ALT-BU-2017-3089-5
Branch sisyphus update bulletin.
Package libvirglrenderer updated to version 0.6.0-alt1.S1 for branch sisyphus in task 182296.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2016-10163
Memory leak in the vrend_renderer_context_create_internal function in vrend_decode.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (host memory consumption) by repeatedly creating a decode context.
- [oss-security] 20170124 CVE request Virglrenderer: host memory leakage when creating decode context
- [oss-security] 20170124 CVE request Virglrenderer: host memory leakage when creating decode context
- [oss-security] 20170125 Re: CVE request Virglrenderer: host memory leakage when creating decode context
- [oss-security] 20170125 Re: CVE request Virglrenderer: host memory leakage when creating decode context
- 95784
- 95784
- https://cgit.freedesktop.org/virglrenderer/commit/?id=747a293ff6055203e529f083896b823e22523fe7
- https://cgit.freedesktop.org/virglrenderer/commit/?id=747a293ff6055203e529f083896b823e22523fe7
- [virglrenderer-devel] 20170210 [ANNOUNCE] virglrenderer 0.6.0
- [virglrenderer-devel] 20170210 [ANNOUNCE] virglrenderer 0.6.0
- GLSA-201707-06
- GLSA-201707-06
Modified: 2024-11-21
CVE-2016-10214
Memory leak in the virgl_resource_attach_backing function in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (memory consumption) via a large number of VIRTIO_GPU_CMD_RESOURCE_ATTACH_BACKING commands.
- [oss-security] 20170208 Re: CVE request virglrenderer: host memory leak issue in virgl_resource_attach_backing
- [oss-security] 20170208 Re: CVE request virglrenderer: host memory leak issue in virgl_resource_attach_backing
- 96181
- 96181
- https://cgit.freedesktop.org/virglrenderer/commit/?id=40b0e7813325b08077b6f541b3989edb2d86d837
- https://cgit.freedesktop.org/virglrenderer/commit/?id=40b0e7813325b08077b6f541b3989edb2d86d837
- [virglrenderer-devel] 20170210 [ANNOUNCE] virglrenderer 0.6.0
- [virglrenderer-devel] 20170210 [ANNOUNCE] virglrenderer 0.6.0
- GLSA-201707-06
- GLSA-201707-06
Modified: 2024-11-21
CVE-2017-5580
The parse_instruction function in gallium/auxiliary/tgsi/tgsi_text.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (out-of-bounds array access and process crash) via a crafted texture instruction.
- [oss-security] 20170124 CVE request Virglrenderer: OOB access while parsing texture instruction
- [oss-security] 20170124 CVE request Virglrenderer: OOB access while parsing texture instruction
- [oss-security] 20170125 Re: CVE request Virglrenderer: OOB access while parsing texture instruction
- [oss-security] 20170125 Re: CVE request Virglrenderer: OOB access while parsing texture instruction
- 95782
- 95782
- https://cgit.freedesktop.org/virglrenderer/commit/src/gallium/auxiliary/tgsi/tgsi_text.c?id=28894a30a17a84529be102b21118e55d6c9f23fa
- https://cgit.freedesktop.org/virglrenderer/commit/src/gallium/auxiliary/tgsi/tgsi_text.c?id=28894a30a17a84529be102b21118e55d6c9f23fa
- [virglrenderer-devel] 20170210 [ANNOUNCE] virglrenderer 0.6.0
- [virglrenderer-devel] 20170210 [ANNOUNCE] virglrenderer 0.6.0
- GLSA-201707-06
- GLSA-201707-06
Modified: 2024-11-21
CVE-2017-5937
The util_format_is_pure_uint function in vrend_renderer.c in Virgil 3d project (aka virglrenderer) 0.6.0 and earlier allows local guest OS users to cause a denial of service (NULL pointer dereference) via a crafted VIRGL_CCMD_CLEAR command.
- [oss-security] 20170208 Re: CVE request virglrenderer: null pointer dereference in vrend_clear
- [oss-security] 20170208 Re: CVE request virglrenderer: null pointer dereference in vrend_clear
- 96180
- 96180
- https://bugzilla.redhat.com/show_bug.cgi?id=1420246
- https://bugzilla.redhat.com/show_bug.cgi?id=1420246
- https://cgit.freedesktop.org/virglrenderer/commit/?id=48f67f60967f963b698ec8df57ec6912a43d6282
- https://cgit.freedesktop.org/virglrenderer/commit/?id=48f67f60967f963b698ec8df57ec6912a43d6282
Modified: 2024-11-21
CVE-2017-5956
The vrend_draw_vbo function in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (out-of-bounds array access and QEMU process crash) via vectors involving vertext_buffer_index.
