Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

suse-cvrf логотип

SUSE-SU-2017:2699-1

Опубликовано: 10 окт. 2017
Источник: suse-cvrf

Описание

Security update for SLES 12 Docker image

The SUSE Linux Enterprise Server 12 container image has been updated to include security and stability fixes.

The following issues related to building of the container images have been fixed:

  • Included krb5 package to avoid the inclusion of krb5-mini which gets selected as a dependency by the Build Service solver. (bsc#1056193)
  • Do not install recommended packages when building container images. (bsc#975726)

A number of security issues that have been already fixed by updates released for SUSE Linux Enterprise Server 12 are now included in the base image. A package/CVE cross-reference is available below.

pam:

  • CVE-2015-3238

libtasn1:

  • CVE-2015-3622
  • CVE-2016-4008

libidn:

  • CVE-2015-2059
  • CVE-2015-8948
  • CVE-2016-6261
  • CVE-2016-6262
  • CVE-2016-6263

zlib:

  • CVE-2016-9840
  • CVE-2016-9841
  • CVE-2016-9842
  • CVE-2016-9843

curl:

  • CVE-2016-5419
  • CVE-2016-5420
  • CVE-2016-5421
  • CVE-2016-7141
  • CVE-2016-7167
  • CVE-2016-8615
  • CVE-2016-8616
  • CVE-2016-8617
  • CVE-2016-8618
  • CVE-2016-8619
  • CVE-2016-8620
  • CVE-2016-8621
  • CVE-2016-8622
  • CVE-2016-8623
  • CVE-2016-8624
  • CVE-2016-9586
  • CVE-2017-1000100
  • CVE-2017-1000101
  • CVE-2017-7407

openssl:

  • CVE-2016-2105
  • CVE-2016-2106
  • CVE-2016-2107
  • CVE-2016-2108
  • CVE-2016-2109
  • CVE-2016-2177
  • CVE-2016-2178
  • CVE-2016-2179
  • CVE-2016-2180
  • CVE-2016-2181
  • CVE-2016-2182
  • CVE-2016-2183
  • CVE-2016-6302
  • CVE-2016-6303
  • CVE-2016-6304
  • CVE-2016-6306

libxml2:

  • CVE-2014-0191
  • CVE-2015-8806
  • CVE-2016-1762
  • CVE-2016-1833
  • CVE-2016-1834
  • CVE-2016-1835
  • CVE-2016-1837
  • CVE-2016-1838
  • CVE-2016-1839
  • CVE-2016-1840
  • CVE-2016-2073
  • CVE-2016-3627
  • CVE-2016-3705
  • CVE-2016-4447
  • CVE-2016-4448
  • CVE-2016-4449
  • CVE-2016-4483
  • CVE-2016-4658
  • CVE-2016-9318
  • CVE-2016-9597
  • CVE-2017-9047
  • CVE-2017-9048
  • CVE-2017-9049
  • CVE-2017-9050

util-linux:

  • CVE-2015-5218
  • CVE-2016-5011
  • CVE-2017-2616

cracklib:

  • CVE-2016-6318

systemd:

  • CVE-2014-9770
  • CVE-2015-8842
  • CVE-2016-7796

pcre:

  • CVE-2014-8964
  • CVE-2015-2325
  • CVE-2015-2327
  • CVE-2015-2328
  • CVE-2015-3210
  • CVE-2015-3217
  • CVE-2015-5073
  • CVE-2015-8380
  • CVE-2015-8381
  • CVE-2015-8382
  • CVE-2015-8383
  • CVE-2015-8384
  • CVE-2015-8385
  • CVE-2015-8386
  • CVE-2015-8387
  • CVE-2015-8388
  • CVE-2015-8389
  • CVE-2015-8390
  • CVE-2015-8391
  • CVE-2015-8392
  • CVE-2015-8393
  • CVE-2015-8394
  • CVE-2015-8395
  • CVE-2016-1283
  • CVE-2016-3191

appamor:

  • CVE-2017-6507

bash:

  • CVE-2014-6277
  • CVE-2014-6278
  • CVE-2016-0634
  • CVE-2016-7543

cpio:

  • CVE-2016-2037

glibc:

  • CVE-2016-1234
  • CVE-2016-3075
  • CVE-2016-3706
  • CVE-2016-4429
  • CVE-2017-1000366

perl:

  • CVE-2015-8853
  • CVE-2016-1238
  • CVE-2016-2381
  • CVE-2016-6185

libssh2_org:

  • CVE-2016-0787

expat:

