aports issueshttps://gitlab.alpinelinux.org/alpine/aports/-/issues2019-07-23T11:53:10Zhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/7361[3.7] openldap: Double free vulnerability in servers/slapd/back-mdb/search.c ...2019-07-23T11:53:10ZAlicha CH[3.7] openldap: Double free vulnerability in servers/slapd/back-mdb/search.c (CVE-2017-9287)servers/slapd/back-mdb/search.c in OpenLDAP through 2.4.44 is prone to a
double free vulnerability. A user with access to search the
directory can crash slapd by issuing a search including the Paged
Results control with a page size of ...servers/slapd/back-mdb/search.c in OpenLDAP through 2.4.44 is prone to a
double free vulnerability. A user with access to search the
directory can crash slapd by issuing a search including the Paged
Results control with a page size of 0.
### Reference:
https://nvd.nist.gov/vuln/detail/CVE-2017-9287
### Patch:
https://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commit;h=0cee1ffb6021b1aae3fcc9581699da1c85a6dd6e
*(from redmine: issue id 7361, created on 2017-06-01, closed on 2017-06-15)*
* Relations:
* parent #73603.7.0Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/7360openldap: Double free vulnerability in servers/slapd/back-mdb/search.c (CVE-2...2019-07-23T11:53:11ZAlicha CHopenldap: Double free vulnerability in servers/slapd/back-mdb/search.c (CVE-2017-9287)servers/slapd/back-mdb/search.c in OpenLDAP through 2.4.44 is prone to a
double free vulnerability. A user with access to search the
directory can crash slapd by issuing a search including the Paged
Results control with a page size of ...servers/slapd/back-mdb/search.c in OpenLDAP through 2.4.44 is prone to a
double free vulnerability. A user with access to search the
directory can crash slapd by issuing a search including the Paged
Results control with a page size of 0.
### Reference:
https://nvd.nist.gov/vuln/detail/CVE-2017-9287
### Patch:
https://www.openldap.org/devel/gitweb.cgi?p=openldap.git;a=commit;h=0cee1ffb6021b1aae3fcc9581699da1c85a6dd6e
*(from redmine: issue id 7360, created on 2017-06-01, closed on 2017-06-15)*
* Relations:
* child #7361
* child #7362
* child #7363
* child #7364
* child #7365Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/7359[3.3] zlib: Multiple vulnerabilities (CVE-2016-9840, CVE-2016-9841, CVE-2016-...2019-07-23T11:53:12ZAlicha CH[3.3] zlib: Multiple vulnerabilities (CVE-2016-9840, CVE-2016-9841, CVE-2016-9842, CVE-2016-9843)**CVE-2016-9840**: inftrees.c in zlib 1.2.8 might allow
context-dependent attackers to have unspecified impact by leveraging
improper pointer arithmetic.
### References:
http://seclists.org/oss-sec/2016/q4/602
https://nvd.nist.gov/vu...**CVE-2016-9840**: inftrees.c in zlib 1.2.8 might allow
context-dependent attackers to have unspecified impact by leveraging
improper pointer arithmetic.
### References:
http://seclists.org/oss-sec/2016/q4/602
https://nvd.nist.gov/vuln/detail/CVE-2016-9840
### Patch:
https://github.com/madler/zlib/commit/6a043145ca6e9c55184013841a67b2fef87e44c0
**CVE-2016-9841**: inffast.c in zlib 1.2.8 might allow context-dependent
attackers to have unspecified impact by leveraging improper pointer
arithmetic.
### References:
http://seclists.org/oss-sec/2016/q4/602
https://nvd.nist.gov/vuln/detail/CVE-2016-9841
### Patch:
https://github.com/madler/zlib/commit/9aaec95e82117c1cb0f9624264c3618fc380cecb
**CVE-2016-9842**: The inflateMark function in inflate.c in zlib 1.2.8
might allow context-dependent attackers to have unspecified impact
via vectors involving left shifts of negative integers.
### References:
http://seclists.org/oss-sec/2016/q4/602
https://nvd.nist.gov/vuln/detail/CVE-2016-9842
### Patch:
https://github.com/madler/zlib/commit/e54e1299404101a5a9d0cf5e45512b543967f958
**CVE-2016-9843**: The crc32\_big function in crc32.c in zlib 1.2.8
might allow context-dependent attackers to have unspecified impact via
vectors involving big-endian CRC calculation.
