ALT-BU-2018-3382-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2015-06431
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06533
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06534
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06535
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06536
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2025-04-12
CVE-2014-3675
Shim allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted DHCPv6 packet.
- http://rhn.redhat.com/errata/RHSA-2014-1801.html
- http://www.openwall.com/lists/oss-security/2014/10/13/4
- http://www.securityfocus.com/bid/70407
- https://exchange.xforce.ibmcloud.com/vulnerabilities/96981
- http://rhn.redhat.com/errata/RHSA-2014-1801.html
- http://www.openwall.com/lists/oss-security/2014/10/13/4
- http://www.securityfocus.com/bid/70407
- https://exchange.xforce.ibmcloud.com/vulnerabilities/96981
Modified: 2025-04-12
CVE-2014-3676
Heap-based buffer overflow in Shim allows remote attackers to execute arbitrary code via a crafted IPv6 address, related to the "tftp:// DHCPv6 boot option."
- http://rhn.redhat.com/errata/RHSA-2014-1801.html
- http://www.openwall.com/lists/oss-security/2014/10/13/4
- http://www.securityfocus.com/bid/70409
- https://exchange.xforce.ibmcloud.com/vulnerabilities/96988
- http://rhn.redhat.com/errata/RHSA-2014-1801.html
- http://www.openwall.com/lists/oss-security/2014/10/13/4
- http://www.securityfocus.com/bid/70409
- https://exchange.xforce.ibmcloud.com/vulnerabilities/96988
Modified: 2025-04-12
CVE-2014-3677
Unspecified vulnerability in Shim might allow attackers to execute arbitrary code via a crafted MOK list, which triggers memory corruption.
- http://rhn.redhat.com/errata/RHSA-2014-1801.html
- http://www.openwall.com/lists/oss-security/2014/10/13/4
- http://www.securityfocus.com/bid/70410
- https://exchange.xforce.ibmcloud.com/vulnerabilities/96989
- http://rhn.redhat.com/errata/RHSA-2014-1801.html
- http://www.openwall.com/lists/oss-security/2014/10/13/4
- http://www.securityfocus.com/bid/70410
- https://exchange.xforce.ibmcloud.com/vulnerabilities/96989
Closed bugs
Не хватает зависимости на iso-codes
Closed vulnerabilities
BDU:2018-01486
Уязвимость распределенной системы управления версиями Git, связанная с ошибками в обработке специально сформированных имён подмодулей, позволяющая нарушителю выполнить произвольный код
Modified: 2025-04-20
CVE-2017-15298
Git through 2.14.2 mishandles layers of tree objects, which allows remote attackers to cause a denial of service (memory consumption) via a crafted repository, aka a Git bomb. This can also have an impact of disk consumption; however, an affected process typically would not survive its attempt to build the data structure in memory before writing to disk.
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html
- https://github.com/Katee/git-bomb
- https://kate.io/blog/git-bomb/
- https://usn.ubuntu.com/3829-1/
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html
- https://github.com/Katee/git-bomb
- https://kate.io/blog/git-bomb/
- https://usn.ubuntu.com/3829-1/
Modified: 2024-11-21
CVE-2018-1000021
GIT version 2.15.1 and earlier contains a Input Validation Error vulnerability in Client that can result in problems including messing up terminal configuration to RCE. This attack appear to be exploitable via The user must interact with a malicious git server, (or have their traffic modified in a MITM attack).
Modified: 2024-11-21
CVE-2018-11233
In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before 2.16.4, and 2.17.x before 2.17.1, code to sanity-check pathnames on NTFS can result in reading out-of-bounds memory.
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html
- http://www.securityfocus.com/bid/104346
- http://www.securitytracker.com/id/1040991
- https://access.redhat.com/errata/RHSA-2018:2147
- https://marc.info/?l=git&m=152761328506724&w=2
- https://security.gentoo.org/glsa/201805-13
- https://usn.ubuntu.com/3671-1/
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html
- http://www.securityfocus.com/bid/104346
- http://www.securitytracker.com/id/1040991
- https://access.redhat.com/errata/RHSA-2018:2147
- https://marc.info/?l=git&m=152761328506724&w=2
- https://security.gentoo.org/glsa/201805-13
- https://usn.ubuntu.com/3671-1/
Modified: 2024-11-21
CVE-2018-11235
In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before 2.16.4, and 2.17.x before 2.17.1, remote code execution can occur. With a crafted .gitmodules file, a malicious project can execute an arbitrary script on a machine that runs "git clone --recurse-submodules" because submodule "names" are obtained from this file, and then appended to $GIT_DIR/modules, leading to directory traversal with "../" in a name. Finally, post-checkout hooks from a submodule are executed, bypassing the intended design in which hooks are not obtained from a remote server.
