ALT-BU-2015-2744-1
Branch sisyphus update bulletin.
Package kernel-image-un-def updated to version 4.3.0-alt1 for branch sisyphus in task 152629.
Closed vulnerabilities
BDU:2016-00898
Уязвимость операционной системы Android, позволяющая нарушителю обойти механизм защиты
BDU:2017-02061
Уязвимость функции skb_flow_dissect службы flow_dissector.c (net/core/flow_dissector.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
Modified: 2024-11-21
CVE-2015-4004
The OZWPAN driver in the Linux kernel through 4.0.5 relies on an untrusted length field during packet parsing, which allows remote attackers to obtain sensitive information from kernel memory or cause a denial of service (out-of-bounds read and system crash) via a crafted packet.
- [oss-security] 20150605 Re: CVE Request: Linux Kernel Ozwpan Driver - Remote packet-of-death vulnerabilities
- [oss-security] 20150605 Re: CVE Request: Linux Kernel Ozwpan Driver - Remote packet-of-death vulnerabilities
- 74669
- 74669
- USN-2989-1
- USN-2989-1
- USN-2998-1
- USN-2998-1
- USN-3000-1
- USN-3000-1
- USN-3001-1
- USN-3001-1
- USN-3002-1
- USN-3002-1
- USN-3003-1
- USN-3003-1
- USN-3004-1
- USN-3004-1
- [linux-kernel] 20150513 [PATCH 0/4] ozwpan: Four remote packet-of-death vulnerabilities
- [linux-kernel] 20150513 [PATCH 0/4] ozwpan: Four remote packet-of-death vulnerabilities
Modified: 2024-11-21
CVE-2015-7872
The key_gc_unused_keys function in security/keys/gc.c in the Linux kernel through 4.2.6 allows local users to cause a denial of service (OOPS) via crafted keyctl commands.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ce1fad2740c648a4340f6f6c391a8a83769d2e8c
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=ce1fad2740c648a4340f6f6c391a8a83769d2e8c
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f05819df10d7b09f6d1eb6f8534a8f68e5a4fe61
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f05819df10d7b09f6d1eb6f8534a8f68e5a4fe61
- SUSE-SU-2015:2108
- SUSE-SU-2015:2108
- SUSE-SU-2015:2194
- SUSE-SU-2015:2194
- SUSE-SU-2015:2292
- SUSE-SU-2015:2292
- SUSE-SU-2015:2339
- SUSE-SU-2015:2339
- SUSE-SU-2015:2350
- SUSE-SU-2015:2350
- SUSE-SU-2016:0335
- SUSE-SU-2016:0335
- SUSE-SU-2016:0337
- SUSE-SU-2016:0337
- SUSE-SU-2016:0354
- SUSE-SU-2016:0354
- SUSE-SU-2016:0380
- SUSE-SU-2016:0380
- SUSE-SU-2016:0381
- SUSE-SU-2016:0381
- SUSE-SU-2016:0383
- SUSE-SU-2016:0383
- SUSE-SU-2016:0384
- SUSE-SU-2016:0384
- SUSE-SU-2016:0386
- SUSE-SU-2016:0386
- SUSE-SU-2016:0387
- SUSE-SU-2016:0387
- SUSE-SU-2016:0434
- SUSE-SU-2016:0434
- openSUSE-SU-2016:1008
- openSUSE-SU-2016:1008
- SUSE-SU-2016:2074
- SUSE-SU-2016:2074
- HPSBGN03565
- HPSBGN03565
- RHSA-2015:2636
- RHSA-2015:2636
- RHSA-2016:0185
- RHSA-2016:0185
- RHSA-2016:0212
- RHSA-2016:0212
- RHSA-2016:0224
- RHSA-2016:0224
- DSA-3396
- DSA-3396
- [oss-security] 20151020 Re: CVE request: crash when attempt to garbage collect an uninstantiated keyring - Linux kernel
