ALT-BU-2017-3376-1
Branch c8 update bulletin.
Closed vulnerabilities
Modified: 2025-04-11
CVE-2012-3368
Integer signedness error in attach.c in dtach 0.8 allows remote attackers to obtain sensitive information from daemon stack memory in opportunistic circumstances by reading application data after an improper connection-close request, as demonstrated by running an IRC client in dtach.
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=625302
- http://sourceforge.net/tracker/?func=detail&aid=3517812&group_id=36489&atid=417357
- http://sourceforge.net/tracker/download.php?group_id=36489&atid=417357&file_id=441195&aid=3517812
- https://bugzilla.redhat.com/show_bug.cgi?id=812551
- https://bugzilla.redhat.com/show_bug.cgi?id=835849
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=625302
- http://sourceforge.net/tracker/?func=detail&aid=3517812&group_id=36489&atid=417357
- http://sourceforge.net/tracker/download.php?group_id=36489&atid=417357&file_id=441195&aid=3517812
- https://bugzilla.redhat.com/show_bug.cgi?id=812551
- https://bugzilla.redhat.com/show_bug.cgi?id=835849
Closed vulnerabilities
Modified: 2021-03-23
BDU:2015-09649
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить доступность защищаемой информации
Modified: 2021-03-23
BDU:2016-01470
Уязвимость библиотеки парсинга Expat, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
Modified: 2021-03-23
BDU:2016-01683
Уязвимость библиотеки Expat, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
Modified: 2021-03-23
BDU:2018-00112
Уязвимость функции entityValueInitProcessor библиотеки для анализа XML-файлов libexpat, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03335
Уязвимость браузера Mozilla Firefox, вызванная переполнением буфера, позволяющая нарушителю выполнить произвольный код
Modified: 2025-04-11
CVE-2012-1148
Memory leak in the poolGrow function in expat/lib/xmlparse.c in expat before 2.1.0 allows context-dependent attackers to cause a denial of service (memory consumption) via a large number of crafted XML files that cause improperly-handled reallocation failures when expanding entities.
- http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?r1=1.166&r2=1.167
- http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html
- http://rhn.redhat.com/errata/RHSA-2012-0731.html
- http://rhn.redhat.com/errata/RHSA-2016-0062.html
- http://rhn.redhat.com/errata/RHSA-2016-2957.html
- http://secunia.com/advisories/49504
- http://secunia.com/advisories/51024
- http://secunia.com/advisories/51040
- http://sourceforge.net/projects/expat/files/expat/2.1.0/
- http://sourceforge.net/tracker/?func=detail&atid=110127&aid=2958794&group_id=10127
- http://www.debian.org/security/2012/dsa-2525
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:041
- http://www.securityfocus.com/bid/52379
- http://www.securitytracker.com/id/1034344
- http://www.ubuntu.com/usn/USN-1527-1
- http://www.ubuntu.com/usn/USN-1613-1
- http://www.ubuntu.com/usn/USN-1613-2
- https://support.apple.com/HT205637
- http://expat.cvs.sourceforge.net/viewvc/expat/expat/lib/xmlparse.c?r1=1.166&r2=1.167
- http://lists.apple.com/archives/security-announce/2015/Dec/msg00005.html
- http://rhn.redhat.com/errata/RHSA-2012-0731.html
- http://rhn.redhat.com/errata/RHSA-2016-0062.html
- http://rhn.redhat.com/errata/RHSA-2016-2957.html
- http://secunia.com/advisories/49504
- http://secunia.com/advisories/51024
- http://secunia.com/advisories/51040
- http://sourceforge.net/projects/expat/files/expat/2.1.0/
- http://sourceforge.net/tracker/?func=detail&atid=110127&aid=2958794&group_id=10127
- http://www.debian.org/security/2012/dsa-2525
- http://www.mandriva.com/security/advisories?name=MDVSA-2012:041
- http://www.securityfocus.com/bid/52379
- http://www.securitytracker.com/id/1034344
- http://www.ubuntu.com/usn/USN-1527-1
- http://www.ubuntu.com/usn/USN-1613-1
- http://www.ubuntu.com/usn/USN-1613-2
- https://support.apple.com/HT205637
Modified: 2025-04-12
CVE-2012-6702
Expat, when used in a parser that has not called XML_SetHashSalt or passed it a seed of 0, makes it easier for context-dependent attackers to defeat cryptographic protection mechanisms via vectors involving use of the srand function.
