ALT-BU-2018-3175-1
Branch sisyphus update bulletin.
Closed bugs
Поддержка завершения сеанса, перезагрузки и выключения через Systemd
Closed vulnerabilities
BDU:2019-04036
Уязвимость методов Dir.open, Dir.new, Dir.entries и Dir.empty интерпретатора языка программирования Ruby, позволяющая нарушителю получить несанкционированный доступ к защищаемым данным или оказать воздействие на целостность защищаемой информации
BDU:2019-04156
Уязвимость библиотеки WEBrick интерпретатора языка программирования Ruby, позволяющая нарушителю внедрить произвольные HTTP-заголовки
BDU:2019-04470
Уязвимость метода Dir.mktmpdir библиотеки tmpdir интерпретатора языка программирования Ruby, позволяющая нарушителю записать произвольные файлы в файловую систему
BDU:2019-04471
Уязвимость библиотеки WEBrick интерпретатора языка программирования Ruby, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-04472
Уязвимость метода String#unpack интерпретатора языка программирования Ruby, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2019-04473
Уязвимость методов UNIXServer.open и UNIXSocket.open интерпретатора языка программирования Ruby, позволяющая нарушителю обойти ограничения безопасности
Modified: 2024-11-21
CVE-2017-17742
Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1 allows an HTTP Response Splitting attack. An attacker can inject a crafted key and value into an HTTP response for the HTTP server of WEBrick.
- openSUSE-SU-2019:1771
- openSUSE-SU-2019:1771
- 103684
- 103684
- 1042004
- 1042004
- RHSA-2018:3729
- RHSA-2018:3729
- RHSA-2018:3730
- RHSA-2018:3730
- RHSA-2018:3731
- RHSA-2018:3731
- RHSA-2019:2028
- RHSA-2019:2028
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- [debian-lts-announce] 20191210 [SECURITY] [DLA 2027-1] jruby security update
- [debian-lts-announce] 20191210 [SECURITY] [DLA 2027-1] jruby security update
- [debian-lts-announce] 20200816 [SECURITY] [DLA 2330-1] jruby security update
- [debian-lts-announce] 20200816 [SECURITY] [DLA 2330-1] jruby security update
- [debian-lts-announce] 20230430 [SECURITY] [DLA 3408-1] jruby security update
- [debian-lts-announce] 20230430 [SECURITY] [DLA 3408-1] jruby security update
- USN-3685-1
- USN-3685-1
- DSA-4259
- DSA-4259
- https://www.ruby-lang.org/en/news/2018/03/28/http-response-splitting-in-webrick-cve-2017-17742/
- https://www.ruby-lang.org/en/news/2018/03/28/http-response-splitting-in-webrick-cve-2017-17742/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/
Modified: 2024-11-21
CVE-2018-6914
Directory traversal vulnerability in the Dir.mktmpdir method in the tmpdir library in Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1 might allow attackers to create arbitrary directories or files via a .. (dot dot) in the prefix argument.
- openSUSE-SU-2019:1771
- openSUSE-SU-2019:1771
- 103686
- 103686
- 1042004
- 1042004
- RHSA-2018:3729
- RHSA-2018:3729
- RHSA-2018:3730
- RHSA-2018:3730
- RHSA-2018:3731
- RHSA-2018:3731
- RHSA-2019:2028
- RHSA-2019:2028
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- USN-3626-1
- USN-3626-1
- DSA-4259
- DSA-4259
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/
- https://www.ruby-lang.org/en/news/2018/03/28/unintentional-file-and-directory-creation-with-directory-traversal-cve-2018-6914/
- https://www.ruby-lang.org/en/news/2018/03/28/unintentional-file-and-directory-creation-with-directory-traversal-cve-2018-6914/
Modified: 2024-11-21
CVE-2018-8777
In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, an attacker can pass a large HTTP request with a crafted header to WEBrick server or a crafted body to WEBrick server/handler and cause a denial of service (memory consumption).
