ALT-BU-2017-3249-1
Branch p8 update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2016-7035
An authorization flaw was found in Pacemaker before 1.1.16, where it did not properly guard its IPC interface. An attacker with an unprivileged account on a Pacemaker node could use this flaw to, for example, force the Local Resource Manager daemon to execute a script as root and thereby gain root access on the machine.
- RHSA-2016:2614
- RHSA-2016:2614
- RHSA-2016:2675
- RHSA-2016:2675
- [oss-security] 20161103 CVE-2016-7035 - pacemaker - improper IPC guarding
- [oss-security] 20161103 CVE-2016-7035 - pacemaker - improper IPC guarding
- 94214
- 94214
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7035
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7035
- https://github.com/ClusterLabs/pacemaker/commit/5d71e65049
- https://github.com/ClusterLabs/pacemaker/commit/5d71e65049
- [users] 20161103 [SECURITY] CVE-2016-7035 - pacemaker - improper IPC guarding
- [users] 20161103 [SECURITY] CVE-2016-7035 - pacemaker - improper IPC guarding
- GLSA-201710-08
- GLSA-201710-08
Closed bugs
не останавливается через systemd
Closed bugs
В пакет pcs-pcsd не упакован unit файл для systemd
Package libgdk-pixbuf updated to version 2.36.7-alt0.M80P.1 for branch p8 in task 185643.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-2862
An exploitable heap overflow vulnerability exists in the gdk_pixbuf__jpeg_image_load_increment functionality of Gdk-Pixbuf 2.36.6. A specially crafted jpeg file can cause a heap overflow resulting in remote code execution. An attacker can send a file or url to trigger this vulnerability.
Modified: 2024-11-21
CVE-2017-2870
An exploitable integer overflow vulnerability exists in the tiff_image_parse functionality of Gdk-Pixbuf 2.36.6 when compiled with Clang. A specially crafted tiff file can cause a heap-overflow resulting in remote code execution. An attacker can send a file or a URL to trigger this vulnerability.
- 100541
- 100541
- [debian-lts-announce] 20191219 [SECURITY] [DLA 2043-1] gdk-pixbuf security update
- [debian-lts-announce] 20191219 [SECURITY] [DLA 2043-1] gdk-pixbuf security update
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0377
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0377
Closed vulnerabilities
BDU:2020-03954
Уязвимость реализации функции function box_blur_line библиотеки отрисовки векторной графики librsvg, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2017-11464
A SIGFPE is raised in the function box_blur_line of rsvg-filter.c in GNOME librsvg 2.40.17 during an attempted parse of a crafted SVG file, because of incorrect protection against division by zero.
- 99956
- 99956
- https://bugzilla.gnome.org/show_bug.cgi?id=783835
- https://bugzilla.gnome.org/show_bug.cgi?id=783835
- https://git.gnome.org/browse/librsvg/commit/?id=ecf9267a24b2c3c0cd211dbdfa9ef2232511972a
- https://git.gnome.org/browse/librsvg/commit/?id=ecf9267a24b2c3c0cd211dbdfa9ef2232511972a
- https://github.com/GNOME/librsvg/commit/ecf9267a24b2c3c0cd211dbdfa9ef2232511972a
- https://github.com/GNOME/librsvg/commit/ecf9267a24b2c3c0cd211dbdfa9ef2232511972a
- [debian-lts-announce] 20200722 [SECURITY] [DLA 2285-1] librsvg security update
- [debian-lts-announce] 20200722 [SECURITY] [DLA 2285-1] librsvg security update
- USN-4436-1
- USN-4436-1
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-10683
In mpg123 1.25.0, there is a heap-based buffer over-read in the convert_latin1 function in libmpg123/id3.c. A crafted input will lead to a remote denial of service attack.
Modified: 2024-11-21
CVE-2017-11126
The III_i_stereo function in libmpg123/layer3.c in mpg123 through 1.25.1 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted audio file that is mishandled in the code for the "block_type != 2" case, a similar issue to CVE-2017-9870.
Package php5-fpm-fcgi updated to version 5.6.31.20170607-alt1.M80P.1.2 for branch p8 in task 185646.
Closed bugs
Не ротейтятся корректно логи