### References:
http://seclists.org/oss-sec/2016/q4/602
https://nvd.nist.gov/vuln/detail/CVE-2016-9843
### Patch:
https://github.com/madler/zlib/commit/d1d577490c15a0c6862473d7576352a9f18ef811
*(from redmine: issue id 7359, created on 2017-06-01, closed on 2017-06-01)*
* Relations:
* parent #7356
* Changesets:
* Revision 7b52a76dd3513db686d4937fbc144f188ef101fa by Natanael Copa on 2017-06-01T11:31:20Z:
```
main/zlib: security upgrade to 1.2.11
CVE-2016-9840
CVE-2016-9841
CVE-2016-9842
CVE-2016-9843
fixes #7359
```3.3.4Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/7358[3.4] zlib: Multiple vulnerabilities (CVE-2016-9840, CVE-2016-9841, CVE-2016-...2019-07-23T11:53:13ZAlicha CH[3.4] zlib: Multiple vulnerabilities (CVE-2016-9840, CVE-2016-9841, CVE-2016-9842, CVE-2016-9843)**CVE-2016-9840**: inftrees.c in zlib 1.2.8 might allow
context-dependent attackers to have unspecified impact by leveraging
improper pointer arithmetic.
### References:
http://seclists.org/oss-sec/2016/q4/602
https://nvd.nist.gov/vu...**CVE-2016-9840**: inftrees.c in zlib 1.2.8 might allow
context-dependent attackers to have unspecified impact by leveraging
improper pointer arithmetic.
### References:
http://seclists.org/oss-sec/2016/q4/602
https://nvd.nist.gov/vuln/detail/CVE-2016-9840
### Patch:
https://github.com/madler/zlib/commit/6a043145ca6e9c55184013841a67b2fef87e44c0
**CVE-2016-9841**: inffast.c in zlib 1.2.8 might allow context-dependent
attackers to have unspecified impact by leveraging improper pointer
arithmetic.
### References:
http://seclists.org/oss-sec/2016/q4/602
https://nvd.nist.gov/vuln/detail/CVE-2016-9841
### Patch:
https://github.com/madler/zlib/commit/9aaec95e82117c1cb0f9624264c3618fc380cecb
**CVE-2016-9842**: The inflateMark function in inflate.c in zlib 1.2.8
might allow context-dependent attackers to have unspecified impact
via vectors involving left shifts of negative integers.
### References:
http://seclists.org/oss-sec/2016/q4/602
https://nvd.nist.gov/vuln/detail/CVE-2016-9842
### Patch:
https://github.com/madler/zlib/commit/e54e1299404101a5a9d0cf5e45512b543967f958
**CVE-2016-9843**: The crc32\_big function in crc32.c in zlib 1.2.8
might allow context-dependent attackers to have unspecified impact via
vectors involving big-endian CRC calculation.
### References:
http://seclists.org/oss-sec/2016/q4/602
https://nvd.nist.gov/vuln/detail/CVE-2016-9843
### Patch:
https://github.com/madler/zlib/commit/d1d577490c15a0c6862473d7576352a9f18ef811
*(from redmine: issue id 7358, created on 2017-06-01, closed on 2017-06-01)*
* Relations:
* parent #7356
* Changesets:
* Revision 6d398ff0e70f7a9b420319047051b4d7c7e42f17 by Natanael Copa on 2017-06-01T11:30:04Z:
```
main/zlib: security upgrade to 1.2.11
CVE-2016-9840
CVE-2016-9841
CVE-2016-9842
CVE-2016-9843
fixes #7358
```3.4.7Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/7357[3.5] zlib: Multiple vulnerabilities (CVE-2016-9840, CVE-2016-9841, CVE-2016-...2019-07-23T11:53:14ZAlicha CH[3.5] zlib: Multiple vulnerabilities (CVE-2016-9840, CVE-2016-9841, CVE-2016-9842, CVE-2016-9843)**CVE-2016-9840**: inftrees.c in zlib 1.2.8 might allow
context-dependent attackers to have unspecified impact by leveraging
improper pointer arithmetic.
### References:
http://seclists.org/oss-sec/2016/q4/602
https://nvd.nist.gov/vu...**CVE-2016-9840**: inftrees.c in zlib 1.2.8 might allow
context-dependent attackers to have unspecified impact by leveraging
improper pointer arithmetic.
### References:
http://seclists.org/oss-sec/2016/q4/602
https://nvd.nist.gov/vuln/detail/CVE-2016-9840
### Patch:
https://github.com/madler/zlib/commit/6a043145ca6e9c55184013841a67b2fef87e44c0
**CVE-2016-9841**: inffast.c in zlib 1.2.8 might allow context-dependent
attackers to have unspecified impact by leveraging improper pointer
arithmetic.
