ALT-BU-2017-3146-1
Branch sisyphus update bulletin.
Package libxmlsec1 updated to version 1.2.24-alt1 for branch sisyphus in task 183371.
Closed vulnerabilities
BDU:2021-02624
Уязвимость криптобиблиотеки xmlsec, связанная с неверным ограничением XML-ссылок на внешние объекты, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации
Modified: 2025-04-20
CVE-2017-1000061
xmlsec 1.2.23 and before is vulnerable to XML External Entity Expansion when parsing crafted input documents, resulting in possible information disclosure or denial of service
- https://access.redhat.com/errata/RHSA-2017:2492
- https://github.com/lsh123/xmlsec/issues/43
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3PWHBRWXR3RNPHDSTQI6UWDG5ETOQ7VR/
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://access.redhat.com/errata/RHSA-2017:2492
- https://github.com/lsh123/xmlsec/issues/43
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/3PWHBRWXR3RNPHDSTQI6UWDG5ETOQ7VR/
- https://www.oracle.com/security-alerts/cpuApr2021.html
Package libgraphite2 updated to version 1.3.10-alt1 for branch sisyphus in task 183513.
Closed vulnerabilities
Modified: 2021-03-23
BDU:2019-00228
Уязвимость функции lz4::decompress библиотеки Graphite 2 браузеров Mozilla Firefox и Mozilla Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
Modified: 2021-03-23
BDU:2019-00229
Уязвимость graphite2::Silf::readGraphite библиотеки Graphite 2 браузеров Mozilla Firefox и Mozilla Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
Modified: 2021-07-01
BDU:2019-00230
Уязвимость функции lz4::decompress библиотеки Graphite 2 браузеров Mozilla Firefox и Mozilla Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
Modified: 2024-11-21
CVE-2017-7771
Out-of-bounds read in Graphite2 Library in Firefox before 54 in graphite2::Pass::readPass function.
Modified: 2024-11-21
CVE-2017-7772
Heap-based Buffer Overflow in Graphite2 library in Firefox before 54 in lz4::decompress function.
Modified: 2024-11-21
CVE-2017-7773
Heap-based Buffer Overflow write in Graphite2 library in Firefox before 54 in lz4::decompress src/Decompressor.
Modified: 2024-11-21
CVE-2017-7774
Out-of-bounds read in Graphite2 Library in Firefox before 54 in graphite2::Silf::readGraphite function.
Modified: 2024-11-21
CVE-2017-7776
Heap-based Buffer Overflow read in Graphite2 library in Firefox before 54 in graphite2::Silf::getClassGlyph.
Modified: 2024-11-21
CVE-2017-7777
Use of uninitialized memory in Graphite2 library in Firefox before 54 in graphite2::GlyphCache::Loader::read_glyph function.
Modified: 2025-11-25
CVE-2017-7778
A number of security vulnerabilities in the Graphite 2 library including out-of-bounds reads, buffer overflow reads and writes, and the use of uninitialized memory. These issues were addressed in Graphite 2 version 1.3.10. This vulnerability affects Firefox < 54, Firefox ESR < 52.2, and Thunderbird < 52.2.
- http://www.securityfocus.com/bid/99057
- http://www.securitytracker.com/id/1038689
- https://access.redhat.com/errata/RHSA-2017:1440
- https://access.redhat.com/errata/RHSA-2017:1561
- https://access.redhat.com/errata/RHSA-2017:1793
- https://bugzilla.mozilla.org/show_bug.cgi?id=1349310
- https://bugzilla.mozilla.org/show_bug.cgi?id=1350047
- https://bugzilla.mozilla.org/show_bug.cgi?id=1352745
- https://bugzilla.mozilla.org/show_bug.cgi?id=1352747
- https://bugzilla.mozilla.org/show_bug.cgi?id=1355174
- https://bugzilla.mozilla.org/show_bug.cgi?id=1355182
- https://bugzilla.mozilla.org/show_bug.cgi?id=1356607
- https://bugzilla.mozilla.org/show_bug.cgi?id=1358551
- https://security.gentoo.org/glsa/201710-13
- https://www.debian.org/security/2017/dsa-3881
- https://www.debian.org/security/2017/dsa-3894
- https://www.debian.org/security/2017/dsa-3918
- https://www.mozilla.org/security/advisories/mfsa2017-15/
- https://www.mozilla.org/security/advisories/mfsa2017-16/
- https://www.mozilla.org/security/advisories/mfsa2017-17/
- http://www.securityfocus.com/bid/99057
- http://www.securitytracker.com/id/1038689
- https://access.redhat.com/errata/RHSA-2017:1440
- https://access.redhat.com/errata/RHSA-2017:1561
- https://access.redhat.com/errata/RHSA-2017:1793
- https://bugzilla.mozilla.org/show_bug.cgi?id=1349310
- https://bugzilla.mozilla.org/show_bug.cgi?id=1350047
- https://bugzilla.mozilla.org/show_bug.cgi?id=1352745
- https://bugzilla.mozilla.org/show_bug.cgi?id=1352747
- https://bugzilla.mozilla.org/show_bug.cgi?id=1355174
- https://bugzilla.mozilla.org/show_bug.cgi?id=1355182
- https://bugzilla.mozilla.org/show_bug.cgi?id=1356607
- https://bugzilla.mozilla.org/show_bug.cgi?id=1358551
- https://security.gentoo.org/glsa/201710-13
- https://www.debian.org/security/2017/dsa-3881
- https://www.debian.org/security/2017/dsa-3894
- https://www.debian.org/security/2017/dsa-3918
- https://www.mozilla.org/security/advisories/mfsa2017-15/
- https://www.mozilla.org/security/advisories/mfsa2017-16/
- https://www.mozilla.org/security/advisories/mfsa2017-17/
Closed vulnerabilities
Modified: 2025-04-20
CVE-2017-9078
The server in Dropbear before 2017.75 might allow post-authentication root remote code execution because of a double free in cleanup of TCP listeners when the -a option is enabled.
- http://lists.ucc.gu.uwa.edu.au/pipermail/dropbear/2017q2/001985.html
- http://www.debian.org/security/2017/dsa-3859
- https://security.netapp.com/advisory/ntap-20191004-0006/
- http://lists.ucc.gu.uwa.edu.au/pipermail/dropbear/2017q2/001985.html
- http://www.debian.org/security/2017/dsa-3859
- https://security.netapp.com/advisory/ntap-20191004-0006/
Modified: 2025-04-20
CVE-2017-9079
Dropbear before 2017.75 might allow local users to read certain files as root, if the file has the authorized_keys file format with a command= option. This occurs because ~/.ssh/authorized_keys is read with root privileges and symlinks are followed.
- http://lists.ucc.gu.uwa.edu.au/pipermail/dropbear/2017q2/001985.html
- http://www.debian.org/security/2017/dsa-3859
- https://security.netapp.com/advisory/ntap-20191004-0006/
- http://lists.ucc.gu.uwa.edu.au/pipermail/dropbear/2017q2/001985.html
- http://www.debian.org/security/2017/dsa-3859
- https://security.netapp.com/advisory/ntap-20191004-0006/