ALT-BU-2017-3387-1
Branch c8 update bulletin.
Package openvswitch updated to version 2.7.2-alt0.M80C.1 for branch c8 in task 189231.
Closed vulnerabilities
Modified: 2025-04-12
CVE-2016-2074
Buffer overflow in lib/flow.c in ovs-vswitchd in Open vSwitch 2.2.x and 2.3.x before 2.3.3 and 2.4.x before 2.4.1 allows remote attackers to execute arbitrary code via crafted MPLS packets, as demonstrated by a long string in an ovs-appctl command.
- http://openvswitch.org/pipermail/announce/2016-March/000082.html
- http://openvswitch.org/pipermail/announce/2016-March/000083.html
- http://rhn.redhat.com/errata/RHSA-2016-0523.html
- http://rhn.redhat.com/errata/RHSA-2016-0524.html
- http://rhn.redhat.com/errata/RHSA-2016-0537.html
- http://www.debian.org/security/2016/dsa-3533
- http://www.securityfocus.com/bid/85700
- https://access.redhat.com/errata/RHSA-2016:0615
- https://bugzilla.redhat.com/show_bug.cgi?id=1318553
- https://security-tracker.debian.org/tracker/CVE-2016-2074
- https://security.gentoo.org/glsa/201701-07
- https://support.citrix.com/article/CTX232655
- http://openvswitch.org/pipermail/announce/2016-March/000082.html
- http://openvswitch.org/pipermail/announce/2016-March/000083.html
- http://rhn.redhat.com/errata/RHSA-2016-0523.html
- http://rhn.redhat.com/errata/RHSA-2016-0524.html
- http://rhn.redhat.com/errata/RHSA-2016-0537.html
- http://www.debian.org/security/2016/dsa-3533
- http://www.securityfocus.com/bid/85700
- https://access.redhat.com/errata/RHSA-2016:0615
- https://bugzilla.redhat.com/show_bug.cgi?id=1318553
- https://security-tracker.debian.org/tracker/CVE-2016-2074
- https://security.gentoo.org/glsa/201701-07
- https://support.citrix.com/article/CTX232655
Modified: 2025-04-20
CVE-2017-9214
In Open vSwitch (OvS) 2.7.0, while parsing an OFPT_QUEUE_GET_CONFIG_REPLY type OFP 1.0 message, there is a buffer over-read that is caused by an unsigned integer underflow in the function `ofputil_pull_queue_get_config_reply10` in `lib/ofp-util.c`.
- https://access.redhat.com/errata/RHSA-2017:2418
- https://access.redhat.com/errata/RHSA-2017:2553
- https://access.redhat.com/errata/RHSA-2017:2648
- https://access.redhat.com/errata/RHSA-2017:2665
- https://access.redhat.com/errata/RHSA-2017:2692
- https://access.redhat.com/errata/RHSA-2017:2698
- https://access.redhat.com/errata/RHSA-2017:2727
- https://lists.debian.org/debian-lts-announce/2021/02/msg00032.html
- https://mail.openvswitch.org/pipermail/ovs-dev/2017-May/332711.html
- https://access.redhat.com/errata/RHSA-2017:2418
- https://access.redhat.com/errata/RHSA-2017:2553
- https://access.redhat.com/errata/RHSA-2017:2648
- https://access.redhat.com/errata/RHSA-2017:2665
- https://access.redhat.com/errata/RHSA-2017:2692
- https://access.redhat.com/errata/RHSA-2017:2698
- https://access.redhat.com/errata/RHSA-2017:2727
- https://lists.debian.org/debian-lts-announce/2021/02/msg00032.html
- https://mail.openvswitch.org/pipermail/ovs-dev/2017-May/332711.html
Modified: 2025-04-20
CVE-2017-9263
In Open vSwitch (OvS) 2.7.0, while parsing an OpenFlow role status message, there is a call to the abort() function for undefined role status reasons in the function `ofp_print_role_status_message` in `lib/ofp-print.c` that may be leveraged toward a remote DoS attack by a malicious switch.
