ALT-BU-2018-3382-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2015-06431
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06533
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06534
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06535
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06536
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2024-11-21
CVE-2014-3675
Shim allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted DHCPv6 packet.
Modified: 2024-11-21
CVE-2014-3676
Heap-based buffer overflow in Shim allows remote attackers to execute arbitrary code via a crafted IPv6 address, related to the "tftp:// DHCPv6 boot option."
Modified: 2024-11-21
CVE-2014-3677
Unspecified vulnerability in Shim might allow attackers to execute arbitrary code via a crafted MOK list, which triggers memory corruption.
Closed bugs
Не хватает зависимости на iso-codes
Closed vulnerabilities
BDU:2018-01486
Уязвимость распределенной системы управления версиями Git, связанная с ошибками в обработке специально сформированных имён подмодулей, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2017-15298
Git through 2.14.2 mishandles layers of tree objects, which allows remote attackers to cause a denial of service (memory consumption) via a crafted repository, aka a Git bomb. This can also have an impact of disk consumption; however, an affected process typically would not survive its attempt to build the data structure in memory before writing to disk.
Modified: 2024-11-21
CVE-2018-1000021
GIT version 2.15.1 and earlier contains a Input Validation Error vulnerability in Client that can result in problems including messing up terminal configuration to RCE. This attack appear to be exploitable via The user must interact with a malicious git server, (or have their traffic modified in a MITM attack).
Modified: 2024-11-21
CVE-2018-11233
In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before 2.16.4, and 2.17.x before 2.17.1, code to sanity-check pathnames on NTFS can result in reading out-of-bounds memory.
Modified: 2024-11-21
CVE-2018-11235
In Git before 2.13.7, 2.14.x before 2.14.4, 2.15.x before 2.15.2, 2.16.x before 2.16.4, and 2.17.x before 2.17.1, remote code execution can occur. With a crafted .gitmodules file, a malicious project can execute an arbitrary script on a machine that runs "git clone --recurse-submodules" because submodule "names" are obtained from this file, and then appended to $GIT_DIR/modules, leading to directory traversal with "../" in a name. Finally, post-checkout hooks from a submodule are executed, bypassing the intended design in which hooks are not obtained from a remote server.
- openSUSE-SU-2020:0598
- openSUSE-SU-2020:0598
- 104345
- 104345
- 1040991
- 1040991
- RHSA-2018:1957
- RHSA-2018:1957
- RHSA-2018:2147
- RHSA-2018:2147
- https://blogs.msdn.microsoft.com/devops/2018/05/29/announcing-the-may-2018-git-security-vulnerability/
- https://blogs.msdn.microsoft.com/devops/2018/05/29/announcing-the-may-2018-git-security-vulnerability/
- https://marc.info/?l=git&m=152761328506724&w=2
- https://marc.info/?l=git&m=152761328506724&w=2
- GLSA-201805-13
- GLSA-201805-13
- USN-3671-1
- USN-3671-1
- DSA-4212
- DSA-4212
- 44822
- 44822
Closed bugs
Переименовать пакет в git-full
git-core should depend on perl-Git
Closed bugs
Кракозябры
Package kernel-image-mp updated to version 4.17.12-alt1 for branch sisyphus in task 211020.
Closed vulnerabilities
BDU:2019-00978
Уязвимость в файле drivers/infiniband/core/ucma.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-02512
Уязвимость функции hfsplus_lookup () ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-03257
Уязвимость функции fscrypt_do_page_crypto() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-03258
Уязвимость функции remove_dirty_segment() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-03259
Уязвимость функции o_ctl_map_page() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-03260
Уязвимость функции btrfs_root_node() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-03261
Уязвимость функции try_merge_free_space() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-03262
Уязвимость функции write_extent_buffer() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-14609
An issue was discovered in the Linux kernel through 4.17.10. There is an invalid pointer dereference in __del_reloc_root() in fs/btrfs/relocation.c when mounting a crafted btrfs image, related to removing reloc rb_trees when reloc control has not been initialized.
