ALT-BU-2016-2659-1
Branch c7 update bulletin.
Package util-linux updated to version 2.22.1-alt1.M70C.3 for branch c7 in task 161546.
Closed vulnerabilities
BDU:2015-12082
Уязвимость операционной системы openSUSE, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2015-5218
Buffer overflow in text-utils/colcrt.c in colcrt in util-linux before 2.27 allows local users to cause a denial of service (crash) via a crafted file, related to the page global variable.
- openSUSE-SU-2015:1910
- openSUSE-SU-2015:1910
- [util-linux] 20150807 crash in colcrt
- [util-linux] 20150807 crash in colcrt
- https://bugzilla.redhat.com/show_bug.cgi?id=1259322
- https://bugzilla.redhat.com/show_bug.cgi?id=1259322
- https://github.com/kerolasa/lelux-utiliteetit/commit/70e3fcf293c1827a2655a86584ab13075124a8a8
- https://github.com/kerolasa/lelux-utiliteetit/commit/70e3fcf293c1827a2655a86584ab13075124a8a8
- https://github.com/kerolasa/lelux-utiliteetit/commit/d883d64d96ab9bef510745d064a351145b9babec
- https://github.com/kerolasa/lelux-utiliteetit/commit/d883d64d96ab9bef510745d064a351145b9babec
- https://www.kernel.org/pub/linux/utils/util-linux/v2.27/v2.27-ReleaseNotes
- https://www.kernel.org/pub/linux/utils/util-linux/v2.27/v2.27-ReleaseNotes
Closed vulnerabilities
BDU:2015-11994
Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2015-11995
Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2015-12005
Уязвимость браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2016-00136
Уязвимость программных платформ Jrockit и Java Platform, позволяющая нарушителю получить доступ на чтение данных или модифицировать данные
BDU:2016-01546
Уязвимость набора библиотек Network Security Services и браузера Firefox, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
Modified: 2024-11-21
CVE-2014-1569
The definite_length_decoder function in lib/util/quickder.c in Mozilla Network Security Services (NSS) before 3.16.2.4 and 3.17.x before 3.17.3 does not ensure that the DER encoding of an ASN.1 length is properly formed, which allows remote attackers to conduct data-smuggling attacks by using a long byte sequence for an encoding, as demonstrated by the SEC_QuickDERDecodeItem function's improper handling of an arbitrary-length encoding of 0x00.
- openSUSE-SU-2015:0138
- openSUSE-SU-2015:0138
- SUSE-SU-2015:0171
- SUSE-SU-2015:0171
- SUSE-SU-2015:0173
- SUSE-SU-2015:0173
- SUSE-SU-2015:0180
- SUSE-SU-2015:0180
- openSUSE-SU-2015:0404
- openSUSE-SU-2015:0404
- DSA-3186
- DSA-3186
- http://www.intelsecurity.com/resources/wp-berserk-analysis-part-1.pdf
- http://www.intelsecurity.com/resources/wp-berserk-analysis-part-1.pdf
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpujul2015-2367936.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- http://www.oracle.com/technetwork/topics/security/cpuoct2015-2367953.html
- 1032909
- 1032909
- https://bugzilla.mozilla.org/show_bug.cgi?id=1064670
- https://bugzilla.mozilla.org/show_bug.cgi?id=1064670
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.17.3_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.17.3_release_notes
- https://www.imperialviolet.org/2014/09/26/pkcs1.html
- https://www.imperialviolet.org/2014/09/26/pkcs1.html
- https://www.reddit.com/r/netsec/comments/2hd1m8/rsa_signature_forgery_in_nss/cksnr02
- https://www.reddit.com/r/netsec/comments/2hd1m8/rsa_signature_forgery_in_nss/cksnr02
Modified: 2024-11-21
CVE-2015-7181
The sec_asn1d_parse_leaf function in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, improperly restricts access to an unspecified data structure, which allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OCTET STRING data, related to a "use-after-poison" issue.
- SUSE-SU-2015:1926
- SUSE-SU-2015:1926
- openSUSE-SU-2015:1942
- openSUSE-SU-2015:1942
- SUSE-SU-2015:1978
- SUSE-SU-2015:1978
- SUSE-SU-2015:1981
- SUSE-SU-2015:1981
- SUSE-SU-2015:2081
- SUSE-SU-2015:2081
- openSUSE-SU-2015:2229
- openSUSE-SU-2015:2229
- openSUSE-SU-2015:2245
- openSUSE-SU-2015:2245
- http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html
- http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html
- RHSA-2015:1980
- RHSA-2015:1980
- RHSA-2015:1981
- RHSA-2015:1981
- DSA-3393
- DSA-3393
- DSA-3410
- DSA-3410
- DSA-3688
- DSA-3688
- http://www.mozilla.org/security/announce/2015/mfsa2015-133.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-133.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 77416
- 77416
- 91787
- 91787
- 1034069
- 1034069
- SSA:2015-310-02
- SSA:2015-310-02
- USN-2785-1
- USN-2785-1
- USN-2791-1
- USN-2791-1
- USN-2819-1
- USN-2819-1
- https://bto.bluecoat.com/security-advisory/sa119
- https://bto.bluecoat.com/security-advisory/sa119
- https://bugzilla.mozilla.org/show_bug.cgi?id=1192028
- https://bugzilla.mozilla.org/show_bug.cgi?id=1192028
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes
- GLSA-201512-10
- GLSA-201512-10
- GLSA-201605-06
- GLSA-201605-06
Modified: 2024-11-21
CVE-2015-7182
Heap-based buffer overflow in the ASN.1 decoder in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via crafted OCTET STRING data.
