ALT-BU-2017-3496-2
Branch sisyphus update bulletin.
Package make-initrd updated to version 2.0.5-alt1 for branch sisyphus in task 194078.
Closed bugs
/init: 18: /init: arithmetic expression: expecting EOF: "15"*10"
unbound variables cpu_vendor cpu_family
Package libwebkitgtk4 updated to version 2.18.3-alt1 for branch sisyphus in task 194085.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-13788
An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
- 1039703
- 1039703
- GLSA-201712-01
- GLSA-201712-01
- https://support.apple.com/HT208219
- https://support.apple.com/HT208219
- https://support.apple.com/HT208222
- https://support.apple.com/HT208222
- https://support.apple.com/HT208223
- https://support.apple.com/HT208223
- https://support.apple.com/HT208224
- https://support.apple.com/HT208224
- https://support.apple.com/HT208225
- https://support.apple.com/HT208225
Modified: 2024-11-21
CVE-2017-13798
An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
- 1039703
- 1039703
- GLSA-201712-01
- GLSA-201712-01
- https://support.apple.com/HT208219
- https://support.apple.com/HT208219
- https://support.apple.com/HT208222
- https://support.apple.com/HT208222
- https://support.apple.com/HT208223
- https://support.apple.com/HT208223
- https://support.apple.com/HT208224
- https://support.apple.com/HT208224
- https://support.apple.com/HT208225
- https://support.apple.com/HT208225
- 43175
- 43175
Modified: 2024-11-21
CVE-2017-13803
An issue was discovered in certain Apple products. iOS before 11.1 is affected. Safari before 11.0.1 is affected. iCloud before 7.1 on Windows is affected. iTunes before 12.7.1 on Windows is affected. tvOS before 11.1 is affected. The issue involves the "WebKit" component. It allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption and application crash) via a crafted web site.
- 1039703
- 1039703
- GLSA-201712-01
- GLSA-201712-01
- https://support.apple.com/HT208219
- https://support.apple.com/HT208219
- https://support.apple.com/HT208222
- https://support.apple.com/HT208222
- https://support.apple.com/HT208223
- https://support.apple.com/HT208223
- https://support.apple.com/HT208224
- https://support.apple.com/HT208224
- https://support.apple.com/HT208225
- https://support.apple.com/HT208225
Package python-module-PyQt5 updated to version 5.9-alt4 for branch sisyphus in task 194117.
Closed bugs
Пакет не дособран
Package apache-commons-fileupload updated to version 1.3.3-alt1_2jpp8 for branch sisyphus in task 193833.
Closed vulnerabilities
BDU:2018-01429
Уязвимость класса DiskFileItem библиотеки Apache Commons FileUpload, позволяющая нарушителю выполнить произвольный код или осуществить манипулирование файлами в целевой системе
Modified: 2024-11-21
CVE-2016-1000031
Apache Commons FileUpload before 1.3.3 DiskFileItem File Manipulation Remote Code Execution
- openSUSE-SU-2019:1399
- openSUSE-SU-2019:1399
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- 93604
- 93604
- http://www.zerodayinitiative.com/advisories/ZDI-16-570/
- http://www.zerodayinitiative.com/advisories/ZDI-16-570/
- https://issues.apache.org/jira/browse/FILEUPLOAD-279
- https://issues.apache.org/jira/browse/FILEUPLOAD-279
- https://issues.apache.org/jira/browse/WW-4812
- https://issues.apache.org/jira/browse/WW-4812
- [lucene-solr-user] 20190104 Re: SOLR v7 Security Issues Caused Denial of Use - Sonatype Application Composition Report
- [lucene-solr-user] 20190104 Re: SOLR v7 Security Issues Caused Denial of Use - Sonatype Application Composition Report
- [announce] 20181105 [SECURITY] Immediately upgrade commons-fileupload to version 1.3.3 when running Struts 2.3.36 or prior
- [announce] 20181105 [SECURITY] Immediately upgrade commons-fileupload to version 1.3.3 when running Struts 2.3.36 or prior
- https://security.netapp.com/advisory/ntap-20190212-0001/
- https://security.netapp.com/advisory/ntap-20190212-0001/
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- https://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://www.oracle.com/technetwork/security-advisory/cpuoct2019-5072832.html
- https://www.tenable.com/security/research/tra-2016-12
- https://www.tenable.com/security/research/tra-2016-12
- https://www.tenable.com/security/research/tra-2016-23
- https://www.tenable.com/security/research/tra-2016-23
- https://www.tenable.com/security/research/tra-2016-30
- https://www.tenable.com/security/research/tra-2016-30