ALT-BU-2018-3627-1
Branch sisyphus update bulletin.
Closed bugs
Сломалась сборка пакета
Package python-module-keyring updated to version 12.0.0-alt2 for branch sisyphus in task 217396.
Closed bugs
Не хватает зависимости на *-secretstorage
Closed bugs
Не работает репликация ВМ zfs в PVE
Package plasma5-breeze updated to version 5.12.7-alt2 for branch sisyphus in task 217406.
Closed bugs
Сломалась сборка
Package kernel-image-std-debug updated to version 4.14.86-alt1 for branch sisyphus in task 217397.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-1128
It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.
- openSUSE-SU-2019:1284
- openSUSE-SU-2019:1284
- http://tracker.ceph.com/issues/24836
- http://tracker.ceph.com/issues/24836
- [oss-security] 20201117 CVE-2020-25677 ceph: CEPHX_V2 replay attack protection lost
- [oss-security] 20201117 CVE-2020-25677 ceph: CEPHX_V2 replay attack protection lost
- [oss-security] 20201117 Re: CVE-2020-25677 ceph: CEPHX_V2 replay attack protection lost
- [oss-security] 20201117 Re: CVE-2020-25677 ceph: CEPHX_V2 replay attack protection lost
- RHSA-2018:2177
- RHSA-2018:2177
- RHSA-2018:2179
- RHSA-2018:2179
- RHSA-2018:2261
- RHSA-2018:2261
- RHSA-2018:2274
- RHSA-2018:2274
- https://bugzilla.redhat.com/show_bug.cgi?id=1575866
- https://bugzilla.redhat.com/show_bug.cgi?id=1575866
- https://github.com/ceph/ceph/commit/5ead97120e07054d80623dada90a5cc764c28468
- https://github.com/ceph/ceph/commit/5ead97120e07054d80623dada90a5cc764c28468
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- DSA-4339
- DSA-4339
Modified: 2024-11-21
CVE-2018-1129
A flaw was found in the way signature calculation was handled by cephx authentication protocol. An attacker having access to ceph cluster network who is able to alter the message payload was able to bypass signature checks done by cephx protocol. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.
- openSUSE-SU-2019:1284
- openSUSE-SU-2019:1284
- http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html
- http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html
- http://tracker.ceph.com/issues/24837
- http://tracker.ceph.com/issues/24837
- RHSA-2018:2177
- RHSA-2018:2177
- RHSA-2018:2179
- RHSA-2018:2179
- RHSA-2018:2261
- RHSA-2018:2261
- RHSA-2018:2274
- RHSA-2018:2274
- https://bugzilla.redhat.com/show_bug.cgi?id=1576057
- https://bugzilla.redhat.com/show_bug.cgi?id=1576057
- https://github.com/ceph/ceph/commit/8f396cf35a3826044b089141667a196454c0a587
- https://github.com/ceph/ceph/commit/8f396cf35a3826044b089141667a196454c0a587
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- DSA-4339
- DSA-4339
Package kernel-image-std-def updated to version 4.14.86-alt1 for branch sisyphus in task 217398.
Closed vulnerabilities
BDU:2018-00344
Уязвимость функции cp_v6_syn_recv_sock операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
Modified: 2024-11-21
CVE-2018-1128
It was found that cephx authentication protocol did not verify ceph clients correctly and was vulnerable to replay attack. Any attacker having access to ceph cluster network who is able to sniff packets on network can use this vulnerability to authenticate with ceph service and perform actions allowed by ceph service. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.
