ALT-BU-2014-2724-1
Branch c7 update bulletin.
Package pcmanfm-qt updated to version 0.1.0-alt3.M70P.1.gitf58b1b7 for branch c7 in task 118378.
Closed bugs
избыточные зависимости
Package phpMyAdmin updated to version 4.0.9-alt0.M70P.1 for branch c7 in task 118378.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2013-1937
Multiple cross-site scripting (XSS) vulnerabilities in tbl_gis_visualization.php in phpMyAdmin 3.5.x before 3.5.8 might allow remote attackers to inject arbitrary web script or HTML via the (1) visualizationSettings[width] or (2) visualizationSettings[height] parameter. NOTE: a third party reports that this is "not exploitable.
- 20130409 [waraxe-2013-SA#102] - Reflected XSS in phpMyAdmin 3.5.7
- 20130409 [waraxe-2013-SA#102] - Reflected XSS in phpMyAdmin 3.5.7
- http://immunityservices.blogspot.com/2019/02/cvss.html
- http://immunityservices.blogspot.com/2019/02/cvss.html
- FEDORA-2013-5620
- FEDORA-2013-5620
- FEDORA-2013-5623
- FEDORA-2013-5623
- FEDORA-2013-5604
- FEDORA-2013-5604
- openSUSE-SU-2013:1065
- openSUSE-SU-2013:1065
- [oss-security] 20130409 Re: CVE Request: Self-XSS in phpmyadmin fixed in 3.5.8
- [oss-security] 20130409 Re: CVE Request: Self-XSS in phpmyadmin fixed in 3.5.8
- http://packetstormsecurity.com/files/121205/phpMyAdmin-3.5.7-Cross-Site-Scripting.html
- http://packetstormsecurity.com/files/121205/phpMyAdmin-3.5.7-Cross-Site-Scripting.html
- MDVSA-2013:144
- MDVSA-2013:144
- http://www.phpmyadmin.net/home_page/security/PMASA-2013-1.php
- http://www.phpmyadmin.net/home_page/security/PMASA-2013-1.php
- http://www.waraxe.us/advisory-102.html
- http://www.waraxe.us/advisory-102.html
- https://github.com/phpmyadmin/phpmyadmin/commit/79089c9bc02c82c15419fd9d6496b8781ae08a5a
- https://github.com/phpmyadmin/phpmyadmin/commit/79089c9bc02c82c15419fd9d6496b8781ae08a5a
Modified: 2024-11-21
CVE-2013-4995
Cross-site scripting (XSS) vulnerability in phpMyAdmin 3.5.x before 3.5.8.2 and 4.0.x before 4.0.4.2 allows remote authenticated users to inject arbitrary web script or HTML via a crafted SQL query that is not properly handled during the display of row information.
Modified: 2024-11-21
CVE-2013-4996
Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 3.5.x before 3.5.8.2 and 4.0.x before 4.0.4.2 allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) a crafted database name, (2) a crafted user name, (3) a crafted logo URL in the navigation panel, (4) a crafted entry in a certain proxy list, or (5) crafted content in a version.json file.
Modified: 2024-11-21
CVE-2013-4997
Multiple cross-site scripting (XSS) vulnerabilities in phpMyAdmin 3.5.x before 3.5.8.2 allow remote attackers to inject arbitrary web script or HTML via vectors involving a JavaScript event in (1) an anchor identifier to setup/index.php or (2) a chartTitle (aka chart title) value.
Modified: 2024-11-21
CVE-2013-4998
phpMyAdmin 3.5.x before 3.5.8.2 and 4.0.x before 4.0.4.2 allows remote attackers to obtain sensitive information via an invalid request, which reveals the installation path in an error message, related to pmd_common.php and other files.
Modified: 2024-11-21
CVE-2013-5000
phpMyAdmin 3.5.x before 3.5.8.2 allows remote attackers to obtain sensitive information via an invalid request, which reveals the installation path in an error message, related to config.default.php and other files.
Modified: 2024-11-21
CVE-2013-5002
Cross-site scripting (XSS) vulnerability in libraries/schema/Export_Relation_Schema.class.php in phpMyAdmin 3.5.x before 3.5.8.2 and 4.0.x before 4.0.4.2 allows remote authenticated users to inject arbitrary web script or HTML via a crafted pageNumber value to schema_export.php.
Modified: 2024-11-21
CVE-2013-5003
Multiple SQL injection vulnerabilities in phpMyAdmin 3.5.x before 3.5.8.2 and 4.0.x before 4.0.4.2 allow remote authenticated users to execute arbitrary SQL commands via (1) the scale parameter to pmd_pdf.php or (2) the pdf_page_number parameter to schema_export.php.
Modified: 2024-11-21
CVE-2013-5029
phpMyAdmin 3.5.x and 4.0.x before 4.0.5 allows remote attackers to bypass the clickjacking protection mechanism via certain vectors related to Header.class.php.