- [oss-security] 20151020 Re: CVE request: crash when attempt to garbage collect an uninstantiated keyring - Linux kernel
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 77544
- 77544
- 1034472
- 1034472
- USN-2823-1
- USN-2823-1
- USN-2824-1
- USN-2824-1
- USN-2826-1
- USN-2826-1
- USN-2829-1
- USN-2829-1
- USN-2829-2
- USN-2829-2
- USN-2840-1
- USN-2840-1
- USN-2840-2
- USN-2840-2
- USN-2843-1
- USN-2843-1
- USN-2843-2
- USN-2843-2
- USN-2843-3
- USN-2843-3
- https://bugzilla.redhat.com/show_bug.cgi?id=1272172
- https://bugzilla.redhat.com/show_bug.cgi?id=1272172
- https://bugzilla.redhat.com/show_bug.cgi?id=1272371
- https://bugzilla.redhat.com/show_bug.cgi?id=1272371
- https://github.com/torvalds/linux/commit/ce1fad2740c648a4340f6f6c391a8a83769d2e8c
- https://github.com/torvalds/linux/commit/ce1fad2740c648a4340f6f6c391a8a83769d2e8c
- https://github.com/torvalds/linux/commit/f05819df10d7b09f6d1eb6f8534a8f68e5a4fe61
- https://github.com/torvalds/linux/commit/f05819df10d7b09f6d1eb6f8534a8f68e5a4fe61
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068676
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05068676
- https://source.android.com/security/bulletin/2016-12-01.html
- https://source.android.com/security/bulletin/2016-12-01.html
Modified: 2024-11-21
CVE-2015-8767
net/sctp/sm_sideeffect.c in the Linux kernel before 4.3 does not properly manage the relationship between a lock and a socket, which allows local users to cause a denial of service (deadlock) via a crafted sctp_accept call.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=635682a14427d241bab7bbdeebb48a7d7b91638e
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=635682a14427d241bab7bbdeebb48a7d7b91638e
- FEDORA-2016-5d43766e33
- FEDORA-2016-5d43766e33
- SUSE-SU-2016:0911
- SUSE-SU-2016:0911
- openSUSE-SU-2016:1008
- openSUSE-SU-2016:1008
- SUSE-SU-2016:1102
- SUSE-SU-2016:1102
- SUSE-SU-2016:2074
- SUSE-SU-2016:2074
- RHSA-2016:0715
- RHSA-2016:0715
- DSA-3448
- DSA-3448
- DSA-3503
- DSA-3503
- [oss-security] 20160111 CVE Request: Linux kernel - SCTP denial of service during heartbeat timeout functions.
- [oss-security] 20160111 CVE Request: Linux kernel - SCTP denial of service during heartbeat timeout functions.
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- 80268
- 80268
- USN-2930-1
- USN-2930-1
- USN-2930-2
- USN-2930-2
- USN-2930-3
- USN-2930-3
- USN-2931-1
- USN-2931-1
- USN-2932-1
- USN-2932-1
- USN-2967-1
- USN-2967-1
- USN-2967-2
- USN-2967-2
- RHSA-2016:1277
- RHSA-2016:1277
- RHSA-2016:1301
- RHSA-2016:1301
- RHSA-2016:1341
- RHSA-2016:1341
- https://bugzilla.redhat.com/show_bug.cgi?id=1297389
- https://bugzilla.redhat.com/show_bug.cgi?id=1297389
- https://github.com/torvalds/linux/commit/635682a14427d241bab7bbdeebb48a7d7b91638e
- https://github.com/torvalds/linux/commit/635682a14427d241bab7bbdeebb48a7d7b91638e
Modified: 2024-11-21
CVE-2016-0821