- 104917
- https://bugzilla.kernel.org/show_bug.cgi?id=199833
- [debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
- https://patchwork.kernel.org/patch/10500521/
- USN-3821-1
- USN-3821-2
- USN-4094-1
- USN-4118-1
- DSA-4308
- 104917
- DSA-4308
- USN-4118-1
- USN-4094-1
- USN-3821-2
- USN-3821-1
- https://patchwork.kernel.org/patch/10500521/
- [debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
- https://bugzilla.kernel.org/show_bug.cgi?id=199833
Modified: 2024-11-21
CVE-2018-14610
An issue was discovered in the Linux kernel through 4.17.10. There is out-of-bounds access in write_extent_buffer() when mounting and operating a crafted btrfs image, because of a lack of verification that each block group has a corresponding chunk at mount time, within btrfs_read_block_groups in fs/btrfs/extent-tree.c.
- 104917
- https://bugzilla.kernel.org/show_bug.cgi?id=199837
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- [debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
- https://patchwork.kernel.org/patch/10503415/
- USN-3932-1
- USN-3932-2
- USN-4094-1
- USN-4118-1
- 104917
- USN-4118-1
- USN-4094-1
- USN-3932-2
- USN-3932-1
- https://patchwork.kernel.org/patch/10503415/
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
- [debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- https://bugzilla.kernel.org/show_bug.cgi?id=199837
Modified: 2024-11-21
CVE-2018-14611
An issue was discovered in the Linux kernel through 4.17.10. There is a use-after-free in try_merge_free_space() when mounting a crafted btrfs image, because of a lack of chunk type flag checks in btrfs_check_chunk_valid in fs/btrfs/volumes.c.
- 104917
- https://bugzilla.kernel.org/show_bug.cgi?id=199839
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- [debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
- https://patchwork.kernel.org/patch/10503099/
- USN-3932-1
- USN-3932-2
- USN-4094-1
- USN-4118-1
- 104917
- USN-4118-1
- USN-4094-1
- USN-3932-2
- USN-3932-1
- https://patchwork.kernel.org/patch/10503099/
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
- [debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- https://bugzilla.kernel.org/show_bug.cgi?id=199839
Modified: 2024-11-21
CVE-2018-14612
An issue was discovered in the Linux kernel through 4.17.10. There is an invalid pointer dereference in btrfs_root_node() when mounting a crafted btrfs image, because of a lack of chunk block group mapping validation in btrfs_read_block_groups in fs/btrfs/extent-tree.c, and a lack of empty-tree checks in check_leaf in fs/btrfs/tree-checker.c.
- 104917
- https://bugzilla.kernel.org/show_bug.cgi?id=199847
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- [debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
- https://patchwork.kernel.org/patch/10503403/
- https://patchwork.kernel.org/patch/10503413/
- USN-3932-1
- USN-3932-2
- USN-4094-1
- USN-4118-1
- 104917
- USN-4118-1
- USN-4094-1
- USN-3932-2
- USN-3932-1
- https://patchwork.kernel.org/patch/10503413/
- https://patchwork.kernel.org/patch/10503403/
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
- [debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- https://bugzilla.kernel.org/show_bug.cgi?id=199847
Modified: 2024-11-21
CVE-2018-14613
An issue was discovered in the Linux kernel through 4.17.10. There is an invalid pointer dereference in io_ctl_map_page() when mounting and operating a crafted btrfs image, because of a lack of block group item validation in check_leaf_item in fs/btrfs/tree-checker.c.
- 104917
- https://bugzilla.kernel.org/show_bug.cgi?id=199849
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- [debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
- https://patchwork.kernel.org/patch/10503147/
- USN-3932-1
- USN-3932-2
- USN-4094-1
- USN-4118-1
- https://www.oracle.com/security-alerts/cpuApr2021.html
- 104917
- https://www.oracle.com/security-alerts/cpuApr2021.html
- USN-4118-1
- USN-4094-1
- USN-3932-2
- USN-3932-1
- https://patchwork.kernel.org/patch/10503147/
- [debian-lts-announce] 20200610 [SECURITY] [DLA 2241-2] linux security update
- [debian-lts-announce] 20200609 [SECURITY] [DLA 2241-1] linux security update
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- https://bugzilla.kernel.org/show_bug.cgi?id=199849
Modified: 2024-11-21
CVE-2018-14614
An issue was discovered in the Linux kernel through 4.17.10. There is an out-of-bounds access in __remove_dirty_segment() in fs/f2fs/segment.c when mounting an f2fs image.