- http://www.debian.org/security/2016/dsa-3597
- http://www.openwall.com/lists/oss-security/2016/06/03/8
- http://www.openwall.com/lists/oss-security/2016/06/04/1
- http://www.securityfocus.com/bid/91483
- http://www.ubuntu.com/usn/USN-3010-1
- https://security.gentoo.org/glsa/201701-21
- https://source.android.com/security/bulletin/2016-11-01.html
- https://www.tenable.com/security/tns-2016-20
- http://www.debian.org/security/2016/dsa-3597
- http://www.openwall.com/lists/oss-security/2016/06/03/8
- http://www.openwall.com/lists/oss-security/2016/06/04/1
- http://www.securityfocus.com/bid/91483
- http://www.ubuntu.com/usn/USN-3010-1
- https://security.gentoo.org/glsa/201701-21
- https://source.android.com/security/bulletin/2016-11-01.html
- https://www.tenable.com/security/tns-2016-20
Modified: 2025-04-12
CVE-2015-1283
Multiple integer overflows in the XML_GetBuffer function in Expat through 2.1.0, as used in Google Chrome before 44.0.2403.89 and other products, allow remote attackers to cause a denial of service (heap-based buffer overflow) or possibly have unspecified other impact via crafted XML data, a related issue to CVE-2015-2716.
- http://googlechromereleases.blogspot.com/2015/07/stable-channel-update_21.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html
- http://rhn.redhat.com/errata/RHSA-2015-1499.html
- http://www.debian.org/security/2015/dsa-3315
- http://www.debian.org/security/2015/dsa-3318
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.securityfocus.com/bid/75973
- http://www.securitytracker.com/id/1033031
- http://www.ubuntu.com/usn/USN-2726-1
- https://code.google.com/p/chromium/issues/detail?id=492052
- https://codereview.chromium.org/1224303003
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- https://security.gentoo.org/glsa/201603-09
- https://security.gentoo.org/glsa/201701-21
- https://source.android.com/security/bulletin/2016-11-01.html
- https://www.tenable.com/security/tns-2016-20
- http://googlechromereleases.blogspot.com/2015/07/stable-channel-update_21.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00038.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html
- http://rhn.redhat.com/errata/RHSA-2015-1499.html
- http://www.debian.org/security/2015/dsa-3315
- http://www.debian.org/security/2015/dsa-3318
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.securityfocus.com/bid/75973
- http://www.securitytracker.com/id/1033031
- http://www.ubuntu.com/usn/USN-2726-1
- https://code.google.com/p/chromium/issues/detail?id=492052
- https://codereview.chromium.org/1224303003
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- https://security.gentoo.org/glsa/201603-09
- https://security.gentoo.org/glsa/201701-21
- https://source.android.com/security/bulletin/2016-11-01.html
- https://www.tenable.com/security/tns-2016-20
Modified: 2025-04-12
CVE-2015-2716
Buffer overflow in the XML parser in Mozilla Firefox before 38.0, Firefox ESR 31.x before 31.7, and Thunderbird before 31.7 allows remote attackers to execute arbitrary code by providing a large amount of compressed XML data, a related issue to CVE-2015-1283.
