ALT-BU-2024-9650-2
Branch p10 update bulletin.
Closed vulnerabilities
BDU:2024-02623
Уязвимость функции _libcap_strdup() библиотеки Libcap, позволяющая нарушителю выполнить произвольные PHP-файлы на сервере
Modified: 2025-04-24
CVE-2023-2603
A vulnerability was found in libcap. This issue occurs in the _libcap_strdup() function and can lead to an integer overflow if the input string is close to 4GiB.
- https://bugzilla.redhat.com/show_bug.cgi?id=2209113
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZ57ICDLMVYEREXQGZWL4GWI7FRJCRQT/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPEGCFMCN5KGCFX5Y2VTKR732TTD4ADW/
- https://www.x41-dsec.de/static/reports/X41-libcap-Code-Review-2023-OSTIF-Final-Report.pdf
- https://bugzilla.redhat.com/show_bug.cgi?id=2209113
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/EZ57ICDLMVYEREXQGZWL4GWI7FRJCRQT/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IPEGCFMCN5KGCFX5Y2VTKR732TTD4ADW/
- https://www.x41-dsec.de/static/reports/X41-libcap-Code-Review-2023-OSTIF-Final-Report.pdf
Closed vulnerabilities
BDU:2015-01936
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-01937
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-01938
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-03440
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-03441
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-03442
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06549
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06550
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06551
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06552
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06553
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06554
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-06555
Уязвимости операционной системы Red Hat Enterprise Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2022-01774
Уязвимость компонента nmakehlp.c языка программирования Tcl, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2025-04-09
CVE-2007-2877
Buffer overflow in tcl/win/tclWinReg.c in Tcl (Tcl/Tk) before 8.5a6 allows local users to gain privileges via long registry key paths.
- http://osvdb.org/36528
- http://secunia.com/advisories/25401
- http://sourceforge.net/project/shownotes.php?group_id=10894&release_id=503937
- http://sourceforge.net/tracker/index.php?func=detail&aid=1682211&group_id=10894&atid=110894
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34515
- http://osvdb.org/36528
- http://secunia.com/advisories/25401
- http://sourceforge.net/project/shownotes.php?group_id=10894&release_id=503937
- http://sourceforge.net/tracker/index.php?func=detail&aid=1682211&group_id=10894&atid=110894
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34515
Modified: 2025-04-09
CVE-2007-4769
The regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows remote authenticated users to cause a denial of service (backend crash) via an out-of-bounds backref number.
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01420154
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01420154
- http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00000.html
- http://secunia.com/advisories/28359
- http://secunia.com/advisories/28376
- http://secunia.com/advisories/28437
- http://secunia.com/advisories/28438
- http://secunia.com/advisories/28454
- http://secunia.com/advisories/28455
- http://secunia.com/advisories/28464
- http://secunia.com/advisories/28477
- http://secunia.com/advisories/28479
- http://secunia.com/advisories/28679
- http://secunia.com/advisories/28698
- http://secunia.com/advisories/29638
- http://security.gentoo.org/glsa/glsa-200801-15.xml
- http://securitytracker.com/id?1019157
- http://sourceforge.net/project/shownotes.php?release_id=565440&group_id=10894
- http://sourceforge.net/tracker/index.php?func=detail&aid=1810264&group_id=10894&atid=110894
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-103197-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-200559-1
- http://www.debian.org/security/2008/dsa-1460
- http://www.debian.org/security/2008/dsa-1463
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:004
- http://www.postgresql.org/about/news.905
- http://www.redhat.com/support/errata/RHSA-2008-0038.html
- http://www.redhat.com/support/errata/RHSA-2008-0040.html
- http://www.securityfocus.com/archive/1/485864/100/0/threaded
- http://www.securityfocus.com/archive/1/486407/100/0/threaded
- http://www.securityfocus.com/bid/27163
- http://www.vupen.com/english/advisories/2008/0061
- http://www.vupen.com/english/advisories/2008/0109
- http://www.vupen.com/english/advisories/2008/1071/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/39499
- https://issues.rpath.com/browse/RPL-1768
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9804
- https://usn.ubuntu.com/568-1/
