ALT-BU-2018-3516-1
Branch p8 update bulletin.
Package kernel-image-std-def updated to version 4.9.133-alt0.M80P.1 for branch p8 in task 214996.
Closed vulnerabilities
BDU:2019-01057
Уязвимость функции ext4_xattr_set_entry() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-00735
Уязвимость функции xenvif_set_hash_mapping гипервизора Xen, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность и доступность
Modified: 2024-11-21
CVE-2018-10879
A flaw was found in the Linux kernel's ext4 filesystem. A local user can cause a use-after-free in ext4_xattr_set_entry function and a denial of service or unspecified other impact may occur by renaming a file in a crafted ext4 filesystem image.
- http://patchwork.ozlabs.org/patch/928666/
- http://patchwork.ozlabs.org/patch/928666/
- http://patchwork.ozlabs.org/patch/928667/
- http://patchwork.ozlabs.org/patch/928667/
- 104902
- 104902
- RHSA-2018:2948
- RHSA-2018:2948
- RHSA-2018:3083
- RHSA-2018:3083
- RHSA-2018:3096
- RHSA-2018:3096
- https://bugzilla.kernel.org/show_bug.cgi?id=200001
- https://bugzilla.kernel.org/show_bug.cgi?id=200001
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10879
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-10879
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=513f86d73855ce556ea9522b6bfd79f87356dc3a
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=513f86d73855ce556ea9522b6bfd79f87356dc3a
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5369a762c882c0b6e9599e4ebbb3a9ba9eee7e2d
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=5369a762c882c0b6e9599e4ebbb3a9ba9eee7e2d
- [debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package
- [debian-lts-announce] 20180718 [SECURITY] [DLA 1423-1] linux-4.9 new package
- USN-3753-1
- USN-3753-1
- USN-3753-2
- USN-3753-2
- USN-3871-1
- USN-3871-1
- USN-3871-3
- USN-3871-3
- USN-3871-4
- USN-3871-4
- USN-3871-5
- USN-3871-5
Modified: 2024-11-21
CVE-2018-15471
An issue was discovered in xenvif_set_hash_mapping in drivers/net/xen-netback/hash.c in the Linux kernel through 4.18.1, as used in Xen through 4.11.x and other products. The Linux netback driver allows frontends to control mapping of requests to request queues. When processing a request to set or change this mapping, some input validation (e.g., for an integer overflow) was missing or flawed, leading to OOB access in hash handling. A malicious or buggy frontend may cause the (usually privileged) backend to make out of bounds memory accesses, potentially resulting in one or more of privilege escalation, Denial of Service (DoS), or information leaks.
- http://xenbits.xen.org/xsa/advisory-270.html
- http://xenbits.xen.org/xsa/advisory-270.html
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1607
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1607
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- USN-3819-1
- USN-3819-1
- USN-3820-1
- USN-3820-1
- USN-3820-2
- USN-3820-2
- USN-3820-3
- USN-3820-3
- DSA-4313
- DSA-4313
Closed vulnerabilities
BDU:2020-01873
Уязвимость функции kwajd_read_headers библиотеки Libmspack и утилиты разархивации CAB-файлов СabExtract, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-14680
An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. It does not reject blank CHM filenames.
- http://www.openwall.com/lists/oss-security/2018/07/26/1
- 1041410
- RHSA-2018:3327
- RHSA-2018:3505
- https://bugs.debian.org/904801
- https://github.com/kyz/libmspack/commit/72e70a921f0f07fee748aec2274b30784e1d312a
- [debian-lts-announce] 20180806 [SECURITY] [DLA-1460-1] libmspack security update
- GLSA-201903-20
- USN-3728-1
- USN-3728-2
- USN-3728-3
- USN-3789-2
- DSA-4260
- http://www.openwall.com/lists/oss-security/2018/07/26/1
- DSA-4260
- USN-3789-2
- USN-3728-3
- USN-3728-2
- USN-3728-1
- GLSA-201903-20
- [debian-lts-announce] 20180806 [SECURITY] [DLA-1460-1] libmspack security update
- https://github.com/kyz/libmspack/commit/72e70a921f0f07fee748aec2274b30784e1d312a
- https://bugs.debian.org/904801
- RHSA-2018:3505
- RHSA-2018:3327
- 1041410
Modified: 2024-11-21
CVE-2018-14681
An issue was discovered in kwajd_read_headers in mspack/kwajd.c in libmspack before 0.7alpha. Bad KWAJ file header extensions could cause a one or two byte overwrite.