- openSUSE-SU-2013:1343
- openSUSE-SU-2013:1343
- 54488
- 54488
- http://www.phpmyadmin.net/home_page/security/PMASA-2013-10.php
- http://www.phpmyadmin.net/home_page/security/PMASA-2013-10.php
- https://github.com/phpmyadmin/phpmyadmin/commit/240b8332db53dedc27baeec5306dabad3bdece3b
- https://github.com/phpmyadmin/phpmyadmin/commit/240b8332db53dedc27baeec5306dabad3bdece3b
- https://github.com/phpmyadmin/phpmyadmin/commit/24d0eb55203b029f250c77d63f2900ffbe099e8b
- https://github.com/phpmyadmin/phpmyadmin/commit/24d0eb55203b029f250c77d63f2900ffbe099e8b
- https://github.com/phpmyadmin/phpmyadmin/commit/66fe475d4f51b1761719cb0cab360748800373f7
- https://github.com/phpmyadmin/phpmyadmin/commit/66fe475d4f51b1761719cb0cab360748800373f7
- https://github.com/phpmyadmin/phpmyadmin/commit/da4042fb6c4365dc8187765c3bf525043687c66f
- https://github.com/phpmyadmin/phpmyadmin/commit/da4042fb6c4365dc8187765c3bf525043687c66f
Closed bugs
заниженный memory_limit
После логина в phpMyAdmin всегда пустое окно
Closed vulnerabilities
BDU:2015-00077
Уязвимость системы мгновенного обмена сообщениями Pidgin, позволяющая удаленному злоумышленнику вызвать отказ в обслуживании или выполнить произвольный код
BDU:2015-00078
Уязвимость системы мгновенного обмена сообщениями Pidgin, позволяющая удаленному злоумышленнику вызвать отказ в обслуживании
BDU:2015-00079
Уязвимость системы мгновенного обмена сообщениями Pidgin, позволяющая удаленному злоумышленнику вызвать отказ в обслуживании
BDU:2015-00080
Уязвимость системы мгновенного обмена сообщениями Pidgin, позволяющая удаленному злоумышленнику вызвать отказ в обслуживании
BDU:2015-00081
Уязвимость системы мгновенного обмена сообщениями Pidgin, позволяющая удаленному злоумышленнику вызвать отказ в обслуживании
BDU:2015-00082
Уязвимость системы мгновенного обмена сообщениями Pidgin, позволяющая удаленному злоумышленнику вызвать отказ в обслуживании или выполнить произвольный код
BDU:2015-00083
Уязвимость системы мгновенного обмена сообщениями Pidgin, позволяющая удаленному злоумышленнику вызвать отказ в обслуживании
BDU:2015-00084
Уязвимость системы мгновенного обмена сообщениями Pidgin, позволяющая удаленному злоумышленнику вызвать отказ в обслуживании
BDU:2015-00085
Уязвимость системы мгновенного обмена сообщениями Pidgin, позволяющая удаленному злоумышленнику вызвать отказ в обслуживании или выполнить произвольный код
BDU:2015-00086
Уязвимость системы мгновенного обмена сообщениями Pidgin, позволяющая удаленному злоумышленнику вызвать отказ в обслуживании или выполнить произвольный код
Modified: 2024-11-21
CVE-2012-6152
The Yahoo! protocol plugin in libpurple in Pidgin before 2.10.8 does not properly validate UTF-8 data, which allows remote attackers to cause a denial of service (application crash) via crafted byte sequences.
- http://hg.pidgin.im/pidgin/main/rev/b0345c25f886
- http://hg.pidgin.im/pidgin/main/rev/b0345c25f886
- openSUSE-SU-2014:0239
- openSUSE-SU-2014:0239
- openSUSE-SU-2014:0326
- openSUSE-SU-2014:0326
- http://pidgin.im/news/security/?id=70
- http://pidgin.im/news/security/?id=70
- USN-2100-1
- USN-2100-1
- RHSA-2014:0139
- RHSA-2014:0139
Modified: 2024-11-21
CVE-2013-6477
Multiple integer signedness errors in libpurple in Pidgin before 2.10.8 allow remote attackers to cause a denial of service (application crash) via a crafted timestamp value in an XMPP message.
- http://hg.pidgin.im/pidgin/main/rev/852014ae74a0
- http://hg.pidgin.im/pidgin/main/rev/852014ae74a0
- openSUSE-SU-2014:0239
- openSUSE-SU-2014:0239
- openSUSE-SU-2014:0326
- openSUSE-SU-2014:0326
- http://pidgin.im/news/security/?id=71
- http://pidgin.im/news/security/?id=71
- DSA-2859
- DSA-2859
- USN-2100-1
- USN-2100-1
- RHSA-2014:0139
- RHSA-2014:0139
Modified: 2024-11-21
CVE-2013-6478
gtkimhtml.c in Pidgin before 2.10.8 does not properly interact with underlying library support for wide Pango layouts, which allows user-assisted remote attackers to cause a denial of service (application crash) via a long URL that is examined with a tooltip.