- https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00397.html
- https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00469.html
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01420154
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01420154
- http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00000.html
- http://secunia.com/advisories/28359
- http://secunia.com/advisories/28376
- http://secunia.com/advisories/28437
- http://secunia.com/advisories/28438
- http://secunia.com/advisories/28454
- http://secunia.com/advisories/28455
- http://secunia.com/advisories/28464
- http://secunia.com/advisories/28477
- http://secunia.com/advisories/28479
- http://secunia.com/advisories/28679
- http://secunia.com/advisories/28698
- http://secunia.com/advisories/29638
- http://security.gentoo.org/glsa/glsa-200801-15.xml
- http://securitytracker.com/id?1019157
- http://sourceforge.net/project/shownotes.php?release_id=565440&group_id=10894
- http://sourceforge.net/tracker/index.php?func=detail&aid=1810264&group_id=10894&atid=110894
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-103197-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-200559-1
- http://www.debian.org/security/2008/dsa-1460
- http://www.debian.org/security/2008/dsa-1463
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:004
- http://www.postgresql.org/about/news.905
- http://www.redhat.com/support/errata/RHSA-2008-0038.html
- http://www.redhat.com/support/errata/RHSA-2008-0040.html
- http://www.securityfocus.com/archive/1/485864/100/0/threaded
- http://www.securityfocus.com/archive/1/486407/100/0/threaded
- http://www.securityfocus.com/bid/27163
- http://www.vupen.com/english/advisories/2008/0061
- http://www.vupen.com/english/advisories/2008/0109
- http://www.vupen.com/english/advisories/2008/1071/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/39499
- https://issues.rpath.com/browse/RPL-1768
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9804
- https://usn.ubuntu.com/568-1/
- https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00397.html
- https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00469.html
Modified: 2025-04-09
CVE-2007-5137
Buffer overflow in the ReadImage function in generic/tkImgGIF.c in Tcl (Tcl/Tk) 8.4.13 through 8.4.15 allows remote attackers to execute arbitrary code via multi-frame interlaced GIF files in which later frames are smaller than the first. NOTE: this issue is due to an incorrect patch for CVE-2007-5378.
- http://bugs.gentoo.org/show_bug.cgi?id=192539
- http://secunia.com/advisories/26942
- http://secunia.com/advisories/27086
- http://secunia.com/advisories/27182
- http://secunia.com/advisories/27207
- http://secunia.com/advisories/27229
- http://secunia.com/advisories/27295
- http://secunia.com/advisories/29069
- http://secunia.com/advisories/34297
- http://security.gentoo.org/glsa/glsa-200710-07.xml
- http://sourceforge.net/project/shownotes.php?release_id=541207
- http://www.attrition.org/pipermail/vim/2007-October/001826.html
- http://www.debian.org/security/2009/dsa-1743
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:200
- http://www.novell.com/linux/security/advisories/2007_20_sr.html
- http://www.redhat.com/support/errata/RHSA-2008-0136.html
- http://www.securityfocus.com/bid/25826
- http://www.ubuntu.com/usn/usn-529-1
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9540
- https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00261.html
- http://bugs.gentoo.org/show_bug.cgi?id=192539
- http://secunia.com/advisories/26942
- http://secunia.com/advisories/27086
- http://secunia.com/advisories/27182
- http://secunia.com/advisories/27207
- http://secunia.com/advisories/27229
- http://secunia.com/advisories/27295
- http://secunia.com/advisories/29069
- http://secunia.com/advisories/34297
- http://security.gentoo.org/glsa/glsa-200710-07.xml
- http://sourceforge.net/project/shownotes.php?release_id=541207
- http://www.attrition.org/pipermail/vim/2007-October/001826.html
- http://www.debian.org/security/2009/dsa-1743
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:200
- http://www.novell.com/linux/security/advisories/2007_20_sr.html
- http://www.redhat.com/support/errata/RHSA-2008-0136.html
- http://www.securityfocus.com/bid/25826
- http://www.ubuntu.com/usn/usn-529-1
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9540
- https://www.redhat.com/archives/fedora-package-announce/2007-October/msg00261.html
Modified: 2025-04-09
CVE-2007-6067
Algorithmic complexity vulnerability in the regular expression parser in TCL before 8.4.17, as used in PostgreSQL 8.2 before 8.2.6, 8.1 before 8.1.11, 8.0 before 8.0.15, and 7.4 before 7.4.19, allows remote authenticated users to cause a denial of service (memory consumption) via a crafted "complex" regular expression with doubly-nested states.
