ALT-BU-2017-3502-1
Branch sisyphus update bulletin.
Closed bugs
Не работает при запуске из меню
Scilab собран без справки
Closed vulnerabilities
BDU:2016-01507
Уязвимость библиотеки XLST-преобразований LibXLST, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2016-01508
Уязвимость библиотеки XLST-преобразований LibXLST, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
Modified: 2024-11-21
CVE-2015-7995
The xsltStylePreCompute function in preproc.c in libxslt 1.1.28 does not check if the parent node is an element, which allows attackers to cause a denial of service via a crafted XML file, related to a "type confusion" issue.
- APPLE-SA-2016-01-19-1
- APPLE-SA-2016-01-19-1
- APPLE-SA-2016-01-19-2
- APPLE-SA-2016-01-19-2
- APPLE-SA-2016-01-25-1
- APPLE-SA-2016-01-25-1
- APPLE-SA-2016-03-21-2
- APPLE-SA-2016-03-21-2
- openSUSE-SU-2016:1439
- openSUSE-SU-2016:1439
- DSA-3605
- DSA-3605
- [oss-security] 20151027 CVE request: libxslt xsltStylePreCompute() type confusion DoS
- [oss-security] 20151027 CVE request: libxslt xsltStylePreCompute() type confusion DoS
- [oss-security] 20151028 Re: CVE request: libxslt xsltStylePreCompute() type confusion DoS
- [oss-security] 20151028 Re: CVE request: libxslt xsltStylePreCompute() type confusion DoS
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- 77325
- 77325
- 1034736
- 1034736
- 1038623
- 1038623
- SSA:2016-148-02
- SSA:2016-148-02
- https://bugzilla.redhat.com/show_bug.cgi?id=1257962
- https://bugzilla.redhat.com/show_bug.cgi?id=1257962
- https://git.gnome.org/browse/libxslt/commit/?id=7ca19df892ca22d9314e95d59ce2abdeff46b617
- https://git.gnome.org/browse/libxslt/commit/?id=7ca19df892ca22d9314e95d59ce2abdeff46b617
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05111017
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158380
- https://puppet.com/security/cve/cve-2015-7995
- https://puppet.com/security/cve/cve-2015-7995
- https://support.apple.com/HT205729
- https://support.apple.com/HT205729
- https://support.apple.com/HT205731
- https://support.apple.com/HT205731
- https://support.apple.com/HT205732
- https://support.apple.com/HT205732
- https://support.apple.com/HT206168
- https://support.apple.com/HT206168
Modified: 2024-11-21
CVE-2015-9019
In libxslt 1.1.29 and earlier, the EXSLT math.random function was not initialized with a random seed during startup, which could cause usage of this function to produce predictable outputs.
Modified: 2024-11-21
CVE-2016-1683
numbers.c in libxslt before 1.1.29, as used in Google Chrome before 51.0.2704.63, mishandles namespace nodes, which allows remote attackers to cause a denial of service (out-of-bounds heap memory access) or possibly have unspecified other impact via a crafted document.
- http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html
- http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html
- APPLE-SA-2016-07-18-1
- APPLE-SA-2016-07-18-1
- APPLE-SA-2016-07-18-2
- APPLE-SA-2016-07-18-2
- APPLE-SA-2016-07-18-3
- APPLE-SA-2016-07-18-3
- APPLE-SA-2016-07-18-4
- APPLE-SA-2016-07-18-4
- APPLE-SA-2016-07-18-6
- APPLE-SA-2016-07-18-6
- openSUSE-SU-2016:1430
- openSUSE-SU-2016:1430
- openSUSE-SU-2016:1433
- openSUSE-SU-2016:1433
- openSUSE-SU-2016:1496
- openSUSE-SU-2016:1496
- DSA-3590
- DSA-3590
- DSA-3605
- DSA-3605
- 90876
- 90876
- 91826
- 91826
- 1035981
- 1035981
- USN-2992-1
- USN-2992-1
- RHSA-2016:1190
- RHSA-2016:1190
- https://bugzilla.redhat.com/show_bug.cgi?id=1340016
- https://bugzilla.redhat.com/show_bug.cgi?id=1340016
- https://crbug.com/583156
- https://crbug.com/583156
- https://git.gnome.org/browse/libxslt/commit/?id=d182d8f6ba3071503d96ce17395c9d55871f0242
- https://git.gnome.org/browse/libxslt/commit/?id=d182d8f6ba3071503d96ce17395c9d55871f0242
- FEDORA-2019-320d5295fc
- FEDORA-2019-320d5295fc
- GLSA-201607-07
- GLSA-201607-07
- https://support.apple.com/HT206899
- https://support.apple.com/HT206899
- https://support.apple.com/HT206901
- https://support.apple.com/HT206901
- https://support.apple.com/HT206902
- https://support.apple.com/HT206902
- https://support.apple.com/HT206903
- https://support.apple.com/HT206903
- https://support.apple.com/HT206904
- https://support.apple.com/HT206904
- https://support.apple.com/HT206905
- https://support.apple.com/HT206905
Modified: 2024-11-21
CVE-2016-1684
numbers.c in libxslt before 1.1.29, as used in Google Chrome before 51.0.2704.63, mishandles the i format token for xsl:number data, which allows remote attackers to cause a denial of service (integer overflow or resource consumption) or possibly have unspecified other impact via a crafted document.
