ALT-BU-2018-3317-1
Branch sisyphus update bulletin.
Package NetworkManager updated to version 1.11.90-alt1 for branch sisyphus in task 208693.
Closed bugs
Проблема с NetworkManager
Package kernel-image-un-def updated to version 4.16.16-alt1 for branch sisyphus in task 208651.
Closed vulnerabilities
BDU:2020-00368
Уязвимость функции cpia2_remap_buffer ядра операционной системы Linux, позволяющая нарушителю получить доступ на чтение и запись на физических страницах ядра и повысить свои привилегии
Modified: 2024-11-21
CVE-2018-10853
A flaw was found in the way Linux kernel KVM hypervisor before 4.18 emulated instructions such as sgdt/sidt/fxsave/fxrstor. It did not check current privilege(CPL) level while emulating unprivileged instructions. An unprivileged guest user/process could use this flaw to potentially escalate privileges inside guest.
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html
- https://access.redhat.com/errata/RHSA-2019:2029
- https://access.redhat.com/errata/RHSA-2019:2043
- https://access.redhat.com/errata/RHSA-2020:0036
- https://access.redhat.com/errata/RHSA-2020:0103
- https://access.redhat.com/errata/RHSA-2020:0179
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10853
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=129a72a0d3c8e139a04512325384fe5ac119e74
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c9fa24ca7c9c47605672916491f79e8ccacb9e6
- https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
- https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
- https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
- https://usn.ubuntu.com/3777-1/
- https://usn.ubuntu.com/3777-2/
- https://www.openwall.com/lists/oss-security/2018/09/02/1
- http://lists.opensuse.org/opensuse-security-announce/2019-05/msg00043.html
- https://access.redhat.com/errata/RHSA-2019:2029
- https://access.redhat.com/errata/RHSA-2019:2043
- https://access.redhat.com/errata/RHSA-2020:0036
- https://access.redhat.com/errata/RHSA-2020:0103
- https://access.redhat.com/errata/RHSA-2020:0179
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10853
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=129a72a0d3c8e139a04512325384fe5ac119e74
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=3c9fa24ca7c9c47605672916491f79e8ccacb9e6
- https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
- https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
- https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
- https://usn.ubuntu.com/3777-1/
- https://usn.ubuntu.com/3777-2/
- https://www.openwall.com/lists/oss-security/2018/09/02/1
Modified: 2024-11-21
CVE-2019-18675
The Linux kernel through 5.3.13 has a start_offset+size Integer Overflow in cpia2_remap_buffer in drivers/media/usb/cpia2/cpia2_core.c because cpia2 has its own mmap implementation. This allows local users (with /dev/video0 access) to obtain read and write permissions on kernel physical pages, which can possibly result in a privilege escalation.
- https://deshal3v.github.io/blog/kernel-research/mmap_exploitation
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=be83bbf806822b1b89e0a0f23cd87cddc409e429
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/media/usb/cpia2/cpia2_core.c
- https://security.netapp.com/advisory/ntap-20200103-0001/
- https://deshal3v.github.io/blog/kernel-research/mmap_exploitation
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=be83bbf806822b1b89e0a0f23cd87cddc409e429
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/media/usb/cpia2/cpia2_core.c
- https://security.netapp.com/advisory/ntap-20200103-0001/
Package libimobiledevice updated to version 1.2.1-alt0.1 for branch sisyphus in task 208722.
Closed vulnerabilities
Modified: 2025-04-12
CVE-2016-5104
The socket_create function in common/socket.c in libimobiledevice and libusbmuxd allows remote attackers to bypass intended access restrictions and communicate with services on iOS devices by connecting to an IPv4 TCP socket.
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00042.html
- http://lists.opensuse.org/opensuse-updates/2016-06/msg00029.html
- http://www.openwall.com/lists/oss-security/2016/05/26/1
- http://www.openwall.com/lists/oss-security/2016/05/26/6
- http://www.ubuntu.com/usn/USN-3026-1
- http://www.ubuntu.com/usn/USN-3026-2
- https://bugzilla.redhat.com/show_bug.cgi?id=1339988
- https://github.com/libimobiledevice/libimobiledevice/commit/df1f5c4d70d0c19ad40072f5246ca457e7f9849e
- https://github.com/libimobiledevice/libusbmuxd/commit/4397b3376dc4e4cb1c991d0aed61ce6482614196
- https://lists.debian.org/debian-lts-announce/2020/02/msg00027.html
- https://lists.debian.org/debian-lts-announce/2020/02/msg00028.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00042.html
- http://lists.opensuse.org/opensuse-updates/2016-06/msg00029.html
- http://www.openwall.com/lists/oss-security/2016/05/26/1
- http://www.openwall.com/lists/oss-security/2016/05/26/6
- http://www.ubuntu.com/usn/USN-3026-1
- http://www.ubuntu.com/usn/USN-3026-2
- https://bugzilla.redhat.com/show_bug.cgi?id=1339988
- https://github.com/libimobiledevice/libimobiledevice/commit/df1f5c4d70d0c19ad40072f5246ca457e7f9849e
- https://github.com/libimobiledevice/libusbmuxd/commit/4397b3376dc4e4cb1c991d0aed61ce6482614196
- https://lists.debian.org/debian-lts-announce/2020/02/msg00027.html
- https://lists.debian.org/debian-lts-announce/2020/02/msg00028.html
Closed bugs
libimobiledevice не поддерживает подключение к актуальным версиям iOS
Package perl-Archive-Tar updated to version 2.30-alt1 for branch sisyphus in task 208735.
Closed vulnerabilities
BDU:2019-00435
Уязвимость модуля Archive::Tar интерпретатора языка программирования Perl, позволяющая нарушителю обойти установленный контроль доступа и нарушить целостность информации
Modified: 2024-11-21
CVE-2018-12015
In Perl through 5.26.2, the Archive::Tar module allows remote attackers to bypass a directory-traversal protection mechanism, and overwrite arbitrary files, via an archive file containing a symlink and a regular file with the same name.
- http://seclists.org/fulldisclosure/2019/Mar/49
- http://www.securityfocus.com/bid/104423
- http://www.securitytracker.com/id/1041048
- https://access.redhat.com/errata/RHSA-2019:2097
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900834
- https://seclists.org/bugtraq/2019/Mar/42
- https://security.netapp.com/advisory/ntap-20180927-0001/
- https://support.apple.com/kb/HT209600
- https://usn.ubuntu.com/3684-1/
- https://usn.ubuntu.com/3684-2/
- https://www.debian.org/security/2018/dsa-4226
- https://www.oracle.com/security-alerts/cpujul2020.html
- http://seclists.org/fulldisclosure/2019/Mar/49
- http://www.securityfocus.com/bid/104423
- http://www.securitytracker.com/id/1041048
- https://access.redhat.com/errata/RHSA-2019:2097
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=900834
- https://seclists.org/bugtraq/2019/Mar/42
- https://security.netapp.com/advisory/ntap-20180927-0001/
- https://support.apple.com/kb/HT209600
- https://usn.ubuntu.com/3684-1/
- https://usn.ubuntu.com/3684-2/
- https://www.debian.org/security/2018/dsa-4226
- https://www.oracle.com/security-alerts/cpujul2020.html