ALT-BU-2017-3581-1
Branch p8 update bulletin.
Package kde5-ksirk updated to version 17.12.0-alt2.M80P.1 for branch p8 in task 197384.
Closed bugs
Конфликт библиотек
Package thunderbird updated to version 52.5.2-alt0.M80P.1 for branch p8 in task 197450.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-7829
It is possible to spoof the sender's email address and display an arbitrary sender address to the email recipient. The real sender's address is not displayed if preceded by a null character in the display string. This vulnerability affects Thunderbird < 52.5.2.
- 102258
- 102258
- 1040123
- 1040123
- RHSA-2018:0061
- RHSA-2018:0061
- https://bugzilla.mozilla.org/show_bug.cgi?id=1423432
- https://bugzilla.mozilla.org/show_bug.cgi?id=1423432
- [debian-lts-announce] 20171227 [SECURITY] [DLA 1223-1] thunderbird security update
- [debian-lts-announce] 20171227 [SECURITY] [DLA 1223-1] thunderbird security update
- USN-3529-1
- USN-3529-1
- DSA-4075
- DSA-4075
- https://www.mozilla.org/security/advisories/mfsa2017-30/
- https://www.mozilla.org/security/advisories/mfsa2017-30/
Modified: 2024-11-21
CVE-2017-7846
It is possible to execute JavaScript in the parsed RSS feed when RSS feed is viewed as a website, e.g. via "View -> Feed article -> Website" or in the standard format of "View -> Feed article -> default format". This vulnerability affects Thunderbird < 52.5.2.
- 102258
- 102258
- 1040123
- 1040123
- RHSA-2018:0061
- RHSA-2018:0061
- https://bugzilla.mozilla.org/show_bug.cgi?id=1411716
- https://bugzilla.mozilla.org/show_bug.cgi?id=1411716
- [debian-lts-announce] 20171227 [SECURITY] [DLA 1223-1] thunderbird security update
- [debian-lts-announce] 20171227 [SECURITY] [DLA 1223-1] thunderbird security update
- DSA-4075
- DSA-4075
- https://www.mozilla.org/security/advisories/mfsa2017-30/
- https://www.mozilla.org/security/advisories/mfsa2017-30/
Modified: 2024-11-21
CVE-2017-7847
Crafted CSS in an RSS feed can leak and reveal local path strings, which may contain user name. This vulnerability affects Thunderbird < 52.5.2.
- 102258
- 102258
- 1040123
- 1040123
- RHSA-2018:0061
- RHSA-2018:0061
- https://bugzilla.mozilla.org/show_bug.cgi?id=1411708
- https://bugzilla.mozilla.org/show_bug.cgi?id=1411708
- [debian-lts-announce] 20171227 [SECURITY] [DLA 1223-1] thunderbird security update
- [debian-lts-announce] 20171227 [SECURITY] [DLA 1223-1] thunderbird security update
- DSA-4075
- DSA-4075
- https://www.mozilla.org/security/advisories/mfsa2017-30/
- https://www.mozilla.org/security/advisories/mfsa2017-30/
Modified: 2024-11-21
CVE-2017-7848
RSS fields can inject new lines into the created email structure, modifying the message body. This vulnerability affects Thunderbird < 52.5.2.
- 102258
- 102258
- 1040123
- 1040123
- RHSA-2018:0061
- RHSA-2018:0061
- https://bugzilla.mozilla.org/show_bug.cgi?id=1411699
- https://bugzilla.mozilla.org/show_bug.cgi?id=1411699
- [debian-lts-announce] 20171227 [SECURITY] [DLA 1223-1] thunderbird security update
- [debian-lts-announce] 20171227 [SECURITY] [DLA 1223-1] thunderbird security update
- DSA-4075
- DSA-4075
- https://www.mozilla.org/security/advisories/mfsa2017-30/
- https://www.mozilla.org/security/advisories/mfsa2017-30/
Closed bugs
включить описание хэш функции ГОСТ Р 34.11-2012 (Стрибог)
Package kernel-image-std-def updated to version 4.9.72-alt0.M80P.1 for branch p8 in task 197420.
