aports issueshttps://gitlab.alpinelinux.org/alpine/aports/-/issues2019-07-23T11:56:43Zhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/7076[3.3] putty: Integer overflow in the ssh_agent_channel_data (CVE-2017-6542)2019-07-23T11:56:43ZAlicha CH[3.3] putty: Integer overflow in the ssh_agent_channel_data (CVE-2017-6542)In PuTTY before 0.68, if SSH agent forwarding is enabled, local
attackers
that are also able to connect to the UNIX domain socket could have
overwritten heap data
### Fixed in version:
putty 0.68
### References:
http://www.chiark...In PuTTY before 0.68, if SSH agent forwarding is enabled, local
attackers
that are also able to connect to the UNIX domain socket could have
overwritten heap data
### Fixed in version:
putty 0.68
### References:
http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-agent-fwd-overflow.html
### Patch:
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
*(from redmine: issue id 7076, created on 2017-03-29, closed on 2017-06-29)*
* Relations:
* parent #7073
* Changesets:
* Revision 036366629794e71438e70a3826b53e582abe67b9 on 2017-06-16T06:48:52Z:
```
main/putty: security upgrade to 0.68 (CVE-2017-6542)
Fixes #7076
```3.3.4Jeff Bilykjbilyk@gmail.comJeff Bilykjbilyk@gmail.comhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/7075[3.4] putty: Integer overflow in the ssh_agent_channel_data (CVE-2017-6542)2019-07-23T11:56:44ZAlicha CH[3.4] putty: Integer overflow in the ssh_agent_channel_data (CVE-2017-6542)In PuTTY before 0.68, if SSH agent forwarding is enabled, local
attackers
that are also able to connect to the UNIX domain socket could have
overwritten heap data
### Fixed in version:
putty 0.68
### References:
http://www.chiark...In PuTTY before 0.68, if SSH agent forwarding is enabled, local
attackers
that are also able to connect to the UNIX domain socket could have
overwritten heap data
### Fixed in version:
putty 0.68
### References:
http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-agent-fwd-overflow.html
### Patch:
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
*(from redmine: issue id 7075, created on 2017-03-29, closed on 2017-06-29)*
* Relations:
* parent #7073
* Changesets:
* Revision 93a37684529f20e4a19a6221ef9bc137da102c8a on 2017-06-16T06:44:20Z:
```
main/putty: security upgrade to 0.68 (CVE-2017-6542)
Fixes #7075
```3.4.7Jeff Bilykjbilyk@gmail.comJeff Bilykjbilyk@gmail.comhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/7074[3.5] putty: Integer overflow in the ssh_agent_channel_data (CVE-2017-6542)2019-07-23T11:56:45ZAlicha CH[3.5] putty: Integer overflow in the ssh_agent_channel_data (CVE-2017-6542)In PuTTY before 0.68, if SSH agent forwarding is enabled, local
attackers
that are also able to connect to the UNIX domain socket could have
overwritten heap data
### Fixed in version:
putty 0.68
### References:
http://www.chiark...In PuTTY before 0.68, if SSH agent forwarding is enabled, local
attackers
that are also able to connect to the UNIX domain socket could have
overwritten heap data
### Fixed in version:
putty 0.68
### References:
http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-agent-fwd-overflow.html
### Patch:
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
*(from redmine: issue id 7074, created on 2017-03-29, closed on 2017-06-29)*
* Relations:
* parent #7073
* Changesets:
* Revision a8608eaaf97f3f8c092c7ddfa532205d07168412 by Sergei Lukin on 2017-04-03T10:05:37Z:
```
main/putty: security upgrade to 0.68 - fixes #7074
CVE-2017-6542: Integer overflow in the ssh_agent_channel_data