  • CVE-2012-6702
  • CVE-2015-1283
  • CVE-2016-0718
  • CVE-2016-5300
  • CVE-2016-9063
  • CVE-2017-9233

ncurses:

  • CVE-2017-10684
  • CVE-2017-10685
  • CVE-2017-11112
  • CVE-2017-11113

libksba:

  • CVE-2016-4574
  • CVE-2016-4579

libgcrypt:

  • CVE-2015-7511
  • CVE-2016-6313
  • CVE-2017-7526

dbus-1:

  • CVE-2014-7824
  • CVE-2015-0245

Finally, the following packages received non-security fixes:

  • augeas
  • bzip2
  • ca-certificates-mozilla
  • coreutils
  • cryptsetup
  • cyrus-sasl
  • dirmngr
  • e2fsprogs
  • findutils
  • gpg2
  • insserv-compat
  • kmod
  • libcap
  • libsolv
  • libzypp
  • openldap2
  • p11-kit
  • permissions
  • procps
  • rpm
  • sed
  • shadow
  • zypper

Список пакетов

SUSE Linux Enterprise Module for Containers 12
sles12-docker-image-1.1.4-20171002

Ссылки

Описание

Expat, when used in a parser that has not called XML_SetHashSalt or passed it a seed of 0, makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via vectors involving use of the srand function.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The xmlParserHandlePEReference function in parser.c in libxml2 before 2.9.2, as used in Web Listener in Oracle HTTP Server in Oracle Fusion Middleware 11.1.1.7.0, 12.1.2.0, and 12.1.3.0 and other products, loads external parameter entities regardless of whether entity substitution or validation is enabled, which allows remote attackers to cause a denial of service (resource consumption) via a crafted XML document.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code or cause a denial of service (uninitialized memory access, and untrusted-pointer read and write operations) via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271 and CVE-2014-7169.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

GNU Bash through 4.3 bash43-026 does not properly parse function definitions in the values of environment variables, which allows remote attackers to execute arbitrary commands via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271, CVE-2014-7169, and CVE-2014-6277.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

Off-by-one error in the read_token_word function in parse.y in GNU Bash through 4.3 bash43-026 allows remote attackers to cause a denial of service (out-of-bounds array access and application crash) or possibly have unspecified other impact via deeply nested for loops, aka the "word_lineno" issue.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

D-Bus 1.3.0 through 1.6.x before 1.6.26, 1.8.x before 1.8.10, and 1.9.x before 1.9.2 allows local users to cause a denial of service (prevention of new connections and connection drop) by queuing the maximum number of file descriptors. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-3636.1.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

Heap-based buffer overflow in PCRE 8.36 and earlier allows remote attackers to cause a denial of service (crash) or have other unspecified impact via a crafted regular expression, related to an assertion that allows zero repeats.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

tmpfiles.d/systemd.conf in systemd before 214 uses weak permissions for journal files under (1) /run/log/journal/%m and (2) /var/log/journal/%m, which allows local users to obtain sensitive information by reading these files.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

D-Bus 1.4.x through 1.6.x before 1.6.30, 1.8.x before 1.8.16, and 1.9.x before 1.9.10 does not validate the source of ActivationFailure signals, which allows local users to cause a denial of service (activation failure error returned) by leveraging a race condition involving sending an ActivationFailure signal before systemd responds.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

Multiple integer overflows in the XML_GetBuffer function in Expat through 2.1.0, as used in Google Chrome before 44.0.2403.89 and other products, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted XML data, a related issue to CVE-2015-2716.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The stringprep_utf8_to_ucs4 function in libin before 1.31, as used in jabberd2, allows context-dependent attackers to read system memory and possibly have other unspecified impact via invalid UTF-8 characters in a string, which triggers an out-of-bounds read.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The compile_branch function in PCRE before 8.37 allows context-dependent attackers to compile incorrect code, cause a denial of service (out-of-bounds heap read and crash), or possibly have other unspecified impact via a regular expression with a group containing a forward reference repeated a large number of times within a repeated outer group that has a zero minimum quantifier.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

PCRE before 8.36 mishandles the /(((a\2)|(a*)\g<-1>))*/ pattern and related patterns with certain internal recursive back references, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

PCRE before 8.36 mishandles the /((?(R)a|(?1)))+/ pattern and related patterns with certain recursion, which allows remote attackers to cause a denial of service (segmentation fault) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

