ALT-BU-2017-2903-1
Branch sisyphus update bulletin.
Package kernel-image-std-def updated to version 4.4.45-alt1.1 for branch sisyphus in task 177156.
Closed vulnerabilities
Modified: 2021-03-23
BDU:2017-00294
Уязвимость операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
Modified: 2025-04-20
CVE-2017-5547
drivers/hid/hid-corsair.c in the Linux kernel 4.9.x before 4.9.6 interacts incorrectly with the CONFIG_VMAP_STACK option, which allows local users to cause a denial of service (system crash or memory corruption) or possibly have unspecified other impact by leveraging use of more than one virtual page for a DMA scatterlist.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6d104af38b570d37aa32a5803b04c354f8ed513d
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.6
- http://www.openwall.com/lists/oss-security/2017/01/21/3
- http://www.securityfocus.com/bid/95709
- https://bugzilla.redhat.com/show_bug.cgi?id=1416096
- https://github.com/torvalds/linux/commit/6d104af38b570d37aa32a5803b04c354f8ed513d
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6d104af38b570d37aa32a5803b04c354f8ed513d
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.6
- http://www.openwall.com/lists/oss-security/2017/01/21/3
- http://www.securityfocus.com/bid/95709
- https://bugzilla.redhat.com/show_bug.cgi?id=1416096
- https://github.com/torvalds/linux/commit/6d104af38b570d37aa32a5803b04c354f8ed513d
Closed vulnerabilities
Modified: 2024-04-11
BDU:2022-05679
Уязвимость библиотеки управления виртуализацией Libvirt, связанная с недостаточной блокировкой, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-4147
A flaw was found in the libvirt libxl driver. A malicious guest could continuously reboot itself and cause libvirtd on the host to deadlock or crash, resulting in a denial of service condition.
- https://bugzilla.redhat.com/show_bug.cgi?id=2034195
- https://lists.debian.org/debian-lts-announce/2024/04/msg00000.html
- https://security.netapp.com/advisory/ntap-20220513-0004/
- https://bugzilla.redhat.com/show_bug.cgi?id=2034195
- https://lists.debian.org/debian-lts-announce/2024/04/msg00000.html
- https://security.netapp.com/advisory/ntap-20220513-0004/
Closed vulnerabilities
Modified: 2025-04-20
CVE-2016-10109
Use-after-free vulnerability in pcsc-lite before 1.8.20 allows a remote attackers to cause denial of service (crash) via a command that uses "cardsList" after the handle has been released through the SCardReleaseContext function.
- http://www.debian.org/security/2017/dsa-3752
- http://www.openwall.com/lists/oss-security/2017/01/03/3
- http://www.securityfocus.com/bid/95263
- http://www.ubuntu.com/usn/USN-3176-1
- https://lists.alioth.debian.org/pipermail/pcsclite-muscle/Week-of-Mon-20161226/000779.html
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://salsa.debian.org/rousseau/PCSC/-/commit/697fe05967af7ea215bcd5d5774be587780c9e22
- https://security.gentoo.org/glsa/201702-01
- http://www.debian.org/security/2017/dsa-3752
- http://www.openwall.com/lists/oss-security/2017/01/03/3
- http://www.securityfocus.com/bid/95263
- http://www.ubuntu.com/usn/USN-3176-1
- https://lists.alioth.debian.org/pipermail/pcsclite-muscle/Week-of-Mon-20161226/000779.html
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://salsa.debian.org/rousseau/PCSC/-/commit/697fe05967af7ea215bcd5d5774be587780c9e22
- https://security.gentoo.org/glsa/201702-01
Package bubblewrap updated to version 0.1.6-alt1 for branch sisyphus in task 177291.
Closed vulnerabilities
Modified: 2025-04-20
CVE-2017-5226
When executing a program via the bubblewrap sandbox, the nonpriv session can escape to the parent session by using the TIOCSTI ioctl to push characters into the terminal's input buffer, allowing an attacker to escape the sandbox.
- http://www.openwall.com/lists/oss-security/2020/07/10/1
- http://www.openwall.com/lists/oss-security/2023/03/17/1
- http://www.securityfocus.com/bid/97260
- https://bugzilla.redhat.com/show_bug.cgi?id=1411811
- https://github.com/projectatomic/bubblewrap/commit/d7fc532c42f0e9bf427923bab85433282b3e5117
- https://github.com/projectatomic/bubblewrap/issues/142
- https://www.openwall.com/lists/oss-security/2023/03/14/2
- http://www.openwall.com/lists/oss-security/2020/07/10/1
- http://www.openwall.com/lists/oss-security/2023/03/17/1
- http://www.securityfocus.com/bid/97260
- https://bugzilla.redhat.com/show_bug.cgi?id=1411811
- https://github.com/projectatomic/bubblewrap/commit/d7fc532c42f0e9bf427923bab85433282b3e5117
- https://github.com/projectatomic/bubblewrap/issues/142
- https://www.openwall.com/lists/oss-security/2023/03/14/2