ALT-BU-2018-3391-2
Branch sisyphus update bulletin.
Package gnome-color-manager updated to version 3.28.0-alt2 for branch sisyphus in task 211201.
Closed bugs
Убрать зависимость на gnome-session
Package libxkbcommon updated to version 0.8.2-alt1 for branch sisyphus in task 211147.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-15853
Endless recursion exists in xkbcomp/expr.c in xkbcommon and libxkbcommon before 0.8.1, which could be used by local attackers to crash xkbcommon users by supplying a crafted keymap file that triggers boolean negation.
- https://access.redhat.com/errata/RHSA-2019:2079
- https://github.com/xkbcommon/libxkbcommon/commit/1f9d1248c07cda8aaff762429c0dce146de8632a
- https://lists.freedesktop.org/archives/wayland-devel/2018-August/039232.html
- https://security.gentoo.org/glsa/201810-05
- https://usn.ubuntu.com/3786-1/
- https://usn.ubuntu.com/3786-2/
- https://access.redhat.com/errata/RHSA-2019:2079
- https://github.com/xkbcommon/libxkbcommon/commit/1f9d1248c07cda8aaff762429c0dce146de8632a
- https://lists.freedesktop.org/archives/wayland-devel/2018-August/039232.html
- https://security.gentoo.org/glsa/201810-05
- https://usn.ubuntu.com/3786-1/
- https://usn.ubuntu.com/3786-2/
Modified: 2024-11-21
CVE-2018-15857
An invalid free in ExprAppendMultiKeysymList in xkbcomp/ast-build.c in xkbcommon before 0.8.1 could be used by local attackers to crash xkbcommon keymap parsers or possibly have unspecified other impact by supplying a crafted keymap file.
- https://access.redhat.com/errata/RHSA-2019:2079
- https://github.com/xkbcommon/libxkbcommon/commit/c1e5ac16e77a21f87bdf3bc4dea61b037a17dddb
- https://lists.freedesktop.org/archives/wayland-devel/2018-August/039232.html
- https://security.gentoo.org/glsa/201810-05
- https://usn.ubuntu.com/3786-1/
- https://usn.ubuntu.com/3786-2/
- https://access.redhat.com/errata/RHSA-2019:2079
- https://github.com/xkbcommon/libxkbcommon/commit/c1e5ac16e77a21f87bdf3bc4dea61b037a17dddb
- https://lists.freedesktop.org/archives/wayland-devel/2018-August/039232.html
- https://security.gentoo.org/glsa/201810-05
- https://usn.ubuntu.com/3786-1/
- https://usn.ubuntu.com/3786-2/
Modified: 2024-11-21
CVE-2018-15858
Unchecked NULL pointer usage when handling invalid aliases in CopyKeyAliasesToKeymap in xkbcomp/keycodes.c in xkbcommon before 0.8.1 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file.
- https://github.com/xkbcommon/libxkbcommon/commit/badb428e63387140720f22486b3acbd3d738859f
- https://lists.freedesktop.org/archives/wayland-devel/2018-August/039232.html
- https://security.gentoo.org/glsa/201810-05
- https://usn.ubuntu.com/3786-1/
- https://usn.ubuntu.com/3786-2/
- https://github.com/xkbcommon/libxkbcommon/commit/badb428e63387140720f22486b3acbd3d738859f
- https://lists.freedesktop.org/archives/wayland-devel/2018-August/039232.html
- https://security.gentoo.org/glsa/201810-05
- https://usn.ubuntu.com/3786-1/
- https://usn.ubuntu.com/3786-2/
Modified: 2024-11-21
CVE-2018-15859
Unchecked NULL pointer usage when parsing invalid atoms in ExprResolveLhs in xkbcomp/expr.c in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file, because lookup failures are mishandled.
- https://access.redhat.com/errata/RHSA-2019:2079
- https://github.com/xkbcommon/libxkbcommon/commit/bb4909d2d8fa6b08155e449986a478101e2b2634
- https://lists.freedesktop.org/archives/wayland-devel/2018-August/039243.html
- https://security.gentoo.org/glsa/201810-05
- https://usn.ubuntu.com/3786-1/
- https://usn.ubuntu.com/3786-2/
- https://access.redhat.com/errata/RHSA-2019:2079
- https://github.com/xkbcommon/libxkbcommon/commit/bb4909d2d8fa6b08155e449986a478101e2b2634
- https://lists.freedesktop.org/archives/wayland-devel/2018-August/039243.html
- https://security.gentoo.org/glsa/201810-05
- https://usn.ubuntu.com/3786-1/
- https://usn.ubuntu.com/3786-2/
Modified: 2024-11-21
CVE-2018-15861
Unchecked NULL pointer usage in ExprResolveLhs in xkbcomp/expr.c in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file that triggers an xkb_intern_atom failure.
