ALT-BU-2017-3335-1
Branch sisyphus update bulletin.
Package mpi-selector updated to version 1.0.3-alt3 for branch sisyphus in task 187810.
Closed bugs
Удалить /etc/profile.d/mpi-selector-manpath.sh
Closed vulnerabilities
BDU:2017-02009
Уязвимость функции Unpack::LongLZ библиотеки libunrar.a средства разархивирования файлов UnRAR, позволяющая нарушителю вызвать аварийное завершение работы приложения
BDU:2017-02010
Уязвимость функции Unpack::Unpack20 библиотеки libunrar.a средства разархивирования файлов UnRAR, позволяющая нарушителю вызвать аварийное завершение работы приложения
BDU:2017-02011
Уязвимость функции Archive::ReadHeader15 библиотеки libunrar.a средства разархивирования файлов UnRAR, позволяющая нарушителю вызвать аварийное завершение работы приложения
BDU:2017-02104
Уязвимость компонента памяти VMSF_DELTA средства разархивирования файлов UnRAR, средства антивирусной защиты Sophos Anti-Virus, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2012-6706
A VMSF_DELTA memory corruption was discovered in unrar before 5.5.5, as used in Sophos Anti-Virus Threat Detection Engine before 3.37.2 and other products, that can lead to arbitrary code execution. An integer overflow can be caused in DataSize+CurChannel. The result is a negative value of the "DestPos" variable, which allows the attacker to write out of bounds when setting Mem[DestPos].
- http://securitytracker.com/id?1027725
- http://securitytracker.com/id?1027725
- http://telussecuritylabs.com/threats/show/TSL20121207-01
- http://telussecuritylabs.com/threats/show/TSL20121207-01
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1286
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1286
- https://community.sophos.com/kb/en-us/118424#six
- https://community.sophos.com/kb/en-us/118424#six
- https://kc.mcafee.com/corporate/index?page=content&id=SB10205
- https://kc.mcafee.com/corporate/index?page=content&id=SB10205
- https://lock.cmpxchg8b.com/sophailv2.pdf
- https://lock.cmpxchg8b.com/sophailv2.pdf
- https://nakedsecurity.sophos.com/2012/11/05/tavis-ormandy-sophos/
- https://nakedsecurity.sophos.com/2012/11/05/tavis-ormandy-sophos/
- GLSA-201708-05
- GLSA-201708-05
- GLSA-201709-24
- GLSA-201709-24
- GLSA-201804-16
- GLSA-201804-16
Modified: 2024-11-21
CVE-2017-12938
UnRAR before 5.5.7 allows remote attackers to bypass a directory-traversal protection mechanism via vectors involving a symlink to the . directory, a symlink to the .. directory, and a regular file.
Modified: 2024-11-21
CVE-2017-12940
libunrar.a in UnRAR before 5.5.7 has an out-of-bounds read in the EncodeFileName::Decode call within the Archive::ReadHeader15 function.
Modified: 2024-11-21
CVE-2017-12941
libunrar.a in UnRAR before 5.5.7 has an out-of-bounds read in the Unpack::Unpack20 function.
Modified: 2024-11-21
CVE-2017-12942
libunrar.a in UnRAR before 5.5.7 has a buffer overflow in the Unpack::LongLZ function.
Closed vulnerabilities
BDU:2021-01452
Уязвимость функции автозаполнения оболочки командной оболочки UNIX Zsh, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2017-18205
In builtin.c in zsh before 5.4, when sh compatibility mode is used, there is a NULL pointer dereference during processing of the cd command with no argument if HOME is not set.
Modified: 2024-11-21
CVE-2017-18206
In utils.c in zsh before 5.4, symlink expansion had a buffer overflow.
- RHSA-2018:1932
- RHSA-2018:1932
- RHSA-2018:3073
- RHSA-2018:3073
- [debian-lts-announce] 20201201 [SECURITY] [DLA 2470-1] zsh security update
- [debian-lts-announce] 20201201 [SECURITY] [DLA 2470-1] zsh security update
- GLSA-201805-10
- GLSA-201805-10
- https://sourceforge.net/p/zsh/code/ci/c7a9cf465dd620ef48d586026944d9bd7a0d5d6d
- https://sourceforge.net/p/zsh/code/ci/c7a9cf465dd620ef48d586026944d9bd7a0d5d6d
- USN-3593-1
- USN-3593-1
Modified: 2024-11-21
CVE-2018-1083
Zsh before version 5.4.2-test-1 is vulnerable to a buffer overflow in the shell autocomplete functionality. A local unprivileged user can create a specially crafted directory path which leads to code execution in the context of the user who tries to use autocomplete to traverse the before mentioned path. If the user affected is privileged, this leads to privilege escalation.
- 103572
- 103572
- RHSA-2018:1932
- RHSA-2018:1932
- RHSA-2018:3073
- RHSA-2018:3073
- https://bugzilla.redhat.com/show_bug.cgi?id=1557382
- https://bugzilla.redhat.com/show_bug.cgi?id=1557382
- [debian-lts-announce] 20180331 [SECURITY] [DLA 1335-1] zsh security update
- [debian-lts-announce] 20180331 [SECURITY] [DLA 1335-1] zsh security update
- [debian-lts-announce] 20201201 [SECURITY] [DLA 2470-1] zsh security update
- [debian-lts-announce] 20201201 [SECURITY] [DLA 2470-1] zsh security update
- GLSA-201805-10
- GLSA-201805-10
- https://sourceforge.net/p/zsh/code/ci/259ac472eac291c8c103c7a0d8a4eaf3c2942ed7
- https://sourceforge.net/p/zsh/code/ci/259ac472eac291c8c103c7a0d8a4eaf3c2942ed7
- USN-3608-1
- USN-3608-1