ALT-BU-2017-2983-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-6014
In Wireshark 2.2.4 and earlier, a crafted or malformed STANAG 4607 capture file will cause an infinite loop and memory exhaustion. If the packet size field in a packet header is null, the offset to read from will not advance, causing continuous attempts to read the same zero length packet. This will quickly exhaust all system memory.
Modified: 2024-11-21
CVE-2017-6467
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is a Netscaler file parser infinite loop, triggered by a malformed capture file. This was addressed in wiretap/netscaler.c by changing the restrictions on file size.
- DSA-3811
- DSA-3811
- 96561
- 96561
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12083
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=12083
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=284ad58d288722a8725401967bff0c4455488f0c
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=284ad58d288722a8725401967bff0c4455488f0c
- https://www.wireshark.org/security/wnpa-sec-2017-11.html
- https://www.wireshark.org/security/wnpa-sec-2017-11.html
Modified: 2024-11-21
CVE-2017-6468
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is a NetScaler file parser crash, triggered by a malformed capture file. This was addressed in wiretap/netscaler.c by validating the relationship between pages and records.
- DSA-3811
- DSA-3811
- 96569
- 96569
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13430
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13430
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9f3bc84b7e7e435c50b8b68f0fc526d0f5676cbf
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=9f3bc84b7e7e435c50b8b68f0fc526d0f5676cbf
- https://www.wireshark.org/security/wnpa-sec-2017-08.html
- https://www.wireshark.org/security/wnpa-sec-2017-08.html
Modified: 2024-11-21
CVE-2017-6469
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is an LDSS dissector crash, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-ldss.c by ensuring that memory is allocated for a certain data structure.
- DSA-3811
- DSA-3811
- 96577
- 96577
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13346
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13346
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4f753c127082d5e28abf482d6d175cbfee6661f7
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4f753c127082d5e28abf482d6d175cbfee6661f7
- https://www.wireshark.org/security/wnpa-sec-2017-03.html
- https://www.wireshark.org/security/wnpa-sec-2017-03.html
Modified: 2024-11-21
CVE-2017-6470
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is an IAX2 infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-iax2.c by constraining packet lateness.
- DSA-3811
- DSA-3811
- 96563
- 96563
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13432
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13432
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=0b89174ef4c531a1917437fff586fe525ee7bf2d
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=0b89174ef4c531a1917437fff586fe525ee7bf2d
- https://www.wireshark.org/security/wnpa-sec-2017-10.html
- https://www.wireshark.org/security/wnpa-sec-2017-10.html
Modified: 2024-11-21
CVE-2017-6471
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is a WSP infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-wsp.c by validating the capability length.
- DSA-3811
- DSA-3811
- 96564
- 96564
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13348
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13348
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=62afef41277dfac37f515207ca73d33306e3302b
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=62afef41277dfac37f515207ca73d33306e3302b
- https://www.wireshark.org/security/wnpa-sec-2017-05.html
- https://www.wireshark.org/security/wnpa-sec-2017-05.html
Modified: 2024-11-21
CVE-2017-6472
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is an RTMPT dissector infinite loop, triggered by packet injection or a malformed capture file. This was addressed in epan/dissectors/packet-rtmpt.c by properly incrementing a certain sequence value.
- DSA-3811
- DSA-3811
- 96571
- 96571
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13347
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13347
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2b3a0909beff8963b390034c594e0b6be6a4e531
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=2b3a0909beff8963b390034c594e0b6be6a4e531
- https://www.wireshark.org/security/wnpa-sec-2017-04.html
- https://www.wireshark.org/security/wnpa-sec-2017-04.html
Modified: 2024-11-21
CVE-2017-6473
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is a K12 file parser crash, triggered by a malformed capture file. This was addressed in wiretap/k12.c by validating the relationships between lengths and offsets.
- DSA-3811
- DSA-3811
- 96565
- 96565
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13431
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13431
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=7edc761a01cda8e1b37677f673985582330317d2
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=7edc761a01cda8e1b37677f673985582330317d2
- https://www.wireshark.org/security/wnpa-sec-2017-09.html
- https://www.wireshark.org/security/wnpa-sec-2017-09.html
Modified: 2024-11-21
CVE-2017-6474
In Wireshark 2.2.0 to 2.2.4 and 2.0.0 to 2.0.10, there is a NetScaler file parser infinite loop, triggered by a malformed capture file. This was addressed in wiretap/netscaler.c by validating record sizes.
- DSA-3811
- DSA-3811
- 96566
- 96566
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13429
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=13429
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a998c9195f183d85f5b0bbeebba21a2d4d303d47
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a998c9195f183d85f5b0bbeebba21a2d4d303d47
- https://www.wireshark.org/security/wnpa-sec-2017-07.html
- https://www.wireshark.org/security/wnpa-sec-2017-07.html
Package ghostscript updated to version 9.20-alt2 for branch sisyphus in task 179341.
Closed bugs
Слинкован с libpng12 и libpng15 одновременно
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-2635
A NULL pointer deference flaw was found in the way libvirt from 2.5.0 to 3.0.0 handled empty drives. A remote authenticated attacker could use this flaw to crash libvirtd daemon resulting in denial of service.
