ALT-BU-2017-2979-1
Branch sisyphus update bulletin.
Closed bugs
SIGSEGV TDBLookupComboBox на модальной форме
Package thunderbird updated to version 45.8.0-alt1 for branch sisyphus in task 179252.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-5400
JIT-spray targeting asm.js combined with a heap spray allows for a bypass of ASLR and DEP protections leading to potential memory corruption attacks. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8.
- RHSA-2017:0459
- RHSA-2017:0459
- RHSA-2017:0461
- RHSA-2017:0461
- RHSA-2017:0498
- RHSA-2017:0498
- 96654
- 96654
- 1037966
- 1037966
- https://bugzilla.mozilla.org/show_bug.cgi?id=1334933
- https://bugzilla.mozilla.org/show_bug.cgi?id=1334933
- GLSA-201705-06
- GLSA-201705-06
- GLSA-201705-07
- GLSA-201705-07
- DSA-3805
- DSA-3805
- DSA-3832
- DSA-3832
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
Modified: 2024-11-21
CVE-2017-5401
A crash triggerable by web content in which an "ErrorResult" references unassigned memory due to a logic error. The resulting crash may be exploitable. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8.
- RHSA-2017:0459
- RHSA-2017:0459
- RHSA-2017:0461
- RHSA-2017:0461
- RHSA-2017:0498
- RHSA-2017:0498
- 96677
- 96677
- 1037966
- 1037966
- https://bugzilla.mozilla.org/show_bug.cgi?id=1328861
- https://bugzilla.mozilla.org/show_bug.cgi?id=1328861
- GLSA-201705-06
- GLSA-201705-06
- GLSA-201705-07
- GLSA-201705-07
- DSA-3805
- DSA-3805
- DSA-3832
- DSA-3832
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
Modified: 2024-11-21
CVE-2017-5402
A use-after-free can occur when events are fired for a "FontFace" object after the object has been already been destroyed while working with fonts. This results in a potentially exploitable crash. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8.
- RHSA-2017:0459
- RHSA-2017:0459
- RHSA-2017:0461
- RHSA-2017:0461
- RHSA-2017:0498
- RHSA-2017:0498
- 96664
- 96664
- 1037966
- 1037966
- https://bugzilla.mozilla.org/show_bug.cgi?id=1334876
- https://bugzilla.mozilla.org/show_bug.cgi?id=1334876
- GLSA-201705-06
- GLSA-201705-06
- GLSA-201705-07
- GLSA-201705-07
- DSA-3805
- DSA-3805
- DSA-3832
- DSA-3832
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
Modified: 2024-11-21
CVE-2017-5404
A use-after-free error can occur when manipulating ranges in selections with one node inside a native anonymous tree and one node outside of it. This results in a potentially exploitable crash. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8.
- RHSA-2017:0459
- RHSA-2017:0459
- RHSA-2017:0461
- RHSA-2017:0461
- RHSA-2017:0498
- RHSA-2017:0498
- 96664
- 96664
- 1037966
- 1037966
- https://bugzilla.mozilla.org/show_bug.cgi?id=1340138
- https://bugzilla.mozilla.org/show_bug.cgi?id=1340138
- GLSA-201705-06
- GLSA-201705-06
- GLSA-201705-07
- GLSA-201705-07
- DSA-3805
- DSA-3805
- DSA-3832
- DSA-3832
- 41660
- 41660
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
Modified: 2024-11-21
CVE-2017-5405
Certain response codes in FTP connections can result in the use of uninitialized values for ports in FTP operations. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8.
- RHSA-2017:0459
- RHSA-2017:0459
- RHSA-2017:0461
- RHSA-2017:0461
- RHSA-2017:0498
- RHSA-2017:0498
- 96693
- 96693
- 1037966
- 1037966
- https://bugzilla.mozilla.org/show_bug.cgi?id=1336699
- https://bugzilla.mozilla.org/show_bug.cgi?id=1336699
- GLSA-201705-06
- GLSA-201705-06
- GLSA-201705-07
- GLSA-201705-07
- DSA-3805
- DSA-3805
- DSA-3832
- DSA-3832
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
Modified: 2024-11-21
CVE-2017-5408
Video files loaded video captions cross-origin without checking for the presence of CORS headers permitting such cross-origin use, leading to potential information disclosure for video captions. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8.
