ALT-BU-2018-3051-9
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-6560
In dbus-proxy/flatpak-proxy.c in Flatpak before 0.8.9, and 0.9.x and 0.10.x before 0.10.3, crafted D-Bus messages to the host can be used to break out of the sandbox, because whitespace handling in the proxy is not identical to whitespace handling in the daemon.
- RHSA-2018:2766
- RHSA-2018:2766
- https://github.com/flatpak/flatpak/commit/52346bf187b5a7f1c0fe9075b328b7ad6abe78f6
- https://github.com/flatpak/flatpak/commit/52346bf187b5a7f1c0fe9075b328b7ad6abe78f6
- https://github.com/flatpak/flatpak/releases/tag/0.10.3
- https://github.com/flatpak/flatpak/releases/tag/0.10.3
- https://github.com/flatpak/flatpak/releases/tag/0.8.9
- https://github.com/flatpak/flatpak/releases/tag/0.8.9
Closed bugs
/lib/systemd/user/dbus.{socket,service} not packaged
Package dotnet-bootstrap updated to version 2.0.5-alt1 for branch sisyphus in task 200274.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-0764
Microsoft .NET Framework 1.1, 2.0, 3.0, 3.5, 3.5.1, 4, 4.5, 4.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2 and 5.7 and .NET Core 1.0. 1.1 and 2.0 allow a denial of service vulnerability due to the way XML documents are processed, aka ".NET and .NET Core Denial Of Service Vulnerability". This CVE is unique from CVE-2018-0765.
Modified: 2024-11-21
CVE-2018-0786
Microsoft .NET Framework 2.0 SP2, 3.0 SP2, 3.5, 3.5.1, 4.5.2, 4.6, 4.6.1, 4.6.2, 4.7, 4.7.1, .NET Core 1.0 and 2.0, and PowerShell Core 6.0.0 allow a security feature bypass vulnerability due to the way certificates are validated, aka ".NET Security Feature Bypass Vulnerability."
Closed vulnerabilities
BDU:2016-01475
Уязвимость интерпретатора PHP, позволяющая нарушителю провести XXE- и XXL-атаки
BDU:2018-01489
Уязвимость функции gdImageCreateFromGifCtx библиотеки для создания и работы с программируемой графикой libgd2, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04386
Уязвимость на странице ошибки PHAR 404 интерпретатора языка программирования PHP, позволяющая нарушителю осуществлять межсайтовые сценарные атаки (XSS)
BDU:2022-02485
Уязвимость функции http_header_value (ext/standard/http_fopen_wrapper.c) интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2015-8866
ext/libxml/libxml.c in PHP before 5.5.22 and 5.6.x before 5.6.6, when PHP-FPM is used, does not isolate each thread from libxml_disable_entity_loader changes in other threads, which allows remote attackers to conduct XML External Entity (XXE) and XML Entity Expansion (XEE) attacks via a crafted XML document, a related issue to CVE-2015-5161.
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=de31324c221c1791b26350ba106cc26bad23ace9
- http://git.php.net/?p=php-src.git%3Ba=commit%3Bh=de31324c221c1791b26350ba106cc26bad23ace9
- openSUSE-SU-2016:1274
- openSUSE-SU-2016:1274
- SUSE-SU-2016:1277
- SUSE-SU-2016:1277
- openSUSE-SU-2016:1373
- openSUSE-SU-2016:1373
- RHSA-2016:2750
- RHSA-2016:2750
- [oss-security] 20160423 Re: CVE request: PHP issues fixed in 7.0.5, 5.6.20 and 5.5.34 releases
- [oss-security] 20160423 Re: CVE request: PHP issues fixed in 7.0.5, 5.6.20 and 5.5.34 releases
- http://www.php.net/ChangeLog-5.php
- http://www.php.net/ChangeLog-5.php
- 87470
- 87470
- USN-2952-1
- USN-2952-1
- USN-2952-2
- USN-2952-2
- https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1509817
- https://bugs.launchpad.net/ubuntu/+source/php5/+bug/1509817
- https://bugs.php.net/bug.php?id=64938
- https://bugs.php.net/bug.php?id=64938
Modified: 2024-11-21
CVE-2018-14884
An issue was discovered in PHP 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1. Inappropriately parsing an HTTP response leads to a segmentation fault because http_header_value in ext/standard/http_fopen_wrapper.c can be a NULL value that is mishandled in an atoi call.
Modified: 2024-11-21
CVE-2018-5711
gd_gif_in.c in the GD Graphics Library (aka libgd), as used in PHP before 5.6.33, 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1, has an integer signedness error that leads to an infinite loop via a crafted GIF file, as demonstrated by a call to the imagecreatefromgif or imagecreatefromstring PHP function. This is related to GetCode_ and gdImageCreateFromGifCtx.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- RHSA-2018:1296
- RHSA-2018:1296
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=75571
- https://bugs.php.net/bug.php?id=75571
- [debian-lts-announce] 20180119 [SECURITY] [DLA 1248-1] libgd2 security update
- [debian-lts-announce] 20180119 [SECURITY] [DLA 1248-1] libgd2 security update
- [debian-lts-announce] 20190130 [SECURITY] [DLA 1651-1] libgd2 security update
- [debian-lts-announce] 20190130 [SECURITY] [DLA 1651-1] libgd2 security update
- FEDORA-2020-e795f92d79
- FEDORA-2020-e795f92d79
- GLSA-201903-18
- GLSA-201903-18
- USN-3755-1
- USN-3755-1
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
Modified: 2024-11-21
CVE-2018-5712
An issue was discovered in PHP before 5.6.33, 7.0.x before 7.0.27, 7.1.x before 7.1.13, and 7.2.x before 7.2.1. There is Reflected XSS on the PHAR 404 error page via the URI of a request for a .phar file.
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-7.php
- 102742
- 102742
- 104020
- 104020
- 1040363
- 1040363
- RHSA-2018:1296
- RHSA-2018:1296
- RHSA-2019:2519
- RHSA-2019:2519
- https://bugs.php.net/bug.php?id=74782
- https://bugs.php.net/bug.php?id=74782
- [debian-lts-announce] 20180120 [SECURITY] [DLA 1251-1] php5 security update
- [debian-lts-announce] 20180120 [SECURITY] [DLA 1251-1] php5 security update
- USN-3566-1
- USN-3566-1
- USN-3600-1
- USN-3600-1
- USN-3600-2
- USN-3600-2
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html