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00054.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
- http://lists.opensuse.org/opensuse-updates/2015-05/msg00036.html
- http://rhn.redhat.com/errata/RHSA-2015-0988.html
- http://rhn.redhat.com/errata/RHSA-2015-1012.html
- http://www.debian.org/security/2015/dsa-3260
- http://www.debian.org/security/2015/dsa-3264
- http://www.mozilla.org/security/announce/2015/mfsa2015-54.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securityfocus.com/bid/74611
- http://www.ubuntu.com/usn/USN-2602-1
- http://www.ubuntu.com/usn/USN-2603-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1140537
- https://hg.mozilla.org/releases/mozilla-esr31/rev/2f3e78643f5c
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- https://security.gentoo.org/glsa/201605-06
- https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird31.7
- https://www.tenable.com/security/tns-2016-20
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2015-05/msg00054.html
- http://lists.opensuse.org/opensuse-security-announce/2015-06/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2015-07/msg00031.html
- http://lists.opensuse.org/opensuse-updates/2015-05/msg00036.html
- http://rhn.redhat.com/errata/RHSA-2015-0988.html
- http://rhn.redhat.com/errata/RHSA-2015-1012.html
- http://www.debian.org/security/2015/dsa-3260
- http://www.debian.org/security/2015/dsa-3264
- http://www.mozilla.org/security/announce/2015/mfsa2015-54.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.securityfocus.com/bid/74611
- http://www.ubuntu.com/usn/USN-2602-1
- http://www.ubuntu.com/usn/USN-2603-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1140537
- https://hg.mozilla.org/releases/mozilla-esr31/rev/2f3e78643f5c
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- https://security.gentoo.org/glsa/201605-06
- https://www.mozilla.org/en-US/security/known-vulnerabilities/thunderbird/#thunderbird31.7
- https://www.tenable.com/security/tns-2016-20
Modified: 2025-04-12
CVE-2016-0718
Expat allows context-dependent attackers to cause a denial of service (crash) or possibly execute arbitrary code via a malformed input document, which triggers a buffer overflow.
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html
- http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html
- http://rhn.redhat.com/errata/RHSA-2016-2824.html
- http://seclists.org/fulldisclosure/2017/Feb/68
- http://support.eset.com/ca6333/
- http://www.debian.org/security/2016/dsa-3582
- http://www.mozilla.org/security/announce/2016/mfsa2016-68.html
- http://www.openwall.com/lists/oss-security/2016/05/17/12
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.securityfocus.com/bid/90729
- http://www.securitytracker.com/id/1036348
- http://www.securitytracker.com/id/1036415
- http://www.securitytracker.com/id/1037705
- http://www.ubuntu.com/usn/USN-2983-1
- http://www.ubuntu.com/usn/USN-3044-1
- https://access.redhat.com/errata/RHSA-2018:2486
- https://bugzilla.mozilla.org/show_bug.cgi?id=1236923
- https://bugzilla.redhat.com/show_bug.cgi?id=1296102
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- https://security.gentoo.org/glsa/201701-21
- https://source.android.com/security/bulletin/2016-11-01.html
- https://support.apple.com/HT206903
- https://www.tenable.com/security/tns-2016-20
- http://lists.apple.com/archives/security-announce/2016/Jul/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2016-05/msg00064.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00007.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00010.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00004.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00029.html
- http://packetstormsecurity.com/files/141350/ESET-Endpoint-Antivirus-6-Remote-Code-Execution.html
- http://rhn.redhat.com/errata/RHSA-2016-2824.html
- http://seclists.org/fulldisclosure/2017/Feb/68
- http://support.eset.com/ca6333/
- http://www.debian.org/security/2016/dsa-3582
- http://www.mozilla.org/security/announce/2016/mfsa2016-68.html
- http://www.openwall.com/lists/oss-security/2016/05/17/12
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.securityfocus.com/bid/90729
- http://www.securitytracker.com/id/1036348
- http://www.securitytracker.com/id/1036415
- http://www.securitytracker.com/id/1037705
- http://www.ubuntu.com/usn/USN-2983-1
- http://www.ubuntu.com/usn/USN-3044-1
- https://access.redhat.com/errata/RHSA-2018:2486
- https://bugzilla.mozilla.org/show_bug.cgi?id=1236923
- https://bugzilla.redhat.com/show_bug.cgi?id=1296102
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- https://security.gentoo.org/glsa/201701-21
- https://source.android.com/security/bulletin/2016-11-01.html
- https://support.apple.com/HT206903
- https://www.tenable.com/security/tns-2016-20
Modified: 2025-04-12
CVE-2016-4472
The overflow protection in Expat is removed by compilers with certain optimization settings, which allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via crafted XML data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-1283 and CVE-2015-2716.
