ALT-BU-2019-3495-1
Branch sisyphus update bulletin.
Closed bugs
Убрать пункт "Учебники" из Справки
Package python-module-service-identity updated to version 18.1.0-alt1 for branch sisyphus in task 221601.
Closed bugs
Дублирует python-module-service-identity
Package virtualbox updated to version 5.2.26-alt1 for branch sisyphus in task 221022.
Closed vulnerabilities
BDU:2019-00454
Уязвимость компонента Core программного средства виртуализации Oracle VM VirtualBox, позволяющая нарушителю вызвать зависание или аварийное завершение работы приложения
Modified: 2024-11-21
CVE-2019-2527
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.26 and prior to 6.0.4. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).
Closed bugs
После обновления на дату 03/02/2019 не стартует xorg в VirtualBox/Windows
Package kernel-modules-virtualbox-std-def updated to version 5.2.26-alt1.265826.1 for branch sisyphus in task 221022.
Closed vulnerabilities
BDU:2019-00454
Уязвимость компонента Core программного средства виртуализации Oracle VM VirtualBox, позволяющая нарушителю вызвать зависание или аварийное завершение работы приложения
Modified: 2024-11-21
CVE-2019-2527
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.26 and prior to 6.0.4. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).
Package kernel-modules-virtualbox-un-def updated to version 5.2.26-alt1.267028.1 for branch sisyphus in task 221022.
Closed vulnerabilities
BDU:2019-00454
Уязвимость компонента Core программного средства виртуализации Oracle VM VirtualBox, позволяющая нарушителю вызвать зависание или аварийное завершение работы приложения
Modified: 2024-11-21
CVE-2019-2527
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.26 and prior to 6.0.4. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).
Package kernel-modules-virtualbox-addition-un-def updated to version 5.2.26-alt1.267028.1 for branch sisyphus in task 221022.
Closed vulnerabilities
BDU:2019-00454
Уязвимость компонента Core программного средства виртуализации Oracle VM VirtualBox, позволяющая нарушителю вызвать зависание или аварийное завершение работы приложения
Modified: 2024-11-21
CVE-2019-2527
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.26 and prior to 6.0.4. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).
Package kernel-modules-virtualbox-addition-std-def updated to version 5.2.26-alt1.265826.1 for branch sisyphus in task 221022.
Closed vulnerabilities
BDU:2019-00454
Уязвимость компонента Core программного средства виртуализации Oracle VM VirtualBox, позволяющая нарушителю вызвать зависание или аварийное завершение работы приложения
Modified: 2024-11-21
CVE-2019-2527
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are prior to 5.2.26 and prior to 6.0.4. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of Oracle VM VirtualBox. CVSS 3.0 Base Score 6.5 (Availability impacts). CVSS Vector: (CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H).
Closed vulnerabilities
BDU:2019-01235
Уязвимость функции ebl_object_note() утилиты для модификации и анализа бинарных файлов ELF Elfutils, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01236
Уязвимость функции read_long_names() утилиты для модификации и анализа бинарных файлов ELF Elfutils, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01237
Уязвимость функции read_srclines в пакете elfutils, связанная с чтением за границей буфера, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01238
Уязвимость функции elf64_xlatetom в пакете elfutils, связанная с отсутствием проверки соответствия ожидаемого размера данных и реально прочитанных из файла дампа (core), позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01239
Уязвимость функции elf_cvt_note() утилиты для модификации и анализа бинарных файлов ELF Elfutils, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-01240
Уязвимость функции elf32_xlatetom в пакете elfutils, связанная с возможностью выхода операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-7146
In elfutils 0.175, there is a buffer over-read in the ebl_object_note function in eblobjnote.c in libebl. Remote attackers could leverage this vulnerability to cause a denial-of-service via a crafted elf file, as demonstrated by eu-readelf.
Modified: 2024-11-21
CVE-2019-7148
An attempted excessive memory allocation was discovered in the function read_long_names in elf_begin.c in libelf in elfutils 0.174. Remote attackers could leverage this vulnerability to cause a denial-of-service via crafted elf input, which leads to an out-of-memory exception. NOTE: The maintainers believe this is not a real issue, but instead a "warning caused by ASAN because the allocation is big. By setting ASAN_OPTIONS=allocator_may_return_null=1 and running the reproducer, nothing happens."