Heap-based buffer overflow in PCRE 8.34 through 8.37 and PCRE2 10.10 allows remote attackers to execute arbitrary code via a crafted regular expression, as demonstrated by /^(?P=B)((?P=B)(?J:(?P<B>c)(?P<B>a(?P=B)))>WGXCREDITS)/, a different vulnerability than CVE-2015-8384.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

PCRE 7.8 and 8.32 through 8.37, and PCRE2 10.10 mishandle group empty matches, which might allow remote attackers to cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by /^(?:(?(1)\\.|([^\\\\W_])?)+)+$/.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The _unix_run_helper_binary function in the pam_unix module in Linux-PAM (aka pam) before 1.2.1, when unable to directly access passwords, allows local users to enumerate usernames or cause a denial of service (hang) via a large password.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.5 allows remote attackers to cause a denial of service (out-of-bounds heap read) via a crafted certificate.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

Heap-based buffer overflow in the find_fixedlength function in pcre_compile.c in PCRE before 8.38 allows remote attackers to cause a denial of service (crash) or obtain sensitive information from heap memory and possibly bypass the ASLR protection mechanism via a crafted regular expression with an excess closing parenthesis.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

Buffer overflow in text-utils/colcrt.c in colcrt in util-linux before 2.27 allows local users to cause a denial of service (crash) via a crafted file, related to the page global variable.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The std::random_device class in libstdc++ in the GNU Compiler Collection (aka GCC) before 4.9.4 does not properly handle short reads from blocking sources, which makes it easier for context-dependent attackers to predict the random values via unspecified vectors.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

Libgcrypt before 1.6.5 does not properly perform elliptic-point curve multiplication during decryption, which makes it easier for physically proximate attackers to extract ECDH keys by measuring electromagnetic emanations.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The pcre_exec function in pcre_exec.c in PCRE before 8.38 mishandles a // pattern with a \01 string, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The compile_regex function in pcre_compile.c in PCRE before 8.38 and pcre2_compile.c in PCRE2 before 10.2x mishandles the /(?J:(?|(:(?|(?'R')(\k'R')|((?'R')))H'Rk'Rf)|s(?'R'))))/ and /(?J:(?|(:(?|(?'R')(\z(?|(?'R')(\k'R')|((?'R')))k'R')|((?'R')))H'Ak'Rf)|s(?'R')))/ patterns, and related patterns with certain group references, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The match function in pcre_exec.c in PCRE before 8.37 mishandles the /(?:((abcd))|(((?:(?:(?:(?:abc|(?:abcdef))))b)abcdefghi)abc)|((*ACCEPT)))/ pattern and related patterns involving (*ACCEPT), which allows remote attackers to obtain sensitive information from process memory or cause a denial of service (partially initialized memory and application crash) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-2547.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

PCRE before 8.38 mishandles certain repeated conditional groups, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

PCRE before 8.38 mishandles the /(?J)(?'d'(?'d'\g{d}))/ pattern and related patterns with certain recursive back references, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8392 and CVE-2015-8395.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

PCRE before 8.38 mishandles the /(?|(\k'Pm')|(?'Pm'))/ pattern and related patterns with certain forward references, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

PCRE before 8.38 mishandles the interaction of lookbehind assertions and mutually recursive subpatterns, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

PCRE before 8.38 mishandles (?123) subroutine calls and related subroutine calls, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

PCRE before 8.38 mishandles the /(?=di(?<=(?1))|(?=(.))))/ pattern and related patterns with an unmatched closing parenthesis, which allows remote attackers to cause a denial of service (buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

PCRE before 8.38 mishandles the /(?:|a|){100}x/ pattern and related patterns, which allows remote attackers to cause a denial of service (infinite recursion) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

PCRE before 8.38 mishandles the [: and \\ substrings in character classes, which allows remote attackers to cause a denial of service (uninitialized memory read) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The pcre_compile function in pcre_compile.c in PCRE before 8.38 mishandles certain [: nesting, which allows remote attackers to cause a denial of service (CPU consumption) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

PCRE before 8.38 mishandles certain instances of the (?| substring, which allows remote attackers to cause a denial of service (unintended recursion and buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8384 and CVE-2015-8395.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

pcregrep in PCRE before 8.38 mishandles the -q option for binary files, which might allow remote attackers to obtain sensitive information via a crafted file, as demonstrated by a CGI script that sends stdout data to a client.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

PCRE before 8.38 mishandles the (?(<digits>) and (?(R<digits>) conditions, which allows remote attackers to cause a denial of service (integer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

PCRE before 8.38 mishandles certain references, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, a related issue to CVE-2015-8384 and CVE-2015-8392.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

dict.c in libxml2 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via an unexpected character immediately after the "<!DOCTYPE html" substring in a crafted HTML document.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

tmpfiles.d/systemd.conf in systemd before 229 uses weak permissions for /var/log/journal/%m/system.journal, which allows local users to obtain sensitive information by reading the file.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The (1) S_reghop3, (2) S_reghop4, and (3) S_reghopmaybe3 functions in regexec.c in Perl before 5.24.0 allow context-dependent attackers to cause a denial of service (infinite loop) via crafted utf-8 data, as demonstrated by "a\x80."


