ALT-BU-2016-2597-1
Branch sisyphus update bulletin.
Closed bugs
lsdvd: new version
Closed bugs
Включить в зависимости пакет gst-plugins-ugly
Флеш-плагин падает с ошибкой сегментации после обновления Firefox
Падает с ошибкой сегментации после обновления
Package libgraphite2 updated to version 1.3.5-alt1 for branch sisyphus in task 159416.
Closed vulnerabilities
BDU:2016-00573
Уязвимость браузеров Firefox ESR и Firefox, программного средства рендеринга Graphite 2, почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании, получить конфиденциальную информацию или выполнить произвольный код
BDU:2016-00574
Уязвимость браузера Firefox ESR, программного средства рендеринга Graphite 2, почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2016-00575
Уязвимость браузера Firefox ESR, программного средства рендеринга Graphite 2, почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2016-00576
Уязвимость браузера Firefox ESR, программного средства рендеринга Graphite 2, почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании или получить конфиденциальную информацию
Modified: 2024-11-21
CVE-2016-1521
The directrun function in directmachine.cpp in Libgraphite in Graphite 2 1.2.4, as used in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.6.1, does not validate a certain skip operation, which allows remote attackers to execute arbitrary code, obtain sensitive information, or cause a denial of service (out-of-bounds read and application crash) via a crafted Graphite smart font.
- http://blog.talosintel.com/2016/02/vulnerability-spotlight-libgraphite.html
- http://blog.talosintel.com/2016/02/vulnerability-spotlight-libgraphite.html
- FEDORA-2016-4154a4d0ba
- FEDORA-2016-4154a4d0ba
- FEDORA-2016-338a7e9925
- FEDORA-2016-338a7e9925
- SUSE-SU-2016:0779
- SUSE-SU-2016:0779
- openSUSE-SU-2016:0791
- openSUSE-SU-2016:0791
- openSUSE-SU-2016:0875
- openSUSE-SU-2016:0875
- RHSA-2016:0197
- RHSA-2016:0197
- RHSA-2016:0258
- RHSA-2016:0258
- RHSA-2016:0594
- RHSA-2016:0594
- DSA-3479
- DSA-3479
- http://www.mozilla.org/security/announce/2016/mfsa2016-14.html
- http://www.mozilla.org/security/announce/2016/mfsa2016-14.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- 82991
- 82991
- USN-2902-1
- USN-2902-1
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- GLSA-201701-35
- GLSA-201701-35
- GLSA-201701-63
- GLSA-201701-63
Modified: 2024-11-21
CVE-2016-1522
Code.cpp in Libgraphite in Graphite 2 1.2.4, as used in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.6.1, does not consider recursive load calls during a size check, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly execute arbitrary code via a crafted Graphite smart font.
- http://blog.talosintel.com/2016/02/vulnerability-spotlight-libgraphite.html
- http://blog.talosintel.com/2016/02/vulnerability-spotlight-libgraphite.html
- FEDORA-2016-4154a4d0ba
- FEDORA-2016-4154a4d0ba
- FEDORA-2016-338a7e9925
- FEDORA-2016-338a7e9925
- openSUSE-SU-2016:0791
- openSUSE-SU-2016:0791
- RHSA-2016:0197
- RHSA-2016:0197
- RHSA-2016:0258
- RHSA-2016:0258
- RHSA-2016:0594
- RHSA-2016:0594
- DSA-3479
- DSA-3479
- http://www.mozilla.org/security/announce/2016/mfsa2016-14.html
- http://www.mozilla.org/security/announce/2016/mfsa2016-14.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- 82991
- 82991
- USN-2902-1
- USN-2902-1
- GLSA-201701-35
- GLSA-201701-35
- GLSA-201701-63
- GLSA-201701-63
Modified: 2024-11-21
CVE-2016-1523
The SillMap::readFace function in FeatureMap.cpp in Libgraphite in Graphite 2 1.2.4, as used in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.6.1, mishandles a return value, which allows remote attackers to cause a denial of service (missing initialization, NULL pointer dereference, and application crash) via a crafted Graphite smart font.
