ALT-BU-2018-3458-3
Branch sisyphus update bulletin.
Package libwebkitgtk4 updated to version 2.22.0-alt1 for branch sisyphus in task 212651.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-4207
In iOS before 11.3, Safari before 11.1, iCloud for Windows before 7.4, tvOS before 11.3, watchOS before 4.3, iTunes before 12.7.4 for Windows, unexpected interaction causes an ASSERT failure. This issue was addressed with improved checks.
- https://security.gentoo.org/glsa/201812-04
- https://support.apple.com/HT208693%2C
- https://support.apple.com/HT208694
- https://support.apple.com/HT208695%2C
- https://support.apple.com/HT208696%2C
- https://support.apple.com/HT208697%2C
- https://support.apple.com/HT208698%2C
- https://usn.ubuntu.com/3781-1/
- https://security.gentoo.org/glsa/201812-04
- https://support.apple.com/HT208693%2C
- https://support.apple.com/HT208694
- https://support.apple.com/HT208695%2C
- https://support.apple.com/HT208696%2C
- https://support.apple.com/HT208697%2C
- https://support.apple.com/HT208698%2C
- https://usn.ubuntu.com/3781-1/
Modified: 2024-11-21
CVE-2018-4208
In iOS before 11.3, Safari before 11.1, iCloud for Windows before 7.4, tvOS before 11.3, watchOS before 4.3, iTunes before 12.7.4 for Windows, unexpected interaction causes an ASSERT failure. This issue was addressed with improved checks.
- https://security.gentoo.org/glsa/201812-04
- https://support.apple.com/HT208693%2C
- https://support.apple.com/HT208694%2C
- https://support.apple.com/HT208695%2C
- https://support.apple.com/HT208696
- https://support.apple.com/HT208697%2C
- https://support.apple.com/HT208698%2C
- https://usn.ubuntu.com/3781-1/
- https://security.gentoo.org/glsa/201812-04
- https://support.apple.com/HT208693%2C
- https://support.apple.com/HT208694%2C
- https://support.apple.com/HT208695%2C
- https://support.apple.com/HT208696
- https://support.apple.com/HT208697%2C
- https://support.apple.com/HT208698%2C
- https://usn.ubuntu.com/3781-1/
Modified: 2024-11-21
CVE-2018-4210
In iOS before 11.3, Safari before 11.1, tvOS before 11.3, watchOS before 4.3, iTunes before 12.7.4 for Windows, an array indexing issue existed in the handling of a function in javascript core. This issue was addressed with improved checks.
- https://security.gentoo.org/glsa/201812-04
- https://support.apple.com/HT208693%2C
- https://support.apple.com/HT208694%2C
- https://support.apple.com/HT208695%2C
- https://support.apple.com/HT208698
- https://usn.ubuntu.com/3781-1/
- https://security.gentoo.org/glsa/201812-04
- https://support.apple.com/HT208693%2C
- https://support.apple.com/HT208694%2C
- https://support.apple.com/HT208695%2C
- https://support.apple.com/HT208698
- https://usn.ubuntu.com/3781-1/
Modified: 2024-11-21
CVE-2018-4213
In iOS before 11.3, Safari before 11.1, iCloud for Windows before 7.4, tvOS before 11.3, watchOS before 4.3, iTunes before 12.7.4 for Windows, unexpected interaction causes an ASSERT failure. This issue was addressed with improved checks.
- https://security.gentoo.org/glsa/201812-04
- https://support.apple.com/HT208693%2Chttps://support.apple.com/HT208698%2C
- https://support.apple.com/HT208694
- https://support.apple.com/HT208695%2C
- https://support.apple.com/HT208696%2C
- https://support.apple.com/HT208697%2C
- https://usn.ubuntu.com/3781-1/
- https://security.gentoo.org/glsa/201812-04
- https://support.apple.com/HT208693%2Chttps://support.apple.com/HT208698%2C
- https://support.apple.com/HT208694
- https://support.apple.com/HT208695%2C
- https://support.apple.com/HT208696%2C
- https://support.apple.com/HT208697%2C
- https://usn.ubuntu.com/3781-1/
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-12422
addressbook/backends/ldap/e-book-backend-ldap.c in Evolution-Data-Server in GNOME Evolution through 3.29.2 might allow attackers to trigger a Buffer Overflow via a long query that is processed by the strcat function. NOTE: the software maintainer disputes this because "the code had computed the required string length first, and then allocated a large-enough buffer on the heap.
Package file-roller updated to version 3.30.0-alt1 for branch sisyphus in task 212651.
