ALT-BU-2017-3069-1
Branch sisyphus update bulletin.
Package nvidia_glx_src_375.39 updated to version 375.39-alt169 for branch sisyphus in task 181884.
Closed bugs
Запаковать nvidia_icd.json для работы Vulkan API
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-8422
KDE kdelibs before 4.14.32 and KAuth before 5.34 allow local users to gain root privileges by spoofing a callerID and leveraging a privileged helper app.
- DSA-3849
- DSA-3849
- [oss-security] 20170510 generic kde LPE
- [oss-security] 20170510 generic kde LPE
- 98412
- 98412
- 1038480
- 1038480
- RHSA-2017:1264
- RHSA-2017:1264
- https://bugzilla.redhat.com/show_bug.cgi?id=1449647
- https://bugzilla.redhat.com/show_bug.cgi?id=1449647
- https://cgit.kde.org/kauth.git/commit/?id=df875f725293af53399f5146362eb158b4f9216a
- https://cgit.kde.org/kauth.git/commit/?id=df875f725293af53399f5146362eb158b4f9216a
- https://cgit.kde.org/kdelibs.git/commit/?id=264e97625abe2e0334f97de17f6ffb52582888ab
- https://cgit.kde.org/kdelibs.git/commit/?id=264e97625abe2e0334f97de17f6ffb52582888ab
- GLSA-201706-29
- GLSA-201706-29
- 42053
- 42053
- https://www.kde.org/info/security/advisory-20170510-1.txt
- https://www.kde.org/info/security/advisory-20170510-1.txt
Closed vulnerabilities
Modified: 2024-11-21
CVE-2016-5419
curl and libcurl before 7.50.1 do not prevent TLS session resumption when the client certificate has changed, which allows remote attackers to bypass intended restrictions by resuming a session.
- openSUSE-SU-2016:2227
- openSUSE-SU-2016:2227
- openSUSE-SU-2016:2379
- openSUSE-SU-2016:2379
- RHSA-2016:2575
- RHSA-2016:2575
- RHSA-2016:2957
- RHSA-2016:2957
- DSA-3638
- DSA-3638
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- 92292
- 92292
- 92319
- 92319
- 1036538
- 1036538
- 1038341
- 1038341
- SSA:2016-219-01
- SSA:2016-219-01
- USN-3048-1
- USN-3048-1
- RHSA-2018:3558
- RHSA-2018:3558
- https://curl.haxx.se/docs/adv_20160803A.html
- https://curl.haxx.se/docs/adv_20160803A.html
- FEDORA-2016-24316f1f56
- FEDORA-2016-24316f1f56
- FEDORA-2016-8354baae0f
- FEDORA-2016-8354baae0f
- GLSA-201701-47
- GLSA-201701-47
- https://source.android.com/security/bulletin/2016-12-01.html
- https://source.android.com/security/bulletin/2016-12-01.html
- https://www.tenable.com/security/tns-2016-18
- https://www.tenable.com/security/tns-2016-18
Modified: 2024-11-21
CVE-2017-7407
The ourWriteOut function in tool_writeout.c in curl 7.53.1 might allow physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which leads to a heap-based buffer over-read.
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- RHSA-2018:3558
- RHSA-2018:3558
- https://github.com/curl/curl/commit/1890d59905414ab84a35892b2e45833654aa5c13
- https://github.com/curl/curl/commit/1890d59905414ab84a35892b2e45833654aa5c13
- GLSA-201709-14
- GLSA-201709-14
Modified: 2024-11-21
CVE-2017-7468
In curl and libcurl 7.52.0 to and including 7.53.1, libcurl would attempt to resume a TLS session even if the client certificate had changed. That is unacceptable since a server by specification is allowed to skip the client certificate check on resume, and may instead use the old identity which was established by the previous certificate (or no certificate). libcurl supports by default the use of TLS session id/ticket to resume previous TLS sessions to speed up subsequent TLS handshakes. They are used when for any reason an existing TLS connection couldn't be kept alive to make the next handshake faster. This flaw is a regression and identical to CVE-2016-5419 reported on August 3rd 2016, but affecting a different version range.
Package make-initrd updated to version 2.0.4-alt1 for branch sisyphus in task 181917.
Closed bugs
шум при загрузке
Package make-initrd updated to version 2.0.4-alt2 for branch sisyphus in task 181955.
Closed bugs
ШУМ при загрузке
Package adobe-flash-player-ppapi updated to version 25-alt2.S1 for branch sisyphus in task 181926.
Closed vulnerabilities
BDU:2017-00964
Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2017-00965
Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2017-00966
Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2017-00967
Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2017-00968
Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2017-00974
Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2017-00975
Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2017-3058
Adobe Flash Player versions 25.0.0.127 and earlier have an exploitable use after free vulnerability in the sound class. Successful exploitation could lead to arbitrary code execution.
Modified: 2024-11-21
CVE-2017-3059
Adobe Flash Player versions 25.0.0.127 and earlier have an exploitable use after free vulnerability in the internal script object. Successful exploitation could lead to arbitrary code execution.
Modified: 2024-11-21
CVE-2017-3060
Adobe Flash Player versions 25.0.0.127 and earlier have an exploitable memory corruption vulnerability in the ActionScript2 code parser. Successful exploitation could lead to arbitrary code execution.
Modified: 2024-11-21
CVE-2017-3061
Adobe Flash Player versions 25.0.0.127 and earlier have an exploitable memory corruption vulnerability in the SWF parser. Successful exploitation could lead to arbitrary code execution.
Modified: 2024-11-21
CVE-2017-3062
Adobe Flash Player versions 25.0.0.127 and earlier have an exploitable use after free vulnerability in ActionScript2 when creating a getter/setter property. Successful exploitation could lead to arbitrary code execution.
Modified: 2024-11-21
CVE-2017-3063
Adobe Flash Player versions 25.0.0.127 and earlier have an exploitable use after free vulnerability in the ActionScript2 NetStream class. Successful exploitation could lead to arbitrary code execution.
Modified: 2024-11-21
CVE-2017-3064
Adobe Flash Player versions 25.0.0.127 and earlier have an exploitable memory corruption vulnerability when parsing a shape outline. Successful exploitation could lead to arbitrary code execution.