- openSUSE-SU-2019:1771
- openSUSE-SU-2019:1771
- 103683
- 103683
- 1042004
- 1042004
- RHSA-2018:3729
- RHSA-2018:3729
- RHSA-2018:3730
- RHSA-2018:3730
- RHSA-2018:3731
- RHSA-2018:3731
- RHSA-2019:2028
- RHSA-2019:2028
- RHSA-2020:0542
- RHSA-2020:0542
- RHSA-2020:0591
- RHSA-2020:0591
- RHSA-2020:0663
- RHSA-2020:0663
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- USN-3685-1
- USN-3685-1
- DSA-4259
- DSA-4259
- https://www.ruby-lang.org/en/news/2018/03/28/large-request-dos-in-webrick-cve-2018-8777/
- https://www.ruby-lang.org/en/news/2018/03/28/large-request-dos-in-webrick-cve-2018-8777/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/
Modified: 2024-11-21
CVE-2018-8778
In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, an attacker controlling the unpacking format (similar to format string vulnerabilities) can trigger a buffer under-read in the String#unpack method, resulting in a massive and controlled information disclosure.
- openSUSE-SU-2019:1771
- openSUSE-SU-2019:1771
- 103693
- 103693
- 1042004
- 1042004
- RHSA-2018:3729
- RHSA-2018:3729
- RHSA-2018:3730
- RHSA-2018:3730
- RHSA-2018:3731
- RHSA-2018:3731
- RHSA-2019:2028
- RHSA-2019:2028
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- USN-3626-1
- USN-3626-1
- DSA-4259
- DSA-4259
- https://www.ruby-lang.org/en/news/2018/03/28/buffer-under-read-unpack-cve-2018-8778/
- https://www.ruby-lang.org/en/news/2018/03/28/buffer-under-read-unpack-cve-2018-8778/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/
Modified: 2024-11-21
CVE-2018-8779
In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, the UNIXServer.open and UNIXSocket.open methods are not checked for null characters. It may be connected to an unintended socket.
- openSUSE-SU-2019:1771
- openSUSE-SU-2019:1771
- 103767
- 103767
- 1042004
- 1042004
- RHSA-2018:3729
- RHSA-2018:3729
- RHSA-2018:3730
- RHSA-2018:3730
- RHSA-2018:3731
- RHSA-2018:3731
- RHSA-2019:2028
- RHSA-2019:2028
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- USN-3626-1
- USN-3626-1
- DSA-4259
- DSA-4259
- https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-unixsocket-cve-2018-8779/
- https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-unixsocket-cve-2018-8779/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/
Modified: 2024-11-21
CVE-2018-8780
In Ruby before 2.2.10, 2.3.x before 2.3.7, 2.4.x before 2.4.4, 2.5.x before 2.5.1, and 2.6.0-preview1, the Dir.open, Dir.new, Dir.entries and Dir.empty? methods do not check NULL characters. When using the corresponding method, unintentional directory traversal may be performed.
- openSUSE-SU-2019:1771
- openSUSE-SU-2019:1771
- 103739
- 103739
- 1042004
- 1042004
- RHSA-2018:3729
- RHSA-2018:3729
- RHSA-2018:3730
- RHSA-2018:3730
- RHSA-2018:3731
- RHSA-2018:3731
- RHSA-2019:2028
- RHSA-2019:2028
- RHSA-2020:0542
- RHSA-2020:0542
- RHSA-2020:0591
- RHSA-2020:0591
- RHSA-2020:0663
- RHSA-2020:0663
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1358-1] ruby1.9.1 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update
- [debian-lts-announce] 20180423 [SECURITY] [DLA 1359-1] ruby1.8 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1421-1] ruby2.1 security update
- USN-3626-1
- USN-3626-1
- DSA-4259
- DSA-4259
- https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/
- https://www.ruby-lang.org/en/news/2018/03/28/poisoned-nul-byte-dir-cve-2018-8780/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-2-10-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-3-7-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-4-4-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/
- https://www.ruby-lang.org/en/news/2018/03/28/ruby-2-5-1-released/
Closed bugs
Описание не переведено на русский язык
Описание не переведено на русский язык
Closed bugs
vlc-cache-gen иногда падает на nvidia
Package kernel-image-un-def updated to version 4.14.32-alt1 for branch sisyphus in task 203305.
Closed vulnerabilities
BDU:2021-04144
Уязвимость функции dccp_disconnect (net/dccp/proto.c) ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2017-8824
The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state.