- http://hg.pidgin.im/pidgin/main/rev/2bb66ef1475e
- http://hg.pidgin.im/pidgin/main/rev/2bb66ef1475e
- openSUSE-SU-2014:0239
- openSUSE-SU-2014:0239
- openSUSE-SU-2014:0326
- openSUSE-SU-2014:0326
- http://pidgin.im/news/security/?id=72
- http://pidgin.im/news/security/?id=72
- [support] 20130301 error in pidgin : big url
- [support] 20130301 error in pidgin : big url
- [support] 20130301 error in pidgin : big url - 2 (pidgin eat a part of url)
- [support] 20130301 error in pidgin : big url - 2 (pidgin eat a part of url)
- DSA-2859
- DSA-2859
- USN-2100-1
- USN-2100-1
- RHSA-2014:0139
- RHSA-2014:0139
Modified: 2024-11-21
CVE-2013-6479
util.c in libpurple in Pidgin before 2.10.8 does not properly allocate memory for HTTP responses that are inconsistent with the Content-Length header, which allows remote HTTP servers to cause a denial of service (application crash) via a crafted response.
- http://hg.pidgin.im/pidgin/main/rev/cd529e1158d3
- http://hg.pidgin.im/pidgin/main/rev/cd529e1158d3
- openSUSE-SU-2014:0239
- openSUSE-SU-2014:0239
- openSUSE-SU-2014:0326
- openSUSE-SU-2014:0326
- http://pidgin.im/news/security/?id=73
- http://pidgin.im/news/security/?id=73
- DSA-2859
- DSA-2859
- USN-2100-1
- USN-2100-1
- RHSA-2014:0139
- RHSA-2014:0139
Modified: 2024-11-21
CVE-2013-6481
libpurple/protocols/yahoo/libymsg.c in Pidgin before 2.10.8 allows remote attackers to cause a denial of service (crash) via a Yahoo! P2P message with a crafted length field, which triggers a buffer over-read.
- http://hg.pidgin.im/pidgin/main/rev/4d139ce8f7ec
- http://hg.pidgin.im/pidgin/main/rev/4d139ce8f7ec
- openSUSE-SU-2014:0239
- openSUSE-SU-2014:0239
- openSUSE-SU-2014:0326
- openSUSE-SU-2014:0326
- DSA-2859
- DSA-2859
- http://www.pidgin.im/news/security/?id=74
- http://www.pidgin.im/news/security/?id=74
- USN-2100-1
- USN-2100-1
- RHSA-2014:0139
- RHSA-2014:0139
Modified: 2024-11-21
CVE-2013-6482
Pidgin before 2.10.8 allows remote MSN servers to cause a denial of service (NULL pointer dereference and crash) via a crafted (1) SOAP response, (2) OIM XML response, or (3) Content-Length header.
- openSUSE-SU-2014:0239
- openSUSE-SU-2014:0239
- openSUSE-SU-2014:0326
- openSUSE-SU-2014:0326
- DSA-2859
- DSA-2859
- http://www.pidgin.im/news/security/?id=75
- http://www.pidgin.im/news/security/?id=75
- http://www.pidgin.im/news/security/?id=76
- http://www.pidgin.im/news/security/?id=76
- http://www.pidgin.im/news/security/?id=77
- http://www.pidgin.im/news/security/?id=77
- USN-2100-1
- USN-2100-1
- RHSA-2014:0139
- RHSA-2014:0139
Modified: 2024-11-21
CVE-2013-6483
The XMPP protocol plugin in libpurple in Pidgin before 2.10.8 does not properly determine whether the from address in an iq reply is consistent with the to address in an iq request, which allows remote attackers to spoof iq traffic or cause a denial of service (NULL pointer dereference and application crash) via a crafted reply.
- http://hg.pidgin.im/pidgin/main/rev/93d4bff19574
- http://hg.pidgin.im/pidgin/main/rev/93d4bff19574
- openSUSE-SU-2014:0239
- openSUSE-SU-2014:0239
- openSUSE-SU-2014:0326
- openSUSE-SU-2014:0326
- http://pidgin.im/news/security/?id=78
- http://pidgin.im/news/security/?id=78
- DSA-2859
- DSA-2859
- USN-2100-1
- USN-2100-1
- RHSA-2014:0139
- RHSA-2014:0139
Modified: 2024-11-21
CVE-2013-6484
The STUN protocol implementation in libpurple in Pidgin before 2.10.8 allows remote STUN servers to cause a denial of service (out-of-bounds write operation and application crash) by triggering a socket read error.
- http://hg.pidgin.im/pidgin/main/rev/932b985540e9
- http://hg.pidgin.im/pidgin/main/rev/932b985540e9
- openSUSE-SU-2014:0239
- openSUSE-SU-2014:0239
- openSUSE-SU-2014:0326
- openSUSE-SU-2014:0326
- http://pidgin.im/news/security/?id=79
- http://pidgin.im/news/security/?id=79
- DSA-2859
- DSA-2859
- USN-2100-1
- USN-2100-1
- RHSA-2014:0139
- RHSA-2014:0139
Modified: 2024-11-21
CVE-2013-6485
Buffer overflow in util.c in libpurple in Pidgin before 2.10.8 allows remote HTTP servers to cause a denial of service (application crash) or possibly have unspecified other impact via an invalid chunk-size field in chunked transfer-coding data.
