ALT-BU-2017-3028-1
Branch sisyphus update bulletin.
Package shim-signed updated to version 0.4-alt4 for branch sisyphus in task 181193.
Closed bugs
убрать альтовую подпись с shim-signed
Closed vulnerabilities
Modified: 2025-04-12
CVE-2012-2150
xfs_metadump in xfsprogs before 3.2.4 does not properly obfuscate file data, which allows remote attackers to obtain sensitive information by reading a generated image.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163690.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164180.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164189.html
- http://lists.opensuse.org/opensuse-updates/2015-08/msg00027.html
- http://lists.opensuse.org/opensuse-updates/2016-01/msg00007.html
- http://oss.sgi.com/pipermail/xfs/2015-July/042726.html
- http://www.openwall.com/lists/oss-security/2015/07/23/12
- http://www.openwall.com/lists/oss-security/2015/07/30/3
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/76013
- https://bugzilla.redhat.com/show_bug.cgi?id=817696
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163690.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164180.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164189.html
- http://lists.opensuse.org/opensuse-updates/2015-08/msg00027.html
- http://lists.opensuse.org/opensuse-updates/2016-01/msg00007.html
- http://oss.sgi.com/pipermail/xfs/2015-July/042726.html
- http://www.openwall.com/lists/oss-security/2015/07/23/12
- http://www.openwall.com/lists/oss-security/2015/07/30/3
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/76013
- https://bugzilla.redhat.com/show_bug.cgi?id=817696
Closed bugs
[FR] Обновить до актуальной версии
Closed vulnerabilities
Modified: 2025-04-20
CVE-2017-5192
When using the local_batch client from salt-api in SaltStack Salt before 2015.8.13, 2016.3.x before 2016.3.5, and 2016.11.x before 2016.11.2, external authentication is not respected, enabling all authentication to be bypassed.
- https://docs.saltstack.com/en/2016.3/topics/releases/2015.8.13.html
- https://docs.saltstack.com/en/2016.3/topics/releases/2016.3.5.html
- https://docs.saltstack.com/en/latest/topics/releases/2016.11.2.html
- https://docs.saltstack.com/en/2016.3/topics/releases/2015.8.13.html
- https://docs.saltstack.com/en/2016.3/topics/releases/2016.3.5.html
- https://docs.saltstack.com/en/latest/topics/releases/2016.11.2.html
Modified: 2025-04-20
CVE-2017-5200
Salt-api in SaltStack Salt before 2015.8.13, 2016.3.x before 2016.3.5, and 2016.11.x before 2016.11.2 allows arbitrary command execution on a salt-master via Salt's ssh_client.
- https://docs.saltstack.com/en/2016.3/topics/releases/2015.8.13.html
- https://docs.saltstack.com/en/2016.3/topics/releases/2016.3.5.html
- https://docs.saltstack.com/en/latest/topics/releases/2016.11.2.html
- https://docs.saltstack.com/en/2016.3/topics/releases/2015.8.13.html
- https://docs.saltstack.com/en/2016.3/topics/releases/2016.3.5.html
- https://docs.saltstack.com/en/latest/topics/releases/2016.11.2.html
Modified: 2024-11-21
CVE-2017-7893
In SaltStack Salt before 2016.3.6, compromised salt-minions can impersonate the salt-master.