- http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html
- http://googlechromereleases.blogspot.com/2016/05/stable-channel-update_25.html
- APPLE-SA-2016-07-18-1
- APPLE-SA-2016-07-18-1
- APPLE-SA-2016-07-18-2
- APPLE-SA-2016-07-18-2
- APPLE-SA-2016-07-18-3
- APPLE-SA-2016-07-18-3
- APPLE-SA-2016-07-18-4
- APPLE-SA-2016-07-18-4
- APPLE-SA-2016-07-18-6
- APPLE-SA-2016-07-18-6
- openSUSE-SU-2016:1430
- openSUSE-SU-2016:1430
- openSUSE-SU-2016:1433
- openSUSE-SU-2016:1433
- openSUSE-SU-2016:1496
- openSUSE-SU-2016:1496
- DSA-3590
- DSA-3590
- DSA-3605
- DSA-3605
- 90876
- 90876
- 1035981
- 1035981
- USN-2992-1
- USN-2992-1
- RHSA-2016:1190
- RHSA-2016:1190
- https://bugzilla.redhat.com/show_bug.cgi?id=1340017
- https://bugzilla.redhat.com/show_bug.cgi?id=1340017
- https://crbug.com/583171
- https://crbug.com/583171
- https://git.gnome.org/browse/libxslt/commit/?id=91d0540ac9beaa86719a05b749219a69baa0dd8d
- https://git.gnome.org/browse/libxslt/commit/?id=91d0540ac9beaa86719a05b749219a69baa0dd8d
- FEDORA-2019-320d5295fc
- FEDORA-2019-320d5295fc
- GLSA-201607-07
- GLSA-201607-07
- https://support.apple.com/HT206899
- https://support.apple.com/HT206899
- https://support.apple.com/HT206901
- https://support.apple.com/HT206901
- https://support.apple.com/HT206902
- https://support.apple.com/HT206902
- https://support.apple.com/HT206903
- https://support.apple.com/HT206903
- https://support.apple.com/HT206904
- https://support.apple.com/HT206904
- https://support.apple.com/HT206905
- https://support.apple.com/HT206905
Modified: 2024-11-21
CVE-2016-4607
libxslt in Apple iOS before 9.3.3, OS X before 10.11.6, iTunes before 12.4.2 on Windows, iCloud before 5.2.1 on Windows, tvOS before 9.2.2, and watchOS before 2.2.2 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors, a different vulnerability than CVE-2016-4608, CVE-2016-4609, CVE-2016-4610, and CVE-2016-4612.
- APPLE-SA-2016-07-18-1
- APPLE-SA-2016-07-18-1
- APPLE-SA-2016-07-18-2
- APPLE-SA-2016-07-18-2
- APPLE-SA-2016-07-18-3
- APPLE-SA-2016-07-18-3
- APPLE-SA-2016-07-18-4
- APPLE-SA-2016-07-18-4
- APPLE-SA-2016-07-18-6
- APPLE-SA-2016-07-18-6
- 91834
- 91834
- 1036348
- 1036348
- FEDORA-2019-320d5295fc
- FEDORA-2019-320d5295fc
- https://support.apple.com/HT206899
- https://support.apple.com/HT206899
- https://support.apple.com/HT206901
- https://support.apple.com/HT206901
- https://support.apple.com/HT206902
- https://support.apple.com/HT206902
- https://support.apple.com/HT206903
- https://support.apple.com/HT206903
- https://support.apple.com/HT206904
- https://support.apple.com/HT206904
- https://support.apple.com/HT206905
- https://support.apple.com/HT206905
Modified: 2024-11-21
CVE-2016-4609
libxslt in Apple iOS before 9.3.3, OS X before 10.11.6, iTunes before 12.4.2 on Windows, iCloud before 5.2.1 on Windows, tvOS before 9.2.2, and watchOS before 2.2.2 allows remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors, a different vulnerability than CVE-2016-4607, CVE-2016-4608, CVE-2016-4610, and CVE-2016-4612.