- http://blog.talosintel.com/2016/02/vulnerability-spotlight-libgraphite.html
- http://blog.talosintel.com/2016/02/vulnerability-spotlight-libgraphite.html
- FEDORA-2016-4154a4d0ba
- FEDORA-2016-4154a4d0ba
- FEDORA-2016-338a7e9925
- FEDORA-2016-338a7e9925
- SUSE-SU-2016:0554
- SUSE-SU-2016:0554
- SUSE-SU-2016:0564
- SUSE-SU-2016:0564
- SUSE-SU-2016:0779
- SUSE-SU-2016:0779
- openSUSE-SU-2016:0791
- openSUSE-SU-2016:0791
- openSUSE-SU-2016:0875
- openSUSE-SU-2016:0875
- RHSA-2016:0197
- RHSA-2016:0197
- RHSA-2016:0258
- RHSA-2016:0258
- RHSA-2016:0594
- RHSA-2016:0594
- DSA-3477
- DSA-3477
- DSA-3479
- DSA-3479
- DSA-3491
- DSA-3491
- http://www.mozilla.org/security/announce/2016/mfsa2016-14.html
- http://www.mozilla.org/security/announce/2016/mfsa2016-14.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- 82991
- 82991
- 1035017
- 1035017
- USN-2902-1
- USN-2902-1
- USN-2904-1
- USN-2904-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1246093
- https://bugzilla.mozilla.org/show_bug.cgi?id=1246093
- GLSA-201605-06
- GLSA-201605-06
- GLSA-201701-35
- GLSA-201701-35
- GLSA-201701-63
- GLSA-201701-63
Modified: 2024-11-21
CVE-2016-1526
The TtfUtil:LocaLookup function in TtfUtil.cpp in Libgraphite in Graphite 2 1.2.4, as used in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.6.1, incorrectly validates a size value, which allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and application crash) via a crafted Graphite smart font.
- http://blog.talosintel.com/2016/02/vulnerability-spotlight-libgraphite.html
- http://blog.talosintel.com/2016/02/vulnerability-spotlight-libgraphite.html
- FEDORA-2016-4154a4d0ba
- FEDORA-2016-4154a4d0ba
- FEDORA-2016-338a7e9925
- FEDORA-2016-338a7e9925
- SUSE-SU-2016:0779
- SUSE-SU-2016:0779
- openSUSE-SU-2016:0791
- openSUSE-SU-2016:0791
- openSUSE-SU-2016:0875
- openSUSE-SU-2016:0875
- RHSA-2016:0594
- RHSA-2016:0594
- RHSA-2016:0695
- RHSA-2016:0695
- DSA-3479
- DSA-3479
- http://www.mozilla.org/security/announce/2016/mfsa2016-14.html
- http://www.mozilla.org/security/announce/2016/mfsa2016-14.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- 82991
- 82991
- USN-2902-1
- USN-2902-1
- GLSA-201701-35
- GLSA-201701-35
- GLSA-201701-63
- GLSA-201701-63
Package thunderbird-esr updated to version 38.6.0-alt1 for branch sisyphus in task 159610.
Closed vulnerabilities
No data currently available.
No data currently available.
No data currently available.
No data currently available.
Closed vulnerabilities
BDU:2016-00434
Уязвимость библиотеки glibc, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2017-00283
Уязвимости библиотеки, обеспечивающей системные вызовы и основные функции, glibc, позволяющие нарушителю вызвать отказ в обслуживании или выполнить произвольный код
Modified: 2024-11-21
CVE-2014-9761
Multiple stack-based buffer overflows in the GNU C Library (aka glibc or libc6) before 2.23 allow context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long argument to the (1) nan, (2) nanf, or (3) nanl function.
