ALT-BU-2016-2758-1
Branch sisyphus update bulletin.
Package libwebkitgtk4 updated to version 2.12.2-alt1 for branch sisyphus in task 164448.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2016-4583
WebKit in Apple iOS before 9.3.3, Safari before 9.1.2, and tvOS before 9.2.2 allows remote attackers to bypass the Same Origin Policy and obtain image date from an unintended web site via a timing attack involving an SVG document.
- APPLE-SA-2016-07-18-2
- APPLE-SA-2016-07-18-2
- APPLE-SA-2016-07-18-4
- APPLE-SA-2016-07-18-4
- APPLE-SA-2016-07-18-5
- APPLE-SA-2016-07-18-5
- http://packetstormsecurity.com/files/138502/WebKitGTK-SOP-Bypass-Information-Disclosure.html
- http://packetstormsecurity.com/files/138502/WebKitGTK-SOP-Bypass-Information-Disclosure.html
- 20160825 WebKitGTK+ Security Advisory WSA-2016-0005
- 20160825 WebKitGTK+ Security Advisory WSA-2016-0005
- 91830
- 91830
- 1036343
- 1036343
- https://support.apple.com/HT206900
- https://support.apple.com/HT206900
- https://support.apple.com/HT206902
- https://support.apple.com/HT206902
- https://support.apple.com/HT206905
- https://support.apple.com/HT206905
Closed vulnerabilities
Modified: 2024-11-21
CVE-2016-4553
client_side.cc in Squid before 3.5.18 and 4.x before 4.0.10 does not properly ignore the Host header when absolute-URI is provided, which allows remote attackers to conduct cache-poisoning attacks via an HTTP request.
- http://bugs.squid-cache.org/show_bug.cgi?id=4501
- http://bugs.squid-cache.org/show_bug.cgi?id=4501
- SUSE-SU-2016:1996
- SUSE-SU-2016:1996
- SUSE-SU-2016:2089
- SUSE-SU-2016:2089
- openSUSE-SU-2016:2081
- openSUSE-SU-2016:2081
- DSA-3625
- DSA-3625
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- 1035768
- 1035768
- http://www.squid-cache.org/Advisories/SQUID-2016_7.txt
- http://www.squid-cache.org/Advisories/SQUID-2016_7.txt
- http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-14039.patch
- http://www.squid-cache.org/Versions/v3/3.5/changesets/squid-3.5-14039.patch
- USN-2995-1
- USN-2995-1
- RHSA-2016:1139
- RHSA-2016:1139
- RHSA-2016:1140
- RHSA-2016:1140
- GLSA-201607-01
- GLSA-201607-01
Modified: 2024-11-21
CVE-2016-4554
mime_header.cc in Squid before 3.5.18 allows remote attackers to bypass intended same-origin restrictions and possibly conduct cache-poisoning attacks via a crafted HTTP Host header, aka a "header smuggling" issue.
- SUSE-SU-2016:1996
- SUSE-SU-2016:1996
- SUSE-SU-2016:2089
- SUSE-SU-2016:2089
- openSUSE-SU-2016:2081
- openSUSE-SU-2016:2081
- DSA-3625
- DSA-3625
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- 1035769
- 1035769
- http://www.squid-cache.org/Advisories/SQUID-2016_8.txt
- http://www.squid-cache.org/Advisories/SQUID-2016_8.txt
- http://www.squid-cache.org/Versions/v3/3.1/changesets/SQUID-2016_8.patch
- http://www.squid-cache.org/Versions/v3/3.1/changesets/SQUID-2016_8.patch
- http://www.squid-cache.org/Versions/v3/3.2/changesets/SQUID-2016_8.patch
- http://www.squid-cache.org/Versions/v3/3.2/changesets/SQUID-2016_8.patch
- http://www.squid-cache.org/Versions/v3/3.3/changesets/SQUID-2016_8.patch
- http://www.squid-cache.org/Versions/v3/3.3/changesets/SQUID-2016_8.patch
- http://www.squid-cache.org/Versions/v3/3.4/changesets/SQUID-2016_8.patch
- http://www.squid-cache.org/Versions/v3/3.4/changesets/SQUID-2016_8.patch
- http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2016_8.patch
- http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2016_8.patch
- USN-2995-1
- USN-2995-1
- RHSA-2016:1138
- RHSA-2016:1138
- RHSA-2016:1139
- RHSA-2016:1139
- RHSA-2016:1140
- RHSA-2016:1140
- GLSA-201607-01
- GLSA-201607-01
Modified: 2024-11-21
CVE-2016-4555
client_side_request.cc in Squid 3.x before 3.5.18 and 4.x before 4.0.10 allows remote servers to cause a denial of service (crash) via crafted Edge Side Includes (ESI) responses.
- http://bugs.squid-cache.org/show_bug.cgi?id=4455
- http://bugs.squid-cache.org/show_bug.cgi?id=4455
- SUSE-SU-2016:1996
- SUSE-SU-2016:1996
- SUSE-SU-2016:2089
- SUSE-SU-2016:2089
- openSUSE-SU-2016:2081
- openSUSE-SU-2016:2081
- DSA-3625
- DSA-3625
- [oss-security] 20160506 CVE Request: Squid HTTP caching proxy
- [oss-security] 20160506 CVE Request: Squid HTTP caching proxy
- [oss-security] 20160506 Re: CVE Request: Squid HTTP caching proxy
- [oss-security] 20160506 Re: CVE Request: Squid HTTP caching proxy
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- 1035770
- 1035770
- http://www.squid-cache.org/Advisories/SQUID-2016_9.txt
- http://www.squid-cache.org/Advisories/SQUID-2016_9.txt
- http://www.squid-cache.org/Versions/v3/3.4/changesets/SQUID-2016_9.patch
- http://www.squid-cache.org/Versions/v3/3.4/changesets/SQUID-2016_9.patch
- http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2016_9.patch
- http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2016_9.patch
- USN-2995-1
- USN-2995-1
- RHSA-2016:1139
- RHSA-2016:1139
- RHSA-2016:1140
- RHSA-2016:1140
- GLSA-201607-01
- GLSA-201607-01
Modified: 2024-11-21
CVE-2016-4556
Double free vulnerability in Esi.cc in Squid 3.x before 3.5.18 and 4.x before 4.0.10 allows remote servers to cause a denial of service (crash) via a crafted Edge Side Includes (ESI) response.
