ALT-BU-2017-3055-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2020-00776
Уязвимость сервера DNS BIND, связанная с ошибками обработки данных, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2016-2775
ISC BIND 9.x before 9.9.9-P2, 9.10.x before 9.10.4-P2, and 9.11.x before 9.11.0b2, when lwresd or the named lwres option is enabled, allows remote attackers to cause a denial of service (daemon crash) via a long request that uses the lightweight resolver protocol.
- 92037
- 92037
- 1036360
- 1036360
- RHBA-2017:0651
- RHBA-2017:0651
- RHBA-2017:1767
- RHBA-2017:1767
- RHSA-2017:2533
- RHSA-2017:2533
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05321107
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05321107
- https://kb.isc.org/article/AA-01393/74/CVE-2016-2775
- https://kb.isc.org/article/AA-01393/74/CVE-2016-2775
- https://kb.isc.org/article/AA-01435
- https://kb.isc.org/article/AA-01435
- https://kb.isc.org/article/AA-01436
- https://kb.isc.org/article/AA-01436
- https://kb.isc.org/article/AA-01438
- https://kb.isc.org/article/AA-01438
- FEDORA-2016-007efacd1c
- FEDORA-2016-007efacd1c
- FEDORA-2016-2941b3264e
- FEDORA-2016-2941b3264e
- FEDORA-2016-53f0c65f40
- FEDORA-2016-53f0c65f40
- FEDORA-2016-3fba74e7f5
- FEDORA-2016-3fba74e7f5
- GLSA-201610-07
- GLSA-201610-07
- https://security.netapp.com/advisory/ntap-20160722-0002/
- https://security.netapp.com/advisory/ntap-20160722-0002/
Modified: 2024-11-21
CVE-2016-6170
ISC BIND through 9.9.9-P1, 9.10.x through 9.10.4-P1, and 9.11.x through 9.11.0b1 allows primary DNS servers to cause a denial of service (secondary DNS server crash) via a large AXFR response, and possibly allows IXFR servers to cause a denial of service (IXFR client crash) via a large IXFR response and allows remote authenticated users to cause a denial of service (primary DNS server crash) via a large UPDATE message.
- [oss-security] 20160706 Malicious primary DNS servers can crash secondaries
- [oss-security] 20160706 Malicious primary DNS servers can crash secondaries
- 91611
- 91611
- 1036241
- 1036241
- https://bugzilla.redhat.com/show_bug.cgi?id=1353563
- https://bugzilla.redhat.com/show_bug.cgi?id=1353563
- https://github.com/sischkg/xfer-limit/blob/master/README.md
- https://github.com/sischkg/xfer-limit/blob/master/README.md
- https://kb.isc.org/article/AA-01390
- https://kb.isc.org/article/AA-01390
- https://kb.isc.org/article/AA-01390/169/CVE-2016-6170
- https://kb.isc.org/article/AA-01390/169/CVE-2016-6170
- [dns-operations] 20160704 DNS activities in Japan
- [dns-operations] 20160704 DNS activities in Japan
- [dns-operations] 20160706 DNS activities in Japan
- [dns-operations] 20160706 DNS activities in Japan
- [dns-operations] 20160706 DNS activities in Japan
- [dns-operations] 20160706 DNS activities in Japan
- GLSA-201610-07
- GLSA-201610-07
Modified: 2024-11-21
CVE-2016-8864
named in ISC BIND 9.x before 9.9.9-P4, 9.10.x before 9.10.4-P4, and 9.11.x before 9.11.0-P1 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a DNAME record in the answer section of a response to a recursive query, related to db.c and resolver.c.