- https://access.redhat.com/errata/RHSA-2019:2079
- https://github.com/xkbcommon/libxkbcommon/commit/38e1766bc6e20108948aec8a0b222a4bad0254e9
- https://lists.freedesktop.org/archives/wayland-devel/2018-August/039243.html
- https://security.gentoo.org/glsa/201810-05
- https://usn.ubuntu.com/3786-1/
- https://usn.ubuntu.com/3786-2/
- https://access.redhat.com/errata/RHSA-2019:2079
- https://github.com/xkbcommon/libxkbcommon/commit/38e1766bc6e20108948aec8a0b222a4bad0254e9
- https://lists.freedesktop.org/archives/wayland-devel/2018-August/039243.html
- https://security.gentoo.org/glsa/201810-05
- https://usn.ubuntu.com/3786-1/
- https://usn.ubuntu.com/3786-2/
Modified: 2024-11-21
CVE-2018-15862
Unchecked NULL pointer usage in LookupModMask in xkbcomp/expr.c in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file with invalid virtual modifiers.
- https://access.redhat.com/errata/RHSA-2019:2079
- https://github.com/xkbcommon/libxkbcommon/commit/4e2ee9c3f6050d773f8bbe05bc0edb17f1ff8371
- https://lists.freedesktop.org/archives/wayland-devel/2018-August/039243.html
- https://security.gentoo.org/glsa/201810-05
- https://usn.ubuntu.com/3786-1/
- https://usn.ubuntu.com/3786-2/
- https://access.redhat.com/errata/RHSA-2019:2079
- https://github.com/xkbcommon/libxkbcommon/commit/4e2ee9c3f6050d773f8bbe05bc0edb17f1ff8371
- https://lists.freedesktop.org/archives/wayland-devel/2018-August/039243.html
- https://security.gentoo.org/glsa/201810-05
- https://usn.ubuntu.com/3786-1/
- https://usn.ubuntu.com/3786-2/
Modified: 2024-11-21
CVE-2018-15863
Unchecked NULL pointer usage in ResolveStateAndPredicate in xkbcomp/compat.c in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file with a no-op modmask expression.
- https://access.redhat.com/errata/RHSA-2019:2079
- https://github.com/xkbcommon/libxkbcommon/commit/96df3106d49438e442510c59acad306e94f3db4d
- https://lists.freedesktop.org/archives/wayland-devel/2018-August/039243.html
- https://security.gentoo.org/glsa/201810-05
- https://usn.ubuntu.com/3786-1/
- https://usn.ubuntu.com/3786-2/
- https://access.redhat.com/errata/RHSA-2019:2079
- https://github.com/xkbcommon/libxkbcommon/commit/96df3106d49438e442510c59acad306e94f3db4d
- https://lists.freedesktop.org/archives/wayland-devel/2018-August/039243.html
- https://security.gentoo.org/glsa/201810-05
- https://usn.ubuntu.com/3786-1/
- https://usn.ubuntu.com/3786-2/
Modified: 2024-11-21
CVE-2018-15864
Unchecked NULL pointer usage in resolve_keysym in xkbcomp/parser.y in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file, because a map access attempt can occur for a map that was never created.
- https://access.redhat.com/errata/RHSA-2019:2079
- https://github.com/xkbcommon/libxkbcommon/commit/a8ea7a1d3daa7bdcb877615ae0a252c189153bd2
- https://lists.freedesktop.org/archives/wayland-devel/2018-August/039243.html
- https://security.gentoo.org/glsa/201810-05
- https://usn.ubuntu.com/3786-1/
- https://usn.ubuntu.com/3786-2/
- https://access.redhat.com/errata/RHSA-2019:2079
- https://github.com/xkbcommon/libxkbcommon/commit/a8ea7a1d3daa7bdcb877615ae0a252c189153bd2
- https://lists.freedesktop.org/archives/wayland-devel/2018-August/039243.html
- https://security.gentoo.org/glsa/201810-05
- https://usn.ubuntu.com/3786-1/
- https://usn.ubuntu.com/3786-2/
Package adobe-flash-player-ppapi updated to version 30-alt1.S1 for branch sisyphus in task 211227.