- SUSE-SU-2018:0011
- SUSE-SU-2018:0011
- http://lists.openwall.net/netdev/2017/12/04/224
- http://lists.openwall.net/netdev/2017/12/04/224
- http://www.openwall.com/lists/oss-security/2017/12/05/1
- http://www.openwall.com/lists/oss-security/2017/12/05/1
- 102056
- 102056
- RHSA-2018:0399
- RHSA-2018:0399
- RHSA-2018:0676
- RHSA-2018:0676
- RHSA-2018:1062
- RHSA-2018:1062
- RHSA-2018:1130
- RHSA-2018:1130
- RHSA-2018:1170
- RHSA-2018:1170
- RHSA-2018:1216
- RHSA-2018:1216
- RHSA-2018:1319
- RHSA-2018:1319
- RHSA-2018:3822
- RHSA-2018:3822
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- [debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update
- [debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update
- USN-3581-1
- USN-3581-1
- USN-3581-2
- USN-3581-2
- USN-3581-3
- USN-3581-3
- USN-3582-1
- USN-3582-1
- USN-3582-2
- USN-3582-2
- USN-3583-1
- USN-3583-1
- USN-3583-2
- USN-3583-2
- DSA-4073
- DSA-4073
- DSA-4082
- DSA-4082
- 43234
- 43234
Package kernel-image-std-def updated to version 4.9.92-alt1 for branch sisyphus in task 203304.
Closed vulnerabilities
BDU:2018-00569
Уязвимость компонента hns_enet.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-04144
Уязвимость функции dccp_disconnect (net/dccp/proto.c) ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2017-18218
In drivers/net/ethernet/hisilicon/hns/hns_enet.c in the Linux kernel before 4.13, local users can cause a denial of service (use-after-free and BUG) or possibly have unspecified other impact by leveraging differences in skb handling between hns_nic_net_xmit_hw and hns_nic_net_xmit.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=27463ad99f738ed93c7c8b3e2e5bc8c4853a2ff2
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=27463ad99f738ed93c7c8b3e2e5bc8c4853a2ff2
- 103277
- 103277
- https://github.com/torvalds/linux/commit/27463ad99f738ed93c7c8b3e2e5bc8c4853a2ff2
- https://github.com/torvalds/linux/commit/27463ad99f738ed93c7c8b3e2e5bc8c4853a2ff2
- DSA-4188
- DSA-4188
Modified: 2024-11-21
CVE-2017-8824
The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state.
- SUSE-SU-2018:0011
- SUSE-SU-2018:0011
- http://lists.openwall.net/netdev/2017/12/04/224
- http://lists.openwall.net/netdev/2017/12/04/224
- http://www.openwall.com/lists/oss-security/2017/12/05/1
- http://www.openwall.com/lists/oss-security/2017/12/05/1
- 102056
- 102056
- RHSA-2018:0399
- RHSA-2018:0399
- RHSA-2018:0676
- RHSA-2018:0676
- RHSA-2018:1062
- RHSA-2018:1062
- RHSA-2018:1130
- RHSA-2018:1130
- RHSA-2018:1170
- RHSA-2018:1170
- RHSA-2018:1216
- RHSA-2018:1216
- RHSA-2018:1319
- RHSA-2018:1319
- RHSA-2018:3822
- RHSA-2018:3822
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- [debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update
- [debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update
- USN-3581-1
- USN-3581-1
- USN-3581-2
- USN-3581-2
- USN-3581-3
- USN-3581-3
- USN-3582-1
- USN-3582-1
- USN-3582-2
- USN-3582-2
- USN-3583-1
- USN-3583-1
- USN-3583-2
- USN-3583-2
- DSA-4073
- DSA-4073
- DSA-4082
- DSA-4082
- 43234
- 43234
Package kernel-image-std-pae updated to version 4.4.126-alt1 for branch sisyphus in task 203307.
Closed vulnerabilities
BDU:2021-04144
Уязвимость функции dccp_disconnect (net/dccp/proto.c) ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2017-8824
The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state.
