ALT-BU-2019-3443-10
Branch sisyphus update bulletin.
Closed bugs
Посторонняя зависимость на wmii
Package kernel-image-un-def updated to version 4.19.16-alt1 for branch sisyphus in task 219531.
Closed vulnerabilities
BDU:2019-01341
Уязвимость сервера NFS ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-16884
A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.
- 106253
- 106253
- RHSA-2019:1873
- RHSA-2019:1873
- RHSA-2019:1891
- RHSA-2019:1891
- RHSA-2019:2696
- RHSA-2019:2696
- RHSA-2019:2730
- RHSA-2019:2730
- RHSA-2019:3309
- RHSA-2019:3309
- RHSA-2019:3517
- RHSA-2019:3517
- RHSA-2020:0204
- RHSA-2020:0204
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16884
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16884
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- [debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update
- [debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update
- https://patchwork.kernel.org/cover/10733767/
- https://patchwork.kernel.org/cover/10733767/
- https://patchwork.kernel.org/patch/10733769/
- https://patchwork.kernel.org/patch/10733769/
- https://support.f5.com/csp/article/K21430012
- https://support.f5.com/csp/article/K21430012
- USN-3932-1
- USN-3932-1
- USN-3932-2
- USN-3932-2
- USN-3980-1
- USN-3980-1
- USN-3980-2
- USN-3980-2
- USN-3981-1
- USN-3981-1
- USN-3981-2
- USN-3981-2
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
Package kernel-image-std-def updated to version 4.14.94-alt1 for branch sisyphus in task 219526.
Closed vulnerabilities
BDU:2019-01341
Уязвимость сервера NFS ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-16884
A flaw was found in the Linux kernel's NFS41+ subsystem. NFS41+ shares mounted in different network namespaces at the same time can make bc_svc_process() use wrong back-channel IDs and cause a use-after-free vulnerability. Thus a malicious container user can cause a host kernel memory corruption and a system panic. Due to the nature of the flaw, privilege escalation cannot be fully ruled out.
- 106253
- 106253
- RHSA-2019:1873
- RHSA-2019:1873
- RHSA-2019:1891
- RHSA-2019:1891
- RHSA-2019:2696
- RHSA-2019:2696
- RHSA-2019:2730
- RHSA-2019:2730
- RHSA-2019:3309
- RHSA-2019:3309
- RHSA-2019:3517
- RHSA-2019:3517
- RHSA-2020:0204
- RHSA-2020:0204
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16884
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-16884
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- [debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update
- [debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update
- https://patchwork.kernel.org/cover/10733767/
- https://patchwork.kernel.org/cover/10733767/
- https://patchwork.kernel.org/patch/10733769/
- https://patchwork.kernel.org/patch/10733769/
- https://support.f5.com/csp/article/K21430012
- https://support.f5.com/csp/article/K21430012
- USN-3932-1
- USN-3932-1
- USN-3932-2
- USN-3932-2
- USN-3980-1
- USN-3980-1
- USN-3980-2
- USN-3980-2
- USN-3981-1
- USN-3981-1
- USN-3981-2
- USN-3981-2
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
Package kernel-image-std-pae updated to version 4.14.94-alt1 for branch sisyphus in task 219530.
Closed vulnerabilities
BDU:2019-01409
Уязвимость функции hso_get_config_data ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-19985
The function hso_get_config_data in drivers/net/usb/hso.c in the Linux kernel through 4.19.8 reads if_num from the USB device (as a u8) and uses it to index a small array, resulting in an object out-of-bounds (OOB) read that potentially allows arbitrary read in the kernel address space.