Closed vulnerabilities
Modified: 2024-09-24
BDU:2021-05395
Уязвимость программной платформы Adobe Flash Player, связанная с записью данных за пределами буфера, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2018-4944
Adobe Flash Player versions 29.0.0.140 and earlier have an exploitable type confusion vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
- http://www.securityfocus.com/bid/104101
- http://www.securitytracker.com/id/1040840
- https://access.redhat.com/errata/RHSA-2018:1367
- https://helpx.adobe.com/security/products/flash-player/apsb18-16.html
- https://security.gentoo.org/glsa/201806-02
- http://www.securityfocus.com/bid/104101
- http://www.securitytracker.com/id/1040840
- https://access.redhat.com/errata/RHSA-2018:1367
- https://helpx.adobe.com/security/products/flash-player/apsb18-16.html
- https://security.gentoo.org/glsa/201806-02
Modified: 2024-11-21
CVE-2018-4945
Adobe Flash Player versions 29.0.0.171 and earlier have a Type Confusion vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
- http://www.securityfocus.com/bid/104413
- http://www.securitytracker.com/id/1041058
- https://access.redhat.com/errata/RHSA-2018:1827
- https://helpx.adobe.com/security/products/flash-player/apsb18-19.html
- https://security.gentoo.org/glsa/201806-02
- http://www.securityfocus.com/bid/104413
- http://www.securitytracker.com/id/1041058
- https://access.redhat.com/errata/RHSA-2018:1827
- https://helpx.adobe.com/security/products/flash-player/apsb18-19.html
- https://security.gentoo.org/glsa/201806-02
Modified: 2024-11-21
CVE-2018-5000
Adobe Flash Player versions 29.0.0.171 and earlier have an Integer Overflow vulnerability. Successful exploitation could lead to information disclosure.
- http://www.securityfocus.com/bid/104413
- http://www.securitytracker.com/id/1041058
- https://access.redhat.com/errata/RHSA-2018:1827
- https://helpx.adobe.com/security/products/flash-player/apsb18-19.html
- https://security.gentoo.org/glsa/201806-02
- http://www.securityfocus.com/bid/104413
- http://www.securitytracker.com/id/1041058
- https://access.redhat.com/errata/RHSA-2018:1827
- https://helpx.adobe.com/security/products/flash-player/apsb18-19.html
- https://security.gentoo.org/glsa/201806-02
Modified: 2024-11-21
CVE-2018-5001
Adobe Flash Player versions 29.0.0.171 and earlier have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
- http://www.securityfocus.com/bid/104413
- http://www.securitytracker.com/id/1041058
- https://access.redhat.com/errata/RHSA-2018:1827
- https://helpx.adobe.com/security/products/flash-player/apsb18-19.html
- https://security.gentoo.org/glsa/201806-02
- http://www.securityfocus.com/bid/104413
- http://www.securitytracker.com/id/1041058
- https://access.redhat.com/errata/RHSA-2018:1827
- https://helpx.adobe.com/security/products/flash-player/apsb18-19.html
- https://security.gentoo.org/glsa/201806-02
Modified: 2025-11-18
CVE-2018-5002
Adobe Flash Player versions 29.0.0.171 and earlier have a Stack-based buffer overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
- http://www.securityfocus.com/bid/104412
- http://www.securitytracker.com/id/1041058
- https://access.redhat.com/errata/RHSA-2018:1827
- https://helpx.adobe.com/security/products/flash-player/apsb18-19.html
- https://security.gentoo.org/glsa/201806-02
- http://www.securityfocus.com/bid/104412
- http://www.securitytracker.com/id/1041058
- https://access.redhat.com/errata/RHSA-2018:1827
- https://helpx.adobe.com/security/products/flash-player/apsb18-19.html
- https://security.gentoo.org/glsa/201806-02
- https://github.com/cisagov/vulnrichment/issues/196
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-5002
Modified: 2024-11-21
CVE-2018-5007
Adobe Flash Player 30.0.0.113 and earlier versions have a Type Confusion vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
- http://www.securityfocus.com/bid/104698
- http://www.securitytracker.com/id/1041248
- https://access.redhat.com/errata/RHSA-2018:2175
- https://helpx.adobe.com/security/products/flash-player/apsb18-24.html
- http://www.securityfocus.com/bid/104698
- http://www.securitytracker.com/id/1041248
- https://access.redhat.com/errata/RHSA-2018:2175
- https://helpx.adobe.com/security/products/flash-player/apsb18-24.html
Modified: 2024-11-21
CVE-2018-5008
Adobe Flash Player 30.0.0.113 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
- http://www.securityfocus.com/bid/104698
- http://www.securitytracker.com/id/1041248
- https://access.redhat.com/errata/RHSA-2018:2175
- https://helpx.adobe.com/security/products/flash-player/apsb18-24.html
- http://www.securityfocus.com/bid/104698
- http://www.securitytracker.com/id/1041248
- https://access.redhat.com/errata/RHSA-2018:2175
- https://helpx.adobe.com/security/products/flash-player/apsb18-24.html
Closed bugs
chromium ругается на старый flash
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-12434
LibreSSL before 2.6.5 and 2.7.x before 2.7.4 allows a memory-cache side-channel attack on DSA and ECDSA signatures, aka the Return Of the Hidden Number Problem or ROHNP. To discover a key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.