- SUSE-SU-2016:1996
- SUSE-SU-2016:1996
- SUSE-SU-2016:2089
- SUSE-SU-2016:2089
- openSUSE-SU-2016:2081
- openSUSE-SU-2016:2081
- DSA-3625
- DSA-3625
- [oss-security] 20160506 CVE Request: Squid HTTP caching proxy
- [oss-security] 20160506 CVE Request: Squid HTTP caching proxy
- [oss-security] 20160506 Re: CVE Request: Squid HTTP caching proxy
- [oss-security] 20160506 Re: CVE Request: Squid HTTP caching proxy
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- 1035770
- 1035770
- http://www.squid-cache.org/Advisories/SQUID-2016_9.txt
- http://www.squid-cache.org/Advisories/SQUID-2016_9.txt
- http://www.squid-cache.org/Versions/v3/3.4/changesets/SQUID-2016_9.patch
- http://www.squid-cache.org/Versions/v3/3.4/changesets/SQUID-2016_9.patch
- http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2016_9.patch
- http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2016_9.patch
- USN-2995-1
- USN-2995-1
- RHSA-2016:1138
- RHSA-2016:1138
- RHSA-2016:1139
- RHSA-2016:1139
- RHSA-2016:1140
- RHSA-2016:1140
- GLSA-201607-01
- GLSA-201607-01
Closed vulnerabilities
BDU:2016-01051
Уязвимость программного средства мониторинга сети Cacti, позволяющая нарушителю обойти существующие ограничения доступа
Modified: 2024-11-21
CVE-2013-5588
Multiple cross-site scripting (XSS) vulnerabilities in Cacti 0.8.8b and earlier allow remote attackers to inject arbitrary web script or HTML via (1) the step parameter to install/index.php or (2) the id parameter to cacti/host.php.
Modified: 2024-11-21
CVE-2013-5589
SQL injection vulnerability in cacti/host.php in Cacti 0.8.8b and earlier allows remote attackers to execute arbitrary SQL commands via the id parameter.
Modified: 2024-11-21
CVE-2014-2326
Cross-site scripting (XSS) vulnerability in cdef.php in Cacti 0.8.7g, 0.8.8b, and earlier allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
- http://bugs.cacti.net/view.php?id=2431
- http://bugs.cacti.net/view.php?id=2431
- FEDORA-2014-4928
- FEDORA-2014-4928
- FEDORA-2014-4892
- FEDORA-2014-4892
- openSUSE-SU-2015:0479
- openSUSE-SU-2015:0479
- http://packetstormsecurity.com/files/125849/Deutsche-Telekom-CERT-Advisory-DTC-A-20140324-001.html
- http://packetstormsecurity.com/files/125849/Deutsche-Telekom-CERT-Advisory-DTC-A-20140324-001.html
- 57647
- 57647
- 59203
- 59203
- http://svn.cacti.net/viewvc?view=rev&revision=7443
- http://svn.cacti.net/viewvc?view=rev&revision=7443
- DSA-2970
- DSA-2970
- 20140324 Deutsche Telekom CERT Advisory [DTC-A-20140324-001] vulnerabilities in cacti
- 20140324 Deutsche Telekom CERT Advisory [DTC-A-20140324-001] vulnerabilities in cacti
- 66390
- 66390
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742768
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742768
- GLSA-201509-03
- GLSA-201509-03
Modified: 2024-11-21
CVE-2014-2327
Cross-site request forgery (CSRF) vulnerability in Cacti 0.8.7g, 0.8.8b, and earlier allows remote attackers to hijack the authentication of users for unspecified commands, as demonstrated by requests that (1) modify binary files, (2) modify configurations, or (3) add arbitrary users.
- JVN#55076671
- JVN#55076671
- JVNDB-2014-002239
- JVNDB-2014-002239
- openSUSE-SU-2015:0479
- openSUSE-SU-2015:0479
- 59203
- 59203
- DSA-2970
- DSA-2970
- 20140324 Deutsche Telekom CERT Advisory [DTC-A-20140324-001] vulnerabilities in cacti
- 20140324 Deutsche Telekom CERT Advisory [DTC-A-20140324-001] vulnerabilities in cacti
- 66392
- 66392
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742768
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742768
- GLSA-201509-03
- GLSA-201509-03
Modified: 2024-11-21
CVE-2014-2328
lib/graph_export.php in Cacti 0.8.7g, 0.8.8b, and earlier allows remote authenticated users to execute arbitrary commands via shell metacharacters in unspecified vectors.
- http://bugs.cacti.net/view.php?id=2433
- http://bugs.cacti.net/view.php?id=2433
- FEDORA-2014-4928
- FEDORA-2014-4928
- FEDORA-2014-4892
- FEDORA-2014-4892
- openSUSE-SU-2015:0479
- openSUSE-SU-2015:0479
- 59203
- 59203
- http://svn.cacti.net/viewvc?view=rev&revision=7442
- http://svn.cacti.net/viewvc?view=rev&revision=7442
- DSA-2970
- DSA-2970
- 20140324 Deutsche Telekom CERT Advisory [DTC-A-20140324-001] vulnerabilities in cacti
- 20140324 Deutsche Telekom CERT Advisory [DTC-A-20140324-001] vulnerabilities in cacti
- 66387
- 66387
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742768
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742768
- GLSA-201509-03
- GLSA-201509-03
Modified: 2024-11-21
CVE-2014-2708
Multiple SQL injection vulnerabilities in graph_xport.php in Cacti 0.8.7g, 0.8.8b, and earlier allow remote attackers to execute arbitrary SQL commands via the (1) graph_start, (2) graph_end, (3) graph_height, (4) graph_width, (5) graph_nolegend, (6) print_source, (7) local_graph_id, or (8) rra_id parameter.