- http://lists.opensuse.org/opensuse-security-announce/2019-01/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2019-01/msg00023.html
- http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2019-02/msg00007.html
- http://packetstormsecurity.com/files/151420/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- http://packetstormsecurity.com/files/151420/Slackware-Security-Advisory-Slackware-14.2-kernel-Updates.html
- RHSA-2019:3309
- RHSA-2019:3309
- RHSA-2019:3517
- RHSA-2019:3517
- https://hexhive.epfl.ch/projects/perifuzz/
- https://hexhive.epfl.ch/projects/perifuzz/
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190327 [SECURITY] [DLA 1731-1] linux security update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- [debian-lts-announce] 20190401 [SECURITY] [DLA 1731-2] linux regression update
- [debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update
- [debian-lts-announce] 20190503 [SECURITY] [DLA 1771-1] linux-4.9 security update
- https://seclists.org/bugtraq/2019/Jan/52
- https://seclists.org/bugtraq/2019/Jan/52
- https://security.netapp.com/advisory/ntap-20190404-0002/
- https://security.netapp.com/advisory/ntap-20190404-0002/
- USN-4115-1
- USN-4115-1
- USN-4118-1
- USN-4118-1
Closed vulnerabilities
BDU:2019-01249
Уязвимость функции imap_mail интерпретатора языка программирования PHP, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01287
Уязвимость функции gdImageColorMatch (gd_color_match.c) графической библиотеки The GD Graphics Library, позволяющая нарушителю инициировать вызовы imagecolormatch
BDU:2019-01552
Уязвимость функции чтения PHAR интерпретатора языка программирования PHP, связанная с чтением за пределами границ буфера памяти, позволяющая нарушителю вызвать отказ в обслуживании, нарушить конфиденциальность и целостность защищаемых данных
BDU:2019-01553
Уязвимость функции чтения PHAR dns_get_record интерпретатора языка программирования PHP, связанная с чтением за пределами границ буфера памяти, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2019-01554
Уязвимость в интерпретаторе языка программирования PHP, связанная с чтением за пределами границ буфера динамической памяти, позволяющая нарушителю вызвать отказ в обслуживании, нарушить конфиденциальность и целостность защищаемых данных
BDU:2019-01555
Уязвимость функции xmlrpc_decode() расширения XMLRPC интерпретатора языка программирования PHP, связана с чтением данных за границами буфера памяти, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2019-01565
Уязвимость функции xml_elem_parse_buf() интерпретатора языка программирования PHP, связанная с чтением за пределами границ буфера памяти, позволяющая нарушителю получить несанкционированный доступ к защищаемым данным
Modified: 2024-11-21
CVE-2018-19935
ext/imap/php_imap.c in PHP 5.x and 7.x before 7.3.0 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via an empty string in the message argument to the imap_mail function.
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1573
- 106143
- 106143
- https://bugs.php.net/bug.php?id=77020
- https://bugs.php.net/bug.php?id=77020
- [debian-lts-announce] 20181217 [SECURITY] [DLA 1608-1] php5 security update
- [debian-lts-announce] 20181217 [SECURITY] [DLA 1608-1] php5 security update
- https://security.netapp.com/advisory/ntap-20181221-0003/
- https://security.netapp.com/advisory/ntap-20181221-0003/
- DSA-4353
- DSA-4353
Modified: 2024-11-21
CVE-2019-6977
gdImageColorMatch in gd_color_match.c in the GD Graphics Library (aka LibGD) 2.2.5, as used in the imagecolormatch function in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1, has a heap-based buffer overflow. This can be exploited by an attacker who is able to trigger imagecolormatch calls with crafted image data.
- openSUSE-SU-2019:1148
- openSUSE-SU-2019:1140
- http://packetstormsecurity.com/files/152459/PHP-7.2-imagecolormatch-Out-Of-Band-Heap-Write.html
- http://php.net/ChangeLog-5.php
- http://php.net/ChangeLog-7.php
- 106731
- RHSA-2019:2519
- RHSA-2019:3299
- https://bugs.php.net/bug.php?id=77270
- [debian-lts-announce] 20190130 [SECURITY] [DLA 1651-1] libgd2 security update
- FEDORA-2020-e795f92d79
- FEDORA-2019-d7f8995451
- FEDORA-2019-ab7d22a466
- FEDORA-2019-7a06c0e6b4
- GLSA-201903-18
- https://security.netapp.com/advisory/ntap-20190315-0003/
- USN-3900-1
- DSA-4384
- 46677
- openSUSE-SU-2019:1148
- 46677
- DSA-4384
- USN-3900-1
- https://security.netapp.com/advisory/ntap-20190315-0003/
- GLSA-201903-18
- FEDORA-2019-7a06c0e6b4
- FEDORA-2019-ab7d22a466
- FEDORA-2019-d7f8995451
- FEDORA-2020-e795f92d79
- [debian-lts-announce] 20190130 [SECURITY] [DLA 1651-1] libgd2 security update
- https://bugs.php.net/bug.php?id=77270
- RHSA-2019:3299
- RHSA-2019:2519
- 106731
- http://php.net/ChangeLog-7.php
- http://php.net/ChangeLog-5.php
- http://packetstormsecurity.com/files/152459/PHP-7.2-imagecolormatch-Out-Of-Band-Heap-Write.html
- openSUSE-SU-2019:1140
Modified: 2024-11-21
CVE-2019-9020
An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. Invalid input to the function xmlrpc_decode() can lead to an invalid memory access (heap out of bounds read or read after free). This is related to xml_elem_parse_buf in ext/xmlrpc/libxmlrpc/xml_element.c.
