ALT-BU-2017-3330-3
Branch sisyphus update bulletin.
Package alterator-ldap-users updated to version 0.8.5-alt1 for branch sisyphus in task 187709.
Closed bugs
Невнятное сообщение о проблемах сохранения для пользователя Active Directory
Package alterator-ldap-groups updated to version 0.6.6-alt2 for branch sisyphus in task 187699.
Closed bugs
Странный источник
Closed vulnerabilities
Modified: 2024-11-28
BDU:2018-00356
Уязвимость сервера ISC DHCP, связанная с переполнением буфера памяти, позволяющая нарушителю вызвать отказ в обслуживании или получить несанкционированный доступ к конфиденциальным данным
Modified: 2025-04-12
CVE-2015-8605
ISC DHCP 4.x before 4.1-ESV-R12-P1, 4.2.x, and 4.3.x before 4.3.3-P1 allows remote attackers to cause a denial of service (application crash) via an invalid length field in a UDP IPv4 packet.
- http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175594.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176031.html
- http://lists.opensuse.org/opensuse-updates/2016-02/msg00162.html
- http://lists.opensuse.org/opensuse-updates/2016-02/msg00168.html
- http://www.debian.org/security/2016/dsa-3442
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.securityfocus.com/bid/80703
- http://www.securitytracker.com/id/1034657
- http://www.ubuntu.com/usn/USN-2868-1
- https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/
- https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/
- https://kb.isc.org/article/AA-01334
- http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175594.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176031.html
- http://lists.opensuse.org/opensuse-updates/2016-02/msg00162.html
- http://lists.opensuse.org/opensuse-updates/2016-02/msg00168.html
- http://www.debian.org/security/2016/dsa-3442
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.securityfocus.com/bid/80703
- http://www.securitytracker.com/id/1034657
- http://www.ubuntu.com/usn/USN-2868-1
- https://blogs.sophos.com/2016/02/17/utm-up2date-9-354-released/
- https://blogs.sophos.com/2016/02/29/utm-up2date-9-319-released/
- https://kb.isc.org/article/AA-01334
Modified: 2025-04-12
CVE-2016-2774
ISC DHCP 4.1.x before 4.1-ESV-R13 and 4.2.x and 4.3.x before 4.3.4 does not restrict the number of concurrent TCP sessions, which allows remote attackers to cause a denial of service (INSIST assertion failure or request-processing outage) by establishing many sessions.
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183458.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183640.html
- http://lists.opensuse.org/opensuse-updates/2016-07/msg00066.html
- http://rhn.redhat.com/errata/RHSA-2016-2590.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.securityfocus.com/bid/84208
- http://www.securitytracker.com/id/1035196
- https://kb.isc.org/article/AA-01354
- https://lists.debian.org/debian-lts-announce/2019/11/msg00023.html
- https://usn.ubuntu.com/3586-1/
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183458.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/183640.html
- http://lists.opensuse.org/opensuse-updates/2016-07/msg00066.html
- http://rhn.redhat.com/errata/RHSA-2016-2590.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.securityfocus.com/bid/84208
- http://www.securitytracker.com/id/1035196
- https://kb.isc.org/article/AA-01354
- https://lists.debian.org/debian-lts-announce/2019/11/msg00023.html
- https://usn.ubuntu.com/3586-1/
Modified: 2024-11-21
CVE-2018-5732
Failure to properly bounds-check a buffer used for processing DHCP options allows a malicious server (or an entity masquerading as a server) to cause a buffer overflow (and resulting crash) in dhclient by sending a response containing a specially constructed options section. Affects ISC DHCP versions 4.1.0 -> 4.1-ESV-R15, 4.2.0 -> 4.2.8, 4.3.0 -> 4.3.6, 4.4.0
Package mate-panel updated to version 1.16.0-alt1_3 for branch sisyphus in task 187710.
Closed bugs
После перезагрузки >1 панели на одном крае вызывает зависание mate-panel
Package libisc-export-dhcp updated to version 9.9.11-alt1 for branch sisyphus in task 187715.
Closed vulnerabilities
Modified: 2021-03-23
BDU:2018-00105
Уязвимость реализации протокола TSIG DNS-сервера BIND, позволяющая нарушителю обойти процедуру аутентификации и получить корректную подпись для произвольных данных
Modified: 2025-04-12
CVE-2016-2775
ISC BIND 9.x before 9.9.9-P2, 9.10.x before 9.10.4-P2, and 9.11.x before 9.11.0b2, when lwresd or the named lwres option is enabled, allows remote attackers to cause a denial of service (daemon crash) via a long request that uses the lightweight resolver protocol.