- openSUSE-SU-2019:1284
- openSUSE-SU-2019:1284
- http://tracker.ceph.com/issues/24836
- http://tracker.ceph.com/issues/24836
- [oss-security] 20201117 CVE-2020-25677 ceph: CEPHX_V2 replay attack protection lost
- [oss-security] 20201117 CVE-2020-25677 ceph: CEPHX_V2 replay attack protection lost
- [oss-security] 20201117 Re: CVE-2020-25677 ceph: CEPHX_V2 replay attack protection lost
- [oss-security] 20201117 Re: CVE-2020-25677 ceph: CEPHX_V2 replay attack protection lost
- RHSA-2018:2177
- RHSA-2018:2177
- RHSA-2018:2179
- RHSA-2018:2179
- RHSA-2018:2261
- RHSA-2018:2261
- RHSA-2018:2274
- RHSA-2018:2274
- https://bugzilla.redhat.com/show_bug.cgi?id=1575866
- https://bugzilla.redhat.com/show_bug.cgi?id=1575866
- https://github.com/ceph/ceph/commit/5ead97120e07054d80623dada90a5cc764c28468
- https://github.com/ceph/ceph/commit/5ead97120e07054d80623dada90a5cc764c28468
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- DSA-4339
- DSA-4339
Modified: 2024-11-21
CVE-2018-1129
A flaw was found in the way signature calculation was handled by cephx authentication protocol. An attacker having access to ceph cluster network who is able to alter the message payload was able to bypass signature checks done by cephx protocol. Ceph branches master, mimic, luminous and jewel are believed to be vulnerable.
- openSUSE-SU-2019:1284
- openSUSE-SU-2019:1284
- http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html
- http://packetstormsecurity.com/files/154245/Kernel-Live-Patch-Security-Notice-LSN-0054-1.html
- http://tracker.ceph.com/issues/24837
- http://tracker.ceph.com/issues/24837
- RHSA-2018:2177
- RHSA-2018:2177
- RHSA-2018:2179
- RHSA-2018:2179
- RHSA-2018:2261
- RHSA-2018:2261
- RHSA-2018:2274
- RHSA-2018:2274
- https://bugzilla.redhat.com/show_bug.cgi?id=1576057
- https://bugzilla.redhat.com/show_bug.cgi?id=1576057
- https://github.com/ceph/ceph/commit/8f396cf35a3826044b089141667a196454c0a587
- https://github.com/ceph/ceph/commit/8f396cf35a3826044b089141667a196454c0a587
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- [debian-lts-announce] 20190315 [SECURITY] [DLA 1715-1] linux-4.9 security update
- DSA-4339
- DSA-4339
Modified: 2024-11-21
CVE-2018-5703
The tcp_v6_syn_recv_sock function in net/ipv6/tcp_ipv6.c in the Linux kernel through 4.14.11 allows attackers to cause a denial of service (slab out-of-bounds write) or possibly have unspecified other impact via vectors involving TLS.
Closed vulnerabilities
BDU:2019-00777
Уязвимость криптографической библиотеки Nettle, связана с ошибкой обратного преобразования дешифрованных данных RSA, позволяющая нарушителю получить доступ к защищаемой информации
Modified: 2024-11-21
CVE-2018-16869
A Bleichenbacher type side-channel based padding oracle attack was found in the way nettle handles endian conversion of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run a process on the same physical core as the victim process, could use this flaw extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.
Closed vulnerabilities
BDU:2019-00776
Уязвимость криптографической библиотеки GnuTLS, связанная с ошибкой проверки дешифрованных данных RSA, позволяющая нарушителю получить доступ к защищаемой информации
Modified: 2024-11-21
CVE-2018-16868
A Bleichenbacher type side-channel based padding oracle attack was found in the way gnutls handles verification of RSA decrypted PKCS#1 v1.5 data. An attacker who is able to run process on the same physical core as the victim process, could use this to extract plaintext or in some cases downgrade any TLS connections to a vulnerable server.
Package ghostscript updated to version 9.26-alt1 for branch sisyphus in task 217431.