- http://www.openwall.com/lists/oss-security/2018/07/26/1
- 1041410
- RHSA-2018:3327
- RHSA-2018:3505
- https://bugs.debian.org/904799
- https://github.com/kyz/libmspack/commit/0b0ef9344255ff5acfac6b7af09198ac9c9756c8
- [debian-lts-announce] 20180806 [SECURITY] [DLA-1460-1] libmspack security update
- GLSA-201903-20
- USN-3728-1
- USN-3728-2
- USN-3728-3
- USN-3789-2
- DSA-4260
- http://www.openwall.com/lists/oss-security/2018/07/26/1
- DSA-4260
- USN-3789-2
- USN-3728-3
- USN-3728-2
- USN-3728-1
- GLSA-201903-20
- [debian-lts-announce] 20180806 [SECURITY] [DLA-1460-1] libmspack security update
- https://github.com/kyz/libmspack/commit/0b0ef9344255ff5acfac6b7af09198ac9c9756c8
- https://bugs.debian.org/904799
- RHSA-2018:3505
- RHSA-2018:3327
- 1041410
Modified: 2024-11-21
CVE-2018-14682
An issue was discovered in mspack/chmd.c in libmspack before 0.7alpha. There is an off-by-one error in the TOLOWER() macro for CHM decompression.
- http://www.openwall.com/lists/oss-security/2018/07/26/1
- 1041410
- RHSA-2018:3327
- RHSA-2018:3505
- https://bugs.debian.org/904800
- https://github.com/kyz/libmspack/commit/4fd9ccaa54e1aebde1e4b95fb0163b699fd7bcc8
- [debian-lts-announce] 20180806 [SECURITY] [DLA-1460-1] libmspack security update
- GLSA-201903-20
- USN-3728-1
- USN-3728-2
- USN-3728-3
- USN-3789-2
- DSA-4260
- http://www.openwall.com/lists/oss-security/2018/07/26/1
- DSA-4260
- USN-3789-2
- USN-3728-3
- USN-3728-2
- USN-3728-1
- GLSA-201903-20
- [debian-lts-announce] 20180806 [SECURITY] [DLA-1460-1] libmspack security update
- https://github.com/kyz/libmspack/commit/4fd9ccaa54e1aebde1e4b95fb0163b699fd7bcc8
- https://bugs.debian.org/904800
- RHSA-2018:3505
- RHSA-2018:3327
- 1041410
Modified: 2024-11-21
CVE-2018-15378
A vulnerability in ClamAV versions prior to 0.100.2 could allow an attacker to cause a denial of service (DoS) condition. The vulnerability is due to an error related to the MEW unpacker within the "unmew11()" function (libclamav/mew.c), which can be exploited to trigger an invalid read memory access via a specially crafted EXE file.
- https://bugzilla.clamav.net/show_bug.cgi?id=12170
- https://bugzilla.clamav.net/show_bug.cgi?id=12170
- [debian-lts-announce] 20181024 [SECURITY] [DLA 1553-1] clamav security update
- [debian-lts-announce] 20181024 [SECURITY] [DLA 1553-1] clamav security update
- 83000
- 83000
- GLSA-201904-12
- GLSA-201904-12
- USN-3789-1
- USN-3789-1
- USN-3789-2
- USN-3789-2
- https://www.flexera.com/company/secunia-research/advisories/SR-2018-23.html
- https://www.flexera.com/company/secunia-research/advisories/SR-2018-23.html