### References:
http://seclists.org/oss-sec/2016/q4/602
https://nvd.nist.gov/vuln/detail/CVE-2016-9841
### Patch:
https://github.com/madler/zlib/commit/9aaec95e82117c1cb0f9624264c3618fc380cecb
**CVE-2016-9842**: The inflateMark function in inflate.c in zlib 1.2.8
might allow context-dependent attackers to have unspecified impact
via vectors involving left shifts of negative integers.
### References:
http://seclists.org/oss-sec/2016/q4/602
https://nvd.nist.gov/vuln/detail/CVE-2016-9842
### Patch:
https://github.com/madler/zlib/commit/e54e1299404101a5a9d0cf5e45512b543967f958
**CVE-2016-9843**: The crc32\_big function in crc32.c in zlib 1.2.8
might allow context-dependent attackers to have unspecified impact via
vectors involving big-endian CRC calculation.
### References:
http://seclists.org/oss-sec/2016/q4/602
https://nvd.nist.gov/vuln/detail/CVE-2016-9843
### Patch:
https://github.com/madler/zlib/commit/d1d577490c15a0c6862473d7576352a9f18ef811
*(from redmine: issue id 7357, created on 2017-06-01, closed on 2017-06-01)*
* Relations:
* parent #7356
* Changesets:
* Revision 7976522ac026c1430e4dfe2ac2bf27d9e624d57b by Natanael Copa on 2017-06-01T11:23:41Z:
```
main/zlib: security upgrade to 1.2.11
CVE-2016-9840
CVE-2016-9841
CVE-2016-9842
CVE-2016-9843
fixes #7357
```3.5.3Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/7356zlib: Multiple vulnerabilities (CVE-2016-9840, CVE-2016-9841, CVE-2016-9842, ...2019-07-23T11:53:15ZAlicha CHzlib: Multiple vulnerabilities (CVE-2016-9840, CVE-2016-9841, CVE-2016-9842, CVE-2016-9843)**CVE-2016-9840**: inftrees.c in zlib 1.2.8 might allow
context-dependent attackers to have unspecified impact by leveraging
improper pointer arithmetic.
### References:
http://seclists.org/oss-sec/2016/q4/602
https://nvd.nist.gov/vu...**CVE-2016-9840**: inftrees.c in zlib 1.2.8 might allow
context-dependent attackers to have unspecified impact by leveraging
improper pointer arithmetic.
### References:
http://seclists.org/oss-sec/2016/q4/602
https://nvd.nist.gov/vuln/detail/CVE-2016-9840
### Patch:
https://github.com/madler/zlib/commit/6a043145ca6e9c55184013841a67b2fef87e44c0
**CVE-2016-9841**: inffast.c in zlib 1.2.8 might allow context-dependent
attackers to have unspecified impact by leveraging improper pointer
arithmetic.
### References:
http://seclists.org/oss-sec/2016/q4/602
https://nvd.nist.gov/vuln/detail/CVE-2016-9841
### Patch:
https://github.com/madler/zlib/commit/9aaec95e82117c1cb0f9624264c3618fc380cecb
**CVE-2016-9842**: The inflateMark function in inflate.c in zlib 1.2.8
might allow context-dependent attackers to have unspecified impact
via vectors involving left shifts of negative integers.
### References:
http://seclists.org/oss-sec/2016/q4/602
https://nvd.nist.gov/vuln/detail/CVE-2016-9842
### Patch:
https://github.com/madler/zlib/commit/e54e1299404101a5a9d0cf5e45512b543967f958
**CVE-2016-9843**: The crc32\_big function in crc32.c in zlib 1.2.8
might allow context-dependent attackers to have unspecified impact via
vectors involving big-endian CRC calculation.
### References:
http://seclists.org/oss-sec/2016/q4/602
https://nvd.nist.gov/vuln/detail/CVE-2016-9843
### Patch:
https://github.com/madler/zlib/commit/d1d577490c15a0c6862473d7576352a9f18ef811
*(from redmine: issue id 7356, created on 2017-06-01, closed on 2017-06-01)*
* Relations:
* child #7357
* child #7358
* child #7359Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/7350[3.3] strongswan: Multiple vulnerabilities (CVE-2017-9022, CVE-2017-9023)2019-07-23T11:53:19ZAlicha CH[3.3] strongswan: Multiple vulnerabilities (CVE-2017-9022, CVE-2017-9023)CVE-2017-9022: Insufficient validation of RSA public keys passed to the gmp plugin
----------------------------------------------------------------------------------
RSA public keys passed to the gmp plugin aren’t validated sufficiently...CVE-2017-9022: Insufficient validation of RSA public keys passed to the gmp plugin
----------------------------------------------------------------------------------
RSA public keys passed to the gmp plugin aren’t validated sufficiently
before attempting signature verification, so that invalid input might
lead to a floating point
exception and crash of the process. A certificate with an appropriately
prepared public key sent by a peer could be used for a denial-of-service
attack.