- http://hg.pidgin.im/pidgin/main/rev/c9e5aba2dafd
- http://hg.pidgin.im/pidgin/main/rev/c9e5aba2dafd
- openSUSE-SU-2014:0239
- openSUSE-SU-2014:0239
- openSUSE-SU-2014:0326
- openSUSE-SU-2014:0326
- http://pidgin.im/news/security/?id=80
- http://pidgin.im/news/security/?id=80
- DSA-2859
- DSA-2859
- 65243
- 65243
- USN-2100-1
- USN-2100-1
- RHSA-2014:0139
- RHSA-2014:0139
Modified: 2024-11-21
CVE-2013-6486
gtkutils.c in Pidgin before 2.10.8 on Windows allows user-assisted remote attackers to execute arbitrary programs via a message containing a file: URL that is improperly handled during construction of an explorer.exe command. NOTE: this vulnerability exists because of an incomplete fix for CVE-2011-3185.
Modified: 2024-11-21
CVE-2013-6487
Integer overflow in libpurple/protocols/gg/lib/http.c in the Gadu-Gadu (gg) parser in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a large Content-Length value, which triggers a buffer overflow.
- http://advisories.mageia.org/MGASA-2014-0074.html
- http://advisories.mageia.org/MGASA-2014-0074.html
- http://hg.pidgin.im/pidgin/main/rev/ec15aa187aa0
- http://hg.pidgin.im/pidgin/main/rev/ec15aa187aa0
- http://libgadu.net/releases/1.11.3.html
- http://libgadu.net/releases/1.11.3.html
- FEDORA-2014-2391
- FEDORA-2014-2391
- openSUSE-SU-2014:0239
- openSUSE-SU-2014:0239
- openSUSE-SU-2014:0326
- openSUSE-SU-2014:0326
- http://vrt-blog.snort.org/2014/01/vrt-2013-1001-cve-2013-6487-buffer.html
- http://vrt-blog.snort.org/2014/01/vrt-2013-1001-cve-2013-6487-buffer.html
- DSA-2852
- DSA-2852
- DSA-2859
- DSA-2859
- MDVSA-2014:039
- MDVSA-2014:039
- http://www.pidgin.im/news/security/?id=82
- http://www.pidgin.im/news/security/?id=82
- 65188
- 65188
- USN-2100-1
- USN-2100-1
- USN-2101-1
- USN-2101-1
- RHSA-2014:0139
- RHSA-2014:0139
- GLSA-201508-02
- GLSA-201508-02
Modified: 2024-11-21
CVE-2013-6489
Integer signedness error in the MXit functionality in Pidgin before 2.10.8 allows remote attackers to cause a denial of service (segmentation fault) via a crafted emoticon value, which triggers an integer overflow and a buffer overflow.
Modified: 2024-11-21
CVE-2013-6490
The SIMPLE protocol functionality in Pidgin before 2.10.8 allows remote attackers to have an unspecified impact via a negative Content-Length header, which triggers a buffer overflow.
Modified: 2024-11-21
CVE-2014-0020
The IRC protocol plugin in libpurple in Pidgin before 2.10.8 does not validate argument counts, which allows remote IRC servers to cause a denial of service (application crash) via a crafted message.
- http://hg.pidgin.im/pidgin/main/rev/4d9be297d399
- http://hg.pidgin.im/pidgin/main/rev/4d9be297d399
- http://hg.pidgin.im/pidgin/main/rev/5845d9fa7084
- http://hg.pidgin.im/pidgin/main/rev/5845d9fa7084
- http://hg.pidgin.im/pidgin/main/rev/6b0e0566af20
- http://hg.pidgin.im/pidgin/main/rev/6b0e0566af20
- http://hg.pidgin.im/pidgin/main/rev/7d0fb0c6d8d4
- http://hg.pidgin.im/pidgin/main/rev/7d0fb0c6d8d4
- http://hg.pidgin.im/pidgin/main/rev/9f132a6855cd
- http://hg.pidgin.im/pidgin/main/rev/9f132a6855cd
- http://hg.pidgin.im/pidgin/main/rev/a167504359e5
- http://hg.pidgin.im/pidgin/main/rev/a167504359e5
- openSUSE-SU-2014:0239
- openSUSE-SU-2014:0239
- openSUSE-SU-2014:0326
- openSUSE-SU-2014:0326
- http://pidgin.im/news/security/?id=85
- http://pidgin.im/news/security/?id=85
- DSA-2859
- DSA-2859
- USN-2100-1
- USN-2100-1
- RHSA-2014:0139
- RHSA-2014:0139
Closed vulnerabilities
BDU:2015-00636
Уязвимость программного обеспечения nginx, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2024-11-21
CVE-2013-4547
nginx 0.8.41 through 1.4.3 and 1.5.x before 1.5.7 allows remote attackers to bypass intended restrictions via an unescaped space character in a URI.