- RHSA-2016:2141
- RHSA-2016:2141
- RHSA-2016:2142
- RHSA-2016:2142
- RHSA-2016:2615
- RHSA-2016:2615
- RHSA-2016:2871
- RHSA-2016:2871
- DSA-3703
- DSA-3703
- 94067
- 94067
- 1037156
- 1037156
- RHSA-2017:1583
- RHSA-2017:1583
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05381687
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05381687
- https://kb.isc.org/article/AA-01434
- https://kb.isc.org/article/AA-01434
- https://kb.isc.org/article/AA-01435
- https://kb.isc.org/article/AA-01435
- https://kb.isc.org/article/AA-01436
- https://kb.isc.org/article/AA-01436
- https://kb.isc.org/article/AA-01437
- https://kb.isc.org/article/AA-01437
- https://kb.isc.org/article/AA-01438
- https://kb.isc.org/article/AA-01438
- FreeBSD-SA-16:34
- FreeBSD-SA-16:34
- GLSA-201701-26
- GLSA-201701-26
- https://security.netapp.com/advisory/ntap-20180926-0005/
- https://security.netapp.com/advisory/ntap-20180926-0005/
Modified: 2024-11-21
CVE-2017-3136
A query with a specific set of characteristics could cause a server using DNS64 to encounter an assertion failure and terminate. An attacker could deliberately construct a query, enabling denial-of-service against a server if it was configured to use the DNS64 feature and other preconditions were met. Affects BIND 9.8.0 -> 9.8.8-P1, 9.9.0 -> 9.9.9-P6, 9.9.10b1->9.9.10rc1, 9.10.0 -> 9.10.4-P6, 9.10.5b1->9.10.5rc1, 9.11.0 -> 9.11.0-P3, 9.11.1b1->9.11.1rc1, 9.9.3-S1 -> 9.9.9-S8.
- openSUSE-SU-2020:1699
- openSUSE-SU-2020:1699
- openSUSE-SU-2020:1701
- openSUSE-SU-2020:1701
- 97653
- 97653
- 1038259
- 1038259
- RHSA-2017:1095
- RHSA-2017:1095
- RHSA-2017:1105
- RHSA-2017:1105
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03747en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03747en_us
- https://kb.isc.org/docs/aa-01465
- https://kb.isc.org/docs/aa-01465
- GLSA-201708-01
- GLSA-201708-01
- https://security.netapp.com/advisory/ntap-20180802-0002/
- https://security.netapp.com/advisory/ntap-20180802-0002/
- DSA-3854
- DSA-3854
Modified: 2024-11-21
CVE-2017-3137
Mistaken assumptions about the ordering of records in the answer section of a response containing CNAME or DNAME resource records could lead to a situation in which named would exit with an assertion failure when processing a response in which records occurred in an unusual order. Affects BIND 9.9.9-P6, 9.9.10b1->9.9.10rc1, 9.10.4-P6, 9.10.5b1->9.10.5rc1, 9.11.0-P3, 9.11.1b1->9.11.1rc1, and 9.9.9-S8.
- 97651
- 97651
- 1038258
- 1038258
- 1040195
- 1040195
- RHSA-2017:1095
- RHSA-2017:1095
- RHSA-2017:1105
- RHSA-2017:1105
- RHSA-2017:1582
- RHSA-2017:1582
- RHSA-2017:1583
- RHSA-2017:1583
- https://kb.isc.org/docs/aa-01466
- https://kb.isc.org/docs/aa-01466
- GLSA-201708-01
- GLSA-201708-01
- https://security.netapp.com/advisory/ntap-20180802-0002/
- https://security.netapp.com/advisory/ntap-20180802-0002/
- DSA-3854
- DSA-3854
Modified: 2024-11-21
CVE-2017-3138
named contains a feature which allows operators to issue commands to a running server by communicating with the server process over a control channel, using a utility program such as rndc. A regression introduced in a recent feature change has created a situation under which some versions of named can be caused to exit with a REQUIRE assertion failure if they are sent a null command string. Affects BIND 9.9.9->9.9.9-P7, 9.9.10b1->9.9.10rc2, 9.10.4->9.10.4-P7, 9.10.5b1->9.10.5rc2, 9.11.0->9.11.0-P4, 9.11.1b1->9.11.1rc2, 9.9.9-S1->9.9.9-S9.
