ALT-BU-2015-2434-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2025-04-12
CVE-2015-3153
The default configuration for cURL and libcurl before 7.42.1 sends custom HTTP headers to both the proxy and destination server, which might allow remote proxy servers to obtain sensitive information by reading the header contents.
- http://curl.haxx.se/docs/adv_20150429.html
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- http://lists.opensuse.org/opensuse-updates/2015-05/msg00017.html
- http://www.debian.org/security/2015/dsa-3240
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/74408
- http://www.securitytracker.com/id/1032233
- http://www.ubuntu.com/usn/USN-2591-1
- https://kc.mcafee.com/corporate/index?page=content&id=SB10131
- https://support.apple.com/kb/HT205031
- http://curl.haxx.se/docs/adv_20150429.html
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10743
- http://lists.apple.com/archives/security-announce/2015/Aug/msg00001.html
- http://lists.opensuse.org/opensuse-updates/2015-05/msg00017.html
- http://www.debian.org/security/2015/dsa-3240
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.securityfocus.com/bid/74408
- http://www.securitytracker.com/id/1032233
- http://www.ubuntu.com/usn/USN-2591-1
- https://kc.mcafee.com/corporate/index?page=content&id=SB10131
- https://support.apple.com/kb/HT205031
Closed vulnerabilities
Modified: 2021-03-23
BDU:2016-00128
Уязвимость эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-04-12
CVE-2015-1779
The VNC websocket frame decoder in QEMU allows remote attackers to cause a denial of service (memory and CPU consumption) via a large (1) websocket payload or (2) HTTP headers section.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154656.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155196.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00033.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00042.html
- http://rhn.redhat.com/errata/RHSA-2015-1931.html
- http://rhn.redhat.com/errata/RHSA-2015-1943.html
- http://www.debian.org/security/2015/dsa-3259
- http://www.openwall.com/lists/oss-security/2015/03/24/9
- http://www.openwall.com/lists/oss-security/2015/04/09/6
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/73303
- http://www.securitytracker.com/id/1033975
- http://www.ubuntu.com/usn/USN-2608-1
- https://lists.gnu.org/archive/html/qemu-devel/2015-03/msg04894.html
- https://lists.gnu.org/archive/html/qemu-devel/2015-03/msg04895.html
- https://lists.gnu.org/archive/html/qemu-devel/2015-03/msg04896.html
- https://security.gentoo.org/glsa/201602-01
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154656.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155196.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00033.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00042.html
- http://rhn.redhat.com/errata/RHSA-2015-1931.html
- http://rhn.redhat.com/errata/RHSA-2015-1943.html
- http://www.debian.org/security/2015/dsa-3259
- http://www.openwall.com/lists/oss-security/2015/03/24/9
- http://www.openwall.com/lists/oss-security/2015/04/09/6
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/73303
- http://www.securitytracker.com/id/1033975
- http://www.ubuntu.com/usn/USN-2608-1
- https://lists.gnu.org/archive/html/qemu-devel/2015-03/msg04894.html
- https://lists.gnu.org/archive/html/qemu-devel/2015-03/msg04895.html
- https://lists.gnu.org/archive/html/qemu-devel/2015-03/msg04896.html
- https://security.gentoo.org/glsa/201602-01
Closed vulnerabilities
Modified: 2025-04-12
CVE-2015-3414
SQLite before 3.8.9 does not properly implement the dequoting of collation-sequence names, which allows context-dependent attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted COLLATE clause, as demonstrated by COLLATE"""""""" at the end of a SELECT statement.
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
- http://rhn.redhat.com/errata/RHSA-2015-1635.html
- http://seclists.org/fulldisclosure/2015/Apr/31
- http://www.debian.org/security/2015/dsa-3252
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:217
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securityfocus.com/bid/74228
- http://www.securitytracker.com/id/1033703
- http://www.ubuntu.com/usn/USN-2698-1
- https://security.gentoo.org/glsa/201507-05
- https://support.apple.com/HT205213
- https://support.apple.com/HT205267
- https://www.sqlite.org/src/info/eddc05e7bb31fae74daa86e0504a3478b99fa0f2
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
- http://rhn.redhat.com/errata/RHSA-2015-1635.html
- http://seclists.org/fulldisclosure/2015/Apr/31
- http://www.debian.org/security/2015/dsa-3252
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:217
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securityfocus.com/bid/74228
- http://www.securitytracker.com/id/1033703
- http://www.ubuntu.com/usn/USN-2698-1
- https://security.gentoo.org/glsa/201507-05
- https://support.apple.com/HT205213
- https://support.apple.com/HT205267
- https://www.sqlite.org/src/info/eddc05e7bb31fae74daa86e0504a3478b99fa0f2
Modified: 2025-04-12
CVE-2015-3415
The sqlite3VdbeExec function in vdbe.c in SQLite before 3.8.9 does not properly implement comparison operators, which allows context-dependent attackers to cause a denial of service (invalid free operation) or possibly have unspecified other impact via a crafted CHECK clause, as demonstrated by CHECK(0&O>O) in a CREATE TABLE statement.