- [oss-security] 20170213 CVE-2017-5956 virglrenderer: Virglrenderer: OOB access while in vrend_draw_vbo
- [oss-security] 20170213 CVE-2017-5956 virglrenderer: Virglrenderer: OOB access while in vrend_draw_vbo
- 96187
- 96187
- https://cgit.freedesktop.org/virglrenderer/commit/?id=a5ac49940c40ae415eac0cf912eac7070b4ba95d
- https://cgit.freedesktop.org/virglrenderer/commit/?id=a5ac49940c40ae415eac0cf912eac7070b4ba95d
- [virglrenderer-devel] 20170210 [ANNOUNCE] virglrenderer 0.6.0
- [virglrenderer-devel] 20170210 [ANNOUNCE] virglrenderer 0.6.0
- GLSA-201707-06
- GLSA-201707-06
Modified: 2024-11-21
CVE-2017-5993
Memory leak in the vrend_renderer_init_blit_ctx function in vrend_blitter.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (host memory consumption) via a large number of VIRGL_CCMD_BLIT commands.
- [oss-security] 20170215 CVE-2017-5993 Virglrenderer: host memory leakage when initialising blitter context
- [oss-security] 20170215 CVE-2017-5993 Virglrenderer: host memory leakage when initialising blitter context
- 96275
- 96275
- https://bugzilla.redhat.com/show_bug.cgi?id=1422438
- https://bugzilla.redhat.com/show_bug.cgi?id=1422438
- https://cgit.freedesktop.org/virglrenderer/commit/?id=6eb13f7a2dcf391ec9e19b4c2a79e68305f63c22
- https://cgit.freedesktop.org/virglrenderer/commit/?id=6eb13f7a2dcf391ec9e19b4c2a79e68305f63c22
- [virglrenderer-devel] 20170210 [ANNOUNCE] virglrenderer 0.6.0
- [virglrenderer-devel] 20170210 [ANNOUNCE] virglrenderer 0.6.0
- GLSA-201707-06
- GLSA-201707-06
Modified: 2024-11-21
CVE-2017-5994
Heap-based buffer overflow in the vrend_create_vertex_elements_state function in vrend_renderer.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (out-of-bounds array access and crash) via the num_elements parameter.
- [oss-security] 20170215 CVE-2017-5994 Virglrenderer: out-of-bounds access in vrend_create_vertex_elements_state
- [oss-security] 20170215 CVE-2017-5994 Virglrenderer: out-of-bounds access in vrend_create_vertex_elements_state
- 96276
- 96276
- https://bugzilla.redhat.com/show_bug.cgi?id=1422452
- https://bugzilla.redhat.com/show_bug.cgi?id=1422452
- https://cgit.freedesktop.org/virglrenderer/commit/?id=114688c526fe45f341d75ccd1d85473c3b08f7a7
- https://cgit.freedesktop.org/virglrenderer/commit/?id=114688c526fe45f341d75ccd1d85473c3b08f7a7
- [virglrenderer-devel] 20170210 [ANNOUNCE] virglrenderer 0.6.0
- [virglrenderer-devel] 20170210 [ANNOUNCE] virglrenderer 0.6.0
- GLSA-201707-06
- GLSA-201707-06
Modified: 2024-11-21
CVE-2017-6209
Stack-based buffer overflow in the parse_identifier function in tgsi_text.c in the TGSI auxiliary module in the Gallium driver in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (out-of-bounds array access and QEMU process crash) via vectors related to parsing properties.
- [oss-security] 20170224 CVE-2017-6209 Virglrenderer: stack buffer oveflow in parse_identifier
- [oss-security] 20170224 CVE-2017-6209 Virglrenderer: stack buffer oveflow in parse_identifier
- 96437
- 96437
- https://bugzilla.redhat.com/show_bug.cgi?id=1426149
- https://bugzilla.redhat.com/show_bug.cgi?id=1426149
- https://cgit.freedesktop.org/virglrenderer/commit/?id=e534b51ca3c3cd25f3990589932a9ed711c59b27
- https://cgit.freedesktop.org/virglrenderer/commit/?id=e534b51ca3c3cd25f3990589932a9ed711c59b27
- [virglrenderer-devel] 20170210 [ANNOUNCE] virglrenderer 0.6.0
- [virglrenderer-devel] 20170210 [ANNOUNCE] virglrenderer 0.6.0
- GLSA-201707-06
- GLSA-201707-06
Modified: 2024-11-21
CVE-2017-6210
The vrend_decode_reset function in vrend_decode.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (NULL pointer dereference and QEMU process crash) by destroying context 0 (zero).