### Affected versions:
All versions since 4.4.0, up to and including 5.5.2.
### Fixed In Version:
strongswan 5.5.3
### References:
https://www.strongswan.org/blog/2017/05/30/strongswan-vulnerability-(cve-2017-9022).html
### Patches:
https://download.strongswan.org/security/CVE-2017-9022/
CVE-2017-9023: Incorrect Handling of CHOICE types in ASN.1 parser and x509 plugin
---------------------------------------------------------------------------------
ASN.1 CHOICE types are not correctly handled by the ASN.1 parser when
parsing X.509 certificates with extensions that use such types.
This could lead to infinite looping of the thread parsing a specifically
crafted certificate.
### Affected versions:
All strongSwan versions up to and including 5.5.2
### Fixed In Version:
strongswan 5.5.3
### References:
https://www.strongswan.org/blog/2017/05/30/strongswan-vulnerability-(cve-2017-9023).html
### Patches:
https://download.strongswan.org/security/CVE-2017-9023/
*(from redmine: issue id 7350, created on 2017-05-31, closed on 2017-06-15)*
* Relations:
* parent #7346
* Changesets:
* Revision 9a6a7cfb656f54db0871293e52cee189cab41be3 on 2017-06-15T12:00:18Z:
```
main/strongswan: security fixes #7350 (CVE-2017-9022, CVE-2017-9023)
```3.3.4Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/7349[3.4] strongswan: Multiple vulnerabilities (CVE-2017-9022, CVE-2017-9023)2019-07-23T11:53:21ZAlicha CH[3.4] strongswan: Multiple vulnerabilities (CVE-2017-9022, CVE-2017-9023)CVE-2017-9022: Insufficient validation of RSA public keys passed to the gmp plugin
----------------------------------------------------------------------------------
RSA public keys passed to the gmp plugin aren’t validated sufficiently...CVE-2017-9022: Insufficient validation of RSA public keys passed to the gmp plugin
----------------------------------------------------------------------------------
RSA public keys passed to the gmp plugin aren’t validated sufficiently
before attempting signature verification, so that invalid input might
lead to a floating point
exception and crash of the process. A certificate with an appropriately
prepared public key sent by a peer could be used for a denial-of-service
attack.
### Affected versions:
All versions since 4.4.0, up to and including 5.5.2.
### Fixed In Version:
strongswan 5.5.3
### References:
https://www.strongswan.org/blog/2017/05/30/strongswan-vulnerability-(cve-2017-9022).html
### Patches:
https://download.strongswan.org/security/CVE-2017-9022/
CVE-2017-9023: Incorrect Handling of CHOICE types in ASN.1 parser and x509 plugin
---------------------------------------------------------------------------------
ASN.1 CHOICE types are not correctly handled by the ASN.1 parser when
parsing X.509 certificates with extensions that use such types.
This could lead to infinite looping of the thread parsing a specifically
crafted certificate.
### Affected versions:
All strongSwan versions up to and including 5.5.2
### Fixed In Version:
strongswan 5.5.3
### References:
https://www.strongswan.org/blog/2017/05/30/strongswan-vulnerability-(cve-2017-9023).html
### Patches:
https://download.strongswan.org/security/CVE-2017-9023/
*(from redmine: issue id 7349, created on 2017-05-31, closed on 2017-06-15)*
* Relations:
* parent #7346
* Changesets:
* Revision b9f9484b5a7eb04f6f3f67df3e650e9b4433e99b on 2017-06-15T11:56:26Z:
```
main/strongswan: security fixes #7349 (CVE-2017-9022, CVE-2017-9023)
```3.4.7Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/7348[3.5] strongswan: Multiple vulnerabilities (CVE-2017-9022, CVE-2017-9023)2019-07-23T11:53:22ZAlicha CH[3.5] strongswan: Multiple vulnerabilities (CVE-2017-9022, CVE-2017-9023)CVE-2017-9022: Insufficient validation of RSA public keys passed to the gmp plugin
----------------------------------------------------------------------------------
RSA public keys passed to the gmp plugin aren’t validated sufficiently...CVE-2017-9022: Insufficient validation of RSA public keys passed to the gmp plugin
----------------------------------------------------------------------------------
RSA public keys passed to the gmp plugin aren’t validated sufficiently
before attempting signature verification, so that invalid input might
lead to a floating point
exception and crash of the process. A certificate with an appropriately
prepared public key sent by a peer could be used for a denial-of-service
attack.