- FEDORA-2016-68abc0be35
- FEDORA-2016-68abc0be35
- SUSE-SU-2016:0470
- SUSE-SU-2016:0470
- SUSE-SU-2016:0471
- SUSE-SU-2016:0471
- SUSE-SU-2016:0472
- SUSE-SU-2016:0472
- SUSE-SU-2016:0473
- SUSE-SU-2016:0473
- openSUSE-SU-2016:0510
- openSUSE-SU-2016:0510
- http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html
- http://packetstormsecurity.com/files/153278/WAGO-852-Industrial-Managed-Switch-Series-Code-Execution-Hardcoded-Credentials.html
- http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
- http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
- RHSA-2017:0680
- RHSA-2017:0680
- 20190612 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series
- 20190612 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series
- 20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X
- 20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X
- [oss-security] 20160119 CVE assignment request for security bugs fixed in glibc 2.23
- [oss-security] 20160119 CVE assignment request for security bugs fixed in glibc 2.23
- [oss-security] 20160119 Re: CVE assignment request for security bugs fixed in glibc 2.23
- [oss-security] 20160119 Re: CVE assignment request for security bugs fixed in glibc 2.23
- 83306
- 83306
- USN-2985-1
- USN-2985-1
- USN-2985-2
- USN-2985-2
- RHSA-2017:1916
- RHSA-2017:1916
- 20190613 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series
- 20190613 SEC Consult SA-20190612-0 :: Multiple vulnerabilities in WAGO 852 Industrial Managed Switch Series
- 20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X
- 20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X
- GLSA-201702-11
- GLSA-201702-11
- https://sourceware.org/bugzilla/show_bug.cgi?id=16962
- https://sourceware.org/bugzilla/show_bug.cgi?id=16962
- [libc-alpha] 20160219 The GNU C Library version 2.23 is now available
- [libc-alpha] 20160219 The GNU C Library version 2.23 is now available
Modified: 2024-11-21
CVE-2015-7547
Multiple stack-based buffer overflows in the (1) send_dg and (2) send_vc functions in the libresolv library in the GNU C Library (aka glibc or libc6) before 2.23 allow remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted DNS response that triggers a call to the getaddrinfo function with the AF_UNSPEC or AF_INET6 address family, related to performing "dual A/AAAA DNS queries" and the libnss_dns.so.2 NSS module.
- http://fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow
- http://fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow
- FEDORA-2016-0480defc94
- FEDORA-2016-0480defc94
- FEDORA-2016-0f9e9a34ce
- FEDORA-2016-0f9e9a34ce
- SUSE-SU-2016:0470
- SUSE-SU-2016:0470
- SUSE-SU-2016:0471
- SUSE-SU-2016:0471
- SUSE-SU-2016:0472
- SUSE-SU-2016:0472
- SUSE-SU-2016:0473
- SUSE-SU-2016:0473
- openSUSE-SU-2016:0510
- openSUSE-SU-2016:0510
- openSUSE-SU-2016:0511
- openSUSE-SU-2016:0511
- openSUSE-SU-2016:0512
- openSUSE-SU-2016:0512
- HPSBGN03547
- HPSBGN03547
- HPSBGN03549
- HPSBGN03549
- HPSBGN03442
- HPSBGN03442
- HPSBGN03551
- HPSBGN03551
- HPSBGN03582
- HPSBGN03582
- http://packetstormsecurity.com/files/135802/glibc-getaddrinfo-Stack-Based-Buffer-Overflow.html
- http://packetstormsecurity.com/files/135802/glibc-getaddrinfo-Stack-Based-Buffer-Overflow.html
- http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
- http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
- http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html
- http://packetstormsecurity.com/files/164014/Moxa-Command-Injection-Cross-Site-Scripting-Vulnerable-Software.html
- http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html
- http://packetstormsecurity.com/files/167552/Nexans-FTTO-GigaSwitch-Outdated-Components-Hardcoded-Backdoor.html
- RHSA-2016:0175
- RHSA-2016:0175
- RHSA-2016:0176
- RHSA-2016:0176
- RHSA-2016:0225
- RHSA-2016:0225
- RHSA-2016:0277
- RHSA-2016:0277
- 20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X
- 20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X
- 20210901 SEC Consult SA-20210901-0 :: Multiple vulnerabilities in MOXA devices
- 20210901 SEC Consult SA-20210901-0 :: Multiple vulnerabilities in MOXA devices
- 20220617 SEC Consult SA-20220615-0 :: Hardcoded Backdoor User and Outdated Software Components in Nexans FTTO GigaSwitch series
- 20220617 SEC Consult SA-20220615-0 :: Hardcoded Backdoor User and Outdated Software Components in Nexans FTTO GigaSwitch series
- http://support.citrix.com/article/CTX206991
- http://support.citrix.com/article/CTX206991
- USN-2900-1
- USN-2900-1
- DSA-3480
- DSA-3480
- DSA-3481
- DSA-3481
- http://www.fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow
