ALT-BU-2017-3387-1
Branch c8 update bulletin.
Package openvswitch updated to version 2.7.2-alt0.M80C.1 for branch c8 in task 189231.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2016-2074
Buffer overflow in lib/flow.c in ovs-vswitchd in Open vSwitch 2.2.x and 2.3.x before 2.3.3 and 2.4.x before 2.4.1 allows remote attackers to execute arbitrary code via crafted MPLS packets, as demonstrated by a long string in an ovs-appctl command.
- [ovs-announce] 20160328 CVE-2016-2074: MPLS buffer overflow vulnerabilities in Open vSwitch
- [ovs-announce] 20160328 CVE-2016-2074: MPLS buffer overflow vulnerabilities in Open vSwitch
- [ovs-announce] 20160328 Open vSwitch 2.4.1 and 2.3.3 Available
- [ovs-announce] 20160328 Open vSwitch 2.4.1 and 2.3.3 Available
- RHSA-2016:0523
- RHSA-2016:0523
- RHSA-2016:0524
- RHSA-2016:0524
- RHSA-2016:0537
- RHSA-2016:0537
- DSA-3533
- DSA-3533
- 85700
- 85700
- RHSA-2016:0615
- RHSA-2016:0615
- https://bugzilla.redhat.com/show_bug.cgi?id=1318553
- https://bugzilla.redhat.com/show_bug.cgi?id=1318553
- GLSA-201701-07
- GLSA-201701-07
- https://security-tracker.debian.org/tracker/CVE-2016-2074
- https://security-tracker.debian.org/tracker/CVE-2016-2074
- https://support.citrix.com/article/CTX232655
- https://support.citrix.com/article/CTX232655
Modified: 2024-11-21
CVE-2017-9214
In Open vSwitch (OvS) 2.7.0, while parsing an OFPT_QUEUE_GET_CONFIG_REPLY type OFP 1.0 message, there is a buffer over-read that is caused by an unsigned integer underflow in the function `ofputil_pull_queue_get_config_reply10` in `lib/ofp-util.c`.
- RHSA-2017:2418
- RHSA-2017:2418
- RHSA-2017:2553
- RHSA-2017:2553
- RHSA-2017:2648
- RHSA-2017:2648
- RHSA-2017:2665
- RHSA-2017:2665
- RHSA-2017:2692
- RHSA-2017:2692
- RHSA-2017:2698
- RHSA-2017:2698
- RHSA-2017:2727
- RHSA-2017:2727
- [debian-lts-announce] 20210219 [SECURITY] [DLA 2571-1] openvswitch security update
- [debian-lts-announce] 20210219 [SECURITY] [DLA 2571-1] openvswitch security update
- https://mail.openvswitch.org/pipermail/ovs-dev/2017-May/332711.html
- https://mail.openvswitch.org/pipermail/ovs-dev/2017-May/332711.html
Modified: 2024-11-21
CVE-2017-9263
In Open vSwitch (OvS) 2.7.0, while parsing an OpenFlow role status message, there is a call to the abort() function for undefined role status reasons in the function `ofp_print_role_status_message` in `lib/ofp-print.c` that may be leveraged toward a remote DoS attack by a malicious switch.
- RHSA-2017:2418
- RHSA-2017:2418
- RHSA-2017:2553
- RHSA-2017:2553
- RHSA-2017:2648
- RHSA-2017:2648
- RHSA-2017:2665
- RHSA-2017:2665
- RHSA-2017:2692
- RHSA-2017:2692
- RHSA-2017:2698
- RHSA-2017:2698
- RHSA-2017:2727
- RHSA-2017:2727
- https://mail.openvswitch.org/pipermail/ovs-dev/2017-May/332966.html
- https://mail.openvswitch.org/pipermail/ovs-dev/2017-May/332966.html
Modified: 2024-11-21
CVE-2017-9265
In Open vSwitch (OvS) v2.7.0, there is a buffer over-read while parsing the group mod OpenFlow message sent from the controller in `lib/ofp-util.c` in the function `ofputil_pull_ofp15_group_mod`.
- RHSA-2017:2418
- RHSA-2017:2418
- RHSA-2017:2553
- RHSA-2017:2553
- RHSA-2017:2648
- RHSA-2017:2648
- RHSA-2017:2665
- RHSA-2017:2665
- RHSA-2017:2692
- RHSA-2017:2692
- RHSA-2017:2698
- RHSA-2017:2698
- RHSA-2017:2727
- RHSA-2017:2727
- https://mail.openvswitch.org/pipermail/ovs-dev/2017-May/332965.html
- https://mail.openvswitch.org/pipermail/ovs-dev/2017-May/332965.html
Modified: 2024-11-21
CVE-2022-32166
In ovs versions v0.90.0 through v2.5.0 are vulnerable to heap buffer over-read in flow.c. An unsafe comparison of “minimasks” function could lead access to an unmapped region of memory. This vulnerability is capable of crashing the software, memory modification, and possible remote execution.