The LIST_POISON feature in include/linux/poison.h in the Linux kernel before 4.3, as used in Android 6.0.1 before 2016-03-01, does not properly consider the relationship to the mmap_min_addr value, which makes it easier for attackers to bypass a poison-pointer protection mechanism by triggering the use of an uninitialized list entry, aka Android internal bug 26186802, a different vulnerability than CVE-2015-3636.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8a5e5e02fc83aaf67053ab53b359af08c6c49aaf
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8a5e5e02fc83aaf67053ab53b359af08c6c49aaf
- http://source.android.com/security/bulletin/2016-03-01.html
- http://source.android.com/security/bulletin/2016-03-01.html
- DSA-3607
- DSA-3607
- [oss-security] 20150502 Re: CVE request for a fixed bug existed in all versions of linux kernel from KeenTeam
- [oss-security] 20150502 Re: CVE request for a fixed bug existed in all versions of linux kernel from KeenTeam
- 84260
- 84260
- USN-2967-1
- USN-2967-1
- USN-2967-2
- USN-2967-2
- USN-2968-1
- USN-2968-1
- USN-2968-2
- USN-2968-2
- USN-2969-1
- USN-2969-1
- USN-2970-1
- USN-2970-1
- USN-2971-1
- USN-2971-1
- USN-2971-2
- USN-2971-2
- USN-2971-3
- USN-2971-3
- https://github.com/torvalds/linux/commit/8a5e5e02fc83aaf67053ab53b359af08c6c49aaf
- https://github.com/torvalds/linux/commit/8a5e5e02fc83aaf67053ab53b359af08c6c49aaf
Modified: 2024-11-21
CVE-2016-2053
The asn1_ber_decoder function in lib/asn1_decoder.c in the Linux kernel before 4.3 allows attackers to cause a denial of service (panic) via an ASN.1 BER file that lacks a public key, leading to mishandling by the public_key_verify_signature function in crypto/asymmetric_keys/public_key.c.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0d62e9dd6da45bbf0f33a8617afc5fe774c8f45f
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0d62e9dd6da45bbf0f33a8617afc5fe774c8f45f
- openSUSE-SU-2016:1641
- openSUSE-SU-2016:1641
- SUSE-SU-2016:1672
- SUSE-SU-2016:1672
- SUSE-SU-2016:1690
- SUSE-SU-2016:1690
- SUSE-SU-2016:1937
- SUSE-SU-2016:1937
- SUSE-SU-2016:1961
- SUSE-SU-2016:1961
- SUSE-SU-2016:1985
- SUSE-SU-2016:1985
- SUSE-SU-2016:1994
- SUSE-SU-2016:1994
- SUSE-SU-2016:1995
- SUSE-SU-2016:1995
- SUSE-SU-2016:2000
- SUSE-SU-2016:2000
- SUSE-SU-2016:2001
- SUSE-SU-2016:2001
- SUSE-SU-2016:2002
- SUSE-SU-2016:2002
- SUSE-SU-2016:2003
- SUSE-SU-2016:2003
- SUSE-SU-2016:2005
- SUSE-SU-2016:2005
- SUSE-SU-2016:2006
- SUSE-SU-2016:2006
- SUSE-SU-2016:2007
- SUSE-SU-2016:2007
- SUSE-SU-2016:2009
- SUSE-SU-2016:2009
- SUSE-SU-2016:2010
- SUSE-SU-2016:2010
- SUSE-SU-2016:2011
- SUSE-SU-2016:2011
- SUSE-SU-2016:2014
- SUSE-SU-2016:2014
- SUSE-SU-2016:2105
- SUSE-SU-2016:2105
- openSUSE-SU-2016:2184
- openSUSE-SU-2016:2184
- RHSA-2016:2574
- RHSA-2016:2574
- RHSA-2016:2584
- RHSA-2016:2584
- [oss-security] 20160125 Re: Linux kernel : Denial of service with specially crafted key file.
- [oss-security] 20160125 Re: Linux kernel : Denial of service with specially crafted key file.