- SUSE-SU-2015:1926
- SUSE-SU-2015:1926
- openSUSE-SU-2015:1942
- openSUSE-SU-2015:1942
- SUSE-SU-2015:1978
- SUSE-SU-2015:1978
- SUSE-SU-2015:1981
- SUSE-SU-2015:1981
- SUSE-SU-2015:2081
- SUSE-SU-2015:2081
- openSUSE-SU-2015:2229
- openSUSE-SU-2015:2229
- openSUSE-SU-2015:2245
- openSUSE-SU-2015:2245
- http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html
- http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html
- RHSA-2015:1980
- RHSA-2015:1980
- RHSA-2015:1981
- RHSA-2015:1981
- DSA-3393
- DSA-3393
- DSA-3410
- DSA-3410
- DSA-3688
- DSA-3688
- http://www.mozilla.org/security/announce/2015/mfsa2015-133.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-133.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 77416
- 77416
- 91787
- 91787
- 1034069
- 1034069
- SSA:2015-310-02
- SSA:2015-310-02
- USN-2785-1
- USN-2785-1
- USN-2791-1
- USN-2791-1
- USN-2819-1
- USN-2819-1
- https://bto.bluecoat.com/security-advisory/sa119
- https://bto.bluecoat.com/security-advisory/sa119
- https://bugzilla.mozilla.org/show_bug.cgi?id=1202868
- https://bugzilla.mozilla.org/show_bug.cgi?id=1202868
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes
- GLSA-201512-10
- GLSA-201512-10
- GLSA-201605-06
- GLSA-201605-06
Modified: 2024-11-21
CVE-2015-7183
Integer overflow in the PL_ARENA_ALLOCATE implementation in Netscape Portable Runtime (NSPR) in Mozilla Network Security Services (NSS) before 3.19.2.1 and 3.20.x before 3.20.1, as used in Firefox before 42.0 and Firefox ESR 38.x before 38.4 and other products, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via unspecified vectors.
- SUSE-SU-2015:1926
- SUSE-SU-2015:1926
- openSUSE-SU-2015:1942
- openSUSE-SU-2015:1942
- SUSE-SU-2015:1978
- SUSE-SU-2015:1978
- SUSE-SU-2015:1981
- SUSE-SU-2015:1981
- SUSE-SU-2015:2081
- SUSE-SU-2015:2081
- openSUSE-SU-2015:2229
- openSUSE-SU-2015:2229
- openSUSE-SU-2015:2245
- openSUSE-SU-2015:2245
- http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html
- http://packetstormsecurity.com/files/134268/Slackware-Security-Advisory-mozilla-nss-Updates.html
- RHSA-2015:1980
- RHSA-2015:1980
- RHSA-2015:1981
- RHSA-2015:1981
- DSA-3393
- DSA-3393
- DSA-3406
- DSA-3406
- http://www.mozilla.org/security/announce/2015/mfsa2015-133.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-133.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 77415
- 77415
- 91787
- 91787
- 1034069
- 1034069
- SSA:2015-310-02
- SSA:2015-310-02
- USN-2785-1
- USN-2785-1
- USN-2790-1
- USN-2790-1
- USN-2819-1
- USN-2819-1
- https://bto.bluecoat.com/security-advisory/sa119
- https://bto.bluecoat.com/security-advisory/sa119
- https://bugzilla.mozilla.org/show_bug.cgi?id=1205157
- https://bugzilla.mozilla.org/show_bug.cgi?id=1205157
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.2.1_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.19.4_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.20.1_release_notes
- GLSA-201512-10
- GLSA-201512-10
- GLSA-201605-06
- GLSA-201605-06
Modified: 2024-11-21
CVE-2015-7575
Mozilla Network Security Services (NSS) before 3.20.2, as used in Mozilla Firefox before 43.0.2 and Firefox ESR 38.x before 38.5.2, does not reject MD5 signatures in Server Key Exchange messages in TLS 1.2 Handshake Protocol traffic, which makes it easier for man-in-the-middle attackers to spoof servers by triggering a collision.
