ALT-BU-2018-3113-1
Branch p8 update bulletin.
Package libunistring2 updated to version 0.9.8-alt0.M80P.1 for branch p8 in task 201190.
Closed bugs
libunistring: new version
Closed vulnerabilities
BDU:2017-02409
Уязвимость функции decode_digit (puny_decode.c) библиотеки Libidn2, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2017-02410
Уязвимость функции _isBidi в (bidi.c) библиотеки Libidn2, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
Modified: 2024-11-21
CVE-2017-14061
Integer overflow in the _isBidi function in bidi.c in Libidn2 before 2.0.4 allows remote attackers to cause a denial of service or possibly have unspecified other impact.
Modified: 2024-11-21
CVE-2017-14062
Integer overflow in the decode_digit function in puny_decode.c in Libidn2 before 2.0.4 allows remote attackers to cause a denial of service or possibly have unspecified other impact.
- DSA-3988
- DSA-3988
- https://gitlab.com/libidn/libidn2/blob/master/NEWS
- https://gitlab.com/libidn/libidn2/blob/master/NEWS
- https://gitlab.com/libidn/libidn2/commit/3284eb342cd0ed1a18786e3fcdf0cdd7e76676bd
- https://gitlab.com/libidn/libidn2/commit/3284eb342cd0ed1a18786e3fcdf0cdd7e76676bd
- [debian-lts-announce] 20180727 [SECURITY] [DLA 1447-1] libidn security update
- [debian-lts-announce] 20180727 [SECURITY] [DLA 1447-1] libidn security update
Closed bugs
перенести библиотеку в /lib/
Closed bugs
Некорректное отображение размера выделенных файлов
Package alterator-auth-token updated to version 0.1.2-alt0.M80P.1 for branch p8 in task 201450.
Closed bugs
alterator-auth-token приводит к невозможности входа пользователя в систему
Closed bugs
xdg-open для сеанса lxqt использует pcmanfm
Closed vulnerabilities
BDU:2015-09681
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2018-00019
Уязвимость функции try_read_command (memcached.c) программного средства кэширования данных memcached, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2018-01496
Уязвимость программного средства кэширования данных memcached, связанная с переполнением целых чисел, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2013-0179
The process_bin_delete function in memcached.c in memcached 1.4.4 and other versions before 1.4.17, when running in verbose mode, allows remote attackers to cause a denial of service (segmentation fault) via a request to delete a key, which does not account for the lack of a null terminator in the key and triggers a buffer over-read when printing to stderr.
- 56183
- 56183
- [oss-security] 20130114 CVE request: memcached DoS when printing out keys to be deleted in verbose mode
- [oss-security] 20130114 CVE request: memcached DoS when printing out keys to be deleted in verbose mode
- [oss-security] 20130114 Re: CVE request: memcached DoS when printing out keys to be deleted in verbose mode
- [oss-security] 20130114 Re: CVE request: memcached DoS when printing out keys to be deleted in verbose mode
- 64978
- 64978
- USN-2080-1
- USN-2080-1
- https://bugzilla.redhat.com/show_bug.cgi?id=895054
- https://bugzilla.redhat.com/show_bug.cgi?id=895054
- https://code.google.com/p/memcached/issues/attachmentText?id=306&aid=3060004000&name=0001-Fix-buffer-overrun-when-logging-key-to-delete-in-bin.patch&token=3GEzHThBL5cxmUrsYANkW03RrNY%3A1358179503096
- https://code.google.com/p/memcached/issues/attachmentText?id=306&aid=3060004000&name=0001-Fix-buffer-overrun-when-logging-key-to-delete-in-bin.patch&token=3GEzHThBL5cxmUrsYANkW03RrNY%3A1358179503096
- https://code.google.com/p/memcached/issues/detail?id=306
- https://code.google.com/p/memcached/issues/detail?id=306
- https://code.google.com/p/memcached/wiki/ReleaseNotes1417
- https://code.google.com/p/memcached/wiki/ReleaseNotes1417
Modified: 2024-11-21
CVE-2013-7239
memcached before 1.4.17 allows remote attackers to bypass authentication by sending an invalid request with SASL credentials, then sending another request with incorrect SASL credentials.
- [oss-security] 20131230 Re: CVE Request: SASL authentication allows wrong credentials to access memcache
- [oss-security] 20131230 Re: CVE Request: SASL authentication allows wrong credentials to access memcache
- 56183
- 56183
- DSA-2832
- DSA-2832
- 64559
- 64559
- USN-2080-1
- USN-2080-1
- https://code.google.com/p/memcached/wiki/ReleaseNotes1417
- https://code.google.com/p/memcached/wiki/ReleaseNotes1417
Modified: 2024-11-21
CVE-2013-7290
The do_item_get function in items.c in memcached 1.4.4 and other versions before 1.4.17, when running in verbose mode, allows remote attackers to cause a denial of service (segmentation fault) via a request to delete a key, which does not account for the lack of a null terminator in the key and triggers a buffer over-read when printing to stderr, a different vulnerability than CVE-2013-0179.