- RHSA-2017:0459
- RHSA-2017:0459
- RHSA-2017:0461
- RHSA-2017:0461
- RHSA-2017:0498
- RHSA-2017:0498
- 96693
- 96693
- 1037966
- 1037966
- https://bugzilla.mozilla.org/show_bug.cgi?id=1313711
- https://bugzilla.mozilla.org/show_bug.cgi?id=1313711
- GLSA-201705-06
- GLSA-201705-06
- GLSA-201705-07
- GLSA-201705-07
- DSA-3805
- DSA-3805
- DSA-3832
- DSA-3832
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
Modified: 2024-11-21
CVE-2017-5410
Memory corruption resulting in a potentially exploitable crash during garbage collection of JavaScript due errors in how incremental sweeping is managed for memory cleanup. This vulnerability affects Firefox < 52, Firefox ESR < 45.8, Thunderbird < 52, and Thunderbird < 45.8.
- RHSA-2017:0459
- RHSA-2017:0459
- RHSA-2017:0461
- RHSA-2017:0461
- RHSA-2017:0498
- RHSA-2017:0498
- 96693
- 96693
- 1037966
- 1037966
- https://bugzilla.mozilla.org/show_bug.cgi?id=1330687
- https://bugzilla.mozilla.org/show_bug.cgi?id=1330687
- GLSA-201705-06
- GLSA-201705-06
- GLSA-201705-07
- GLSA-201705-07
- DSA-3805
- DSA-3805
- DSA-3832
- DSA-3832
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-05/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-06/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-07/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
- https://www.mozilla.org/security/advisories/mfsa2017-09/
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-7869
GnuTLS before 2017-02-20 has an out-of-bounds write caused by an integer overflow and heap-based buffer overflow related to the cdk_pkt_read function in opencdk/read-packet.c. This issue (which is a subset of the vendor's GNUTLS-SA-2017-3 report) is fixed in 3.5.10.
- 97040
- 97040
- RHSA-2017:2292
- RHSA-2017:2292
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=420
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=420
- https://gitlab.com/gnutls/gnutls/commit/51464af713d71802e3c6d5ac15f1a95132a354fe
- https://gitlab.com/gnutls/gnutls/commit/51464af713d71802e3c6d5ac15f1a95132a354fe
- https://www.gnutls.org/security.html
- https://www.gnutls.org/security.html
Closed vulnerabilities
Modified: 2024-11-21
CVE-2016-6252
Integer overflow in shadow 4.2.1 allows local users to gain privileges via crafted input to newuidmap.
- DSA-3793
- DSA-3793
- [oss-security] 20160719 subuid security patches for shadow package
- [oss-security] 20160719 subuid security patches for shadow package
- [oss-security] 20160719 Re: subuid security patches for shadow package
- [oss-security] 20160719 Re: subuid security patches for shadow package
- [oss-security] 20160720 Re: subuid security patches for shadow package
- [oss-security] 20160720 Re: subuid security patches for shadow package
- [oss-security] 20160725 Re: Re: [Pkg-shadow-devel] subuid security patches for shadow package
- [oss-security] 20160725 Re: Re: [Pkg-shadow-devel] subuid security patches for shadow package
- 92055
- 92055
- https://bugzilla.suse.com/show_bug.cgi?id=979282
- https://bugzilla.suse.com/show_bug.cgi?id=979282
- https://github.com/shadow-maint/shadow/issues/27
- https://github.com/shadow-maint/shadow/issues/27
- GLSA-201706-02
- GLSA-201706-02
Closed bugs
why not make /etc/default/ readble by all?