- SUSE-SU-2013:1895
- SUSE-SU-2013:1895
- openSUSE-SU-2013:1745
- openSUSE-SU-2013:1745
- openSUSE-SU-2013:1791
- openSUSE-SU-2013:1791
- openSUSE-SU-2013:1792
- openSUSE-SU-2013:1792
- [nginx-announce] 20131119 nginx security advisory (CVE-2013-4547)
- [nginx-announce] 20131119 nginx security advisory (CVE-2013-4547)
- 55757
- 55757
- 55822
- 55822
- 55825
- 55825
- DSA-2802
- DSA-2802
Modified: 2024-11-21
CVE-2014-0133
Heap-based buffer overflow in the SPDY implementation in nginx 1.3.15 before 1.4.7 and 1.5.x before 1.5.12 allows remote attackers to execute arbitrary code via a crafted request.
Closed bugs
[FR] WebM MIME type
CVE-2013-4547 в nginx
При обновлении затирается файл /etc/nginx/sites-available.d/default.conf
Забыли stat.xsl
CVE-2014-0133
Closed vulnerabilities
Modified: 2024-11-21
CVE-2013-5607
Integer overflow in the PL_ArenaAllocate function in Mozilla Netscape Portable Runtime (NSPR) before 4.10.2, as used in Firefox before 25.0.1, Firefox ESR 17.x before 17.0.11 and 24.x before 24.1.1, and SeaMonkey before 2.22.1, allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted X.509 certificate, a related issue to CVE-2013-1741.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
- SUSE-SU-2013:1807
- SUSE-SU-2013:1807
- openSUSE-SU-2013:1732
- openSUSE-SU-2013:1732
- RHSA-2013:1791
- RHSA-2013:1791
- RHSA-2013:1829
- RHSA-2013:1829
- GLSA-201406-19
- GLSA-201406-19
- DSA-2820
- DSA-2820
- http://www.mozilla.org/security/announce/2013/mfsa2013-103.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-103.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 63802
- 63802
- USN-2031-1
- USN-2031-1
- USN-2032-1
- USN-2032-1
- USN-2087-1
- USN-2087-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=927687
- https://bugzilla.mozilla.org/show_bug.cgi?id=927687
- [dev-tech-nspr] 20131113 [ANNOUNCE] NSPR 4.10.2 Release
- [dev-tech-nspr] 20131113 [ANNOUNCE] NSPR 4.10.2 Release
- GLSA-201504-01
- GLSA-201504-01
Closed vulnerabilities
Modified: 2024-11-21
CVE-2013-1740
The ssl_Do1stHandshake function in sslsecur.c in libssl in Mozilla Network Security Services (NSS) before 3.15.4, when the TLS False Start feature is enabled, allows man-in-the-middle attackers to spoof SSL servers by using an arbitrary X.509 certificate during certain handshake traffic.
- openSUSE-SU-2014:0212
- openSUSE-SU-2014:0212
- openSUSE-SU-2014:0213
- openSUSE-SU-2014:0213
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 64944
- 64944
- USN-2088-1
- USN-2088-1
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- https://bugs.gentoo.org/show_bug.cgi?id=498172
- https://bugs.gentoo.org/show_bug.cgi?id=498172
- https://bugzilla.mozilla.org/show_bug.cgi?id=919877
- https://bugzilla.mozilla.org/show_bug.cgi?id=919877
- https://bugzilla.redhat.com/show_bug.cgi?id=1053725
- https://bugzilla.redhat.com/show_bug.cgi?id=1053725
- https://developer.mozilla.org/docs/NSS/NSS_3.15.4_release_notes
- https://developer.mozilla.org/docs/NSS/NSS_3.15.4_release_notes
- mozilla-nss-cve20131740-info-disc(90394)
- mozilla-nss-cve20131740-info-disc(90394)
Modified: 2024-11-21
CVE-2013-1741
Integer overflow in Mozilla Network Security Services (NSS) 3.15 before 3.15.3 allows remote attackers to cause a denial of service or possibly have unspecified other impact via a large size value.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
- APPLE-SA-2015-06-30-1
- APPLE-SA-2015-06-30-1
- APPLE-SA-2015-06-30-2
- APPLE-SA-2015-06-30-2
- SUSE-SU-2013:1807
- SUSE-SU-2013:1807
- openSUSE-SU-2013:1732
- openSUSE-SU-2013:1732
- RHSA-2013:1791
- RHSA-2013:1791
- RHSA-2013:1829
- RHSA-2013:1829
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- GLSA-201406-19
- GLSA-201406-19
- http://support.apple.com/kb/HT204941
- http://support.apple.com/kb/HT204941
- http://support.apple.com/kb/HT204942
- http://support.apple.com/kb/HT204942
- DSA-2994
- DSA-2994
- http://www.mozilla.org/security/announce/2013/mfsa2013-103.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-103.html
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 63736
- 63736
- USN-2030-1
- USN-2030-1
- USN-2031-1
- USN-2031-1
- USN-2032-1
- USN-2032-1
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=925100
- https://bugzilla.mozilla.org/show_bug.cgi?id=925100
- https://developer.mozilla.org/docs/NSS/NSS_3.15.3_release_notes
- https://developer.mozilla.org/docs/NSS/NSS_3.15.3_release_notes
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2013-5605
Mozilla Network Security Services (NSS) 3.14 before 3.14.5 and 3.15 before 3.15.3 allows remote attackers to cause a denial of service or possibly have unspecified other impact via invalid handshake packets.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