Modified: 2024-11-21
CVE-2019-7149
A heap-based buffer over-read was discovered in the function read_srclines in dwarf_getsrclines.c in libdw in elfutils 0.175. A crafted input can cause segmentation faults, leading to denial-of-service, as demonstrated by eu-nm.
- RHSA-2019:2197
- RHSA-2019:3575
- [debian-lts-announce] 20190225 [SECURITY] [DLA 1689-1] elfutils security update
- https://sourceware.org/bugzilla/show_bug.cgi?id=24102
- https://sourceware.org/ml/elfutils-devel/2019-q1/msg00068.html
- USN-4012-1
- RHSA-2019:2197
- USN-4012-1
- https://sourceware.org/ml/elfutils-devel/2019-q1/msg00068.html
- https://sourceware.org/bugzilla/show_bug.cgi?id=24102
- [debian-lts-announce] 20190225 [SECURITY] [DLA 1689-1] elfutils security update
- RHSA-2019:3575
Modified: 2024-11-21
CVE-2019-7150
An issue was discovered in elfutils 0.175. A segmentation fault can occur in the function elf64_xlatetom in libelf/elf32_xlatetom.c, due to dwfl_segment_report_module not checking whether the dyn data read from a core file is truncated. A crafted input can cause a program crash, leading to denial-of-service, as demonstrated by eu-stack.
- openSUSE-SU-2019:1590
- RHSA-2019:2197
- RHSA-2019:3575
- [debian-lts-announce] 20190225 [SECURITY] [DLA 1689-1] elfutils security update
- [debian-lts-announce] 20211030 [SECURITY] [DLA 2802-1] elfutils security update
- https://sourceware.org/bugzilla/show_bug.cgi?id=24103
- https://sourceware.org/ml/elfutils-devel/2019-q1/msg00070.html
- USN-4012-1
- openSUSE-SU-2019:1590
- USN-4012-1
- https://sourceware.org/ml/elfutils-devel/2019-q1/msg00070.html
- https://sourceware.org/bugzilla/show_bug.cgi?id=24103
- [debian-lts-announce] 20211030 [SECURITY] [DLA 2802-1] elfutils security update
- [debian-lts-announce] 20190225 [SECURITY] [DLA 1689-1] elfutils security update
- RHSA-2019:3575
- RHSA-2019:2197
Modified: 2024-11-21
CVE-2019-7664
In elfutils 0.175, a negative-sized memcpy is attempted in elf_cvt_note in libelf/note_xlate.h because of an incorrect overflow check. Crafted elf input causes a segmentation fault, leading to denial of service (program crash).
Modified: 2024-11-21
CVE-2019-7665
In elfutils 0.175, a heap-based buffer over-read was discovered in the function elf32_xlatetom in elf32_xlatetom.c in libelf. A crafted ELF input can cause a segmentation fault leading to denial of service (program crash) because ebl_core_note does not reject malformed core file notes.
- openSUSE-SU-2019:1590
- RHSA-2019:2197
- RHSA-2019:3575
- [debian-lts-announce] 20190225 [SECURITY] [DLA 1689-1] elfutils security update
- [debian-lts-announce] 20211030 [SECURITY] [DLA 2802-1] elfutils security update
- https://sourceware.org/bugzilla/show_bug.cgi?id=24089
- https://sourceware.org/ml/elfutils-devel/2019-q1/msg00049.html
- USN-4012-1
- openSUSE-SU-2019:1590
- USN-4012-1
- https://sourceware.org/ml/elfutils-devel/2019-q1/msg00049.html
- https://sourceware.org/bugzilla/show_bug.cgi?id=24089
- [debian-lts-announce] 20211030 [SECURITY] [DLA 2802-1] elfutils security update
- [debian-lts-announce] 20190225 [SECURITY] [DLA 1689-1] elfutils security update
- RHSA-2019:3575
- RHSA-2019:2197