ALT-BU-2019-3467-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2023-02418
Уязвимость системы управления Git-репозиториями Gitea, связанная с недостаточной проверкой поступающих запросов, позволяющая нарушителю осуществить SSRF-атаку
Modified: 2024-11-21
CVE-2021-45325
Server Side Request Forgery (SSRF) vulneraility exists in Gitea before 1.7.0 using the OpenID URL.
Package python-module-notebook updated to version 5.2.2-alt4 for branch sisyphus in task 220261.
Closed bugs
Сломалась сборка пакета python-module-nbconvert
Сломалась сборка пакета python-module-notebook
Closed vulnerabilities
Modified: 2024-11-21
CVE-2016-7969
The wrap_lines_smart function in ass_render.c in libass before 0.13.4 allows remote attackers to cause a denial of service (out-of-bounds read) via unspecified vectors, related to "0/3 line wrapping equalization."
- openSUSE-SU-2016:3087
- openSUSE-SU-2016:3087
- [oss-security] 20161004 Re: Handful of libass issues
- [oss-security] 20161004 Re: Handful of libass issues
- 93358
- 93358
- https://bugzilla.redhat.com/show_bug.cgi?id=1381960
- https://bugzilla.redhat.com/show_bug.cgi?id=1381960
- https://github.com/libass/libass/commit/f4f48950788b91c6a30029cc28a240b834713ea7
- https://github.com/libass/libass/commit/f4f48950788b91c6a30029cc28a240b834713ea7
- https://github.com/libass/libass/releases/tag/0.13.4
- https://github.com/libass/libass/releases/tag/0.13.4
- FEDORA-2016-282507c3e9
- FEDORA-2016-282507c3e9
- FEDORA-2016-95407a836f
- FEDORA-2016-95407a836f
- FEDORA-2016-d2a05a0644
- FEDORA-2016-d2a05a0644
- GLSA-201702-25
- GLSA-201702-25
Modified: 2024-11-21
CVE-2016-7970
Buffer overflow in the calc_coeff function in libass/ass_blur.c in libass before 0.13.4 allows remote attackers to cause a denial of service via unspecified vectors.
- [oss-security] 20161004 Re: Handful of libass issues
- [oss-security] 20161004 Re: Handful of libass issues
- 93358
- 93358
- https://bugzilla.redhat.com/show_bug.cgi?id=1381960
- https://bugzilla.redhat.com/show_bug.cgi?id=1381960
- https://github.com/libass/libass/pull/240/commits/08e754612019ed84d1db0d1fc4f5798248decd75
- https://github.com/libass/libass/pull/240/commits/08e754612019ed84d1db0d1fc4f5798248decd75
- https://github.com/libass/libass/releases/tag/0.13.4
- https://github.com/libass/libass/releases/tag/0.13.4
- FEDORA-2016-282507c3e9
- FEDORA-2016-282507c3e9
- FEDORA-2016-95407a836f
- FEDORA-2016-95407a836f
- FEDORA-2016-d2a05a0644
- FEDORA-2016-d2a05a0644
- GLSA-201702-25
- GLSA-201702-25
Modified: 2024-11-21
CVE-2016-7972
The check_allocations function in libass/ass_shaper.c in libass before 0.13.4 allows remote attackers to cause a denial of service (memory allocation failure) via unspecified vectors.
- openSUSE-SU-2016:3087
- openSUSE-SU-2016:3087
- [oss-security] 20161004 Re: Handful of libass issues
- [oss-security] 20161004 Re: Handful of libass issues
- 93358
- 93358
- https://bugzilla.redhat.com/show_bug.cgi?id=1381960
- https://bugzilla.redhat.com/show_bug.cgi?id=1381960
- https://github.com/libass/libass/pull/240/commits/aa54e0b59200a994d50a346b5d7ac818ebcf2d4b
- https://github.com/libass/libass/pull/240/commits/aa54e0b59200a994d50a346b5d7ac818ebcf2d4b
- https://github.com/libass/libass/releases/tag/0.13.4
- https://github.com/libass/libass/releases/tag/0.13.4
- FEDORA-2016-282507c3e9
- FEDORA-2016-282507c3e9
- FEDORA-2016-95407a836f
- FEDORA-2016-95407a836f
- FEDORA-2016-d2a05a0644
- FEDORA-2016-d2a05a0644
- GLSA-201702-25
- GLSA-201702-25
Package menu-cache updated to version 1.1.0-alt1 for branch sisyphus in task 220045.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-8933
Libmenu-cache 1.0.2 insecurely uses /tmp for a socket file, allowing a local user to cause a denial of service (menu unavailability).
Package kernel-image-un-def updated to version 4.19.19-alt1 for branch sisyphus in task 220302.
Closed vulnerabilities
BDU:2019-02381
Уязвимость ядра операционных систем Linux, связанная со смещением указателя за пределы допустимых значений, позволяющая нарушителю реализовать атаки по побочным каналам
Modified: 2024-11-21
CVE-2019-7308
kernel/bpf/verifier.c in the Linux kernel before 4.20.6 performs undesirable out-of-bounds speculation on pointer arithmetic in various cases, including cases of different branches with different state or limits to sanitize, leading to side-channel attacks.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=979d63d50c0c0f7bc537bf821e056cc9fe5abd38
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d3bd7413e0ca40b60cf60d4003246d067cafdeda
- openSUSE-SU-2019:1193
- 106827
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1711
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.6
- https://github.com/torvalds/linux/commit/979d63d50c0c0f7bc537bf821e056cc9fe5abd38
- https://github.com/torvalds/linux/commit/d3bd7413e0ca40b60cf60d4003246d067cafdeda
- https://support.f5.com/csp/article/K43030517
- https://support.f5.com/csp/article/K43030517?utm_source=f5support&%3Butm_medium=RSS
- USN-3930-1
- USN-3930-2
- USN-3931-1
- USN-3931-2
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=979d63d50c0c0f7bc537bf821e056cc9fe5abd38
- USN-3931-2
- USN-3931-1
- USN-3930-2
- USN-3930-1
- https://support.f5.com/csp/article/K43030517?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K43030517
- https://github.com/torvalds/linux/commit/d3bd7413e0ca40b60cf60d4003246d067cafdeda
- https://github.com/torvalds/linux/commit/979d63d50c0c0f7bc537bf821e056cc9fe5abd38
- https://cdn.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.20.6
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1711
- 106827
- openSUSE-SU-2019:1193
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=d3bd7413e0ca40b60cf60d4003246d067cafdeda
Closed vulnerabilities
BDU:2019-01742
Уязвимость функции virJSONValueObjectHasKey библиотеки управления виртуализацией Libvirt, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-3840
A NULL pointer dereference flaw was discovered in libvirt before version 5.0.0 in the way it gets interface information through the QEMU agent. An attacker in a guest VM can use this flaw to crash libvirtd and cause a denial of service.
- openSUSE-SU-2019:1288
- openSUSE-SU-2019:1288
- openSUSE-SU-2019:1294
- openSUSE-SU-2019:1294
- RHSA-2019:2294
- RHSA-2019:2294
- https://bugzilla.redhat.com/show_bug.cgi?id=1663051
- https://bugzilla.redhat.com/show_bug.cgi?id=1663051
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3840
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3840
- FEDORA-2019-b3bfc61567
- FEDORA-2019-b3bfc61567
- https://www.redhat.com/archives/libvir-list/2019-January/msg00241.html
- https://www.redhat.com/archives/libvir-list/2019-January/msg00241.html
Closed bugs
Шебанг #!/usr/bin/env bash не распознается /usr/lib/rpm/shell.req