```3.5.3Jeff Bilykjbilyk@gmail.comJeff Bilykjbilyk@gmail.comhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/7073putty: Integer overflow in the ssh_agent_channel_data (CVE-2017-6542)2019-07-23T11:56:47ZAlicha CHputty: Integer overflow in the ssh_agent_channel_data (CVE-2017-6542)In PuTTY before 0.68, if SSH agent forwarding is enabled, local
attackers
that are also able to connect to the UNIX domain socket could have
overwritten heap data
### Fixed in version:
putty 0.68
### References:
http://www.chiark...In PuTTY before 0.68, if SSH agent forwarding is enabled, local
attackers
that are also able to connect to the UNIX domain socket could have
overwritten heap data
### Fixed in version:
putty 0.68
### References:
http://www.chiark.greenend.org.uk/~sgtatham/putty/wishlist/vuln-agent-fwd-overflow.html
### Patch:
https://git.tartarus.org/?p=simon/putty.git;a=commitdiff;h=4ff22863d895cb7ebfced4cf923a012a614adaa8
*(from redmine: issue id 7073, created on 2017-03-29, closed on 2017-06-29)*
* Relations:
* child #7074
* child #7075
* child #7076
* child #7077Jeff Bilykjbilyk@gmail.comJeff Bilykjbilyk@gmail.comhttps://gitlab.alpinelinux.org/alpine/aports/-/issues/7060[3.2] libxslt: integer overflow in xsltAddTextString (CVE-2017-5029)2019-07-23T11:56:52ZAlicha CH[3.2] libxslt: integer overflow in xsltAddTextString (CVE-2017-5029)The issue can be exploited to trigger an out of bounds write on 64-bit
systems.
### References:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858546
### Patch:
https://git.gnome.org/browse/libxslt/commit/?id=08ab2774b870de1c7b5a4...The issue can be exploited to trigger an out of bounds write on 64-bit
systems.
### References:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858546
### Patch:
https://git.gnome.org/browse/libxslt/commit/?id=08ab2774b870de1c7b5a48693df75e8154addae5
*(from redmine: issue id 7060, created on 2017-03-24, closed on 2017-05-02)*
* Relations:
* parent #7055
* Changesets:
* Revision cc932aa50f5b86563e283c3be8ce3160de5d4698 on 2017-04-26T10:06:45Z:
```
main/libxslt: security fixes #7060 (CVE-2017-5029)
Remove unneeded patches
```3.2.4Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/7059[3.3] libxslt: integer overflow in xsltAddTextString (CVE-2017-5029)2019-07-23T11:56:53ZAlicha CH[3.3] libxslt: integer overflow in xsltAddTextString (CVE-2017-5029)The issue can be exploited to trigger an out of bounds write on 64-bit
systems.
### References:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858546
### Patch:
https://git.gnome.org/browse/libxslt/commit/?id=08ab2774b870de1c7b5a4...The issue can be exploited to trigger an out of bounds write on 64-bit
systems.
### References:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858546
### Patch:
https://git.gnome.org/browse/libxslt/commit/?id=08ab2774b870de1c7b5a48693df75e8154addae5
*(from redmine: issue id 7059, created on 2017-03-24, closed on 2017-05-02)*
* Relations:
* parent #7055
* Changesets:
* Revision 323cb3db2be1984e7d72ad588793c3c876911d93 on 2017-04-26T10:06:07Z:
```
main/libxslt: security fixes #7059 (CVE-2017-5029)
Remove unneeded patches
```3.3.4Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/7058[3.4] libxslt: integer overflow in xsltAddTextString (CVE-2017-5029)2019-07-23T11:56:55ZAlicha CH[3.4] libxslt: integer overflow in xsltAddTextString (CVE-2017-5029)The issue can be exploited to trigger an out of bounds write on 64-bit
systems.
### References:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858546
### Patch:
https://git.gnome.org/browse/libxslt/commit/?id=08ab2774b870de1c7b5a4...The issue can be exploited to trigger an out of bounds write on 64-bit
systems.
