ALT-BU-2018-3668-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-18018
In GNU Coreutils through 8.29, chown-core.c in chown and chgrp does not prevent replacement of a plain file with a symlink during use of the POSIX "-R -L" options, which allows local users to modify the ownership of arbitrary files by leveraging a race condition.
Closed vulnerabilities
BDU:2023-01649
Уязвимость функции another_hunk() компонента pch.c программы переноса правок Patch, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-6952
A double free exists in the another_hunk function in pch.c in GNU patch through 2.7.6.
Closed vulnerabilities
BDU:2019-01641
Уязвимость фунции sparse_dump_region архиватора GNU Tar, связанная с чтением за границами буфера, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-20482
GNU Tar through 1.30, when --sparse is used, mishandles file shrinkage during read access, which allows local users to cause a denial of service (infinite read loop in sparse_dump_region in sparse.c) by modifying a file that is supposed to be archived by a different user's process (e.g., a system backup running as root).
- http://git.savannah.gnu.org/cgit/tar.git/commit/?id=c15c42ccd1e2377945fd0414eca1a49294bff454
- http://git.savannah.gnu.org/cgit/tar.git/commit/?id=c15c42ccd1e2377945fd0414eca1a49294bff454
- http://lists.gnu.org/archive/html/bug-tar/2018-12/msg00023.html
- http://lists.gnu.org/archive/html/bug-tar/2018-12/msg00023.html
- openSUSE-SU-2019:1237
- openSUSE-SU-2019:1237
- 106354
- 106354
- [debian-lts-announce] 20181231 [SECURITY] [DLA 1623-1] tar security update
- [debian-lts-announce] 20181231 [SECURITY] [DLA 1623-1] tar security update
- [debian-lts-announce] 20211128 [SECURITY] [DLA 2830-1] tar security update
- [debian-lts-announce] 20211128 [SECURITY] [DLA 2830-1] tar security update
- https://news.ycombinator.com/item?id=18745431
- https://news.ycombinator.com/item?id=18745431
- GLSA-201903-05
- GLSA-201903-05
- https://twitter.com/thatcks/status/1076166645708668928
- https://twitter.com/thatcks/status/1076166645708668928
- https://utcc.utoronto.ca/~cks/space/blog/sysadmin/TarFindingTruncateBug
- https://utcc.utoronto.ca/~cks/space/blog/sysadmin/TarFindingTruncateBug
Closed vulnerabilities
BDU:2020-04857
Уязвимость функции set_file_metadata менеджера загрузок GNU Wget, позволяющая нарушителю получить доступ к защищаемой информации
Modified: 2024-11-21
CVE-2018-20483
set_file_metadata in xattr.c in GNU Wget before 1.20.1 stores a file's origin URL in the user.xdg.origin.url metadata attribute of the extended attributes of the downloaded file, which allows local users to obtain sensitive information (e.g., credentials contained in the URL) by reading this attribute, as demonstrated by getfattr. This also applies to Referer information in the user.xdg.referrer.url metadata attribute. According to 2016-07-22 in the Wget ChangeLog, user.xdg.origin.url was partially based on the behavior of fwrite_xattr in tool_xattr.c in curl.
- http://git.savannah.gnu.org/cgit/wget.git/tree/NEWS
- http://git.savannah.gnu.org/cgit/wget.git/tree/NEWS
- 106358
- 106358
- RHSA-2019:3701
- RHSA-2019:3701
- GLSA-201903-08
- GLSA-201903-08
- https://security.netapp.com/advisory/ntap-20190321-0002/
- https://security.netapp.com/advisory/ntap-20190321-0002/
- https://twitter.com/marcan42/status/1077676739877232640
- https://twitter.com/marcan42/status/1077676739877232640
- USN-3943-1
- USN-3943-1