ALT-BU-2018-3177-1
Branch c8.1 update bulletin.
Package firefox-esr updated to version 52.7.3-alt0.M80C.1 for branch c8.1 in task 203001.
Closed vulnerabilities
BDU:2021-04143
Уязвимость браузеров Mozilla Firefox, Firefox ESR, связанная с использованием памяти после ее освобождения, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2018-5148
A use-after-free vulnerability can occur in the compositor during certain graphics operations when a raw pointer is used instead of a reference counted one. This results in a potentially exploitable crash. This vulnerability affects Firefox ESR < 52.7.3 and Firefox < 59.0.2.
- http://www.securityfocus.com/bid/103506
- http://www.securitytracker.com/id/1040574
- https://access.redhat.com/errata/RHSA-2018:1098
- https://access.redhat.com/errata/RHSA-2018:1099
- https://bugzilla.mozilla.org/show_bug.cgi?id=1440717
- https://lists.debian.org/debian-lts-announce/2018/03/msg00023.html
- https://usn.ubuntu.com/3609-1/
- https://www.debian.org/security/2018/dsa-4153
- https://www.mozilla.org/security/advisories/mfsa2018-10/
- http://www.securityfocus.com/bid/103506
- http://www.securitytracker.com/id/1040574
- https://access.redhat.com/errata/RHSA-2018:1098
- https://access.redhat.com/errata/RHSA-2018:1099
- https://bugzilla.mozilla.org/show_bug.cgi?id=1440717
- https://lists.debian.org/debian-lts-announce/2018/03/msg00023.html
- https://usn.ubuntu.com/3609-1/
- https://www.debian.org/security/2018/dsa-4153
- https://www.mozilla.org/security/advisories/mfsa2018-10/
Package kernel-image-srv-restricted updated to version 4.9.92-alt0.M80C.1 for branch c8.1 in task 203310.
Closed vulnerabilities
BDU:2021-04144
Уязвимость функции dccp_disconnect (net/dccp/proto.c) ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код
Modified: 2025-04-20
CVE-2017-8824
The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state.
- http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
- http://lists.openwall.net/netdev/2017/12/04/224
- http://www.openwall.com/lists/oss-security/2017/12/05/1
- http://www.securityfocus.com/bid/102056
- https://access.redhat.com/errata/RHSA-2018:0399
- https://access.redhat.com/errata/RHSA-2018:0676
- https://access.redhat.com/errata/RHSA-2018:1062
- https://access.redhat.com/errata/RHSA-2018:1130
- https://access.redhat.com/errata/RHSA-2018:1170
- https://access.redhat.com/errata/RHSA-2018:1216
- https://access.redhat.com/errata/RHSA-2018:1319
- https://access.redhat.com/errata/RHSA-2018:3822
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
- https://usn.ubuntu.com/3581-1/
- https://usn.ubuntu.com/3581-2/
- https://usn.ubuntu.com/3581-3/
- https://usn.ubuntu.com/3582-1/
- https://usn.ubuntu.com/3582-2/
- https://usn.ubuntu.com/3583-1/
- https://usn.ubuntu.com/3583-2/
- https://www.debian.org/security/2017/dsa-4073
- https://www.debian.org/security/2018/dsa-4082
- https://www.exploit-db.com/exploits/43234/
- http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
- http://lists.openwall.net/netdev/2017/12/04/224
- http://www.openwall.com/lists/oss-security/2017/12/05/1
- http://www.securityfocus.com/bid/102056
- https://access.redhat.com/errata/RHSA-2018:0399
- https://access.redhat.com/errata/RHSA-2018:0676
- https://access.redhat.com/errata/RHSA-2018:1062
- https://access.redhat.com/errata/RHSA-2018:1130
- https://access.redhat.com/errata/RHSA-2018:1170
- https://access.redhat.com/errata/RHSA-2018:1216
- https://access.redhat.com/errata/RHSA-2018:1319
- https://access.redhat.com/errata/RHSA-2018:3822
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
- https://usn.ubuntu.com/3581-1/
- https://usn.ubuntu.com/3581-2/
- https://usn.ubuntu.com/3581-3/
- https://usn.ubuntu.com/3582-1/
- https://usn.ubuntu.com/3582-2/
- https://usn.ubuntu.com/3583-1/
- https://usn.ubuntu.com/3583-2/
- https://www.debian.org/security/2017/dsa-4073
- https://www.debian.org/security/2018/dsa-4082
- https://www.exploit-db.com/exploits/43234/
Package kernel-image-std-restricted updated to version 4.9.92-alt0.M80C.1 for branch c8.1 in task 203311.