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

idn in GNU libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The expansion of '\h' in the prompt string in bash 4.3 allows remote authenticated users to execute arbitrary code via shell metacharacters placed in 'hostname' of a machine.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The diffie_hellman_sha256 function in kex.c in libssh2 before 1.7.0 improperly truncates secrets to 128 or 256 bits, which makes it easier for man-in-the-middle attackers to decrypt or intercept SSH sessions via unspecified vectors, aka a "bits/bytes confusion bug."


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

Stack-based buffer overflow in the glob implementation in GNU C Library (aka glibc) before 2.24, when GLOB_ALTDIRFUNC is used, allows context-dependent attackers to cause a denial of service (crash) via a long name.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

(1) cpan/Archive-Tar/bin/ptar, (2) cpan/Archive-Tar/bin/ptardiff, (3) cpan/Archive-Tar/bin/ptargrep, (4) cpan/CPAN/scripts/cpan, (5) cpan/Digest-SHA/shasum, (6) cpan/Encode/bin/enc2xs, (7) cpan/Encode/bin/encguess, (8) cpan/Encode/bin/piconv, (9) cpan/Encode/bin/ucmlint, (10) cpan/Encode/bin/unidump, (11) cpan/ExtUtils-MakeMaker/bin/instmodsh, (12) cpan/IO-Compress/bin/zipdetails, (13) cpan/JSON-PP/bin/json_pp, (14) cpan/Test-Harness/bin/prove, (15) dist/ExtUtils-ParseXS/lib/ExtUtils/xsubpp, (16) dist/Module-CoreList/corelist, (17) ext/Pod-Html/bin/pod2html, (18) utils/c2ph.PL, (19) utils/h2ph.PL, (20) utils/h2xs.PL, (21) utils/libnetcfg.PL, (22) utils/perlbug.PL, (23) utils/perldoc.PL, (24) utils/perlivp.PL, and (25) utils/splain.PL in Perl 5.x before 5.22.3-RC2 and 5.24 before 5.24.1-RC2 do not properly remove . (period) characters from the end of the includes directory array, which might allow local users to gain privileges via a Trojan horse module under the current working directory.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The pcre_compile2 function in pcre_compile.c in PCRE 8.38 mishandles the /((?:F?+(?:^(?(R)a+\"){99}-))(?J)(?'R'(?'R'<((?'RR'(?'R'\){97)?J)?J)(?'R'(?'R'\){99|(:(?|(?'R')(\k'R')|((?'R')))H'R'R)(H'R))))))/ pattern and related patterns with named subgroups, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The xmlNextChar function in libxml2 before 2.9.4 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The htmlCurrentChar function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

Heap-based buffer overflow in the xmlStrncat function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

Use-after-free vulnerability in the xmlSAX2AttributeNs function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2 and OS X before 10.11.5, allows remote attackers to cause a denial of service via a crafted XML document.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

Multiple use-after-free vulnerabilities in the (1) htmlPArsePubidLiteral and (2) htmlParseSystemiteral functions in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allow remote attackers to cause a denial of service via a crafted XML document.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The xmlPArserPrintFileContextInternal function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The xmlDictAddString function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted XML document.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

Heap-based buffer overflow in the xmlFAParsePosCharGroup function in libxml2 before 2.9.4, as used in Apple iOS before 9.3.2, OS X before 10.11.5, tvOS before 9.2.1, and watchOS before 2.2.1, allows remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted XML document.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The cpio_safer_name_suffix function in util.c in cpio 2.11 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted cpio file.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The htmlParseNameComplex function in HTMLparser.c in libxml2 allows attackers to cause a denial of service (out-of-bounds read) via a crafted XML document.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

Integer overflow in the EVP_EncodeUpdate function in crypto/evp/encode.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of binary data.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