- https://github.com/cloudbase/ovs/commit/2ed6505555cdcb46f9b1f0329d1491b75290fc73
- https://github.com/cloudbase/ovs/commit/2ed6505555cdcb46f9b1f0329d1491b75290fc73
- [debian-lts-announce] 20221029 [SECURITY] [DLA 3168-1] openvswitch security update
- [debian-lts-announce] 20221029 [SECURITY] [DLA 3168-1] openvswitch security update
- https://www.mend.io/vulnerability-database/CVE-2022-32166
- https://www.mend.io/vulnerability-database/CVE-2022-32166
Closed vulnerabilities
BDU:2015-03479
Уязвимости операционной системы Debian GNU/Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2024-11-21
CVE-2009-2288
statuswml.cgi in Nagios before 3.1.1 allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) ping or (2) Traceroute parameters.
- HPSBMA02513
- HPSBMA02513
- SSRT090110
- SSRT090110
- 35543
- 35543
- 35688
- 35688
- 35692
- 35692
- 39227
- 39227
- GLSA-200907-15
- GLSA-200907-15
- http://tracker.nagios.org/view.php?id=15
- http://tracker.nagios.org/view.php?id=15
- DSA-1825
- DSA-1825
- http://www.nagios.org/development/history/core-3x/
- http://www.nagios.org/development/history/core-3x/
- 1022503
- 1022503
- USN-795-1
- USN-795-1
- ADV-2010-0750
- ADV-2010-0750
Modified: 2024-11-21
CVE-2011-1523
Cross-site scripting (XSS) vulnerability in statusmap.c in statusmap.cgi in Nagios 3.2.3 and earlier allows remote attackers to inject arbitrary web script or HTML via the layer parameter.
- [oss-security] 20110325 CVE Request -- Nagios -- XSS in the network status map CGI script
- [oss-security] 20110328 Re: CVE Request -- Nagios -- XSS in the network status map CGI script
- 43287
- 44974
- 8241
- http://tracker.nagios.org/view.php?id=207
- http://www.rul3z.de/advisories/SSCHADV2011-002.txt
- USN-1151-1
- https://bugzilla.redhat.com/show_bug.cgi?id=690877
- [oss-security] 20110325 CVE Request -- Nagios -- XSS in the network status map CGI script
- https://bugzilla.redhat.com/show_bug.cgi?id=690877
- USN-1151-1
- http://www.rul3z.de/advisories/SSCHADV2011-002.txt
- http://tracker.nagios.org/view.php?id=207
- 8241
- 44974
- 43287
- [oss-security] 20110328 Re: CVE Request -- Nagios -- XSS in the network status map CGI script
Modified: 2024-11-21
CVE-2012-6096
Multiple stack-based buffer overflows in the get_history function in history.cgi in Nagios Core before 3.4.4, and Icinga 1.6.x before 1.6.2, 1.7.x before 1.7.4, and 1.8.x before 1.8.4, might allow remote attackers to execute arbitrary code via a long (1) host_name variable (host parameter) or (2) svc_description variable.
- 20121209 Nagios Core 3.4.3: Stack based buffer overflow in web interface
- 20121209 Nagios Core 3.4.3: Stack based buffer overflow in web interface
- openSUSE-SU-2013:0140
- openSUSE-SU-2013:0140
- openSUSE-SU-2013:0169
- openSUSE-SU-2013:0169
- openSUSE-SU-2013:0188
- openSUSE-SU-2013:0188
- openSUSE-SU-2013:0206
- openSUSE-SU-2013:0206
- 51863
- 51863
- DSA-2616
- DSA-2616
- DSA-2653
- DSA-2653
- 24084
- 24084
- 24159
- 24159
- http://www.nagios.org/projects/nagioscore/history/core-3x
- http://www.nagios.org/projects/nagioscore/history/core-3x
- 89170
- 89170
- 56879
- 56879
- https://bugzilla.redhat.com/show_bug.cgi?id=893269
- https://bugzilla.redhat.com/show_bug.cgi?id=893269
- https://dev.icinga.org/issues/3532
- https://dev.icinga.org/issues/3532
- https://www.icinga.org/2013/01/14/icinga-1-6-2-1-7-4-1-8-4-released/
- https://www.icinga.org/2013/01/14/icinga-1-6-2-1-7-4-1-8-4-released/
Modified: 2024-11-21
CVE-2013-2214
status.cgi in Nagios 4.0 before 4.0 beta4 and 3.x before 3.5.1 does not properly restrict access to certain users that are a contact for a service, which allows remote authenticated users to obtain sensitive information about hostnames via the servicegroup (1) overview, (2) summary, or (3) grid style in status.cgi. NOTE: this behavior is by design in most 3.x versions, but the upstream vendor "decided to change it for Nagios 4" and 3.5.1.