### References:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858546
### Patch:
https://git.gnome.org/browse/libxslt/commit/?id=08ab2774b870de1c7b5a48693df75e8154addae5
*(from redmine: issue id 7058, created on 2017-03-24, closed on 2017-05-02)*
* Relations:
* parent #7055
* Changesets:
* Revision 3d0d39b746da41860bae7ee73adc0905db8f15a1 on 2017-04-26T10:04:53Z:
```
main/libxslt: security fixes #7058 (CVE-2017-5029)
Remove unneeded patches
```3.4.7Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/7057[3.5] libxslt: integer overflow in xsltAddTextString (CVE-2017-5029)2019-07-23T11:56:56ZAlicha CH[3.5] libxslt: integer overflow in xsltAddTextString (CVE-2017-5029)The issue can be exploited to trigger an out of bounds write on 64-bit
systems.
### References:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858546
### Patch:
https://git.gnome.org/browse/libxslt/commit/?id=08ab2774b870de1c7b5a4...The issue can be exploited to trigger an out of bounds write on 64-bit
systems.
### References:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858546
### Patch:
https://git.gnome.org/browse/libxslt/commit/?id=08ab2774b870de1c7b5a48693df75e8154addae5
*(from redmine: issue id 7057, created on 2017-03-24, closed on 2017-05-02)*
* Relations:
* parent #70553.5.3Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/7056[3.6] libxslt: integer overflow in xsltAddTextString (CVE-2017-5029)2019-07-23T11:56:57ZAlicha CH[3.6] libxslt: integer overflow in xsltAddTextString (CVE-2017-5029)The issue can be exploited to trigger an out of bounds write on 64-bit
systems.
### References:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858546
### Patch:
https://git.gnome.org/browse/libxslt/commit/?id=08ab2774b870de1c7b5a4...The issue can be exploited to trigger an out of bounds write on 64-bit
systems.
### References:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858546
### Patch:
https://git.gnome.org/browse/libxslt/commit/?id=08ab2774b870de1c7b5a48693df75e8154addae5
*(from redmine: issue id 7056, created on 2017-03-24, closed on 2017-05-02)*
* Relations:
* parent #7055
* Changesets:
* Revision d2c16a8beb2a6f6db026a7cd340686d8a469158f on 2017-03-27T07:28:18Z:
```
main/libxslt: security fixes #7056 (CVE-2017-5029)
```
* Revision 781d2272fd8b4eb9118c5fdf4f72495fa6dbe2d9 on 2017-03-27T14:46:53Z:
```
main/libxslt: security fixes #7056 (CVE-2017-5029)
(cherry picked from commit d2c16a8beb2a6f6db026a7cd340686d8a469158f)
```3.6.0Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/7055libxslt: integer overflow in xsltAddTextString (CVE-2017-5029)2019-07-23T11:56:57ZAlicha CHlibxslt: integer overflow in xsltAddTextString (CVE-2017-5029)The issue can be exploited to trigger an out of bounds write on 64-bit
systems.
### References:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858546
### Patch:
https://git.gnome.org/browse/libxslt/commit/?id=08ab2774b870de1c7b5a4...The issue can be exploited to trigger an out of bounds write on 64-bit
systems.
### References:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=858546
### Patch:
https://git.gnome.org/browse/libxslt/commit/?id=08ab2774b870de1c7b5a48693df75e8154addae5
*(from redmine: issue id 7055, created on 2017-03-24, closed on 2017-05-02)*
* Relations:
* child #7056
* child #7057
* child #7058
* child #7059
* child #7060Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/7054[3.2] samba: Symlink race allows access outside share definition (CVE-2017-2619)2019-07-23T11:56:59ZAlicha CH[3.2] samba: Symlink race allows access outside share definition (CVE-2017-2619)All versions of Samba prior to 4.6.1, 4.5.7, 4.4.12 are vulnerable to
a malicious client using a symlink race to allow access to areas of
the server file system not exported under the share definition.
Samba uses the realpath() syst...All versions of Samba prior to 4.6.1, 4.5.7, 4.4.12 are vulnerable to
a malicious client using a symlink race to allow access to areas of
the server file system not exported under the share definition.
Samba uses the realpath() system call to ensure when a client requests
access to a pathname that it is under the exported share path on the
server file system.