- SUSE-SU-2018:0011
- SUSE-SU-2018:0011
- http://lists.openwall.net/netdev/2017/12/04/224
- http://lists.openwall.net/netdev/2017/12/04/224
- http://www.openwall.com/lists/oss-security/2017/12/05/1
- http://www.openwall.com/lists/oss-security/2017/12/05/1
- 102056
- 102056
- RHSA-2018:0399
- RHSA-2018:0399
- RHSA-2018:0676
- RHSA-2018:0676
- RHSA-2018:1062
- RHSA-2018:1062
- RHSA-2018:1130
- RHSA-2018:1130
- RHSA-2018:1170
- RHSA-2018:1170
- RHSA-2018:1216
- RHSA-2018:1216
- RHSA-2018:1319
- RHSA-2018:1319
- RHSA-2018:3822
- RHSA-2018:3822
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- [debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update
- [debian-lts-announce] 20171210 [SECURITY] [DLA 1200-1] linux security update
- USN-3581-1
- USN-3581-1
- USN-3581-2
- USN-3581-2
- USN-3581-3
- USN-3581-3
- USN-3582-1
- USN-3582-1
- USN-3582-2
- USN-3582-2
- USN-3583-1
- USN-3583-1
- USN-3583-2
- USN-3583-2
- DSA-4073
- DSA-4073
- DSA-4082
- DSA-4082
- 43234
- 43234
Closed vulnerabilities
BDU:2018-01492
Уязвимость библиотеки управления виртуализацией Libvirt, связанной с ошибкой, приводящей к чрезмерному потреблению памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-00236
Уязвимость библиотеки управления виртуализацией Libvirt, связанная с ошибкой, приводящей к чрезмерному потреблению памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-02856
Уязвимость модулей virtlockd-admin.socket и virtlogd-admin.socket библиотеки управления виртуализацией Libvirt, позволяющая нарушителю повысить свои привилегии
Modified: 2024-11-21
CVE-2018-1064
libvirt version before 4.2.0-rc1 is vulnerable to a resource exhaustion as a result of an incomplete fix for CVE-2018-5748 that affects QEMU monitor but now also triggered via QEMU guest agent.
- RHSA-2018:1396
- RHSA-2018:1396
- RHSA-2018:1929
- RHSA-2018:1929
- https://bugzilla.redhat.com/show_bug.cgi?id=1550672
- https://bugzilla.redhat.com/show_bug.cgi?id=1550672
- https://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=fbf31e1a4cd19d6f6e33e0937a009775cd7d9513
- https://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=fbf31e1a4cd19d6f6e33e0937a009775cd7d9513
- [debian-lts-announce] 20180324 [SECURITY] [DLA 1315-1] libvirt security update
- [debian-lts-announce] 20180324 [SECURITY] [DLA 1315-1] libvirt security update
- USN-3680-1
- USN-3680-1
- DSA-4137
- DSA-4137
Modified: 2024-11-21
CVE-2018-5748
qemu/qemu_monitor.c in libvirt allows attackers to cause a denial of service (memory consumption) via a large QEMU reply.
- 102825
- 102825
- RHSA-2018:1396
- RHSA-2018:1396
- RHSA-2018:1929
- RHSA-2018:1929
- [debian-lts-announce] 20180324 [SECURITY] [DLA 1315-1] libvirt security update
- [debian-lts-announce] 20180324 [SECURITY] [DLA 1315-1] libvirt security update
- DSA-4137
- DSA-4137
- [libvir-list] 20180116 [PATCH] qemu: avoid denial of service reading from QEMU monitor (CVE-2018-xxxx)
- [libvir-list] 20180116 [PATCH] qemu: avoid denial of service reading from QEMU monitor (CVE-2018-xxxx)
Modified: 2024-11-21
CVE-2019-10132
A vulnerability was found in libvirt >= 4.1.0 in the virtlockd-admin.socket and virtlogd-admin.socket systemd units. A missing SocketMode configuration parameter allows any user on the host to connect using virtlockd-admin-sock or virtlogd-admin-sock and perform administrative tasks against the virtlockd and virtlogd daemons.
- RHSA-2019:1264
- RHSA-2019:1264
- RHSA-2019:1268
- RHSA-2019:1268
- RHSA-2019:1455
- RHSA-2019:1455
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10132
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10132
- FEDORA-2019-5f105dd2b6
- FEDORA-2019-5f105dd2b6
- FEDORA-2019-9210998aaa
- FEDORA-2019-9210998aaa
- https://security.libvirt.org/2019/0003.html
- https://security.libvirt.org/2019/0003.html
- USN-4021-1
- USN-4021-1