ALT-BU-2017-3236-1
Branch sisyphus update bulletin.
Package openvswitch updated to version 2.7.1-alt1 for branch sisyphus in task 185385.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-9214
In Open vSwitch (OvS) 2.7.0, while parsing an OFPT_QUEUE_GET_CONFIG_REPLY type OFP 1.0 message, there is a buffer over-read that is caused by an unsigned integer underflow in the function `ofputil_pull_queue_get_config_reply10` in `lib/ofp-util.c`.
- RHSA-2017:2418
- RHSA-2017:2418
- RHSA-2017:2553
- RHSA-2017:2553
- RHSA-2017:2648
- RHSA-2017:2648
- RHSA-2017:2665
- RHSA-2017:2665
- RHSA-2017:2692
- RHSA-2017:2692
- RHSA-2017:2698
- RHSA-2017:2698
- RHSA-2017:2727
- RHSA-2017:2727
- [debian-lts-announce] 20210219 [SECURITY] [DLA 2571-1] openvswitch security update
- [debian-lts-announce] 20210219 [SECURITY] [DLA 2571-1] openvswitch security update
- https://mail.openvswitch.org/pipermail/ovs-dev/2017-May/332711.html
- https://mail.openvswitch.org/pipermail/ovs-dev/2017-May/332711.html
Modified: 2024-11-21
CVE-2017-9263
In Open vSwitch (OvS) 2.7.0, while parsing an OpenFlow role status message, there is a call to the abort() function for undefined role status reasons in the function `ofp_print_role_status_message` in `lib/ofp-print.c` that may be leveraged toward a remote DoS attack by a malicious switch.
- RHSA-2017:2418
- RHSA-2017:2418
- RHSA-2017:2553
- RHSA-2017:2553
- RHSA-2017:2648
- RHSA-2017:2648
- RHSA-2017:2665
- RHSA-2017:2665
- RHSA-2017:2692
- RHSA-2017:2692
- RHSA-2017:2698
- RHSA-2017:2698
- RHSA-2017:2727
- RHSA-2017:2727
- https://mail.openvswitch.org/pipermail/ovs-dev/2017-May/332966.html
- https://mail.openvswitch.org/pipermail/ovs-dev/2017-May/332966.html
Modified: 2024-11-21
CVE-2017-9265
In Open vSwitch (OvS) v2.7.0, there is a buffer over-read while parsing the group mod OpenFlow message sent from the controller in `lib/ofp-util.c` in the function `ofputil_pull_ofp15_group_mod`.
- RHSA-2017:2418
- RHSA-2017:2418
- RHSA-2017:2553
- RHSA-2017:2553
- RHSA-2017:2648
- RHSA-2017:2648
- RHSA-2017:2665
- RHSA-2017:2665
- RHSA-2017:2692
- RHSA-2017:2692
- RHSA-2017:2698
- RHSA-2017:2698
- RHSA-2017:2727
- RHSA-2017:2727
- https://mail.openvswitch.org/pipermail/ovs-dev/2017-May/332965.html
- https://mail.openvswitch.org/pipermail/ovs-dev/2017-May/332965.html
Closed vulnerabilities
BDU:2018-00111
Уязвимость программного средства просмотра документов Evince, связанная с непринятием мер по нейтрализации специальных элементов, позволяющая нарушителю выполнить произвольные команды
Modified: 2024-11-21
CVE-2017-1000083
backend/comics/comics-document.c (aka the comic book backend) in GNOME Evince before 3.24.1 allows remote attackers to execute arbitrary commands via a .cbt file that is a TAR archive containing a filename beginning with a "--" command-line option substring, as demonstrated by a --checkpoint-action=exec=bash at the beginning of the filename.
- http://seclists.org/oss-sec/2017/q3/128
- http://seclists.org/oss-sec/2017/q3/128
- DSA-3911
- DSA-3911
- 99597
- 99597
- RHSA-2017:2388
- RHSA-2017:2388
- https://bugzilla.gnome.org/show_bug.cgi?id=784630
- https://bugzilla.gnome.org/show_bug.cgi?id=784630
- https://github.com/GNOME/evince/commit/717df38fd8509bf883b70d680c9b1b3cf36732ee
- https://github.com/GNOME/evince/commit/717df38fd8509bf883b70d680c9b1b3cf36732ee
- 45824
- 45824
- 46341
- 46341
Closed vulnerabilities
BDU:2018-00106
Уязвимость функции ares_parse_naptr_reply библиотеки асинхронных DNS-запросов c-ares, позволяющая нарушителю выполнить чтение за границами буфера в памяти
Modified: 2024-11-21
CVE-2017-1000381
The c-ares function `ares_parse_naptr_reply()`, which is used for parsing NAPTR responses, could be triggered to read memory outside of the given input buffer if the passed in DNS response packet was crafted in a particular way.