Modified: 2024-11-21
CVE-2013-7291
memcached before 1.4.17, when running in verbose mode, allows remote attackers to cause a denial of service (crash) via a request that triggers an "unbounded key print" during logging, related to an issue that was "quickly grepped out of the source tree," a different vulnerability than CVE-2013-0179 and CVE-2013-7290.
Modified: 2024-11-21
CVE-2016-8704
An integer overflow in the process_bin_append_prepend function in Memcached, which is responsible for processing multiple commands of Memcached binary protocol, can be abused to cause heap overflow and lead to remote code execution.
Modified: 2024-11-21
CVE-2016-8705
Multiple integer overflows in process_bin_update function in Memcached, which is responsible for processing multiple commands of Memcached binary protocol, can be abused to cause heap overflow and lead to remote code execution.
Modified: 2024-11-21
CVE-2016-8706
An integer overflow in process_bin_sasl_auth function in Memcached, which is responsible for authentication commands of Memcached binary protocol, can be abused to cause heap overflow and lead to remote code execution.
Modified: 2024-11-21
CVE-2017-9951
The try_read_command function in memcached.c in memcached before 1.4.39 allows remote attackers to cause a denial of service (segmentation fault) via a request to add/set a key, which makes a comparison between signed and unsigned int and triggers a heap-based buffer over-read. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-8705.
- 99874
- 99874
- https://github.com/memcached/memcached/wiki/ReleaseNotes1439
- https://github.com/memcached/memcached/wiki/ReleaseNotes1439
- https://groups.google.com/forum/message/raw?msg=memcached/ubGWrkmrr4E/nrm1SeVJAQAJ
- https://groups.google.com/forum/message/raw?msg=memcached/ubGWrkmrr4E/nrm1SeVJAQAJ
- USN-3588-1
- USN-3588-1
- DSA-4218
- DSA-4218
- https://www.twistlock.com/2017/07/13/cve-2017-9951-heap-overflow-memcached-server-1-4-38-twistlock-vulnerability-report/
- https://www.twistlock.com/2017/07/13/cve-2017-9951-heap-overflow-memcached-server-1-4-38-twistlock-vulnerability-report/
Modified: 2024-11-21
CVE-2018-1000115
Memcached version 1.5.5 contains an Insufficient Control of Network Message Volume (Network Amplification, CWE-406) vulnerability in the UDP support of the memcached server that can result in denial of service via network flood (traffic amplification of 1:50,000 has been reported by reliable sources). This attack appear to be exploitable via network connectivity to port 11211 UDP. This vulnerability appears to have been fixed in 1.5.6 due to the disabling of the UDP protocol by default.
- RHBA-2018:2140
- RHBA-2018:2140
- RHSA-2018:1593
- RHSA-2018:1593
- RHSA-2018:1627
- RHSA-2018:1627
- RHSA-2018:2331
- RHSA-2018:2331
- RHSA-2018:2857
- RHSA-2018:2857
- https://blogs.akamai.com/2018/03/memcached-fueled-13-tbps-attacks.html
- https://blogs.akamai.com/2018/03/memcached-fueled-13-tbps-attacks.html
- https://github.com/memcached/memcached/commit/dbb7a8af90054bf4ef51f5814ef7ceb17d83d974
- https://github.com/memcached/memcached/commit/dbb7a8af90054bf4ef51f5814ef7ceb17d83d974
- https://github.com/memcached/memcached/issues/348
- https://github.com/memcached/memcached/issues/348
- https://github.com/memcached/memcached/wiki/ReleaseNotes156
- https://github.com/memcached/memcached/wiki/ReleaseNotes156
- https://twitter.com/dormando/status/968579781729009664
- https://twitter.com/dormando/status/968579781729009664
- USN-3588-1
- USN-3588-1
- DSA-4218
- DSA-4218
- 44264
- 44264
- 44265
- 44265
- https://www.synology.com/support/security/Synology_SA_18_07
- https://www.synology.com/support/security/Synology_SA_18_07
Modified: 2024-11-21
CVE-2018-1000127
memcached version prior to 1.4.37 contains an Integer Overflow vulnerability in items.c:item_free() that can result in data corruption and deadlocks due to items existing in hash table being reused from free list. This attack appear to be exploitable via network connectivity to the memcached service. This vulnerability appears to have been fixed in 1.4.37 and later.
- RHSA-2018:2290
- RHSA-2018:2290
- https://github.com/memcached/memcached/commit/a8c4a82787b8b6c256d61bd5c42fb7f92d1bae00
- https://github.com/memcached/memcached/commit/a8c4a82787b8b6c256d61bd5c42fb7f92d1bae00
- https://github.com/memcached/memcached/issues/271
- https://github.com/memcached/memcached/issues/271
- https://github.com/memcached/memcached/wiki/ReleaseNotes1437
- https://github.com/memcached/memcached/wiki/ReleaseNotes1437
- [debian-lts-announce] 20180329 [SECURITY] [DLA 1329-1] memcached security update
- [debian-lts-announce] 20180329 [SECURITY] [DLA 1329-1] memcached security update
- USN-3601-1
- USN-3601-1
- DSA-4218
- DSA-4218