ALT-BU-2018-3020-1
Branch sisyphus update bulletin.
Closed bugs
перенести библиотеку в /lib/
Closed vulnerabilities
Modified: 2025-04-11
CVE-2011-4612
icecast before 2.3.3 allows remote attackers to inject control characters such as newlines into the error loc (error.log) via a crafted URL.
- http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090668.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090695.html
- http://www.icecast.org/
- https://bugzilla.redhat.com/show_bug.cgi?id=768176
- http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090668.html
- http://lists.fedoraproject.org/pipermail/package-announce/2012-October/090695.html
- http://www.icecast.org/
- https://bugzilla.redhat.com/show_bug.cgi?id=768176
Modified: 2025-04-12
CVE-2014-9018
Icecast before 2.4.1 transmits the output of the on-connect script, which might allow remote attackers to obtain sensitive information, related to shared file descriptors.
- http://icecast.org/news/icecast-release-2_4_1/
- http://lists.opensuse.org/opensuse-updates/2014-12/msg00038.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:231
- http://www.openwall.com/lists/oss-security/2014/11/19/23
- http://www.openwall.com/lists/oss-security/2014/11/20/22
- http://www.securityfocus.com/bid/71312
- https://exchange.xforce.ibmcloud.com/vulnerabilities/98991
- https://trac.xiph.org/ticket/2087
- https://trac.xiph.org/ticket/2089
- http://icecast.org/news/icecast-release-2_4_1/
- http://lists.opensuse.org/opensuse-updates/2014-12/msg00038.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:231
- http://www.openwall.com/lists/oss-security/2014/11/19/23
- http://www.openwall.com/lists/oss-security/2014/11/20/22
- http://www.securityfocus.com/bid/71312
- https://exchange.xforce.ibmcloud.com/vulnerabilities/98991
- https://trac.xiph.org/ticket/2087
- https://trac.xiph.org/ticket/2089
Modified: 2025-04-12
CVE-2014-9091
Icecast before 2.4.0 does not change the supplementary group privileges when
- http://icecast.org/news/icecast-release-2_4_0/
- http://lists.opensuse.org/opensuse-updates/2014-12/msg00037.html
- http://seclists.org/oss-sec/2014/q4/794
- http://seclists.org/oss-sec/2014/q4/802
- https://bugzilla.redhat.com/show_bug.cgi?id=1168146
- https://trac.xiph.org/changeset/19137/
- http://icecast.org/news/icecast-release-2_4_0/
- http://lists.opensuse.org/opensuse-updates/2014-12/msg00037.html
- http://seclists.org/oss-sec/2014/q4/794
- http://seclists.org/oss-sec/2014/q4/802
- https://bugzilla.redhat.com/show_bug.cgi?id=1168146
- https://trac.xiph.org/changeset/19137/
Modified: 2025-04-12
CVE-2015-3026
Icecast before 2.4.2, when a stream_auth handler is defined for URL authentication, allows remote attackers to cause a denial of service (NULL pointer dereference and crash) via a request without login credentials, as demonstrated by a request to "admin/killsource?mount=/test.ogg."