- http://www.securityfocus.com/bid/91528
- http://www.ubuntu.com/usn/USN-3013-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1344251
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- https://security.gentoo.org/glsa/201701-21
- https://sourceforge.net/p/expat/code_git/ci/f0bec73b018caa07d3e75ec8dd967f3785d71bde
- https://www.tenable.com/security/tns-2016-20
- http://www.securityfocus.com/bid/91528
- http://www.ubuntu.com/usn/USN-3013-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1344251
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- https://security.gentoo.org/glsa/201701-21
- https://sourceforge.net/p/expat/code_git/ci/f0bec73b018caa07d3e75ec8dd967f3785d71bde
- https://www.tenable.com/security/tns-2016-20
Modified: 2025-04-12
CVE-2016-5300
The XML parser in Expat does not use sufficient entropy for hash initialization, which allows context-dependent attackers to cause a denial of service (CPU consumption) via crafted identifiers in an XML document. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-0876.
- http://www.debian.org/security/2016/dsa-3597
- http://www.openwall.com/lists/oss-security/2016/06/04/4
- http://www.openwall.com/lists/oss-security/2016/06/04/5
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.securityfocus.com/bid/91159
- http://www.ubuntu.com/usn/USN-3010-1
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://security.gentoo.org/glsa/201701-21
- https://source.android.com/security/bulletin/2016-11-01.html
- https://www.tenable.com/security/tns-2016-20
- http://www.debian.org/security/2016/dsa-3597
- http://www.openwall.com/lists/oss-security/2016/06/04/4
- http://www.openwall.com/lists/oss-security/2016/06/04/5
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- http://www.oracle.com/technetwork/topics/security/bulletinjul2016-3090568.html
- http://www.securityfocus.com/bid/91159
- http://www.ubuntu.com/usn/USN-3010-1
- https://kc.mcafee.com/corporate/index?page=content&id=SB10365
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://security.gentoo.org/glsa/201701-21
- https://source.android.com/security/bulletin/2016-11-01.html
- https://www.tenable.com/security/tns-2016-20
Modified: 2024-11-21
CVE-2016-9063
An integer overflow during the parsing of XML using the Expat library. This vulnerability affects Firefox < 50.
- http://www.securityfocus.com/bid/94337
- http://www.securitytracker.com/id/1037298
- http://www.securitytracker.com/id/1039427
- https://bugzilla.mozilla.org/show_bug.cgi?id=1274777
- https://www.debian.org/security/2017/dsa-3898
- https://www.mozilla.org/security/advisories/mfsa2016-89/
- http://www.securityfocus.com/bid/94337
- http://www.securitytracker.com/id/1037298
- http://www.securitytracker.com/id/1039427
- https://bugzilla.mozilla.org/show_bug.cgi?id=1274777
- https://www.debian.org/security/2017/dsa-3898
- https://www.mozilla.org/security/advisories/mfsa2016-89/
Modified: 2025-04-20
CVE-2017-11742
The writeRandomBytes_RtlGenRandom function in xmlparse.c in libexpat in Expat 2.2.1 and 2.2.2 on Windows allows local users to gain privileges via a Trojan horse ADVAPI32.DLL in the current working directory because of an untrusted search path, aka DLL hijacking.
Modified: 2025-04-20
CVE-2017-9233
XML External Entity vulnerability in libexpat 2.2.0 and earlier (Expat XML Parser Library) allows attackers to put the parser in an infinite loop using a malformed external entity definition from an external DTD.
