ALT-BU-2017-2983-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2025-04-20
CVE-2017-6014
In Wireshark 2.2.4 and earlier, a crafted or malformed STANAG 4607 capture file will cause an infinite loop and memory exhaustion. If the packet size field in a packet header is null, the offset to read from will not advance, causing continuous attempts to read the same zero length packet. This will quickly exhaust all system memory.
- http://www.debian.org/security/2017/dsa-3811
- http://www.securityfocus.com/bid/96284
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13416
- https://security.gentoo.org/glsa/201706-12
- http://www.debian.org/security/2017/dsa-3811
- http://www.securityfocus.com/bid/96284
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13416
- https://security.gentoo.org/glsa/201706-12
Modified: 2025-04-20
CVE-2017-6467
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is a Netscaler file parser infinite loop, triggered by a malformed capture file. This was addressed in wiretap/netscaler.c by changing the restrictions on file size.
- http://www.debian.org/security/2017/dsa-3811
- http://www.securityfocus.com/bid/96561
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12083
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=284ad58d288722a8725401967bff0c4455488f0c
- https://www.wireshark.org/security/wnpa-sec-2017-11.html
- http://www.debian.org/security/2017/dsa-3811
- http://www.securityfocus.com/bid/96561
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12083
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=284ad58d288722a8725401967bff0c4455488f0c
- https://www.wireshark.org/security/wnpa-sec-2017-11.html
Modified: 2025-04-20
CVE-2017-6468
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is a NetScaler file parser crash, triggered by a malformed capture file. This was addressed in wiretap/netscaler.c by validating the relationship between pages and records.
- http://www.debian.org/security/2017/dsa-3811
- http://www.securityfocus.com/bid/96569
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13430
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9f3bc84b7e7e435c50b8b68f0fc526d0f5676cbf
- https://www.wireshark.org/security/wnpa-sec-2017-08.html
- http://www.debian.org/security/2017/dsa-3811
- http://www.securityfocus.com/bid/96569
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13430
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9f3bc84b7e7e435c50b8b68f0fc526d0f5676cbf
- https://www.wireshark.org/security/wnpa-sec-2017-08.html
Modified: 2025-04-20
CVE-2017-6469
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is an LDSS dissector crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-ldss.c by ensuring that memory is allocated for a certain data structure.
- http://www.debian.org/security/2017/dsa-3811
- http://www.securityfocus.com/bid/96577
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13346
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4f753c127082d5e28abf482d6d175cbfee6661f7
- https://www.wireshark.org/security/wnpa-sec-2017-03.html
- http://www.debian.org/security/2017/dsa-3811
- http://www.securityfocus.com/bid/96577
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13346
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4f753c127082d5e28abf482d6d175cbfee6661f7
- https://www.wireshark.org/security/wnpa-sec-2017-03.html
Modified: 2025-04-20
CVE-2017-6470
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is an IAX2 infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-iax2.c by constraining packet lateness.
- http://www.debian.org/security/2017/dsa-3811
- http://www.securityfocus.com/bid/96563
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13432
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=0b89174ef4c531a1917437fff586fe525ee7bf2d
- https://www.wireshark.org/security/wnpa-sec-2017-10.html
- http://www.debian.org/security/2017/dsa-3811
- http://www.securityfocus.com/bid/96563
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13432
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=0b89174ef4c531a1917437fff586fe525ee7bf2d
- https://www.wireshark.org/security/wnpa-sec-2017-10.html
Modified: 2025-04-20
CVE-2017-6471
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is a WSP infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wsp.c by validating the capability length.
- http://www.debian.org/security/2017/dsa-3811
- http://www.securityfocus.com/bid/96564
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13348
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=62afef41277dfac37f515207ca73d33306e3302b
- https://www.wireshark.org/security/wnpa-sec-2017-05.html
- http://www.debian.org/security/2017/dsa-3811
- http://www.securityfocus.com/bid/96564
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13348
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=62afef41277dfac37f515207ca73d33306e3302b
- https://www.wireshark.org/security/wnpa-sec-2017-05.html
Modified: 2025-04-20
CVE-2017-6472
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is an RTMPT dissector infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-rtmpt.c by properly incrementing a certain sequence value.