- openSUSE-SU-2019:1256
- openSUSE-SU-2019:1293
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- 107156
- RHSA-2019:2519
- RHSA-2019:3299
- https://bugs.php.net/bug.php?id=77242
- https://bugs.php.net/bug.php?id=77249
- https://security.netapp.com/advisory/ntap-20190321-0001/
- USN-3902-1
- USN-3902-2
- DSA-4398
- openSUSE-SU-2019:1256
- DSA-4398
- USN-3902-2
- USN-3902-1
- https://security.netapp.com/advisory/ntap-20190321-0001/
- https://bugs.php.net/bug.php?id=77249
- https://bugs.php.net/bug.php?id=77242
- RHSA-2019:3299
- RHSA-2019:2519
- 107156
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1293
Modified: 2024-11-21
CVE-2019-9021
An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. A heap-based buffer over-read in PHAR reading functions in the PHAR extension may allow an attacker to read allocated or unallocated memory past the actual data when trying to parse the file name, a different vulnerability than CVE-2018-20783. This is related to phar_detect_phar_fname_ext in ext/phar/phar.c.
- openSUSE-SU-2019:1256
- openSUSE-SU-2019:1293
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- 106747
- 107156
- RHSA-2019:2519
- RHSA-2019:3299
- https://bugs.php.net/bug.php?id=77247
- https://security.netapp.com/advisory/ntap-20190321-0001/
- USN-3902-1
- USN-3902-2
- DSA-4398
- openSUSE-SU-2019:1256
- DSA-4398
- USN-3902-2
- USN-3902-1
- https://security.netapp.com/advisory/ntap-20190321-0001/
- https://bugs.php.net/bug.php?id=77247
- RHSA-2019:3299
- RHSA-2019:2519
- 107156
- 106747
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1293
Modified: 2024-11-21
CVE-2019-9022
An issue was discovered in PHP 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.2. dns_get_record misparses a DNS response, which can allow a hostile DNS server to cause PHP to misuse memcpy, leading to read operations going past the buffer allocated for DNS data. This affects php_parserr in ext/standard/dns.c for DNS_CAA and DNS_ANY queries.
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- RHSA-2019:2519
- RHSA-2019:3299
- https://bugs.php.net/bug.php?id=77369
- [debian-lts-announce] 20190331 [SECURITY] [DLA 1741-1] php5 security update
- https://security.netapp.com/advisory/ntap-20190321-0001/
- USN-3902-1
- USN-3922-2
- USN-3922-3
- DSA-4398
- https://www.tenable.com/security/tns-2019-07
- openSUSE-SU-2019:1572
- https://www.tenable.com/security/tns-2019-07
- DSA-4398
- USN-3922-3
- USN-3922-2
- USN-3902-1
- https://security.netapp.com/advisory/ntap-20190321-0001/
- [debian-lts-announce] 20190331 [SECURITY] [DLA 1741-1] php5 security update
- https://bugs.php.net/bug.php?id=77369
- RHSA-2019:3299
- RHSA-2019:2519
- openSUSE-SU-2019:1573
Modified: 2024-11-21
CVE-2019-9023
An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. A number of heap-based buffer over-read instances are present in mbstring regular expression functions when supplied with invalid multibyte data. These occur in ext/mbstring/oniguruma/regcomp.c, ext/mbstring/oniguruma/regexec.c, ext/mbstring/oniguruma/regparse.c, ext/mbstring/oniguruma/enc/unicode.c, and ext/mbstring/oniguruma/src/utf32_be.c when a multibyte regular expression pattern contains invalid multibyte sequences.
