ALT-BU-2017-3340-1
Branch sisyphus update bulletin.
Package mate-desktop updated to version 1.19.0-alt1_1 for branch sisyphus in task 187726.
Closed bugs
Обновление mate в Сизифе до текущей версии
Package mate-file-archiver updated to version 1.19.0-alt1_4 for branch sisyphus in task 187726.
Closed bugs
Выделить субпакет mate-file-manager-archiver
Closed vulnerabilities
Modified: 2024-11-21
CVE-2016-9577
A vulnerability was discovered in SPICE before 0.13.90 in the server's protocol handling. An authenticated attacker could send crafted messages to the SPICE server causing a heap overflow leading to a crash or possible code execution.
- http://rhn.redhat.com/errata/RHSA-2017-0253.html
- http://rhn.redhat.com/errata/RHSA-2017-0549.html
- http://www.securityfocus.com/bid/96040
- https://access.redhat.com/errata/RHSA-2017:0254
- https://access.redhat.com/errata/RHSA-2017:0552
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9577
- https://www.debian.org/security/2017/dsa-3790
- http://rhn.redhat.com/errata/RHSA-2017-0253.html
- http://rhn.redhat.com/errata/RHSA-2017-0549.html
- http://www.securityfocus.com/bid/96040
- https://access.redhat.com/errata/RHSA-2017:0254
- https://access.redhat.com/errata/RHSA-2017:0552
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9577
- https://www.debian.org/security/2017/dsa-3790
Modified: 2024-11-21
CVE-2016-9578
A vulnerability was discovered in SPICE before 0.13.90 in the server's protocol handling. An attacker able to connect to the SPICE server could send crafted messages which would cause the process to crash.
- http://rhn.redhat.com/errata/RHSA-2017-0253.html
- http://rhn.redhat.com/errata/RHSA-2017-0549.html
- http://www.securityfocus.com/bid/96118
- https://access.redhat.com/errata/RHSA-2017:0254
- https://access.redhat.com/errata/RHSA-2017:0552
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9578
- https://www.debian.org/security/2017/dsa-3790
- http://rhn.redhat.com/errata/RHSA-2017-0253.html
- http://rhn.redhat.com/errata/RHSA-2017-0549.html
- http://www.securityfocus.com/bid/96118
- https://access.redhat.com/errata/RHSA-2017:0254
- https://access.redhat.com/errata/RHSA-2017:0552
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2016-9578
- https://www.debian.org/security/2017/dsa-3790
Closed vulnerabilities
BDU:2017-01782
Уязвимость компонента audio.c эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2017-01803
Уязвимость в qemu-nbd эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2017-02081
Уязвимость функции megasas_mmio_write эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю оказать неопределенное воздействие
BDU:2018-00025
Уязвимость функции v9fs_xattrwalk (hw/9pfs/9p.c) эмулятора аппаратного обеспечения Qemu, позволяющая нарушителю получить конфиденциальную информацию из памяти хостовой операционной системы
BDU:2021-01313
Уязвимость эмулятора аппаратного обеспечения QEMU, связанная с разыменованием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-04-20
CVE-2017-10664
qemu-nbd in QEMU (aka Quick Emulator) does not ignore SIGPIPE, which allows remote attackers to cause a denial of service (daemon crash) by disconnecting during a server-to-client reply attempt.
- http://www.debian.org/security/2017/dsa-3920
- http://www.openwall.com/lists/oss-security/2017/06/29/1
- http://www.securityfocus.com/bid/99513
- https://access.redhat.com/errata/RHSA-2017:2390
- https://access.redhat.com/errata/RHSA-2017:2445
- https://access.redhat.com/errata/RHSA-2017:3466
- https://access.redhat.com/errata/RHSA-2017:3470
- https://access.redhat.com/errata/RHSA-2017:3471
- https://access.redhat.com/errata/RHSA-2017:3472
- https://access.redhat.com/errata/RHSA-2017:3473
- https://access.redhat.com/errata/RHSA-2017:3474
- https://bugzilla.redhat.com/show_bug.cgi?id=1466190
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2017-06/msg02693.html
- http://www.debian.org/security/2017/dsa-3920
- http://www.openwall.com/lists/oss-security/2017/06/29/1
- http://www.securityfocus.com/bid/99513
- https://access.redhat.com/errata/RHSA-2017:2390
- https://access.redhat.com/errata/RHSA-2017:2445
- https://access.redhat.com/errata/RHSA-2017:3466
- https://access.redhat.com/errata/RHSA-2017:3470
- https://access.redhat.com/errata/RHSA-2017:3471
- https://access.redhat.com/errata/RHSA-2017:3472
- https://access.redhat.com/errata/RHSA-2017:3473
- https://access.redhat.com/errata/RHSA-2017:3474
- https://bugzilla.redhat.com/show_bug.cgi?id=1466190
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2017-06/msg02693.html
Modified: 2025-04-20
CVE-2017-10806
Stack-based buffer overflow in hw/usb/redirect.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (QEMU process crash) via vectors related to logging debug messages.
