ALT-BU-2019-3557-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2015-03334
Уязвимости операционной системы Debian GNU/Linux, позволяющие локальному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2024-11-21
CVE-2013-4362
WEB-DAV Linux File System (davfs2) 1.4.6 and 1.4.7 allow local users to gain privileges via unknown attack vectors in (1) kernel_interface.c and (2) mount_davfs.c, related to the "system" function.
- 97416
- 97416
- 97417
- 97417
- http://savannah.nongnu.org/bugs/?40034
- http://savannah.nongnu.org/bugs/?40034
- [oss-security] 20130918 Re: CVE request: davfs2 - Unsecure use of system()
- [oss-security] 20130918 Re: CVE request: davfs2 - Unsecure use of system()
- DSA-2765
- DSA-2765
- 62445
- 62445
- GLSA-201612-02
- GLSA-201612-02
Package lightdm-gtk-greeter updated to version 2.0.1-alt13 for branch sisyphus in task 225215.
Closed bugs
greeter-hide-users=true скрывает вообще указание пользователя
Package libfreetype updated to version 2.10.0-alt1 for branch sisyphus in task 225205.
Closed bugs
Обновление libfreetype
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-2625
It was discovered that libXdmcp before 1.1.2 including used weak entropy to generate session keys. On a multi-user system using xdmcp, a local attacker could potentially use information available from the process list to brute force the key, allowing them to hijack other users' sessions.
- 96480
- 96480
- 1037919
- 1037919
- RHSA-2017:1865
- RHSA-2017:1865
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2625
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2625
- https://cgit.freedesktop.org/xorg/lib/libXdmcp/commit/?id=0554324ec6bbc2071f5d1f8ad211a1643e29eb1f
- https://cgit.freedesktop.org/xorg/lib/libXdmcp/commit/?id=0554324ec6bbc2071f5d1f8ad211a1643e29eb1f
- [debian-lts-announce] 20191125 [SECURITY] [DLA 2006-1] libxdmcp security update
- [debian-lts-announce] 20191125 [SECURITY] [DLA 2006-1] libxdmcp security update
- GLSA-201704-03
- GLSA-201704-03
- https://www.x41-dsec.de/lab/advisories/x41-2017-001-xorg/
- https://www.x41-dsec.de/lab/advisories/x41-2017-001-xorg/
Closed vulnerabilities
Modified: 2024-11-21
CVE-2016-7947
Multiple integer overflows in X.org libXrandr before 1.5.1 allow remote X servers to trigger out-of-bounds write operations via a crafted response.
- [oss-security] 20161004 X.Org security advisory: Protocol handling issues in X Window System client libraries
- [oss-security] 20161004 X.Org security advisory: Protocol handling issues in X Window System client libraries
- [oss-security] 20161004 Re: X.Org security advisory: Protocol handling issues in X Window System client libraries
- [oss-security] 20161004 Re: X.Org security advisory: Protocol handling issues in X Window System client libraries
- 93365
- 93365
- 1036945
- 1036945
- https://cgit.freedesktop.org/xorg/lib/libXrandr/commit/?id=a0df3e1c7728205e5c7650b2e6dce684139254a6
- https://cgit.freedesktop.org/xorg/lib/libXrandr/commit/?id=a0df3e1c7728205e5c7650b2e6dce684139254a6
- FEDORA-2016-a06c8cc941
- FEDORA-2016-a06c8cc941
- FEDORA-2016-83040426d6
- FEDORA-2016-83040426d6
- [xorg-announce] 20161004 X.Org security advisory: Protocol handling issues in X Window System client libraries
- [xorg-announce] 20161004 X.Org security advisory: Protocol handling issues in X Window System client libraries
- GLSA-201704-03
- GLSA-201704-03
Modified: 2024-11-21
CVE-2016-7948
X.org libXrandr before 1.5.1 allows remote X servers to trigger out-of-bounds write operations by leveraging mishandling of reply data.
- [oss-security] 20161004 X.Org security advisory: Protocol handling issues in X Window System client libraries
- [oss-security] 20161004 X.Org security advisory: Protocol handling issues in X Window System client libraries
- [oss-security] 20161004 Re: X.Org security advisory: Protocol handling issues in X Window System client libraries
- [oss-security] 20161004 Re: X.Org security advisory: Protocol handling issues in X Window System client libraries
- 93373
- 93373
- 1036945
- 1036945
- https://cgit.freedesktop.org/xorg/lib/libXrandr/commit/?id=a0df3e1c7728205e5c7650b2e6dce684139254a6
- https://cgit.freedesktop.org/xorg/lib/libXrandr/commit/?id=a0df3e1c7728205e5c7650b2e6dce684139254a6
- FEDORA-2016-a06c8cc941
- FEDORA-2016-a06c8cc941
- FEDORA-2016-83040426d6
- FEDORA-2016-83040426d6
- [xorg-announce] 20161004 X.Org security advisory: Protocol handling issues in X Window System client libraries
- [xorg-announce] 20161004 X.Org security advisory: Protocol handling issues in X Window System client libraries
- GLSA-201704-03
- GLSA-201704-03
Package caffeine-ng updated to version 3.4.2-alt2 for branch sisyphus in task 225247.
Closed bugs
зависает при выходе из программы
Closed bugs
Обновить nano
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-1010314
Gitea 1.7.2, 1.7.3 is affected by: Cross Site Scripting (XSS). The impact is: execute JavaScript in victim's browser, when the vulnerable repo page is loaded. The component is: repository's description. The attack vector is: victim must navigate to public and affected repo page.
Package gst-plugins-good1.0 updated to version 1.15.2-alt2 for branch sisyphus in task 225286.
Closed bugs
Отсутствует libgstqmlgl.so
Closed bugs
Сломалась сборка perl-Glib
Package slick-greeter updated to version 1.2.4-alt2 for branch sisyphus in task 225324.
Closed bugs
Сломалась сборка slick-greeter
Package perl-Time-Format_XS updated to version 1.03-alt5 for branch sisyphus in task 225339.
Closed bugs
Сломалась сборка perl-Time-Format
Сломалась сборка perl-Time-Format
Package kernel-image-std-def updated to version 4.19.30-alt1 for branch sisyphus in task 225292.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-16995
In the Linux kernel before 5.0.3, a memory leak exits in hsr_dev_finalize() in net/hsr/hsr_device.c if hsr_add_port fails to add a port, which may cause denial of service, aka CID-6caabe7f197d.
- openSUSE-SU-2019:2444
- openSUSE-SU-2019:2444
- openSUSE-SU-2019:2503
- openSUSE-SU-2019:2503
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.3
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.0.3
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6caabe7f197d3466d238f70915d65301f1716626
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6caabe7f197d3466d238f70915d65301f1716626
- https://github.com/torvalds/linux/commit/6caabe7f197d3466d238f70915d65301f1716626
- https://github.com/torvalds/linux/commit/6caabe7f197d3466d238f70915d65301f1716626
- https://security.netapp.com/advisory/ntap-20191031-0005/
- https://security.netapp.com/advisory/ntap-20191031-0005/