Closed vulnerabilities
BDU:2018-01085
Уязвимость набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, вызванная использованием неинициализированной памяти, позволяющая нарушителю выполнить произвольный код
BDU:2018-01086
Уязвимость набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2018-01087
Уязвимость интерпретатора набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, позволяющая нарушителю выполнить произвольный код
BDU:2018-01518
Уязвимость компонента Sandbox Protection Mechanism набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, позволяющая нарушителю обойти защитный механизм изолированной программной среды и раскрыть защищаемую информацию
BDU:2018-01539
Уязвимость набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, связанная с ошибками реализации проверки безопасности для стандартных элементов, позволяющая нарушителю обойти ограничения безопасности
BDU:2019-00422
Уязвимость набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, связанная с некорректной проверкой «восстановления привилегий» во время обработки исключений типа /invalidaccess, позволяющая нарушителю выполнить произвольный код
BDU:2019-00858
Уязвимость процедуры 1Policy (обертка процедуры .forceput) набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, связанная с возможностью обхода среды для безопасного выполнения, позволяющая нарушителю выполнить произвольный код
BDU:2019-00875
Уязвимость в коде «psi/zdevice2.c» набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, связанная с отсутствием проверки свободного места на стеке, позволяющая нарушителю обойти установленный контроль доступа
BDU:2019-00876
Уязвимость в коде «psi/zdevice2.c» набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, связанная с ошибками типа setcolorspace, позволяющая нарушителю обойти установленный контроль доступа
BDU:2019-00877
Уязвимость в коде «psi/zdevice2.c» набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, связанная с ошибками типа JBIG2Decode, позволяющая нарушителю обойти установленный контроль доступа
BDU:2019-00973
Уязвимость набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, связанная с неправильным преобразованием типов, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2019-00976
Уязвимость набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
Modified: 2024-11-21
CVE-2018-15909
In Artifex Ghostscript 9.23 before 2018-08-24, a type confusion using the .shfill operator could be used by attackers able to supply crafted PostScript files to crash the interpreter or potentially execute code.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=0b6cd1918e1ec4ffd087400a754a845180a4522b
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=0b6cd1918e1ec4ffd087400a754a845180a4522b
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=e01e77a36cbb2e0277bc3a63852244bec41be0f6
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=e01e77a36cbb2e0277bc3a63852244bec41be0f6
- 105178
- 105178
- RHSA-2018:3650
- RHSA-2018:3650
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- GLSA-201811-12
- GLSA-201811-12
- https://support.f5.com/csp/article/K24803507?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K24803507?utm_source=f5support&%3Butm_medium=RSS
- USN-3768-1
- USN-3768-1
- https://www.kb.cert.org/vuls/id/332928
- https://www.kb.cert.org/vuls/id/332928
Modified: 2024-11-21
CVE-2018-15910
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the LockDistillerParams parameter to crash the interpreter or execute code.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=c3476dde7743761a4e1d39a631716199b696b880
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=c3476dde7743761a4e1d39a631716199b696b880
- 105122
- 105122
- RHSA-2018:2918
- RHSA-2018:2918
- https://bugs.ghostscript.com/show_bug.cgi?id=699656
- https://bugs.ghostscript.com/show_bug.cgi?id=699656
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- GLSA-201811-12
- GLSA-201811-12
- https://support.f5.com/csp/article/K22141757?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K22141757?utm_source=f5support&%3Butm_medium=RSS
- USN-3768-1
- USN-3768-1
- DSA-4288
- DSA-4288
- https://www.kb.cert.org/vuls/id/332928
- https://www.kb.cert.org/vuls/id/332928
