ALT-BU-2017-3249-1
Branch p8 update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2016-7035
An authorization flaw was found in Pacemaker before 1.1.16, where it did not properly guard its IPC interface. An attacker with an unprivileged account on a Pacemaker node could use this flaw to, for example, force the Local Resource Manager daemon to execute a script as root and thereby gain root access on the machine.
- http://rhn.redhat.com/errata/RHSA-2016-2614.html
- http://rhn.redhat.com/errata/RHSA-2016-2675.html
- http://www.openwall.com/lists/oss-security/2016/11/03/5
- http://www.securityfocus.com/bid/94214
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7035
- https://github.com/ClusterLabs/pacemaker/commit/5d71e65049
- https://lists.clusterlabs.org/pipermail/users/2016-November/004432.html
- https://security.gentoo.org/glsa/201710-08
- http://rhn.redhat.com/errata/RHSA-2016-2614.html
- http://rhn.redhat.com/errata/RHSA-2016-2675.html
- http://www.openwall.com/lists/oss-security/2016/11/03/5
- http://www.securityfocus.com/bid/94214
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-7035
- https://github.com/ClusterLabs/pacemaker/commit/5d71e65049
- https://lists.clusterlabs.org/pipermail/users/2016-November/004432.html
- https://security.gentoo.org/glsa/201710-08
Closed bugs
не останавливается через systemd
Closed bugs
В пакет pcs-pcsd не упакован unit файл для systemd
Package libgdk-pixbuf updated to version 2.36.7-alt0.M80P.1 for branch p8 in task 185643.
Closed vulnerabilities
Modified: 2025-04-20
CVE-2017-2862
An exploitable heap overflow vulnerability exists in the gdk_pixbuf__jpeg_image_load_increment functionality of Gdk-Pixbuf 2.36.6. A specially crafted jpeg file can cause a heap overflow resulting in remote code execution. An attacker can send a file or url to trigger this vulnerability.
- http://www.debian.org/security/2017/dsa-3978
- http://www.securityfocus.com/bid/100541
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0366
- http://www.debian.org/security/2017/dsa-3978
- http://www.securityfocus.com/bid/100541
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0366
Modified: 2025-04-20
CVE-2017-2870
An exploitable integer overflow vulnerability exists in the tiff_image_parse functionality of Gdk-Pixbuf 2.36.6 when compiled with Clang. A specially crafted tiff file can cause a heap-overflow resulting in remote code execution. An attacker can send a file or a URL to trigger this vulnerability.
- http://www.securityfocus.com/bid/100541
- https://lists.debian.org/debian-lts-announce/2019/12/msg00025.html
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0377
- http://www.securityfocus.com/bid/100541
- https://lists.debian.org/debian-lts-announce/2019/12/msg00025.html
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2017-0377
Closed vulnerabilities
BDU:2020-03954
Уязвимость реализации функции function box_blur_line библиотеки отрисовки векторной графики librsvg, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-04-20
CVE-2017-11464
A SIGFPE is raised in the function box_blur_line of rsvg-filter.c in GNOME librsvg 2.40.17 during an attempted parse of a crafted SVG file, because of incorrect protection against division by zero.
- http://www.securityfocus.com/bid/99956
- https://bugzilla.gnome.org/show_bug.cgi?id=783835
- https://git.gnome.org/browse/librsvg/commit/?id=ecf9267a24b2c3c0cd211dbdfa9ef2232511972a
- https://github.com/GNOME/librsvg/commit/ecf9267a24b2c3c0cd211dbdfa9ef2232511972a
- https://lists.debian.org/debian-lts-announce/2020/07/msg00016.html
- https://usn.ubuntu.com/4436-1/
- http://www.securityfocus.com/bid/99956
- https://bugzilla.gnome.org/show_bug.cgi?id=783835
- https://git.gnome.org/browse/librsvg/commit/?id=ecf9267a24b2c3c0cd211dbdfa9ef2232511972a
- https://github.com/GNOME/librsvg/commit/ecf9267a24b2c3c0cd211dbdfa9ef2232511972a
- https://lists.debian.org/debian-lts-announce/2020/07/msg00016.html
- https://usn.ubuntu.com/4436-1/
Closed vulnerabilities
Modified: 2025-04-20
CVE-2017-10683
In mpg123 1.25.0, there is a heap-based buffer over-read in the convert_latin1 function in libmpg123/id3.c. A crafted input will lead to a remote denial of service attack.
Modified: 2025-04-20
CVE-2017-11126
The III_i_stereo function in libmpg123/layer3.c in mpg123 through 1.25.1 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted audio file that is mishandled in the code for the "block_type != 2" case, a similar issue to CVE-2017-9870.
Package php5-fpm-fcgi updated to version 5.6.31.20170607-alt1.M80P.1.2 for branch p8 in task 185646.
Closed bugs
Не ротейтятся корректно логи