- http://www.securityfocus.com/bid/92037
- http://www.securitytracker.com/id/1036360
- https://access.redhat.com/errata/RHBA-2017:0651
- https://access.redhat.com/errata/RHBA-2017:1767
- https://access.redhat.com/errata/RHSA-2017:2533
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05321107
- https://kb.isc.org/article/AA-01393/74/CVE-2016-2775
- https://kb.isc.org/article/AA-01435
- https://kb.isc.org/article/AA-01436
- https://kb.isc.org/article/AA-01438
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7T2WJP5ELO4ZRSBXSETIZ3GAO6KOEFTA/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZUCSMEOZIZ2R2SKA4FPLTOVZHJBAOWC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJ5STNEUHBNEPUHJT7CYEVSMATFYMIX7/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TT754KDUJTKOASJODJX7FKHCOQ6EC7UX/
- https://security.gentoo.org/glsa/201610-07
- https://security.netapp.com/advisory/ntap-20160722-0002/
- http://www.securityfocus.com/bid/92037
- http://www.securitytracker.com/id/1036360
- https://access.redhat.com/errata/RHBA-2017:0651
- https://access.redhat.com/errata/RHBA-2017:1767
- https://access.redhat.com/errata/RHSA-2017:2533
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05321107
- https://kb.isc.org/article/AA-01393/74/CVE-2016-2775
- https://kb.isc.org/article/AA-01435
- https://kb.isc.org/article/AA-01436
- https://kb.isc.org/article/AA-01438
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7T2WJP5ELO4ZRSBXSETIZ3GAO6KOEFTA/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MZUCSMEOZIZ2R2SKA4FPLTOVZHJBAOWC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NJ5STNEUHBNEPUHJT7CYEVSMATFYMIX7/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TT754KDUJTKOASJODJX7FKHCOQ6EC7UX/
- https://security.gentoo.org/glsa/201610-07
- https://security.netapp.com/advisory/ntap-20160722-0002/
Modified: 2025-04-12
CVE-2016-6170
ISC BIND through 9.9.9-P1, 9.10.x through 9.10.4-P1, and 9.11.x through 9.11.0b1 allows primary DNS servers to cause a denial of service (secondary DNS server crash) via a large AXFR response, and possibly allows IXFR servers to cause a denial of service (IXFR client crash) via a large IXFR response and allows remote authenticated users to cause a denial of service (primary DNS server crash) via a large UPDATE message.
- http://www.openwall.com/lists/oss-security/2016/07/06/3
- http://www.securityfocus.com/bid/91611
- http://www.securitytracker.com/id/1036241
- https://bugzilla.redhat.com/show_bug.cgi?id=1353563
- https://github.com/sischkg/xfer-limit/blob/master/README.md
- https://kb.isc.org/article/AA-01390
- https://kb.isc.org/article/AA-01390/169/CVE-2016-6170
- https://lists.dns-oarc.net/pipermail/dns-operations/2016-July/015058.html
- https://lists.dns-oarc.net/pipermail/dns-operations/2016-July/015073.html
- https://lists.dns-oarc.net/pipermail/dns-operations/2016-July/015075.html
- https://security.gentoo.org/glsa/201610-07
- http://www.openwall.com/lists/oss-security/2016/07/06/3
- http://www.securityfocus.com/bid/91611
- http://www.securitytracker.com/id/1036241
- https://bugzilla.redhat.com/show_bug.cgi?id=1353563
- https://github.com/sischkg/xfer-limit/blob/master/README.md
- https://kb.isc.org/article/AA-01390
- https://kb.isc.org/article/AA-01390/169/CVE-2016-6170
- https://lists.dns-oarc.net/pipermail/dns-operations/2016-July/015058.html
- https://lists.dns-oarc.net/pipermail/dns-operations/2016-July/015073.html
- https://lists.dns-oarc.net/pipermail/dns-operations/2016-July/015075.html
- https://security.gentoo.org/glsa/201610-07
Modified: 2025-04-20
CVE-2016-9131
named in ISC BIND 9.x before 9.9.9-P5, 9.10.x before 9.10.4-P5, and 9.11.x before 9.11.0-P2 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a malformed response to an RTYPE ANY query.
