ALT-BU-2018-3301-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2018-01502
Уязвимость программной Unix-утилиты GNU Patch, связанная с недостаточной проверкой входных данных, позволяющая нарушителю вызвать отказ в обслуживании, получить доступ к конфиденциальным данным или нарушить их целостность
BDU:2020-01794
Уязвимость утилиты для применения изменений между разными версиями текстовых файлов GNU patch (inp.c и util.c), связанная с неправильным определением ссылки перед доступом к файлу, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2023-01649
Уязвимость функции another_hunk() компонента pch.c программы переноса правок Patch, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-01652
Уязвимость функции intuit_diff_type() компонента pch.c программы переноса правок Patch, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2016-10713
An issue was discovered in GNU patch before 2.7.6. Out-of-bounds access within pch_write_line() in pch.c can possibly lead to DoS via a crafted input file.
Modified: 2024-11-21
CVE-2018-1000156
GNU Patch version 2.7.6 contains an input validation vulnerability when processing patch files, specifically the EDITOR_PROGRAM invocation (using ed) can result in code execution. This attack appear to be exploitable via a patch file processed via the patch utility. This is similar to FreeBSD's CVE-2015-1418 however although they share a common ancestry the code bases have diverged over time.
- http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html
- http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html
- http://rachelbythebay.com/w/2018/04/05/bangpatch/
- http://rachelbythebay.com/w/2018/04/05/bangpatch/
- RHSA-2018:1199
- RHSA-2018:1199
- RHSA-2018:1200
- RHSA-2018:1200
- RHSA-2018:2091
- RHSA-2018:2091
- RHSA-2018:2092
- RHSA-2018:2092
- RHSA-2018:2093
- RHSA-2018:2093
- RHSA-2018:2094
- RHSA-2018:2094
- RHSA-2018:2095
- RHSA-2018:2095
- RHSA-2018:2096
- RHSA-2018:2096
- RHSA-2018:2097
- RHSA-2018:2097
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=894667#19
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=894667#19
- [debian-lts-announce] 20180416 [SECURITY] [DLA 1348-1] patch security update
- [debian-lts-announce] 20180416 [SECURITY] [DLA 1348-1] patch security update
- https://savannah.gnu.org/bugs/index.php?53566
- https://savannah.gnu.org/bugs/index.php?53566
- 20190816 Details about recent GNU patch vulnerabilities
- 20190816 Details about recent GNU patch vulnerabilities
- 20190730 [SECURITY] [DSA 4489-1] patch security update
- 20190730 [SECURITY] [DSA 4489-1] patch security update
- GLSA-201904-17
- GLSA-201904-17
- https://twitter.com/kurtseifried/status/982028968877436928
- https://twitter.com/kurtseifried/status/982028968877436928
- USN-3624-1
- USN-3624-1
- USN-3624-2
- USN-3624-2
Modified: 2024-11-21
CVE-2018-20969
do_ed_script in pch.c in GNU patch through 2.7.6 does not block strings beginning with a ! character. NOTE: this is the same commit as for CVE-2019-13638, but the ! syntax is specific to ed, and is unrelated to a shell metacharacter.
- http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html
- http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html
- RHSA-2019:2798
- RHSA-2019:2798
- RHSA-2019:2964
- RHSA-2019:2964
- RHSA-2019:3757
- RHSA-2019:3757
- RHSA-2019:3758
- RHSA-2019:3758
- RHSA-2019:4061
- RHSA-2019:4061
- https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0
- https://git.savannah.gnu.org/cgit/patch.git/commit/?id=3fcd042d26d70856e826a42b5f93dc4854d80bf0
- https://github.com/irsl/gnu-patch-vulnerabilities
- https://github.com/irsl/gnu-patch-vulnerabilities
- 20190816 Details about recent GNU patch vulnerabilities
- 20190816 Details about recent GNU patch vulnerabilities
Modified: 2024-11-21
CVE-2018-6951
An issue was discovered in GNU patch through 2.7.6. There is a segmentation fault, associated with a NULL pointer dereference, leading to a denial of service in the intuit_diff_type function in pch.c, aka a "mangled rename" issue.
- 103044
- 103044
- https://git.savannah.gnu.org/cgit/patch.git/commit/?id=f290f48a621867084884bfff87f8093c15195e6a
- https://git.savannah.gnu.org/cgit/patch.git/commit/?id=f290f48a621867084884bfff87f8093c15195e6a
- https://savannah.gnu.org/bugs/index.php?53132
- https://savannah.gnu.org/bugs/index.php?53132
- GLSA-201904-17
- GLSA-201904-17
- USN-3624-1
- USN-3624-1
Modified: 2024-11-21
CVE-2018-6952
A double free exists in the another_hunk function in pch.c in GNU patch through 2.7.6.