Modified: 2024-11-21
CVE-2018-15911
In Artifex Ghostscript 9.23 before 2018-08-24, attackers able to supply crafted PostScript could use uninitialized memory access in the aesdecode operator to crash the interpreter or potentially execute code.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=8e9ce5016db968b40e4ec255a3005f2786cce45f
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=8e9ce5016db968b40e4ec255a3005f2786cce45f
- 105122
- 105122
- RHSA-2018:3834
- RHSA-2018:3834
- https://bugs.ghostscript.com/show_bug.cgi?id=699665
- https://bugs.ghostscript.com/show_bug.cgi?id=699665
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- GLSA-201811-12
- GLSA-201811-12
- https://support.f5.com/csp/article/K22141757?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K22141757?utm_source=f5support&%3Butm_medium=RSS
- USN-3768-1
- USN-3768-1
- DSA-4288
- DSA-4288
- https://www.kb.cert.org/vuls/id/332928
- https://www.kb.cert.org/vuls/id/332928
Modified: 2024-11-21
CVE-2018-16509
An issue was discovered in Artifex Ghostscript before 9.24. Incorrect "restoration of privilege" checking during handling of /invalidaccess exceptions could be used by attackers able to supply crafted PostScript to execute code using the "pipe" instruction.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=5516c614dc33662a2afdc377159f70218e67bde5
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=5516c614dc33662a2afdc377159f70218e67bde5
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=78911a01b67d590b4a91afac2e8417360b934156
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=78911a01b67d590b4a91afac2e8417360b934156
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=79cccf641486a6595c43f1de1cd7ade696020a31
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=79cccf641486a6595c43f1de1cd7ade696020a31
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=520bb0ea7519aa3e79db78aaf0589dae02103764
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=520bb0ea7519aa3e79db78aaf0589dae02103764
- http://seclists.org/oss-sec/2018/q3/142
- http://seclists.org/oss-sec/2018/q3/142
- 105122
- 105122
- RHSA-2018:2918
- RHSA-2018:2918
- RHSA-2018:3760
- RHSA-2018:3760
- https://bugs.ghostscript.com/show_bug.cgi?id=699654
- https://bugs.ghostscript.com/show_bug.cgi?id=699654
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- GLSA-201811-12
- GLSA-201811-12
- USN-3768-1
- USN-3768-1
- https://www.artifex.com/news/ghostscript-security-resolved/
- https://www.artifex.com/news/ghostscript-security-resolved/
- DSA-4294
- DSA-4294
- 45369
- 45369
Modified: 2024-11-21
CVE-2018-16510
An issue was discovered in Artifex Ghostscript before 9.24. Incorrect exec stack handling in the "CS" and "SC" PDF primitives could be used by remote attackers able to supply crafted PDFs to crash the interpreter or possibly have unspecified other impact.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=ea735ba37dc0fd5f5622d031830b9a559dec1cc9
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=ea735ba37dc0fd5f5622d031830b9a559dec1cc9
- http://openwall.com/lists/oss-security/2018/08/27/4
- http://openwall.com/lists/oss-security/2018/08/27/4
- https://bugs.ghostscript.com/show_bug.cgi?id=699671
- https://bugs.ghostscript.com/show_bug.cgi?id=699671
- GLSA-201811-12
- GLSA-201811-12
- USN-3768-1
- USN-3768-1
- USN-3773-1
- USN-3773-1
Modified: 2024-11-21
CVE-2018-16513
In Artifex Ghostscript before 9.24, attackers able to supply crafted PostScript files could use a type confusion in the setcolor function to crash the interpreter or possibly have unspecified other impact.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=b326a71659b7837d3acde954b18bda1a6f5e9498
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=b326a71659b7837d3acde954b18bda1a6f5e9498
- https://bugs.ghostscript.com/show_bug.cgi?id=699655
- https://bugs.ghostscript.com/show_bug.cgi?id=699655
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- [debian-lts-announce] 20180913 [SECURITY] [DLA 1504-1] ghostscript security update
- GLSA-201811-12
- GLSA-201811-12
- https://support.f5.com/csp/article/K22141757?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K22141757?utm_source=f5support&%3Butm_medium=RSS