- SUSE-SU-2016:0256
- SUSE-SU-2016:0256
- openSUSE-SU-2016:0263
- openSUSE-SU-2016:0263
- SUSE-SU-2016:0265
- SUSE-SU-2016:0265
- openSUSE-SU-2016:0268
- openSUSE-SU-2016:0268
- SUSE-SU-2016:0269
- SUSE-SU-2016:0269
- openSUSE-SU-2016:0270
- openSUSE-SU-2016:0270
- openSUSE-SU-2016:0272
- openSUSE-SU-2016:0272
- openSUSE-SU-2016:0279
- openSUSE-SU-2016:0279
- openSUSE-SU-2015:2405
- openSUSE-SU-2015:2405
- openSUSE-SU-2016:0007
- openSUSE-SU-2016:0007
- openSUSE-SU-2016:0161
- openSUSE-SU-2016:0161
- openSUSE-SU-2016:0162
- openSUSE-SU-2016:0162
- openSUSE-SU-2016:0307
- openSUSE-SU-2016:0307
- openSUSE-SU-2016:0308
- openSUSE-SU-2016:0308
- openSUSE-SU-2016:0488
- openSUSE-SU-2016:0488
- openSUSE-SU-2016:0605
- openSUSE-SU-2016:0605
- RHSA-2016:0049
- RHSA-2016:0049
- RHSA-2016:0050
- RHSA-2016:0050
- RHSA-2016:0053
- RHSA-2016:0053
- RHSA-2016:0054
- RHSA-2016:0054
- RHSA-2016:0055
- RHSA-2016:0055
- RHSA-2016:0056
- RHSA-2016:0056
- DSA-3436
- DSA-3436
- DSA-3437
- DSA-3437
- DSA-3457
- DSA-3457
- DSA-3458
- DSA-3458
- DSA-3465
- DSA-3465
- DSA-3491
- DSA-3491
- DSA-3688
- DSA-3688
- http://www.mozilla.org/security/announce/2015/mfsa2015-150.html
- http://www.mozilla.org/security/announce/2015/mfsa2015-150.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/cpujan2016-2367955.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- 79684
- 79684
- 91787
- 91787
- 1034541
- 1034541
- 1036467
- 1036467
- USN-2863-1
- USN-2863-1
- USN-2864-1
- USN-2864-1
- USN-2865-1
- USN-2865-1
- USN-2866-1
- USN-2866-1
- USN-2884-1
- USN-2884-1
- USN-2904-1
- USN-2904-1
- RHSA-2016:1430
- RHSA-2016:1430
- https://bugzilla.mozilla.org/show_bug.cgi?id=1158489
- https://bugzilla.mozilla.org/show_bug.cgi?id=1158489
- https://developer.mozilla.org/docs/Mozilla/Projects/NSS/NSS_3.20.2_release_notes
- https://developer.mozilla.org/docs/Mozilla/Projects/NSS/NSS_3.20.2_release_notes
- GLSA-201701-46
- GLSA-201701-46
- GLSA-201706-18
- GLSA-201706-18
- GLSA-201801-15
- GLSA-201801-15
- https://security.netapp.com/advisory/ntap-20160225-0001/
- https://security.netapp.com/advisory/ntap-20160225-0001/
Modified: 2024-11-21
CVE-2016-2834
Mozilla Network Security Services (NSS) before 3.23, as used in Mozilla Firefox before 47.0, allows remote attackers to cause a denial of service (memory corruption and application crash) or possibly have unspecified other impact via unknown vectors.
- openSUSE-SU-2016:1552
- openSUSE-SU-2016:1552
- openSUSE-SU-2016:1557
- openSUSE-SU-2016:1557
- SUSE-SU-2016:1691
- SUSE-SU-2016:1691
- RHSA-2016:2779
- RHSA-2016:2779
- DSA-3688
- DSA-3688
- http://www.mozilla.org/security/announce/2016/mfsa2016-61.html
- http://www.mozilla.org/security/announce/2016/mfsa2016-61.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- 91072
- 91072
- 1036057
- 1036057
- USN-2993-1
- USN-2993-1
- USN-3029-1
- USN-3029-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1206283
- https://bugzilla.mozilla.org/show_bug.cgi?id=1206283
- https://bugzilla.mozilla.org/show_bug.cgi?id=1221620
- https://bugzilla.mozilla.org/show_bug.cgi?id=1221620
- https://bugzilla.mozilla.org/show_bug.cgi?id=1241034
- https://bugzilla.mozilla.org/show_bug.cgi?id=1241034
- https://bugzilla.mozilla.org/show_bug.cgi?id=1241037
- https://bugzilla.mozilla.org/show_bug.cgi?id=1241037
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.23_release_notes
- https://developer.mozilla.org/en-US/docs/Mozilla/Projects/NSS/NSS_3.23_release_notes