ALT-BU-2017-3150-1
Branch p8 update bulletin.
Closed vulnerabilities
BDU:2017-01283
Уязвимость функции get_process_ttyname программы системного администрирования Sudo может позволить нарушителю повысить привилегии до уровня суперпользователя и выполнить произвольный код
Modified: 2024-11-21
CVE-2017-1000367
Todd Miller's sudo version 1.8.20 and earlier is vulnerable to an input validation (embedded spaces) in the get_process_ttyname() function resulting in information disclosure and command execution.
- SUSE-SU-2017:1446
- SUSE-SU-2017:1446
- SUSE-SU-2017:1450
- SUSE-SU-2017:1450
- openSUSE-SU-2017:1455
- openSUSE-SU-2017:1455
- http://packetstormsecurity.com/files/142783/Sudo-get_process_ttyname-Race-Condition.html
- http://packetstormsecurity.com/files/142783/Sudo-get_process_ttyname-Race-Condition.html
- 20170602 Qualys Security Advisory - CVE-2017-1000367 in Sudo's get_process_ttyname() for Linux
- 20170602 Qualys Security Advisory - CVE-2017-1000367 in Sudo's get_process_ttyname() for Linux
- DSA-3867
- DSA-3867
- [oss-security] 20170530 Qualys Security Advisory - CVE-2017-1000367 in Sudo's get_process_ttyname() for Linux
- [oss-security] 20170530 Qualys Security Advisory - CVE-2017-1000367 in Sudo's get_process_ttyname() for Linux
- [oss-security] 20221222 Re: [Linux] /proc/pid/stat parsing bugs
- [oss-security] 20221222 Re: [Linux] /proc/pid/stat parsing bugs
- [oss-security] 20221222 Re: [Linux] /proc/pid/stat parsing bugs
- [oss-security] 20221222 Re: [Linux] /proc/pid/stat parsing bugs
- 98745
- 98745
- 1038582
- 1038582
- USN-3304-1
- USN-3304-1
- RHSA-2017:1381
- RHSA-2017:1381
- RHSA-2017:1382
- RHSA-2017:1382
- FEDORA-2017-54580efa82
- FEDORA-2017-54580efa82
- GLSA-201705-15
- GLSA-201705-15
- 42183
- 42183
- https://www.sudo.ws/alerts/linux_tty.html
- https://www.sudo.ws/alerts/linux_tty.html
Package 389-ds-base updated to version 1.3.7.0-alt0.M80P.1 for branch p8 in task 183653.
Closed vulnerabilities
BDU:2020-02901
Уязвимость службы каталогов уровня предприятия 389 Directory Server, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2017-15134
A stack buffer overflow flaw was found in the way 389-ds-base 1.3.6.x before 1.3.6.13, 1.3.7.x before 1.3.7.9, 1.4.x before 1.4.0.5 handled certain LDAP search filters. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.
- openSUSE-SU-2019:1397
- openSUSE-SU-2019:1397
- 102790
- 102790
- RHSA-2018:0163
- RHSA-2018:0163
- https://bugzilla.redhat.com/show_bug.cgi?id=1531573
- https://bugzilla.redhat.com/show_bug.cgi?id=1531573
- [debian-lts-announce] 20180715 [SECURITY] [DLA 1428-1] 389-ds-base security update
- [debian-lts-announce] 20180715 [SECURITY] [DLA 1428-1] 389-ds-base security update
- https://pagure.io/389-ds-base/c/6aa2acdc3cad9
- https://pagure.io/389-ds-base/c/6aa2acdc3cad9
Modified: 2024-11-21
CVE-2017-2668
389-ds-base before versions 1.3.5.17 and 1.3.6.10 is vulnerable to an invalid pointer dereference in the way LDAP bind requests are handled. A remote unauthenticated attacker could use this flaw to make ns-slapd crash via a specially crafted LDAP bind request, resulting in denial of service.
Modified: 2024-11-21
CVE-2018-1089
389-ds-base before versions 1.4.0.9, 1.3.8.1, 1.3.6.15 did not properly handle long search filters with characters needing escapes, possibly leading to buffer overflows. A remote, unauthenticated attacker could potentially use this flaw to make ns-slapd crash via a specially crafted LDAP request, thus resulting in denial of service.
- 104137
- 104137
- RHSA-2018:1364
- RHSA-2018:1364
- RHSA-2018:1380
- RHSA-2018:1380
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1089
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1089
- [debian-lts-announce] 20180715 [SECURITY] [DLA 1428-1] 389-ds-base security update
- [debian-lts-announce] 20180715 [SECURITY] [DLA 1428-1] 389-ds-base security update
Closed bugs
Паразитарная вставка в agent_trap.h и snmp_agent.h
Команды start-dirsrv и stop-dirsrv вызывают /usr/bin/systemctl, а у нас /bin/systemctl