- SUSE-SU-2013:1807
- SUSE-SU-2013:1807
- openSUSE-SU-2013:1730
- openSUSE-SU-2013:1730
- openSUSE-SU-2013:1732
- openSUSE-SU-2013:1732
- RHSA-2013:1791
- RHSA-2013:1791
- RHSA-2013:1829
- RHSA-2013:1829
- RHSA-2013:1840
- RHSA-2013:1840
- RHSA-2013:1841
- RHSA-2013:1841
- RHSA-2014:0041
- RHSA-2014:0041
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- GLSA-201406-19
- GLSA-201406-19
- DSA-2800
- DSA-2800
- http://www.mozilla.org/security/announce/2013/mfsa2013-103.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-103.html
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 63738
- 63738
- USN-2030-1
- USN-2030-1
- USN-2031-1
- USN-2031-1
- USN-2032-1
- USN-2032-1
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=934016
- https://bugzilla.mozilla.org/show_bug.cgi?id=934016
- https://developer.mozilla.org/docs/NSS/NSS_3.14.5_release_notes
- https://developer.mozilla.org/docs/NSS/NSS_3.14.5_release_notes
- https://developer.mozilla.org/docs/NSS/NSS_3.15.3_release_notes
- https://developer.mozilla.org/docs/NSS/NSS_3.15.3_release_notes
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2013-5606
The CERT_VerifyCert function in lib/certhigh/certvfy.c in Mozilla Network Security Services (NSS) 3.15 before 3.15.3 provides an unexpected return value for an incompatible key-usage certificate when the CERTVerifyLog argument is valid, which might allow remote attackers to bypass intended access restrictions via a crafted certificate.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
- SUSE-SU-2013:1807
- SUSE-SU-2013:1807
- openSUSE-SU-2013:1732
- openSUSE-SU-2013:1732
- RHSA-2013:1791
- RHSA-2013:1791
- RHSA-2013:1829
- RHSA-2013:1829
- RHSA-2014:0041
- RHSA-2014:0041
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- GLSA-201406-19
- GLSA-201406-19
- DSA-2994
- DSA-2994
- http://www.mozilla.org/security/announce/2013/mfsa2013-103.html
- http://www.mozilla.org/security/announce/2013/mfsa2013-103.html
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 63737
- 63737
- USN-2030-1
- USN-2030-1
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=910438
- https://bugzilla.mozilla.org/show_bug.cgi?id=910438
- https://developer.mozilla.org/docs/NSS/NSS_3.15.3_release_notes
- https://developer.mozilla.org/docs/NSS/NSS_3.15.3_release_notes
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-1490
Race condition in libssl in Mozilla Network Security Services (NSS) before 3.15.4, as used in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, SeaMonkey before 2.24, and other products, allows remote attackers to cause a denial of service (use-after-free) or possibly have unspecified other impact via vectors involving a resumption handshake that triggers incorrect replacement of a session ticket.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
- FEDORA-2014-2041
- FEDORA-2014-2041
- FEDORA-2014-2083
- FEDORA-2014-2083
- openSUSE-SU-2014:0212
- openSUSE-SU-2014:0212
- openSUSE-SU-2014:0213
- openSUSE-SU-2014:0213
- SUSE-SU-2014:0248
- SUSE-SU-2014:0248
- openSUSE-SU-2014:0419
- openSUSE-SU-2014:0419
- 102876
- 102876
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 56706
- 56706
- 56767
- 56767
- 56787
- 56787
- 56858
- 56858
- 56888
- 56888
- 56922
- 56922
- DSA-2858
- DSA-2858
- http://www.mozilla.org/security/announce/2014/mfsa2014-12.html
- http://www.mozilla.org/security/announce/2014/mfsa2014-12.html
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 65335
- 65335
- 1029717
- 1029717
- 1029720
- 1029720
- 1029721
- 1029721
- USN-2102-1
- USN-2102-1
- USN-2102-2
- USN-2102-2
- USN-2119-1
- USN-2119-1
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- https://8pecxstudios.com/?page_id=44080
- https://8pecxstudios.com/?page_id=44080
- https://bugzilla.mozilla.org/show_bug.cgi?id=930857
- https://bugzilla.mozilla.org/show_bug.cgi?id=930857
- https://bugzilla.mozilla.org/show_bug.cgi?id=930874
- https://bugzilla.mozilla.org/show_bug.cgi?id=930874
- mozilla-nss-cve20141490-code-exec(90885)
- mozilla-nss-cve20141490-code-exec(90885)
- GLSA-201504-01
- GLSA-201504-01
Modified: 2024-11-21
CVE-2014-1491
Mozilla Network Security Services (NSS) before 3.15.4, as used in Mozilla Firefox before 27.0, Firefox ESR 24.x before 24.3, Thunderbird before 24.3, SeaMonkey before 2.24, and other products, does not properly restrict public values in Diffie-Hellman key exchanges, which makes it easier for remote attackers to bypass cryptographic protection mechanisms in ticket handling by leveraging use of a certain value.
