ALT-BU-2014-2801-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2025-04-11
CVE-2013-7176
config/filter.d/postfix.conf in the postfix filter in Fail2ban before 0.8.11 allows remote attackers to trigger the blocking of an arbitrary IP address via a crafted e-mail address that matches an improperly designed regular expression.
- http://lists.opensuse.org/opensuse-updates/2014-03/msg00021.html
- http://www.debian.org/security/2014/dsa-2979
- http://www.kb.cert.org/vuls/id/686662
- https://github.com/fail2ban/fail2ban/commit/eb2f0c927257120dfc32d2450fd63f1962f38821
- http://lists.opensuse.org/opensuse-updates/2014-03/msg00021.html
- http://www.debian.org/security/2014/dsa-2979
- http://www.kb.cert.org/vuls/id/686662
- https://github.com/fail2ban/fail2ban/commit/eb2f0c927257120dfc32d2450fd63f1962f38821
Modified: 2025-04-11
CVE-2013-7177
config/filter.d/cyrus-imap.conf in the cyrus-imap filter in Fail2ban before 0.8.11 allows remote attackers to trigger the blocking of an arbitrary IP address via a crafted e-mail address that matches an improperly designed regular expression.
- http://lists.opensuse.org/opensuse-updates/2014-03/msg00021.html
- http://www.debian.org/security/2014/dsa-2979
- http://www.kb.cert.org/vuls/id/686662
- https://github.com/fail2ban/fail2ban/commit/bd175f026737d66e7110868fb50b3760ff75e087
- http://lists.opensuse.org/opensuse-updates/2014-03/msg00021.html
- http://www.debian.org/security/2014/dsa-2979
- http://www.kb.cert.org/vuls/id/686662
- https://github.com/fail2ban/fail2ban/commit/bd175f026737d66e7110868fb50b3760ff75e087
Closed vulnerabilities
Modified: 2025-04-03
CVE-2004-1184
The EPSF pipe support in enscript 1.6.3 allows remote attackers or local users to execute arbitrary commands via shell metacharacters.
- http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
- http://secunia.com/advisories/35074
- http://securitytracker.com/id?1012965
- http://support.apple.com/kb/HT3549
- http://www.debian.org/security/2005/dsa-654
- http://www.gentoo.org/security/en/glsa/glsa-200502-03.xml
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:033
- http://www.redhat.com/support/errata/RHSA-2005-040.html
- http://www.securityfocus.com/archive/1/419768/100/0/threaded
- http://www.securityfocus.com/archive/1/435199/100/0/threaded
- http://www.securityfocus.com/bid/12329
- http://www.us-cert.gov/cas/techalerts/TA09-133A.html
- http://www.vupen.com/english/advisories/2009/1297
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19012
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9658
- https://usn.ubuntu.com/68-1/
- http://lists.apple.com/archives/security-announce/2009/May/msg00002.html
- http://secunia.com/advisories/35074
- http://securitytracker.com/id?1012965
- http://support.apple.com/kb/HT3549
- http://www.debian.org/security/2005/dsa-654
- http://www.gentoo.org/security/en/glsa/glsa-200502-03.xml
- http://www.mandriva.com/security/advisories?name=MDKSA-2005:033
- http://www.redhat.com/support/errata/RHSA-2005-040.html
- http://www.securityfocus.com/archive/1/419768/100/0/threaded
- http://www.securityfocus.com/archive/1/435199/100/0/threaded
- http://www.securityfocus.com/bid/12329
- http://www.us-cert.gov/cas/techalerts/TA09-133A.html
- http://www.vupen.com/english/advisories/2009/1297
- https://exchange.xforce.ibmcloud.com/vulnerabilities/19012
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9658
- https://usn.ubuntu.com/68-1/
Package squashfs-tools updated to version 4.3-alt1 for branch sisyphus in task 120527.
Closed vulnerabilities
Modified: 2025-04-11
CVE-2012-4024
Stack-based buffer overflow in the get_component function in unsquashfs.c in unsquashfs in Squashfs 4.2 and earlier allows remote attackers to execute arbitrary code via a crafted list file (aka a crafted file for the -ef option). NOTE: probably in most cases, the list file is a trusted file constructed by the program's user; however, there are some realistic situations in which a list file would be obtained from an untrusted remote source.
- http://sourceforge.net/mailarchive/forum.php?thread_name=CAAoG81HL9oP8roPLLhftTSXTzSD%2BZcR66PRkVU%3Df76W3Mjde_w%40mail.gmail.com&forum_name=squashfs-devel
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:128
- http://www.openwall.com/lists/oss-security/2012/07/19/6
- http://www.osvdb.org/83898
- http://www.securityfocus.com/bid/54610
- https://exchange.xforce.ibmcloud.com/vulnerabilities/77106
- https://security.gentoo.org/glsa/201612-40
- https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0001
- http://sourceforge.net/mailarchive/forum.php?thread_name=CAAoG81HL9oP8roPLLhftTSXTzSD%2BZcR66PRkVU%3Df76W3Mjde_w%40mail.gmail.com&forum_name=squashfs-devel
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:128
- http://www.openwall.com/lists/oss-security/2012/07/19/6
- http://www.osvdb.org/83898
- http://www.securityfocus.com/bid/54610
- https://exchange.xforce.ibmcloud.com/vulnerabilities/77106
- https://security.gentoo.org/glsa/201612-40
- https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0001
Modified: 2025-04-11
CVE-2012-4025
Integer overflow in the queue_init function in unsquashfs.c in unsquashfs in Squashfs 4.2 and earlier allows remote attackers to execute arbitrary code via a crafted block_log field in the superblock of a .sqsh file, leading to a heap-based buffer overflow.