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html
- http://www.securityfocus.com/bid/104345
- http://www.securitytracker.com/id/1040991
- https://access.redhat.com/errata/RHSA-2018:1957
- https://access.redhat.com/errata/RHSA-2018:2147
- https://blogs.msdn.microsoft.com/devops/2018/05/29/announcing-the-may-2018-git-security-vulnerability/
- https://marc.info/?l=git&m=152761328506724&w=2
- https://security.gentoo.org/glsa/201805-13
- https://usn.ubuntu.com/3671-1/
- https://www.debian.org/security/2018/dsa-4212
- https://www.exploit-db.com/exploits/44822/
- http://lists.opensuse.org/opensuse-security-announce/2020-05/msg00003.html
- http://www.securityfocus.com/bid/104345
- http://www.securitytracker.com/id/1040991
- https://access.redhat.com/errata/RHSA-2018:1957
- https://access.redhat.com/errata/RHSA-2018:2147
- https://blogs.msdn.microsoft.com/devops/2018/05/29/announcing-the-may-2018-git-security-vulnerability/
- https://marc.info/?l=git&m=152761328506724&w=2
- https://security.gentoo.org/glsa/201805-13
- https://usn.ubuntu.com/3671-1/
- https://www.debian.org/security/2018/dsa-4212
- https://www.exploit-db.com/exploits/44822/
Closed bugs
Переименовать пакет в git-full
git-core should depend on perl-Git
Closed bugs
Кракозябры
Package kernel-image-mp updated to version 4.17.12-alt1 for branch sisyphus in task 211020.
Closed vulnerabilities
BDU:2019-00978
Уязвимость в файле drivers/infiniband/core/ucma.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-02512
Уязвимость функции hfsplus_lookup () ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-03257
Уязвимость функции fscrypt_do_page_crypto() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-03258
Уязвимость функции remove_dirty_segment() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-03259
Уязвимость функции o_ctl_map_page() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-03260
Уязвимость функции btrfs_root_node() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-03261
Уязвимость функции try_merge_free_space() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-03262
Уязвимость функции write_extent_buffer() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-14609
An issue was discovered in the Linux kernel through 4.17.10. There is an invalid pointer dereference in __del_reloc_root() in fs/btrfs/relocation.c when mounting a crafted btrfs image, related to removing reloc rb_trees when reloc control has not been initialized.
- http://www.securityfocus.com/bid/104917
- https://bugzilla.kernel.org/show_bug.cgi?id=199833
- https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html
- https://patchwork.kernel.org/patch/10500521/
- https://usn.ubuntu.com/3821-1/
- https://usn.ubuntu.com/3821-2/
- https://usn.ubuntu.com/4094-1/
- https://usn.ubuntu.com/4118-1/
- https://www.debian.org/security/2018/dsa-4308
- http://www.securityfocus.com/bid/104917
- https://bugzilla.kernel.org/show_bug.cgi?id=199833
- https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html
- https://patchwork.kernel.org/patch/10500521/
- https://usn.ubuntu.com/3821-1/
- https://usn.ubuntu.com/3821-2/
- https://usn.ubuntu.com/4094-1/
- https://usn.ubuntu.com/4118-1/
- https://www.debian.org/security/2018/dsa-4308
Modified: 2024-11-21
CVE-2018-14610
An issue was discovered in the Linux kernel through 4.17.10. There is out-of-bounds access in write_extent_buffer() when mounting and operating a crafted btrfs image, because of a lack of verification that each block group has a corresponding chunk at mount time, within btrfs_read_block_groups in fs/btrfs/extent-tree.c.
- http://www.securityfocus.com/bid/104917
- https://bugzilla.kernel.org/show_bug.cgi?id=199837
- https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
- https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
- https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
- https://patchwork.kernel.org/patch/10503415/
- https://usn.ubuntu.com/3932-1/
- https://usn.ubuntu.com/3932-2/
- https://usn.ubuntu.com/4094-1/
- https://usn.ubuntu.com/4118-1/
- http://www.securityfocus.com/bid/104917
- https://bugzilla.kernel.org/show_bug.cgi?id=199837
- https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
- https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
- https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
- https://patchwork.kernel.org/patch/10503415/
- https://usn.ubuntu.com/3932-1/
- https://usn.ubuntu.com/3932-2/
- https://usn.ubuntu.com/4094-1/
- https://usn.ubuntu.com/4118-1/
Modified: 2024-11-21
CVE-2018-14611
An issue was discovered in the Linux kernel through 4.17.10. There is a use-after-free in try_merge_free_space() when mounting a crafted btrfs image, because of a lack of chunk type flag checks in btrfs_check_chunk_valid in fs/btrfs/volumes.c.