Integer overflow in the EVP_EncryptUpdate function in crypto/evp/evp_enc.c in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (heap memory corruption) via a large amount of data.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The AES-NI implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h does not consider memory allocation during a certain padding check, which allows remote attackers to obtain sensitive cleartext information via a padding-oracle attack against an AES CBC session. NOTE: this vulnerability exists because of an incorrect fix for CVE-2013-0169.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The ASN.1 implementation in OpenSSL before 1.0.1o and 1.0.2 before 1.0.2c allows remote attackers to execute arbitrary code or cause a denial of service (buffer underflow and memory corruption) via an ANY field in crafted serialized data, aka the "negative zero" issue.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The asn1_d2i_read_bio function in crypto/asn1/a_d2i_fp.c in the ASN.1 BIO implementation in OpenSSL before 1.0.1t and 1.0.2 before 1.0.2h allows remote attackers to cause a denial of service (memory consumption) via a short invalid encoding.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

OpenSSL through 1.0.2h incorrectly uses pointer arithmetic for heap-buffer boundary checks, which might allow remote attackers to cause a denial of service (integer overflow and application crash) or possibly have unspecified other impact by leveraging unexpected malloc behavior, related to s3_srvr.c, ssl_sess.c, and t1_lib.c.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The dsa_sign_setup function in crypto/dsa/dsa_ossl.c in OpenSSL through 1.0.2h does not properly ensure the use of constant-time operations, which makes it easier for local users to discover a DSA private key via a timing side-channel attack.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The DTLS implementation in OpenSSL before 1.1.0 does not properly restrict the lifetime of queue entries associated with unused out-of-order messages, which allows remote attackers to cause a denial of service (memory consumption) by maintaining many crafted DTLS sessions simultaneously, related to d1_lib.c, statem_dtls.c, statem_lib.c, and statem_srvr.c.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The TS_OBJ_print_bio function in crypto/ts/ts_lib.c in the X.509 Public Key Infrastructure Time-Stamp Protocol (TSP) implementation in OpenSSL through 1.0.2h allows remote attackers to cause a denial of service (out-of-bounds read and application crash) via a crafted time-stamp file that is mishandled by the "openssl ts" command.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The Anti-Replay feature in the DTLS implementation in OpenSSL before 1.1.0 mishandles early use of a new epoch number in conjunction with a large sequence number, which allows remote attackers to cause a denial of service (false-positive packet drops) via spoofed DTLS records, related to rec_layer_d1.c and ssl3_record.c.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The BN_bn2dec function in crypto/bn/bn_print.c in OpenSSL before 1.1.0 does not properly validate division results, which allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The DES and Triple DES ciphers, as used in the TLS, SSH, and IPSec protocols and other protocols and products, have a birthday bound of approximately four billion blocks, which makes it easier for remote attackers to obtain cleartext data via a birthday attack against a long-duration encrypted session, as demonstrated by an HTTPS session using Triple DES in CBC mode, aka a "Sweet32" attack.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

Perl might allow context-dependent attackers to bypass the taint protection mechanism in a child process via duplicate environment variables in envp.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

Stack-based buffer overflow in the nss_dns implementation of the getnetbyname function in GNU C Library (aka glibc) before 2.24 allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a long name.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The compile_branch function in pcre_compile.c in PCRE 8.x before 8.39 and pcre2_compile.c in PCRE2 before 10.22 mishandles patterns containing an (*ACCEPT) substring in conjunction with nested parentheses, which allows remote attackers to execute arbitrary code or cause a denial of service (stack-based buffer overflow) via a crafted regular expression, as demonstrated by a JavaScript RegExp object encountered by Konqueror, aka ZDI-CAN-3542.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The xmlStringGetNodeList function in tree.c in libxml2 2.9.3 and earlier, when used in recovery mode, allows context-dependent attackers to cause a denial of service (infinite recursion, stack consumption, and application crash) via a crafted XML document.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The (1) xmlParserEntityCheck and (2) xmlParseAttValueComplex functions in parser.c in libxml2 2.9.3 do not properly keep track of the recursion depth, which allows context-dependent attackers to cause a denial of service (stack consumption and application crash) via a crafted XML document containing a large number of nested entity references.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

Stack-based buffer overflow in the getaddrinfo function in sysdeps/posix/getaddrinfo.c in the GNU C Library (aka glibc or libc6) allows remote attackers to cause a denial of service (crash) via vectors involving hostent conversion. NOTE: this vulnerability exists because of an incomplete fix for CVE-2013-4458.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The _asn1_extract_der_octet function in lib/decoding.c in GNU Libtasn1 before 4.8, when used without the ASN1_DECODE_FLAG_STRICT_DER flag, allows remote attackers to cause a denial of service (infinite recursion) via a crafted certificate.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

