[Bug 1173597] New: VUL-0: CVE-2020-15471,CVE-2020-15472,CVE-2020-15473,CVE-2020-15474,CVE-2020-15475,CVE-2020-15476: ndpi: multiple memory safety issues
http://bugzilla.opensuse.org/show_bug.cgi?id=1173597 Bug ID: 1173597 Summary: VUL-0: CVE-2020-15471,CVE-2020-15472,CVE-2020-15473,CVE-2020- 15474,CVE-2020-15475,CVE-2020-15476: ndpi: multiple memory safety issues Classification: openSUSE Product: openSUSE Distribution Version: Leap 15.1 Hardware: Other URL: https://smash.suse.de/issue/262669/ OS: Other Status: NEW Severity: Minor Priority: P5 - None Component: Security Assignee: mardnh@gmx.de Reporter: wolfgang.frisch@suse.com QA Contact: security-team@suse.de Found By: Security Response Team Blocker: --- CVE-2020-15471 In nDPI through 3.2, the packet parsing code is vulnerable to a heap-based buffer over-read in ndpi_parse_packet_line_info in lib/ndpi_main.c. CVE-2020-15472 In nDPI through 3.2, there is a stack overflow in extractRDNSequence in lib/protocols/tls.c. CVE-2020-15473 In nDPI through 3.2, the OpenVPN dissector is vulnerable to a heap-based buffer over-read in ndpi_search_openvpn in lib/protocols/openvpn.c. CVE-2020-15474 In nDPI through 3.2, there is a stack overflow in extractRDNSequence in lib/protocols/tls.c. CVE-2020-15475 In nDPI through 3.2, ndpi_reset_packet_line_info in lib/ndpi_main.c omits certain reinitialization, leading to a use-after-free. CVE-2020-15476 In nDPI through 3.2, the Oracle protocol dissector has a heap-based buffer over-read in ndpi_search_oracle in lib/protocols/oracle.c. References: http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15471 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15472 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15473 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15474 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15475 http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2020-15476 http://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-15471.html http://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-15472.html http://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-15473.html http://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-15474.html http://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-15475.html http://people.canonical.com/~ubuntu-security/cve/2020/CVE-2020-15476.html -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1173597 http://bugzilla.opensuse.org/show_bug.cgi?id=1173597#c1 --- Comment #1 from Wolfgang Frisch <wolfgang.frisch@suse.com> --- Affected: openSUSE:Factory openSUSE:Leap:15.1 openSUSE:Leap:15.2 Upstream commits: CVE-2020-15471: https://github.com/ntop/nDPI/commit/61066fb106efa6d3d95b67e47b662de208b2b622 CVE-2020-15472: https://github.com/ntop/nDPI/commit/b7e666e465f138ae48ab81976726e67deed12701 CVE-2020-15473: https://github.com/ntop/nDPI/commit/8e7b1ea7a136cc4e4aa9880072ec2d69900a825e CVE-2020-15474: https://github.com/ntop/nDPI/commit/23594f036536468072198a57c59b6e9d63caf6ce CVE-2020-15475: https://github.com/ntop/nDPI/commit/6a9f5e4f7c3fd5ddab3e6727b071904d76773952 CVE-2020-15476: https://github.com/ntop/nDPI/commit/b69177be2fbe01c2442239a61832c44e40136c05 -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1173597 Wolfgang Frisch <wolfgang.frisch@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Priority|P5 - None |P2 - High Severity|Minor |Major -- You are receiving this mail because: You are on the CC list for the bug.
participants (1)
-
bugzilla_noreply@suse.com