- openSUSE-SU-2013:1158
- openSUSE-SU-2013:1158
- openSUSE-SU-2013:1160
- openSUSE-SU-2013:1160
- [oss-security] 20130626 CVE request: unauthorized host/service views displayed in servicegroup view
- [oss-security] 20130626 CVE request: unauthorized host/service views displayed in servicegroup view
- [oss-security] 20130626 Re: CVE request: unauthorized host/service views displayed in servicegroup view
- [oss-security] 20130626 Re: CVE request: unauthorized host/service views displayed in servicegroup view
- http://tracker.nagios.org/view.php?id=456
- http://tracker.nagios.org/view.php?id=456
Modified: 2024-11-21
CVE-2013-7108
Multiple off-by-one errors in Nagios Core 3.5.1, 4.0.2, and earlier, and Icinga before 1.8.5, 1.9 before 1.9.4, and 1.10 before 1.10.2 allow remote authenticated users to obtain sensitive information from process memory or cause a denial of service (crash) via a long string in the last key value in the variable list to the process_cgivars function in (1) avail.c, (2) cmd.c, (3) config.c, (4) extinfo.c, (5) histogram.c, (6) notifications.c, (7) outages.c, (8) status.c, (9) statusmap.c, (10) summary.c, and (11) trends.c in cgi/, which triggers a heap-based buffer over-read.
- openSUSE-SU-2014:0016
- openSUSE-SU-2014:0016
- openSUSE-SU-2014:0039
- openSUSE-SU-2014:0039
- openSUSE-SU-2014:0069
- openSUSE-SU-2014:0069
- openSUSE-SU-2014:0097
- openSUSE-SU-2014:0097
- 55976
- 55976
- 56316
- 56316
- http://sourceforge.net/p/nagios/nagioscore/ci/d97e03f32741a7d851826b03ed73ff4c9612a866/
- http://sourceforge.net/p/nagios/nagioscore/ci/d97e03f32741a7d851826b03ed73ff4c9612a866/
- MDVSA-2014:004
- MDVSA-2014:004
- [oss-security] 20131224 Re: CVE request: denial of service in Nagios (process_cgivars())
- [oss-security] 20131224 Re: CVE request: denial of service in Nagios (process_cgivars())
- 64363
- 64363
- https://dev.icinga.org/issues/5251
- https://dev.icinga.org/issues/5251
- [debian-lts-announce] 20181224 [SECURITY] [DLA 1615-1] nagios3 security update
- [debian-lts-announce] 20181224 [SECURITY] [DLA 1615-1] nagios3 security update
- https://www.icinga.org/2013/12/17/icinga-security-releases-1-10-2-1-9-4-1-8-5/
- https://www.icinga.org/2013/12/17/icinga-security-releases-1-10-2-1-9-4-1-8-5/
Modified: 2024-11-21
CVE-2013-7205
Off-by-one error in the process_cgivars function in contrib/daemonchk.c in Nagios Core 3.5.1, 4.0.2, and earlier allows remote authenticated users to obtain sensitive information from process memory or cause a denial of service (crash) via a long string in the last key value in the variable list, which triggers a heap-based buffer over-read.
- 55976
- 55976
- http://sourceforge.net/p/nagios/nagioscore/ci/d97e03f32741a7d851826b03ed73ff4c9612a866/
- http://sourceforge.net/p/nagios/nagioscore/ci/d97e03f32741a7d851826b03ed73ff4c9612a866/
- MDVSA-2014:004
- MDVSA-2014:004
- [oss-security] 20131224 Re: CVE request: denial of service in Nagios (process_cgivars())
- [oss-security] 20131224 Re: CVE request: denial of service in Nagios (process_cgivars())
- 64489
- 64489
- [debian-lts-announce] 20181224 [SECURITY] [DLA 1615-1] nagios3 security update
- [debian-lts-announce] 20181224 [SECURITY] [DLA 1615-1] nagios3 security update