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
- http://rhn.redhat.com/errata/RHSA-2015-1635.html
- http://seclists.org/fulldisclosure/2015/Apr/31
- http://www.debian.org/security/2015/dsa-3252
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:217
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securityfocus.com/bid/74228
- http://www.securitytracker.com/id/1033703
- http://www.ubuntu.com/usn/USN-2698-1
- https://security.gentoo.org/glsa/201507-05
- https://support.apple.com/HT205213
- https://support.apple.com/HT205267
- https://www.sqlite.org/src/info/02e3c88fbf6abdcf3975fb0fb71972b0ab30da30
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
- http://rhn.redhat.com/errata/RHSA-2015-1635.html
- http://seclists.org/fulldisclosure/2015/Apr/31
- http://www.debian.org/security/2015/dsa-3252
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:217
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securityfocus.com/bid/74228
- http://www.securitytracker.com/id/1033703
- http://www.ubuntu.com/usn/USN-2698-1
- https://security.gentoo.org/glsa/201507-05
- https://support.apple.com/HT205213
- https://support.apple.com/HT205267
- https://www.sqlite.org/src/info/02e3c88fbf6abdcf3975fb0fb71972b0ab30da30
Modified: 2025-04-12
CVE-2015-3416
The sqlite3VXPrintf function in printf.c in SQLite before 3.8.9 does not properly handle precision and width values during floating-point conversions, which allows context-dependent attackers to cause a denial of service (integer overflow and stack-based buffer overflow) or possibly have unspecified other impact via large integers in a crafted printf function call in a SELECT statement.
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
- http://rhn.redhat.com/errata/RHSA-2015-1634.html
- http://rhn.redhat.com/errata/RHSA-2015-1635.html
- http://seclists.org/fulldisclosure/2015/Apr/31
- http://www.debian.org/security/2015/dsa-3252
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:217
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securityfocus.com/bid/74228
- http://www.securitytracker.com/id/1033703
- http://www.sqlite.org/src/info/c494171f77dc2e5e04cb6d865e688448f04e5920
- http://www.ubuntu.com/usn/USN-2698-1
- https://security.gentoo.org/glsa/201507-05
- https://support.apple.com/HT205213
- https://support.apple.com/HT205267
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00005.html
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
- http://rhn.redhat.com/errata/RHSA-2015-1634.html
- http://rhn.redhat.com/errata/RHSA-2015-1635.html
- http://seclists.org/fulldisclosure/2015/Apr/31
- http://www.debian.org/security/2015/dsa-3252
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:217
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securityfocus.com/bid/74228
- http://www.securitytracker.com/id/1033703
- http://www.sqlite.org/src/info/c494171f77dc2e5e04cb6d865e688448f04e5920
- http://www.ubuntu.com/usn/USN-2698-1
- https://security.gentoo.org/glsa/201507-05
- https://support.apple.com/HT205213
- https://support.apple.com/HT205267
Modified: 2025-04-12
CVE-2015-3717
Multiple buffer overflows in the printf functionality in SQLite, as used in Apple iOS before 8.4 and OS X before 10.10.4, allow remote attackers to execute arbitrary code or cause a denial of service (application crash) via unspecified vectors.
- http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html
- http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
- http://support.apple.com/kb/HT204941
- http://support.apple.com/kb/HT204942
- http://www.securityfocus.com/bid/75491
- http://www.securitytracker.com/id/1032760
- http://lists.apple.com/archives/security-announce/2015/Jun/msg00001.html
- http://lists.apple.com/archives/security-announce/2015/Jun/msg00002.html
- http://support.apple.com/kb/HT204941
- http://support.apple.com/kb/HT204942
- http://www.securityfocus.com/bid/75491
- http://www.securitytracker.com/id/1032760
Closed vulnerabilities
Modified: 2021-03-23
BDU:2015-10385
Уязвимость операционной системы Ubuntu, позволяющая нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2021-03-23
BDU:2015-10386
Уязвимость операционной системы Ubuntu, позволяющая нарушителю нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2025-04-12
CVE-2015-2806
Stack-based buffer overflow in asn1_der_decoding in libtasn1 before 4.4 allows remote attackers to have unspecified impact via unknown vectors.
- http://git.savannah.gnu.org/gitweb/?p=libtasn1.git%3Ba=commit%3Bh=4d4f992826a4962790ecd0cce6fbba4a415ce149
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154741.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154805.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155117.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155270.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155435.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155483.html
- http://www.debian.org/security/2015/dsa-3220
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:193
- http://www.openwall.com/lists/oss-security/2015/03/29/4
- http://www.openwall.com/lists/oss-security/2015/03/31/2
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securityfocus.com/bid/73436
- http://www.securitytracker.com/id/1032080
- http://www.ubuntu.com/usn/USN-2559-1
- https://access.redhat.com/errata/RHSA-2017:1860
- https://security.gentoo.org/glsa/201509-04
- http://git.savannah.gnu.org/gitweb/?p=libtasn1.git%3Ba=commit%3Bh=4d4f992826a4962790ecd0cce6fbba4a415ce149
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154741.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154805.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155117.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155270.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155435.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155483.html
- http://www.debian.org/security/2015/dsa-3220
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:193
- http://www.openwall.com/lists/oss-security/2015/03/29/4
- http://www.openwall.com/lists/oss-security/2015/03/31/2
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securityfocus.com/bid/73436
- http://www.securitytracker.com/id/1032080
- http://www.ubuntu.com/usn/USN-2559-1
- https://access.redhat.com/errata/RHSA-2017:1860
- https://security.gentoo.org/glsa/201509-04