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163859.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164061.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164074.html
- http://lists.opensuse.org/opensuse-updates/2015-04/msg00030.html
- http://lists.xiph.org/pipermail/icecast-dev/2015-April/002460.html
- http://www.debian.org/security/2015/dsa-3239
- http://www.openwall.com/lists/oss-security/2015/04/08/11
- http://www.openwall.com/lists/oss-security/2015/04/08/8
- http://www.securityfocus.com/bid/73965
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=782120
- https://security.gentoo.org/glsa/201508-03
- https://trac.xiph.org/changeset/27abfbbd688df3e3077b535997330aa06603250f/icecast-server
- https://trac.xiph.org/ticket/2191
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/163859.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164061.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-August/164074.html
- http://lists.opensuse.org/opensuse-updates/2015-04/msg00030.html
- http://lists.xiph.org/pipermail/icecast-dev/2015-April/002460.html
- http://www.debian.org/security/2015/dsa-3239
- http://www.openwall.com/lists/oss-security/2015/04/08/11
- http://www.openwall.com/lists/oss-security/2015/04/08/8
- http://www.securityfocus.com/bid/73965
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=782120
- https://security.gentoo.org/glsa/201508-03
- https://trac.xiph.org/changeset/27abfbbd688df3e3077b535997330aa06603250f/icecast-server
- https://trac.xiph.org/ticket/2191
Package firefox-esr updated to version 52.6.0-alt1 for branch sisyphus in task 198095.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-5096
A use-after-free vulnerability can occur while editing events in form elements on a page, resulting in a potentially exploitable crash. This vulnerability affects Firefox ESR < 52.6 and Thunderbird < 52.6.
- http://www.securityfocus.com/bid/102771
- https://access.redhat.com/errata/RHSA-2018:0122
- https://access.redhat.com/errata/RHSA-2018:0262
- https://bugzilla.mozilla.org/show_bug.cgi?id=1418922
- https://lists.debian.org/debian-lts-announce/2018/01/msg00030.html
- https://lists.debian.org/debian-lts-announce/2018/01/msg00036.html
- https://www.debian.org/security/2018/dsa-4096
- https://www.debian.org/security/2018/dsa-4102
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-04/
- http://www.securityfocus.com/bid/102771
- https://access.redhat.com/errata/RHSA-2018:0122
- https://access.redhat.com/errata/RHSA-2018:0262
- https://bugzilla.mozilla.org/show_bug.cgi?id=1418922
- https://lists.debian.org/debian-lts-announce/2018/01/msg00030.html
- https://lists.debian.org/debian-lts-announce/2018/01/msg00036.html
- https://www.debian.org/security/2018/dsa-4096
- https://www.debian.org/security/2018/dsa-4102
- https://www.mozilla.org/security/advisories/mfsa2018-03/
- https://www.mozilla.org/security/advisories/mfsa2018-04/
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-5345
A stack-based buffer overflow within GNOME gcab through 0.7.4 can be exploited by malicious attackers to cause a crash or, potentially, execute arbitrary code via a crafted .cab file.
- https://access.redhat.com/errata/RHSA-2018:0350
- https://bugzilla.redhat.com/show_bug.cgi?id=1527296
- https://usn.ubuntu.com/3546-1/
- https://www.debian.org/security/2018/dsa-4095
- https://access.redhat.com/errata/RHSA-2018:0350
- https://bugzilla.redhat.com/show_bug.cgi?id=1527296
- https://usn.ubuntu.com/3546-1/
- https://www.debian.org/security/2018/dsa-4095
Closed vulnerabilities
Modified: 2025-04-20
CVE-2017-15088
plugins/preauth/pkinit/pkinit_crypto_openssl.c in MIT Kerberos 5 (aka krb5) through 1.15.2 mishandles Distinguished Name (DN) fields, which allows remote attackers to execute arbitrary code or cause a denial of service (buffer overflow and application crash) in situations involving untrusted X.509 data, related to the get_matching_data and X509_NAME_oneline_ex functions. NOTE: this has security relevance only in use cases outside of the MIT Kerberos distribution, e.g., the use of get_matching_data in KDC certauth plugin code that is specific to Red Hat.
- http://www.securityfocus.com/bid/101594
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698
- https://bugzilla.redhat.com/show_bug.cgi?id=1504045
- https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4
- https://github.com/krb5/krb5/pull/707
- http://www.securityfocus.com/bid/101594
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=871698
- https://bugzilla.redhat.com/show_bug.cgi?id=1504045
- https://github.com/krb5/krb5/commit/fbb687db1088ddd894d975996e5f6a4252b9a2b4
- https://github.com/krb5/krb5/pull/707