- http://www.debian.org/security/2017/dsa-3925
- http://www.openwall.com/lists/oss-security/2017/07/07/1
- http://www.securityfocus.com/bid/99475
- https://bugzilla.redhat.com/show_bug.cgi?id=1468496
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://lists.nongnu.org/archive/html/qemu-devel/2017-05/msg03087.html
- http://www.debian.org/security/2017/dsa-3925
- http://www.openwall.com/lists/oss-security/2017/07/07/1
- http://www.securityfocus.com/bid/99475
- https://bugzilla.redhat.com/show_bug.cgi?id=1468496
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://lists.nongnu.org/archive/html/qemu-devel/2017-05/msg03087.html
Modified: 2025-04-20
CVE-2017-11334
The address_space_write_continue function in exec.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds access and guest instance crash) by leveraging use of qemu_map_ram_ptr to access guest ram block area.
- http://www.debian.org/security/2017/dsa-3925
- http://www.openwall.com/lists/oss-security/2017/07/17/4
- http://www.securityfocus.com/bid/99895
- https://access.redhat.com/errata/RHSA-2017:3369
- https://access.redhat.com/errata/RHSA-2017:3466
- https://access.redhat.com/errata/RHSA-2017:3470
- https://access.redhat.com/errata/RHSA-2017:3471
- https://access.redhat.com/errata/RHSA-2017:3472
- https://access.redhat.com/errata/RHSA-2017:3473
- https://access.redhat.com/errata/RHSA-2017:3474
- https://bugzilla.redhat.com/show_bug.cgi?id=1471638
- https://lists.gnu.org/archive/html/qemu-devel/2017-07/msg03775.html
- https://usn.ubuntu.com/3575-1/
- http://www.debian.org/security/2017/dsa-3925
- http://www.openwall.com/lists/oss-security/2017/07/17/4
- http://www.securityfocus.com/bid/99895
- https://access.redhat.com/errata/RHSA-2017:3369
- https://access.redhat.com/errata/RHSA-2017:3466
- https://access.redhat.com/errata/RHSA-2017:3470
- https://access.redhat.com/errata/RHSA-2017:3471
- https://access.redhat.com/errata/RHSA-2017:3472
- https://access.redhat.com/errata/RHSA-2017:3473
- https://access.redhat.com/errata/RHSA-2017:3474
- https://bugzilla.redhat.com/show_bug.cgi?id=1471638
- https://lists.gnu.org/archive/html/qemu-devel/2017-07/msg03775.html
- https://usn.ubuntu.com/3575-1/
Modified: 2025-04-20
CVE-2017-11434
The dhcp_decode function in slirp/bootp.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) via a crafted DHCP options string.
- http://www.debian.org/security/2017/dsa-3925
- http://www.openwall.com/lists/oss-security/2017/07/19/2
- http://www.securityfocus.com/bid/99923
- https://bugzilla.redhat.com/show_bug.cgi?id=1472611
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://lists.gnu.org/archive/html/qemu-devel/2017-07/msg05001.html
- http://www.debian.org/security/2017/dsa-3925
- http://www.openwall.com/lists/oss-security/2017/07/19/2
- http://www.securityfocus.com/bid/99923
- https://bugzilla.redhat.com/show_bug.cgi?id=1472611
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://lists.gnu.org/archive/html/qemu-devel/2017-07/msg05001.html
Modified: 2025-04-20
CVE-2017-12809
QEMU (aka Quick Emulator), when built with the IDE disk and CD/DVD-ROM Emulator support, allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) by flushing an empty CDROM device drive.