- 104917
- https://bugzilla.kernel.org/show_bug.cgi?id=200419
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- USN-3932-1
- USN-3932-2
- USN-4094-1
- USN-4118-1
- 104917
- USN-4118-1
- USN-4094-1
- USN-3932-2
- USN-3932-1
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- https://bugzilla.kernel.org/show_bug.cgi?id=200419
Modified: 2024-11-21
CVE-2018-14615
An issue was discovered in the Linux kernel through 4.17.10. There is a buffer overflow in truncate_inline_inode() in fs/f2fs/inline.c when umounting an f2fs image, because a length value may be negative.
Modified: 2024-11-21
CVE-2018-14616
An issue was discovered in the Linux kernel through 4.17.10. There is a NULL pointer dereference in fscrypt_do_page_crypto() in fs/crypto/crypto.c when operating on a file in a corrupted f2fs image.
- 104917
- https://bugzilla.kernel.org/show_bug.cgi?id=200465
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- USN-3932-1
- USN-3932-2
- USN-4094-1
- USN-4118-1
- 104917
- USN-4118-1
- USN-4094-1
- USN-3932-2
- USN-3932-1
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- https://bugzilla.kernel.org/show_bug.cgi?id=200465
Modified: 2024-11-21
CVE-2018-14617
An issue was discovered in the Linux kernel through 4.17.10. There is a NULL pointer dereference and panic in hfsplus_lookup() in fs/hfsplus/dir.c when opening a file (that is purportedly a hard link) in an hfs+ filesystem that has malformed catalog data, and is mounted read-only without a metadata directory.
- 104917
- https://bugzilla.kernel.org/show_bug.cgi?id=200297
- [debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
- USN-3821-1
- USN-3821-2
- USN-4094-1
- USN-4118-1
- DSA-4308
- https://www.spinics.net/lists/linux-fsdevel/msg130021.html
- 104917
- https://www.spinics.net/lists/linux-fsdevel/msg130021.html
- DSA-4308
- USN-4118-1
- USN-4094-1
- USN-3821-2
- USN-3821-1
- [debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
- https://bugzilla.kernel.org/show_bug.cgi?id=200297
Modified: 2024-11-21
CVE-2018-14734
drivers/infiniband/core/ucma.c in the Linux kernel through 4.17.11 allows ucma_leave_multicast to access a certain data structure after a cleanup step in ucma_process_join, which allows attackers to cause a denial of service (use-after-free).
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cb2595c1393b4a5211534e6f0a0fbad369e21ad8
- RHSA-2019:0831
- RHSA-2019:2029
- RHSA-2019:2043
- https://github.com/torvalds/linux/commit/cb2595c1393b4a5211534e6f0a0fbad369e21ad8
- [debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
- USN-3797-1
- USN-3797-2
- USN-3847-1
- USN-3847-2
- USN-3847-3
- USN-3849-1
- USN-3849-2
- DSA-4308
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cb2595c1393b4a5211534e6f0a0fbad369e21ad8
- DSA-4308
- USN-3849-2
- USN-3849-1
- USN-3847-3
- USN-3847-2
- USN-3847-1
- USN-3797-2
- USN-3797-1
- [debian-lts-announce] 20181003 [SECURITY] [DLA 1531-1] linux-4.9 security update
- https://github.com/torvalds/linux/commit/cb2595c1393b4a5211534e6f0a0fbad369e21ad8
- RHSA-2019:2043
- RHSA-2019:2029
- RHSA-2019:0831
Closed bugs
Содержит файлы шрифтов, содержащиеся в пакете fonts-ttf-vera