- http://www.fortiguard.com/advisory/glibc-getaddrinfo-stack-overflow
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160304-01-glibc-en
- http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20160304-01-glibc-en
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- 83265
- 83265
- 1035020
- 1035020
- http://www.vmware.com/security/advisories/VMSA-2016-0002.html
- http://www.vmware.com/security/advisories/VMSA-2016-0002.html
- https://access.redhat.com/articles/2161461
- https://access.redhat.com/articles/2161461
- https://blogs.sophos.com/2016/02/24/utm-up2date-9-355-released/
- https://blogs.sophos.com/2016/02/24/utm-up2date-9-355-released/
- https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/
- https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/
- https://bto.bluecoat.com/security-advisory/sa114
- https://bto.bluecoat.com/security-advisory/sa114
- https://bugzilla.redhat.com/show_bug.cgi?id=1293532
- https://bugzilla.redhat.com/show_bug.cgi?id=1293532
- https://googleonlinesecurity.blogspot.com/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html
- https://googleonlinesecurity.blogspot.com/2016/02/cve-2015-7547-glibc-getaddrinfo-stack.html
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05028479
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c05028479
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04989404
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04989404
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05008367
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05008367
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05053211
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05053211
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05073516
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05073516
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05098877
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05098877
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05125672
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05125672
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128937
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05128937
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05130958
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05130958
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05140858
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05140858
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05176716
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05176716
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05212266
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05212266
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05376917
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
- https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes
- https://ics-cert.us-cert.gov/advisories/ICSA-16-103-01
- https://ics-cert.us-cert.gov/advisories/ICSA-16-103-01
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40161
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA40161
- https://kc.mcafee.com/corporate/index?page=content&id=SB10150
- https://kc.mcafee.com/corporate/index?page=content&id=SB10150
- 20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X
- 20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X
- GLSA-201602-02
- GLSA-201602-02
- https://security.netapp.com/advisory/ntap-20160217-0002/
- https://security.netapp.com/advisory/ntap-20160217-0002/
- https://sourceware.org/bugzilla/show_bug.cgi?id=18665
- https://sourceware.org/bugzilla/show_bug.cgi?id=18665
- [libc-alpha] 20160216 [PATCH] CVE-2015-7547 --- glibc getaddrinfo() stack-based buffer overflow
- [libc-alpha] 20160216 [PATCH] CVE-2015-7547 --- glibc getaddrinfo() stack-based buffer overflow
- https://support.f5.com/kb/en-us/solutions/public/k/47/sol47098834.html
- https://support.f5.com/kb/en-us/solutions/public/k/47/sol47098834.html
- https://support.lenovo.com/us/en/product_security/len_5450
- https://support.lenovo.com/us/en/product_security/len_5450
- https://www.arista.com/en/support/advisories-notices/security-advisories/1255-security-advisory-17
- https://www.arista.com/en/support/advisories-notices/security-advisories/1255-security-advisory-17
- 39454
- 39454
- 40339
- 40339
- VU#457759
- VU#457759
- https://www.tenable.com/security/research/tra-2017-08
- https://www.tenable.com/security/research/tra-2017-08
Modified: 2024-11-21
CVE-2015-8776
The strftime function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly obtain sensitive information via an out-of-range time value.