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01420154
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01420154
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00000.html
- http://rhn.redhat.com/errata/RHSA-2013-0122.html
- http://secunia.com/advisories/28359
- http://secunia.com/advisories/28376
- http://secunia.com/advisories/28437
- http://secunia.com/advisories/28438
- http://secunia.com/advisories/28454
- http://secunia.com/advisories/28455
- http://secunia.com/advisories/28464
- http://secunia.com/advisories/28477
- http://secunia.com/advisories/28479
- http://secunia.com/advisories/28679
- http://secunia.com/advisories/28698
- http://secunia.com/advisories/29638
- http://security.gentoo.org/glsa/glsa-200801-15.xml
- http://securitytracker.com/id?1019157
- http://sourceforge.net/project/shownotes.php?release_id=565440&group_id=10894
- http://sourceforge.net/tracker/index.php?func=detail&aid=1810264&group_id=10894&atid=110894
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-103197-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-200559-1
- http://www.debian.org/security/2008/dsa-1460
- http://www.debian.org/security/2008/dsa-1463
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:004
- http://www.postgresql.org/about/news.905
- http://www.redhat.com/support/errata/RHSA-2008-0038.html
- http://www.redhat.com/support/errata/RHSA-2008-0040.html
- http://www.securityfocus.com/archive/1/485864/100/0/threaded
- http://www.securityfocus.com/archive/1/486407/100/0/threaded
- http://www.securityfocus.com/bid/27163
- http://www.vupen.com/english/advisories/2008/0061
- http://www.vupen.com/english/advisories/2008/0109
- http://www.vupen.com/english/advisories/2008/1071/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/39498
- https://issues.rpath.com/browse/RPL-1768
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10235
- https://usn.ubuntu.com/568-1/
- https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00397.html
- https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00469.html
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01420154
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01420154
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705
- http://lists.opensuse.org/opensuse-security-announce/2008-02/msg00000.html
- http://rhn.redhat.com/errata/RHSA-2013-0122.html
- http://secunia.com/advisories/28359
- http://secunia.com/advisories/28376
- http://secunia.com/advisories/28437
- http://secunia.com/advisories/28438
- http://secunia.com/advisories/28454
- http://secunia.com/advisories/28455
- http://secunia.com/advisories/28464
- http://secunia.com/advisories/28477
- http://secunia.com/advisories/28479
- http://secunia.com/advisories/28679
- http://secunia.com/advisories/28698
- http://secunia.com/advisories/29638
- http://security.gentoo.org/glsa/glsa-200801-15.xml
- http://securitytracker.com/id?1019157
- http://sourceforge.net/project/shownotes.php?release_id=565440&group_id=10894
- http://sourceforge.net/tracker/index.php?func=detail&aid=1810264&group_id=10894&atid=110894
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-103197-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-200559-1
- http://www.debian.org/security/2008/dsa-1460
- http://www.debian.org/security/2008/dsa-1463
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:004
- http://www.postgresql.org/about/news.905
- http://www.redhat.com/support/errata/RHSA-2008-0038.html
- http://www.redhat.com/support/errata/RHSA-2008-0040.html
- http://www.securityfocus.com/archive/1/485864/100/0/threaded
- http://www.securityfocus.com/archive/1/486407/100/0/threaded
- http://www.securityfocus.com/bid/27163
- http://www.vupen.com/english/advisories/2008/0061
- http://www.vupen.com/english/advisories/2008/0109
- http://www.vupen.com/english/advisories/2008/1071/references
- https://exchange.xforce.ibmcloud.com/vulnerabilities/39498
- https://issues.rpath.com/browse/RPL-1768
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10235
- https://usn.ubuntu.com/568-1/
- https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00397.html
- https://www.redhat.com/archives/fedora-package-announce/2008-January/msg00469.html
Modified: 2025-04-09
CVE-2008-0553
Stack-based buffer overflow in the ReadImage function in tkImgGIF.c in Tk (Tcl/Tk) before 8.5.1 allows remote attackers to execute arbitrary code via a crafted GIF image, a similar issue to CVE-2006-4484.