- https://access.redhat.com/errata/RHSA-2017:2418
- https://access.redhat.com/errata/RHSA-2017:2553
- https://access.redhat.com/errata/RHSA-2017:2648
- https://access.redhat.com/errata/RHSA-2017:2665
- https://access.redhat.com/errata/RHSA-2017:2692
- https://access.redhat.com/errata/RHSA-2017:2698
- https://access.redhat.com/errata/RHSA-2017:2727
- https://mail.openvswitch.org/pipermail/ovs-dev/2017-May/332966.html
- https://access.redhat.com/errata/RHSA-2017:2418
- https://access.redhat.com/errata/RHSA-2017:2553
- https://access.redhat.com/errata/RHSA-2017:2648
- https://access.redhat.com/errata/RHSA-2017:2665
- https://access.redhat.com/errata/RHSA-2017:2692
- https://access.redhat.com/errata/RHSA-2017:2698
- https://access.redhat.com/errata/RHSA-2017:2727
- https://mail.openvswitch.org/pipermail/ovs-dev/2017-May/332966.html
Modified: 2025-04-20
CVE-2017-9265
In Open vSwitch (OvS) v2.7.0, there is a buffer over-read while parsing the group mod OpenFlow message sent from the controller in `lib/ofp-util.c` in the function `ofputil_pull_ofp15_group_mod`.
- https://access.redhat.com/errata/RHSA-2017:2418
- https://access.redhat.com/errata/RHSA-2017:2553
- https://access.redhat.com/errata/RHSA-2017:2648
- https://access.redhat.com/errata/RHSA-2017:2665
- https://access.redhat.com/errata/RHSA-2017:2692
- https://access.redhat.com/errata/RHSA-2017:2698
- https://access.redhat.com/errata/RHSA-2017:2727
- https://mail.openvswitch.org/pipermail/ovs-dev/2017-May/332965.html
- https://access.redhat.com/errata/RHSA-2017:2418
- https://access.redhat.com/errata/RHSA-2017:2553
- https://access.redhat.com/errata/RHSA-2017:2648
- https://access.redhat.com/errata/RHSA-2017:2665
- https://access.redhat.com/errata/RHSA-2017:2692
- https://access.redhat.com/errata/RHSA-2017:2698
- https://access.redhat.com/errata/RHSA-2017:2727
- https://mail.openvswitch.org/pipermail/ovs-dev/2017-May/332965.html
Modified: 2025-05-21
CVE-2022-32166
In ovs versions v0.90.0 through v2.5.0 are vulnerable to heap buffer over-read in flow.c. An unsafe comparison of “minimasks” function could lead access to an unmapped region of memory. This vulnerability is capable of crashing the software, memory modification, and possible remote execution.
- https://github.com/cloudbase/ovs/commit/2ed6505555cdcb46f9b1f0329d1491b75290fc73
- https://lists.debian.org/debian-lts-announce/2022/10/msg00036.html
- https://www.mend.io/vulnerability-database/CVE-2022-32166
- https://github.com/cloudbase/ovs/commit/2ed6505555cdcb46f9b1f0329d1491b75290fc73
- https://lists.debian.org/debian-lts-announce/2022/10/msg00036.html
- https://www.mend.io/vulnerability-database/CVE-2022-32166
Closed vulnerabilities
Modified: 2024-07-05
BDU:2015-03479
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2025-04-09
CVE-2009-2288
statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) ping or (2) Traceroute parameters.
