ALT-BU-2015-2793-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2022-10-18
BDU:2016-00608
Уязвимость утилиты архивирования Сpio, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-04-12
CVE-2014-9112
Heap-based buffer overflow in the process_copy_in function in GNU Cpio 2.11 allows remote attackers to cause a denial of service via a large block value in a cpio archive.
- http://seclists.org/fulldisclosure/2014/Nov/74
- http://secunia.com/advisories/60167
- http://secunia.com/advisories/62145
- http://www.debian.org/security/2014/dsa-3111
- http://www.openwall.com/lists/oss-security/2014/11/23/2
- http://www.openwall.com/lists/oss-security/2014/11/25/2
- http://www.openwall.com/lists/oss-security/2014/11/26/20
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/71248
- http://www.ubuntu.com/usn/USN-2456-1
- https://exchange.xforce.ibmcloud.com/vulnerabilities/98918
- https://savannah.gnu.org/bugs/?43709
- http://seclists.org/fulldisclosure/2014/Nov/74
- http://secunia.com/advisories/60167
- http://secunia.com/advisories/62145
- http://www.debian.org/security/2014/dsa-3111
- http://www.openwall.com/lists/oss-security/2014/11/23/2
- http://www.openwall.com/lists/oss-security/2014/11/25/2
- http://www.openwall.com/lists/oss-security/2014/11/26/20
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/71248
- http://www.ubuntu.com/usn/USN-2456-1
- https://exchange.xforce.ibmcloud.com/vulnerabilities/98918
- https://savannah.gnu.org/bugs/?43709
Modified: 2025-04-12
CVE-2015-1197
cpio 2.11, when using the --no-absolute-filenames option, allows local users to write to arbitrary files via a symlink attack on a file in an archive.
- http://advisories.mageia.org/MGASA-2015-0080.html
- http://packetstormsecurity.com/files/169458/Zimbra-Collaboration-Suite-TAR-Path-Traversal.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:066
- http://www.openwall.com/lists/oss-security/2015/01/07/5
- http://www.openwall.com/lists/oss-security/2015/01/18/7
- http://www.openwall.com/lists/oss-security/2023/12/21/8
- http://www.openwall.com/lists/oss-security/2023/12/27/1
- http://www.securityfocus.com/bid/71914
- http://www.ubuntu.com/usn/USN-2906-1
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774669
- https://lists.gnu.org/archive/html/bug-cpio/2015-01/msg00000.html
- http://advisories.mageia.org/MGASA-2015-0080.html
- http://packetstormsecurity.com/files/169458/Zimbra-Collaboration-Suite-TAR-Path-Traversal.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:066
- http://www.openwall.com/lists/oss-security/2015/01/07/5
- http://www.openwall.com/lists/oss-security/2015/01/18/7
- http://www.openwall.com/lists/oss-security/2023/12/21/8
- http://www.openwall.com/lists/oss-security/2023/12/27/1
- http://www.securityfocus.com/bid/71914
- http://www.ubuntu.com/usn/USN-2906-1
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=774669
- https://lists.gnu.org/archive/html/bug-cpio/2015-01/msg00000.html
Modified: 2025-04-12
CVE-2016-2037
The cpio_safer_name_suffix function in util.c in cpio 2.11 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted cpio file.
- http://www.debian.org/security/2016/dsa-3483
- http://www.openwall.com/lists/oss-security/2016/01/19/4
- http://www.openwall.com/lists/oss-security/2016/01/22/4
- http://www.securityfocus.com/bid/82293
- http://www.securitytracker.com/id/1035067
- http://www.ubuntu.com/usn/USN-2906-1
- http://www.debian.org/security/2016/dsa-3483
- http://www.openwall.com/lists/oss-security/2016/01/19/4
- http://www.openwall.com/lists/oss-security/2016/01/22/4
- http://www.securityfocus.com/bid/82293
- http://www.securitytracker.com/id/1035067
- http://www.ubuntu.com/usn/USN-2906-1
Closed vulnerabilities
Modified: 2025-04-12
CVE-2015-2059
The stringprep_utf8_to_ucs4 function in libin before 1.31, as used in jabberd2, allows context-dependent attackers to read system memory and possibly have other unspecified impact via invalid UTF-8 characters in a string, which triggers an out-of-bounds read.
