{"id":12673,"date":"2016-04-11T15:03:23","date_gmt":"2016-04-11T07:03:23","guid":{"rendered":"https:\/\/www.deepin.org\/?p=9794"},"modified":"2017-01-06T09:29:53","modified_gmt":"2017-01-06T01:29:53","slug":"security-updates-dsa-3533-1-dsa-3540-1","status":"publish","type":"post","link":"https:\/\/www.deepin.org.cn\/en\/security-updates-dsa-3533-1-dsa-3540-1\/","title":{"rendered":"Security Updates (DSA-3533-1 &#038; DSA-3540-1)"},"content":{"rendered":"The security updates of openvswitch and lhasa.<\/p>\n<p>&nbsp;<\/p>\n<h2>Vulnerability Overview<\/h2>\n<p><strong>DSA-3533-1 openvswitch\u2014 Security Update<\/strong><\/p>\n<p>Security database information:<\/p>\n<ul>\n<li><a href=\"https:\/\/security-tracker.debian.org\/tracker\/CVE-2016-2074\" target=\"_blank\">CVE-2016-2074<\/a>: A remotely triggerable buffer overflow vulnerability was discovered in openvswitch, a production quality, multilayer virtual switch implementation. Specially crafted MPLS packets could overflow the buffer reserved for MPLS labels in an OVS internal data structure. A remote attacker can take advantage of this flaw to cause a denial of service, or potentially, execution of arbitrary code.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<p><strong>DSA-3540-1 lhasa\u2014 Security Update<\/strong><\/p>\n<p>Security database information:<\/p>\n<ul>\n<li><a href=\"https:\/\/security-tracker.debian.org\/tracker\/CVE-2016-2347\" target=\"_blank\">CVE-2016-2347<\/a>: An integer underflow was discovered in Lhasa, a lzh archive decompressor, which might result in the execution of arbitrary code if a malformed archive is processed.<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h2>Fixing Status<\/h2>\n<p>openvswitch problem has been fixed in version 2.3.0+git20140819-4; lhasa problem has been fixed in version 0.3.1-1.<\/p>\n<p>We recommend that you upgrade the system to obtain the patches to fix the vulnerabilities.","protected":false},"excerpt":{"rendered":"<p>The security updates of openvswitch and lhasa. &nbsp; Vulnerability Overview DSA-3533-1 openvswitch\u2014 Security Update Security database information: CVE-2016-2074: A remotely triggerable buffer overflow vulnerability was discovered in openvswitch, a production quality, multilayer virtual switch implementation. Specially crafted MPLS packets could overflow the buffer reserved for MPLS labels in an OVS internal data structure. A remote attacker can take advantage of this flaw to cause a denial of service, or potentially, execution of arbitrary code. &nbsp; DSA-3540-1 lhasa\u2014 Security Update Security database information: CVE-2016-2347: An integer underflow was discovered in Lhasa, a lzh archive decompressor, which might result in the execution ...<a href=https:\/\/www.deepin.org.cn\/en\/security-updates-dsa-3533-1-dsa-3540-1\/>Read more<\/a><\/p>\n","protected":false},"author":1,"featured_media":12679,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[75],"tags":[],"_links":{"self":[{"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/posts\/12673"}],"collection":[{"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/comments?post=12673"}],"version-history":[{"count":2,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/posts\/12673\/revisions"}],"predecessor-version":[{"id":21069,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/posts\/12673\/revisions\/21069"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/"}],"wp:attachment":[{"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/media?parent=12673"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/categories?post=12673"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.deepin.org.cn\/en\/wp-json\/wp\/v2\/tags?post=12673"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}