Modified: 2024-11-21
CVE-2019-13636
In GNU patch through 2.7.6, the following of symlinks is mishandled in certain cases other than input files. This affects inp.c and util.c.
- http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html
- http://packetstormsecurity.com/files/154124/GNU-patch-Command-Injection-Directory-Traversal.html
- https://git.savannah.gnu.org/cgit/patch.git/commit/?id=dce4683cbbe107a95f1f0d45fabc304acfb5d71a
- https://git.savannah.gnu.org/cgit/patch.git/commit/?id=dce4683cbbe107a95f1f0d45fabc304acfb5d71a
- https://github.com/irsl/gnu-patch-vulnerabilities
- https://github.com/irsl/gnu-patch-vulnerabilities
- [debian-lts-announce] 20190719 [SECURITY] [DLA 1856-1] patch security update
- [debian-lts-announce] 20190719 [SECURITY] [DLA 1856-1] patch security update
- FEDORA-2019-ac709da87f
- FEDORA-2019-ac709da87f
- 20190816 Details about recent GNU patch vulnerabilities
- 20190816 Details about recent GNU patch vulnerabilities
- 20190730 [SECURITY] [DSA 4489-1] patch security update
- 20190730 [SECURITY] [DSA 4489-1] patch security update
- GLSA-201908-22
- GLSA-201908-22
- https://security.netapp.com/advisory/ntap-20190828-0001/
- https://security.netapp.com/advisory/ntap-20190828-0001/
- USN-4071-1
- USN-4071-1
- USN-4071-2
- USN-4071-2
- DSA-4489
- DSA-4489
Modified: 2024-11-21
CVE-2019-20633
GNU patch through 2.7.6 contains a free(p_line[p_end]) Double Free vulnerability in the function another_hunk in pch.c that can cause a denial of service via a crafted patch file. NOTE: this issue exists because of an incomplete fix for CVE-2018-6952.
Closed bugs
Обманывает потребителя (клиента)
Closed bugs
[FR] Реализовать RPMTAG_AUTOINSTALLED
сломана поддержка файлтриггеров при использовании альтернативного корня в rpm
При обновлении с p8 до Sisyphus ошибка во время транзакции
bad macros (incosistent with rpmbuild)
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-11396
ephy-session.c in libephymain.so in GNOME Web (aka Epiphany) through 3.28.2.1 allows remote attackers to cause a denial of service (application crash) via JavaScript code that triggers access to a NULL URL, as demonstrated by a crafted window.open call.
Modified: 2024-11-21
CVE-2018-12016
libephymain.so in GNOME Web (aka Epiphany) through 3.28.2.1 allows remote attackers to cause a denial of service (application crash) via certain window.open and document.write calls.
Closed vulnerabilities
BDU:2022-05951
Уязвимость компонентов fileio.c, /etc/shadow, /etc/.shadow.swp текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2022-06483
Уязвимость функции vim_regsub_both компонента regexp.c текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2017-1000382
VIM version 8.0.1187 (and other versions most likely) ignores umask when creating a swap file ("[ORIGINAL_FILENAME].swp") resulting in files that may be world readable or otherwise accessible in ways not intended by the user running the vi binary.
Modified: 2024-11-21
CVE-2017-17087
fileio.c in Vim prior to 8.0.1263 sets the group ownership of a .swp file to the editor's primary group (which may be different from the group ownership of the original file), which allows local users to obtain sensitive information by leveraging an applicable group membership, as demonstrated by /etc/shadow owned by root:shadow mode 0640, but /etc/.shadow.swp owned by root:users mode 0640, a different vulnerability than CVE-2017-1000382.
- http://openwall.com/lists/oss-security/2017/11/27/2
- http://openwall.com/lists/oss-security/2017/11/27/2
- http://security.cucumberlinux.com/security/details.php?id=166
- http://security.cucumberlinux.com/security/details.php?id=166
- https://github.com/vim/vim/commit/5a73e0ca54c77e067c3b12ea6f35e3e8681e8cf8
- https://github.com/vim/vim/commit/5a73e0ca54c77e067c3b12ea6f35e3e8681e8cf8
- https://groups.google.com/d/msg/vim_dev/sRT9BtjLWMk/BRtSXNU4BwAJ
- https://groups.google.com/d/msg/vim_dev/sRT9BtjLWMk/BRtSXNU4BwAJ
- [debian-lts-announce] 20190803 [SECURITY] [DLA 1871-1] vim security update
- [debian-lts-announce] 20190803 [SECURITY] [DLA 1871-1] vim security update
- [debian-lts-announce] 20220110 [SECURITY] [DLA 2876-1] vim security update
- [debian-lts-announce] 20220110 [SECURITY] [DLA 2876-1] vim security update
- USN-4582-1
- USN-4582-1
Modified: 2024-11-21
CVE-2022-1897
Out-of-bounds Write in GitHub repository vim/vim prior to 8.2.
