.org/glsa/202310-12
- https://security.gentoo.org/glsa/202310-12
- https://security.netapp.com/advisory/ntap-20231013-0005/
- https://security.netapp.com/advisory/ntap-20231013-0005/
- https://support.apple.com/kb/HT214036
- https://support.apple.com/kb/HT214036
- https://support.apple.com/kb/HT214057
- https://support.apple.com/kb/HT214057
- https://support.apple.com/kb/HT214058
- https://support.apple.com/kb/HT214058
- https://support.apple.com/kb/HT214063
- https://support.apple.com/kb/HT214063
- https://www.insyde.com/security-pledge/SA-2023064
- https://www.insyde.com/security-pledge/SA-2023064
Package ffmpeg updated to version 6.0-alt2 for branch sisyphus_riscv64.
Closed bugs
Не хватает поддержки фильтра zscale