### Affected versions:
All versions since 4.4.0, up to and including 5.5.2.
### Fixed In Version:
strongswan 5.5.3
### References:
https://www.strongswan.org/blog/2017/05/30/strongswan-vulnerability-(cve-2017-9022).html
### Patches:
https://download.strongswan.org/security/CVE-2017-9022/
CVE-2017-9023: Incorrect Handling of CHOICE types in ASN.1 parser and x509 plugin
---------------------------------------------------------------------------------
ASN.1 CHOICE types are not correctly handled by the ASN.1 parser when
parsing X.509 certificates with extensions that use such types.
This could lead to infinite looping of the thread parsing a specifically
crafted certificate.
### Affected versions:
All strongSwan versions up to and including 5.5.2
### Fixed In Version:
strongswan 5.5.3
### References:
https://www.strongswan.org/blog/2017/05/30/strongswan-vulnerability-(cve-2017-9023).html
### Patches:
https://download.strongswan.org/security/CVE-2017-9023/
*(from redmine: issue id 7348, created on 2017-05-31, closed on 2017-06-15)*
* Relations:
* parent #7346
* Changesets:
* Revision 82ccbbfff5cbbf01b74519ddd9bc16c487b449e6 by Natanael Copa on 2017-05-31T14:02:55Z:
```
main/strongswan: security upgrade to 5.5.3 (CVE-2017-9022,CVE-2017-9023)
fixes #7348
```3.5.3Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/7347[3.6] strongswan: Multiple vulnerabilities (CVE-2017-9022, CVE-2017-9023)2019-07-23T11:53:23ZAlicha CH[3.6] strongswan: Multiple vulnerabilities (CVE-2017-9022, CVE-2017-9023)CVE-2017-9022: Insufficient validation of RSA public keys passed to the gmp plugin
----------------------------------------------------------------------------------
RSA public keys passed to the gmp plugin aren’t validated sufficiently...CVE-2017-9022: Insufficient validation of RSA public keys passed to the gmp plugin
----------------------------------------------------------------------------------
RSA public keys passed to the gmp plugin aren’t validated sufficiently
before attempting signature verification, so that invalid input might
lead to a floating point
exception and crash of the process. A certificate with an appropriately
prepared public key sent by a peer could be used for a denial-of-service
attack.
### Affected versions:
All versions since 4.4.0, up to and including 5.5.2.
### Fixed In Version:
strongswan 5.5.3
### References:
https://www.strongswan.org/blog/2017/05/30/strongswan-vulnerability-(cve-2017-9022).html
### Patches:
https://download.strongswan.org/security/CVE-2017-9022/
CVE-2017-9023: Incorrect Handling of CHOICE types in ASN.1 parser and x509 plugin
---------------------------------------------------------------------------------
ASN.1 CHOICE types are not correctly handled by the ASN.1 parser when
parsing X.509 certificates with extensions that use such types.
This could lead to infinite looping of the thread parsing a specifically
crafted certificate.
### Affected versions:
All strongSwan versions up to and including 5.5.2
### Fixed In Version:
strongswan 5.5.3
### References:
https://www.strongswan.org/blog/2017/05/30/strongswan-vulnerability-(cve-2017-9023).html
### Patches:
https://download.strongswan.org/security/CVE-2017-9023/
*(from redmine: issue id 7347, created on 2017-05-31, closed on 2017-06-15)*
* Relations:
* parent #7346
* Changesets:
* Revision f647e2d3d31f6c5e3c4f4f41bfbee7eea8d02271 by Natanael Copa on 2017-05-31T10:36:15Z:
```
main/strongswan: security upgrade to 5.5.3 (CVE-2017-9022,CVE-2017-9023)
fixes #7347
```3.6.1Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/7346strongswan: Multiple vulnerabilities (CVE-2017-9022, CVE-2017-9023)2019-07-23T11:53:24ZAlicha CHstrongswan: Multiple vulnerabilities (CVE-2017-9022, CVE-2017-9023)CVE-2017-9022: Insufficient validation of RSA public keys passed to the gmp plugin
----------------------------------------------------------------------------------
RSA public keys passed to the gmp plugin aren’t validated sufficiently...CVE-2017-9022: Insufficient validation of RSA public keys passed to the gmp plugin
----------------------------------------------------------------------------------
RSA public keys passed to the gmp plugin aren’t validated sufficiently
before attempting signature verification, so that invalid input might
lead to a floating point
exception and crash of the process. A certificate with an appropriately
prepared public key sent by a peer could be used for a denial-of-service
attack.
