ALT-BU-2016-2564-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2025-04-12
CVE-2015-8618
The Int.Exp Montgomery code in the math/big library in Go 1.5.x before 1.5.3 mishandles carry propagation and produces incorrect output, which makes it easier for attackers to obtain private RSA keys via unspecified vectors.
- http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175642.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176179.html
- http://lists.opensuse.org/opensuse-updates/2016-05/msg00077.html
- http://www.openwall.com/lists/oss-security/2015/12/21/6
- http://www.openwall.com/lists/oss-security/2015/12/22/9
- http://www.openwall.com/lists/oss-security/2016/01/13/7
- https://github.com/golang/go/issues/13515
- https://go-review.googlesource.com/#/c/17672/
- https://groups.google.com/forum/#%21topic/golang-announce/MEATuOi_ei4
- http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175642.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176179.html
- http://lists.opensuse.org/opensuse-updates/2016-05/msg00077.html
- http://www.openwall.com/lists/oss-security/2015/12/21/6
- http://www.openwall.com/lists/oss-security/2015/12/22/9
- http://www.openwall.com/lists/oss-security/2016/01/13/7
- https://github.com/golang/go/issues/13515
- https://go-review.googlesource.com/#/c/17672/
- https://groups.google.com/forum/#%21topic/golang-announce/MEATuOi_ei4
Closed vulnerabilities
Modified: 2021-03-23
BDU:2016-00707
Уязвимость прокси-сервера nginx, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-04-12
CVE-2016-0742
The resolver in nginx before 1.8.1 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (invalid pointer dereference and worker process crash) via a crafted UDP DNS response.
- http://lists.opensuse.org/opensuse-updates/2016-02/msg00042.html
- http://mailman.nginx.org/pipermail/nginx/2016-January/049700.html
- http://seclists.org/fulldisclosure/2021/Sep/36
- http://www.debian.org/security/2016/dsa-3473
- http://www.securitytracker.com/id/1034869
- http://www.ubuntu.com/usn/USN-2892-1
- https://access.redhat.com/errata/RHSA-2016:1425
- https://bto.bluecoat.com/security-advisory/sa115
- https://bugzilla.redhat.com/show_bug.cgi?id=1302587
- https://security.gentoo.org/glsa/201606-06
- https://support.apple.com/kb/HT212818
- http://lists.opensuse.org/opensuse-updates/2016-02/msg00042.html
- http://mailman.nginx.org/pipermail/nginx/2016-January/049700.html
- http://seclists.org/fulldisclosure/2021/Sep/36
- http://www.debian.org/security/2016/dsa-3473
- http://www.securitytracker.com/id/1034869
- http://www.ubuntu.com/usn/USN-2892-1
- https://access.redhat.com/errata/RHSA-2016:1425
- https://bto.bluecoat.com/security-advisory/sa115
- https://bugzilla.redhat.com/show_bug.cgi?id=1302587
- https://security.gentoo.org/glsa/201606-06
- https://support.apple.com/kb/HT212818
Modified: 2025-04-12
CVE-2016-0746
Use-after-free vulnerability in the resolver in nginx 0.6.18 through 1.8.0 and 1.9.x before 1.9.10 allows remote attackers to cause a denial of service (worker process crash) or possibly have unspecified other impact via a crafted DNS response related to CNAME response processing.
- http://lists.opensuse.org/opensuse-updates/2016-02/msg00042.html
- http://mailman.nginx.org/pipermail/nginx/2016-January/049700.html
- http://seclists.org/fulldisclosure/2021/Sep/36
- http://www.debian.org/security/2016/dsa-3473
- http://www.securitytracker.com/id/1034869
- http://www.ubuntu.com/usn/USN-2892-1
- https://access.redhat.com/errata/RHSA-2016:1425
- https://bto.bluecoat.com/security-advisory/sa115
- https://bugzilla.redhat.com/show_bug.cgi?id=1302588
- https://security.gentoo.org/glsa/201606-06
- https://support.apple.com/kb/HT212818
- http://lists.opensuse.org/opensuse-updates/2016-02/msg00042.html
- http://mailman.nginx.org/pipermail/nginx/2016-January/049700.html
- http://seclists.org/fulldisclosure/2021/Sep/36
- http://www.debian.org/security/2016/dsa-3473
- http://www.securitytracker.com/id/1034869
- http://www.ubuntu.com/usn/USN-2892-1
- https://access.redhat.com/errata/RHSA-2016:1425
- https://bto.bluecoat.com/security-advisory/sa115
- https://bugzilla.redhat.com/show_bug.cgi?id=1302588
- https://security.gentoo.org/glsa/201606-06
- https://support.apple.com/kb/HT212818
Modified: 2025-04-12
CVE-2016-0747
The resolver in nginx before 1.8.1 and 1.9.x before 1.9.10 does not properly limit CNAME resolution, which allows remote attackers to cause a denial of service (worker process resource consumption) via vectors related to arbitrary name resolution.
- http://lists.opensuse.org/opensuse-updates/2016-02/msg00042.html
- http://mailman.nginx.org/pipermail/nginx/2016-January/049700.html
- http://seclists.org/fulldisclosure/2021/Sep/36
- http://www.debian.org/security/2016/dsa-3473
- http://www.securitytracker.com/id/1034869
- http://www.ubuntu.com/usn/USN-2892-1
- https://access.redhat.com/errata/RHSA-2016:1425
- https://bto.bluecoat.com/security-advisory/sa115
- https://bugzilla.redhat.com/show_bug.cgi?id=1302589
- https://security.gentoo.org/glsa/201606-06
- https://support.apple.com/kb/HT212818
- http://lists.opensuse.org/opensuse-updates/2016-02/msg00042.html
- http://mailman.nginx.org/pipermail/nginx/2016-January/049700.html
- http://seclists.org/fulldisclosure/2021/Sep/36
- http://www.debian.org/security/2016/dsa-3473
- http://www.securitytracker.com/id/1034869
- http://www.ubuntu.com/usn/USN-2892-1
- https://access.redhat.com/errata/RHSA-2016:1425
- https://bto.bluecoat.com/security-advisory/sa115
- https://bugzilla.redhat.com/show_bug.cgi?id=1302589
- https://security.gentoo.org/glsa/201606-06
- https://support.apple.com/kb/HT212818