- http://rhn.redhat.com/errata/RHSA-2017-0062.html
- http://www.debian.org/security/2017/dsa-3758
- http://www.securityfocus.com/bid/95386
- http://www.securitytracker.com/id/1037582
- https://access.redhat.com/errata/RHSA-2017:1583
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05381687
- https://kb.isc.org/article/AA-01439/74/CVE-2016-9131
- https://security.gentoo.org/glsa/201708-01
- https://security.netapp.com/advisory/ntap-20180926-0005/
- http://rhn.redhat.com/errata/RHSA-2017-0062.html
- http://www.debian.org/security/2017/dsa-3758
- http://www.securityfocus.com/bid/95386
- http://www.securitytracker.com/id/1037582
- https://access.redhat.com/errata/RHSA-2017:1583
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05381687
- https://kb.isc.org/article/AA-01439/74/CVE-2016-9131
- https://security.gentoo.org/glsa/201708-01
- https://security.netapp.com/advisory/ntap-20180926-0005/
Modified: 2025-04-20
CVE-2016-9444
named in ISC BIND 9.x before 9.9.9-P5, 9.10.x before 9.10.4-P5, and 9.11.x before 9.11.0-P2 allows remote attackers to cause a denial of service (assertion failure and daemon exit) via a crafted DS resource record in an answer.
- http://rhn.redhat.com/errata/RHSA-2017-0062.html
- http://www.debian.org/security/2017/dsa-3758
- http://www.securityfocus.com/bid/95393
- http://www.securitytracker.com/id/1037582
- https://access.redhat.com/errata/RHSA-2017:1583
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05381687
- https://kb.isc.org/article/AA-01441/74/CVE-2016-9444
- https://security.gentoo.org/glsa/201708-01
- https://security.netapp.com/advisory/ntap-20180926-0005/
- http://rhn.redhat.com/errata/RHSA-2017-0062.html
- http://www.debian.org/security/2017/dsa-3758
- http://www.securityfocus.com/bid/95393
- http://www.securitytracker.com/id/1037582
- https://access.redhat.com/errata/RHSA-2017:1583
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05381687
- https://kb.isc.org/article/AA-01441/74/CVE-2016-9444
- https://security.gentoo.org/glsa/201708-01
- https://security.netapp.com/advisory/ntap-20180926-0005/
Modified: 2024-11-21
CVE-2017-3136
A query with a specific set of characteristics could cause a server using DNS64 to encounter an assertion failure and terminate. An attacker could deliberately construct a query, enabling denial-of-service against a server if it was configured to use the DNS64 feature and other preconditions were met. Affects BIND 9.8.0 -> 9.8.8-P1, 9.9.0 -> 9.9.9-P6, 9.9.10b1->9.9.10rc1, 9.10.0 -> 9.10.4-P6, 9.10.5b1->9.10.5rc1, 9.11.0 -> 9.11.0-P3, 9.11.1b1->9.11.1rc1, 9.9.3-S1 -> 9.9.9-S8.
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html
- http://www.securityfocus.com/bid/97653
- http://www.securitytracker.com/id/1038259
- https://access.redhat.com/errata/RHSA-2017:1095
- https://access.redhat.com/errata/RHSA-2017:1105
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03747en_us
- https://kb.isc.org/docs/aa-01465
- https://security.gentoo.org/glsa/201708-01
- https://security.netapp.com/advisory/ntap-20180802-0002/
- https://www.debian.org/security/2017/dsa-3854
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00041.html
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00044.html
- http://www.securityfocus.com/bid/97653
- http://www.securitytracker.com/id/1038259
- https://access.redhat.com/errata/RHSA-2017:1095
- https://access.redhat.com/errata/RHSA-2017:1105
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03747en_us
- https://kb.isc.org/docs/aa-01465
- https://security.gentoo.org/glsa/201708-01
- https://security.netapp.com/advisory/ntap-20180802-0002/
- https://www.debian.org/security/2017/dsa-3854
Modified: 2024-11-21
CVE-2017-3138
named contains a feature which allows operators to issue commands to a running server by communicating with the server process over a control channel, using a utility program such as rndc. A regression introduced in a recent feature change has created a situation under which some versions of named can be caused to exit with a REQUIRE assertion failure if they are sent a null command string. Affects BIND 9.9.9->9.9.9-P7, 9.9.10b1->9.9.10rc2, 9.10.4->9.10.4-P7, 9.10.5b1->9.10.5rc2, 9.11.0->9.11.0-P4, 9.11.1b1->9.11.1rc2, 9.9.9-S1->9.9.9-S9.