- [oss-security] 20170224 CVE-2017-6210 Virglrenderer: null pointer dereference in vrend_decode_reset
- [oss-security] 20170224 CVE-2017-6210 Virglrenderer: null pointer dereference in vrend_decode_reset
- 96439
- 96439
- https://bugzilla.redhat.com/show_bug.cgi?id=1426170
- https://bugzilla.redhat.com/show_bug.cgi?id=1426170
- https://cgit.freedesktop.org/virglrenderer/commit/?id=0a5dff15912207b83018485f83e067474e818bab
- https://cgit.freedesktop.org/virglrenderer/commit/?id=0a5dff15912207b83018485f83e067474e818bab
- [virglrenderer-devel] 20170210 [ANNOUNCE] virglrenderer 0.6.0
- [virglrenderer-devel] 20170210 [ANNOUNCE] virglrenderer 0.6.0
- GLSA-201707-06
- GLSA-201707-06
Modified: 2024-11-21
CVE-2017-6317
Memory leak in the add_shader_program function in vrend_renderer.c in virglrenderer before 0.6.0 allows local guest OS users to cause a denial of service (host memory consumption) via vectors involving the sprog variable.
- [oss-security] 20170225 CVE-2017-6317 Virglrenderer: memory leakage issue in add_shader_program
- [oss-security] 20170225 CVE-2017-6317 Virglrenderer: memory leakage issue in add_shader_program
- 96450
- 96450
- https://bugzilla.redhat.com/show_bug.cgi?id=1426756
- https://bugzilla.redhat.com/show_bug.cgi?id=1426756
- https://cgit.freedesktop.org/virglrenderer/commit/?id=a2f12a1b0f95b13b6f8dc3d05d7b74b4386394e4
- https://cgit.freedesktop.org/virglrenderer/commit/?id=a2f12a1b0f95b13b6f8dc3d05d7b74b4386394e4
- [virglrenderer-devel] 20170210 [ANNOUNCE] virglrenderer 0.6.0
- [virglrenderer-devel] 20170210 [ANNOUNCE] virglrenderer 0.6.0
- GLSA-201707-06
- GLSA-201707-06
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-0490
An issue was discovered in Tor before 0.2.9.15, 0.3.1.x before 0.3.1.10, and 0.3.2.x before 0.3.2.10. The directory-authority protocol-list subprotocol implementation allows remote attackers to cause a denial of service (NULL pointer dereference and directory-authority crash) via a misformatted relay descriptor that is mishandled during voting.
- https://blog.torproject.org/new-stable-tor-releases-security-fixes-and-dos-prevention-03210-03110-02915
- https://blog.torproject.org/new-stable-tor-releases-security-fixes-and-dos-prevention-03210-03110-02915
- https://trac.torproject.org/projects/tor/ticket/25074
- https://trac.torproject.org/projects/tor/ticket/25074
- DSA-4183
- DSA-4183
Closed vulnerabilities
BDU:2023-01643
Уязвимость языка программирования PHP, связанная с недостаточной проверкой поступающих запросов, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность
Modified: 2024-11-21
CVE-2017-7272
PHP through 7.1.11 enables potential SSRF in applications that accept an fsockopen or pfsockopen hostname argument with an expectation that the port number is constrained. Because a :port syntax is recognized, fsockopen will use the port number that is specified in the hostname argument, instead of the port number in the second argument of the function.
- 97178
- 97178
- 1038158
- 1038158
- https://bugs.php.net/bug.php?id=74216
- https://bugs.php.net/bug.php?id=74216
- https://bugs.php.net/bug.php?id=75505
- https://bugs.php.net/bug.php?id=75505
- https://github.com/php/php-src/commit/bab0b99f376dac9170ac81382a5ed526938d595a
- https://github.com/php/php-src/commit/bab0b99f376dac9170ac81382a5ed526938d595a
- https://security.netapp.com/advisory/ntap-20180112-0001/
- https://security.netapp.com/advisory/ntap-20180112-0001/
- https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20170403-0_PHP_Misbehavior_of_fsockopen_function_v10.txt
- https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20170403-0_PHP_Misbehavior_of_fsockopen_function_v10.txt