ALT-BU-2018-3020-1
Branch sisyphus update bulletin.
Closed bugs
перенести библиотеку в /lib/
Closed vulnerabilities
Modified: 2024-11-21
CVE-2011-4612
icecast before 2.3.3 allows remote attackers to inject control characters such as newlines into the error loc (error.log) via a crafted URL.
Modified: 2024-11-21
CVE-2014-9018
Icecast before 2.4.1 transmits the output of the on-connect script, which might allow remote attackers to obtain sensitive information, related to shared file descriptors.
- http://icecast.org/news/icecast-release-2_4_1/
- http://icecast.org/news/icecast-release-2_4_1/
- openSUSE-SU-2014:1593
- openSUSE-SU-2014:1593
- MDVSA-2014:231
- MDVSA-2014:231
- [oss-security] 20141120 CVE request: icecast: possible leak of on-connect scripts
- [oss-security] 20141120 CVE request: icecast: possible leak of on-connect scripts
- [oss-security] 20141120 Re: CVE request: icecast: possible leak of on-connect scripts
- [oss-security] 20141120 Re: CVE request: icecast: possible leak of on-connect scripts
- 71312
- 71312
- icecast-cve20149091-priv-esc(98991)
- icecast-cve20149091-priv-esc(98991)
- https://trac.xiph.org/ticket/2087
- https://trac.xiph.org/ticket/2087
- https://trac.xiph.org/ticket/2089
- https://trac.xiph.org/ticket/2089
Modified: 2024-11-21
CVE-2014-9091
Icecast before 2.4.0 does not change the supplementary group privileges when
- http://icecast.org/news/icecast-release-2_4_0/
- http://icecast.org/news/icecast-release-2_4_0/
- openSUSE-SU-2014:1591
- openSUSE-SU-2014:1591
- [oss-security] 20141125 Re: Re: CVE request: icecast: possible leak of on-connect scripts
- [oss-security] 20141125 Re: Re: CVE request: icecast: possible leak of on-connect scripts
- [oss-security] 20141126 Re: CVE request: icecast: possible leak of on-connect scripts
- [oss-security] 20141126 Re: CVE request: icecast: possible leak of on-connect scripts
- https://bugzilla.redhat.com/show_bug.cgi?id=1168146
- https://bugzilla.redhat.com/show_bug.cgi?id=1168146
- https://trac.xiph.org/changeset/19137/
- https://trac.xiph.org/changeset/19137/
Modified: 2024-11-21
CVE-2015-3026
Icecast before 2.4.2, when a stream_auth handler is defined for URL authentication, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a request without login credentials, as demonstrated by a request to "admin/killsource?mount=/test.ogg."
- FEDORA-2015-13106
- FEDORA-2015-13106
- FEDORA-2015-13077
- FEDORA-2015-13077
- FEDORA-2015-13083
- FEDORA-2015-13083
- openSUSE-SU-2015:0728
- openSUSE-SU-2015:0728
- [Icecast-dev] 20150408 Icecast 2.4.2 - security release
- [Icecast-dev] 20150408 Icecast 2.4.2 - security release
- DSA-3239
- DSA-3239
- [oss-security] 20150408 Re: CVE Request for Icecast 2.3.3, 2.4.0, 2.4.1, fixed in 2.4.2
- [oss-security] 20150408 Re: CVE Request for Icecast 2.3.3, 2.4.0, 2.4.1, fixed in 2.4.2
- [oss-security] 20150408 CVE Request for Icecast 2.3.3, 2.4.0, 2.4.1, fixed in 2.4.2
- [oss-security] 20150408 CVE Request for Icecast 2.3.3, 2.4.0, 2.4.1, fixed in 2.4.2
- 73965
- 73965
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=782120
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=782120
- GLSA-201508-03
- GLSA-201508-03
- https://trac.xiph.org/changeset/27abfbbd688df3e3077b535997330aa06603250f/icecast-server
- https://trac.xiph.org/changeset/27abfbbd688df3e3077b535997330aa06603250f/icecast-server
- https://trac.xiph.org/ticket/2191
- https://trac.xiph.org/ticket/2191
Package firefox-esr updated to version 52.6.0-alt1 for branch sisyphus in task 198095.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-5096
A use-after-free vulnerability can occur while editing events in form elements on a page, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR < 52.6 and Thunderbird < 52.6.
- 102771
- 102771
- RHSA-2018:0122
- RHSA-2018:0122
- RHSA-2018:0262
- RHSA-2018:0262
- https://bugzilla.mozilla.org/show_bug.cgi?id=1418922
- https://bugzilla.mozilla.org/show_bug.cgi?id=1418922
- [debian-lts-announce] 20180124 [SECURITY] [DLA 1256-1] firefox-esr security update
- [debian-lts-announce] 20180124 [SECURITY] [DLA 1256-1] firefox-esr security update
- [debian-lts-announce] 20180129 [SECURITY] [DLA 1262-1] thunderbird security update
- [debian-lts-announce] 20180129 [SECURITY] [DLA 1262-1] thunderbird security update
- DSA-4096
- DSA-4096
- DSA-4102
- DSA-4102
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-04/
- https://www.mozilla.org/security/advisories/mfsa2018-04/
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-5345
A stack-based buffer overflow within GNOME gcab through 0.7.4 can be exploited by malicious attackers to cause a crash or, potentially, execute arbitrary code via a crafted .cab file.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-15088
plugins/preauth/pkinit/pkinit_crypto_openssl.c in MIT Kerberos 5 (aka krb5) through 1.15.2 mishandles Distinguished Name (DN) fields, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) in situations involving untrusted X.509 data, related to the get_matching_data and X509_NAME_oneline_ex functions. NOTE: this has security relevance only in use cases outside of the MIT Kerberos distribution, e.g., the use of get_matching_data in KDC certauth plugin code that is specific to Red Hat.
- 101594
- 101594
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698
- https://bugzilla.redhat.com/show_bug.cgi?id=1504045
- https://bugzilla.redhat.com/show_bug.cgi?id=1504045
- https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4
- https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4
- https://github.com/krb5/krb5/pull/707
- https://github.com/krb5/krb5/pull/707