ALT-BU-2017-3233-1
Branch p8 update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-9772
Insufficient sanitisation in the OCaml compiler versions 4.04.0 and 4.04.1 allows external code to be executed with raised privilege in binaries marked as setuid, by setting the CAML_CPLUGINS, CAML_NATIVE_CPLUGINS, or CAML_BYTE_CPLUGINS environment variable.
Modified: 2024-11-21
CVE-2017-9779
OCaml compiler allows attackers to have unspecified impact via unknown vectors, a similar issue to CVE-2017-9772 "but with much less impact."
Package qt5-x11extras updated to version 5.7.1-alt2.M80P.1 for branch p8 in task 184887.
Closed bugs
Клиент Mail.ru Cloud требует qt5-x11extras
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-7529
Nginx versions since 0.5.6 up to and including 1.13.2 are vulnerable to integer overflow vulnerability in nginx range filter module resulting into leak of potentially sensitive information triggered by specially crafted request.
- [nginx-announce] 20170711 nginx security advisory (CVE-2017-7529)
- [nginx-announce] 20170711 nginx security advisory (CVE-2017-7529)
- 20210921 APPLE-SA-2021-09-20-4 Xcode 13
- 20210921 APPLE-SA-2021-09-20-4 Xcode 13
- 99534
- 99534
- 1039238
- 1039238
- RHSA-2017:2538
- RHSA-2017:2538
- https://puppet.com/security/cve/cve-2017-7529
- https://puppet.com/security/cve/cve-2017-7529
- https://support.apple.com/kb/HT212818
- https://support.apple.com/kb/HT212818
Closed vulnerabilities
BDU:2017-01838
Уязвимость библиотеки Oniguruma, связанная с использованием неинициализированной переменной и позволяющая вызвать повреждение памяти
BDU:2017-01839
Уязвимость библиотеки Oniguruma, связанная с использованием неинициализированной переменной и позволяющая вызвать повреждение памяти
BDU:2017-01840
Уязвимость библиотеки Oniguruma, связанная с использованием неинициализированной переменной и позволяющая нарушителю осуществить чтение за границами буфера в динамической памяти
BDU:2017-01841
Уязвимость библиотеки Oniguruma, связанная с некорректной обработкой чисел и позволяющая нарушителю вызвать повреждение памяти
BDU:2017-01842
Уязвимость библиотеки Oniguruma, связанная с записью за границами буфера на стеке и позволяющая нарушителю вызвать отказ в обслуживании
BDU:2017-01843
Уязвимость библиотеки Oniguruma, позволяющая нарушителю оказать влияние на доступность информации
Modified: 2024-11-21
CVE-2017-9224
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in match_at() during regular expression searching. A logical error involving order of validation and access in match_at() could result in an out-of-bounds read from a stack buffer.
Modified: 2024-11-21
CVE-2017-9225
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds write in onigenc_unicode_get_case_fold_codes_by_str() occurs during regular expression compilation. Code point 0xFFFFFFFF is not properly handled in unicode_unfold_key(). A malformed regular expression could result in 4 bytes being written off the end of a stack buffer of expand_case_fold_string() during the call to onigenc_unicode_get_case_fold_codes_by_str(), a typical stack buffer overflow.
Modified: 2024-11-21
CVE-2017-9226
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write or read occurs in next_state_val() during regular expression compilation. Octal numbers larger than 0xff are not handled correctly in fetch_token() and fetch_token_in_cc(). A malformed regular expression containing an octal number in the form of '\700' would produce an invalid code point value larger than 0xff in next_state_val(), resulting in an out-of-bounds write memory corruption.
- 101244
- 101244
- RHSA-2018:1296
- RHSA-2018:1296
- https://github.com/kkos/oniguruma/commit/b4bf968ad52afe14e60a2dc8a95d3555c543353a
- https://github.com/kkos/oniguruma/commit/b4bf968ad52afe14e60a2dc8a95d3555c543353a
- https://github.com/kkos/oniguruma/commit/f015fbdd95f76438cd86366467bb2b39870dd7c6
- https://github.com/kkos/oniguruma/commit/f015fbdd95f76438cd86366467bb2b39870dd7c6
- https://github.com/kkos/oniguruma/issues/55
- https://github.com/kkos/oniguruma/issues/55
Modified: 2024-11-21
CVE-2017-9227
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A stack out-of-bounds read occurs in mbc_enc_len() during regular expression searching. Invalid handling of reg->dmin in forward_search_range() could result in an invalid pointer dereference, as an out-of-bounds read from a stack buffer.