- FEDORA-2016-68abc0be35
- FEDORA-2016-68abc0be35
- SUSE-SU-2016:0470
- SUSE-SU-2016:0470
- SUSE-SU-2016:0471
- SUSE-SU-2016:0471
- SUSE-SU-2016:0472
- SUSE-SU-2016:0472
- SUSE-SU-2016:0473
- SUSE-SU-2016:0473
- openSUSE-SU-2016:0510
- openSUSE-SU-2016:0510
- RHSA-2017:0680
- RHSA-2017:0680
- DSA-3480
- DSA-3480
- DSA-3481
- DSA-3481
- [oss-security] 20160119 CVE assignment request for security bugs fixed in glibc 2.23
- [oss-security] 20160119 CVE assignment request for security bugs fixed in glibc 2.23
- [oss-security] 20160119 Re: CVE assignment request for security bugs fixed in glibc 2.23
- [oss-security] 20160119 Re: CVE assignment request for security bugs fixed in glibc 2.23
- 83277
- 83277
- USN-2985-1
- USN-2985-1
- USN-2985-2
- USN-2985-2
- RHSA-2017:1916
- RHSA-2017:1916
- GLSA-201602-02
- GLSA-201602-02
- GLSA-201702-11
- GLSA-201702-11
- https://sourceware.org/bugzilla/show_bug.cgi?id=18985
- https://sourceware.org/bugzilla/show_bug.cgi?id=18985
- [libc-alpha] 20160219 The GNU C Library version 2.23 is now available
- [libc-alpha] 20160219 The GNU C Library version 2.23 is now available
Modified: 2024-11-21
CVE-2015-8777
The process_envvars function in elf/rtld.c in the GNU C Library (aka glibc or libc6) before 2.23 allows local users to bypass a pointer-guarding protection mechanism via a zero value of the LD_POINTER_GUARD environment variable.
- http://hmarco.org/bugs/glibc_ptr_mangle_weakness.html
- http://hmarco.org/bugs/glibc_ptr_mangle_weakness.html
- FEDORA-2016-0480defc94
- FEDORA-2016-0480defc94
- SUSE-SU-2016:0470
- SUSE-SU-2016:0470
- SUSE-SU-2016:0471
- SUSE-SU-2016:0471
- SUSE-SU-2016:0472
- SUSE-SU-2016:0472
- SUSE-SU-2016:0473
- SUSE-SU-2016:0473
- DSA-3480
- DSA-3480
- [oss-security] 20160119 Re: CVE assignment request for security bugs fixed in glibc 2.23
- [oss-security] 20160119 Re: CVE assignment request for security bugs fixed in glibc 2.23
- 81469
- 81469
- 1034811
- 1034811
- USN-2985-1
- USN-2985-1
- USN-2985-2
- USN-2985-2
- RHSA-2017:1916
- RHSA-2017:1916
- GLSA-201702-11
- GLSA-201702-11
- https://sourceware.org/bugzilla/show_bug.cgi?id=18928
- https://sourceware.org/bugzilla/show_bug.cgi?id=18928
Modified: 2024-11-21
CVE-2015-8778
Integer overflow in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via the size argument to the __hcreate_r function, which triggers out-of-bounds heap-memory access.
- FEDORA-2016-68abc0be35
- FEDORA-2016-68abc0be35
- SUSE-SU-2016:0470
- SUSE-SU-2016:0470
- SUSE-SU-2016:0471
- SUSE-SU-2016:0471
- SUSE-SU-2016:0472
- SUSE-SU-2016:0472
- SUSE-SU-2016:0473
- SUSE-SU-2016:0473
- openSUSE-SU-2016:0510
- openSUSE-SU-2016:0510
- http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
- http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
- RHSA-2017:0680
- RHSA-2017:0680
- 20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X
- 20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X
- DSA-3480
- DSA-3480
- DSA-3481
- DSA-3481
- [oss-security] 20160119 CVE assignment request for security bugs fixed in glibc 2.23
- [oss-security] 20160119 CVE assignment request for security bugs fixed in glibc 2.23
- [oss-security] 20160119 Re: CVE assignment request for security bugs fixed in glibc 2.23
- [oss-security] 20160119 Re: CVE assignment request for security bugs fixed in glibc 2.23
- 83275
- 83275
- USN-2985-1
- USN-2985-1
- USN-2985-2
- USN-2985-2
- RHSA-2017:1916
- RHSA-2017:1916
- 20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X
- 20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X
- GLSA-201602-02
- GLSA-201602-02
- GLSA-201702-11
- GLSA-201702-11
- https://sourceware.org/bugzilla/show_bug.cgi?id=18240
- https://sourceware.org/bugzilla/show_bug.cgi?id=18240
- [libc-alpha] 20160219 The GNU C Library version 2.23 is now available
- [libc-alpha] 20160219 The GNU C Library version 2.23 is now available
Modified: 2024-11-21
CVE-2015-8779
Stack-based buffer overflow in the catopen function in the GNU C Library (aka glibc or libc6) before 2.23 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long catalog name.