- http://marc.info/?l=bugtraq&m=126996888626964&w=2
- http://secunia.com/advisories/35543
- http://secunia.com/advisories/35688
- http://secunia.com/advisories/35692
- http://secunia.com/advisories/39227
- http://security.gentoo.org/glsa/glsa-200907-15.xml
- http://tracker.nagios.org/view.php?id=15
- http://www.debian.org/security/2009/dsa-1825
- http://www.nagios.org/development/history/core-3x/
- http://www.securitytracker.com/id?1022503
- http://www.ubuntu.com/usn/USN-795-1
- http://www.vupen.com/english/advisories/2010/0750
- http://marc.info/?l=bugtraq&m=126996888626964&w=2
- http://secunia.com/advisories/35543
- http://secunia.com/advisories/35688
- http://secunia.com/advisories/35692
- http://secunia.com/advisories/39227
- http://security.gentoo.org/glsa/glsa-200907-15.xml
- http://tracker.nagios.org/view.php?id=15
- http://www.debian.org/security/2009/dsa-1825
- http://www.nagios.org/development/history/core-3x/
- http://www.securitytracker.com/id?1022503
- http://www.ubuntu.com/usn/USN-795-1
- http://www.vupen.com/english/advisories/2010/0750
Modified: 2025-04-11
CVE-2011-1523
Cross-site scripting (XSS) vulnerability in statusmap.c in statusmap.cgi in Nagios 3.2.3 and earlier allows remote attackers to inject arbitrary web script or HTML via the layer parameter.
- http://openwall.com/lists/oss-security/2011/03/25/3
- http://openwall.com/lists/oss-security/2011/03/28/4
- http://secunia.com/advisories/43287
- http://secunia.com/advisories/44974
- http://securityreason.com/securityalert/8241
- http://tracker.nagios.org/view.php?id=207
- http://www.rul3z.de/advisories/SSCHADV2011-002.txt
- http://www.ubuntu.com/usn/USN-1151-1
- https://bugzilla.redhat.com/show_bug.cgi?id=690877
- http://openwall.com/lists/oss-security/2011/03/25/3
- http://openwall.com/lists/oss-security/2011/03/28/4
- http://secunia.com/advisories/43287
- http://secunia.com/advisories/44974
- http://securityreason.com/securityalert/8241
- http://tracker.nagios.org/view.php?id=207
- http://www.rul3z.de/advisories/SSCHADV2011-002.txt
- http://www.ubuntu.com/usn/USN-1151-1
- https://bugzilla.redhat.com/show_bug.cgi?id=690877
Modified: 2025-04-11
CVE-2012-6096
Multiple stack-based buffer overflows in the get_history function in history.cgi in Nagios Core before 3.4.4, and Icinga 1.6.x before 1.6.2, 1.7.x before 1.7.4, and 1.8.x before 1.8.4, might allow remote attackers to execute arbitrary code via a long (1) host_name variable (host parameter) or (2) svc_description variable.
- http://lists.grok.org.uk/pipermail/full-disclosure/2012-December/089125.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00033.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00060.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00077.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00088.html
- http://secunia.com/advisories/51863
- http://www.debian.org/security/2013/dsa-2616
- http://www.debian.org/security/2013/dsa-2653
- http://www.exploit-db.com/exploits/24084
- http://www.exploit-db.com/exploits/24159
- http://www.nagios.org/projects/nagioscore/history/core-3x
- http://www.osvdb.org/89170
- http://www.securityfocus.com/bid/56879
- https://bugzilla.redhat.com/show_bug.cgi?id=893269
- https://dev.icinga.org/issues/3532
- https://www.icinga.org/2013/01/14/icinga-1-6-2-1-7-4-1-8-4-released/
- http://lists.grok.org.uk/pipermail/full-disclosure/2012-December/089125.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00033.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00060.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00077.html
- http://lists.opensuse.org/opensuse-updates/2013-01/msg00088.html
- http://secunia.com/advisories/51863
- http://www.debian.org/security/2013/dsa-2616
- http://www.debian.org/security/2013/dsa-2653
- http://www.exploit-db.com/exploits/24084
- http://www.exploit-db.com/exploits/24159
- http://www.nagios.org/projects/nagioscore/history/core-3x
- http://www.osvdb.org/89170
- http://www.securityfocus.com/bid/56879
- https://bugzilla.redhat.com/show_bug.cgi?id=893269
- https://dev.icinga.org/issues/3532
- https://www.icinga.org/2013/01/14/icinga-1-6-2-1-7-4-1-8-4-released/
Modified: 2025-04-11
CVE-2013-2214
status.cgi in Nagios 4.0 before 4.0 beta4 and 3.x before 3.5.1 does not properly restrict access to certain users that are a contact for a service, which allows remote authenticated users to obtain sensitive information about hostnames via the servicegroup (1) overview, (2) summary, or (3) grid style in status.cgi. NOTE: this behavior is by design in most 3.x versions, but the upstream vendor "decided to change it for Nagios 4" and 3.5.1.