- http://bugs.cacti.net/view.php?id=2405
- http://bugs.cacti.net/view.php?id=2405
- FEDORA-2014-4928
- FEDORA-2014-4928
- FEDORA-2014-4892
- FEDORA-2014-4892
- [oss-security] 20140403 Re: CVE request: cacti "bug#0002405: SQL injection in graph_xport.php"
- [oss-security] 20140403 Re: CVE request: cacti "bug#0002405: SQL injection in graph_xport.php"
- [oss-security] 20140401 CVE request: cacti "bug#0002405: SQL injection in graph_xport.php"
- [oss-security] 20140401 CVE request: cacti "bug#0002405: SQL injection in graph_xport.php"
- 57647
- 57647
- 59203
- 59203
- http://svn.cacti.net/viewvc?view=rev&revision=7439
- http://svn.cacti.net/viewvc?view=rev&revision=7439
- DSA-2970
- DSA-2970
- 66555
- 66555
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742768
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742768
- https://bugzilla.redhat.com/show_bug.cgi?id=1084258
- https://bugzilla.redhat.com/show_bug.cgi?id=1084258
- cacti-cve20142708-sql-injection(92278)
- cacti-cve20142708-sql-injection(92278)
- GLSA-201509-03
- GLSA-201509-03
Modified: 2024-11-21
CVE-2014-2709
lib/rrd.php in Cacti 0.8.7g, 0.8.8b, and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in unspecified parameters.
- FEDORA-2014-4928
- FEDORA-2014-4928
- FEDORA-2014-4892
- FEDORA-2014-4892
- [oss-security] 20140403 Re: CVE request: cacti "bug#0002405: SQL injection in graph_xport.php"
- [oss-security] 20140403 Re: CVE request: cacti "bug#0002405: SQL injection in graph_xport.php"
- 57647
- 57647
- 59203
- 59203
- http://svn.cacti.net/viewvc?view=rev&revision=7439
- http://svn.cacti.net/viewvc?view=rev&revision=7439
- DSA-2970
- DSA-2970
- 66630
- 66630
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742768
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=742768
- GLSA-201509-03
- GLSA-201509-03
Modified: 2024-11-21
CVE-2014-4002
Multiple cross-site scripting (XSS) vulnerabilities in Cacti 0.8.8b allow remote attackers to inject arbitrary web script or HTML via the (1) drp_action parameter to cdef.php, (2) data_input.php, (3) data_queries.php, (4) data_sources.php, (5) data_templates.php, (6) graph_templates.php, (7) graphs.php, (8) host.php, or (9) host_templates.php or the (10) graph_template_input_id or (11) graph_template_id parameter to graph_templates_inputs.php.
- openSUSE-SU-2015:0479
- openSUSE-SU-2015:0479
- 59203
- 59203
- 59517
- 59517
- http://svn.cacti.net/viewvc?view=rev&revision=7451
- http://svn.cacti.net/viewvc?view=rev&revision=7451
- http://svn.cacti.net/viewvc?view=rev&revision=7452
- http://svn.cacti.net/viewvc?view=rev&revision=7452
- DSA-2970
- DSA-2970
- 68257
- 68257
- GLSA-201509-03
- GLSA-201509-03
Modified: 2024-11-21
CVE-2014-5025
Cross-site scripting (XSS) vulnerability in data_sources.php in Cacti 0.8.8b allows remote authenticated users with console access to inject arbitrary web script or HTML via the name_cache parameter in a ds_edit action.
- http://bugs.cacti.net/view.php?id=2456
- http://bugs.cacti.net/view.php?id=2456
- openSUSE-SU-2015:0479
- openSUSE-SU-2015:0479
- DSA-3007
- DSA-3007
- [oss-security] 20140722 Re: CVE request: cacti XSS
- [oss-security] 20140722 Re: CVE request: cacti XSS
- 68759
- 68759
- cacti-cve20145025-xss(94814)
- cacti-cve20145025-xss(94814)
- GLSA-201509-03
- GLSA-201509-03
Modified: 2024-11-21
CVE-2014-5026
Multiple cross-site scripting (XSS) vulnerabilities in Cacti 0.8.8b allow remote authenticated users with console access to inject arbitrary web script or HTML via a (1) Graph Tree Title in a delete or (2) edit action; (3) CDEF Name, (4) Data Input Method Name, or (5) Host Templates Name in a delete action; (6) Data Source Title; (7) Graph Title; or (8) Graph Template Name in a delete or (9) duplicate action.
- http://bugs.cacti.net/view.php?id=2456
- http://bugs.cacti.net/view.php?id=2456
- openSUSE-SU-2015:0479
- openSUSE-SU-2015:0479
- [oss-security] 20140724 Re: Duplicated CVE - Cacti XSS
- [oss-security] 20140724 Re: Duplicated CVE - Cacti XSS
- DSA-3007
- DSA-3007
- [oss-security] 20140722 Re: CVE request: cacti XSS
- [oss-security] 20140722 Re: CVE request: cacti XSS
- 68759
- 68759
- cacti-cve20145026-xss(94816)
- cacti-cve20145026-xss(94816)
- GLSA-201509-03
- GLSA-201509-03
Modified: 2024-11-21
CVE-2014-5261
The graph settings script (graph_settings.php) in Cacti 0.8.8b and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in a font size, related to the rrdtool commandline in lib/rrd.php.
- [oss-security] 20140812 CVE id request: cacti remote code execution and SQL injection
- [oss-security] 20140812 CVE id request: cacti remote code execution and SQL injection
- [oss-security] 20140816 Re: CVE id request: cacti remote code execution and SQL injection
- [oss-security] 20140816 Re: CVE id request: cacti remote code execution and SQL injection
- http://svn.cacti.net/viewvc?view=rev&revision=7454
- http://svn.cacti.net/viewvc?view=rev&revision=7454
- DSA-3007
- DSA-3007
- 69213
- 69213
- https://bugzilla.redhat.com/show_bug.cgi?id=1127165
- https://bugzilla.redhat.com/show_bug.cgi?id=1127165
- cacti-multiple-unspecified(95292)
- cacti-multiple-unspecified(95292)
- GLSA-201607-05
- GLSA-201607-05
Modified: 2024-11-21
CVE-2014-5262
SQL injection vulnerability in the graph settings script (graph_settings.php) in Cacti 0.8.8b and earlier allows remote attackers to execute arbitrary SQL commands via unspecified vectors.