### References:
https://www.samba.org/samba/security/CVE-2017-2619.html
https://www.samba.org/samba/history/security.html
*(from redmine: issue id 7054, created on 2017-03-24, closed on 2017-05-02)*
* Relations:
* parent #7049
* Changesets:
* Revision c25c75b8fbbe2271a6f10508c809cbcc0ff19ea3 on 2017-05-02T06:56:21Z:
```
main/samba: security fixes #7054 (CVE-2017-2619)
```3.2.4Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/7053[3.3] samba: Symlink race allows access outside share definition (CVE-2017-2619)2019-07-23T11:56:59ZAlicha CH[3.3] samba: Symlink race allows access outside share definition (CVE-2017-2619)All versions of Samba prior to 4.6.1, 4.5.7, 4.4.12 are vulnerable to
a malicious client using a symlink race to allow access to areas of
the server file system not exported under the share definition.
Samba uses the realpath() syst...All versions of Samba prior to 4.6.1, 4.5.7, 4.4.12 are vulnerable to
a malicious client using a symlink race to allow access to areas of
the server file system not exported under the share definition.
Samba uses the realpath() system call to ensure when a client requests
access to a pathname that it is under the exported share path on the
server file system.
### References:
https://www.samba.org/samba/security/CVE-2017-2619.html
https://www.samba.org/samba/history/security.html
*(from redmine: issue id 7053, created on 2017-03-24, closed on 2017-05-02)*
* Relations:
* parent #7049
* Changesets:
* Revision 18e77916780a13e9957ab17300ed4210f7fa9ab3 on 2017-05-02T06:55:29Z:
```
main/samba: security fixes #7053 (CVE-2017-2619)
```3.3.4Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/7052[3.4] samba: Symlink race allows access outside share definition (CVE-2017-2619)2019-07-23T11:57:01ZAlicha CH[3.4] samba: Symlink race allows access outside share definition (CVE-2017-2619)All versions of Samba prior to 4.6.1, 4.5.7, 4.4.12 are vulnerable to
a malicious client using a symlink race to allow access to areas of
the server file system not exported under the share definition.
Samba uses the realpath() syst...All versions of Samba prior to 4.6.1, 4.5.7, 4.4.12 are vulnerable to
a malicious client using a symlink race to allow access to areas of
the server file system not exported under the share definition.
Samba uses the realpath() system call to ensure when a client requests
access to a pathname that it is under the exported share path on the
server file system.
### References:
https://www.samba.org/samba/security/CVE-2017-2619.html
https://www.samba.org/samba/history/security.html
*(from redmine: issue id 7052, created on 2017-03-24, closed on 2017-05-02)*
* Relations:
* parent #7049
* Changesets:
* Revision 3ee0301c954375641a0e15a7d03602405c4a1fd4 on 2017-05-02T06:54:24Z:
```
main/samba: security fixes #7052 (CVE-2017-2619)
```3.4.7Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/7051[3.5] samba: Symlink race allows access outside share definition (CVE-2017-2619)2019-07-23T11:57:02ZAlicha CH[3.5] samba: Symlink race allows access outside share definition (CVE-2017-2619)All versions of Samba prior to 4.6.1, 4.5.7, 4.4.12 are vulnerable to
a malicious client using a symlink race to allow access to areas of
the server file system not exported under the share definition.
Samba uses the realpath() syst...All versions of Samba prior to 4.6.1, 4.5.7, 4.4.12 are vulnerable to
a malicious client using a symlink race to allow access to areas of
the server file system not exported under the share definition.
Samba uses the realpath() system call to ensure when a client requests
access to a pathname that it is under the exported share path on the
server file system.