- USN-3768-1
- USN-3768-1
- https://www.artifex.com/news/ghostscript-security-resolved/
- https://www.artifex.com/news/ghostscript-security-resolved/
- DSA-4288
- DSA-4288
Modified: 2024-11-21
CVE-2018-18073
Artifex Ghostscript allows attackers to bypass a sandbox protection mechanism by leveraging exposure of system operators in the saved execution stack in an error object.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=34cc326eb2c5695833361887fe0b32e8d987741c
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=34cc326eb2c5695833361887fe0b32e8d987741c
- http://packetstormsecurity.com/files/149758/Ghostscript-Exposed-System-Operators.html
- http://packetstormsecurity.com/files/149758/Ghostscript-Exposed-System-Operators.html
- [oss-security] 20181010 ghostscript: saved execution stacks can leak operator arrays (CVE-2018-18073)
- [oss-security] 20181010 ghostscript: saved execution stacks can leak operator arrays (CVE-2018-18073)
- RHSA-2018:3834
- RHSA-2018:3834
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1690
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1690
- https://bugs.ghostscript.com/show_bug.cgi?id=699927
- https://bugs.ghostscript.com/show_bug.cgi?id=699927
- [debian-lts-announce] 20181022 [SECURITY] [DLA 1552-1] ghostscript security update
- [debian-lts-announce] 20181022 [SECURITY] [DLA 1552-1] ghostscript security update
- USN-3803-1
- USN-3803-1
- DSA-4336
- DSA-4336
Modified: 2024-11-21
CVE-2018-18284
Artifex Ghostscript 9.25 and earlier allows attackers to bypass a sandbox protection mechanism via vectors involving the 1Policy operator.
- http://git.ghostscript.com/?p=ghostpdl.git%3Bh=8d19fdf63f91f50466b08f23e2d93d37a4c5ea0b
- http://git.ghostscript.com/?p=ghostpdl.git%3Bh=8d19fdf63f91f50466b08f23e2d93d37a4c5ea0b
- [oss-security] 20181016 ghostscript: 1Policy operator gives access to .forceput CVE-2018-18284
- [oss-security] 20181016 ghostscript: 1Policy operator gives access to .forceput CVE-2018-18284
- 107451
- 107451
- RHSA-2018:3834
- RHSA-2018:3834
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1696
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1696
- https://bugs.ghostscript.com/show_bug.cgi?id=699963
- https://bugs.ghostscript.com/show_bug.cgi?id=699963
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101
- https://kb.pulsesecure.net/articles/Pulse_Security_Advisories/SA44101
- [debian-lts-announce] 20181022 [SECURITY] [DLA 1552-1] ghostscript security update
- [debian-lts-announce] 20181022 [SECURITY] [DLA 1552-1] ghostscript security update
- GLSA-201811-12
- GLSA-201811-12
- https://support.f5.com/csp/article/K22141757?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K22141757?utm_source=f5support&%3Butm_medium=RSS
- USN-3803-1
- USN-3803-1
- DSA-4336
- DSA-4336
Modified: 2024-11-21
CVE-2018-19134
In Artifex Ghostscript through 9.25, the setpattern operator did not properly validate certain types. A specially crafted PostScript document could exploit this to crash Ghostscript or, possibly, execute arbitrary code in the context of the Ghostscript process. This is a type confusion issue because of failure to check whether the Implementation of a pattern dictionary was a structure type.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=693baf02152119af6e6afd30bb8ec76d14f84bbf
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=693baf02152119af6e6afd30bb8ec76d14f84bbf
- 106278
- 106278
- RHSA-2018:3834
- RHSA-2018:3834
- https://bugs.ghostscript.com/show_bug.cgi?id=700141
- https://bugs.ghostscript.com/show_bug.cgi?id=700141
- [debian-lts-announce] 20181227 [SECURITY] [DLA 1620-1] ghostscript security update
- [debian-lts-announce] 20181227 [SECURITY] [DLA 1620-1] ghostscript security update
- https://semmle.com/news/semmle-discovers-severe-vulnerability-ghostscript-postscript-pdf
- https://semmle.com/news/semmle-discovers-severe-vulnerability-ghostscript-postscript-pdf
- https://www.ghostscript.com/doc/9.26/News.htm
- https://www.ghostscript.com/doc/9.26/News.htm
Modified: 2024-11-21
CVE-2018-19409
An issue was discovered in Artifex Ghostscript before 9.26. LockSafetyParams is not checked correctly if another device is used.