Closed vulnerabilities
Modified: 2023-11-21
BDU:2019-04774
Уязвимость функции sanitize_filename из src/glib-utils.c программы-архиватора File Roller, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-16680
An issue was discovered in GNOME file-roller before 3.29.91. It allows a single ./../ path traversal via a filename contained in a TAR archive, possibly overwriting a file during extraction.
- https://bugzilla.gnome.org/show_bug.cgi?id=794337
- https://gitlab.gnome.org/GNOME/file-roller/commit/57268e51e59b61c9e3125eb0f65551c7084297e2
- https://gitlab.gnome.org/GNOME/file-roller/commit/e8fb3e24dae711e4fb0d6777e0016cdda8787bc1
- https://lists.debian.org/debian-lts-announce/2019/09/msg00032.html
- https://seclists.org/bugtraq/2019/Sep/57
- https://usn.ubuntu.com/4139-1/
- https://www.debian.org/security/2019/dsa-4537
- https://bugzilla.redhat.com/show_bug.cgi?id=1767594
- https://bugzilla.gnome.org/show_bug.cgi?id=794337
- https://gitlab.gnome.org/GNOME/file-roller/commit/57268e51e59b61c9e3125eb0f65551c7084297e2
- https://gitlab.gnome.org/GNOME/file-roller/commit/e8fb3e24dae711e4fb0d6777e0016cdda8787bc1
- https://lists.debian.org/debian-lts-announce/2019/09/msg00032.html
- https://seclists.org/bugtraq/2019/Sep/57
- https://usn.ubuntu.com/4139-1/
- https://www.debian.org/security/2019/dsa-4537
Closed vulnerabilities
Modified: 2021-03-23
BDU:2018-01511
Уязвимость прокси-сервера Squid, связанная с обращением за пределы выделенного буфера памяти, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-1000024
The Squid Software Foundation Squid HTTP Caching Proxy version 3.0 to 3.5.27, 4.0 to 4.0.22 contains a Incorrect Pointer Handling vulnerability in ESI Response Processing that can result in Denial of Service for all clients using the proxy.. This attack appear to be exploitable via Remote server delivers an HTTP response payload containing valid but unusual ESI syntax.. This vulnerability appears to have been fixed in 4.0.23 and later.
- http://www.squid-cache.org/Advisories/SQUID-2018_1.txt
- http://www.squid-cache.org/Versions/
- https://lists.debian.org/debian-lts-announce/2018/02/msg00001.html
- https://usn.ubuntu.com/3557-1/
- https://usn.ubuntu.com/4059-2/
- https://www.debian.org/security/2018/dsa-4122
- http://www.squid-cache.org/Advisories/SQUID-2018_1.txt
- http://www.squid-cache.org/Versions/
- https://lists.debian.org/debian-lts-announce/2018/02/msg00001.html
- https://usn.ubuntu.com/3557-1/
- https://usn.ubuntu.com/4059-2/
- https://www.debian.org/security/2018/dsa-4122
Modified: 2024-11-21
CVE-2018-1000027
The Squid Software Foundation Squid HTTP Caching Proxy version prior to version 4.0.23 contains a NULL Pointer Dereference vulnerability in HTTP Response X-Forwarded-For header processing that can result in Denial of Service to all clients of the proxy. This attack appear to be exploitable via Remote HTTP server responding with an X-Forwarded-For header to certain types of HTTP request. This vulnerability appears to have been fixed in 4.0.23 and later.
- http://www.squid-cache.org/Advisories/SQUID-2018_2.txt
- http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2018_2.patch
- http://www.squid-cache.org/Versions/v4/changesets/SQUID-2018_2.patch
- https://github.com/squid-cache/squid/pull/129/files
- https://lists.debian.org/debian-lts-announce/2018/02/msg00001.html
- https://lists.debian.org/debian-lts-announce/2018/02/msg00002.html
- https://usn.ubuntu.com/3557-1/
- https://usn.ubuntu.com/4059-2/
- https://www.debian.org/security/2018/dsa-4122
- http://www.squid-cache.org/Advisories/SQUID-2018_2.txt
- http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2018_2.patch
- http://www.squid-cache.org/Versions/v4/changesets/SQUID-2018_2.patch
- https://github.com/squid-cache/squid/pull/129/files
- https://lists.debian.org/debian-lts-announce/2018/02/msg00001.html
- https://lists.debian.org/debian-lts-announce/2018/02/msg00002.html
- https://usn.ubuntu.com/3557-1/
- https://usn.ubuntu.com/4059-2/
- https://www.debian.org/security/2018/dsa-4122