- http://www.debian.org/security/2017/dsa-3991
- http://www.openwall.com/lists/oss-security/2017/08/21/2
- http://www.securityfocus.com/bid/100451
- https://lists.gnu.org/archive/html/qemu-devel/2017-08/msg01850.html
- http://www.debian.org/security/2017/dsa-3991
- http://www.openwall.com/lists/oss-security/2017/08/21/2
- http://www.securityfocus.com/bid/100451
- https://lists.gnu.org/archive/html/qemu-devel/2017-08/msg01850.html
Modified: 2025-04-20
CVE-2017-13673
The vga display update in mis-calculated the region for the dirty bitmap snapshot in case split screen mode is used causing a denial of service (assertion failure) in the cpu_physical_memory_snapshot_get_dirty function.
- http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html
- http://www.openwall.com/lists/oss-security/2017/09/10/1
- http://www.securityfocus.com/bid/100527
- https://access.redhat.com/errata/RHSA-2018:1104
- https://access.redhat.com/errata/RHSA-2018:1113
- https://git.qemu.org/gitweb.cgi?p=qemu.git%3Ba=commit%3Bh=bfc56535f793c557aa754c50213fc5f882e6482d
- https://lists.gnu.org/archive/html/qemu-devel/2017-08/msg04685.html
- http://lists.opensuse.org/opensuse-security-announce/2019-03/msg00042.html
- http://www.openwall.com/lists/oss-security/2017/09/10/1
- http://www.securityfocus.com/bid/100527
- https://access.redhat.com/errata/RHSA-2018:1104
- https://access.redhat.com/errata/RHSA-2018:1113
- https://git.qemu.org/gitweb.cgi?p=qemu.git%3Ba=commit%3Bh=bfc56535f793c557aa754c50213fc5f882e6482d
- https://lists.gnu.org/archive/html/qemu-devel/2017-08/msg04685.html
Modified: 2025-04-20
CVE-2017-15038
Race condition in the v9fs_xattrwalk function in hw/9pfs/9p.c in QEMU (aka Quick Emulator) allows local guest OS users to obtain sensitive information from host heap memory via vectors related to reading extended attributes.
- http://www.openwall.com/lists/oss-security/2017/10/06/1
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://lists.gnu.org/archive/html/qemu-devel/2017-10/msg00729.html
- https://usn.ubuntu.com/3575-1/
- https://www.debian.org/security/2018/dsa-4213
- http://www.openwall.com/lists/oss-security/2017/10/06/1
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://lists.gnu.org/archive/html/qemu-devel/2017-10/msg00729.html
- https://usn.ubuntu.com/3575-1/
- https://www.debian.org/security/2018/dsa-4213
Modified: 2025-04-20
CVE-2017-7493
Quick Emulator (Qemu) built with the VirtFS, host directory sharing via Plan 9 File System(9pfs) support, is vulnerable to an improper access control issue. It could occur while accessing virtfs metadata files in mapped-file security mode. A guest user could use this flaw to escalate their privileges inside guest.
- http://seclists.org/oss-sec/2017/q2/278
- http://www.securityfocus.com/bid/98574
- https://bugzilla.redhat.com/show_bug.cgi?id=1451709
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://lists.gnu.org/archive/html/qemu-devel/2017-05/msg03663.html
- https://security.gentoo.org/glsa/201706-03
- http://seclists.org/oss-sec/2017/q2/278
- http://www.securityfocus.com/bid/98574
- https://bugzilla.redhat.com/show_bug.cgi?id=1451709
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://lists.gnu.org/archive/html/qemu-devel/2017-05/msg03663.html
- https://security.gentoo.org/glsa/201706-03
Modified: 2025-04-20
CVE-2017-8112
hw/scsi/vmw_pvscsi.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (infinite loop and CPU consumption) via the message ring page count.
- http://www.openwall.com/lists/oss-security/2017/04/26/5
- http://www.securityfocus.com/bid/98015
- https://bugzilla.redhat.com/show_bug.cgi?id=1445621
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://lists.gnu.org/archive/html/qemu-devel/2017-04/msg04578.html
- https://security.gentoo.org/glsa/201706-03
- http://www.openwall.com/lists/oss-security/2017/04/26/5
- http://www.securityfocus.com/bid/98015
- https://bugzilla.redhat.com/show_bug.cgi?id=1445621
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://lists.gnu.org/archive/html/qemu-devel/2017-04/msg04578.html
- https://security.gentoo.org/glsa/201706-03
Modified: 2025-04-20
CVE-2017-8309
Memory leak in the audio/audio.c in QEMU (aka Quick Emulator) allows remote attackers to cause a denial of service (memory consumption) by repeatedly starting and stopping audio capture.