- APPLE-SA-2016-07-18-1
- APPLE-SA-2016-07-18-1
- APPLE-SA-2016-07-18-2
- APPLE-SA-2016-07-18-2
- APPLE-SA-2016-07-18-3
- APPLE-SA-2016-07-18-3
- APPLE-SA-2016-07-18-4
- APPLE-SA-2016-07-18-4
- APPLE-SA-2016-07-18-6
- APPLE-SA-2016-07-18-6
- 91826
- 91826
- 1036348
- 1036348
- [debian-lts-announce] 20190722 [SECURITY] [DLA 1860-1] libxslt security update
- [debian-lts-announce] 20190722 [SECURITY] [DLA 1860-1] libxslt security update
- FEDORA-2019-320d5295fc
- FEDORA-2019-320d5295fc
- https://support.apple.com/HT206899
- https://support.apple.com/HT206899
- https://support.apple.com/HT206901
- https://support.apple.com/HT206901
- https://support.apple.com/HT206902
- https://support.apple.com/HT206902
- https://support.apple.com/HT206903
- https://support.apple.com/HT206903
- https://support.apple.com/HT206904
- https://support.apple.com/HT206904
- https://support.apple.com/HT206905
- https://support.apple.com/HT206905
Modified: 2024-11-21
CVE-2017-5029
The xsltAddTextString function in transform.c in libxslt 1.1.29, as used in Blink in Google Chrome prior to 57.0.2987.98 for Mac, Windows, and Linux and 57.0.2987.108 for Android, lacked a check for integer overflow during a size calculation, which allowed a remote attacker to perform an out of bounds memory write via a crafted HTML page.
- RHSA-2017:0499
- RHSA-2017:0499
- DSA-3810
- DSA-3810
- 96767
- 96767
- 1038157
- 1038157
- https://chromereleases.googleblog.com/2017/03/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2017/03/stable-channel-update-for-desktop.html
- https://crbug.com/676623
- https://crbug.com/676623
- https://git.gnome.org/browse/libxslt/commit/?id=08ab2774b870de1c7b5a48693df75e8154addae5
- https://git.gnome.org/browse/libxslt/commit/?id=08ab2774b870de1c7b5a48693df75e8154addae5
Closed bugs
[FR] обновить до 1.1.29
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-11368
In MIT Kerberos 5 (aka krb5) 1.7 and later, an authenticated attacker can cause a KDC assertion failure by sending invalid S4U2Self or S4U2Proxy requests.
Modified: 2024-11-21
CVE-2017-11462
Double free vulnerability in MIT Kerberos 5 (aka krb5) allows attackers to have unspecified impact via vectors involving automatic deletion of security contexts on error.
- http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598
- http://krbdev.mit.edu/rt/Ticket/Display.html?id=8598
- https://bugzilla.redhat.com/show_bug.cgi?id=1488873
- https://bugzilla.redhat.com/show_bug.cgi?id=1488873
- https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf
- https://github.com/krb5/krb5/commit/56f7b1bc95a2a3eeb420e069e7655fb181ade5cf
- FEDORA-2017-10c74147f9
- FEDORA-2017-10c74147f9
Package firefox-esr updated to version 52.5.0-alt1 for branch sisyphus in task 194705.
Closed vulnerabilities
BDU:2018-00159
Уязвимость реализации протокола TLS 1.2 браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-00023
Уязвимость интерфейса Resource Timing API браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2021-00024
Уязвимость реализации объекта «PressShell» браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-00051
Уязвимость браузеров Firefox, Firefox ESR и почтового клиента Thunderbird, связанная c выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2017-7805
During TLS 1.2 exchanges, handshake hashes are generated which point to a message buffer. This saved data is used for later messages but in some cases, the handshake transcript can exceed the space available in the current buffer, causing the allocation of a new buffer. This leaves a pointer pointing to the old, freed buffer, resulting in a use-after-free when handshake hashes are then calculated afterwards. This can result in a potentially exploitable crash. This vulnerability affects Firefox < 56, Firefox ESR < 52.4, and Thunderbird < 52.4.