### References:
https://www.samba.org/samba/security/CVE-2017-2619.html
https://www.samba.org/samba/history/security.html
*(from redmine: issue id 7051, created on 2017-03-24, closed on 2017-05-02)*
* Relations:
* parent #7049
* Changesets:
* Revision 2e74ac78acdfec2d3dde9cd15f16bf0067cdbcb2 on 2017-03-27T14:43:56Z:
```
main/samba: security upgrade to 4.5.7 (CVE-2017-2619). Fixes #7051
```3.5.3Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/7050[3.6] samba: Symlink race allows access outside share definition (CVE-2017-2619)2019-07-23T11:57:03ZAlicha CH[3.6] samba: Symlink race allows access outside share definition (CVE-2017-2619)All versions of Samba prior to 4.6.1, 4.5.7, 4.4.12 are vulnerable to
a malicious client using a symlink race to allow access to areas of
the server file system not exported under the share definition.
Samba uses the realpath() syst...All versions of Samba prior to 4.6.1, 4.5.7, 4.4.12 are vulnerable to
a malicious client using a symlink race to allow access to areas of
the server file system not exported under the share definition.
Samba uses the realpath() system call to ensure when a client requests
access to a pathname that it is under the exported share path on the
server file system.
### References:
https://www.samba.org/samba/security/CVE-2017-2619.html
https://www.samba.org/samba/history/security.html
*(from redmine: issue id 7050, created on 2017-03-24, closed on 2017-05-02)*
* Relations:
* parent #7049
* Changesets:
* Revision ab23f833069706c83824652d90547768eaebaa71 on 2017-03-27T07:50:23Z:
```
main/samba: security fix (CVE-2017-2619)
Fixes #7050
```3.6.0Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/7049samba: Symlink race allows access outside share definition (CVE-2017-2619)2019-07-23T11:57:04ZAlicha CHsamba: Symlink race allows access outside share definition (CVE-2017-2619)All versions of Samba prior to 4.6.1, 4.5.7, 4.4.12 are vulnerable to
a malicious client using a symlink race to allow access to areas of
the server file system not exported under the share definition.
Samba uses the realpath() syst...All versions of Samba prior to 4.6.1, 4.5.7, 4.4.12 are vulnerable to
a malicious client using a symlink race to allow access to areas of
the server file system not exported under the share definition.
Samba uses the realpath() system call to ensure when a client requests
access to a pathname that it is under the exported share path on the
server file system.
### References:
https://www.samba.org/samba/security/CVE-2017-2619.html
https://www.samba.org/samba/history/security.html
*(from redmine: issue id 7049, created on 2017-03-24, closed on 2017-05-02)*
* Relations:
* child #7050
* child #7051
* child #7052
* child #7053
* child #7054Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/7045[3.5] pdns-recursor: Multiple vulnerabilities (CVE-2016-7068, CVE-2016-7073, ...2019-07-23T11:57:08ZAlicha CH[3.5] pdns-recursor: Multiple vulnerabilities (CVE-2016-7068, CVE-2016-7073, CVE-2016-7074)### CVE-2016-7068: Crafted queries can cause abnormal CPU usage
Affects: PowerDNS Recursor up to and including 3.7.3, **4.0.3**
Not affected: PowerDNS Recursor 3.7.4, 4.0.4
### Reference:
https://doc.powerdns.com/md/security/powerdn...### CVE-2016-7068: Crafted queries can cause abnormal CPU usage
Affects: PowerDNS Recursor up to and including 3.7.3, **4.0.3**
Not affected: PowerDNS Recursor 3.7.4, 4.0.4
### Reference:
https://doc.powerdns.com/md/security/powerdns-advisory-2016-02/
### Patches:
https://downloads.powerdns.com/patches/2016-02/
### CVE-2016-7073, CVE-2016-7074: Insufficient validation of TSIG signatures
Affects: PowerDNS Recursor from 4.0.0 and up to and including
**4.0.3**
Not affected: PowerDNS Recursor < 4.0.0, 4.0.4