Stack-based buffer overflow in the clntudp_call function in sunrpc/clnt_udp.c in the GNU C Library (aka glibc or libc6) allows remote servers to cause a denial of service (crash) or possibly unspecified other impact via a flood of crafted ICMP and UDP packets.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The xmlParseElementDecl function in parser.c in libxml2 before 2.9.4 allows context-dependent attackers to cause a denial of service (heap-based buffer underread and application crash) via a crafted file, involving xmlParseName.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

Format string vulnerability in libxml2 before 2.9.4 allows attackers to have unspecified impact via format string specifiers in unknown vectors.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

XML external entity (XXE) vulnerability in the xmlStringLenDecodeEntities function in parser.c in libxml2 before 2.9.4, when not in validating mode, allows context-dependent attackers to read arbitrary files or cause a denial of service (resource consumption) via unspecified vectors.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The xmlBufAttrSerializeTxtContent function in xmlsave.c in libxml2 allows context-dependent attackers to cause a denial of service (out-of-bounds read and application crash) via a non-UTF-8 attribute value, related to serialization. NOTE: this vulnerability may be a duplicate of CVE-2016-3627.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

Off-by-one error in the append_utf8_value function in the DN decoder (dn.c) in Libksba before 1.3.4 allows remote attackers to cause a denial of service (out-of-bounds read) via invalid utf-8 encoded data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2016-4356.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

Libksba before 1.3.4 allows remote attackers to cause a denial of service (out-of-bounds read and crash) via unspecified vectors, related to the "returned length of the object from _ksba_ber_parse_tl."


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

xpointer.c in libxml2 before 2.9.5 (as used in Apple iOS before 10, OS X before 10.12, tvOS before 10, and watchOS before 3, and other products) does not forbid namespace nodes in XPointer ranges, which allows remote attackers to execute arbitrary code or cause a denial of service (use-after-free and memory corruption) via a crafted XML document.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The parse_dos_extended function in partitions/dos.c in the libblkid library in util-linux allows physically proximate attackers to cause a denial of service (memory consumption) via a crafted MSDOS partition table with an extended partition boot record at zero offset.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The XML parser in Expat does not use sufficient entropy for hash initialization, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted identifiers in an XML document. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0876.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

curl and libcurl before 7.50.1 do not prevent TLS session resumption when the client certificate has changed, which allows remote attackers to bypass intended restrictions by resuming a session.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

curl and libcurl before 7.50.1 do not check the client certificate when choosing the TLS connection to reuse, which might allow remote attackers to hijack the authentication of the connection by leveraging a previously created connection with a different client certificate.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

Use-after-free vulnerability in libcurl before 7.50.1 allows attackers to control which connection is used or possibly have unspecified other impact via unknown vectors.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The XSLoader::load method in XSLoader in Perl does not properly locate .so files when called in a string eval, which might allow local users to execute arbitrary code via a Trojan horse library under the current working directory.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The idna_to_ascii_4i function in lib/idna.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via 64 bytes of input.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

idn in libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read, a different vulnerability than CVE-2015-8948.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The stringprep_utf8_nfkc_normalize function in lib/nfkc.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via crafted UTF-8 data.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The tls_decrypt_ticket function in ssl/t1_lib.c in OpenSSL before 1.1.0 does not consider the HMAC size during validation of the ticket length, which allows remote attackers to cause a denial of service via a ticket that is too short.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

Integer overflow in the MDC2_Update function in crypto/mdc2/mdc2dgst.c in OpenSSL before 1.1.0 allows remote attackers to cause a denial of service (out-of-bounds write and application crash) or possibly have unspecified other impact via unknown vectors.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

Multiple memory leaks in t1_lib.c in OpenSSL before 1.0.1u, 1.0.2 before 1.0.2i, and 1.1.0 before 1.1.0a allow remote attackers to cause a denial of service (memory consumption) via large OCSP Status Request extensions.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The certificate parser in OpenSSL before 1.0.1u and 1.0.2 before 1.0.2i might allow remote attackers to cause a denial of service (out-of-bounds read) via crafted certificate operations, related to s3_clnt.c and s3_srvr.c.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The mixing functions in the random number generator in Libgcrypt before 1.5.6, 1.6.x before 1.6.6, and 1.7.x before 1.7.3 and GnuPG before 1.4.21 make it easier for attackers to obtain the values of 160 bits by leveraging knowledge of the previous 4640 bits.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