- http://hg.mozilla.org/projects/nss/rev/12c42006aed8
- http://hg.mozilla.org/projects/nss/rev/12c42006aed8
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10761
- FEDORA-2014-2041
- FEDORA-2014-2041
- FEDORA-2014-2083
- FEDORA-2014-2083
- openSUSE-SU-2014:0212
- openSUSE-SU-2014:0212
- openSUSE-SU-2014:0213
- openSUSE-SU-2014:0213
- SUSE-SU-2014:0248
- SUSE-SU-2014:0248
- openSUSE-SU-2014:0419
- openSUSE-SU-2014:0419
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 56858
- 56858
- 56888
- 56888
- 56922
- 56922
- DSA-2858
- DSA-2858
- DSA-2994
- DSA-2994
- http://www.mozilla.org/security/announce/2014/mfsa2014-12.html
- http://www.mozilla.org/security/announce/2014/mfsa2014-12.html
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities
- 65332
- 65332
- 1029717
- 1029717
- 1029720
- 1029720
- 1029721
- 1029721
- USN-2102-1
- USN-2102-1
- USN-2102-2
- USN-2102-2
- USN-2119-1
- USN-2119-1
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- http://www.vmware.com/security/advisories/VMSA-2014-0012.html
- https://bugzilla.mozilla.org/show_bug.cgi?id=934545
- https://bugzilla.mozilla.org/show_bug.cgi?id=934545
- firefox-nss-cve20141491-unspecified(90886)
- firefox-nss-cve20141491-unspecified(90886)
- GLSA-201504-01
- GLSA-201504-01
Closed vulnerabilities
BDU:2015-02159
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-02160
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-02161
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-02162
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-02163
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06447
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06448
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08486
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08487
Уязвимости операционной системы CentOS, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-09365
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить целостность и доступность защищаемой информации
BDU:2015-09376
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-09749
Уязвимость демона ntpd реализации протокола синхронизации времени NTP, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2009-0021
NTP 4.2.4 before 4.2.4p5 and 4.2.5 before 4.2.5p150 does not properly check the return value from the OpenSSL EVP_VerifyFinal function, which allows remote attackers to bypass validation of the certificate chain via a malformed SSL/TLS signature for DSA and ECDSA keys, a similar vulnerability to CVE-2008-5077.
- APPLE-SA-2009-05-12
- APPLE-SA-2009-05-12
- SUSE-SR:2009:005
- SUSE-SR:2009:005
- SUSE-SR:2009:008
- SUSE-SR:2009:008
- 33406
- 33406
- 33558
- 33558
- 33648
- 33648
- 34642
- 34642
- 35074
- 35074
- SSA:2009-014-03
- SSA:2009-014-03
- http://support.apple.com/kb/HT3549
- http://support.apple.com/kb/HT3549
- http://www.ocert.org/advisories/ocert-2008-016.html
- http://www.ocert.org/advisories/ocert-2008-016.html
- RHSA-2009:0046
- RHSA-2009:0046
- 20090107 [oCERT-2008-016] Multiple OpenSSL signature verification API misuses
- 20090107 [oCERT-2008-016] Multiple OpenSSL signature verification API misuses
- 1021533
- 1021533
- TA09-133A
- TA09-133A
- ADV-2009-0042
- ADV-2009-0042
- ADV-2009-1297
- ADV-2009-1297
- [announce] 20090108 NTP 4.2.4p6 Released
- [announce] 20090108 NTP 4.2.4p6 Released
- oval:org.mitre.oval:def:10035
- oval:org.mitre.oval:def:10035
Modified: 2024-11-21
CVE-2009-0159
Stack-based buffer overflow in the cookedprint function in ntpq/ntpq.c in ntpq in NTP before 4.2.4p7-RC2 allows remote NTP servers to execute arbitrary code via a crafted response.