- 105990
- 105990
- RHSA-2018:3834
- RHSA-2018:3834
- https://bugs.ghostscript.com/show_bug.cgi?id=700176
- https://bugs.ghostscript.com/show_bug.cgi?id=700176
- https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=661e8d8fb8248c38d67958beda32f3a5876d0c3f
- https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=661e8d8fb8248c38d67958beda32f3a5876d0c3f
- [debian-lts-announce] 20181128 [SECURITY] [DLA 1598-1] ghostscript security update
- [debian-lts-announce] 20181128 [SECURITY] [DLA 1598-1] ghostscript security update
- GLSA-201811-12
- GLSA-201811-12
- USN-3831-1
- USN-3831-1
- DSA-4346
- DSA-4346
- https://www.ghostscript.com/doc/9.26/History9.htm#Version9.26
- https://www.ghostscript.com/doc/9.26/History9.htm#Version9.26
Modified: 2024-11-21
CVE-2018-19475
psi/zdevice2.c in Artifex Ghostscript before 9.26 allows remote attackers to bypass intended access restrictions because available stack space is not checked when the device remains the same.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=3005fcb9bb160af199e761e03bc70a9f249a987e
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=3005fcb9bb160af199e761e03bc70a9f249a987e
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=aeea342904978c9fe17d85f4906a0f6fcce2d315
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=aeea342904978c9fe17d85f4906a0f6fcce2d315
- 106154
- 106154
- RHBA-2019:0327
- RHBA-2019:0327
- RHSA-2019:0229
- RHSA-2019:0229
- https://bugs.ghostscript.com/show_bug.cgi?id=700153
- https://bugs.ghostscript.com/show_bug.cgi?id=700153
- [debian-lts-announce] 20181128 [SECURITY] [DLA 1598-1] ghostscript security update
- [debian-lts-announce] 20181128 [SECURITY] [DLA 1598-1] ghostscript security update
- https://semmle.com/news/semmle-discovers-severe-vulnerability-ghostscript-postscript-pdf
- https://semmle.com/news/semmle-discovers-severe-vulnerability-ghostscript-postscript-pdf
- USN-3831-1
- USN-3831-1
- DSA-4346
- DSA-4346
- https://www.ghostscript.com/doc/9.26/History9.htm#Version9.26
- https://www.ghostscript.com/doc/9.26/History9.htm#Version9.26
Modified: 2024-11-21
CVE-2018-19476
psi/zicc.c in Artifex Ghostscript before 9.26 allows remote attackers to bypass intended access restrictions because of a setcolorspace type confusion.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=67d760ab775dae4efe803b5944b0439aa3c0b04a
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=67d760ab775dae4efe803b5944b0439aa3c0b04a
- http://git.ghostscript.com/?p=ghostpdl.git%3Bh=434753adbe8be5534bfb9b7d91746023e8073d16
- http://git.ghostscript.com/?p=ghostpdl.git%3Bh=434753adbe8be5534bfb9b7d91746023e8073d16
- 106154
- 106154
- RHBA-2019:0327
- RHBA-2019:0327
- RHSA-2019:0229
- RHSA-2019:0229
- https://bugs.ghostscript.com/show_bug.cgi?id=700169
- https://bugs.ghostscript.com/show_bug.cgi?id=700169
- [debian-lts-announce] 20181128 [SECURITY] [DLA 1598-1] ghostscript security update
- [debian-lts-announce] 20181128 [SECURITY] [DLA 1598-1] ghostscript security update
- https://semmle.com/news/semmle-discovers-severe-vulnerability-ghostscript-postscript-pdf
- https://semmle.com/news/semmle-discovers-severe-vulnerability-ghostscript-postscript-pdf
- USN-3831-1
- USN-3831-1
- DSA-4346
- DSA-4346
- https://www.ghostscript.com/doc/9.26/History9.htm#Version9.26
- https://www.ghostscript.com/doc/9.26/History9.htm#Version9.26
