ALT-BU-2019-3938-1
Branch p9 update bulletin.
Closed vulnerabilities
BDU:2019-03640
Уязвимость средства автоматизации развёртывания и управления приложениями в средах с поддержкой контейнеризации Docker, связанная с ошибками управления генерацией кода, позволяющая нарушителю оказать воздействие на целостность данных, получить несанкционированный доступ к защищаемой информации, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-14271
In Docker 19.03.x before 19.03.1 linked against the GNU C Library (aka glibc), code injection can occur when the nsswitch facility dynamically loads a library inside a chroot that contains the contents of the container.
- openSUSE-SU-2019:2021
- openSUSE-SU-2019:2021
- https://docs.docker.com/engine/release-notes/
- https://docs.docker.com/engine/release-notes/
- https://github.com/moby/moby/issues/39449
- https://github.com/moby/moby/issues/39449
- 20190910 [SECURITY] [DSA 4521-1] docker.io security update
- 20190910 [SECURITY] [DSA 4521-1] docker.io security update
- https://security.netapp.com/advisory/ntap-20190828-0003/
- https://security.netapp.com/advisory/ntap-20190828-0003/
- DSA-4521
- DSA-4521
Package xorg-server updated to version 1.20.5-alt2 for branch p9 in task 237324.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-17624
"" In X.Org X Server 1.20.4, there is a stack-based buffer overflow in the function XQueryKeymap. For example, by sending ct.c_char 1000 times, an attacker can cause a denial of service (application crash) or possibly have unspecified other impact. Note: It is disputed if the X.Org X Server is involved or if there is a stack overflow.
- http://packetstormsecurity.com/files/154868/X.Org-X-Server-1.20.4-Local-Stack-Overflow.html
- http://packetstormsecurity.com/files/154868/X.Org-X-Server-1.20.4-Local-Stack-Overflow.html
- https://www.exploit-db.com/exploits/47507
- https://www.exploit-db.com/exploits/47507
- https://www.x.org/releases/individual/xserver/
- https://www.x.org/releases/individual/xserver/
Modified: 2024-11-21
CVE-2022-4283
A vulnerability was found in X.Org. This security flaw occurs because the XkbCopyNames function left a dangling pointer to freed memory, resulting in out-of-bounds memory access on subsequent XkbGetKbdByName requests.. This issue can lead to local privileges elevation on systems where the X server is running privileged and remote code execution for ssh X forwarding sessions.
- https://access.redhat.com/security/cve/CVE-2022-4283
- https://access.redhat.com/security/cve/CVE-2022-4283
- https://bugzilla.redhat.com/show_bug.cgi?id=2151761
- https://bugzilla.redhat.com/show_bug.cgi?id=2151761
- FEDORA-2022-721a78b7e5
- FEDORA-2022-721a78b7e5
- FEDORA-2022-c3a65f7c65
- FEDORA-2022-c3a65f7c65
- FEDORA-2022-dd3eb7e0a8
- FEDORA-2022-dd3eb7e0a8
- https://security.gentoo.org/glsa/202305-30
- https://security.gentoo.org/glsa/202305-30
- DSA-5304
- DSA-5304