ALT-BU-2014-2953-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2015-01463
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность защищаемой информации
Modified: 2025-04-12
CVE-2014-3537
The web interface in CUPS before 1.7.4 allows local users in the lp group to read arbitrary files via a symlink attack on a file in /var/cache/cups/rss/.
- http://advisories.mageia.org/MGASA-2014-0313.html
- http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-July/135528.html
- http://rhn.redhat.com/errata/RHSA-2014-1388.html
- http://secunia.com/advisories/59945
- http://secunia.com/advisories/60273
- http://secunia.com/advisories/60787
- http://www.cups.org/blog.php?L724
- http://www.cups.org/str.php?L4450
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:108
- http://www.securityfocus.com/bid/68788
- http://www.securitytracker.com/id/1030611
- http://www.ubuntu.com/usn/USN-2293-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1115576
- https://support.apple.com/kb/HT6535
- http://advisories.mageia.org/MGASA-2014-0313.html
- http://archives.neohapsis.com/archives/bugtraq/2014-10/0101.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-July/135528.html
- http://rhn.redhat.com/errata/RHSA-2014-1388.html
- http://secunia.com/advisories/59945
- http://secunia.com/advisories/60273
- http://secunia.com/advisories/60787
- http://www.cups.org/blog.php?L724
- http://www.cups.org/str.php?L4450
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:108
- http://www.securityfocus.com/bid/68788
- http://www.securitytracker.com/id/1030611
- http://www.ubuntu.com/usn/USN-2293-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1115576
- https://support.apple.com/kb/HT6535
Modified: 2025-04-12
CVE-2014-5030
CUPS before 2.0 allows local users to read arbitrary files via a symlink attack on (1) index.html, (2) index.class, (3) index.pl, (4) index.php, (5) index.pyc, or (6) index.py.
- http://advisories.mageia.org/MGASA-2014-0313.html
- http://rhn.redhat.com/errata/RHSA-2014-1388.html
- http://secunia.com/advisories/60509
- http://secunia.com/advisories/60787
- http://www.debian.org/security/2014/dsa-2990
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:108
- http://www.openwall.com/lists/oss-security/2014/07/22/13
- http://www.openwall.com/lists/oss-security/2014/07/22/2
- http://www.ubuntu.com/usn/USN-2341-1
- https://cups.org/str.php?L4455
- http://advisories.mageia.org/MGASA-2014-0313.html
- http://rhn.redhat.com/errata/RHSA-2014-1388.html
- http://secunia.com/advisories/60509
- http://secunia.com/advisories/60787
- http://www.debian.org/security/2014/dsa-2990
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:108
- http://www.openwall.com/lists/oss-security/2014/07/22/13
- http://www.openwall.com/lists/oss-security/2014/07/22/2
- http://www.ubuntu.com/usn/USN-2341-1
- https://cups.org/str.php?L4455
Modified: 2025-04-12
CVE-2014-5031
The web interface in CUPS before 2.0 does not check that files have world-readable permissions, which allows remote attackers to obtains sensitive information via unspecified vectors.
- http://advisories.mageia.org/MGASA-2014-0313.html
- http://rhn.redhat.com/errata/RHSA-2014-1388.html
- http://secunia.com/advisories/60509
- http://secunia.com/advisories/60787
- http://www.debian.org/security/2014/dsa-2990
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:108
- http://www.openwall.com/lists/oss-security/2014/07/22/13
- http://www.openwall.com/lists/oss-security/2014/07/22/2
- http://www.ubuntu.com/usn/USN-2341-1
- https://cups.org/str.php?L4455
- http://advisories.mageia.org/MGASA-2014-0313.html
- http://rhn.redhat.com/errata/RHSA-2014-1388.html
- http://secunia.com/advisories/60509
- http://secunia.com/advisories/60787
- http://www.debian.org/security/2014/dsa-2990
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:108
- http://www.openwall.com/lists/oss-security/2014/07/22/13
- http://www.openwall.com/lists/oss-security/2014/07/22/2
- http://www.ubuntu.com/usn/USN-2341-1
- https://cups.org/str.php?L4455
Closed bugs
Конфликтует с пакетом pv, ломает vzctl
Closed vulnerabilities
BDU:2015-09708
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации
Modified: 2025-04-11
CVE-2013-2236
Stack-based buffer overflow in the new_msg_lsa_change_notify function in the OSPFD API (ospf_api.c) in Quagga before 0.99.22.2, when --enable-opaque-lsa and the -a command line option are used, allows remote attackers to cause a denial of service (crash) via a large LSA.
- http://git.savannah.gnu.org/gitweb/?p=quagga.git%3Ba=commitdiff%3Bh=3f872fe60463a931c5c766dbf8c36870c0023e88
- http://lists.quagga.net/pipermail/quagga-dev/2013-July/010622.html
- http://nongnu.mirrors.hostinginnederland.nl//quagga/quagga-0.99.22.3.changelog.txt
- http://rhn.redhat.com/errata/RHSA-2017-0794.html
- http://seclists.org/oss-sec/2013/q3/24
- http://www.debian.org/security/2013/dsa-2803
- http://www.securityfocus.com/bid/60955
- http://www.ubuntu.com/usn/USN-2941-1
- http://git.savannah.gnu.org/gitweb/?p=quagga.git%3Ba=commitdiff%3Bh=3f872fe60463a931c5c766dbf8c36870c0023e88
- http://lists.quagga.net/pipermail/quagga-dev/2013-July/010622.html
- http://nongnu.mirrors.hostinginnederland.nl//quagga/quagga-0.99.22.3.changelog.txt
- http://rhn.redhat.com/errata/RHSA-2017-0794.html
- http://seclists.org/oss-sec/2013/q3/24
- http://www.debian.org/security/2013/dsa-2803
- http://www.securityfocus.com/bid/60955
- http://www.ubuntu.com/usn/USN-2941-1