Modified: 2024-11-21
CVE-2018-19477
psi/zfjbig2.c in Artifex Ghostscript before 9.26 allows remote attackers to bypass intended access restrictions because of a JBIG2Decode type confusion.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=ef252e7dc214bcbd9a2539216aab9202848602bb
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commit%3Bh=ef252e7dc214bcbd9a2539216aab9202848602bb
- http://git.ghostscript.com/?p=ghostpdl.git%3Bh=606a22e77e7f081781e99e44644cd0119f559e03
- http://git.ghostscript.com/?p=ghostpdl.git%3Bh=606a22e77e7f081781e99e44644cd0119f559e03
- 106154
- 106154
- RHBA-2019:0327
- RHBA-2019:0327
- RHSA-2019:0229
- RHSA-2019:0229
- https://bugs.ghostscript.com/show_bug.cgi?id=700168
- https://bugs.ghostscript.com/show_bug.cgi?id=700168
- [debian-lts-announce] 20181128 [SECURITY] [DLA 1598-1] ghostscript security update
- [debian-lts-announce] 20181128 [SECURITY] [DLA 1598-1] ghostscript security update
- https://semmle.com/news/semmle-discovers-severe-vulnerability-ghostscript-postscript-pdf
- https://semmle.com/news/semmle-discovers-severe-vulnerability-ghostscript-postscript-pdf
- USN-3831-1
- USN-3831-1
- DSA-4346
- DSA-4346
- https://www.ghostscript.com/doc/9.26/History9.htm#Version9.26
- https://www.ghostscript.com/doc/9.26/History9.htm#Version9.26
Modified: 2024-11-21
CVE-2018-19478
In Artifex Ghostscript before 9.26, a carefully crafted PDF file can trigger an extremely long running computation when parsing the file.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=0a7e5a1c309fa0911b892fa40996a7d55d90bace
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=0a7e5a1c309fa0911b892fa40996a7d55d90bace
- 106445
- 106445
- https://bugs.ghostscript.com/show_bug.cgi?id=699856
- https://bugs.ghostscript.com/show_bug.cgi?id=699856
- https://bugzilla.redhat.com/show_bug.cgi?id=1655607
- https://bugzilla.redhat.com/show_bug.cgi?id=1655607
- [debian-lts-announce] 20181227 [SECURITY] [DLA 1620-1] ghostscript security update
- [debian-lts-announce] 20181227 [SECURITY] [DLA 1620-1] ghostscript security update
- https://www.ghostscript.com/doc/9.26/History9.htm
- https://www.ghostscript.com/doc/9.26/History9.htm
Modified: 2024-11-21
CVE-2020-14373
A use after free was found in igc_reloc_struct_ptr() of psi/igc.c of ghostscript-9.25. A local attacker could supply a specially crafted PDF file to cause a denial of service.
- https://bugs.ghostscript.com/show_bug.cgi?id=702851
- https://bugs.ghostscript.com/show_bug.cgi?id=702851
- https://bugzilla.redhat.com/show_bug.cgi?id=1873239
- https://bugzilla.redhat.com/show_bug.cgi?id=1873239
- https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=ece5cbbd9979cd35737b00e68267762d72feb2ea%3Bhp=1ef5f08f2c2e27efa978f0010669ff22355c385f
- https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=ece5cbbd9979cd35737b00e68267762d72feb2ea%3Bhp=1ef5f08f2c2e27efa978f0010669ff22355c385f
Closed vulnerabilities
BDU:2019-00885
Уязвимость программной платформы для управления административными политиками и привилегиями Policykit, связанная с ошибками при обработке больших значений идентификаторов пользователей, позволяющая нарушителю обойти процедуру аутентификации
Modified: 2024-11-21
CVE-2018-19788
A flaw was found in PolicyKit (aka polkit) 0.115 that allows a user with a uid greater than INT_MAX to successfully execute any systemctl command.