Closed vulnerabilities
BDU:2018-00576
Уязвимость функции get_pipe ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2017-16912
The "get_pipe()" function (drivers/usb/usbip/stub_rx.c) in the Linux Kernel before version 4.14.8, 4.9.71, and 4.4.114 allows attackers to cause a denial of service (out-of-bounds read) via a specially crafted USB over IP packet.
- 102150
- 102150
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.8
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.8
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.114
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.114
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.71
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.9.71
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/drivers/usb/usbip?id=635f545a7e8be7596b9b2b6a43cab6bbd5a88e43
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux-stable.git/commit/drivers/usb/usbip?id=635f545a7e8be7596b9b2b6a43cab6bbd5a88e43
- [debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update
- [debian-lts-announce] 20180502 [SECURITY] [DLA 1369-1] linux security update
- https://secuniaresearch.flexerasoftware.com/advisories/77000/
- https://secuniaresearch.flexerasoftware.com/advisories/77000/
- https://secuniaresearch.flexerasoftware.com/secunia_research/2017-21/
- https://secuniaresearch.flexerasoftware.com/secunia_research/2017-21/
- USN-3619-1
- USN-3619-1
- USN-3619-2
- USN-3619-2
- USN-3754-1
- USN-3754-1
- DSA-4187
- DSA-4187
- https://www.spinics.net/lists/linux-usb/msg163480.html
- https://www.spinics.net/lists/linux-usb/msg163480.html
Modified: 2024-11-21
CVE-2017-16995
The check_alu_op function in kernel/bpf/verifier.c in the Linux kernel through 4.4 allows local users to cause a denial of service (memory corruption) or possibly have unspecified other impact by leveraging incorrect sign extension.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=95a762e2c8c942780948091f8f2a4f32fce1ac6f
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=95a762e2c8c942780948091f8f2a4f32fce1ac6f
- http://openwall.com/lists/oss-security/2017/12/21/2
- http://openwall.com/lists/oss-security/2017/12/21/2
- 102288
- 102288
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1454
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1454
- https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=a6132276ab5dcc38b3299082efeb25b948263adb
- https://git.kernel.org/pub/scm/linux/kernel/git/tip/tip.git/commit/?id=a6132276ab5dcc38b3299082efeb25b948263adb
- https://github.com/torvalds/linux/commit/95a762e2c8c942780948091f8f2a4f32fce1ac6f
- https://github.com/torvalds/linux/commit/95a762e2c8c942780948091f8f2a4f32fce1ac6f
- USN-3619-1
- USN-3619-1
- USN-3619-2
- USN-3619-2
- USN-3633-1
- USN-3633-1
- USN-3523-2
- USN-3523-2
- DSA-4073
- DSA-4073
- 44298
- 44298
- 45010
- 45010
- 45058
- 45058
Modified: 2024-11-21
CVE-2017-17863
kernel/bpf/verifier.c in the Linux kernel 4.9.x through 4.9.71 does not check the relationship between pointer values and the BPF stack, which allows local users to cause a denial of service (integer overflow or invalid memory access) or possibly have unspecified other impact.
- 102321
- 102321
- 1040058
- 1040058
- https://anonscm.debian.org/cgit/kernel/linux.git/tree/debian/patches/bugfix/all/bpf-reject-out-of-bounds-stack-pointer-calculation.patch?h=stretch-security
- https://anonscm.debian.org/cgit/kernel/linux.git/tree/debian/patches/bugfix/all/bpf-reject-out-of-bounds-stack-pointer-calculation.patch?h=stretch-security
- USN-3523-3
- USN-3523-3
- USN-3523-2
- USN-3523-2
- DSA-4073
- DSA-4073
- https://www.spinics.net/lists/stable/msg206985.html
- https://www.spinics.net/lists/stable/msg206985.html