- [oss-security] 20140812 CVE id request: cacti remote code execution and SQL injection
- [oss-security] 20140812 CVE id request: cacti remote code execution and SQL injection
- [oss-security] 20140816 Re: CVE id request: cacti remote code execution and SQL injection
- [oss-security] 20140816 Re: CVE id request: cacti remote code execution and SQL injection
- http://svn.cacti.net/viewvc?view=rev&revision=7454
- http://svn.cacti.net/viewvc?view=rev&revision=7454
- DSA-3007
- DSA-3007
- 69213
- 69213
- https://bugzilla.redhat.com/show_bug.cgi?id=1127165
- https://bugzilla.redhat.com/show_bug.cgi?id=1127165
- cacti-multiple-unspecified(95292)
- cacti-multiple-unspecified(95292)
- GLSA-201607-05
- GLSA-201607-05
Modified: 2024-11-21
CVE-2015-2665
Cross-site scripting (XSS) vulnerability in Cacti before 0.8.8d allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
- FEDORA-2016-a8e2be0fe6
- FEDORA-2016-a8e2be0fe6
- FEDORA-2016-4a5ce6a6c0
- FEDORA-2016-4a5ce6a6c0
- FEDORA-2016-852a39e085
- FEDORA-2016-852a39e085
- http://www.cacti.net/release_notes_0_8_8d.php
- http://www.cacti.net/release_notes_0_8_8d.php
- DSA-3295
- DSA-3295
- http://www.fortiguard.com/advisory/FG-VD-15-017/
- http://www.fortiguard.com/advisory/FG-VD-15-017/
- 75309
- 75309
- 1032672
- 1032672
Modified: 2024-11-21
CVE-2015-2967
Cross-site scripting (XSS) vulnerability in settings.php in Cacti before 0.8.8d allows remote attackers to inject arbitrary web script or HTML via unspecified vectors.
Modified: 2024-11-21
CVE-2015-4342
SQL injection vulnerability in Cacti before 0.8.8d allows remote attackers to execute arbitrary SQL commands via unspecified vectors involving a cdef id.
- http://bugs.cacti.net/view.php?id=2571
- http://bugs.cacti.net/view.php?id=2571
- FEDORA-2016-a8e2be0fe6
- FEDORA-2016-a8e2be0fe6
- FEDORA-2016-4a5ce6a6c0
- FEDORA-2016-4a5ce6a6c0
- FEDORA-2016-852a39e085
- FEDORA-2016-852a39e085
- openSUSE-SU-2015:1133
- openSUSE-SU-2015:1133
- http://packetstormsecurity.com/files/132224/Cacti-SQL-Injection-Header-Injection.html
- http://packetstormsecurity.com/files/132224/Cacti-SQL-Injection-Header-Injection.html
- 20150609 [CVE-2015-4342]SQL Injection and Location header injection from cdef id
- 20150609 [CVE-2015-4342]SQL Injection and Location header injection from cdef id
- http://www.cacti.net/release_notes_0_8_8d.php
- http://www.cacti.net/release_notes_0_8_8d.php
- DSA-3295
- DSA-3295
- 75108
- 75108
- 1032672
- 1032672
- https://bugzilla.suse.com/show_bug.cgi?id=934187
- https://bugzilla.suse.com/show_bug.cgi?id=934187
- https://www.suse.com/security/cve/CVE-2015-4342.html
- https://www.suse.com/security/cve/CVE-2015-4342.html
Modified: 2024-11-21
CVE-2015-4454
SQL injection vulnerability in the get_hash_graph_template function in lib/functions.php in Cacti before 0.8.8d allows remote attackers to execute arbitrary SQL commands via the graph_template_id parameter to graph_templates.php.
- http://bugs.cacti.net/view.php?id=2572
- http://bugs.cacti.net/view.php?id=2572
- FEDORA-2016-a8e2be0fe6
- FEDORA-2016-a8e2be0fe6
- FEDORA-2016-4a5ce6a6c0
- FEDORA-2016-4a5ce6a6c0
- FEDORA-2016-852a39e085
- FEDORA-2016-852a39e085
- http://www.cacti.net/release_notes_0_8_8d.php
- http://www.cacti.net/release_notes_0_8_8d.php
- DSA-3295
- DSA-3295
- 75270
- 75270
Modified: 2024-11-21
CVE-2015-4634
SQL injection vulnerability in graphs.php in Cacti before 0.8.8e allows remote attackers to execute arbitrary SQL commands via the local_graph_id parameter.
Modified: 2024-11-21
CVE-2015-8369
SQL injection vulnerability in include/top_graph_header.php in Cacti 0.8.8f and earlier allows remote attackers to execute arbitrary SQL commands via the rra_id parameter in a properties action to graph.php.
- http://bugs.cacti.net/view.php?id=2646
- http://bugs.cacti.net/view.php?id=2646
- http://packetstormsecurity.com/files/134724/Cacti-0.8.8f-SQL-Injection.html
- http://packetstormsecurity.com/files/134724/Cacti-0.8.8f-SQL-Injection.html
- 20151209 [CVE-2015-8369] Cacti SQL injection in graph.php
- 20151209 [CVE-2015-8369] Cacti SQL injection in graph.php
- DSA-3423
- DSA-3423
- 1034497
- 1034497
- GLSA-201607-05
- GLSA-201607-05
Modified: 2024-11-21
CVE-2015-8377
SQL injection vulnerability in the host_new_graphs_save function in graphs_new.php in Cacti 0.8.8f and earlier allows remote authenticated users to execute arbitrary SQL commands via crafted serialized data in the selected_graphs_array parameter in a save action.
Modified: 2024-11-21
CVE-2015-8604
SQL injection vulnerability in the host_new_graphs function in graphs_new.php in Cacti 0.8.8f and earlier allows remote authenticated users to execute arbitrary SQL commands via the cg_g parameter in a save action.