- 1036763
- 1036763
- https://bugzilla.redhat.com/show_bug.cgi?id=1300237
- https://bugzilla.redhat.com/show_bug.cgi?id=1300237
- https://github.com/torvalds/linux/commit/0d62e9dd6da45bbf0f33a8617afc5fe774c8f45f
- https://github.com/torvalds/linux/commit/0d62e9dd6da45bbf0f33a8617afc5fe774c8f45f
Modified: 2024-11-21
CVE-2017-13715
The __skb_flow_dissect function in net/core/flow_dissector.c in the Linux kernel before 4.3 does not ensure that n_proto, ip_proto, and thoff are initialized, which allows remote attackers to cause a denial of service (system crash) or possibly execute arbitrary code via a single crafted MPLS packet.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a6e544b0a88b53114bfa5a57e21b7be7a8dfc9d0
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a6e544b0a88b53114bfa5a57e21b7be7a8dfc9d0
- http://seclists.org/oss-sec/2017/q3/345
- http://seclists.org/oss-sec/2017/q3/345
- 100517
- 100517
- https://github.com/torvalds/linux/commit/a6e544b0a88b53114bfa5a57e21b7be7a8dfc9d0
- https://github.com/torvalds/linux/commit/a6e544b0a88b53114bfa5a57e21b7be7a8dfc9d0
Package kernel-modules-nvidia-un-def updated to version 352.55-alt1.262912.1 for branch sisyphus in task 152629.
Closed vulnerabilities
BDU:2015-12100
Уязвимость программного обеспечения графического процессора NVIDIA GPU, позволяющая нарушителю повысить свои привилегии или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2015-5053
The host memory mapping path feature in the NVIDIA GPU graphics driver R346 before 346.87 and R352 before 352.41 for Linux and R352 before 352.46 for GRID vGPU and vSGA does not properly restrict access to third-party device IO memory, which allows attackers to gain privileges, cause a denial of service (resource consumption), or possibly have unspecified other impact via unknown vectors related to the follow_pfn kernel-mode API call.
Closed vulnerabilities
BDU:2015-10444
Уязвимость сервера печати CUPS, позволяющая нарушителю изменить файл конфигурации устройства или выполнить произвольный код
BDU:2015-10516
Уязвимость функции cgi_puts сервера печати CUPS, позволяющая нарушителю внедрить произвольный JavaScript- или HTML-код в формируемые страницы веб-интерфейса
Modified: 2024-11-21
CVE-2015-1158
The add_job function in scheduler/ipp.c in cupsd in CUPS before 2.0.3 performs incorrect free operations for multiple-value job-originating-host-name attributes, which allows remote attackers to trigger data corruption for reference-counted strings via a crafted (1) IPP_CREATE_JOB or (2) IPP_PRINT_JOB request, as demonstrated by replacing the configuration file and consequently executing arbitrary code.
- http://googleprojectzero.blogspot.in/2015/06/owning-internet-printing-case-study-in.html
- http://googleprojectzero.blogspot.in/2015/06/owning-internet-printing-case-study-in.html
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10702
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10702
- SUSE-SU-2015:1041
- SUSE-SU-2015:1041
- SUSE-SU-2015:1044
- SUSE-SU-2015:1044
- openSUSE-SU-2015:1056
- openSUSE-SU-2015:1056
- RHSA-2015:1123
- RHSA-2015:1123
- http://www.cups.org/blog.php?L1082
- http://www.cups.org/blog.php?L1082
- DSA-3283
- DSA-3283
- VU#810572
- VU#810572
- 75098
- 75098
- 1032556
- 1032556
- USN-2629-1
- USN-2629-1
- https://bugzilla.opensuse.org/show_bug.cgi?id=924208
- https://bugzilla.opensuse.org/show_bug.cgi?id=924208
- https://bugzilla.redhat.com/show_bug.cgi?id=1221641
- https://bugzilla.redhat.com/show_bug.cgi?id=1221641
- https://code.google.com/p/google-security-research/issues/detail?id=455
- https://code.google.com/p/google-security-research/issues/detail?id=455
- https://github.com/0x00string/oldays/blob/master/CVE-2015-1158.py
- https://github.com/0x00string/oldays/blob/master/CVE-2015-1158.py
- GLSA-201510-07
- GLSA-201510-07
- https://www.cups.org/str.php?L4609
- https://www.cups.org/str.php?L4609
- 37336
- 37336
- 41233
- 41233
Modified: 2024-11-21
CVE-2015-1159
Cross-site scripting (XSS) vulnerability in the cgi_puts function in cgi-bin/template.c in the template engine in CUPS before 2.0.3 allows remote attackers to inject arbitrary web script or HTML via the QUERY parameter to help/.
