ALT-BU-2017-3235-1
Branch p8 update bulletin.
Package kernel-image-un-def updated to version 4.9.37-alt0.M80P.1 for branch p8 in task 185371.
Closed vulnerabilities
BDU:2017-01673
Уязвимость функции virtio_gpu_object_create операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2017-10810
Memory leak in the virtio_gpu_object_create function in drivers/gpu/drm/virtio/virtgpu_object.c in the Linux kernel through 4.11.8 allows attackers to cause a denial of service (memory consumption) by triggering object-initialization failures.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=385aee965b4e4c36551c362a334378d2985b722a
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=385aee965b4e4c36551c362a334378d2985b722a
- DSA-3927
- DSA-3927
- 99433
- 99433
- https://github.com/torvalds/linux/commit/385aee965b4e4c36551c362a334378d2985b722a
- https://github.com/torvalds/linux/commit/385aee965b4e4c36551c362a334378d2985b722a
- https://lkml.org/lkml/2017/4/6/668
- https://lkml.org/lkml/2017/4/6/668
Modified: 2024-11-21
CVE-2017-12146
The driver_override implementation in drivers/base/platform.c in the Linux kernel before 4.12.1 allows local users to gain privileges by leveraging a race condition between a read operation and a store operation that involve different overrides.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6265539776a0810b7ce6398c27866ddb9c6bd154
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=6265539776a0810b7ce6398c27866ddb9c6bd154
- DSA-3981
- DSA-3981
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.1
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.12.1
- 100651
- 100651
- https://bugzilla.redhat.com/show_bug.cgi?id=1489078
- https://bugzilla.redhat.com/show_bug.cgi?id=1489078
- https://bugzilla.suse.com/show_bug.cgi?id=1057474
- https://bugzilla.suse.com/show_bug.cgi?id=1057474
- https://github.com/torvalds/linux/commit/6265539776a0810b7ce6398c27866ddb9c6bd154
- https://github.com/torvalds/linux/commit/6265539776a0810b7ce6398c27866ddb9c6bd154
- https://source.android.com/security/bulletin/2017-09-01
- https://source.android.com/security/bulletin/2017-09-01
Package openvswitch updated to version 2.7.1-alt0.M80P.1 for branch p8 in task 185389.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-9214
In Open vSwitch (OvS) 2.7.0, while parsing an OFPT_QUEUE_GET_CONFIG_REPLY type OFP 1.0 message, there is a buffer over-read that is caused by an unsigned integer underflow in the function `ofputil_pull_queue_get_config_reply10` in `lib/ofp-util.c`.
- RHSA-2017:2418
- RHSA-2017:2418
- RHSA-2017:2553
- RHSA-2017:2553
- RHSA-2017:2648
- RHSA-2017:2648
- RHSA-2017:2665
- RHSA-2017:2665
- RHSA-2017:2692
- RHSA-2017:2692
- RHSA-2017:2698
- RHSA-2017:2698
- RHSA-2017:2727
- RHSA-2017:2727
- [debian-lts-announce] 20210219 [SECURITY] [DLA 2571-1] openvswitch security update
- [debian-lts-announce] 20210219 [SECURITY] [DLA 2571-1] openvswitch security update
- https://mail.openvswitch.org/pipermail/ovs-dev/2017-May/332711.html
- https://mail.openvswitch.org/pipermail/ovs-dev/2017-May/332711.html
Modified: 2024-11-21
CVE-2017-9263
In Open vSwitch (OvS) 2.7.0, while parsing an OpenFlow role status message, there is a call to the abort() function for undefined role status reasons in the function `ofp_print_role_status_message` in `lib/ofp-print.c` that may be leveraged toward a remote DoS attack by a malicious switch.