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- https://github.com/vim/vim/commit/338f1fc0ee3ca929387448fe464579d6113fa76a
- https://github.com/vim/vim/commit/338f1fc0ee3ca929387448fe464579d6113fa76a
- https://huntr.dev/bounties/82c12151-c283-40cf-aa05-2e39efa89118
- https://huntr.dev/bounties/82c12151-c283-40cf-aa05-2e39efa89118
- [debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update
- [debian-lts-announce] 20221124 [SECURITY] [DLA 3204-1] vim security update
- FEDORA-2022-d94440bf0e
- FEDORA-2022-d94440bf0e
- FEDORA-2022-5ce148636b
- FEDORA-2022-5ce148636b
- FEDORA-2022-bb2daad935
- FEDORA-2022-bb2daad935
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213488
Closed bugs
не поддерживается юникод
Closed bugs
Ошибка при запуске driconf
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-8769
elfutils 0.170 has a buffer over-read in the ebl_dynamic_tag_name function of libebl/ebldynamictagname.c because SYMTAB_SHNDX is unsupported.
Closed vulnerabilities
BDU:2019-00237
Уязвимость процесса mainproc.c программы шифрования информации и создания электронных цифровых подписей GNU Privacy Guard, позволяющая нарушителю оказать воздействие на целостность защищаемой информации
Modified: 2024-11-21
CVE-2018-12020
mainproc.c in GnuPG before 2.2.8 mishandles the original filename during decryption and verification actions, which allows remote attackers to spoof the output that GnuPG sends on file descriptor 2 to other programs that use the "--status-fd 2" option. For example, the OpenPGP data might represent an original filename that contains line feed characters in conjunction with GOODSIG or VALIDSIG status codes.
- http://openwall.com/lists/oss-security/2018/06/08/2
- http://openwall.com/lists/oss-security/2018/06/08/2
- http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html
- http://packetstormsecurity.com/files/152703/Johnny-You-Are-Fired.html
- 20190430 OpenPGP and S/MIME signature forgery attacks in multiple email clients
- 20190430 OpenPGP and S/MIME signature forgery attacks in multiple email clients
- [oss-security] 20190430 Spoofing OpenPGP and S/MIME Signatures in Emails (multiple clients)
- [oss-security] 20190430 Spoofing OpenPGP and S/MIME Signatures in Emails (multiple clients)
- 104450
- 104450
- 1041051
- 1041051
- RHSA-2018:2180
- RHSA-2018:2180
- RHSA-2018:2181
- RHSA-2018:2181
- https://dev.gnupg.org/T4012
- https://dev.gnupg.org/T4012
- https://github.com/RUB-NDS/Johnny-You-Are-Fired
- https://github.com/RUB-NDS/Johnny-You-Are-Fired
- https://github.com/RUB-NDS/Johnny-You-Are-Fired/blob/master/paper/johnny-fired.pdf
- https://github.com/RUB-NDS/Johnny-You-Are-Fired/blob/master/paper/johnny-fired.pdf
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- https://help.ecostruxureit.com/display/public/UADCE725/Security+fixes+in+StruxureWare+Data+Center+Expert+v7.6.0
- [debian-lts-announce] 20211228 [SECURITY] [DLA 2862-1] python-gnupg security update
- [debian-lts-announce] 20211228 [SECURITY] [DLA 2862-1] python-gnupg security update
- https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000425.html
- https://lists.gnupg.org/pipermail/gnupg-announce/2018q2/000425.html
- USN-3675-1
- USN-3675-1
- USN-3675-2
- USN-3675-2
- USN-3675-3
- USN-3675-3
- USN-3964-1
- USN-3964-1
- DSA-4222
- DSA-4222
- DSA-4223
- DSA-4223
- DSA-4224
- DSA-4224
Package python-module-timelib updated to version 0.2.4-alt4 for branch sisyphus in task 208088.
Closed bugs
needs to be built with Cython
Package python3-module-timelib updated to version 0.2.4-alt4 for branch sisyphus in task 208088.
Closed bugs
needs to be built with Cython