Closed vulnerabilities
BDU:2021-04144
Уязвимость функции dccp_disconnect (net/dccp/proto.c) ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код
Modified: 2025-04-20
CVE-2017-8824
The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state.
- http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
- http://lists.openwall.net/netdev/2017/12/04/224
- http://www.openwall.com/lists/oss-security/2017/12/05/1
- http://www.securityfocus.com/bid/102056
- https://access.redhat.com/errata/RHSA-2018:0399
- https://access.redhat.com/errata/RHSA-2018:0676
- https://access.redhat.com/errata/RHSA-2018:1062
- https://access.redhat.com/errata/RHSA-2018:1130
- https://access.redhat.com/errata/RHSA-2018:1170
- https://access.redhat.com/errata/RHSA-2018:1216
- https://access.redhat.com/errata/RHSA-2018:1319
- https://access.redhat.com/errata/RHSA-2018:3822
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
- https://usn.ubuntu.com/3581-1/
- https://usn.ubuntu.com/3581-2/
- https://usn.ubuntu.com/3581-3/
- https://usn.ubuntu.com/3582-1/
- https://usn.ubuntu.com/3582-2/
- https://usn.ubuntu.com/3583-1/
- https://usn.ubuntu.com/3583-2/
- https://www.debian.org/security/2017/dsa-4073
- https://www.debian.org/security/2018/dsa-4082
- https://www.exploit-db.com/exploits/43234/
- http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
- http://lists.openwall.net/netdev/2017/12/04/224
- http://www.openwall.com/lists/oss-security/2017/12/05/1
- http://www.securityfocus.com/bid/102056
- https://access.redhat.com/errata/RHSA-2018:0399
- https://access.redhat.com/errata/RHSA-2018:0676
- https://access.redhat.com/errata/RHSA-2018:1062
- https://access.redhat.com/errata/RHSA-2018:1130
- https://access.redhat.com/errata/RHSA-2018:1170
- https://access.redhat.com/errata/RHSA-2018:1216
- https://access.redhat.com/errata/RHSA-2018:1319
- https://access.redhat.com/errata/RHSA-2018:3822
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
- https://usn.ubuntu.com/3581-1/
- https://usn.ubuntu.com/3581-2/
- https://usn.ubuntu.com/3581-3/
- https://usn.ubuntu.com/3582-1/
- https://usn.ubuntu.com/3582-2/
- https://usn.ubuntu.com/3583-1/
- https://usn.ubuntu.com/3583-2/
- https://www.debian.org/security/2017/dsa-4073
- https://www.debian.org/security/2018/dsa-4082
- https://www.exploit-db.com/exploits/43234/
Package kernel-image-std-def updated to version 4.9.92-alt0.M80C.1 for branch c8.1 in task 203313.
Closed vulnerabilities
BDU:2018-00569
Уязвимость компонента hns_enet.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-04144
Уязвимость функции dccp_disconnect (net/dccp/proto.c) ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2017-18218
In drivers/net/ethernet/hisilicon/hns/hns_enet.c in the Linux kernel before 4.13, local users can cause a denial of service (use-after-free and BUG) or possibly have unspecified other impact by leveraging differences in skb handling between hns_nic_net_xmit_hw and hns_nic_net_xmit.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=27463ad99f738ed93c7c8b3e2e5bc8c4853a2ff2
- http://www.securityfocus.com/bid/103277
- https://github.com/torvalds/linux/commit/27463ad99f738ed93c7c8b3e2e5bc8c4853a2ff2
- https://www.debian.org/security/2018/dsa-4188
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=27463ad99f738ed93c7c8b3e2e5bc8c4853a2ff2
- http://www.securityfocus.com/bid/103277
- https://github.com/torvalds/linux/commit/27463ad99f738ed93c7c8b3e2e5bc8c4853a2ff2
- https://www.debian.org/security/2018/dsa-4188
Modified: 2025-04-20
CVE-2017-8824
The dccp_disconnect function in net/dccp/proto.c in the Linux kernel through 4.14.3 allows local users to gain privileges or cause a denial of service (use-after-free) via an AF_UNSPEC connect system call during the DCCP_LISTEN state.