- http://www.debian.org/security/2017/dsa-3898
- http://www.openwall.com/lists/oss-security/2017/06/17/7
- http://www.securityfocus.com/bid/99276
- http://www.securitytracker.com/id/1039427
- https://github.com/libexpat/libexpat/blob/master/expat/Changes
- https://libexpat.github.io/doc/cve-2017-9233/
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://support.apple.com/HT208112
- https://support.apple.com/HT208113
- https://support.apple.com/HT208115
- https://support.apple.com/HT208144
- https://support.f5.com/csp/article/K03244804
- http://www.debian.org/security/2017/dsa-3898
- http://www.openwall.com/lists/oss-security/2017/06/17/7
- http://www.securityfocus.com/bid/99276
- http://www.securitytracker.com/id/1039427
- https://github.com/libexpat/libexpat/blob/master/expat/Changes
- https://libexpat.github.io/doc/cve-2017-9233/
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://support.apple.com/HT208112
- https://support.apple.com/HT208113
- https://support.apple.com/HT208115
- https://support.apple.com/HT208144
- https://support.f5.com/csp/article/K03244804
Closed vulnerabilities
Modified: 2025-04-12
CVE-2016-7031
The RGW code in Ceph before 10.0.1, when authenticated-read ACL is applied to a bucket, allows remote attackers to list the bucket contents via a URL.
- http://docs.ceph.com/docs/master/release-notes/#v10-0-1
- http://rhn.redhat.com/errata/RHSA-2016-1972.html
- http://rhn.redhat.com/errata/RHSA-2016-1973.html
- http://tracker.ceph.com/issues/13207
- http://www.securityfocus.com/bid/93240
- https://github.com/ceph/ceph/pull/6057
- http://docs.ceph.com/docs/master/release-notes/#v10-0-1
- http://rhn.redhat.com/errata/RHSA-2016-1972.html
- http://rhn.redhat.com/errata/RHSA-2016-1973.html
- http://tracker.ceph.com/issues/13207
- http://www.securityfocus.com/bid/93240
- https://github.com/ceph/ceph/pull/6057
Closed vulnerabilities
Modified: 2021-03-23
BDU:2017-01803
Уязвимость в qemu-nbd эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2021-03-23
BDU:2019-00222
Уязвимость сервера Qemu-NBD эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2023-11-21
BDU:2021-01313
Уязвимость эмулятора аппаратного обеспечения QEMU, связанная с разыменованием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-04-20
CVE-2017-10664
qemu-nbd in QEMU (aka Quick Emulator) does not ignore SIGPIPE, which allows remote attackers to cause a denial of service (daemon crash) by disconnecting during a server-to-client reply attempt.
- http://www.debian.org/security/2017/dsa-3920
- http://www.openwall.com/lists/oss-security/2017/06/29/1
- http://www.securityfocus.com/bid/99513
- https://access.redhat.com/errata/RHSA-2017:2390
- https://access.redhat.com/errata/RHSA-2017:2445
- https://access.redhat.com/errata/RHSA-2017:3466
- https://access.redhat.com/errata/RHSA-2017:3470
- https://access.redhat.com/errata/RHSA-2017:3471
- https://access.redhat.com/errata/RHSA-2017:3472
- https://access.redhat.com/errata/RHSA-2017:3473
- https://access.redhat.com/errata/RHSA-2017:3474
- https://bugzilla.redhat.com/show_bug.cgi?id=1466190
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2017-06/msg02693.html
- http://www.debian.org/security/2017/dsa-3920
- http://www.openwall.com/lists/oss-security/2017/06/29/1
- http://www.securityfocus.com/bid/99513
- https://access.redhat.com/errata/RHSA-2017:2390
- https://access.redhat.com/errata/RHSA-2017:2445
- https://access.redhat.com/errata/RHSA-2017:3466
- https://access.redhat.com/errata/RHSA-2017:3470
- https://access.redhat.com/errata/RHSA-2017:3471
- https://access.redhat.com/errata/RHSA-2017:3472
- https://access.redhat.com/errata/RHSA-2017:3473
- https://access.redhat.com/errata/RHSA-2017:3474
- https://bugzilla.redhat.com/show_bug.cgi?id=1466190
- https://lists.debian.org/debian-lts-announce/2018/11/msg00038.html
- https://lists.gnu.org/archive/html/qemu-devel/2017-06/msg02693.html
Modified: 2025-04-20
CVE-2017-10806
Stack-based buffer overflow in hw/usb/redirect.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (QEMU process crash) via vectors related to logging debug messages.