- https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.6.5-relnotes.txt
- https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.7.4-relnotes.txt
- https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/
- https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.6.5-relnotes.txt
- https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.7.4-relnotes.txt
- https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/
Package kernel-image-std-def updated to version 4.14.62-alt1 for branch sisyphus in task 211223.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-12233
In the ea_get function in fs/jfs/xattr.c in the Linux kernel through 4.17.1, a memory corruption bug in JFS can be triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability can be triggered by an unprivileged user with the ability to create files and execute programs. A kmalloc call is incorrect, leading to slab-out-of-bounds in jfs_xattr.
- http://www.securityfocus.com/bid/104452
- https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
- https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
- https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
- https://lkml.org/lkml/2018/6/2/2
- https://marc.info/?l=linux-kernel&m=152814391530549&w=2
- https://usn.ubuntu.com/3752-1/
- https://usn.ubuntu.com/3752-2/
- https://usn.ubuntu.com/3752-3/
- https://usn.ubuntu.com/3753-1/
- https://usn.ubuntu.com/3753-2/
- https://usn.ubuntu.com/3754-1/
- http://www.securityfocus.com/bid/104452
- https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
- https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
- https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
- https://lkml.org/lkml/2018/6/2/2
- https://marc.info/?l=linux-kernel&m=152814391530549&w=2
- https://usn.ubuntu.com/3752-1/
- https://usn.ubuntu.com/3752-2/
- https://usn.ubuntu.com/3752-3/
- https://usn.ubuntu.com/3753-1/
- https://usn.ubuntu.com/3753-2/
- https://usn.ubuntu.com/3754-1/
Package adobe-flash-player updated to version 30-alt1.S1 for branch sisyphus in task 211227.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-4944
Adobe Flash Player versions 29.0.0.140 and earlier have an exploitable type confusion vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
- http://www.securityfocus.com/bid/104101
- http://www.securitytracker.com/id/1040840
- https://access.redhat.com/errata/RHSA-2018:1367
- https://helpx.adobe.com/security/products/flash-player/apsb18-16.html
- https://security.gentoo.org/glsa/201806-02
- http://www.securityfocus.com/bid/104101
- http://www.securitytracker.com/id/1040840
- https://access.redhat.com/errata/RHSA-2018:1367
- https://helpx.adobe.com/security/products/flash-player/apsb18-16.html
- https://security.gentoo.org/glsa/201806-02
Package kernel-image-un-def updated to version 4.17.14-alt1 for branch sisyphus in task 211235.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-12233
In the ea_get function in fs/jfs/xattr.c in the Linux kernel through 4.17.1, a memory corruption bug in JFS can be triggered by calling setxattr twice with two different extended attribute names on the same file. This vulnerability can be triggered by an unprivileged user with the ability to create files and execute programs. A kmalloc call is incorrect, leading to slab-out-of-bounds in jfs_xattr.
- http://www.securityfocus.com/bid/104452
- https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
- https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
- https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
- https://lkml.org/lkml/2018/6/2/2
- https://marc.info/?l=linux-kernel&m=152814391530549&w=2
- https://usn.ubuntu.com/3752-1/
- https://usn.ubuntu.com/3752-2/
- https://usn.ubuntu.com/3752-3/
- https://usn.ubuntu.com/3753-1/
- https://usn.ubuntu.com/3753-2/
- https://usn.ubuntu.com/3754-1/
- http://www.securityfocus.com/bid/104452
- https://lists.debian.org/debian-lts-announce/2018/07/msg00015.html
- https://lists.debian.org/debian-lts-announce/2018/07/msg00016.html
- https://lists.debian.org/debian-lts-announce/2018/07/msg00020.html
- https://lkml.org/lkml/2018/6/2/2
- https://marc.info/?l=linux-kernel&m=152814391530549&w=2
- https://usn.ubuntu.com/3752-1/
- https://usn.ubuntu.com/3752-2/
- https://usn.ubuntu.com/3752-3/
- https://usn.ubuntu.com/3753-1/
- https://usn.ubuntu.com/3753-2/
- https://usn.ubuntu.com/3754-1/