Stack-based buffer overflow in the FascistGecosUser function in lib/fascist.c in cracklib allows local users to cause a denial of service (application crash) or gain privileges via a long GECOS field, involving longbuffer.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

curl and libcurl before 7.50.2, when built with NSS and the libnsspem.so library is available at runtime, allow remote attackers to hijack the authentication of a TLS connection by leveraging reuse of a previously loaded client certificate from file for a connection for which no certificate has been set, a different vulnerability than CVE-2016-5420.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

Multiple integer overflows in the (1) curl_escape, (2) curl_easy_escape, (3) curl_unescape, and (4) curl_easy_unescape functions in libcurl before 7.50.3 allow attackers to have unspecified impact via a string of length 0xffffffff, which triggers a heap-based buffer overflow.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

Bash before 4.4 allows local users to execute arbitrary commands with root privileges via crafted SHELLOPTS and PS4 environment variables.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The manager_dispatch_notify_fd function in systemd allows local users to cause a denial of service (system hang) via a zero-length message received over a notify socket, which causes an error to be returned and the notification handler to be disabled.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

A flaw was found in curl before version 7.51. If cookie state is written into a cookie jar file that is later read back and used for subsequent requests, a malicious HTTP server can inject new cookies for arbitrary domains into said cookie jar.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

A flaw was found in curl before version 7.51.0 When re-using a connection, curl was doing case insensitive comparisons of user name and password with the existing connections. This means that if an unused connection with proper credentials exists for a protocol that has connection-scoped credentials, an attacker can cause that connection to be reused if s/he knows the case-insensitive version of the correct password.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The base64 encode function in curl before version 7.51.0 is prone to a buffer being under allocated in 32bit systems if it receives at least 1Gb as input via `CURLOPT_USERNAME`.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The libcurl API function called `curl_maprintf()` before version 7.51.0 can be tricked into doing a double-free due to an unsafe `size_t` multiplication, on systems using 32 bit `size_t` variables.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The function `read_data()` in security.c in curl before version 7.51.0 is vulnerable to memory double free.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The 'globbing' feature in curl before version 7.51.0 has a flaw that leads to integer overflow and out-of-bounds read via user controlled input.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The `curl_getdate` function in curl before version 7.51.0 is vulnerable to an out of bounds read if it receives an input with one digit short.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The URL percent-encoding decode function in libcurl before 7.51.0 is called `curl_easy_unescape`. Internally, even if this function would be made to allocate a unscape destination buffer larger than 2GB, it would return that new length in a signed 32 bit integer variable, thus the length would get either just truncated or both truncated and turned negative. That could then lead to libcurl writing outside of its heap based buffer.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

A flaw was found in curl before version 7.51.0. The way curl handles cookies permits other threads to trigger a use-after-free leading to information disclosure.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

curl before version 7.51.0 doesn't parse the authority component of the URL correctly when the host name part ends with a '#' character, and could instead be tricked into connecting to a different host. This may have security implications if you for example use an URL parser that follows the RFC to check for allowed domains before using curl to request them.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

An integer overflow during the parsing of XML using the Expat library. This vulnerability affects Firefox < 50.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

libxml2 2.9.4 and earlier, as used in XMLSec 1.2.23 and earlier and other products, does not offer a flag directly indicating that the current document may be read but other files may not be opened, which makes it easier for remote attackers to conduct XML External Entity (XXE) attacks via a crafted document.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

curl before version 7.52.0 is vulnerable to a buffer overflow when doing a large floating point output in libcurl's implementation of the printf() functions. If there are any application that accepts a format string from the outside without necessary input filtering, it could allow remote attacks.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

It was found that Red Hat JBoss Core Services erratum RHSA-2016:2957 for CVE-2016-3705 did not actually include the fix for the issue found in libxml2, making it vulnerable to a Denial of Service attack due to a Stack Overflow. This is a regression CVE for the same issue as CVE-2016-3705.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

inftrees.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

inffast.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact by leveraging improper pointer arithmetic.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The inflateMark function in inflate.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving left shifts of negative integers.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The crc32_big function in crc32.c in zlib 1.2.8 might allow context-dependent attackers to have unspecified impact via vectors involving big-endian CRC calculation.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

