ALT-BU-2019-3762-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-13239
inc/user.class.php in GLPI before 9.4.3 allows XSS via a user picture.
- https://github.com/glpi-project/glpi/commit/c2aa7a7cd6af28be3809acc7e7842d2d2008c0fb
- https://github.com/glpi-project/glpi/commit/c2aa7a7cd6af28be3809acc7e7842d2d2008c0fb
- https://github.com/glpi-project/glpi/releases/tag/9.4.3
- https://github.com/glpi-project/glpi/releases/tag/9.4.3
- https://www.synacktiv.com/ressources/advisories/GLPI_9.4.0_stored_XSS.pdf
- https://www.synacktiv.com/ressources/advisories/GLPI_9.4.0_stored_XSS.pdf
Closed bugs
new version
Package kernel-image-un-def updated to version 5.1.15-alt1 for branch sisyphus in task 233162.
Closed vulnerabilities
BDU:2019-02507
Уязвимость компонента arch/powerpc/mm/mmu_context_book3s64.c ядра операционной системы Linux, позволяющая нарушителю получить доступ к содержимому памяти или вызвать повреждение памяти других процессов в системе
Modified: 2024-11-21
CVE-2019-12615
An issue was discovered in get_vdev_port_node_info in arch/sparc/kernel/mdesc.c in the Linux kernel through 5.1.6. There is an unchecked kstrdup_const of node_info->vdev_port.name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash).
- 108549
- 108549
- https://git.kernel.org/pub/scm/linux/kernel/git/davem/sparc.git/commit/?id=80caf43549e7e41a695c6d1e11066286538b336f
- https://git.kernel.org/pub/scm/linux/kernel/git/davem/sparc.git/commit/?id=80caf43549e7e41a695c6d1e11066286538b336f
- https://security.netapp.com/advisory/ntap-20190710-0002/
- https://security.netapp.com/advisory/ntap-20190710-0002/
- https://support.f5.com/csp/article/K60924046
- https://support.f5.com/csp/article/K60924046
- https://support.f5.com/csp/article/K60924046?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K60924046?utm_source=f5support&%3Butm_medium=RSS
- https://www.mail-archive.com/linux-kernel%40vger.kernel.org/msg2014901.html
- https://www.mail-archive.com/linux-kernel%40vger.kernel.org/msg2014901.html
Modified: 2024-11-21
CVE-2019-12817
arch/powerpc/mm/mmu_context_book3s64.c in the Linux kernel before 5.1.15 for powerpc has a bug where unrelated processes may be able to read/write to one another's virtual memory under certain conditions via an mmap above 512 TB. Only a subset of powerpc systems are affected.
- openSUSE-SU-2019:1757
- openSUSE-SU-2019:1757
- [oss-security] 20190625 CVE-2019-12817: Linux kernel: powerpc: Unrelated processes may be able to read/write to each other's virtual memory
- [oss-security] 20190625 CVE-2019-12817: Linux kernel: powerpc: Unrelated processes may be able to read/write to each other's virtual memory
- 108884
- 108884
- RHSA-2019:2703
- RHSA-2019:2703
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.15
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.1.15
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ca72d88378b2f2444d3ec145dd442d449d3fefbc
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ca72d88378b2f2444d3ec145dd442d449d3fefbc
- FEDORA-2019-69c132b061
- FEDORA-2019-69c132b061
- FEDORA-2019-6817686c4d
- FEDORA-2019-6817686c4d
- 20190812 [SECURITY] [DSA 4495-1] linux security update
- 20190812 [SECURITY] [DSA 4495-1] linux security update
- https://support.f5.com/csp/article/K12876166
- https://support.f5.com/csp/article/K12876166
- https://support.f5.com/csp/article/K12876166?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K12876166?utm_source=f5support&%3Butm_medium=RSS
- USN-4031-1
- USN-4031-1
- DSA-4495
- DSA-4495
Package kernel-image-std-def updated to version 4.19.56-alt1 for branch sisyphus in task 233157.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-12615
An issue was discovered in get_vdev_port_node_info in arch/sparc/kernel/mdesc.c in the Linux kernel through 5.1.6. There is an unchecked kstrdup_const of node_info->vdev_port.name, which might allow an attacker to cause a denial of service (NULL pointer dereference and system crash).
- 108549
- 108549
- https://git.kernel.org/pub/scm/linux/kernel/git/davem/sparc.git/commit/?id=80caf43549e7e41a695c6d1e11066286538b336f
- https://git.kernel.org/pub/scm/linux/kernel/git/davem/sparc.git/commit/?id=80caf43549e7e41a695c6d1e11066286538b336f
- https://security.netapp.com/advisory/ntap-20190710-0002/
- https://security.netapp.com/advisory/ntap-20190710-0002/
- https://support.f5.com/csp/article/K60924046
- https://support.f5.com/csp/article/K60924046
- https://support.f5.com/csp/article/K60924046?utm_source=f5support&%3Butm_medium=RSS
- https://support.f5.com/csp/article/K60924046?utm_source=f5support&%3Butm_medium=RSS
- https://www.mail-archive.com/linux-kernel%40vger.kernel.org/msg2014901.html
- https://www.mail-archive.com/linux-kernel%40vger.kernel.org/msg2014901.html
Package gimagereader updated to version 3.3.0-alt2 for branch sisyphus in task 233185.
Closed bugs
Provides for gimagereader-qt4