### Affected versions:
All versions since 4.4.0, up to and including 5.5.2.
### Fixed In Version:
strongswan 5.5.3
### References:
https://www.strongswan.org/blog/2017/05/30/strongswan-vulnerability-(cve-2017-9022).html
### Patches:
https://download.strongswan.org/security/CVE-2017-9022/
CVE-2017-9023: Incorrect Handling of CHOICE types in ASN.1 parser and x509 plugin
---------------------------------------------------------------------------------
ASN.1 CHOICE types are not correctly handled by the ASN.1 parser when
parsing X.509 certificates with extensions that use such types.
This could lead to infinite looping of the thread parsing a specifically
crafted certificate.
### Affected versions:
All strongSwan versions up to and including 5.5.2
### Fixed In Version:
strongswan 5.5.3
### References:
https://www.strongswan.org/blog/2017/05/30/strongswan-vulnerability-(cve-2017-9023).html
### Patches:
https://download.strongswan.org/security/CVE-2017-9023/
*(from redmine: issue id 7346, created on 2017-05-31, closed on 2017-06-15)*
* Relations:
* child #7347
* child #7348
* child #7349
* child #7350Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/7331[3.3] libtasn1: asn1_find_node() based stackoverflow (CVE-2017-6891)2019-07-23T11:53:31ZAlicha CH[3.3] libtasn1: asn1_find_node() based stackoverflow (CVE-2017-6891)Two errors in the “asn1\_find\_node()” function (lib/parser\_aux.c)
within GnuTLS libtasn1 version 4.10 can be exploited to cause a
stacked-based
buffer overflow by tricking a user into processing a specially crafted
assignments file v...Two errors in the “asn1\_find\_node()” function (lib/parser\_aux.c)
within GnuTLS libtasn1 version 4.10 can be exploited to cause a
stacked-based
buffer overflow by tricking a user into processing a specially crafted
assignments file via the e.g. asn1Coding utility.
### References:
https://secuniaresearch.flexerasoftware.com/secunia\_research/2017-11/
https://nvd.nist.gov/vuln/detail/CVE-2017-6891
### Patch:
http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=5520704d075802df25ce4ffccc010ba1641bd484
*(from redmine: issue id 7331, created on 2017-05-25, closed on 2017-05-25)*
* Relations:
* parent #7326
* Changesets:
* Revision 0620c144b585c1544a4ef2cbded07c036ac938ff on 2017-05-25T13:45:13Z:
```
main/libtasn1: security fix for CVE-2017-6891. Fixes #7331
```3.3.4Francesco ColistaFrancesco Colistahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/7330[3.4] libtasn1: asn1_find_node() based stackoverflow (CVE-2017-6891)2019-07-23T11:53:32ZAlicha CH[3.4] libtasn1: asn1_find_node() based stackoverflow (CVE-2017-6891)Two errors in the “asn1\_find\_node()” function (lib/parser\_aux.c)
within GnuTLS libtasn1 version 4.10 can be exploited to cause a
stacked-based
buffer overflow by tricking a user into processing a specially crafted
assignments file v...Two errors in the “asn1\_find\_node()” function (lib/parser\_aux.c)
within GnuTLS libtasn1 version 4.10 can be exploited to cause a
stacked-based
buffer overflow by tricking a user into processing a specially crafted
assignments file via the e.g. asn1Coding utility.
### References:
https://secuniaresearch.flexerasoftware.com/secunia\_research/2017-11/
https://nvd.nist.gov/vuln/detail/CVE-2017-6891
### Patch:
http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=5520704d075802df25ce4ffccc010ba1641bd484
*(from redmine: issue id 7330, created on 2017-05-25, closed on 2017-05-25)*
* Relations:
* parent #7326
* Changesets:
* Revision 6600118fbc5b3bf77dd21d8734636a98d92b5519 on 2017-05-25T13:42:11Z:
```
main/libtasn1: security fix for CVE-2017-6891. Fixes #7330
```3.4.7Francesco ColistaFrancesco Colistahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/7329[3.5] libtasn1: asn1_find_node() based stackoverflow (CVE-2017-6891)2019-07-23T11:53:33ZAlicha CH[3.5] libtasn1: asn1_find_node() based stackoverflow (CVE-2017-6891)Two errors in the “asn1\_find\_node()” function (lib/parser\_aux.c)
within GnuTLS libtasn1 version 4.10 can be exploited to cause a
stacked-based
buffer overflow by tricking a user into processing a specially crafted
assignments file v...Two errors in the “asn1\_find\_node()” function (lib/parser\_aux.c)
within GnuTLS libtasn1 version 4.10 can be exploited to cause a
stacked-based
buffer overflow by tricking a user into processing a specially crafted
assignments file via the e.g. asn1Coding utility.