- http://bugs.cacti.net/view.php?id=2652
- http://bugs.cacti.net/view.php?id=2652
- http://packetstormsecurity.com/files/135191/Cacti-0.8.8f-graphs_new.php-SQL-Injection.html
- http://packetstormsecurity.com/files/135191/Cacti-0.8.8f-graphs_new.php-SQL-Injection.html
- 20160108 [CVE-2015-8604] Cacti SQL injection in graphs_new.php
- 20160108 [CVE-2015-8604] Cacti SQL injection in graphs_new.php
- DSA-3494
- DSA-3494
- [oss-security] 20160104 CVE Request: cacti: SQL injection vulnerability in graphs_new.php
- [oss-security] 20160104 CVE Request: cacti: SQL injection vulnerability in graphs_new.php
- [oss-security] 20160104 Re: CVE Request: cacti: SQL injection vulnerability in graphs_new.php
- [oss-security] 20160104 Re: CVE Request: cacti: SQL injection vulnerability in graphs_new.php
- 1034573
- 1034573
- GLSA-201607-05
- GLSA-201607-05
Modified: 2024-11-21
CVE-2016-2313
auth_login.php in Cacti before 0.8.8g allows remote authenticated users who use web authentication to bypass intended access restrictions by logging in as a user not in the cacti database.
- http://bugs.cacti.net/view.php?id=2656
- http://bugs.cacti.net/view.php?id=2656
- openSUSE-SU-2016:0437
- openSUSE-SU-2016:0437
- openSUSE-SU-2016:0438
- openSUSE-SU-2016:0438
- openSUSE-SU-2016:0440
- openSUSE-SU-2016:0440
- http://www.cacti.net/release_notes_0_8_8g.php
- http://www.cacti.net/release_notes_0_8_8g.php
- 1037745
- 1037745
- GLSA-201607-05
- GLSA-201607-05
- GLSA-201711-10
- GLSA-201711-10
Modified: 2024-11-21
CVE-2016-3172
SQL injection vulnerability in tree.php in Cacti 0.8.8g and earlier allows remote authenticated users to execute arbitrary SQL commands via the parent_id parameter in an item_edit action.
- http://bugs.cacti.net/view.php?id=2667
- http://bugs.cacti.net/view.php?id=2667
- openSUSE-SU-2016:1328
- openSUSE-SU-2016:1328
- [oss-security] 20160310 please assign CVE for cacti bug 2667: SQL Injection Vulnerability
- [oss-security] 20160310 please assign CVE for cacti bug 2667: SQL Injection Vulnerability
- [oss-security] 20160315 Re: please assign CVE for cacti bug 2667: SQL Injection Vulnerability
- [oss-security] 20160315 Re: please assign CVE for cacti bug 2667: SQL Injection Vulnerability
- 84324
- 84324
- GLSA-201607-05
- GLSA-201607-05
Modified: 2024-11-21
CVE-2016-3659
SQL injection vulnerability in graph_view.php in Cacti 0.8.8.g allows remote authenticated users to execute arbitrary SQL commands via the host_group_data parameter.
- http://bugs.cacti.net/view.php?id=2673
- http://bugs.cacti.net/view.php?id=2673
- openSUSE-SU-2016:1328
- openSUSE-SU-2016:1328
- http://packetstormsecurity.com/files/136547/Cacti-0.8.8g-SQL-Injection.html
- http://packetstormsecurity.com/files/136547/Cacti-0.8.8g-SQL-Injection.html
- 20160404 [CVE-2016-3659]Cacti graph_view.php SQL Injection Vulnerability
- 20160404 [CVE-2016-3659]Cacti graph_view.php SQL Injection Vulnerability
- 85806
- 85806
- GLSA-201607-05
- GLSA-201607-05
Modified: 2024-11-21
CVE-2017-1000031
SQL injection vulnerability in graph_templates_inputs.php in Cacti 0.8.8b allows remote attackers to execute arbitrary SQL commands via the graph_template_input_id and graph_template_id parameters.
Modified: 2024-11-21
CVE-2017-1000032
Cross-Site scripting (XSS) vulnerabilities in Cacti 0.8.8b allow remote attackers to inject arbitrary web script or HTML via the parent_id parameter to tree.php and drp_action parameter to data_sources.php.
Package kernel-image-un-def updated to version 4.5.3-alt1 for branch sisyphus in task 164361.
Closed vulnerabilities
BDU:2016-02082
Уязвимость функции usbip_recv_xbuff (drivers/usb/usbip/usbip_common.c) ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
Modified: 2024-11-21
CVE-2016-1575
The overlayfs implementation in the Linux kernel through 4.5.2 does not properly maintain POSIX ACL xattr data, which allows local users to gain privileges by leveraging a group-writable setgid directory.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e9f57ebcba563e0cd532926cab83c92bb4d79360
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e9f57ebcba563e0cd532926cab83c92bb4d79360
- http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-1575.html
- http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-1575.html
- http://www.halfdog.net/Security/2016/UserNamespaceOverlayfsXattrSetgidPrivilegeEscalation/
- http://www.halfdog.net/Security/2016/UserNamespaceOverlayfsXattrSetgidPrivilegeEscalation/
- [oss-security] 20160224 User Namespaces Overlayfs Xattr Setgid Privilege Escalation: Overlayfs
- [oss-security] 20160224 User Namespaces Overlayfs Xattr Setgid Privilege Escalation: Overlayfs
- [oss-security] 20211018 Re: CVE-2021-3847: OverlayFS - Potential Privilege Escalation using overlays copy_up
- [oss-security] 20211018 Re: CVE-2021-3847: OverlayFS - Potential Privilege Escalation using overlays copy_up
- https://launchpad.net/bugs/1534961
- https://launchpad.net/bugs/1534961
Modified: 2024-11-21
CVE-2016-1576