### Reference:
https://doc.powerdns.com/md/security/powerdns-advisory-2016-04/
### Patches:
https://downloads.powerdns.com/patches/2016-04/
*(from redmine: issue id 7045, created on 2017-03-21, closed on 2017-04-06)*
* Changesets:
* Revision e98a3138ba6fb05dfcce66ffb9974e77777486ad by Sergei Lukin on 2017-04-03T10:06:31Z:
```
community/pdns-recursor: security upgrade to 4.0.4 - fixes #7045
CVE-2016-7068: Crafted queries can cause abnormal CPU usage
CVE-2016-7073, CVE-2016-7074: Insufficient validation of TSIG signatures
https://doc.powerdns.com/md/changelog/#powerdns-recursor-404
```3.5.3https://gitlab.alpinelinux.org/alpine/aports/-/issues/7044[3.5] pdns: Multiple vulnerabilities (CVE-2016-2120, CVE-2016-7068, CVE-2016-...2019-07-23T11:57:10ZAlicha CH[3.5] pdns: Multiple vulnerabilities (CVE-2016-2120, CVE-2016-7068, CVE-2016-7072, CVE-2016-7073, CVE-2016-7074)### CVE-2016-2120: Crafted zone record can cause a denial of service
Affects: PowerDNS Authoritative Server up to and including 3.4.10,
**4.0.1**
Not affected: PowerDNS Authoritative Server 3.4.11, 4.0.2
### Reference:
https://doc.p...### CVE-2016-2120: Crafted zone record can cause a denial of service
Affects: PowerDNS Authoritative Server up to and including 3.4.10,
**4.0.1**
Not affected: PowerDNS Authoritative Server 3.4.11, 4.0.2
### Reference:
https://doc.powerdns.com/md/security/powerdns-advisory-2016-05/
### Patches:
https://downloads.powerdns.com/patches/2016-05/
### CVE-2016-7068: Crafted queries can cause abnormal CPU usage
Affects: PowerDNS Authoritative Server up to and including 3.4.10,
**4.0.1**
Not affected: PowerDNS Authoritative Server 3.4.11, 4.0.2
### Reference:
https://doc.powerdns.com/md/security/powerdns-advisory-2016-02/
### Patches:
https://downloads.powerdns.com/patches/2016-02/
### CVE-2016-7072: Denial of service via the web server
Affects: PowerDNS Authoritative Server up to and including 3.4.10,
**4.0.1**
Not affected: PowerDNS Authoritative Server 3.4.11, 4.0.2
### Reference:
https://doc.powerdns.com/md/security/powerdns-advisory-2016-03/
### Patches:
https://downloads.powerdns.com/patches/2016-03/
### CVE-2016-7073, CVE-2016-7074: Insufficient validation of TSIG signatures
Affects: PowerDNS Authoritative Server up to and including 3.4.10,
**4.0.1**
Not affected: PowerDNS Authoritative Server 3.4.11, 4.0.2
### Reference:
https://doc.powerdns.com/md/security/powerdns-advisory-2016-04/
### Patches:
https://downloads.powerdns.com/patches/2016-04/
*(from redmine: issue id 7044, created on 2017-03-21, closed on 2017-04-06)*
* Changesets:
* Revision 3a479b103eb9d61f344de80e8293bbc27403ce40 by Sergei Lukin on 2017-04-03T12:33:49Z:
```
community/pdns: security upgrade to 4.0.3 - fixes #7044
CVE-2016-2120: Crafted zone record can cause a denial of service
CVE-2016-7068: Crafted queries can cause abnormal CPU usage
CVE-2016-7072: Denial of service via the web server
CVE-2016-7073, CVE-2016-7074: Insufficient validation of TSIG signatures
```3.5.3https://gitlab.alpinelinux.org/alpine/aports/-/issues/7035[3.5] gtk-vnc: two input validation flaws (CVE-2017-5884, CVE-2017-5885)2019-07-23T11:57:15ZAlicha CH[3.5] gtk-vnc: two input validation flaws (CVE-2017-5884, CVE-2017-5885)### CVE-2017-5884: Improper check of framebuffer boundaries when processing a tile
gtk-vnc before 0.7.0 does not properly check boundaries of
subrectangle-containing tiles, which allows remote servers
to execute arbitrary code via the...### CVE-2017-5884: Improper check of framebuffer boundaries when processing a tile
gtk-vnc before 0.7.0 does not properly check boundaries of
subrectangle-containing tiles, which allows remote servers
to execute arbitrary code via the src x, y coordinates in a crafted (1)
rre, (2) hextile, or (3) copyrect tile.
