ALT-BU-2018-3391-1
Branch sisyphus update bulletin.
Package gnome-color-manager updated to version 3.28.0-alt2 for branch sisyphus in task 211201.
Closed bugs
Убрать зависимость на gnome-session
Package libxkbcommon updated to version 0.8.2-alt1 for branch sisyphus in task 211147.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-15853
Endless recursion exists in xkbcomp/expr.c in xkbcommon and libxkbcommon before 0.8.1, which could be used by local attackers to crash xkbcommon users by supplying a crafted keymap file that triggers boolean negation.
- RHSA-2019:2079
- RHSA-2019:2079
- https://github.com/xkbcommon/libxkbcommon/commit/1f9d1248c07cda8aaff762429c0dce146de8632a
- https://github.com/xkbcommon/libxkbcommon/commit/1f9d1248c07cda8aaff762429c0dce146de8632a
- https://lists.freedesktop.org/archives/wayland-devel/2018-August/039232.html
- https://lists.freedesktop.org/archives/wayland-devel/2018-August/039232.html
- GLSA-201810-05
- GLSA-201810-05
- USN-3786-1
- USN-3786-1
- USN-3786-2
- USN-3786-2
Modified: 2024-11-21
CVE-2018-15857
An invalid free in ExprAppendMultiKeysymList in xkbcomp/ast-build.c in xkbcommon before 0.8.1 could be used by local attackers to crash xkbcommon keymap parsers or possibly have unspecified other impact by supplying a crafted keymap file.
- RHSA-2019:2079
- RHSA-2019:2079
- https://github.com/xkbcommon/libxkbcommon/commit/c1e5ac16e77a21f87bdf3bc4dea61b037a17dddb
- https://github.com/xkbcommon/libxkbcommon/commit/c1e5ac16e77a21f87bdf3bc4dea61b037a17dddb
- https://lists.freedesktop.org/archives/wayland-devel/2018-August/039232.html
- https://lists.freedesktop.org/archives/wayland-devel/2018-August/039232.html
- GLSA-201810-05
- GLSA-201810-05
- USN-3786-1
- USN-3786-1
- USN-3786-2
- USN-3786-2
Modified: 2024-11-21
CVE-2018-15858
Unchecked NULL pointer usage when handling invalid aliases in CopyKeyAliasesToKeymap in xkbcomp/keycodes.c in xkbcommon before 0.8.1 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file.
- https://github.com/xkbcommon/libxkbcommon/commit/badb428e63387140720f22486b3acbd3d738859f
- https://github.com/xkbcommon/libxkbcommon/commit/badb428e63387140720f22486b3acbd3d738859f
- https://lists.freedesktop.org/archives/wayland-devel/2018-August/039232.html
- https://lists.freedesktop.org/archives/wayland-devel/2018-August/039232.html
- GLSA-201810-05
- GLSA-201810-05
- USN-3786-1
- USN-3786-1
- USN-3786-2
- USN-3786-2
Modified: 2024-11-21
CVE-2018-15859
Unchecked NULL pointer usage when parsing invalid atoms in ExprResolveLhs in xkbcomp/expr.c in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file, because lookup failures are mishandled.
- RHSA-2019:2079
- RHSA-2019:2079
- https://github.com/xkbcommon/libxkbcommon/commit/bb4909d2d8fa6b08155e449986a478101e2b2634
- https://github.com/xkbcommon/libxkbcommon/commit/bb4909d2d8fa6b08155e449986a478101e2b2634
- https://lists.freedesktop.org/archives/wayland-devel/2018-August/039243.html
- https://lists.freedesktop.org/archives/wayland-devel/2018-August/039243.html
- GLSA-201810-05
- GLSA-201810-05
- USN-3786-1
- USN-3786-1
- USN-3786-2
- USN-3786-2
Modified: 2024-11-21
CVE-2018-15861
Unchecked NULL pointer usage in ExprResolveLhs in xkbcomp/expr.c in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file that triggers an xkb_intern_atom failure.
- RHSA-2019:2079
- RHSA-2019:2079
- https://github.com/xkbcommon/libxkbcommon/commit/38e1766bc6e20108948aec8a0b222a4bad0254e9
- https://github.com/xkbcommon/libxkbcommon/commit/38e1766bc6e20108948aec8a0b222a4bad0254e9
- https://lists.freedesktop.org/archives/wayland-devel/2018-August/039243.html
- https://lists.freedesktop.org/archives/wayland-devel/2018-August/039243.html
- GLSA-201810-05
- GLSA-201810-05
- USN-3786-1
- USN-3786-1
- USN-3786-2
- USN-3786-2
Modified: 2024-11-21
CVE-2018-15862
Unchecked NULL pointer usage in LookupModMask in xkbcomp/expr.c in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file with invalid virtual modifiers.