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2018-4428296.html
- 101059
- 101059
- 1039465
- 1039465
- RHSA-2017:2832
- RHSA-2017:2832
- https://bugzilla.mozilla.org/show_bug.cgi?id=1377618
- https://bugzilla.mozilla.org/show_bug.cgi?id=1377618
- [debian-lts-announce] 20171101 [SECURITY] [DLA 1153-1] icedove/thunderbird security update
- [debian-lts-announce] 20171101 [SECURITY] [DLA 1153-1] icedove/thunderbird security update
- GLSA-201803-14
- GLSA-201803-14
- DSA-3987
- DSA-3987
- DSA-3998
- DSA-3998
- DSA-4014
- DSA-4014
- https://www.mozilla.org/security/advisories/mfsa2017-21/
- https://www.mozilla.org/security/advisories/mfsa2017-21/
- https://www.mozilla.org/security/advisories/mfsa2017-22/
- https://www.mozilla.org/security/advisories/mfsa2017-22/
- https://www.mozilla.org/security/advisories/mfsa2017-23/
- https://www.mozilla.org/security/advisories/mfsa2017-23/
Modified: 2024-11-21
CVE-2017-7826
Memory safety bugs were reported in Firefox 56 and Firefox ESR 52.4. Some of these bugs showed evidence of memory corruption and we presume that with enough effort that some of these could be exploited to run arbitrary code. This vulnerability affects Firefox < 57, Firefox ESR < 52.5, and Thunderbird < 52.5.
- 101832
- 101832
- 1039803
- 1039803
- RHSA-2017:3247
- RHSA-2017:3247
- RHSA-2017:3372
- RHSA-2017:3372
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1394530%2C1369561%2C1411458%2C1400003%2C1395138%2C1408412%2C1393840%2C1400763%2C1339259%2C1394265%2C1407740%2C1407751%2C1408005%2C1406398%2C1387799%2C1261175%2C1400554%2C1375146%2C1397811%2C1404636%2C1401804
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1394530%2C1369561%2C1411458%2C1400003%2C1395138%2C1408412%2C1393840%2C1400763%2C1339259%2C1394265%2C1407740%2C1407751%2C1408005%2C1406398%2C1387799%2C1261175%2C1400554%2C1375146%2C1397811%2C1404636%2C1401804
- [debian-lts-announce] 20171115 [SECURITY] [DLA 1172-1] firefox-esr security update
- [debian-lts-announce] 20171115 [SECURITY] [DLA 1172-1] firefox-esr security update
- [debian-lts-announce] 20171209 [SECURITY] [DLA 1199-1] thunderbird security update
- [debian-lts-announce] 20171209 [SECURITY] [DLA 1199-1] thunderbird security update
- USN-3688-1
- USN-3688-1
- DSA-4035
- DSA-4035
- DSA-4061
- DSA-4061
- DSA-4075
- DSA-4075
- https://www.mozilla.org/security/advisories/mfsa2017-24/
- https://www.mozilla.org/security/advisories/mfsa2017-24/
- https://www.mozilla.org/security/advisories/mfsa2017-25/
- https://www.mozilla.org/security/advisories/mfsa2017-25/
- https://www.mozilla.org/security/advisories/mfsa2017-26/
- https://www.mozilla.org/security/advisories/mfsa2017-26/
Modified: 2024-11-21
CVE-2017-7828
A use-after-free vulnerability can occur when flushing and resizing layout because the "PressShell" object has been freed while still in use. This results in a potentially exploitable crash during these operations. This vulnerability affects Firefox < 57, Firefox ESR < 52.5, and Thunderbird < 52.5.