- http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=2e97c279
- http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162537.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162549.html
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00042.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html
- http://www.debian.org/security/2016/dsa-3578
- http://www.openwall.com/lists/oss-security/2015/02/23/25
- http://www.securityfocus.com/bid/72736
- http://www.ubuntu.com/usn/USN-3068-1
- https://github.com/jabberd2/jabberd2/issues/85
- http://git.savannah.gnu.org/cgit/libidn.git/commit/?id=2e97c279
- http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162537.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162549.html
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00042.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00098.html
- http://www.debian.org/security/2016/dsa-3578
- http://www.openwall.com/lists/oss-security/2015/02/23/25
- http://www.securityfocus.com/bid/72736
- http://www.ubuntu.com/usn/USN-3068-1
- https://github.com/jabberd2/jabberd2/issues/85
Closed bugs
policy: rpm-build-fpc should be required by fpc pkg
Closed vulnerabilities
BDU:2022-02522
Уязвимость функции _zip_cdir_new (zip_dirent.c) интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
Modified: 2025-04-12
CVE-2015-2331
Integer overflow in the _zip_cdir_new function in zip_dirent.c in libzip 0.11.2 and earlier, as used in the ZIP extension in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a ZIP archive that contains many entries, leading to a heap-based buffer overflow.
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=ef8fc4b53d92fbfcd8ef1abbd6f2f5fe2c4a11e5
- http://hg.nih.at/libzip/rev/9f11d54f692e
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154266.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154276.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154666.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155299.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155622.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153983.html
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00083.html
- http://lists.opensuse.org/opensuse-updates/2015-04/msg00002.html
- http://marc.info/?l=bugtraq&m=143403519711434&w=2
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://php.net/ChangeLog-5.php
- http://www.debian.org/security/2015/dsa-3198
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:079
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.securitytracker.com/id/1031985
- https://bugs.php.net/bug.php?id=69253
- https://support.apple.com/HT205267
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=ef8fc4b53d92fbfcd8ef1abbd6f2f5fe2c4a11e5
- http://hg.nih.at/libzip/rev/9f11d54f692e
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154266.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154276.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154666.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155299.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155622.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153983.html
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00083.html
- http://lists.opensuse.org/opensuse-updates/2015-04/msg00002.html
- http://marc.info/?l=bugtraq&m=143403519711434&w=2
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://php.net/ChangeLog-5.php
- http://www.debian.org/security/2015/dsa-3198
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:079
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.securitytracker.com/id/1031985
- https://bugs.php.net/bug.php?id=69253
- https://support.apple.com/HT205267
Closed bugs
2015-05-04: Released libzip 1.0.1
Closed vulnerabilities
BDU:2022-02522
Уязвимость функции _zip_cdir_new (zip_dirent.c) интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
Modified: 2025-04-12
CVE-2015-2331
Integer overflow in the _zip_cdir_new function in zip_dirent.c in libzip 0.11.2 and earlier, as used in the ZIP extension in PHP before 5.4.39, 5.5.x before 5.5.23, and 5.6.x before 5.6.7 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a ZIP archive that contains many entries, leading to a heap-based buffer overflow.
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=ef8fc4b53d92fbfcd8ef1abbd6f2f5fe2c4a11e5
- http://hg.nih.at/libzip/rev/9f11d54f692e
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154266.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154276.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154666.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155299.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155622.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153983.html
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00083.html
- http://lists.opensuse.org/opensuse-updates/2015-04/msg00002.html
- http://marc.info/?l=bugtraq&m=143403519711434&w=2
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://php.net/ChangeLog-5.php
- http://www.debian.org/security/2015/dsa-3198
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:079
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.securitytracker.com/id/1031985
- https://bugs.php.net/bug.php?id=69253
- https://support.apple.com/HT205267
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=ef8fc4b53d92fbfcd8ef1abbd6f2f5fe2c4a11e5
- http://hg.nih.at/libzip/rev/9f11d54f692e
- http://lists.apple.com/archives/security-announce/2015/Sep/msg00008.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154266.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154276.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/154666.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155299.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-April/155622.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-March/153983.html
- http://lists.opensuse.org/opensuse-updates/2015-03/msg00083.html
- http://lists.opensuse.org/opensuse-updates/2015-04/msg00002.html
- http://marc.info/?l=bugtraq&m=143403519711434&w=2
- http://marc.info/?l=bugtraq&m=143748090628601&w=2
- http://marc.info/?l=bugtraq&m=144050155601375&w=2
- http://php.net/ChangeLog-5.php
- http://www.debian.org/security/2015/dsa-3198
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:079
- http://www.oracle.com/technetwork/topics/security/bulletinjul2015-2511963.html
- http://www.securitytracker.com/id/1031985
- https://bugs.php.net/bug.php?id=69253
- https://support.apple.com/HT205267