- FEDORA-2016-68abc0be35
- FEDORA-2016-68abc0be35
- SUSE-SU-2016:0470
- SUSE-SU-2016:0470
- SUSE-SU-2016:0471
- SUSE-SU-2016:0471
- SUSE-SU-2016:0472
- SUSE-SU-2016:0472
- SUSE-SU-2016:0473
- SUSE-SU-2016:0473
- openSUSE-SU-2016:0510
- openSUSE-SU-2016:0510
- http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
- http://packetstormsecurity.com/files/154361/Cisco-Device-Hardcoded-Credentials-GNU-glibc-BusyBox.html
- RHSA-2017:0680
- RHSA-2017:0680
- 20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X
- 20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X
- DSA-3480
- DSA-3480
- DSA-3481
- DSA-3481
- [oss-security] 20160119 CVE assignment request for security bugs fixed in glibc 2.23
- [oss-security] 20160119 CVE assignment request for security bugs fixed in glibc 2.23
- [oss-security] 20160119 Re: CVE assignment request for security bugs fixed in glibc 2.23
- [oss-security] 20160119 Re: CVE assignment request for security bugs fixed in glibc 2.23
- 82244
- 82244
- USN-2985-1
- USN-2985-1
- USN-2985-2
- USN-2985-2
- RHSA-2017:1916
- RHSA-2017:1916
- 20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X
- 20190904 SEC Consult SA-20190904-0 :: Multiple vulnerabilities in Cisco router series RV34X, RV26X and RV16X
- GLSA-201602-02
- GLSA-201602-02
- GLSA-201702-11
- GLSA-201702-11
- https://sourceware.org/bugzilla/show_bug.cgi?id=17905
- https://sourceware.org/bugzilla/show_bug.cgi?id=17905
- [libc-alpha] 20160219 The GNU C Library version 2.23 is now available
- [libc-alpha] 20160219 The GNU C Library version 2.23 is now available
Modified: 2024-11-21
CVE-2016-3706
Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in the GNU C Library (aka glibc or libc6) allows remote attackers to cause a denial of service (crash) via vectors involving hostent conversion. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-4458.
- openSUSE-SU-2016:1527
- openSUSE-SU-2016:1527
- openSUSE-SU-2016:1779
- openSUSE-SU-2016:1779
- 102073
- 102073
- 88440
- 88440
- http://www-01.ibm.com/support/docview.wss?uid=swg21995039
- http://www-01.ibm.com/support/docview.wss?uid=swg21995039
- https://source.android.com/security/bulletin/2017-12-01
- https://source.android.com/security/bulletin/2017-12-01
- https://sourceware.org/bugzilla/show_bug.cgi?id=20010
- https://sourceware.org/bugzilla/show_bug.cgi?id=20010
- https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=4ab2ab03d4351914ee53248dc5aef4a8c88ff8b9
- https://sourceware.org/git/gitweb.cgi?p=glibc.git%3Bh=4ab2ab03d4351914ee53248dc5aef4a8c88ff8b9
Modified: 2024-11-21
CVE-2020-29573
sysdeps/i386/ldbl2mpn.c in the GNU C Library (aka glibc or libc6) before 2.23 on x86 targets has a stack-based buffer overflow if the input to any of the printf family of functions is an 80-bit long double with a non-canonical bit pattern, as seen when passing a \x00\x04\x00\x00\x00\x00\x00\x00\x00\x04 value to sprintf. NOTE: the issue does not affect glibc by default in 2016 or later (i.e., 2.23 or later) because of commits made in 2015 for inlining of C99 math functions through use of GCC built-ins. In other words, the reference to 2.23 is intentional despite the mention of "Fixed for glibc 2.33" in the 26649 reference.
- GLSA-202101-20
- GLSA-202101-20
- https://security.netapp.com/advisory/ntap-20210122-0004/
- https://security.netapp.com/advisory/ntap-20210122-0004/
- https://sourceware.org/bugzilla/show_bug.cgi?id=26649
- https://sourceware.org/bugzilla/show_bug.cgi?id=26649
- https://sourceware.org/pipermail/libc-alpha/2020-September/117779.html
- https://sourceware.org/pipermail/libc-alpha/2020-September/117779.html