- http://www.debian.org/security/2017/dsa-3925
- http://www.openwall.com/lists/oss-security/2017/07/07/1
- http://www.securityfocus.com/bid/99475
- https://bugzilla.redhat.com/show_bug.cgi?id=1468496
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://lists.nongnu.org/archive/html/qemu-devel/2017-05/msg03087.html
- http://www.debian.org/security/2017/dsa-3925
- http://www.openwall.com/lists/oss-security/2017/07/07/1
- http://www.securityfocus.com/bid/99475
- https://bugzilla.redhat.com/show_bug.cgi?id=1468496
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://lists.nongnu.org/archive/html/qemu-devel/2017-05/msg03087.html
Modified: 2025-04-20
CVE-2017-11334
The address_space_write_continue function in exec.c in QEMU (aka Quick Emulator) allows local guest OS privileged users to cause a denial of service (out-of-bounds access and guest instance crash) by leveraging use of qemu_map_ram_ptr to access guest ram block area.
- http://www.debian.org/security/2017/dsa-3925
- http://www.openwall.com/lists/oss-security/2017/07/17/4
- http://www.securityfocus.com/bid/99895
- https://access.redhat.com/errata/RHSA-2017:3369
- https://access.redhat.com/errata/RHSA-2017:3466
- https://access.redhat.com/errata/RHSA-2017:3470
- https://access.redhat.com/errata/RHSA-2017:3471
- https://access.redhat.com/errata/RHSA-2017:3472
- https://access.redhat.com/errata/RHSA-2017:3473
- https://access.redhat.com/errata/RHSA-2017:3474
- https://bugzilla.redhat.com/show_bug.cgi?id=1471638
- https://lists.gnu.org/archive/html/qemu-devel/2017-07/msg03775.html
- https://usn.ubuntu.com/3575-1/
- http://www.debian.org/security/2017/dsa-3925
- http://www.openwall.com/lists/oss-security/2017/07/17/4
- http://www.securityfocus.com/bid/99895
- https://access.redhat.com/errata/RHSA-2017:3369
- https://access.redhat.com/errata/RHSA-2017:3466
- https://access.redhat.com/errata/RHSA-2017:3470
- https://access.redhat.com/errata/RHSA-2017:3471
- https://access.redhat.com/errata/RHSA-2017:3472
- https://access.redhat.com/errata/RHSA-2017:3473
- https://access.redhat.com/errata/RHSA-2017:3474
- https://bugzilla.redhat.com/show_bug.cgi?id=1471638
- https://lists.gnu.org/archive/html/qemu-devel/2017-07/msg03775.html
- https://usn.ubuntu.com/3575-1/
Modified: 2025-04-20
CVE-2017-11434
The dhcp_decode function in slirp/bootp.c in QEMU (aka Quick Emulator) allows local guest OS users to cause a denial of service (out-of-bounds read and QEMU process crash) via a crafted DHCP options string.
- http://www.debian.org/security/2017/dsa-3925
- http://www.openwall.com/lists/oss-security/2017/07/19/2
- http://www.securityfocus.com/bid/99923
- https://bugzilla.redhat.com/show_bug.cgi?id=1472611
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://lists.gnu.org/archive/html/qemu-devel/2017-07/msg05001.html
- http://www.debian.org/security/2017/dsa-3925
- http://www.openwall.com/lists/oss-security/2017/07/19/2
- http://www.securityfocus.com/bid/99923
- https://bugzilla.redhat.com/show_bug.cgi?id=1472611
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://lists.gnu.org/archive/html/qemu-devel/2017-07/msg05001.html
Modified: 2024-11-21
CVE-2017-7539
An assertion-failure flaw was found in Qemu before 2.10.1, in the Network Block Device (NBD) server's initial connection negotiation, where the I/O coroutine was undefined. This could crash the qemu-nbd server if a client sent unexpected data during connection negotiation. A remote user or process could use this flaw to crash the qemu-nbd server resulting in denial of service.