The overlayfs implementation in the Linux kernel through 4.5.2 does not properly restrict the mount namespace, which allows local users to gain privileges by mounting an overlayfs filesystem on top of a FUSE filesystem, and then executing a crafted setuid program.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e9f57ebcba563e0cd532926cab83c92bb4d79360
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e9f57ebcba563e0cd532926cab83c92bb4d79360
- http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-1576.html
- http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-1576.html
- http://www.halfdog.net/Security/2016/OverlayfsOverFusePrivilegeEscalation/
- http://www.halfdog.net/Security/2016/OverlayfsOverFusePrivilegeEscalation/
- [oss-security] 20160224 Overlayfs over Fuse Privilege Escalation in USERNS
- [oss-security] 20160224 Overlayfs over Fuse Privilege Escalation in USERNS
- [oss-security] 20211018 Re: CVE-2021-3847: OverlayFS - Potential Privilege Escalation using overlays copy_up
- [oss-security] 20211018 Re: CVE-2021-3847: OverlayFS - Potential Privilege Escalation using overlays copy_up
- https://bugs.launchpad.net/bugs/1535150
- https://bugs.launchpad.net/bugs/1535150
- https://launchpadlibrarian.net/235300093/0005-overlayfs-Be-more-careful-about-copying-up-sxid-file.patch
- https://launchpadlibrarian.net/235300093/0005-overlayfs-Be-more-careful-about-copying-up-sxid-file.patch
- https://launchpadlibrarian.net/235300225/0006-overlayfs-Propogate-nosuid-from-lower-and-upper-moun.patch
- https://launchpadlibrarian.net/235300225/0006-overlayfs-Propogate-nosuid-from-lower-and-upper-moun.patch
Modified: 2024-11-21
CVE-2016-2117
The atl2_probe function in drivers/net/ethernet/atheros/atlx/atl2.c in the Linux kernel through 4.5.2 incorrectly enables scatter/gather I/O, which allows remote attackers to obtain sensitive information from kernel memory by reading packet data.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f43bfaeddc79effbf3d0fcb53ca477cca66f3db8
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f43bfaeddc79effbf3d0fcb53ca477cca66f3db8
- RHSA-2016:2574
- RHSA-2016:2574
- RHSA-2016:2584
- RHSA-2016:2584
- DSA-3607
- DSA-3607
- [oss-security] 20160316 CVE-2016-2117 memory disclosure to ethernet due to unchecked scatter/gather IO
- [oss-security] 20160316 CVE-2016-2117 memory disclosure to ethernet due to unchecked scatter/gather IO
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 84500
- 84500
- USN-2989-1
- USN-2989-1
- USN-2998-1
- USN-2998-1
- USN-3000-1
- USN-3000-1
- USN-3001-1
- USN-3001-1
- USN-3002-1
- USN-3002-1
- USN-3003-1
- USN-3003-1
- USN-3004-1
- USN-3004-1
- USN-3005-1
- USN-3005-1
- USN-3006-1
- USN-3006-1
- USN-3007-1
- USN-3007-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1312298
- https://bugzilla.redhat.com/show_bug.cgi?id=1312298
- https://github.com/torvalds/linux/commit/f43bfaeddc79effbf3d0fcb53ca477cca66f3db8
- https://github.com/torvalds/linux/commit/f43bfaeddc79effbf3d0fcb53ca477cca66f3db8
Modified: 2024-11-21
CVE-2016-2187
The gtco_probe function in drivers/input/tablet/gtco.c in the Linux kernel through 4.5.2 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) via a crafted endpoints value in a USB device descriptor.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=162f98dea487206d9ab79fc12ed64700667a894d
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=162f98dea487206d9ab79fc12ed64700667a894d
- SUSE-SU-2016:1672
- SUSE-SU-2016:1672
- SUSE-SU-2016:1985
- SUSE-SU-2016:1985
- DSA-3607
- DSA-3607
- 85425
- 85425
- USN-2989-1
- USN-2989-1
- USN-2996-1
- USN-2996-1
- USN-2997-1
- USN-2997-1
- USN-2998-1
- USN-2998-1
- USN-3000-1
- USN-3000-1
- USN-3001-1
- USN-3001-1
- USN-3002-1
- USN-3002-1
- USN-3003-1
- USN-3003-1
- USN-3004-1
- USN-3004-1
- USN-3005-1
- USN-3005-1
- USN-3006-1
- USN-3006-1
- USN-3007-1
- USN-3007-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1317017
- https://bugzilla.redhat.com/show_bug.cgi?id=1317017
- https://github.com/torvalds/linux/commit/162f98dea487206d9ab79fc12ed64700667a894d
- https://github.com/torvalds/linux/commit/162f98dea487206d9ab79fc12ed64700667a894d
Modified: 2024-11-21
CVE-2016-3134
The netfilter subsystem in the Linux kernel through 4.5.2 does not validate certain offset fields, which allows local users to gain privileges or cause a denial of service (heap memory corruption) via an IPT_SO_SET_REPLACE setsockopt call.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=54d83fc74aa9ec72794373cb47432c5f7fb1a309
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=54d83fc74aa9ec72794373cb47432c5f7fb1a309
- openSUSE-SU-2016:1641
- openSUSE-SU-2016:1641
- SUSE-SU-2016:1672
- SUSE-SU-2016:1672
- SUSE-SU-2016:1690
- SUSE-SU-2016:1690
- SUSE-SU-2016:1696
- SUSE-SU-2016:1696
- SUSE-SU-2016:1764
- SUSE-SU-2016:1764
- SUSE-SU-2016:1961
- SUSE-SU-2016:1961
- SUSE-SU-2016:1985
- SUSE-SU-2016:1985
- SUSE-SU-2016:1994
- SUSE-SU-2016:1994
- SUSE-SU-2016:1995
- SUSE-SU-2016:1995
- SUSE-SU-2016:2000
- SUSE-SU-2016:2000
- SUSE-SU-2016:2001
- SUSE-SU-2016:2001
- SUSE-SU-2016:2002
- SUSE-SU-2016:2002
- SUSE-SU-2016:2005
- SUSE-SU-2016:2005
- SUSE-SU-2016:2006
- SUSE-SU-2016:2006
- SUSE-SU-2016:2007
- SUSE-SU-2016:2007
- SUSE-SU-2016:2009