- http://googleprojectzero.blogspot.in/2015/06/owning-internet-printing-case-study-in.html
- http://googleprojectzero.blogspot.in/2015/06/owning-internet-printing-case-study-in.html
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10702
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10702
- SUSE-SU-2015:1041
- SUSE-SU-2015:1041
- SUSE-SU-2015:1044
- SUSE-SU-2015:1044
- openSUSE-SU-2015:1056
- openSUSE-SU-2015:1056
- RHSA-2015:1123
- RHSA-2015:1123
- http://www.cups.org/blog.php?L1082
- http://www.cups.org/blog.php?L1082
- DSA-3283
- DSA-3283
- VU#810572
- VU#810572
- 75106
- 75106
- 1032556
- 1032556
- USN-2629-1
- USN-2629-1
- https://bugzilla.opensuse.org/show_bug.cgi?id=924208
- https://bugzilla.opensuse.org/show_bug.cgi?id=924208
- https://bugzilla.redhat.com/show_bug.cgi?id=1221642
- https://bugzilla.redhat.com/show_bug.cgi?id=1221642
- https://code.google.com/p/google-security-research/issues/detail?id=455
- https://code.google.com/p/google-security-research/issues/detail?id=455
- GLSA-201510-07
- GLSA-201510-07
- https://www.cups.org/str.php?L4609
- https://www.cups.org/str.php?L4609
Closed vulnerabilities
BDU:2015-12011
Уязвимости библиотеки libpng, позволяющие нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2015-8126
Multiple buffer overflows in the (1) png_set_PLTE and (2) png_get_PLTE functions in libpng before 1.0.64, 1.1.x and 1.2.x before 1.2.54, 1.3.x and 1.4.x before 1.4.17, 1.5.x before 1.5.24, and 1.6.x before 1.6.19 allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a small bit-depth value in an IHDR (aka image header) chunk in a PNG image.
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html
- http://googlechromereleases.blogspot.com/2016/03/stable-channel-update.html
- APPLE-SA-2016-03-21-5
- APPLE-SA-2016-03-21-5
- FEDORA-2015-5e52306c9c
- FEDORA-2015-5e52306c9c
- FEDORA-2015-1d87313b7c
- FEDORA-2015-1d87313b7c
- FEDORA-2015-ec2ddd15d7
- FEDORA-2015-ec2ddd15d7
- FEDORA-2015-501493d853
- FEDORA-2015-501493d853
- FEDORA-2015-13668fff74
- FEDORA-2015-13668fff74
- FEDORA-2015-97fc1797fa
- FEDORA-2015-97fc1797fa
- FEDORA-2015-8a1243db75
- FEDORA-2015-8a1243db75
- FEDORA-2016-9a1c707b10
- FEDORA-2016-9a1c707b10
- FEDORA-2016-43735c33a7
- FEDORA-2016-43735c33a7
- FEDORA-2015-c80ec85542
- FEDORA-2015-c80ec85542
- FEDORA-2015-233750b6ab
- FEDORA-2015-233750b6ab
- FEDORA-2015-4ad4998d00
- FEDORA-2015-4ad4998d00
- openSUSE-SU-2015:2099
- openSUSE-SU-2015:2099
- openSUSE-SU-2015:2100
- openSUSE-SU-2015:2100
- SUSE-SU-2016:0256
- SUSE-SU-2016:0256
- openSUSE-SU-2016:0263
- openSUSE-SU-2016:0263
- SUSE-SU-2016:0265
- SUSE-SU-2016:0265
- openSUSE-SU-2016:0268
- openSUSE-SU-2016:0268
- SUSE-SU-2016:0269
- SUSE-SU-2016:0269
- openSUSE-SU-2016:0270
- openSUSE-SU-2016:0270
- openSUSE-SU-2016:0272
- openSUSE-SU-2016:0272
- openSUSE-SU-2016:0279
- openSUSE-SU-2016:0279
- openSUSE-SU-2016:0664
- openSUSE-SU-2016:0664
- SUSE-SU-2016:0665
- SUSE-SU-2016:0665
- openSUSE-SU-2016:0684
- openSUSE-SU-2016:0684