### References:
https://secuniaresearch.flexerasoftware.com/secunia\_research/2017-11/
https://nvd.nist.gov/vuln/detail/CVE-2017-6891
### Patch:
http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=5520704d075802df25ce4ffccc010ba1641bd484
*(from redmine: issue id 7329, created on 2017-05-25, closed on 2017-05-25)*
* Relations:
* parent #7326
* Changesets:
* Revision f3deae790a5e13e6419c1bf4f0c5f62c4d5206db on 2017-05-25T13:46:54Z:
```
main/libtasn1: security fix for CVE-2017-6891. Fixes #7329
```3.5.3Francesco ColistaFrancesco Colistahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/7328[3.6] libtasn1: asn1_find_node() based stackoverflow (CVE-2017-6891)2019-07-23T11:53:34ZAlicha CH[3.6] libtasn1: asn1_find_node() based stackoverflow (CVE-2017-6891)Two errors in the “asn1\_find\_node()” function (lib/parser\_aux.c)
within GnuTLS libtasn1 version 4.10 can be exploited to cause a
stacked-based
buffer overflow by tricking a user into processing a specially crafted
assignments file v...Two errors in the “asn1\_find\_node()” function (lib/parser\_aux.c)
within GnuTLS libtasn1 version 4.10 can be exploited to cause a
stacked-based
buffer overflow by tricking a user into processing a specially crafted
assignments file via the e.g. asn1Coding utility.
### References:
https://secuniaresearch.flexerasoftware.com/secunia\_research/2017-11/
https://nvd.nist.gov/vuln/detail/CVE-2017-6891
### Patch:
http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=5520704d075802df25ce4ffccc010ba1641bd484
*(from redmine: issue id 7328, created on 2017-05-25, closed on 2017-05-25)*
* Relations:
* parent #7326
* Changesets:
* Revision 9c7bef126531b81cd07fa8fb09f8fde105afe6ca on 2017-05-25T13:33:37Z:
```
main/libtasn1: security fix for CVE-2017-6891. Fixes #7328
```3.6.1Francesco ColistaFrancesco Colistahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/7327[3.7] libtasn1: asn1_find_node() based stackoverflow (CVE-2017-6891)2019-07-23T11:53:35ZAlicha CH[3.7] libtasn1: asn1_find_node() based stackoverflow (CVE-2017-6891)Two errors in the “asn1\_find\_node()” function (lib/parser\_aux.c)
within GnuTLS libtasn1 version 4.10 can be exploited to cause a
stacked-based
buffer overflow by tricking a user into processing a specially crafted
assignments file v...Two errors in the “asn1\_find\_node()” function (lib/parser\_aux.c)
within GnuTLS libtasn1 version 4.10 can be exploited to cause a
stacked-based
buffer overflow by tricking a user into processing a specially crafted
assignments file via the e.g. asn1Coding utility.
### References:
https://secuniaresearch.flexerasoftware.com/secunia\_research/2017-11/
https://nvd.nist.gov/vuln/detail/CVE-2017-6891
### Patch:
http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=5520704d075802df25ce4ffccc010ba1641bd484
*(from redmine: issue id 7327, created on 2017-05-25, closed on 2017-05-25)*
* Relations:
* parent #7326
* Changesets:
* Revision 96deb4b1308544a05fef48ef2b2dcc9f868958b1 on 2017-05-25T14:03:12Z:
```
main/libtasn1: security fix for CVE-2017-6891. Fixes #7327
```3.7.0Francesco ColistaFrancesco Colistahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/7326libtasn1: asn1_find_node() based stackoverflow (CVE-2017-6891)2019-07-23T11:53:36ZAlicha CHlibtasn1: asn1_find_node() based stackoverflow (CVE-2017-6891)Two errors in the “asn1\_find\_node()” function (lib/parser\_aux.c)
within GnuTLS libtasn1 version 4.10 can be exploited to cause a
stacked-based
buffer overflow by tricking a user into processing a specially crafted
assignments file v...Two errors in the “asn1\_find\_node()” function (lib/parser\_aux.c)
within GnuTLS libtasn1 version 4.10 can be exploited to cause a
stacked-based
buffer overflow by tricking a user into processing a specially crafted
assignments file via the e.g. asn1Coding utility.