- http://www.securityfocus.com/bid/104917
- https://bugzilla.kernel.org/show_bug.cgi?id=199839
- https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
- https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
- https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
- https://patchwork.kernel.org/patch/10503099/
- https://usn.ubuntu.com/3932-1/
- https://usn.ubuntu.com/3932-2/
- https://usn.ubuntu.com/4094-1/
- https://usn.ubuntu.com/4118-1/
- http://www.securityfocus.com/bid/104917
- https://bugzilla.kernel.org/show_bug.cgi?id=199839
- https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
- https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
- https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
- https://patchwork.kernel.org/patch/10503099/
- https://usn.ubuntu.com/3932-1/
- https://usn.ubuntu.com/3932-2/
- https://usn.ubuntu.com/4094-1/
- https://usn.ubuntu.com/4118-1/
Modified: 2024-11-21
CVE-2018-14612
An issue was discovered in the Linux kernel through 4.17.10. There is an invalid pointer dereference in btrfs_root_node() when mounting a crafted btrfs image, because of a lack of chunk block group mapping validation in btrfs_read_block_groups in fs/btrfs/extent-tree.c, and a lack of empty-tree checks in check_leaf in fs/btrfs/tree-checker.c.
- http://www.securityfocus.com/bid/104917
- https://bugzilla.kernel.org/show_bug.cgi?id=199847
- https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
- https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
- https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
- https://patchwork.kernel.org/patch/10503403/
- https://patchwork.kernel.org/patch/10503413/
- https://usn.ubuntu.com/3932-1/
- https://usn.ubuntu.com/3932-2/
- https://usn.ubuntu.com/4094-1/
- https://usn.ubuntu.com/4118-1/
- http://www.securityfocus.com/bid/104917
- https://bugzilla.kernel.org/show_bug.cgi?id=199847
- https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
- https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
- https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
- https://patchwork.kernel.org/patch/10503403/
- https://patchwork.kernel.org/patch/10503413/
- https://usn.ubuntu.com/3932-1/
- https://usn.ubuntu.com/3932-2/
- https://usn.ubuntu.com/4094-1/
- https://usn.ubuntu.com/4118-1/
Modified: 2024-11-21
CVE-2018-14613
An issue was discovered in the Linux kernel through 4.17.10. There is an invalid pointer dereference in io_ctl_map_page() when mounting and operating a crafted btrfs image, because of a lack of block group item validation in check_leaf_item in fs/btrfs/tree-checker.c.
- http://www.securityfocus.com/bid/104917
- https://bugzilla.kernel.org/show_bug.cgi?id=199849
- https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
- https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
- https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
- https://patchwork.kernel.org/patch/10503147/
- https://usn.ubuntu.com/3932-1/
- https://usn.ubuntu.com/3932-2/
- https://usn.ubuntu.com/4094-1/
- https://usn.ubuntu.com/4118-1/
- https://www.oracle.com/security-alerts/cpuApr2021.html
- http://www.securityfocus.com/bid/104917
- https://bugzilla.kernel.org/show_bug.cgi?id=199849
- https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
- https://lists.debian.org/debian-lts-announce/2020/06/msg00011.html
- https://lists.debian.org/debian-lts-announce/2020/06/msg00013.html
- https://patchwork.kernel.org/patch/10503147/
- https://usn.ubuntu.com/3932-1/
- https://usn.ubuntu.com/3932-2/
- https://usn.ubuntu.com/4094-1/
- https://usn.ubuntu.com/4118-1/
- https://www.oracle.com/security-alerts/cpuApr2021.html
Modified: 2024-11-21
CVE-2018-14614
An issue was discovered in the Linux kernel through 4.17.10. There is an out-of-bounds access in __remove_dirty_segment() in fs/f2fs/segment.c when mounting an f2fs image.
- http://www.securityfocus.com/bid/104917
- https://bugzilla.kernel.org/show_bug.cgi?id=200419
- https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
- https://usn.ubuntu.com/3932-1/
- https://usn.ubuntu.com/3932-2/
- https://usn.ubuntu.com/4094-1/
- https://usn.ubuntu.com/4118-1/
- http://www.securityfocus.com/bid/104917
- https://bugzilla.kernel.org/show_bug.cgi?id=200419
- https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
- https://usn.ubuntu.com/3932-1/
- https://usn.ubuntu.com/3932-2/
- https://usn.ubuntu.com/4094-1/
- https://usn.ubuntu.com/4118-1/
Modified: 2024-11-21
CVE-2018-14615
An issue was discovered in the Linux kernel through 4.17.10. There is a buffer overflow in truncate_inline_inode() in fs/f2fs/inline.c when umounting an f2fs image, because a length value may be negative.