- openSUSE-SU-2016:0729
- openSUSE-SU-2016:0729
- openSUSE-SU-2015:2135
- openSUSE-SU-2015:2135
- openSUSE-SU-2015:2136
- openSUSE-SU-2015:2136
- openSUSE-SU-2015:2262
- openSUSE-SU-2015:2262
- openSUSE-SU-2015:2263
- openSUSE-SU-2015:2263
- openSUSE-SU-2016:0103
- openSUSE-SU-2016:0103
- openSUSE-SU-2016:0104
- openSUSE-SU-2016:0104
- openSUSE-SU-2016:0105
- openSUSE-SU-2016:0105
- RHSA-2015:2594
- RHSA-2015:2594
- RHSA-2015:2595
- RHSA-2015:2595
- RHSA-2015:2596
- RHSA-2015:2596
- RHSA-2016:0055
- RHSA-2016:0055
- RHSA-2016:0056
- RHSA-2016:0056
- RHSA-2016:0057
- RHSA-2016:0057
- DSA-3399
- DSA-3399
- DSA-3507
- DSA-3507
- [oss-security] 20151112 CVE request: libpng buffer overflow in png_set_PLTE
- [oss-security] 20151112 CVE request: libpng buffer overflow in png_set_PLTE
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- 77568
- 77568
- 1034142
- 1034142
- USN-2815-1
- USN-2815-1
- RHSA-2016:1430
- RHSA-2016:1430
- https://code.google.com/p/chromium/issues/detail?id=560291
- https://code.google.com/p/chromium/issues/detail?id=560291
- https://kc.mcafee.com/corporate/index?page=content&id=SB10148
- https://kc.mcafee.com/corporate/index?page=content&id=SB10148
- GLSA-201603-09
- GLSA-201603-09
- GLSA-201611-08
- GLSA-201611-08
- https://support.apple.com/HT206167
- https://support.apple.com/HT206167
Closed vulnerabilities
Modified: 2024-11-21
CVE-2005-4890
There is a possible tty hijacking in shadow 4.x before 4.1.5 and sudo 1.x before 1.7.4 via "su - user -c program". The user session can be escaped to the parent session by using the TIOCSTI ioctl to push characters into the input buffer to be read by the next process.
- http://www.openwall.com/lists/oss-security/2012/11/06/8
- http://www.openwall.com/lists/oss-security/2012/11/06/8
- http://www.openwall.com/lists/oss-security/2013/05/20/3
- http://www.openwall.com/lists/oss-security/2013/05/20/3
- http://www.openwall.com/lists/oss-security/2013/11/28/10
- http://www.openwall.com/lists/oss-security/2013/11/28/10
- http://www.openwall.com/lists/oss-security/2013/11/29/5
- http://www.openwall.com/lists/oss-security/2013/11/29/5
- http://www.openwall.com/lists/oss-security/2014/10/20/9
- http://www.openwall.com/lists/oss-security/2014/10/20/9
- http://www.openwall.com/lists/oss-security/2014/10/21/1
- http://www.openwall.com/lists/oss-security/2014/10/21/1
- http://www.openwall.com/lists/oss-security/2014/12/15/5
- http://www.openwall.com/lists/oss-security/2014/12/15/5
- http://www.openwall.com/lists/oss-security/2016/02/25/6
- http://www.openwall.com/lists/oss-security/2016/02/25/6
- https://access.redhat.com/security/cve/cve-2005-4890
- https://access.redhat.com/security/cve/cve-2005-4890
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2005-4890
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2005-4890
- https://security-tracker.debian.org/tracker/CVE-2005-4890
- https://security-tracker.debian.org/tracker/CVE-2005-4890
Closed bugs
Собрать утилиты newuidmap/newgidmap