- http://www.debian.org/security/2017/dsa-3811
- http://www.securityfocus.com/bid/96571
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13347
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2b3a0909beff8963b390034c594e0b6be6a4e531
- https://www.wireshark.org/security/wnpa-sec-2017-04.html
- http://www.debian.org/security/2017/dsa-3811
- http://www.securityfocus.com/bid/96571
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13347
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2b3a0909beff8963b390034c594e0b6be6a4e531
- https://www.wireshark.org/security/wnpa-sec-2017-04.html
Modified: 2025-04-20
CVE-2017-6473
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is a K12 file parser crash, triggered by a malformed capture file. This was addressed in wiretap/k12.c by validating the relationships between lengths and offsets.
- http://www.debian.org/security/2017/dsa-3811
- http://www.securityfocus.com/bid/96565
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13431
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=7edc761a01cda8e1b37677f673985582330317d2
- https://www.wireshark.org/security/wnpa-sec-2017-09.html
- http://www.debian.org/security/2017/dsa-3811
- http://www.securityfocus.com/bid/96565
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13431
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=7edc761a01cda8e1b37677f673985582330317d2
- https://www.wireshark.org/security/wnpa-sec-2017-09.html
Modified: 2025-04-20
CVE-2017-6474
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is a NetScaler file parser infinite loop, triggered by a malformed capture file. This was addressed in wiretap/netscaler.c by validating record sizes.
- http://www.debian.org/security/2017/dsa-3811
- http://www.securityfocus.com/bid/96566
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13429
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a998c9195f183d85f5b0bbeebba21a2d4d303d47
- https://www.wireshark.org/security/wnpa-sec-2017-07.html
- http://www.debian.org/security/2017/dsa-3811
- http://www.securityfocus.com/bid/96566
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13429
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a998c9195f183d85f5b0bbeebba21a2d4d303d47
- https://www.wireshark.org/security/wnpa-sec-2017-07.html
Package ghostscript updated to version 9.20-alt2 for branch sisyphus in task 179341.
Closed bugs
Слинкован с libpng12 и libpng15 одновременно
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-2635
A NULL pointer deference flaw was found in the way libvirt from 2.5.0 to 3.0.0 handled empty drives. A remote authenticated attacker could use this flaw to crash libvirtd daemon resulting in denial of service.
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2635
- https://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=c3de387380f6057ee0e46cd9f2f0a092e8070875
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2635
- https://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=c3de387380f6057ee0e46cd9f2f0a092e8070875
Closed bugs
недостаточно Provides
Closed bugs
недостаточно Provides
Closed vulnerabilities
Modified: 2025-04-09
CVE-2007-3048
GNU screen 4.0.3 allows local users to unlock the screen via a CTRL-C sequence at the password prompt. NOTE: multiple third parties report inability to reproduce this issue
- http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063706.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063710.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063721.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063728.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34693
- http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063706.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063710.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063721.html
- http://lists.grok.org.uk/pipermail/full-disclosure/2007-June/063728.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/34693
Modified: 2025-04-09
CVE-2009-1214
GNU screen 4.0.3 creates the /tmp/screen-exchange temporary file with world-readable permissions, which might allow local users to obtain sensitive session information.
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=521123
- http://savannah.gnu.org/bugs/?25296
- http://www.openwall.com/lists/oss-security/2009/03/25/7
- http://www.securityfocus.com/bid/34521
- https://bugs.launchpad.net/ubuntu/+source/screen/+bug/315993
- https://bugzilla.redhat.com/show_bug.cgi?id=492104
- https://exchange.xforce.ibmcloud.com/vulnerabilities/49886
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=521123
- http://savannah.gnu.org/bugs/?25296
- http://www.openwall.com/lists/oss-security/2009/03/25/7
- http://www.securityfocus.com/bid/34521
- https://bugs.launchpad.net/ubuntu/+source/screen/+bug/315993
- https://bugzilla.redhat.com/show_bug.cgi?id=492104
- https://exchange.xforce.ibmcloud.com/vulnerabilities/49886
Modified: 2025-04-09
CVE-2009-1215
Race condition in GNU screen 4.0.3 allows local users to create or overwrite arbitrary files via a symlink attack on the /tmp/screen-exchange temporary file.