- RHSA-2019:2079
- RHSA-2019:2079
- https://github.com/xkbcommon/libxkbcommon/commit/4e2ee9c3f6050d773f8bbe05bc0edb17f1ff8371
- https://github.com/xkbcommon/libxkbcommon/commit/4e2ee9c3f6050d773f8bbe05bc0edb17f1ff8371
- https://lists.freedesktop.org/archives/wayland-devel/2018-August/039243.html
- https://lists.freedesktop.org/archives/wayland-devel/2018-August/039243.html
- GLSA-201810-05
- GLSA-201810-05
- USN-3786-1
- USN-3786-1
- USN-3786-2
- USN-3786-2
Modified: 2024-11-21
CVE-2018-15863
Unchecked NULL pointer usage in ResolveStateAndPredicate in xkbcomp/compat.c in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file with a no-op modmask expression.
- RHSA-2019:2079
- RHSA-2019:2079
- https://github.com/xkbcommon/libxkbcommon/commit/96df3106d49438e442510c59acad306e94f3db4d
- https://github.com/xkbcommon/libxkbcommon/commit/96df3106d49438e442510c59acad306e94f3db4d
- https://lists.freedesktop.org/archives/wayland-devel/2018-August/039243.html
- https://lists.freedesktop.org/archives/wayland-devel/2018-August/039243.html
- GLSA-201810-05
- GLSA-201810-05
- USN-3786-1
- USN-3786-1
- USN-3786-2
- USN-3786-2
Modified: 2024-11-21
CVE-2018-15864
Unchecked NULL pointer usage in resolve_keysym in xkbcomp/parser.y in xkbcommon before 0.8.2 could be used by local attackers to crash (NULL pointer dereference) the xkbcommon parser by supplying a crafted keymap file, because a map access attempt can occur for a map that was never created.
- RHSA-2019:2079
- RHSA-2019:2079
- https://github.com/xkbcommon/libxkbcommon/commit/a8ea7a1d3daa7bdcb877615ae0a252c189153bd2
- https://github.com/xkbcommon/libxkbcommon/commit/a8ea7a1d3daa7bdcb877615ae0a252c189153bd2
- https://lists.freedesktop.org/archives/wayland-devel/2018-August/039243.html
- https://lists.freedesktop.org/archives/wayland-devel/2018-August/039243.html
- GLSA-201810-05
- GLSA-201810-05
- USN-3786-1
- USN-3786-1
- USN-3786-2
- USN-3786-2
Package adobe-flash-player-ppapi updated to version 30-alt1.S1 for branch sisyphus in task 211227.
Closed vulnerabilities
BDU:2021-05395
Уязвимость программной платформы Adobe Flash Player, связанная с записью данных за пределами буфера, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2018-4944
Adobe Flash Player versions 29.0.0.140 and earlier have an exploitable type confusion vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Modified: 2024-11-21
CVE-2018-4945
Adobe Flash Player versions 29.0.0.171 and earlier have a Type Confusion vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Modified: 2024-11-21
CVE-2018-5000
Adobe Flash Player versions 29.0.0.171 and earlier have an Integer Overflow vulnerability. Successful exploitation could lead to information disclosure.
Modified: 2024-11-21
CVE-2018-5001
Adobe Flash Player versions 29.0.0.171 and earlier have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Modified: 2025-02-13
CVE-2018-5002
Adobe Flash Player versions 29.0.0.171 and earlier have a Stack-based buffer overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Modified: 2024-11-21
CVE-2018-5007
Adobe Flash Player 30.0.0.113 and earlier versions have a Type Confusion vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Modified: 2024-11-21
CVE-2018-5008
Adobe Flash Player 30.0.0.113 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Closed bugs
chromium ругается на старый flash
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-12434
LibreSSL before 2.6.5 and 2.7.x before 2.7.4 allows a memory-cache side-channel attack on DSA and ECDSA signatures, aka the Return Of the Hidden Number Problem or ROHNP. To discover a key, the attacker needs access to either the local machine or a different virtual machine on the same physical host.
- https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.6.5-relnotes.txt
- https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.6.5-relnotes.txt
- https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.7.4-relnotes.txt
- https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-2.7.4-relnotes.txt
- https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/
- https://www.nccgroup.trust/us/our-research/technical-advisory-return-of-the-hidden-number-problem/