ALT-BU-2024-11562-1
Branch sisyphus_loongarch64 update bulletin.
Package strongswan updated to version 5.9.14-alt4 for branch sisyphus_loongarch64.
Closed bugs
Не устанавливается соединение после обновления до 5.9.14-alt2
Package qbittorrent updated to version 4.6.6-alt1 for branch sisyphus_loongarch64.
Closed bugs
Не хватает пакета в зависимостях для отображения иконок в приложении
Package 389-ds-base updated to version 2.4.6-alt0.port for branch sisyphus_loongarch64.
Closed vulnerabilities
BDU:2023-04786
Уязвимость плагина Content Synchronization сервера службы каталогов 389 Directory Server, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2022-2850
A flaw was found In 389-ds-base. When the Content Synchronization plugin is enabled, an authenticated user can reach a NULL pointer dereference using a specially crafted query. This flaw allows an authenticated attacker to cause a denial of service. This CVE is assigned against an incomplete fix of CVE-2021-3514.
- https://access.redhat.com/security/cve/CVE-2022-2850
- https://access.redhat.com/security/cve/CVE-2022-2850
- https://bugzilla.redhat.com/show_bug.cgi?id=2118691
- https://bugzilla.redhat.com/show_bug.cgi?id=2118691
- https://lists.debian.org/debian-lts-announce/2023/04/msg00026.html
- https://lists.debian.org/debian-lts-announce/2023/04/msg00026.html
Modified: 2025-02-18
CVE-2024-2199
A denial of service vulnerability was found in 389-ds-base ldap server. This issue may allow an authenticated user to cause a server crash while modifying `userPassword` using malformed input.
- RHSA-2024:3591
- RHSA-2024:3591
- RHSA-2024:3837
- RHSA-2024:3837
- RHSA-2024:4092
- RHSA-2024:4092
- RHSA-2024:4209
- RHSA-2024:4209
- RHSA-2024:4210
- RHSA-2024:4210
- RHSA-2024:4235
- RHSA-2024:4235
- RHSA-2024:4633
- RHSA-2024:4633
- RHSA-2024:5690
- RHSA-2025:1632
- https://access.redhat.com/security/cve/CVE-2024-2199
- https://access.redhat.com/security/cve/CVE-2024-2199
- RHBZ#2267976
- RHBZ#2267976
Modified: 2025-02-18
CVE-2024-3657
A flaw was found in 389-ds-base. A specially-crafted LDAP query can potentially cause a failure on the directory server, leading to a denial of service
- RHSA-2024:3591
- RHSA-2024:3591
- RHSA-2024:3837
- RHSA-2024:3837
- RHSA-2024:4092
- RHSA-2024:4092
- RHSA-2024:4209
- RHSA-2024:4209
- RHSA-2024:4210
- RHSA-2024:4210
- RHSA-2024:4235
- RHSA-2024:4235
- RHSA-2024:4633
- RHSA-2024:4633
- RHSA-2024:5690
- RHSA-2024:6576
- RHSA-2024:7458
- RHSA-2025:1632
- https://access.redhat.com/security/cve/CVE-2024-3657
- https://access.redhat.com/security/cve/CVE-2024-3657
- RHBZ#2274401
- RHBZ#2274401
Modified: 2025-02-18
CVE-2024-5953
A denial of service vulnerability was found in the 389-ds-base LDAP server. This issue may allow an authenticated user to cause a server denial of service while attempting to log in with a user with a malformed hash in their password.
Modified: 2024-11-21
CVE-2024-6237
A flaw was found in the 389 Directory Server. This flaw allows an unauthenticated user to cause a systematic server crash while sending a specific extended search request, leading to a denial of service.
Package frr updated to version 10.1-alt1 for branch sisyphus_loongarch64.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2024-34088
In FRRouting (FRR) through 9.1, it is possible for the get_edge() function in ospf_te.c in the OSPF daemon to return a NULL pointer. In cases where calling functions do not handle the returned NULL value, the OSPF daemon crashes, leading to denial of service.