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=521123
- http://savannah.gnu.org/bugs/?25296
- http://www.openwall.com/lists/oss-security/2009/03/25/7
- http://www.securityfocus.com/bid/34521
- https://bugs.launchpad.net/ubuntu/+source/screen/+bug/315993
- https://bugzilla.redhat.com/show_bug.cgi?id=492104
- https://exchange.xforce.ibmcloud.com/vulnerabilities/49887
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=521123
- http://savannah.gnu.org/bugs/?25296
- http://www.openwall.com/lists/oss-security/2009/03/25/7
- http://www.securityfocus.com/bid/34521
- https://bugs.launchpad.net/ubuntu/+source/screen/+bug/315993
- https://bugzilla.redhat.com/show_bug.cgi?id=492104
- https://exchange.xforce.ibmcloud.com/vulnerabilities/49887
Modified: 2025-04-12
CVE-2015-6806
The MScrollV function in ansi.c in GNU screen 4.3.1 and earlier does not properly limit recursion, which allows remote attackers to cause a denial of service (stack consumption) via an escape sequence with a large repeat count value.
- http://git.savannah.gnu.org/cgit/screen.git/commit/?id=b7484c224738247b510ed0d268cd577076958f1b
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00001.html
- http://www.debian.org/security/2015/dsa-3352
- http://www.openwall.com/lists/oss-security/2015/09/01/1
- http://www.openwall.com/lists/oss-security/2015/09/03/11
- http://www.openwall.com/lists/oss-security/2015/09/03/4
- https://savannah.gnu.org/bugs/?45713
- https://usn.ubuntu.com/3996-1/
- http://git.savannah.gnu.org/cgit/screen.git/commit/?id=b7484c224738247b510ed0d268cd577076958f1b
- http://lists.opensuse.org/opensuse-security-announce/2019-06/msg00001.html
- http://www.debian.org/security/2015/dsa-3352
- http://www.openwall.com/lists/oss-security/2015/09/01/1
- http://www.openwall.com/lists/oss-security/2015/09/03/11
- http://www.openwall.com/lists/oss-security/2015/09/03/4
- https://savannah.gnu.org/bugs/?45713
- https://usn.ubuntu.com/3996-1/
Modified: 2025-04-20
CVE-2017-5618
GNU screen before 4.5.1 allows local users to modify arbitrary files and consequently gain root privileges by leveraging improper checking of logfile permissions.
- http://git.savannah.gnu.org/cgit/screen.git/patch/?id=1c6d2817926d30c9a7a97d99af7ac5de4a5845b8
- http://git.savannah.gnu.org/cgit/screen.git/tree/src/ChangeLog?h=v.4.5.1
- http://savannah.gnu.org/bugs/?50142
- http://www.openwall.com/lists/oss-security/2017/01/29/3
- http://www.securityfocus.com/bid/95873
- https://lists.gnu.org/archive/html/screen-devel/2017-01/msg00025.html
- http://git.savannah.gnu.org/cgit/screen.git/patch/?id=1c6d2817926d30c9a7a97d99af7ac5de4a5845b8
- http://git.savannah.gnu.org/cgit/screen.git/tree/src/ChangeLog?h=v.4.5.1
- http://savannah.gnu.org/bugs/?50142
- http://www.openwall.com/lists/oss-security/2017/01/29/3
- http://www.securityfocus.com/bid/95873
- https://lists.gnu.org/archive/html/screen-devel/2017-01/msg00025.html