- http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00005.html
- http://secunia.com/advisories/28784
- http://secunia.com/advisories/28807
- http://secunia.com/advisories/28848
- http://secunia.com/advisories/28857
- http://secunia.com/advisories/28867
- http://secunia.com/advisories/28954
- http://secunia.com/advisories/29069
- http://secunia.com/advisories/29070
- http://secunia.com/advisories/29622
- http://secunia.com/advisories/30129
- http://secunia.com/advisories/30188
- http://secunia.com/advisories/30535
- http://secunia.com/advisories/30717
- http://secunia.com/advisories/30783
- http://secunia.com/advisories/32608
- http://securitytracker.com/id?1019309
- http://sourceforge.net/project/shownotes.php?release_id=573933&group_id=10894
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-237465-1
- http://ubuntu.com/usn/usn-664-1
- http://wiki.rpath.com/Advisories:rPSA-2008-0054
- http://www.debian.org/security/2008/dsa-1490
- http://www.debian.org/security/2008/dsa-1491
- http://www.debian.org/security/2008/dsa-1598
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:041
- http://www.novell.com/linux/security/advisories/2008_13_sr.html
- http://www.redhat.com/support/errata/RHSA-2008-0134.html
- http://www.redhat.com/support/errata/RHSA-2008-0135.html
- http://www.redhat.com/support/errata/RHSA-2008-0136.html
- http://www.securityfocus.com/archive/1/488069/100/0/threaded
- http://www.securityfocus.com/archive/1/493080/100/0/threaded
- http://www.securityfocus.com/bid/27655
- http://www.vmware.com/security/advisories/VMSA-2008-0009.html
- http://www.vupen.com/english/advisories/2008/0430
- http://www.vupen.com/english/advisories/2008/1456/references
- http://www.vupen.com/english/advisories/2008/1744
- https://bugzilla.redhat.com/show_bug.cgi?id=431518
- https://issues.rpath.com/browse/RPL-2215
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10098
- https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00115.html
- https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00132.html
- https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00193.html
- https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00205.html
- https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00116.html
- http://lists.opensuse.org/opensuse-security-announce/2008-04/msg00005.html
- http://secunia.com/advisories/28784
- http://secunia.com/advisories/28807
- http://secunia.com/advisories/28848
- http://secunia.com/advisories/28857
- http://secunia.com/advisories/28867
- http://secunia.com/advisories/28954
- http://secunia.com/advisories/29069
- http://secunia.com/advisories/29070
- http://secunia.com/advisories/29622
- http://secunia.com/advisories/30129
- http://secunia.com/advisories/30188
- http://secunia.com/advisories/30535
- http://secunia.com/advisories/30717
- http://secunia.com/advisories/30783
- http://secunia.com/advisories/32608
- http://securitytracker.com/id?1019309
- http://sourceforge.net/project/shownotes.php?release_id=573933&group_id=10894
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-237465-1
- http://ubuntu.com/usn/usn-664-1
- http://wiki.rpath.com/Advisories:rPSA-2008-0054
- http://www.debian.org/security/2008/dsa-1490
- http://www.debian.org/security/2008/dsa-1491
- http://www.debian.org/security/2008/dsa-1598
- http://www.mandriva.com/security/advisories?name=MDVSA-2008:041
- http://www.novell.com/linux/security/advisories/2008_13_sr.html
- http://www.redhat.com/support/errata/RHSA-2008-0134.html
- http://www.redhat.com/support/errata/RHSA-2008-0135.html
- http://www.redhat.com/support/errata/RHSA-2008-0136.html
- http://www.securityfocus.com/archive/1/488069/100/0/threaded
- http://www.securityfocus.com/archive/1/493080/100/0/threaded
- http://www.securityfocus.com/bid/27655
- http://www.vmware.com/security/advisories/VMSA-2008-0009.html
- http://www.vupen.com/english/advisories/2008/0430
- http://www.vupen.com/english/advisories/2008/1456/references
- http://www.vupen.com/english/advisories/2008/1744
- https://bugzilla.redhat.com/show_bug.cgi?id=431518
- https://issues.rpath.com/browse/RPL-2215
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10098
- https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00115.html
- https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00132.html
- https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00193.html
- https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00205.html
- https://www.redhat.com/archives/fedora-package-announce/2008-May/msg00116.html
Modified: 2024-11-21
CVE-2021-35331
In Tcl 8.6.11, a format string vulnerability in nmakehlp.c might allow code execution via a crafted file. NOTE: multiple third parties dispute the significance of this finding
- https://core.tcl-lang.org/tcl/info/28ef6c0c741408a2
- https://core.tcl-lang.org/tcl/info/bad6cc213dfe8280
- https://github.com/tcltk/tcl/commit/4705dbdde2f32ff90420765cd93e7ac71d81a222
- https://sqlite.org/forum/info/7dcd751996c93ec9
- https://core.tcl-lang.org/tcl/info/28ef6c0c741408a2
- https://core.tcl-lang.org/tcl/info/bad6cc213dfe8280
- https://github.com/tcltk/tcl/commit/4705dbdde2f32ff90420765cd93e7ac71d81a222
- https://sqlite.org/forum/info/7dcd751996c93ec9