ALT-BU-2014-2531-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2015-09729
Уязвимости операционной системы Gentoo Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2025-04-11
CVE-2013-1439
The "faster LJPEG decoder" in libraw 0.13.x, 0.14.x, and 0.15.x before 0.15.4 allows context-dependent attackers to cause a denial of service (NULL pointer dereference) via a crafted photo file.
- http://www.debian.org/security/2013/dsa-2748
- http://www.openwall.com/lists/oss-security/2013/08/29/3
- https://github.com/LibRaw/LibRaw/commit/11909cc59e712e09b508dda729b99aeaac2b29ad
- http://www.debian.org/security/2013/dsa-2748
- http://www.openwall.com/lists/oss-security/2013/08/29/3
- https://github.com/LibRaw/LibRaw/commit/11909cc59e712e09b508dda729b99aeaac2b29ad
Modified: 2025-04-11
CVE-2013-2126
Multiple double free vulnerabilities in the LibRaw::unpack function in libraw_cxx.cpp in LibRaw before 0.15.2 allow context-dependent attackers to cause a denial of service (application crash) and possibly execute arbitrary code via a malformed full-color (1) Foveon or (2) sRAW image file.
- http://lists.opensuse.org/opensuse-updates/2013-06/msg00193.html
- http://lists.opensuse.org/opensuse-updates/2013-06/msg00195.html
- http://secunia.com/advisories/53547
- http://secunia.com/advisories/53883
- http://secunia.com/advisories/53888
- http://secunia.com/advisories/53938
- http://www.libraw.org/news/libraw-0-15-2
- http://www.openwall.com/lists/oss-security/2013/05/29/7
- http://www.openwall.com/lists/oss-security/2013/06/10/1
- http://www.ubuntu.com/usn/USN-1884-1
- http://www.ubuntu.com/usn/USN-1885-1
- https://github.com/LibRaw/LibRaw/commit/19ffddb0fe1a4ffdb459b797ffcf7f490d28b5a6
- http://lists.opensuse.org/opensuse-updates/2013-06/msg00193.html
- http://lists.opensuse.org/opensuse-updates/2013-06/msg00195.html
- http://secunia.com/advisories/53547
- http://secunia.com/advisories/53883
- http://secunia.com/advisories/53888
- http://secunia.com/advisories/53938
- http://www.libraw.org/news/libraw-0-15-2
- http://www.openwall.com/lists/oss-security/2013/05/29/7
- http://www.openwall.com/lists/oss-security/2013/06/10/1
- http://www.ubuntu.com/usn/USN-1884-1
- http://www.ubuntu.com/usn/USN-1885-1
- https://github.com/LibRaw/LibRaw/commit/19ffddb0fe1a4ffdb459b797ffcf7f490d28b5a6
Modified: 2025-04-11
CVE-2013-2127
Buffer overflow in the exposure correction code in LibRaw before 0.15.1 allows context-dependent attackers to cause a denial of service (crash) and possibly execute arbitrary code via unspecified vectors.
- http://secunia.com/advisories/53547
- http://www.libraw.org/news/libraw-0-15-1
- http://www.openwall.com/lists/oss-security/2013/05/29/7
- https://github.com/LibRaw/LibRaw/commit/2f912f5b33582961b1cdbd9fd828589f8b78f21d
- http://secunia.com/advisories/53547
- http://www.libraw.org/news/libraw-0-15-1
- http://www.openwall.com/lists/oss-security/2013/05/29/7
- https://github.com/LibRaw/LibRaw/commit/2f912f5b33582961b1cdbd9fd828589f8b78f21d
Closed vulnerabilities
Modified: 2025-04-11
CVE-2013-4508
lighttpd before 1.4.34, when SNI is enabled, configures weak SSL ciphers, which makes it easier for remote attackers to hijack sessions by inserting packets into the client-server data stream or obtain sensitive information by sniffing the network.
- http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2013_01.txt
- http://jvn.jp/en/jp/JVN37417423/index.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00049.html
- http://marc.info/?l=bugtraq&m=141576815022399&w=2
- http://openwall.com/lists/oss-security/2013/11/04/19
- http://redmine.lighttpd.net/issues/2525
- http://redmine.lighttpd.net/projects/lighttpd/repository/revisions/2913/diff/
- https://www.debian.org/security/2013/dsa-2795
- http://download.lighttpd.net/lighttpd/security/lighttpd_sa_2013_01.txt
- http://jvn.jp/en/jp/JVN37417423/index.html
- http://lists.opensuse.org/opensuse-updates/2014-01/msg00049.html
- http://marc.info/?l=bugtraq&m=141576815022399&w=2
- http://openwall.com/lists/oss-security/2013/11/04/19
- http://redmine.lighttpd.net/issues/2525
- http://redmine.lighttpd.net/projects/lighttpd/repository/revisions/2913/diff/
- https://www.debian.org/security/2013/dsa-2795