ALT-BU-2017-3020-1
Branch p8 update bulletin.
Package 1c-preinstall updated to version 8.3-alt11 for branch p8 in task 181040.
Closed bugs
Не хватает зависимости на libgsf
Closed vulnerabilities
Modified: 2024-11-21
CVE-2016-8614
A flaw was found in Ansible before version 2.2.0. The apt_key module does not properly verify key fingerprints, allowing remote adversary to create an OpenPGP key which matches the short key ID and inject this key instead of the correct key.
- 94108
- 94108
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8614
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-8614
- https://github.com/ansible/ansible-modules-core/issues/5237
- https://github.com/ansible/ansible-modules-core/issues/5237
- https://github.com/ansible/ansible-modules-core/pull/5353
- https://github.com/ansible/ansible-modules-core/pull/5353
- https://github.com/ansible/ansible-modules-core/pull/5357
- https://github.com/ansible/ansible-modules-core/pull/5357
Modified: 2024-11-21
CVE-2016-8628
Ansible before version 2.2.0 fails to properly sanitize fact variables sent from the Ansible controller. An attacker with the ability to create special variables on the controller could execute arbitrary commands on Ansible clients as the user Ansible runs as.
Modified: 2024-11-21
CVE-2016-8647
An input validation vulnerability was found in Ansible's mysql_user module before 2.2.1.0, which may fail to correctly change a password in certain circumstances. Thus the previous password would still be active when it should have been changed.
Modified: 2024-11-21
CVE-2016-9587
Ansible before versions 2.1.4, 2.2.1 is vulnerable to an improper input validation in Ansible's handling of data sent from client systems. An attacker with control over a client system being managed by Ansible and the ability to send facts back to the Ansible server could use this flaw to execute arbitrary code on the Ansible server using the Ansible server privileges.
- RHSA-2017:0195
- RHSA-2017:0195
- RHSA-2017:0260
- RHSA-2017:0260
- 95352
- 95352
- RHSA-2017:0448
- RHSA-2017:0448
- RHSA-2017:0515
- RHSA-2017:0515
- RHSA-2017:1685
- RHSA-2017:1685
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9587
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9587
- GLSA-201701-77
- GLSA-201701-77
- 41013
- 41013
Closed bugs
Версия 2.2
Closed vulnerabilities
Modified: 2024-11-21
CVE-2016-3958
Untrusted search path vulnerability in Go before 1.5.4 and 1.6.x before 1.6.1 on Windows allows local users to gain privileges via a Trojan horse DLL in the current working directory, related to use of the LoadLibrary function.
- [oss-security] 20160405 CVE request - Go - DLL loading, Big int
- [oss-security] 20160405 CVE request - Go - DLL loading, Big int
- [oss-security] 20160405 Re: CVE request - Go - DLL loading, Big int
- [oss-security] 20160405 Re: CVE request - Go - DLL loading, Big int
- https://github.com/golang/go/issues/14959
- https://github.com/golang/go/issues/14959
- https://go-review.googlesource.com/#/c/21428/
- https://go-review.googlesource.com/#/c/21428/
- [golang-announce] 20160412 [security] Go 1.6.1 and 1.5.4 are released
- [golang-announce] 20160412 [security] Go 1.6.1 and 1.5.4 are released
Modified: 2024-11-21
CVE-2016-3959
The Verify function in crypto/dsa/dsa.go in Go before 1.5.4 and 1.6.x before 1.6.1 does not properly check parameters passed to the big integer library, which might allow remote attackers to cause a denial of service (infinite loop) via a crafted public key to a program that uses HTTPS client certificates or SSH server libraries.
- FEDORA-2016-2940ad5550
- FEDORA-2016-2940ad5550
- FEDORA-2016-59c5e405e3
- FEDORA-2016-59c5e405e3
- FEDORA-2016-2fcfc7670f
- FEDORA-2016-2fcfc7670f
- openSUSE-SU-2016:1331
- openSUSE-SU-2016:1331
- RHSA-2016:1538
- RHSA-2016:1538
- [oss-security] 20160405 CVE request - Go - DLL loading, Big int
- [oss-security] 20160405 CVE request - Go - DLL loading, Big int
- [oss-security] 20160405 Re: CVE request - Go - DLL loading, Big int
- [oss-security] 20160405 Re: CVE request - Go - DLL loading, Big int
- https://go-review.googlesource.com/#/c/21533/
- https://go-review.googlesource.com/#/c/21533/
- [golang-announce] 20160412 [security] Go 1.6.1 and 1.5.4 are released
- [golang-announce] 20160412 [security] Go 1.6.1 and 1.5.4 are released
Modified: 2024-11-21
CVE-2016-5386
The net/http package in Go through 1.6 does not attempt to address RFC 3875 section 4.1.18 namespace conflicts and therefore does not protect CGI applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect a CGI application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue.
- RHSA-2016:1538
- RHSA-2016:1538
- VU#797896
- VU#797896
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1353798
- https://bugzilla.redhat.com/show_bug.cgi?id=1353798
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03770en_us
- https://httpoxy.org/
- https://httpoxy.org/
- FEDORA-2016-340e361b90
- FEDORA-2016-340e361b90
- FEDORA-2016-ea5e284d34
- FEDORA-2016-ea5e284d34