- http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
- http://lists.openwall.net/netdev/2017/12/04/224
- http://www.openwall.com/lists/oss-security/2017/12/05/1
- http://www.securityfocus.com/bid/102056
- https://access.redhat.com/errata/RHSA-2018:0399
- https://access.redhat.com/errata/RHSA-2018:0676
- https://access.redhat.com/errata/RHSA-2018:1062
- https://access.redhat.com/errata/RHSA-2018:1130
- https://access.redhat.com/errata/RHSA-2018:1170
- https://access.redhat.com/errata/RHSA-2018:1216
- https://access.redhat.com/errata/RHSA-2018:1319
- https://access.redhat.com/errata/RHSA-2018:3822
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
- https://usn.ubuntu.com/3581-1/
- https://usn.ubuntu.com/3581-2/
- https://usn.ubuntu.com/3581-3/
- https://usn.ubuntu.com/3582-1/
- https://usn.ubuntu.com/3582-2/
- https://usn.ubuntu.com/3583-1/
- https://usn.ubuntu.com/3583-2/
- https://www.debian.org/security/2017/dsa-4073
- https://www.debian.org/security/2018/dsa-4082
- https://www.exploit-db.com/exploits/43234/
- http://lists.opensuse.org/opensuse-security-announce/2018-01/msg00007.html
- http://lists.openwall.net/netdev/2017/12/04/224
- http://www.openwall.com/lists/oss-security/2017/12/05/1
- http://www.securityfocus.com/bid/102056
- https://access.redhat.com/errata/RHSA-2018:0399
- https://access.redhat.com/errata/RHSA-2018:0676
- https://access.redhat.com/errata/RHSA-2018:1062
- https://access.redhat.com/errata/RHSA-2018:1130
- https://access.redhat.com/errata/RHSA-2018:1170
- https://access.redhat.com/errata/RHSA-2018:1216
- https://access.redhat.com/errata/RHSA-2018:1319
- https://access.redhat.com/errata/RHSA-2018:3822
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://lists.debian.org/debian-lts-announce/2017/12/msg00004.html
- https://usn.ubuntu.com/3581-1/
- https://usn.ubuntu.com/3581-2/
- https://usn.ubuntu.com/3581-3/
- https://usn.ubuntu.com/3582-1/
- https://usn.ubuntu.com/3582-2/
- https://usn.ubuntu.com/3583-1/
- https://usn.ubuntu.com/3583-2/
- https://www.debian.org/security/2017/dsa-4073
- https://www.debian.org/security/2018/dsa-4082
- https://www.exploit-db.com/exploits/43234/
Modified: 2024-11-21
CVE-2018-8781
The udl_fb_mmap function in drivers/gpu/drm/udl/udl_fb.c at the Linux kernel version 3.4 and up to and including 4.15 has an integer-overflow vulnerability allowing local users with access to the udldrmfb driver to obtain full read and write permissions on kernel physical pages, resulting in a code execution in kernel space.
- https://access.redhat.com/errata/RHSA-2018:2948
- https://access.redhat.com/errata/RHSA-2018:3083
- https://access.redhat.com/errata/RHSA-2018:3096
- https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
- https://patchwork.freedesktop.org/patch/211845/
- https://research.checkpoint.com/mmap-vulnerabilities-linux-kernel/
- https://usn.ubuntu.com/3654-1/
- https://usn.ubuntu.com/3654-2/
- https://usn.ubuntu.com/3656-1/
- https://usn.ubuntu.com/3674-1/
- https://usn.ubuntu.com/3674-2/
- https://usn.ubuntu.com/3677-1/
- https://usn.ubuntu.com/3677-2/
- https://www.debian.org/security/2018/dsa-4187
- https://www.debian.org/security/2018/dsa-4188
- https://access.redhat.com/errata/RHSA-2018:2948
- https://access.redhat.com/errata/RHSA-2018:3083
- https://access.redhat.com/errata/RHSA-2018:3096
- https://lists.debian.org/debian-lts-announce/2018/05/msg00000.html
- https://patchwork.freedesktop.org/patch/211845/
- https://research.checkpoint.com/mmap-vulnerabilities-linux-kernel/
- https://usn.ubuntu.com/3654-1/
- https://usn.ubuntu.com/3654-2/
- https://usn.ubuntu.com/3656-1/
- https://usn.ubuntu.com/3674-1/
- https://usn.ubuntu.com/3674-2/
- https://usn.ubuntu.com/3677-1/
- https://usn.ubuntu.com/3677-2/
- https://www.debian.org/security/2018/dsa-4187
- https://www.debian.org/security/2018/dsa-4188