Modified: 2024-11-21
CVE-2017-9228
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A heap out-of-bounds write occurs in bitset_set_range() during regular expression compilation due to an uninitialized variable from an incorrect state transition. An incorrect state transition in parse_char_class() could create an execution path that leaves a critical local variable uninitialized until it's used as an index, resulting in an out-of-bounds write memory corruption.
Modified: 2024-11-21
CVE-2017-9229
An issue was discovered in Oniguruma 6.2.0, as used in Oniguruma-mod in Ruby through 2.4.1 and mbstring in PHP through 7.1.5. A SIGSEGV occurs in left_adjust_char_head() during regular expression compilation. Invalid handling of reg->dmax in forward_search_range() could result in an invalid pointer dereference, normally as an immediate denial-of-service condition.
Closed vulnerabilities
BDU:2021-01424
Уязвимость функции _krb5_extract_ticket() пакета программ сетевого взаимодействия Samba, связанная с недостатком механизма проверки подлинности данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2017-11103
Heimdal before 7.4 allows remote attackers to impersonate services with Orpheus' Lyre attacks because it obtains service-principal names in a way that violates the Kerberos 5 protocol specification. In _krb5_extract_ticket() the KDC-REP service name must be obtained from the encrypted version stored in 'enc_part' instead of the unencrypted version stored in 'ticket'. Use of the unencrypted version provides an opportunity for successful server impersonation and other attacks. NOTE: this CVE is only for Heimdal and other products that embed Heimdal code; it does not apply to other instances in which this part of the Kerberos 5 protocol specification is violated.
- DSA-3912
- DSA-3912
- http://www.h5l.org/advisories.html?show=2017-07-11
- http://www.h5l.org/advisories.html?show=2017-07-11
- 99551
- 99551
- 1038876
- 1038876
- 1039427
- 1039427
- https://github.com/heimdal/heimdal/releases/tag/heimdal-7.4.0
- https://github.com/heimdal/heimdal/releases/tag/heimdal-7.4.0
- https://support.apple.com/HT208112
- https://support.apple.com/HT208112
- https://support.apple.com/HT208144
- https://support.apple.com/HT208144
- https://support.apple.com/HT208221
- https://support.apple.com/HT208221
- FreeBSD-SA-17:05
- FreeBSD-SA-17:05
- https://www.orpheus-lyre.info/
- https://www.orpheus-lyre.info/
- https://www.samba.org/samba/security/CVE-2017-11103.html
- https://www.samba.org/samba/security/CVE-2017-11103.html
Closed vulnerabilities
BDU:2021-01424
Уязвимость функции _krb5_extract_ticket() пакета программ сетевого взаимодействия Samba, связанная с недостатком механизма проверки подлинности данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2017-11103
Heimdal before 7.4 allows remote attackers to impersonate services with Orpheus' Lyre attacks because it obtains service-principal names in a way that violates the Kerberos 5 protocol specification. In _krb5_extract_ticket() the KDC-REP service name must be obtained from the encrypted version stored in 'enc_part' instead of the unencrypted version stored in 'ticket'. Use of the unencrypted version provides an opportunity for successful server impersonation and other attacks. NOTE: this CVE is only for Heimdal and other products that embed Heimdal code; it does not apply to other instances in which this part of the Kerberos 5 protocol specification is violated.
- DSA-3912
- DSA-3912
- http://www.h5l.org/advisories.html?show=2017-07-11
- http://www.h5l.org/advisories.html?show=2017-07-11
- 99551
- 99551
- 1038876
- 1038876
- 1039427
- 1039427
- https://github.com/heimdal/heimdal/releases/tag/heimdal-7.4.0
- https://github.com/heimdal/heimdal/releases/tag/heimdal-7.4.0
- https://support.apple.com/HT208112
- https://support.apple.com/HT208112
- https://support.apple.com/HT208144
- https://support.apple.com/HT208144
- https://support.apple.com/HT208221
- https://support.apple.com/HT208221
- FreeBSD-SA-17:05
- FreeBSD-SA-17:05
- https://www.orpheus-lyre.info/
- https://www.orpheus-lyre.info/
- https://www.samba.org/samba/security/CVE-2017-11103.html
- https://www.samba.org/samba/security/CVE-2017-11103.html