ALT-BU-2018-3317-1
Branch sisyphus update bulletin.
Package NetworkManager updated to version 1.11.90-alt1 for branch sisyphus in task 208693.
Closed bugs
Проблема с NetworkManager
Package kernel-image-un-def updated to version 4.16.16-alt1 for branch sisyphus in task 208651.
Closed vulnerabilities
BDU:2020-00368
Уязвимость функции cpia2_remap_buffer ядра операционной системы Linux, позволяющая нарушителю получить доступ на чтение и запись на физических страницах ядра и повысить свои привилегии
Modified: 2024-11-21
CVE-2018-10853
A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.
- openSUSE-SU-2019:1407
- openSUSE-SU-2019:1407
- RHSA-2019:2029
- RHSA-2019:2029
- RHSA-2019:2043
- RHSA-2019:2043
- RHSA-2020:0036
- RHSA-2020:0036
- RHSA-2020:0103
- RHSA-2020:0103
- RHSA-2020:0179
- RHSA-2020:0179
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10853
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10853
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=129a72a0d3c8e139a04512325384fe5ac119e74
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=129a72a0d3c8e139a04512325384fe5ac119e74
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c9fa24ca7c9c47605672916491f79e8ccacb9e6
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c9fa24ca7c9c47605672916491f79e8ccacb9e6
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update
- [debian-lts-announce] 20180714 [SECURITY] [DLA 1422-1] linux security update
- [debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update
- [debian-lts-announce] 20180715 [SECURITY] [DLA 1422-2] linux security update
- [debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package
- [debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package
- USN-3777-1
- USN-3777-1
- USN-3777-2
- USN-3777-2
- https://www.openwall.com/lists/oss-security/2018/09/02/1
- https://www.openwall.com/lists/oss-security/2018/09/02/1
Modified: 2024-11-21
CVE-2019-18675
The Linux kernel through 5.3.13 has a start_offset+size Integer Overflow in cpia2_remap_buffer in drivers/media/usb/cpia2/cpia2_core.c because cpia2 has its own mmap implementation. This allows local users (with /dev/video0 access) to obtain read and write permissions on kernel physical pages, which can possibly result in a privilege escalation.
- https://deshal3v.github.io/blog/kernel-research/mmap_exploitation
- https://deshal3v.github.io/blog/kernel-research/mmap_exploitation
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=be83bbf806822b1b89e0a0f23cd87cddc409e429
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=be83bbf806822b1b89e0a0f23cd87cddc409e429
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/media/usb/cpia2/cpia2_core.c
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/media/usb/cpia2/cpia2_core.c
- https://security.netapp.com/advisory/ntap-20200103-0001/
- https://security.netapp.com/advisory/ntap-20200103-0001/
Package libimobiledevice updated to version 1.2.1-alt0.1 for branch sisyphus in task 208722.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2016-5104
The socket_create function in common/socket.c in libimobiledevice and libusbmuxd allows remote attackers to bypass intended access restrictions and communicate with services on iOS devices by connecting to an IPv4 TCP socket.
- SUSE-SU-2016:1639
- SUSE-SU-2016:1639
- openSUSE-SU-2016:1526
- openSUSE-SU-2016:1526
- [oss-security] 20160525 CVE Requests: libimobiledevice and libusbmuxd
- [oss-security] 20160525 CVE Requests: libimobiledevice and libusbmuxd
- [oss-security] 20160526 Re: CVE Requests: libimobiledevice and libusbmuxd
- [oss-security] 20160526 Re: CVE Requests: libimobiledevice and libusbmuxd
- USN-3026-1
- USN-3026-1
- USN-3026-2
- USN-3026-2
- https://bugzilla.redhat.com/show_bug.cgi?id=1339988
- https://bugzilla.redhat.com/show_bug.cgi?id=1339988
- https://github.com/libimobiledevice/libimobiledevice/commit/df1f5c4d70d0c19ad40072f5246ca457e7f9849e
- https://github.com/libimobiledevice/libimobiledevice/commit/df1f5c4d70d0c19ad40072f5246ca457e7f9849e
- https://github.com/libimobiledevice/libusbmuxd/commit/4397b3376dc4e4cb1c991d0aed61ce6482614196
- https://github.com/libimobiledevice/libusbmuxd/commit/4397b3376dc4e4cb1c991d0aed61ce6482614196
- [debian-lts-announce] 20200227 [SECURITY] [DLA 2121-1] libimobiledevice security update
- [debian-lts-announce] 20200227 [SECURITY] [DLA 2121-1] libimobiledevice security update
- [debian-lts-announce] 20200227 [SECURITY] [DLA 2122-1] libusbmuxd security update
- [debian-lts-announce] 20200227 [SECURITY] [DLA 2122-1] libusbmuxd security update
Closed bugs
libimobiledevice не поддерживает подключение к актуальным версиям iOS
Package perl-Archive-Tar updated to version 2.30-alt1 for branch sisyphus in task 208735.
Closed vulnerabilities
BDU:2019-00435
Уязвимость модуля Archive::Tar интерпретатора языка программирования Perl, позволяющая нарушителю обойти установленный контроль доступа и нарушить целостность информации
Modified: 2024-11-21
CVE-2018-12015
In Perl through 5.26.2, the Archive::Tar module allows remote attackers to bypass a directory-traversal protection mechanism, and overwrite arbitrary files, via an archive file containing a symlink and a regular file with the same name.
- 20190326 APPLE-SA-2019-3-25-2 macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra
- 20190326 APPLE-SA-2019-3-25-2 macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra
- 104423
- 104423
- 1041048
- 1041048
- RHSA-2019:2097
- RHSA-2019:2097
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900834
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900834
- 20190326 APPLE-SA-2019-3-25-2 macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra
- 20190326 APPLE-SA-2019-3-25-2 macOS Mojave 10.14.4, Security Update 2019-002 High Sierra, Security Update 2019-002 Sierra
- https://security.netapp.com/advisory/ntap-20180927-0001/
- https://security.netapp.com/advisory/ntap-20180927-0001/
- https://support.apple.com/kb/HT209600
- https://support.apple.com/kb/HT209600
- USN-3684-1
- USN-3684-1
- USN-3684-2
- USN-3684-2
- DSA-4226
- DSA-4226
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html