### References:
http://openwall.com/lists/oss-security/2017/02/05/5
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5884
### Patch:
https://git.gnome.org/browse/gtk-vnc/commit/?id=ea0386933214c9178
### CVE-2017-5885: Integer overflow when processing SetColorMapEntries
Multiple integer overflows in the (1) vnc\_connection\_server\_message
and (2) vnc\_color\_map\_set functions in gtk-vnc before 0.7.0 allow
remote servers to cause a denial of service (crash) or possibly execute
arbitrary code via vectors involving SetColorMapEntries, which triggers
a buffer overflow.
### References:
http://openwall.com/lists/oss-security/2017/02/05/5
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5885
### Patch:
https://git.gnome.org/browse/gtk-vnc/commit/?id=c8583fd3783c5b811590
*(from redmine: issue id 7035, created on 2017-03-17, closed on 2017-03-20)*
* Relations:
* parent #7033
* Changesets:
* Revision d7ba0e189fccc1057d2f2de3022b723e8a58a528 by Sergei Lukin on 2017-03-20T11:37:17Z:
```
community/gtk-vnc: security upgrade to 0.7.0 - fixes #7035
CVE-2017-5884
CVE-2017-5885
https://security-tracker.debian.org/tracker/CVE-2017-5884
https://security-tracker.debian.org/tracker/CVE-2017-5885
```3.5.3Natanael CopaNatanael Copahttps://gitlab.alpinelinux.org/alpine/aports/-/issues/7034[3.6] gtk-vnc: two input validation flaws (CVE-2017-5884, CVE-2017-5885)2019-07-23T11:57:17ZAlicha CH[3.6] gtk-vnc: two input validation flaws (CVE-2017-5884, CVE-2017-5885)### CVE-2017-5884: Improper check of framebuffer boundaries when processing a tile
gtk-vnc before 0.7.0 does not properly check boundaries of
subrectangle-containing tiles, which allows remote servers
to execute arbitrary code via the...### CVE-2017-5884: Improper check of framebuffer boundaries when processing a tile
gtk-vnc before 0.7.0 does not properly check boundaries of
subrectangle-containing tiles, which allows remote servers
to execute arbitrary code via the src x, y coordinates in a crafted (1)
rre, (2) hextile, or (3) copyrect tile.
### References:
http://openwall.com/lists/oss-security/2017/02/05/5
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5884
### Patch:
https://git.gnome.org/browse/gtk-vnc/commit/?id=ea0386933214c9178
### CVE-2017-5885: Integer overflow when processing SetColorMapEntries
Multiple integer overflows in the (1) vnc\_connection\_server\_message
and (2) vnc\_color\_map\_set functions in gtk-vnc before 0.7.0 allow
remote servers to cause a denial of service (crash) or possibly execute
arbitrary code via vectors involving SetColorMapEntries, which triggers
a buffer overflow.
### References:
http://openwall.com/lists/oss-security/2017/02/05/5
https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2017-5885
### Patch:
https://git.gnome.org/browse/gtk-vnc/commit/?id=c8583fd3783c5b811590
*(from redmine: issue id 7034, created on 2017-03-17, closed on 2017-03-20)*
* Relations:
* parent #7033
* Changesets:
* Revision d065be83c388f73c3ec32b0cf07194a5000fdc39 by Sergei Lukin on 2017-03-17T15:05:51Z:
```
community/gtk-vnc: security upgrade to 0.7.0 - fixes #7034
CVE-2017-5884
CVE-2017-5885
https://security-tracker.debian.org/tracker/CVE-2017-5884
https://security-tracker.debian.org/tracker/CVE-2017-5885
```3.6.0Natanael CopaNatanael Copa