- http://lists.opensuse.org/opensuse-updates/2013-07/msg00029.html
- http://lists.opensuse.org/opensuse-updates/2013-07/msg00031.html
- http://seclists.org/oss-sec/2013/q2/619
- http://seclists.org/oss-sec/2013/q2/622
- http://tracker.nagios.org/view.php?id=456
- http://lists.opensuse.org/opensuse-updates/2013-07/msg00029.html
- http://lists.opensuse.org/opensuse-updates/2013-07/msg00031.html
- http://seclists.org/oss-sec/2013/q2/619
- http://seclists.org/oss-sec/2013/q2/622
- http://tracker.nagios.org/view.php?id=456
Modified: 2025-04-11
CVE-2013-7108
Multiple off-by-one errors in Nagios Core 3.5.1, 4.0.2, and earlier, and Icinga before 1.8.5, 1.9 before 1.9.4, and 1.10 before 1.10.2 allow remote authenticated users to obtain sensitive information from process memory or cause a denial of service (crash) via a long string in the last key value in the variable list to the process_cgivars function in (1) avail.c, (2) cmd.c, (3) config.c, (4) extinfo.c, (5) histogram.c, (6) notifications.c, (7) outages.c, (8) status.c, (9) statusmap.c, (10) summary.c, and (11) trends.c in cgi/, which triggers a heap-based buffer over-read.
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00010.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00028.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00046.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00068.html
- http://secunia.com/advisories/55976
- http://secunia.com/advisories/56316
- http://sourceforge.net/p/nagios/nagioscore/ci/d97e03f32741a7d851826b03ed73ff4c9612a866/
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:004
- http://www.openwall.com/lists/oss-security/2013/12/24/1
- http://www.securityfocus.com/bid/64363
- https://dev.icinga.org/issues/5251
- https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html
- https://www.icinga.org/2013/12/17/icinga-security-releases-1-10-2-1-9-4-1-8-5/
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00010.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00028.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00046.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00068.html
- http://secunia.com/advisories/55976
- http://secunia.com/advisories/56316
- http://sourceforge.net/p/nagios/nagioscore/ci/d97e03f32741a7d851826b03ed73ff4c9612a866/
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:004
- http://www.openwall.com/lists/oss-security/2013/12/24/1
- http://www.securityfocus.com/bid/64363
- https://dev.icinga.org/issues/5251
- https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html
- https://www.icinga.org/2013/12/17/icinga-security-releases-1-10-2-1-9-4-1-8-5/
Modified: 2025-04-11
CVE-2013-7205
Off-by-one error in the process_cgivars function in contrib/daemonchk.c in Nagios Core 3.5.1, 4.0.2, and earlier allows remote authenticated users to obtain sensitive information from process memory or cause a denial of service (crash) via a long string in the last key value in the variable list, which triggers a heap-based buffer over-read.
- http://secunia.com/advisories/55976
- http://sourceforge.net/p/nagios/nagioscore/ci/d97e03f32741a7d851826b03ed73ff4c9612a866/
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:004
- http://www.openwall.com/lists/oss-security/2013/12/24/1
- http://www.securityfocus.com/bid/64489
- https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html
- http://secunia.com/advisories/55976
- http://sourceforge.net/p/nagios/nagioscore/ci/d97e03f32741a7d851826b03ed73ff4c9612a866/
- http://www.mandriva.com/security/advisories?name=MDVSA-2014:004
- http://www.openwall.com/lists/oss-security/2013/12/24/1
- http://www.securityfocus.com/bid/64489
- https://lists.debian.org/debian-lts-announce/2018/12/msg00014.html