- NetBSD-SA2009-006
- NetBSD-SA2009-006
- http://bugs.pardus.org.tr/show_bug.cgi?id=9532
- http://bugs.pardus.org.tr/show_bug.cgi?id=9532
- APPLE-SA-2009-05-12
- APPLE-SA-2009-05-12
- SUSE-SR:2009:011
- SUSE-SR:2009:011
- HPSBUX02859
- HPSBUX02859
- SSRT101144
- SSRT101144
- http://ntp.bkbits.net:8080/ntp-stable/?PAGE=gnupatch&REV=1.1565
- http://ntp.bkbits.net:8080/ntp-stable/?PAGE=gnupatch&REV=1.1565
- 53593
- 53593
- RHSA-2009:1039
- RHSA-2009:1039
- RHSA-2009:1040
- RHSA-2009:1040
- 34608
- 34608
- 35074
- 35074
- 35137
- 35137
- 35138
- 35138
- 35166
- 35166
- 35169
- 35169
- 35253
- 35253
- 35308
- 35308
- 35336
- 35336
- 35416
- 35416
- 35630
- 35630
- 37471
- 37471
- SSA:2009-154-01
- SSA:2009-154-01
- http://support.apple.com/kb/HT3549
- http://support.apple.com/kb/HT3549
- DSA-1801
- DSA-1801
- GLSA-200905-08
- GLSA-200905-08
- MDVSA-2009:092
- MDVSA-2009:092
- 20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components
- 20091120 VMSA-2009-0016 VMware vCenter and ESX update release and vMA patch release address multiple security issue in third party components
- 34481
- 34481
- 1022033
- 1022033
- TA09-133A
- TA09-133A
- http://www.vmware.com/security/advisories/VMSA-2009-0016.html
- http://www.vmware.com/security/advisories/VMSA-2009-0016.html
- ADV-2009-0999
- ADV-2009-0999
- ADV-2009-1297
- ADV-2009-1297
- ADV-2009-3316
- ADV-2009-3316
- https://bugzilla.redhat.com/show_bug.cgi?id=490617
- https://bugzilla.redhat.com/show_bug.cgi?id=490617
- ntp-cookedprint-bo(49838)
- ntp-cookedprint-bo(49838)
- oval:org.mitre.oval:def:19392
- oval:org.mitre.oval:def:19392
- oval:org.mitre.oval:def:5411
- oval:org.mitre.oval:def:5411
- oval:org.mitre.oval:def:8386
- oval:org.mitre.oval:def:8386
- oval:org.mitre.oval:def:8665
- oval:org.mitre.oval:def:8665
- oval:org.mitre.oval:def:9634
- oval:org.mitre.oval:def:9634
- RHSA-2009:1651
- RHSA-2009:1651
- https://support.ntp.org/bugs/show_bug.cgi?id=1144
- https://support.ntp.org/bugs/show_bug.cgi?id=1144
- USN-777-1
- USN-777-1
- FEDORA-2009-5273
- FEDORA-2009-5273
- FEDORA-2009-5275
- FEDORA-2009-5275
Modified: 2024-11-21
CVE-2013-5211
The monlist feature in ntp_request.c in ntpd in NTP before 4.2.7p26 allows remote attackers to cause a denial of service (traffic amplification) via forged (1) REQ_MON_GETLIST or (2) REQ_MON_GETLIST_1 requests, as exploited in the wild in December 2013.
- http://aix.software.ibm.com/aix/efixes/security/ntp_advisory.asc
- http://aix.software.ibm.com/aix/efixes/security/ntp_advisory.asc
- http://bugs.ntp.org/show_bug.cgi?id=1532
- http://bugs.ntp.org/show_bug.cgi?id=1532
- http://ics-cert.us-cert.gov/advisories/ICSA-14-051-04
- http://ics-cert.us-cert.gov/advisories/ICSA-14-051-04
- [pool] 20111210 Odd surge in traffic today
- [pool] 20111210 Odd surge in traffic today
- openSUSE-SU-2014:1149
- openSUSE-SU-2014:1149
- HPSBUX02960
- HPSBUX02960
- SSRT101419
- SSRT101419
- HPSBOV03505
- HPSBOV03505
- [oss-security] 20131230 CVE to the ntp monlist DDoS issue?
- [oss-security] 20131230 CVE to the ntp monlist DDoS issue?
- [oss-security] 20131230 Re: CVE to the ntp monlist DDoS issue?
- [oss-security] 20131230 Re: CVE to the ntp monlist DDoS issue?
- 59288
- 59288
- 59726
- 59726
- http://www.eecis.udel.edu/~ntp/ntp_spool/ntp4/ntp-dev/ntp-dev-4.2.7p26.tar.gz
- http://www.eecis.udel.edu/~ntp/ntp_spool/ntp4/ntp-dev/ntp-dev-4.2.7p26.tar.gz
- VU#348126
- VU#348126
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- 64692
- 64692
- 1030433
- 1030433
- TA14-013A
- TA14-013A
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095861
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095861
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095892
- http://www-947.ibm.com/support/entry/portal/docdisplay?lndocid=MIGR-5095892
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04790232
- https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04790232
- https://puppet.com/security/cve/puppetlabs-ntp-nov-2015-advisory
- https://puppet.com/security/cve/puppetlabs-ntp-nov-2015-advisory
Closed bugs
update current 4.2.4 to upstream production ver 4.2.6
Упакованы "лишние" man-страницы