When doing a TFTP transfer and curl/libcurl is given a URL that contains a very long file name (longer than about 515 bytes), the file name is truncated to fit within the buffer boundaries, but the buffer size is still wrongly updated to use the untruncated length. This too large value is then used in the sendto() call, making curl attempt to send more data than what is actually put into the buffer. The endto() function will then read beyond the end of the heap based buffer. A malicious HTTP(S) server could redirect a vulnerable libcurl-using client to a crafted TFTP URL (if the client hasn't restricted which protocols it allows redirects to) and trick it to send private memory contents to a remote server over UDP. Limit curl's redirect protocols with --proto-redir and libcurl's with CURLOPT_REDIR_PROTOCOLS.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

curl supports "globbing" of URLs, in which a user can pass a numerical range to have the tool iterate over those numbers to do a sequence of transfers. In the globbing function that parses the numerical range, there was an omission that made curl read a byte beyond the end of the URL if given a carefully crafted, or just wrongly written, URL. The URL is stored in a heap based buffer, so it could then be made to wrongly read something else instead of crashing. An example of a URL that triggers the flaw would be `http://ur%20[0-60000000000000000000`.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

glibc contains a vulnerability that allows specially crafted LD_LIBRARY_PATH values to manipulate the heap/stack, causing them to alias, potentially resulting in arbitrary code execution. Please note that additional hardening changes have been made to glibc to prevent manipulation of stack and heap memory but these issues are not directly exploitable, as such they have not been given a CVE. This affects glibc 2.25 and earlier.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

In ncurses 6.0, there is a stack-based buffer overflow in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

In ncurses 6.0, there is a format string vulnerability in the fmt_entry function. A crafted input will lead to a remote arbitrary code execution attack.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

In ncurses 6.0, there is an attempted 0xffffffffffffffff access in the append_acs function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

In ncurses 6.0, there is a NULL Pointer Dereference in the _nc_parse_entry function of tinfo/parse_entry.c. It could lead to a remote denial of service attack if the terminfo library code is used to process untrusted terminfo data.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

A race condition was found in util-linux before 2.32.1 in the way su handled the management of child processes. A local authenticated attacker could use this flaw to kill other processes with root privileges under specific conditions.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

An issue was discovered in AppArmor before 2.12. Incorrect handling of unknown AppArmor profiles in AppArmor init scripts, upstart jobs, and/or systemd unit files allows an attacker to possibly have increased attack surfaces of processes that were intended to be confined by AppArmor. This is due to the common logic to handle 'restart' operations removing AppArmor profiles that aren't found in the typical filesystem locations, such as /etc/apparmor.d/. Userspace projects that manage their own AppArmor profiles in atypical directories, such as what's done by LXD and Docker, are affected by this flaw in the AppArmor init script logic.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

The ourWriteOut function in tool_writeout.c in curl 7.53.1 might allow physically proximate attackers to obtain sensitive information from process memory in opportunistic circumstances by reading a workstation screen during use of a --write-out argument ending in a '%' character, which leads to a heap-based buffer over-read.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

libgcrypt before version 1.7.8 is vulnerable to a cache side-channel attack resulting into a complete break of RSA-1024 while using the left-to-right method for computing the sliding-window expansion. The same attack is believed to work on RSA-2048 with moderately more computation. This side-channel requires that attacker can run arbitrary software on the hardware where the private RSA key is used.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

A buffer overflow was discovered in libxml2 20904-GITv2.9.4-16-g0741801. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. The variable len is assigned strlen(buf). If the content->type is XML_ELEMENT_CONTENT_ELEMENT, then (i) the content->prefix is appended to buf (if it actually fits) whereupon (ii) content->name is written to the buffer. However, the check for whether the content->name actually fits also uses 'len' rather than the updated buffer length strlen(buf). This allows us to write about "size" many bytes beyond the allocated memory. This vulnerability causes programs that use libxml2, such as PHP, to crash.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a stack-based buffer overflow. The function xmlSnprintfElementContent in valid.c is supposed to recursively dump the element content definition into a char buffer 'buf' of size 'size'. At the end of the routine, the function may strcat two more characters without checking whether the current strlen(buf) + 2 < size. This vulnerability causes programs that use libxml2, such as PHP, to crash.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictComputeFastKey function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for libxml2 Bug 759398.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

libxml2 20904-GITv2.9.4-16-g0741801 is vulnerable to a heap-based buffer over-read in the xmlDictAddString function in dict.c. This vulnerability causes programs that use libxml2, such as PHP, to crash. This vulnerability exists because of an incomplete fix for CVE-2016-1839.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки

Описание

XML External Entity vulnerability in libexpat 2.2.0 and earlier (Expat XML Parser Library) allows attackers to put the parser in an infinite loop using a malformed external entity definition from an external DTD.


Затронутые продукты
SUSE Linux Enterprise Module for Containers 12:sles12-docker-image-1.1.4-20171002

Ссылки
Уязвимость SUSE-SU-2017:2699-1