ALT-BU-2019-3938-1
Branch p9 update bulletin.
Closed vulnerabilities
BDU:2019-03640
Уязвимость средства автоматизации развёртывания и управления приложениями в средах с поддержкой контейнеризации Docker, связанная с ошибками управления генерацией кода, позволяющая нарушителю оказать воздействие на целостность данных, получить несанкционированный доступ к защищаемой информации, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-14271
In Docker 19.03.x before 19.03.1 linked against the GNU C Library (aka glibc), code injection can occur when the nsswitch facility dynamically loads a library inside a chroot that contains the contents of the container.
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00084.html
- https://docs.docker.com/engine/release-notes/
- https://github.com/moby/moby/issues/39449
- https://seclists.org/bugtraq/2019/Sep/21
- https://security.netapp.com/advisory/ntap-20190828-0003/
- https://www.debian.org/security/2019/dsa-4521
- http://lists.opensuse.org/opensuse-security-announce/2019-08/msg00084.html
- https://docs.docker.com/engine/release-notes/
- https://github.com/moby/moby/issues/39449
- https://seclists.org/bugtraq/2019/Sep/21
- https://security.netapp.com/advisory/ntap-20190828-0003/
- https://www.debian.org/security/2019/dsa-4521
Package xorg-server updated to version 1.20.5-alt2 for branch p9 in task 237324.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-17624
"" In X.Org X Server 1.20.4, there is a stack-based buffer overflow in the function XQueryKeymap. For example, by sending ct.c_char 1000 times, an attacker can cause a denial of service (application crash) or possibly have unspecified other impact. Note: It is disputed if the X.Org X Server is involved or if there is a stack overflow.
- http://packetstormsecurity.com/files/154868/X.Org-X-Server-1.20.4-Local-Stack-Overflow.html
- https://www.exploit-db.com/exploits/47507
- https://www.x.org/releases/individual/xserver/
- http://packetstormsecurity.com/files/154868/X.Org-X-Server-1.20.4-Local-Stack-Overflow.html
- https://www.exploit-db.com/exploits/47507
- https://www.x.org/releases/individual/xserver/
Modified: 2025-08-29
CVE-2022-4283
A vulnerability was found in X.Org. This security flaw occurs because the XkbCopyNames function left a dangling pointer to freed memory, resulting in out-of-bounds memory access on subsequent XkbGetKbdByName requests.. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions.
- https://access.redhat.com/security/cve/CVE-2022-4283
- https://bugzilla.redhat.com/show_bug.cgi?id=2151761
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/
- https://security.gentoo.org/glsa/202305-30
- https://www.debian.org/security/2022/dsa-5304
- https://access.redhat.com/security/cve/CVE-2022-4283
- https://bugzilla.redhat.com/show_bug.cgi?id=2151761
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5NELB7YDWRABYYBG4UPTHRBDTKJRV5M2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DXDF2O5PPLE3SVAJJYUOSAD5QZ4TWQ2G/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/Z67QC4C3I2FI2WRFIUPEHKC36J362MLA/
- https://security.gentoo.org/glsa/202305-30
- https://www.debian.org/security/2022/dsa-5304