- openSUSE-SU-2019:1256
- openSUSE-SU-2019:1293
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- 107156
- RHSA-2019:2519
- RHSA-2019:3299
- https://bugs.php.net/bug.php?id=77370
- https://bugs.php.net/bug.php?id=77371
- https://bugs.php.net/bug.php?id=77381
- https://bugs.php.net/bug.php?id=77382
- https://bugs.php.net/bug.php?id=77385
- https://bugs.php.net/bug.php?id=77394
- https://bugs.php.net/bug.php?id=77418
- https://security.netapp.com/advisory/ntap-20190321-0001/
- https://support.f5.com/csp/article/K06372014
- USN-3902-1
- USN-3902-2
- DSA-4398
- openSUSE-SU-2019:1256
- DSA-4398
- USN-3902-2
- USN-3902-1
- https://support.f5.com/csp/article/K06372014
- https://security.netapp.com/advisory/ntap-20190321-0001/
- https://bugs.php.net/bug.php?id=77418
- https://bugs.php.net/bug.php?id=77394
- https://bugs.php.net/bug.php?id=77385
- https://bugs.php.net/bug.php?id=77382
- https://bugs.php.net/bug.php?id=77381
- https://bugs.php.net/bug.php?id=77371
- https://bugs.php.net/bug.php?id=77370
- RHSA-2019:3299
- RHSA-2019:2519
- 107156
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1293
Modified: 2024-11-21
CVE-2019-9024
An issue was discovered in PHP before 5.6.40, 7.x before 7.1.26, 7.2.x before 7.2.14, and 7.3.x before 7.3.1. xmlrpc_decode() can allow a hostile XMLRPC server to cause PHP to read memory outside of allocated areas in base64_decode_xmlrpc in ext/xmlrpc/libxmlrpc/base64.c.
- openSUSE-SU-2019:1256
- openSUSE-SU-2019:1293
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1573
- 107156
- RHSA-2019:2519
- RHSA-2019:3299
- https://bugs.php.net/bug.php?id=77380
- https://security.netapp.com/advisory/ntap-20190321-0001/
- USN-3902-1
- USN-3902-2
- DSA-4398
- openSUSE-SU-2019:1256
- DSA-4398
- USN-3902-2
- USN-3902-1
- https://security.netapp.com/advisory/ntap-20190321-0001/
- https://bugs.php.net/bug.php?id=77380
- RHSA-2019:3299
- RHSA-2019:2519
- 107156
- openSUSE-SU-2019:1573
- openSUSE-SU-2019:1572
- openSUSE-SU-2019:1293
Closed bugs
В php7-mysqlnd упакован .a-архив
[PATCH] собираемость lcc-1.23
Closed bugs
Сломалась сборка rust
Closed vulnerabilities
BDU:2020-03307
Уязвимость декодера HTTP/2 сетевого программного обеспечения HAProxy, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-20615
An out-of-bounds read issue was discovered in the HTTP/2 protocol decoder in HAProxy 1.8.x and 1.9.x through 1.9.0 which can result in a crash. The processing of the PRIORITY flag in a HEADERS frame requires 5 extra bytes, and while these bytes are skipped, the total frame length was not re-checked to make sure they were present in the frame.
- [opensuse-security-announce] 20190213 [security-announce] openSUSE-SU-2019:0166-1: important: Security update for haproxy
- [opensuse-security-announce] 20190213 [security-announce] openSUSE-SU-2019:0166-1: important: Security update for haproxy
- 106645
- 106645
- RHBA-2019:0327
- RHBA-2019:0327
- RHSA-2019:0275
- RHSA-2019:0275
- 3858-1
- 3858-1
- [haproxy@formilux.org] 20190108 [ANNOUNCE] haproxy-1.8.17
- [haproxy@formilux.org] 20190108 [ANNOUNCE] haproxy-1.8.17