- SUSE-SU-2016:2009
- SUSE-SU-2016:2010
- SUSE-SU-2016:2010
- SUSE-SU-2016:2014
- SUSE-SU-2016:2014
- SUSE-SU-2016:2074
- SUSE-SU-2016:2074
- RHSA-2016:1847
- RHSA-2016:1847
- RHSA-2016:1875
- RHSA-2016:1875
- RHSA-2016:1883
- RHSA-2016:1883
- DSA-3607
- DSA-3607
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
- 84305
- 84305
- 1036763
- 1036763
- USN-2929-1
- USN-2929-1
- USN-2929-2
- USN-2929-2
- USN-2930-1
- USN-2930-1
- USN-2930-2
- USN-2930-2
- USN-2930-3
- USN-2930-3
- USN-2931-1
- USN-2931-1
- USN-2932-1
- USN-2932-1
- USN-3049-1
- USN-3049-1
- USN-3050-1
- USN-3050-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1317383
- https://bugzilla.redhat.com/show_bug.cgi?id=1317383
- https://code.google.com/p/google-security-research/issues/detail?id=758
- https://code.google.com/p/google-security-research/issues/detail?id=758
- https://github.com/torvalds/linux/commit/54d83fc74aa9ec72794373cb47432c5f7fb1a309
- https://github.com/torvalds/linux/commit/54d83fc74aa9ec72794373cb47432c5f7fb1a309
Modified: 2024-11-21
CVE-2016-3672
The arch_pick_mmap_layout function in arch/x86/mm/mmap.c in the Linux kernel through 4.5.2 does not properly randomize the legacy base address, which makes it easier for local users to defeat the intended restrictions on the ADDR_NO_RANDOMIZE flag, and bypass the ASLR protection mechanism for a setuid or setgid program, by disabling stack-consumption resource limits.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8b8addf891de8a00e4d39fc32f93f7c5eb8feceb
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8b8addf891de8a00e4d39fc32f93f7c5eb8feceb
- http://hmarco.org/bugs/CVE-2016-3672-Unlimiting-the-stack-not-longer-dis
- http://hmarco.org/bugs/CVE-2016-3672-Unlimiting-the-stack-not-longer-dis
- http://hmarco.org/bugs/CVE-2016-3672-Unlimiting-the-stack-not-longer-disables-ASLR.html
- http://hmarco.org/bugs/CVE-2016-3672-Unlimiting-the-stack-not-longer-disables-ASLR.html
- FEDORA-2016-76706f51a7
- FEDORA-2016-76706f51a7
- openSUSE-SU-2016:1641
- openSUSE-SU-2016:1641
- SUSE-SU-2016:1690
- SUSE-SU-2016:1690
- SUSE-SU-2016:1937
- SUSE-SU-2016:1937
- SUSE-SU-2016:2105
- SUSE-SU-2016:2105
- openSUSE-SU-2016:2184
- openSUSE-SU-2016:2184
- 20160406 CVE-2016-3672 - Unlimiting the stack not longer disables ASLR
- 20160406 CVE-2016-3672 - Unlimiting the stack not longer disables ASLR
- DSA-3607
- DSA-3607
- 20160406 CVE-2016-3672 - Unlimiting the stack not longer disables ASLR
- 20160406 CVE-2016-3672 - Unlimiting the stack not longer disables ASLR
- 85884
- 85884
- 1035506
- 1035506
- USN-2989-1
- USN-2989-1
- USN-2996-1
- USN-2996-1
- USN-2997-1
- USN-2997-1
- USN-2998-1
- USN-2998-1
- USN-3000-1
- USN-3000-1
- USN-3001-1
- USN-3001-1
- USN-3002-1
- USN-3002-1
- USN-3003-1
- USN-3003-1
- USN-3004-1
- USN-3004-1
- RHSA-2018:0676
- RHSA-2018:0676
- RHSA-2018:1062
- RHSA-2018:1062
- https://bugzilla.redhat.com/show_bug.cgi?id=1324749
- https://bugzilla.redhat.com/show_bug.cgi?id=1324749
- https://github.com/torvalds/linux/commit/8b8addf891de8a00e4d39fc32f93f7c5eb8feceb
- https://github.com/torvalds/linux/commit/8b8addf891de8a00e4d39fc32f93f7c5eb8feceb
- 39669
- 39669
Modified: 2024-11-21
CVE-2016-3955
The usbip_recv_xbuff function in drivers/usb/usbip/usbip_common.c in the Linux kernel before 4.5.3 allows remote attackers to cause a denial of service (out-of-bounds write) or possibly have unspecified other impact via a crafted length value in a USB/IP packet.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b348d7dddb6c4fbfc810b7a0626e8ec9e29f7cbb
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=b348d7dddb6c4fbfc810b7a0626e8ec9e29f7cbb
- openSUSE-SU-2016:1641
- openSUSE-SU-2016:1641
- DSA-3607
- DSA-3607
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.3
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.3
- [oss-security] 20160419 CVE Request: Linux kernel: remote buffer overflow in usbip
- [oss-security] 20160419 CVE Request: Linux kernel: remote buffer overflow in usbip
- 86534
- 86534
- USN-2989-1
- USN-2989-1
- USN-2996-1
- USN-2996-1
- USN-2997-1
- USN-2997-1
- USN-2998-1
- USN-2998-1
- USN-3000-1
- USN-3000-1
- USN-3001-1
- USN-3001-1
- USN-3002-1
- USN-3002-1
- USN-3003-1
- USN-3003-1
- USN-3004-1
- USN-3004-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1328478
- https://bugzilla.redhat.com/show_bug.cgi?id=1328478
- https://github.com/torvalds/linux/commit/b348d7dddb6c4fbfc810b7a0626e8ec9e29f7cbb
- https://github.com/torvalds/linux/commit/b348d7dddb6c4fbfc810b7a0626e8ec9e29f7cbb
Modified: 2024-11-21
CVE-2016-4565
The InfiniBand (aka IB) stack in the Linux kernel before 4.5.3 incorrectly relies on the write system call, which allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a uAPI interface.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e6bd18f57aad1a2d1ef40e646d03ed0f2515c9e3
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e6bd18f57aad1a2d1ef40e646d03ed0f2515c9e3
- openSUSE-SU-2016:1641
- openSUSE-SU-2016:1641
- SUSE-SU-2016:1672
- SUSE-SU-2016:1672
- SUSE-SU-2016:1690
- SUSE-SU-2016:1690
- SUSE-SU-2016:1937
- SUSE-SU-2016:1937
- SUSE-SU-2016:1961
