ALT-BU-2025-11681-1
Branch c10f2 update bulletin.
Package python3-module-krb5 updated to version 0.5.1-alt1.c10f2.1 for branch c10f2 in task 394067.
Closed vulnerabilities
No data currently available.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-41043
Use after free in tcpslice triggers AddressSanitizer, no other confirmed impact.
Closed vulnerabilities
Modified: 2025-05-14
CVE-2024-52616
A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs.
Package apache2-mod_perl updated to version 2.0.13-alt1 for branch c10f2 in task 394602.
Closed vulnerabilities
BDU:2022-02598
Уязвимость компонентов PerlRun.pm и RegistryCooker.pm модуль для веб-сервера Apache mod_perl, позволяющие нарушителю вызвать отказ в обслуживании
Modified: 2025-04-09
CVE-2007-1349
PerlRun.pm in Apache mod_perl before 1.30, and RegistryCooker.pm in mod_perl 2.x, does not properly escape PATH_INFO before use in a regular expression, which allows remote attackers to cause a denial of service (resource consumption) via a crafted URI.
- ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc
- http://rhn.redhat.com/errata/RHSA-2007-0395.html
- http://rhn.redhat.com/errata/RHSA-2008-0630.html
- http://secunia.com/advisories/24678
- http://secunia.com/advisories/24839
- http://secunia.com/advisories/25072
- http://secunia.com/advisories/25110
- http://secunia.com/advisories/25432
- http://secunia.com/advisories/25655
- http://secunia.com/advisories/25730
- http://secunia.com/advisories/25894
- http://secunia.com/advisories/26084
- http://secunia.com/advisories/26231
- http://secunia.com/advisories/26290
- http://secunia.com/advisories/31490
- http://secunia.com/advisories/31493
- http://secunia.com/advisories/33720
- http://secunia.com/advisories/33723
- http://security.gentoo.org/glsa/glsa-200705-04.xml
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-248386-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021508.1-1
- http://support.avaya.com/elmodocs2/security/ASA-2007-293.htm
- http://svn.apache.org/repos/asf/perl/modperl/branches/1.x/Changes
- http://www.gossamer-threads.com/lists/modperl/modperl/92739
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:083
- http://www.novell.com/linux/security/advisories/2007_12_sr.html
- http://www.novell.com/linux/security/advisories/2007_8_sr.html
- http://www.redhat.com/support/errata/RHSA-2007-0396.html
- http://www.redhat.com/support/errata/RHSA-2007-0486.html
- http://www.redhat.com/support/errata/RHSA-2008-0261.html
- http://www.redhat.com/support/errata/RHSA-2008-0627.html
- http://www.securityfocus.com/bid/23192
- http://www.securitytracker.com/id?1018259
- http://www.trustix.org/errata/2007/0023/
- http://www.ubuntu.com/usn/usn-488-1
- http://www.vupen.com/english/advisories/2007/1150
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33312
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10987
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8349
- ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc
- http://rhn.redhat.com/errata/RHSA-2007-0395.html
- http://rhn.redhat.com/errata/RHSA-2008-0630.html
- http://secunia.com/advisories/24678
- http://secunia.com/advisories/24839
- http://secunia.com/advisories/25072
- http://secunia.com/advisories/25110
- http://secunia.com/advisories/25432
- http://secunia.com/advisories/25655
- http://secunia.com/advisories/25730
- http://secunia.com/advisories/25894
- http://secunia.com/advisories/26084
- http://secunia.com/advisories/26231
- http://secunia.com/advisories/26290
- http://secunia.com/advisories/31490
- http://secunia.com/advisories/31493
- http://secunia.com/advisories/33720
- http://secunia.com/advisories/33723
- http://security.gentoo.org/glsa/glsa-200705-04.xml
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-248386-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021508.1-1
- http://support.avaya.com/elmodocs2/security/ASA-2007-293.htm
- http://svn.apache.org/repos/asf/perl/modperl/branches/1.x/Changes
- http://www.gossamer-threads.com/lists/modperl/modperl/92739
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:083
- http://www.novell.com/linux/security/advisories/2007_12_sr.html
- http://www.novell.com/linux/security/advisories/2007_8_sr.html
- http://www.redhat.com/support/errata/RHSA-2007-0396.html
- http://www.redhat.com/support/errata/RHSA-2007-0486.html
- http://www.redhat.com/support/errata/RHSA-2008-0261.html
- http://www.redhat.com/support/errata/RHSA-2008-0627.html
- http://www.securityfocus.com/bid/23192
- http://www.securitytracker.com/id?1018259
- http://www.trustix.org/errata/2007/0023/
- http://www.ubuntu.com/usn/usn-488-1
- http://www.vupen.com/english/advisories/2007/1150
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33312
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10987
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8349
Closed bugs
apache2-mod_perl: update to 2.0.13 to support perl 5.38
Closed vulnerabilities
BDU:2015-02023
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2025-04-12
CVE-2001-1593
The tempname_ensure function in lib/routines.h in a2ps 4.14 and earlier, as used by the spy_user function and possibly other functions, allows local users to modify arbitrary files via a symlink attack on a temporary file.
- http://pkgs.fedoraproject.org/cgit/a2ps.git/plain/a2ps-4.13-security.patch
- http://seclists.org/oss-sec/2014/q1/237
- http://seclists.org/oss-sec/2014/q1/253
- http://seclists.org/oss-sec/2014/q1/257
- http://www.debian.org/security/2014/dsa-2892
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737385
- https://bugzilla.redhat.com/show_bug.cgi?id=1060630
- http://pkgs.fedoraproject.org/cgit/a2ps.git/plain/a2ps-4.13-security.patch
- http://seclists.org/oss-sec/2014/q1/237
- http://seclists.org/oss-sec/2014/q1/253
- http://seclists.org/oss-sec/2014/q1/257
- http://www.debian.org/security/2014/dsa-2892
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=737385
- https://bugzilla.redhat.com/show_bug.cgi?id=1060630
Modified: 2025-04-12
CVE-2014-0466
The fixps script in a2ps 4.14 does not use the -dSAFER option when executing gs, which allows context-dependent attackers to delete arbitrary files or execute arbitrary commands via a crafted PostScript file.
- http://lists.opensuse.org/opensuse-updates/2014-04/msg00021.html
- http://www.debian.org/security/2014/dsa-2892
- http://www.securityfocus.com/bid/66660
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742902
- https://security.gentoo.org/glsa/201701-67
- http://lists.opensuse.org/opensuse-updates/2014-04/msg00021.html
- http://www.debian.org/security/2014/dsa-2892
- http://www.securityfocus.com/bid/66660
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742902
- https://security.gentoo.org/glsa/201701-67
Modified: 2025-04-20
CVE-2015-8107
Format string vulnerability in GNU a2ps 4.14 allows remote attackers to execute arbitrary code.