Closed bugs
control bind-chroot не работает в случае использования systemd
Closed bugs
Вытягивает *-gir-devel пакеты
Package kernel-image-std-def updated to version 4.9.22-alt1 for branch sisyphus in task 181668.
Closed vulnerabilities
BDU:2017-01466
Уязвимость функции vmw_surface_define_ioctl операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии
Modified: 2024-11-21
CVE-2017-7294
The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.10.6 does not validate addition of certain levels data, which allows local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device.
- 97177
- 97177
- RHSA-2018:0676
- RHSA-2018:0676
- RHSA-2018:1062
- RHSA-2018:1062
- https://bugzilla.redhat.com/show_bug.cgi?id=1436798
- https://bugzilla.redhat.com/show_bug.cgi?id=1436798
- https://lists.freedesktop.org/archives/dri-devel/2017-March/137094.html
- https://lists.freedesktop.org/archives/dri-devel/2017-March/137094.html
Package kernel-image-un-def updated to version 4.10.10-alt1 for branch sisyphus in task 181669.
Closed vulnerabilities
BDU:2017-01466
Уязвимость функции vmw_surface_define_ioctl операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии
Modified: 2024-11-21
CVE-2017-7294
The vmw_surface_define_ioctl function in drivers/gpu/drm/vmwgfx/vmwgfx_surface.c in the Linux kernel through 4.10.6 does not validate addition of certain levels data, which allows local users to trigger an integer overflow and out-of-bounds write, and cause a denial of service (system hang or crash) or possibly gain privileges, via a crafted ioctl call for a /dev/dri/renderD* device.
- 97177
- 97177
- RHSA-2018:0676
- RHSA-2018:0676
- RHSA-2018:1062
- RHSA-2018:1062
- https://bugzilla.redhat.com/show_bug.cgi?id=1436798
- https://bugzilla.redhat.com/show_bug.cgi?id=1436798
- https://lists.freedesktop.org/archives/dri-devel/2017-March/137094.html
- https://lists.freedesktop.org/archives/dri-devel/2017-March/137094.html
Modified: 2024-11-21
CVE-2017-7616
Incorrect error handling in the set_mempolicy and mbind compat syscalls in mm/mempolicy.c in the Linux kernel through 4.10.9 allows local users to obtain sensitive information from uninitialized stack data by triggering failure of a certain bitmap operation.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cf01fb9985e8deb25ccf0ea54d916b8871ae0e62
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cf01fb9985e8deb25ccf0ea54d916b8871ae0e62
- 97527
- 97527
- 1038503
- 1038503
- RHSA-2017:1842
- RHSA-2017:1842
- RHSA-2017:2077
- RHSA-2017:2077
- RHSA-2018:1854
- RHSA-2018:1854
- https://github.com/torvalds/linux/commit/cf01fb9985e8deb25ccf0ea54d916b8871ae0e62
- https://github.com/torvalds/linux/commit/cf01fb9985e8deb25ccf0ea54d916b8871ae0e62
- https://source.android.com/security/bulletin/2017-09-01
- https://source.android.com/security/bulletin/2017-09-01
Modified: 2024-11-21
CVE-2017-9150
The do_check function in kernel/bpf/verifier.c in the Linux kernel before 4.11.1 does not make the allow_ptr_leaks value available for restricting the output of the print_bpf_insn function, which allows local users to obtain sensitive address information via crafted bpf system calls.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0d0e57697f162da4aa218b5feafe614fb666db07
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=0d0e57697f162da4aa218b5feafe614fb666db07
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.11.1
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.11.1
- 98635
- 98635
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1251
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1251
- https://github.com/torvalds/linux/commit/0d0e57697f162da4aa218b5feafe614fb666db07
- https://github.com/torvalds/linux/commit/0d0e57697f162da4aa218b5feafe614fb666db07
- https://source.android.com/security/bulletin/2017-09-01
- https://source.android.com/security/bulletin/2017-09-01
- 42048
- 42048