- SUSE-SU-2016:1961
- SUSE-SU-2016:1985
- SUSE-SU-2016:1985
- SUSE-SU-2016:1994
- SUSE-SU-2016:1994
- SUSE-SU-2016:1995
- SUSE-SU-2016:1995
- SUSE-SU-2016:2000
- SUSE-SU-2016:2000
- SUSE-SU-2016:2001
- SUSE-SU-2016:2001
- SUSE-SU-2016:2002
- SUSE-SU-2016:2002
- SUSE-SU-2016:2003
- SUSE-SU-2016:2003
- SUSE-SU-2016:2005
- SUSE-SU-2016:2005
- SUSE-SU-2016:2006
- SUSE-SU-2016:2006
- SUSE-SU-2016:2007
- SUSE-SU-2016:2007
- SUSE-SU-2016:2009
- SUSE-SU-2016:2009
- SUSE-SU-2016:2010
- SUSE-SU-2016:2010
- SUSE-SU-2016:2011
- SUSE-SU-2016:2011
- SUSE-SU-2016:2014
- SUSE-SU-2016:2014
- SUSE-SU-2016:2105
- SUSE-SU-2016:2105
- openSUSE-SU-2016:2184
- openSUSE-SU-2016:2184
- RHSA-2016:1489
- RHSA-2016:1489
- RHSA-2016:1581
- RHSA-2016:1581
- RHSA-2016:1617
- RHSA-2016:1617
- RHSA-2016:1640
- RHSA-2016:1640
- RHSA-2016:1657
- RHSA-2016:1657
- RHSA-2016:1814
- RHSA-2016:1814
- DSA-3607
- DSA-3607
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.3
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.3
- [oss-security] 20160507 CVE Request: Linux: IB/security: Restrict use of the write() interface'
- [oss-security] 20160507 CVE Request: Linux: IB/security: Restrict use of the write() interface'
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 90301
- 90301
- USN-3001-1
- USN-3001-1
- USN-3002-1
- USN-3002-1
- USN-3003-1
- USN-3003-1
- USN-3004-1
- USN-3004-1
- USN-3005-1
- USN-3005-1
- USN-3006-1
- USN-3006-1
- USN-3007-1
- USN-3007-1
- USN-3018-1
- USN-3018-1
- USN-3018-2
- USN-3018-2
- USN-3019-1
- USN-3019-1
- USN-3021-1
- USN-3021-1
- USN-3021-2
- USN-3021-2
- RHSA-2016:1277
- RHSA-2016:1277
- RHSA-2016:1301
- RHSA-2016:1301
- RHSA-2016:1341
- RHSA-2016:1341
- RHSA-2016:1406
- RHSA-2016:1406
- https://bugzilla.redhat.com/show_bug.cgi?id=1310570
- https://bugzilla.redhat.com/show_bug.cgi?id=1310570
- https://github.com/torvalds/linux/commit/e6bd18f57aad1a2d1ef40e646d03ed0f2515c9e3
- https://github.com/torvalds/linux/commit/e6bd18f57aad1a2d1ef40e646d03ed0f2515c9e3
Modified: 2024-11-21
CVE-2016-4568
drivers/media/v4l2-core/videobuf2-v4l2.c in the Linux kernel before 4.5.3 allows local users to cause a denial of service (kernel memory write operation) or possibly have unspecified other impact via a crafted number of planes in a VIDIOC_DQBUF ioctl call.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2c1f6951a8a82e6de0d82b1158b5e493fc6c54ab
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=2c1f6951a8a82e6de0d82b1158b5e493fc6c54ab
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.3
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.3
- [oss-security] 20160507 CVE Request: Linux: [media] videobuf2-v4l2: Verify planes array in buffer dequeueing
- [oss-security] 20160507 CVE Request: Linux: [media] videobuf2-v4l2: Verify planes array in buffer dequeueing
- https://bugzilla.redhat.com/show_bug.cgi?id=1334316
- https://bugzilla.redhat.com/show_bug.cgi?id=1334316
- https://github.com/torvalds/linux/commit/2c1f6951a8a82e6de0d82b1158b5e493fc6c54ab
- https://github.com/torvalds/linux/commit/2c1f6951a8a82e6de0d82b1158b5e493fc6c54ab
Modified: 2024-11-21
CVE-2016-7912
Use-after-free vulnerability in the ffs_user_copy_worker function in drivers/usb/gadget/function/f_fs.c in the Linux kernel before 4.5.3 allows local users to gain privileges by accessing an I/O data structure after a certain callback call.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=38740a5b87d53ceb89eb2c970150f6e94e00373a
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=38740a5b87d53ceb89eb2c970150f6e94e00373a
- http://source.android.com/security/bulletin/2016-11-01.html
- http://source.android.com/security/bulletin/2016-11-01.html
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.3
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.3
- 94197
- 94197
- https://github.com/torvalds/linux/commit/38740a5b87d53ceb89eb2c970150f6e94e00373a
- https://github.com/torvalds/linux/commit/38740a5b87d53ceb89eb2c970150f6e94e00373a
Modified: 2024-11-21
CVE-2016-7914
The assoc_array_insert_into_terminal_node function in lib/assoc_array.c in the Linux kernel before 4.5.3 does not check whether a slot is a leaf, which allows local users to obtain sensitive information from kernel memory or cause a denial of service (invalid pointer dereference and out-of-bounds read) via an application that uses associative-array data structures, as demonstrated by the keyutils test suite.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8d4a2ec1e0b41b0cf9a0c5cd4511da7f8e4f3de2
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=8d4a2ec1e0b41b0cf9a0c5cd4511da7f8e4f3de2
- RHSA-2016:2574
- RHSA-2016:2574
- http://source.android.com/security/bulletin/2016-11-01.html
- http://source.android.com/security/bulletin/2016-11-01.html
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.3
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.5.3
- 94138
- 94138
- https://github.com/torvalds/linux/commit/8d4a2ec1e0b41b0cf9a0c5cd4511da7f8e4f3de2
- https://github.com/torvalds/linux/commit/8d4a2ec1e0b41b0cf9a0c5cd4511da7f8e4f3de2
Closed bugs
Конфликт по файлам с mozo