- http://www.securityfocus.com/bid/97657
- http://www.securitytracker.com/id/1038260
- https://kb.isc.org/docs/aa-01471
- https://security.gentoo.org/glsa/201708-01
- https://security.netapp.com/advisory/ntap-20180802-0002/
- https://www.debian.org/security/2017/dsa-3854
- http://www.securityfocus.com/bid/97657
- http://www.securitytracker.com/id/1038260
- https://kb.isc.org/docs/aa-01471
- https://security.gentoo.org/glsa/201708-01
- https://security.netapp.com/advisory/ntap-20180802-0002/
- https://www.debian.org/security/2017/dsa-3854
Modified: 2024-11-21
CVE-2017-3141
The BIND installer on Windows uses an unquoted service path which can enable a local user to achieve privilege escalation if the host file system permissions allow this. Affects BIND 9.2.6-P2->9.2.9, 9.3.2-P1->9.3.6, 9.4.0->9.8.8, 9.9.0->9.9.10, 9.10.0->9.10.5, 9.11.0->9.11.1, 9.9.3-S1->9.9.10-S1, 9.10.5-S1.
- http://www.securityfocus.com/bid/99089
- http://www.securitytracker.com/id/1038693
- https://kb.isc.org/docs/aa-01496
- https://security.gentoo.org/glsa/201708-01
- https://security.netapp.com/advisory/ntap-20180926-0001/
- https://www.exploit-db.com/exploits/42121/
- http://www.securityfocus.com/bid/99089
- http://www.securitytracker.com/id/1038693
- https://kb.isc.org/docs/aa-01496
- https://security.gentoo.org/glsa/201708-01
- https://security.netapp.com/advisory/ntap-20180926-0001/
- https://www.exploit-db.com/exploits/42121/
Modified: 2024-11-21
CVE-2017-3142
An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name may be able to circumvent TSIG authentication of AXFR requests via a carefully constructed request packet. A server that relies solely on TSIG keys for protection with no other ACL protection could be manipulated into: providing an AXFR of a zone to an unauthorized recipient or accepting bogus NOTIFY packets. Affects BIND 9.4.0->9.8.8, 9.9.0->9.9.10-P1, 9.10.0->9.10.5-P1, 9.11.0->9.11.1-P1, 9.9.3-S1->9.9.10-S2, 9.10.5-S1->9.10.5-S2.
- http://www.securityfocus.com/bid/99339
- http://www.securitytracker.com/id/1038809
- https://access.redhat.com/errata/RHSA-2017:1679
- https://access.redhat.com/errata/RHSA-2017:1680
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03772en_us
- https://kb.isc.org/docs/aa-01504
- https://security.netapp.com/advisory/ntap-20190830-0003/
- https://www.debian.org/security/2017/dsa-3904
- http://www.securityfocus.com/bid/99339
- http://www.securitytracker.com/id/1038809
- https://access.redhat.com/errata/RHSA-2017:1679
- https://access.redhat.com/errata/RHSA-2017:1680
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03772en_us
- https://kb.isc.org/docs/aa-01504
- https://security.netapp.com/advisory/ntap-20190830-0003/
- https://www.debian.org/security/2017/dsa-3904
Modified: 2024-11-21
CVE-2017-3143
An attacker who is able to send and receive messages to an authoritative DNS server and who has knowledge of a valid TSIG key name for the zone and service being targeted may be able to manipulate BIND into accepting an unauthorized dynamic update. Affects BIND 9.4.0->9.8.8, 9.9.0->9.9.10-P1, 9.10.0->9.10.5-P1, 9.11.0->9.11.1-P1, 9.9.3-S1->9.9.10-S2, 9.10.5-S1->9.10.5-S2.
- http://www.securityfocus.com/bid/99337
- http://www.securitytracker.com/id/1038809
- https://access.redhat.com/errata/RHSA-2017:1679
- https://access.redhat.com/errata/RHSA-2017:1680
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03772en_us
- https://kb.isc.org/docs/aa-01503
- https://security.netapp.com/advisory/ntap-20190830-0003/
- https://www.debian.org/security/2017/dsa-3904
- http://www.securityfocus.com/bid/99337
- http://www.securitytracker.com/id/1038809
- https://access.redhat.com/errata/RHSA-2017:1679
- https://access.redhat.com/errata/RHSA-2017:1680
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03772en_us
- https://kb.isc.org/docs/aa-01503
- https://security.netapp.com/advisory/ntap-20190830-0003/
- https://www.debian.org/security/2017/dsa-3904
