ALT-BU-2019-3431-2
Branch sisyphus update bulletin.
Package liburiparser updated to version 0.9.1-alt1 for branch sisyphus in task 219127.
Closed vulnerabilities
Modified: 2024-09-30
BDU:2023-07797
Уязвимость функции URI_FUNC() компонента UriParse.c парсера Uriparser, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-20721
URI_FUNC() in UriParse.c in uriparser before 0.9.1 has an out-of-bounds read (in uriParse*Ex* functions) for an incomplete URI with an IPv6 address containing an embedded IPv4 address, such as a "//[::44.1" address.
- https://github.com/uriparser/uriparser/blob/master/ChangeLog
- https://github.com/uriparser/uriparser/commit/cef25028de5ff872c2e1f0a6c562eb3ea9ecbce4
- https://lists.debian.org/debian-lts-announce/2019/02/msg00028.html
- https://lists.debian.org/debian-lts-announce/2021/11/msg00029.html
- https://github.com/uriparser/uriparser/blob/master/ChangeLog
- https://github.com/uriparser/uriparser/commit/cef25028de5ff872c2e1f0a6c562eb3ea9ecbce4
- https://lists.debian.org/debian-lts-announce/2019/02/msg00028.html
- https://lists.debian.org/debian-lts-announce/2021/11/msg00029.html
Package kernel-image-std-debug updated to version 4.14.92-alt1 for branch sisyphus in task 219149.
Closed vulnerabilities
Modified: 2024-06-03
BDU:2019-01409
Уязвимость функции hso_get_config_data ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-19985
The function hso_get_config_data in drivers/net/usb/hso.c in the Linux kernel through 4.19.8 reads if_num from the USB device (as a u8) and uses it to index a small array, resulting in an object out-of-bounds (OOB) read that potentially allows arbitrary read in the kernel address space.
- http://lists.opensuse.org/opensuse-security-announce/2019-01/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00007.html
- http://packetstormsecurity.com/files/151420/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- https://access.redhat.com/errata/RHSA-2019:3309
- https://access.redhat.com/errata/RHSA-2019:3517
- https://hexhive.epfl.ch/projects/perifuzz/
- https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html
- https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html
- https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html
- https://seclists.org/bugtraq/2019/Jan/52
- https://security.netapp.com/advisory/ntap-20190404-0002/
- https://usn.ubuntu.com/4115-1/
- https://usn.ubuntu.com/4118-1/
- http://lists.opensuse.org/opensuse-security-announce/2019-01/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00007.html
- http://packetstormsecurity.com/files/151420/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- https://access.redhat.com/errata/RHSA-2019:3309
- https://access.redhat.com/errata/RHSA-2019:3517
- https://hexhive.epfl.ch/projects/perifuzz/
- https://lists.debian.org/debian-lts-announce/2019/03/msg00034.html
- https://lists.debian.org/debian-lts-announce/2019/04/msg00004.html
- https://lists.debian.org/debian-lts-announce/2019/05/msg00002.html
- https://seclists.org/bugtraq/2019/Jan/52
- https://security.netapp.com/advisory/ntap-20190404-0002/
- https://usn.ubuntu.com/4115-1/
- https://usn.ubuntu.com/4118-1/
Package openstack-nova updated to version 18.1.0-alt1 for branch sisyphus in task 219089.
Closed vulnerabilities
Modified: 2025-04-20
CVE-2017-16239
In OpenStack Nova through 14.0.9, 15.x through 15.0.7, and 16.x through 16.0.2, by rebuilding an instance, an authenticated user may be able to circumvent the Filter Scheduler bypassing imposed filters (for example, the ImagePropertiesFilter or the IsolatedHostsFilter). All setups using Nova Filter Scheduler are affected. Because of the regression described in Launchpad Bug #1732947, the preferred fix is a 14.x version after 14.0.10, a 15.x version after 15.0.8, or a 16.x version after 16.0.3.