- RHSA-2017:2418
- RHSA-2017:2418
- RHSA-2017:2553
- RHSA-2017:2553
- RHSA-2017:2648
- RHSA-2017:2648
- RHSA-2017:2665
- RHSA-2017:2665
- RHSA-2017:2692
- RHSA-2017:2692
- RHSA-2017:2698
- RHSA-2017:2698
- RHSA-2017:2727
- RHSA-2017:2727
- https://mail.openvswitch.org/pipermail/ovs-dev/2017-May/332966.html
- https://mail.openvswitch.org/pipermail/ovs-dev/2017-May/332966.html
Modified: 2024-11-21
CVE-2017-9265
In Open vSwitch (OvS) v2.7.0, there is a buffer over-read while parsing the group mod OpenFlow message sent from the controller in `lib/ofp-util.c` in the function `ofputil_pull_ofp15_group_mod`.
- RHSA-2017:2418
- RHSA-2017:2418
- RHSA-2017:2553
- RHSA-2017:2553
- RHSA-2017:2648
- RHSA-2017:2648
- RHSA-2017:2665
- RHSA-2017:2665
- RHSA-2017:2692
- RHSA-2017:2692
- RHSA-2017:2698
- RHSA-2017:2698
- RHSA-2017:2727
- RHSA-2017:2727
- https://mail.openvswitch.org/pipermail/ovs-dev/2017-May/332965.html
- https://mail.openvswitch.org/pipermail/ovs-dev/2017-May/332965.html
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-5192
When using the local_batch client from salt-api in SaltStack Salt before 2015.8.13, 2016.3.x before 2016.3.5, and 2016.11.x before 2016.11.2, external authentication is not respected, enabling all authentication to be bypassed.
- https://docs.saltstack.com/en/2016.3/topics/releases/2015.8.13.html
- https://docs.saltstack.com/en/2016.3/topics/releases/2015.8.13.html
- https://docs.saltstack.com/en/2016.3/topics/releases/2016.3.5.html
- https://docs.saltstack.com/en/2016.3/topics/releases/2016.3.5.html
- https://docs.saltstack.com/en/latest/topics/releases/2016.11.2.html
- https://docs.saltstack.com/en/latest/topics/releases/2016.11.2.html
Modified: 2024-11-21
CVE-2017-5200
Salt-api in SaltStack Salt before 2015.8.13, 2016.3.x before 2016.3.5, and 2016.11.x before 2016.11.2 allows arbitrary command execution on a salt-master via Salt's ssh_client.
- https://docs.saltstack.com/en/2016.3/topics/releases/2015.8.13.html
- https://docs.saltstack.com/en/2016.3/topics/releases/2015.8.13.html
- https://docs.saltstack.com/en/2016.3/topics/releases/2016.3.5.html
- https://docs.saltstack.com/en/2016.3/topics/releases/2016.3.5.html
- https://docs.saltstack.com/en/latest/topics/releases/2016.11.2.html
- https://docs.saltstack.com/en/latest/topics/releases/2016.11.2.html
Modified: 2024-11-21
CVE-2017-7893
In SaltStack Salt before 2016.3.6, compromised salt-minions can impersonate the salt-master.
Closed vulnerabilities
BDU:2018-00111
Уязвимость программного средства просмотра документов Evince, связанная с непринятием мер по нейтрализации специальных элементов, позволяющая нарушителю выполнить произвольные команды
Modified: 2024-11-21
CVE-2017-1000083
backend/comics/comics-document.c (aka the comic book backend) in GNOME Evince before 3.24.1 allows remote attackers to execute arbitrary commands via a .cbt file that is a TAR archive containing a filename beginning with a "--" command-line option substring, as demonstrated by a --checkpoint-action=exec=bash at the beginning of the filename.
- http://seclists.org/oss-sec/2017/q3/128
- http://seclists.org/oss-sec/2017/q3/128
- DSA-3911
- DSA-3911
- 99597
- 99597
- RHSA-2017:2388
- RHSA-2017:2388
- https://bugzilla.gnome.org/show_bug.cgi?id=784630
- https://bugzilla.gnome.org/show_bug.cgi?id=784630
- https://github.com/GNOME/evince/commit/717df38fd8509bf883b70d680c9b1b3cf36732ee
- https://github.com/GNOME/evince/commit/717df38fd8509bf883b70d680c9b1b3cf36732ee
- 45824
- 45824
- 46341
- 46341