- http://www.securityfocus.com/bid/104917
- https://bugzilla.kernel.org/show_bug.cgi?id=200421
- https://usn.ubuntu.com/4094-1/
- https://usn.ubuntu.com/4118-1/
- http://www.securityfocus.com/bid/104917
- https://bugzilla.kernel.org/show_bug.cgi?id=200421
- https://usn.ubuntu.com/4094-1/
- https://usn.ubuntu.com/4118-1/
Modified: 2024-11-21
CVE-2018-14616
An issue was discovered in the Linux kernel through 4.17.10. There is a NULL pointer dereference in fscrypt_do_page_crypto() in fs/crypto/crypto.c when operating on a file in a corrupted f2fs image.
- http://www.securityfocus.com/bid/104917
- https://bugzilla.kernel.org/show_bug.cgi?id=200465
- https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
- https://usn.ubuntu.com/3932-1/
- https://usn.ubuntu.com/3932-2/
- https://usn.ubuntu.com/4094-1/
- https://usn.ubuntu.com/4118-1/
- http://www.securityfocus.com/bid/104917
- https://bugzilla.kernel.org/show_bug.cgi?id=200465
- https://lists.debian.org/debian-lts-announce/2019/03/msg00017.html
- https://usn.ubuntu.com/3932-1/
- https://usn.ubuntu.com/3932-2/
- https://usn.ubuntu.com/4094-1/
- https://usn.ubuntu.com/4118-1/
Modified: 2024-11-21
CVE-2018-14617
An issue was discovered in the Linux kernel through 4.17.10. There is a NULL pointer dereference and panic in hfsplus_lookup() in fs/hfsplus/dir.c when opening a file (that is purportedly a hard link) in an hfs+ filesystem that has malformed catalog data, and is mounted read-only without a metadata directory.
- http://www.securityfocus.com/bid/104917
- https://bugzilla.kernel.org/show_bug.cgi?id=200297
- https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html
- https://usn.ubuntu.com/3821-1/
- https://usn.ubuntu.com/3821-2/
- https://usn.ubuntu.com/4094-1/
- https://usn.ubuntu.com/4118-1/
- https://www.debian.org/security/2018/dsa-4308
- https://www.spinics.net/lists/linux-fsdevel/msg130021.html
- http://www.securityfocus.com/bid/104917
- https://bugzilla.kernel.org/show_bug.cgi?id=200297
- https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html
- https://usn.ubuntu.com/3821-1/
- https://usn.ubuntu.com/3821-2/
- https://usn.ubuntu.com/4094-1/
- https://usn.ubuntu.com/4118-1/
- https://www.debian.org/security/2018/dsa-4308
- https://www.spinics.net/lists/linux-fsdevel/msg130021.html
Modified: 2024-11-21
CVE-2018-14734
drivers/infiniband/core/ucma.c in the Linux kernel through 4.17.11 allows ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allows attackers to cause a denial of service (use-after-free).
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cb2595c1393b4a5211534e6f0a0fbad369e21ad8
- https://access.redhat.com/errata/RHSA-2019:0831
- https://access.redhat.com/errata/RHSA-2019:2029
- https://access.redhat.com/errata/RHSA-2019:2043
- https://github.com/torvalds/linux/commit/cb2595c1393b4a5211534e6f0a0fbad369e21ad8
- https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html
- https://usn.ubuntu.com/3797-1/
- https://usn.ubuntu.com/3797-2/
- https://usn.ubuntu.com/3847-1/
- https://usn.ubuntu.com/3847-2/
- https://usn.ubuntu.com/3847-3/
- https://usn.ubuntu.com/3849-1/
- https://usn.ubuntu.com/3849-2/
- https://www.debian.org/security/2018/dsa-4308
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cb2595c1393b4a5211534e6f0a0fbad369e21ad8
- https://access.redhat.com/errata/RHSA-2019:0831
- https://access.redhat.com/errata/RHSA-2019:2029
- https://access.redhat.com/errata/RHSA-2019:2043
- https://github.com/torvalds/linux/commit/cb2595c1393b4a5211534e6f0a0fbad369e21ad8
- https://lists.debian.org/debian-lts-announce/2018/10/msg00003.html
- https://usn.ubuntu.com/3797-1/
- https://usn.ubuntu.com/3797-2/
- https://usn.ubuntu.com/3847-1/
- https://usn.ubuntu.com/3847-2/
- https://usn.ubuntu.com/3847-3/
- https://usn.ubuntu.com/3849-1/
- https://usn.ubuntu.com/3849-2/
- https://www.debian.org/security/2018/dsa-4308
Closed bugs
Содержит файлы шрифтов, содержащиеся в пакете fonts-ttf-vera