- http://www.securityfocus.com/bid/101950
- https://access.redhat.com/errata/RHSA-2018:0241
- https://access.redhat.com/errata/RHSA-2018:0314
- https://access.redhat.com/errata/RHSA-2018:0369
- https://launchpad.net/bugs/1664931
- https://security.openstack.org/ossa/OSSA-2017-005.html
- https://www.debian.org/security/2017/dsa-4056
- http://www.securityfocus.com/bid/101950
- https://access.redhat.com/errata/RHSA-2018:0241
- https://access.redhat.com/errata/RHSA-2018:0314
- https://access.redhat.com/errata/RHSA-2018:0369
- https://launchpad.net/bugs/1664931
- https://security.openstack.org/ossa/OSSA-2017-005.html
- https://www.debian.org/security/2017/dsa-4056
Modified: 2024-11-21
CVE-2017-18191
An issue was discovered in OpenStack Nova 15.x through 15.1.0 and 16.x through 16.1.1. By detaching and reattaching an encrypted volume, an attacker may access the underlying raw volume and corrupt the LUKS header, resulting in a denial of service attack on the compute host. (The same code error also results in data loss, but that is not a vulnerability because the user loses their own data.) All Nova setups supporting encrypted volumes are affected.
- http://openwall.com/lists/oss-security/2018/04/20/3
- http://www.securityfocus.com/bid/103104
- https://access.redhat.com/errata/RHSA-2018:2332
- https://access.redhat.com/errata/RHSA-2018:2714
- https://access.redhat.com/errata/RHSA-2018:2855
- https://launchpad.net/bugs/1739593
- https://review.openstack.org/539893
- https://security.openstack.org/ossa/OSSA-2018-001.html
- http://openwall.com/lists/oss-security/2018/04/20/3
- http://www.securityfocus.com/bid/103104
- https://access.redhat.com/errata/RHSA-2018:2332
- https://access.redhat.com/errata/RHSA-2018:2714
- https://access.redhat.com/errata/RHSA-2018:2855
- https://launchpad.net/bugs/1739593
- https://review.openstack.org/539893
- https://security.openstack.org/ossa/OSSA-2018-001.html
Modified: 2024-05-14
GHSA-ffmh-r67w-m88f
OpenStack Nova Denial of service attack on the compute host
- https://nvd.nist.gov/vuln/detail/CVE-2017-18191
- https://github.com/openstack/nova/commit/0225a61fc4557c1257383a654f0741f7ef2ddeac
- https://github.com/openstack/nova/commit/5b64a1936122eeb35f37a09f9d38159e1a224c58
- https://github.com/openstack/nova/commit/cd3eb60c2c00bcccfa9ccd4bf9d1a96ae7a5cd88
- https://access.redhat.com/errata/RHSA-2018:2332
- https://access.redhat.com/errata/RHSA-2018:2714
- https://access.redhat.com/errata/RHSA-2018:2855
- https://github.com/openstack/nova
- https://launchpad.net/bugs/1739593
- https://review.openstack.org/539893
- https://security.openstack.org/ossa/OSSA-2018-001.html
- http://openwall.com/lists/oss-security/2018/04/20/3
- http://www.securityfocus.com/bid/103104
Modified: 2024-05-14
GHSA-w2wf-cgwh-vpqg
OpenStack Nova Filter Scheduler Bypass
- https://nvd.nist.gov/vuln/detail/CVE-2017-16239
- https://github.com/openstack/nova/commit/698b261a5a2a6c0f31ef5059046ef7196d5cba30
- https://github.com/openstack/nova/commit/984dd8ad6add4523d93c7ce5a666a32233e02e34
- https://github.com/openstack/nova/commit/9e2d63da94db63d97bd02e373bfc53d95808b833
- https://github.com/openstack/nova/commit/b72105c1c49fcddc94992af63fc2f8078023491a
- https://access.redhat.com/errata/RHSA-2018:0241
- https://access.redhat.com/errata/RHSA-2018:0314
- https://access.redhat.com/errata/RHSA-2018:0369
- https://github.com/openstack/nova
- https://launchpad.net/bugs/1664931
- https://security.openstack.org/ossa/OSSA-2017-005.html
- https://www.debian.org/security/2017/dsa-4056
- http://www.securityfocus.com/bid/101950