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2635
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-2635
- https://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=c3de387380f6057ee0e46cd9f2f0a092e8070875
- https://libvirt.org/git/?p=libvirt.git%3Ba=commit%3Bh=c3de387380f6057ee0e46cd9f2f0a092e8070875
Closed bugs
недостаточно Provides
Closed bugs
недостаточно Provides
Closed vulnerabilities
Modified: 2024-11-21
CVE-2007-3048
GNU screen 4.0.3 allows local users to unlock the screen via a CTRL-C sequence at the password prompt. NOTE: multiple third parties report inability to reproduce this issue
- 20070604 screen 4.0.3 local Authentication Bypass
- 20070604 screen 4.0.3 local Authentication Bypass
- 20070604 screen 4.0.3 local Authentication Bypass
- 20070604 screen 4.0.3 local Authentication Bypass
- 20070604 screen 4.0.3 local Authentication Bypass
- 20070604 screen 4.0.3 local Authentication Bypass
- 20070604 screen 4.0.3 local Authentication Bypass
- 20070604 screen 4.0.3 local Authentication Bypass
- screen-password-authentication-bypass(34693)
- screen-password-authentication-bypass(34693)
Modified: 2024-11-21
CVE-2009-1214
GNU screen 4.0.3 creates the /tmp/screen-exchange temporary file with world-readable permissions, which might allow local users to obtain sensitive session information.
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=521123
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=521123
- http://savannah.gnu.org/bugs/?25296
- http://savannah.gnu.org/bugs/?25296
- [oss-security] 20090325 CVE request -- zsh, XFree86-xfs/xorg-x11-xfs, screen
- [oss-security] 20090325 CVE request -- zsh, XFree86-xfs/xorg-x11-xfs, screen
- 34521
- 34521
- https://bugs.launchpad.net/ubuntu/+source/screen/+bug/315993
- https://bugs.launchpad.net/ubuntu/+source/screen/+bug/315993
- https://bugzilla.redhat.com/show_bug.cgi?id=492104
- https://bugzilla.redhat.com/show_bug.cgi?id=492104
- screen-screenexchange-info-disclosure(49886)
- screen-screenexchange-info-disclosure(49886)
Modified: 2024-11-21
CVE-2009-1215
Race condition in GNU screen 4.0.3 allows local users to create or overwrite arbitrary files via a symlink attack on the /tmp/screen-exchange temporary file.
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=521123
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=521123
- http://savannah.gnu.org/bugs/?25296
- http://savannah.gnu.org/bugs/?25296
- [oss-security] 20090325 CVE request -- zsh, XFree86-xfs/xorg-x11-xfs, screen
- [oss-security] 20090325 CVE request -- zsh, XFree86-xfs/xorg-x11-xfs, screen
- 34521
- 34521
- https://bugs.launchpad.net/ubuntu/+source/screen/+bug/315993
- https://bugs.launchpad.net/ubuntu/+source/screen/+bug/315993
- https://bugzilla.redhat.com/show_bug.cgi?id=492104
- https://bugzilla.redhat.com/show_bug.cgi?id=492104
- screen-screenexchange-symlink(49887)
- screen-screenexchange-symlink(49887)
Modified: 2024-11-21
CVE-2015-6806
The MScrollV function in ansi.c in GNU screen 4.3.1 and earlier does not properly limit recursion, which allows remote attackers to cause a denial of service (stack consumption) via an escape sequence with a large repeat count value.
- http://git.savannah.gnu.org/cgit/screen.git/commit/?id=b7484c224738247b510ed0d268cd577076958f1b
- http://git.savannah.gnu.org/cgit/screen.git/commit/?id=b7484c224738247b510ed0d268cd577076958f1b
- openSUSE-SU-2019:1485
- openSUSE-SU-2019:1485
- DSA-3352
- DSA-3352
- [oss-security] 20150901 CVE request: screen stack overflow (deep recursion)
- [oss-security] 20150901 CVE request: screen stack overflow (deep recursion)
- [oss-security] 20150904 Re: CVE request: screen stack overflow (deep recursion)
- [oss-security] 20150904 Re: CVE request: screen stack overflow (deep recursion)
- [oss-security] 20150903 AW: Re: CVE request: screen stack overflow (deep recursion)
- [oss-security] 20150903 AW: Re: CVE request: screen stack overflow (deep recursion)
- https://savannah.gnu.org/bugs/?45713
- https://savannah.gnu.org/bugs/?45713
- USN-3996-1
- USN-3996-1
Modified: 2024-11-21
CVE-2017-5618
GNU screen before 4.5.1 allows local users to modify arbitrary files and consequently gain root privileges by leveraging improper checking of logfile permissions.
- http://git.savannah.gnu.org/cgit/screen.git/patch/?id=1c6d2817926d30c9a7a97d99af7ac5de4a5845b8
- http://git.savannah.gnu.org/cgit/screen.git/patch/?id=1c6d2817926d30c9a7a97d99af7ac5de4a5845b8
- http://git.savannah.gnu.org/cgit/screen.git/tree/src/ChangeLog?h=v.4.5.1
- http://git.savannah.gnu.org/cgit/screen.git/tree/src/ChangeLog?h=v.4.5.1
- http://savannah.gnu.org/bugs/?50142
- http://savannah.gnu.org/bugs/?50142
- [oss-security] 20170129 Re: CVE request: GNU screen escalation
- [oss-security] 20170129 Re: CVE request: GNU screen escalation
- 95873
- 95873
- [screen-devel] 20170124 [bug #50142] root exploit 4.5.0
- [screen-devel] 20170124 [bug #50142] root exploit 4.5.0