### References:
https://secuniaresearch.flexerasoftware.com/secunia\_research/2017-11/
https://nvd.nist.gov/vuln/detail/CVE-2017-6891
### Patch:
http://git.savannah.gnu.org/gitweb/?p=libtasn1.git;a=commit;h=5520704d075802df25ce4ffccc010ba1641bd484
*(from redmine: issue id 7326, created on 2017-05-25, closed on 2017-05-25)*
* Relations:
* child #7327
* child #7328
* child #7329
* child #7330
* child #7331Francesco ColistaFrancesco Colistahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/7323[3.3] samba: Remote code execution from a writable share (CVE-2017-7494)2019-07-23T11:53:39ZAlicha CH[3.3] samba: Remote code execution from a writable share (CVE-2017-7494)All versions of Samba from 3.5.0 onwards are vulnerable to a remote
code execution vulnerability, allowing a malicious client to upload a
shared library to a writable share, and then cause the server to load
and execute it.
Samba ...All versions of Samba from 3.5.0 onwards are vulnerable to a remote
code execution vulnerability, allowing a malicious client to upload a
shared library to a writable share, and then cause the server to load
and execute it.
Samba 4.6.4, 4.5.10 and 4.4.14 have been issued as
security releases to correct the defect.
### References:
https://www.samba.org/samba/security/CVE-2017-7494.html
https://www.samba.org/samba/history/security.html
*(from redmine: issue id 7323, created on 2017-05-25, closed on 2017-05-25)*
* Relations:
* parent #7319
* Changesets:
* Revision fdb1ee2fe180bd7643e8e92d61bb42f7e4d11913 by Natanael Copa on 2017-05-25T12:06:17Z:
```
main/samba: secfix for CVE-2017-7494
fixes #7323
```3.3.4Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/7322[3.4] samba: Remote code execution from a writable share (CVE-2017-7494)2019-07-23T11:53:40ZAlicha CH[3.4] samba: Remote code execution from a writable share (CVE-2017-7494)All versions of Samba from 3.5.0 onwards are vulnerable to a remote
code execution vulnerability, allowing a malicious client to upload a
shared library to a writable share, and then cause the server to load
and execute it.
Samba ...All versions of Samba from 3.5.0 onwards are vulnerable to a remote
code execution vulnerability, allowing a malicious client to upload a
shared library to a writable share, and then cause the server to load
and execute it.
Samba 4.6.4, 4.5.10 and 4.4.14 have been issued as
security releases to correct the defect.
### References:
https://www.samba.org/samba/security/CVE-2017-7494.html
https://www.samba.org/samba/history/security.html
*(from redmine: issue id 7322, created on 2017-05-25, closed on 2017-05-25)*
* Relations:
* parent #7319
* Changesets:
* Revision f50bb2548152e9b9380afe68212d3f696c0373a3 by Natanael Copa on 2017-05-25T12:59:06Z:
```
main/samba: security upgrade to 4.4.14
fixes #7322
```3.4.7Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/7321[3.5] samba: Remote code execution from a writable share (CVE-2017-7494)2019-07-23T11:53:41ZAlicha CH[3.5] samba: Remote code execution from a writable share (CVE-2017-7494)All versions of Samba from 3.5.0 onwards are vulnerable to a remote
code execution vulnerability, allowing a malicious client to upload a
shared library to a writable share, and then cause the server to load
and execute it.
Samba ...All versions of Samba from 3.5.0 onwards are vulnerable to a remote
code execution vulnerability, allowing a malicious client to upload a
shared library to a writable share, and then cause the server to load
and execute it.
Samba 4.6.4, 4.5.10 and 4.4.14 have been issued as
security releases to correct the defect.
### References:
https://www.samba.org/samba/security/CVE-2017-7494.html
https://www.samba.org/samba/history/security.html
*(from redmine: issue id 7321, created on 2017-05-25, closed on 2017-05-25)*
* Relations:
* parent #7319
* Changesets:
* Revision fcc2d0a8f7aaf4fafdae753b7cd8bae2aa1e5208 on 2017-05-25T12:34:01Z:
```
main/samba: upgrade to 4.5.10. Fixes #7321
```3.5.3Natanael CopaNatanael Copa