ALT-BU-2023-7072-1
Branch sisyphus_mipsel update bulletin.
Package optipng updated to version 0.7.8-alt1 for branch sisyphus_mipsel.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2023-43907
OptiPNG v0.7.7 was discovered to contain a global buffer overflow via the 'buffer' variable at gifread.c.
- http://optipng.sourceforge.net/
- http://optipng.sourceforge.net/
- https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/optipng-global-buffer-overflow1/optipng-global-buffer-overflow1.md
- https://github.com/Frank-Z7/z-vulnerabilitys/blob/main/optipng-global-buffer-overflow1/optipng-global-buffer-overflow1.md
- FEDORA-2023-f3389245ce
- FEDORA-2023-f3389245ce
- FEDORA-2023-ae05c3bca8
- FEDORA-2023-ae05c3bca8
- FEDORA-2023-125037736c
- FEDORA-2023-125037736c
- https://sourceforge.net/projects/optipng/files/OptiPNG/optipng-0.7.7/optipng-0.7.7.tar.gz/download?use_mirror=udomain&download=
- https://sourceforge.net/projects/optipng/files/OptiPNG/optipng-0.7.7/optipng-0.7.7.tar.gz/download?use_mirror=udomain&download=
Package libetpan updated to version 1.9.4-alt4 for branch sisyphus_mipsel.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-15953
LibEtPan through 1.9.4, as used in MailCore 2 through 0.6.3 and other products, has a STARTTLS buffering issue that affects IMAP, SMTP, and POP3. When a server sends a "begin TLS" response, the client reads additional data (e.g., from a meddler-in-the-middle attacker) and evaluates it in a TLS context, aka "response injection."
- openSUSE-SU-2020:1454
- openSUSE-SU-2020:1454
- openSUSE-SU-2020:1505
- openSUSE-SU-2020:1505
- https://github.com/dinhvh/libetpan/issues/386
- https://github.com/dinhvh/libetpan/issues/386
- [debian-lts-announce] 20200816 [SECURITY] [DLA 2329-1] libetpan security update
- [debian-lts-announce] 20200816 [SECURITY] [DLA 2329-1] libetpan security update
- FEDORA-2020-44e52ef729
- FEDORA-2020-44e52ef729
- FEDORA-2020-13ae5f7221
- FEDORA-2020-13ae5f7221
- GLSA-202007-55
- GLSA-202007-55
Package setup updated to version 2.2.19-alt1 for branch sisyphus_mipsel.
Closed bugs
Обновить protocols, убрать ложный timestamp в файлах protocols и services
Package redis updated to version 7.2.3-alt1 for branch sisyphus_mipsel.
Closed vulnerabilities
BDU:2023-07323
Уязвимость сокета Unix системы управления базами данных Redis, связана с раскрытием информации в ошибочной области данных, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2024-11-21
CVE-2023-45145
Redis is an in-memory database that persists on disk. On startup, Redis begins listening on a Unix socket before adjusting its permissions to the user-provided configuration. If a permissive umask(2) is used, this creates a race condition that enables, during a short period of time, another process to establish an otherwise unauthorized connection. This problem has existed since Redis 2.6.0-RC1. This issue has been addressed in Redis versions 7.2.2, 7.0.14 and 6.2.14. Users are advised to upgrade. For users unable to upgrade, it is possible to work around the problem by disabling Unix sockets, starting Redis with a restrictive umask, or storing the Unix socket file in a protected directory.
- https://github.com/redis/redis/commit/03345ddc7faf7af079485f2cbe5d17a1611cbce1
- https://github.com/redis/redis/commit/03345ddc7faf7af079485f2cbe5d17a1611cbce1
- https://github.com/redis/redis/security/advisories/GHSA-ghmp-889m-7cvx
- https://github.com/redis/redis/security/advisories/GHSA-ghmp-889m-7cvx
- https://lists.debian.org/debian-lts-announce/2023/10/msg00032.html
- https://lists.debian.org/debian-lts-announce/2023/10/msg00032.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/464JPNBWE433ZGYXO3KN72VR3KJPWHAW/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/464JPNBWE433ZGYXO3KN72VR3KJPWHAW/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BNEK2K4IE7MPKRD6H36JXZMJKYS6I5GQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BNEK2K4IE7MPKRD6H36JXZMJKYS6I5GQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZMGTTV5XM4LA66FSIJSETNBBRRPJYOQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DZMGTTV5XM4LA66FSIJSETNBBRRPJYOQ/
- https://security.netapp.com/advisory/ntap-20231116-0014/
- https://security.netapp.com/advisory/ntap-20231116-0014/
Package netdata updated to version 1.43.2-alt1 for branch sisyphus_mipsel.
Closed bugs
Отсутствие файлов конфигурации в Netdata