ALT-BU-2017-3496-2
Branch sisyphus update bulletin.
Package make-initrd updated to version 2.0.5-alt1 for branch sisyphus in task 194078.
Closed bugs
/init: 18: /init: arithmetic expression: expecting EOF: "15"*10"
unbound variables cpu_vendor cpu_family
Package libwebkitgtk4 updated to version 2.18.3-alt1 for branch sisyphus in task 194085.
Closed vulnerabilities
Modified: 2025-04-20
CVE-2017-13788
An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
- http://www.securitytracker.com/id/1039703
- https://security.gentoo.org/glsa/201712-01
- https://support.apple.com/HT208219
- https://support.apple.com/HT208222
- https://support.apple.com/HT208223
- https://support.apple.com/HT208224
- https://support.apple.com/HT208225
- http://www.securitytracker.com/id/1039703
- https://security.gentoo.org/glsa/201712-01
- https://support.apple.com/HT208219
- https://support.apple.com/HT208222
- https://support.apple.com/HT208223
- https://support.apple.com/HT208224
- https://support.apple.com/HT208225
Modified: 2025-04-20
CVE-2017-13798
An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
- http://www.securitytracker.com/id/1039703
- https://security.gentoo.org/glsa/201712-01
- https://support.apple.com/HT208219
- https://support.apple.com/HT208222
- https://support.apple.com/HT208223
- https://support.apple.com/HT208224
- https://support.apple.com/HT208225
- https://www.exploit-db.com/exploits/43175/
- http://www.securitytracker.com/id/1039703
- https://security.gentoo.org/glsa/201712-01
- https://support.apple.com/HT208219
- https://support.apple.com/HT208222
- https://support.apple.com/HT208223
- https://support.apple.com/HT208224
- https://support.apple.com/HT208225
- https://www.exploit-db.com/exploits/43175/
Modified: 2025-04-20
CVE-2017-13803
An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
- http://www.securitytracker.com/id/1039703
- https://security.gentoo.org/glsa/201712-01
- https://support.apple.com/HT208219
- https://support.apple.com/HT208222
- https://support.apple.com/HT208223
- https://support.apple.com/HT208224
- https://support.apple.com/HT208225
- http://www.securitytracker.com/id/1039703
- https://security.gentoo.org/glsa/201712-01
- https://support.apple.com/HT208219
- https://support.apple.com/HT208222
- https://support.apple.com/HT208223
- https://support.apple.com/HT208224
- https://support.apple.com/HT208225
Package python-module-PyQt5 updated to version 5.9-alt4 for branch sisyphus in task 194117.
Closed bugs
Пакет не дособран
Package apache-commons-fileupload updated to version 1.3.3-alt1_2jpp8 for branch sisyphus in task 193833.
Closed vulnerabilities
Modified: 2021-03-23
BDU:2018-01429
Уязвимость класса DiskFileItem библиотеки Apache Commons FileUpload, позволяющая нарушителю выполнить произвольный код или осуществить манипулирование файлами в целевой системе
Modified: 2025-04-12
CVE-2016-1000031
Apache Commons FileUpload before 1.3.3 DiskFileItem File Manipulation Remote Code Execution
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00036.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.securityfocus.com/bid/93604
- http://www.zerodayinitiative.com/advisories/ZDI-16-570/
- https://issues.apache.org/jira/browse/FILEUPLOAD-279
- https://issues.apache.org/jira/browse/WW-4812
- https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E
- https://lists.apache.org/thread.html/d66657323fd25e437face5e84899c8ca404ccd187e81c3f2fa8b6080%40%3Cannounce.apache.org%3E
- https://security.netapp.com/advisory/ntap-20190212-0001/
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://www.tenable.com/security/research/tra-2016-12
- https://www.tenable.com/security/research/tra-2016-23
- https://www.tenable.com/security/research/tra-2016-30
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00036.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.securityfocus.com/bid/93604
- http://www.zerodayinitiative.com/advisories/ZDI-16-570/
- https://issues.apache.org/jira/browse/FILEUPLOAD-279
- https://issues.apache.org/jira/browse/WW-4812
- https://lists.apache.org/thread.html/708d94141126eac03011144a971a6411fcac16d9c248d1d535a39451%40%3Csolr-user.lucene.apache.org%3E
- https://lists.apache.org/thread.html/d66657323fd25e437face5e84899c8ca404ccd187e81c3f2fa8b6080%40%3Cannounce.apache.org%3E
- https://security.netapp.com/advisory/ntap-20190212-0001/
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://www.tenable.com/security/research/tra-2016-12
- https://www.tenable.com/security/research/tra-2016-23
- https://www.tenable.com/security/research/tra-2016-30