ALT-BU-2024-4402-1
Branch c10f1 update bulletin.
Package nvidia-modprobe updated to version 550.54.14-alt1 for branch c10f1 in task 342238.
Closed bugs
Черный экран при входе пользователя из группы users
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-26505
A DNS rebinding issue in ReadyMedia (formerly MiniDLNA) before 1.3.1 allows a remote web server to exfiltrate media files.
- http://www.openwall.com/lists/oss-security/2022/03/06/1
- https://lists.debian.org/debian-lts-announce/2022/04/msg00005.html
- https://security.gentoo.org/glsa/202311-12
- https://sourceforge.net/p/minidlna/git/ci/c21208508dbc131712281ec5340687e5ae89e940/
- https://www.openwall.com/lists/oss-security/2022/03/03/1
- http://www.openwall.com/lists/oss-security/2022/03/06/1
- https://lists.debian.org/debian-lts-announce/2022/04/msg00005.html
- https://security.gentoo.org/glsa/202311-12
- https://sourceforge.net/p/minidlna/git/ci/c21208508dbc131712281ec5340687e5ae89e940/
- https://www.openwall.com/lists/oss-security/2022/03/03/1
Modified: 2025-01-08
CVE-2023-33476
ReadyMedia (MiniDLNA) versions from 1.1.15 up to 1.3.2 is vulnerable to Buffer Overflow. The vulnerability is caused by incorrect validation logic when handling HTTP requests using chunked transport encoding. This results in other code later using attacker-controlled chunk values that exceed the length of the allocated buffer, resulting in out-of-bounds read/write.
- https://blog.coffinsec.com/0day/2023/05/31/minidlna-heap-overflow-rca.html
- https://lists.debian.org/debian-lts-announce/2023/06/msg00027.html
- https://security.gentoo.org/glsa/202311-12
- https://sourceforge.net/p/minidlna/git/ci/9bd58553fae5aef3e6dd22f51642d2c851225aec/
- https://sourceforge.net/projects/minidlna/
- https://www.debian.org/security/2023/dsa-5434
- https://blog.coffinsec.com/0day/2023/05/31/minidlna-heap-overflow-rca.html
- https://lists.debian.org/debian-lts-announce/2023/06/msg00027.html
- https://security.gentoo.org/glsa/202311-12
- https://sourceforge.net/p/minidlna/git/ci/9bd58553fae5aef3e6dd22f51642d2c851225aec/
- https://sourceforge.net/projects/minidlna/
- https://www.debian.org/security/2023/dsa-5434
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-26592
Stack Overflow vulnerability in libsass 3.6.5 via the CompoundSelector::has_real_parent_ref function.
Closed vulnerabilities
Modified: 2025-03-05
BDU:2024-01014
Уязвимость реализации протокола TLS утилиты командной строки cURL, позволяющая нарушителю обойти ограничения безопасности и получить несанкционированный доступ к защищаемой информации
Modified: 2025-06-20
CVE-2024-0853
curl inadvertently kept the SSL session ID for connections in its cache even when the verify status (*OCSP stapling*) test failed. A subsequent transfer to the same hostname could then succeed if the session ID cache was still fresh, which then skipped the verify status check.
- https://curl.se/docs/CVE-2024-0853.html
- https://curl.se/docs/CVE-2024-0853.json
- https://hackerone.com/reports/2298922
- https://security.netapp.com/advisory/ntap-20240307-0004/
- https://security.netapp.com/advisory/ntap-20240426-0009/
- https://security.netapp.com/advisory/ntap-20240503-0012/
- https://curl.se/docs/CVE-2024-0853.html
- https://curl.se/docs/CVE-2024-0853.json
- https://hackerone.com/reports/2298922
- https://security.netapp.com/advisory/ntap-20240307-0004/
- https://security.netapp.com/advisory/ntap-20240426-0009/
- https://security.netapp.com/advisory/ntap-20240503-0012/