- http://www.securityfocus.com/bid/98302
- https://access.redhat.com/errata/RHSA-2017:2408
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://lists.gnu.org/archive/html/qemu-devel/2017-04/msg05587.html
- https://security.gentoo.org/glsa/201706-03
- http://www.securityfocus.com/bid/98302
- https://access.redhat.com/errata/RHSA-2017:2408
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://lists.gnu.org/archive/html/qemu-devel/2017-04/msg05587.html
- https://security.gentoo.org/glsa/201706-03
Modified: 2025-04-20
CVE-2017-8379
Memory leak in the keyboard input event handlers support in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (host memory consumption) by rapidly generating large keyboard events.
- http://www.openwall.com/lists/oss-security/2017/05/03/2
- http://www.securityfocus.com/bid/98277
- https://access.redhat.com/errata/RHSA-2017:2408
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://lists.gnu.org/archive/html/qemu-devel/2017-04/msg05599.html
- https://security.gentoo.org/glsa/201706-03
- http://www.openwall.com/lists/oss-security/2017/05/03/2
- http://www.securityfocus.com/bid/98277
- https://access.redhat.com/errata/RHSA-2017:2408
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://lists.gnu.org/archive/html/qemu-devel/2017-04/msg05599.html
- https://security.gentoo.org/glsa/201706-03
Modified: 2025-04-20
CVE-2017-8380
Buffer overflow in the "megasas_mmio_write" function in Qemu 2.9.0 allows remote attackers to have unspecified impact via unknown vectors.
Modified: 2025-04-20
CVE-2017-9503
QEMU (aka Quick Emulator), when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving megasas command processing.
- http://www.openwall.com/lists/oss-security/2017/06/08/1
- http://www.securityfocus.com/bid/99010
- https://bugzilla.redhat.com/show_bug.cgi?id=1459477
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://lists.debian.org/debian-lts-announce/2020/07/msg00020.html
- https://lists.gnu.org/archive/html/qemu-devel/2017-06/msg01309.html
- https://lists.gnu.org/archive/html/qemu-devel/2017-06/msg01313.html
- http://www.openwall.com/lists/oss-security/2017/06/08/1
- http://www.securityfocus.com/bid/99010
- https://bugzilla.redhat.com/show_bug.cgi?id=1459477
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://lists.debian.org/debian-lts-announce/2020/07/msg00020.html
- https://lists.gnu.org/archive/html/qemu-devel/2017-06/msg01309.html
- https://lists.gnu.org/archive/html/qemu-devel/2017-06/msg01313.html
Modified: 2025-04-20
CVE-2017-9524
The qemu-nbd server in QEMU (aka Quick Emulator), when built with the Network Block Device (NBD) Server support, allows remote attackers to cause a denial of service (segmentation fault and server crash) by leveraging failure to ensure that all initialization occurs before talking to a client in the nbd_negotiate function.
- http://www.debian.org/security/2017/dsa-3925
- http://www.openwall.com/lists/oss-security/2017/06/12/1
- http://www.securityfocus.com/bid/99011
- https://access.redhat.com/errata/RHSA-2017:1681
- https://access.redhat.com/errata/RHSA-2017:1682
- https://access.redhat.com/errata/RHSA-2017:2408
- https://lists.gnu.org/archive/html/qemu-devel/2017-05/msg06240.html
- https://lists.gnu.org/archive/html/qemu-devel/2017-06/msg02321.html
- http://www.debian.org/security/2017/dsa-3925
- http://www.openwall.com/lists/oss-security/2017/06/12/1
- http://www.securityfocus.com/bid/99011
- https://access.redhat.com/errata/RHSA-2017:1681
- https://access.redhat.com/errata/RHSA-2017:1682
- https://access.redhat.com/errata/RHSA-2017:2408
- https://lists.gnu.org/archive/html/qemu-devel/2017-05/msg06240.html
- https://lists.gnu.org/archive/html/qemu-devel/2017-06/msg02321.html
Package libnetcdf11-seq updated to version 4.4.1.1-alt3 for branch sisyphus in task 187991.
Closed bugs
Конфликт по файлам с libnetcdf7-seq