- RHSA-2019:2046
- RHSA-2019:2046
- RHSA-2019:3232
- RHSA-2019:3232
- https://bugs.debian.org/915332
- https://bugs.debian.org/915332
- https://gitlab.freedesktop.org/polkit/polkit/issues/74
- https://gitlab.freedesktop.org/polkit/polkit/issues/74
- [debian-lts-announce] 20190128 [SECURITY] [DLA 1644-1] policykit-1 security update
- [debian-lts-announce] 20190128 [SECURITY] [DLA 1644-1] policykit-1 security update
- GLSA-201908-14
- GLSA-201908-14
- https://security.netapp.com/advisory/ntap-20240816-0001/
- USN-3861-1
- USN-3861-1
- USN-3861-2
- USN-3861-2
- DSA-4350
- DSA-4350
Package kernel-image-un-def updated to version 4.19.7-alt1 for branch sisyphus in task 217401.
Closed vulnerabilities
BDU:2019-03298
Уязвимость функции usb_audio_probe ядра операционной системы Linux, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2020-00620
Уязвимость компонента userfaultfd ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на целостность защищаемой информации
Modified: 2024-11-21
CVE-2018-18397
The userfaultfd implementation in the Linux kernel before 4.19.7 mishandles access control for certain UFFDIO_ ioctl calls, as demonstrated by allowing local users to write data into holes in a tmpfs file (if the user has read-only access to that file, and that file contains holes), related to fs/userfaultfd.c and mm/userfaultfd.c.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=29ec90660d68bbdd69507c1c8b4e33aa299278b1
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=29ec90660d68bbdd69507c1c8b4e33aa299278b1
- RHBA-2019:0327
- RHBA-2019:0327
- RHSA-2019:0163
- RHSA-2019:0163
- RHSA-2019:0202
- RHSA-2019:0202
- RHSA-2019:0324
- RHSA-2019:0324
- RHSA-2019:0831
- RHSA-2019:0831
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1700
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1700
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.87
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.14.87
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.7
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.19.7
- https://github.com/torvalds/linux/commit/29ec90660d68bbdd69507c1c8b4e33aa299278b1
- https://github.com/torvalds/linux/commit/29ec90660d68bbdd69507c1c8b4e33aa299278b1
- USN-3901-1
- USN-3901-1
- USN-3901-2
- USN-3901-2
- USN-3903-1
- USN-3903-1
- USN-3903-2
- USN-3903-2
Modified: 2024-11-21
CVE-2018-19824
In the Linux kernel through 4.19.6, a local user could exploit a use-after-free in the ALSA driver by supplying a malicious USB Sound device (with zero interfaces) that is mishandled in usb_audio_probe in sound/usb/card.c.
- 106109
- 106109
- RHSA-2019:2703
- RHSA-2019:2703
- https://bugzilla.suse.com/show_bug.cgi?id=1118152
- https://bugzilla.suse.com/show_bug.cgi?id=1118152
- https://git.kernel.org/pub/scm/linux/kernel/git/tiwai/sound.git/commit/?id=5f8cf712582617d523120df67d392059eaf2fc4b
- https://git.kernel.org/pub/scm/linux/kernel/git/tiwai/sound.git/commit/?id=5f8cf712582617d523120df67d392059eaf2fc4b
- https://github.com/torvalds/linux/commit/5f8cf712582617d523120df67d392059eaf2fc4b
- https://github.com/torvalds/linux/commit/5f8cf712582617d523120df67d392059eaf2fc4b
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- [debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update
- [debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update
- https://support.f5.com/csp/article/K98155950
- https://support.f5.com/csp/article/K98155950
- USN-3879-1
- USN-3879-1
- USN-3879-2
- USN-3879-2
- USN-3930-1
- USN-3930-1
- USN-3930-2
- USN-3930-2
- USN-3931-1
- USN-3931-1
- USN-3931-2
- USN-3931-2
- USN-3933-1
- USN-3933-1
- USN-3933-2
- USN-3933-2