- 101832
- 101832
- 1039803
- 1039803
- RHSA-2017:3247
- RHSA-2017:3247
- RHSA-2017:3372
- RHSA-2017:3372
- https://bugzilla.mozilla.org/show_bug.cgi?id=1406750
- https://bugzilla.mozilla.org/show_bug.cgi?id=1406750
- https://bugzilla.mozilla.org/show_bug.cgi?id=1412252
- https://bugzilla.mozilla.org/show_bug.cgi?id=1412252
- [debian-lts-announce] 20171115 [SECURITY] [DLA 1172-1] firefox-esr security update
- [debian-lts-announce] 20171115 [SECURITY] [DLA 1172-1] firefox-esr security update
- [debian-lts-announce] 20171209 [SECURITY] [DLA 1199-1] thunderbird security update
- [debian-lts-announce] 20171209 [SECURITY] [DLA 1199-1] thunderbird security update
- DSA-4035
- DSA-4035
- DSA-4061
- DSA-4061
- DSA-4075
- DSA-4075
- https://www.mozilla.org/security/advisories/mfsa2017-24/
- https://www.mozilla.org/security/advisories/mfsa2017-24/
- https://www.mozilla.org/security/advisories/mfsa2017-25/
- https://www.mozilla.org/security/advisories/mfsa2017-25/
- https://www.mozilla.org/security/advisories/mfsa2017-26/
- https://www.mozilla.org/security/advisories/mfsa2017-26/
Modified: 2024-11-21
CVE-2017-7830
The Resource Timing API incorrectly revealed navigations in cross-origin iframes. This is a same-origin policy violation and could allow for data theft of URLs loaded by users. This vulnerability affects Firefox < 57, Firefox ESR < 52.5, and Thunderbird < 52.5.
- 101832
- 101832
- 1039803
- 1039803
- RHSA-2017:3247
- RHSA-2017:3247
- RHSA-2017:3372
- RHSA-2017:3372
- https://bugzilla.mozilla.org/show_bug.cgi?id=1408990
- https://bugzilla.mozilla.org/show_bug.cgi?id=1408990
- [debian-lts-announce] 20171115 [SECURITY] [DLA 1172-1] firefox-esr security update
- [debian-lts-announce] 20171115 [SECURITY] [DLA 1172-1] firefox-esr security update
- [debian-lts-announce] 20171209 [SECURITY] [DLA 1199-1] thunderbird security update
- [debian-lts-announce] 20171209 [SECURITY] [DLA 1199-1] thunderbird security update
- DSA-4035
- DSA-4035
- DSA-4061
- DSA-4061
- DSA-4075
- DSA-4075
- https://www.mozilla.org/security/advisories/mfsa2017-24/
- https://www.mozilla.org/security/advisories/mfsa2017-24/
- https://www.mozilla.org/security/advisories/mfsa2017-25/
- https://www.mozilla.org/security/advisories/mfsa2017-25/
- https://www.mozilla.org/security/advisories/mfsa2017-26/
- https://www.mozilla.org/security/advisories/mfsa2017-26/
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-18635
An XSS vulnerability was discovered in noVNC before 0.6.2 in which the remote VNC server could inject arbitrary HTML into the noVNC web page via the messages propagated to the status field, such as the VNC server name.
- RHSA-2020:0754
- RHSA-2020:0754
- https://bugs.launchpad.net/horizon/+bug/1656435
- https://bugs.launchpad.net/horizon/+bug/1656435
- https://github.com/novnc/noVNC/commit/6048299a138e078aed210f163111698c8c526a13#diff-286f7dc7b881e942e97cd50c10898f03L534
- https://github.com/novnc/noVNC/commit/6048299a138e078aed210f163111698c8c526a13#diff-286f7dc7b881e942e97cd50c10898f03L534
- https://github.com/novnc/noVNC/issues/748
- https://github.com/novnc/noVNC/issues/748
- https://github.com/novnc/noVNC/releases/tag/v0.6.2
- https://github.com/novnc/noVNC/releases/tag/v0.6.2
- https://github.com/ShielderSec/cve-2017-18635
- https://github.com/ShielderSec/cve-2017-18635
- [debian-lts-announce] 20191005 [SECURITY] [DLA 1946-1] novnc security update
- [debian-lts-announce] 20191005 [SECURITY] [DLA 1946-1] novnc security update
- [debian-lts-announce] 20211228 [SECURITY] [DLA 2854-1] novnc security update
- [debian-lts-announce] 20211228 [SECURITY] [DLA 2854-1] novnc security update
- USN-4522-1
- USN-4522-1
- https://www.shielder.it/blog/exploiting-an-old-novnc-xss-cve-2017-18635-in-openstack/
- https://www.shielder.it/blog/exploiting-an-old-novnc-xss-cve-2017-18635-in-openstack/