- http://sourceforge.net/mailarchive/forum.php?thread_name=CAAoG81HL9oP8roPLLhftTSXTzSD%2BZcR66PRkVU%3Df76W3Mjde_w%40mail.gmail.com&forum_name=squashfs-devel
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:128
- http://www.openwall.com/lists/oss-security/2012/07/19/6
- http://www.osvdb.org/83899
- http://www.securityfocus.com/bid/54610
- https://security.gentoo.org/glsa/201612-40
- https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0001
- http://sourceforge.net/mailarchive/forum.php?thread_name=CAAoG81HL9oP8roPLLhftTSXTzSD%2BZcR66PRkVU%3Df76W3Mjde_w%40mail.gmail.com&forum_name=squashfs-devel
- http://www.mandriva.com/security/advisories?name=MDVSA-2013:128
- http://www.openwall.com/lists/oss-security/2012/07/19/6
- http://www.osvdb.org/83899
- http://www.securityfocus.com/bid/54610
- https://security.gentoo.org/glsa/201612-40
- https://wiki.mageia.org/en/Support/Advisories/MGASA-2013-0001
Closed vulnerabilities
Modified: 2016-11-28
BDU:2015-06824
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2016-11-28
BDU:2015-09111
Уязвимость операционной системы CentOS, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2025-04-12
CVE-2014-0179
libvirt 0.7.5 through 1.2.x before 1.2.5 allows local users to cause a denial of service (read block and hang) via a crafted XML document containing an XML external entity declaration in conjunction with an entity reference to the (1) virConnectCompareCPU or (2) virConnectBaselineCPU API method, related to an XML External Entity (XXE) issue. NOTE: this issue was SPLIT per ADT3 due to different affected versions of some vectors. CVE-2014-5177 is used for other API methods.
- http://libvirt.org/news.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00048.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00052.html
- http://rhn.redhat.com/errata/RHSA-2014-0560.html
- http://secunia.com/advisories/60895
- http://security.gentoo.org/glsa/glsa-201412-04.xml
- http://security.libvirt.org/2014/0003.html
- http://www.debian.org/security/2014/dsa-3038
- http://www.ubuntu.com/usn/USN-2366-1
- http://libvirt.org/news.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00048.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00052.html
- http://rhn.redhat.com/errata/RHSA-2014-0560.html
- http://secunia.com/advisories/60895
- http://security.gentoo.org/glsa/glsa-201412-04.xml
- http://security.libvirt.org/2014/0003.html
- http://www.debian.org/security/2014/dsa-3038
- http://www.ubuntu.com/usn/USN-2366-1
Modified: 2025-04-12
CVE-2014-5177
libvirt 1.0.0 through 1.2.x before 1.2.5, when fine grained access control is enabled, allows local users to read arbitrary files via a crafted XML document containing an XML external entity declaration in conjunction with an entity reference to the (1) virDomainDefineXML, (2) virNetworkCreateXML, (3) virNetworkDefineXML, (4) virStoragePoolCreateXML, (5) virStoragePoolDefineXML, (6) virStorageVolCreateXML, (7) virDomainCreateXML, (8) virNodeDeviceCreateXML, (9) virInterfaceDefineXML, (10) virStorageVolCreateXMLFrom, (11) virConnectDomainXMLFromNative, (12) virConnectDomainXMLToNative, (13) virSecretDefineXML, (14) virNWFilterDefineXML, (15) virDomainSnapshotCreateXML, (16) virDomainSaveImageDefineXML, (17) virDomainCreateXMLWithFiles, (18) virConnectCompareCPU, or (19) virConnectBaselineCPU API method, related to an XML External Entity (XXE) issue. NOTE: this issue was SPLIT from CVE-2014-0179 per ADT3 due to different affected versions of some vectors.
- http://libvirt.org/news.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00048.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00052.html
- http://rhn.redhat.com/errata/RHSA-2014-0560.html
- http://secunia.com/advisories/60895
- http://security.gentoo.org/glsa/glsa-201412-04.xml
- http://security.libvirt.org/2014/0003.html
- http://www.ubuntu.com/usn/USN-2366-1
- http://libvirt.org/news.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00048.html
- http://lists.opensuse.org/opensuse-updates/2014-05/msg00052.html
- http://rhn.redhat.com/errata/RHSA-2014-0560.html
- http://secunia.com/advisories/60895
- http://security.gentoo.org/glsa/glsa-201412-04.xml
- http://security.libvirt.org/2014/0003.html
- http://www.ubuntu.com/usn/USN-2366-1