- http://www.openwall.com/lists/oss-security/2017/07/21/4
- http://www.securityfocus.com/bid/99944
- https://access.redhat.com/errata/RHSA-2017:2628
- https://access.redhat.com/errata/RHSA-2017:3466
- https://access.redhat.com/errata/RHSA-2017:3470
- https://access.redhat.com/errata/RHSA-2017:3471
- https://access.redhat.com/errata/RHSA-2017:3472
- https://access.redhat.com/errata/RHSA-2017:3473
- https://access.redhat.com/errata/RHSA-2017:3474
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7539
- https://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=2b0bbc4f8809c972bad134bc1a2570dbb01dea0b
- https://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=ff82911cd3f69f028f2537825c9720ff78bc3f19
- http://www.openwall.com/lists/oss-security/2017/07/21/4
- http://www.securityfocus.com/bid/99944
- https://access.redhat.com/errata/RHSA-2017:2628
- https://access.redhat.com/errata/RHSA-2017:3466
- https://access.redhat.com/errata/RHSA-2017:3470
- https://access.redhat.com/errata/RHSA-2017:3471
- https://access.redhat.com/errata/RHSA-2017:3472
- https://access.redhat.com/errata/RHSA-2017:3473
- https://access.redhat.com/errata/RHSA-2017:3474
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2017-7539
- https://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=2b0bbc4f8809c972bad134bc1a2570dbb01dea0b
- https://git.qemu.org/?p=qemu.git%3Ba=commitdiff%3Bh=ff82911cd3f69f028f2537825c9720ff78bc3f19
Modified: 2025-04-20
CVE-2017-9503
QEMU (aka Quick Emulator), when built with MegaRAID SAS 8708EM2 Host Bus Adapter emulation support, allows local guest OS privileged users to cause a denial of service (NULL pointer dereference and QEMU process crash) via vectors involving megasas command processing.
- http://www.openwall.com/lists/oss-security/2017/06/08/1
- http://www.securityfocus.com/bid/99010
- https://bugzilla.redhat.com/show_bug.cgi?id=1459477
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://lists.debian.org/debian-lts-announce/2020/07/msg00020.html
- https://lists.gnu.org/archive/html/qemu-devel/2017-06/msg01309.html
- https://lists.gnu.org/archive/html/qemu-devel/2017-06/msg01313.html
- http://www.openwall.com/lists/oss-security/2017/06/08/1
- http://www.securityfocus.com/bid/99010
- https://bugzilla.redhat.com/show_bug.cgi?id=1459477
- https://lists.debian.org/debian-lts-announce/2018/09/msg00007.html
- https://lists.debian.org/debian-lts-announce/2020/07/msg00020.html
- https://lists.gnu.org/archive/html/qemu-devel/2017-06/msg01309.html
- https://lists.gnu.org/archive/html/qemu-devel/2017-06/msg01313.html
Modified: 2025-04-20
CVE-2017-9524
The qemu-nbd server in QEMU (aka Quick Emulator), when built with the Network Block Device (NBD) Server support, allows remote attackers to cause a denial of service (segmentation fault and server crash) by leveraging failure to ensure that all initialization occurs before talking to a client in the nbd_negotiate function.
- http://www.debian.org/security/2017/dsa-3925
- http://www.openwall.com/lists/oss-security/2017/06/12/1
- http://www.securityfocus.com/bid/99011
- https://access.redhat.com/errata/RHSA-2017:1681
- https://access.redhat.com/errata/RHSA-2017:1682
- https://access.redhat.com/errata/RHSA-2017:2408
- https://lists.gnu.org/archive/html/qemu-devel/2017-05/msg06240.html
- https://lists.gnu.org/archive/html/qemu-devel/2017-06/msg02321.html
- http://www.debian.org/security/2017/dsa-3925
- http://www.openwall.com/lists/oss-security/2017/06/12/1
- http://www.securityfocus.com/bid/99011
- https://access.redhat.com/errata/RHSA-2017:1681
- https://access.redhat.com/errata/RHSA-2017:1682
- https://access.redhat.com/errata/RHSA-2017:2408
- https://lists.gnu.org/archive/html/qemu-devel/2017-05/msg06240.html
- https://lists.gnu.org/archive/html/qemu-devel/2017-06/msg02321.html
Package pve-manager updated to version 5.0.24-alt5.M80C.8 for branch c8 in task 188728.
Closed bugs
В web-итрефейсе не видно времени создания снапшота
pveproxy блокирует apt
Не работает настройка резервного копирования контейнера