ALT-BU-2018-3093-2
Branch sisyphus update bulletin.
Closed bugs
libGLES-devel: missing GLESv3 headers
Closed vulnerabilities
Modified: 2024-11-28
BDU:2020-04525
Уязвимость утилиты «exempi», вызванная целочисленным переполнением, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-28
BDU:2020-04526
Уязвимость функции ASF_Support::ReadHeaderObject утилиты «exempi», позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-28
BDU:2020-04533
Уязвимость функции TradQT_Manager::ParseCachedBoxes утилиты «exempi», позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2017-18233
An issue was discovered in Exempi before 2.4.4. Integer overflow in the Chunk class in XMPFiles/source/FormatSupport/RIFF.cpp allows remote attackers to cause a denial of service (infinite loop) via crafted XMP data in a .avi file.
- https://access.redhat.com/errata/RHSA-2019:2048
- https://bugs.freedesktop.org/show_bug.cgi?id=102151
- https://cgit.freedesktop.org/exempi/commit/?id=65a8492832b7335ffabd01f5f64d89dec757c260
- https://lists.debian.org/debian-lts-announce/2018/03/msg00013.html
- https://usn.ubuntu.com/3668-1/
- https://access.redhat.com/errata/RHSA-2019:2048
- https://bugs.freedesktop.org/show_bug.cgi?id=102151
- https://cgit.freedesktop.org/exempi/commit/?id=65a8492832b7335ffabd01f5f64d89dec757c260
- https://lists.debian.org/debian-lts-announce/2018/03/msg00013.html
- https://usn.ubuntu.com/3668-1/
Modified: 2024-11-21
CVE-2017-18234
An issue was discovered in Exempi before 2.4.3. It allows remote attackers to cause a denial of service (invalid memcpy with resultant use-after-free) or possibly have unspecified other impact via a .pdf file containing JPEG data, related to XMPFiles/source/FormatSupport/ReconcileTIFF.cpp, XMPFiles/source/FormatSupport/TIFF_MemoryReader.cpp, and XMPFiles/source/FormatSupport/TIFF_Support.hpp.
- https://access.redhat.com/errata/RHSA-2019:2048
- https://bugs.freedesktop.org/show_bug.cgi?id=100397
- https://cgit.freedesktop.org/exempi/commit/?id=c26d5beb60a5a85f76259f50ed3e08c8169b0a0c
- https://lists.debian.org/debian-lts-announce/2018/03/msg00013.html
- https://usn.ubuntu.com/3668-1/
- https://access.redhat.com/errata/RHSA-2019:2048
- https://bugs.freedesktop.org/show_bug.cgi?id=100397
- https://cgit.freedesktop.org/exempi/commit/?id=c26d5beb60a5a85f76259f50ed3e08c8169b0a0c
- https://lists.debian.org/debian-lts-announce/2018/03/msg00013.html
- https://usn.ubuntu.com/3668-1/
Modified: 2024-11-21
CVE-2017-18235
An issue was discovered in Exempi before 2.4.3. The VPXChunk class in XMPFiles/source/FormatSupport/WEBP_Support.cpp does not ensure nonzero widths and heights, which allows remote attackers to cause a denial of service (assertion failure and application exit) via a crafted .webp file.
Modified: 2024-11-21
CVE-2017-18236
An issue was discovered in Exempi before 2.4.4. The ASF_Support::ReadHeaderObject function in XMPFiles/source/FormatSupport/ASF_Support.cpp allows remote attackers to cause a denial of service (infinite loop) via a crafted .asf file.
- https://access.redhat.com/errata/RHSA-2019:2048
- https://bugs.freedesktop.org/show_bug.cgi?id=102484
- https://cgit.freedesktop.org/exempi/commit/?id=fe59605d3520bf2ca4e0a963d194f10e9fee5806
- https://lists.debian.org/debian-lts-announce/2018/03/msg00013.html
- https://usn.ubuntu.com/3668-1/
- https://access.redhat.com/errata/RHSA-2019:2048
- https://bugs.freedesktop.org/show_bug.cgi?id=102484
- https://cgit.freedesktop.org/exempi/commit/?id=fe59605d3520bf2ca4e0a963d194f10e9fee5806
- https://lists.debian.org/debian-lts-announce/2018/03/msg00013.html
- https://usn.ubuntu.com/3668-1/
Modified: 2024-11-21
CVE-2017-18237
An issue was discovered in Exempi before 2.4.3. The PostScript_Support::ConvertToDate function in XMPFiles/source/FormatSupport/PostScript_Support.cpp allows remote attackers to cause a denial of service (invalid pointer dereference and application crash) via a crafted .ps file.
Modified: 2024-11-21
CVE-2017-18238
An issue was discovered in Exempi before 2.4.4. The TradQT_Manager::ParseCachedBoxes function in XMPFiles/source/FormatSupport/QuickTime_Support.cpp allows remote attackers to cause a denial of service (infinite loop) via crafted XMP data in a .qt file.
- https://access.redhat.com/errata/RHSA-2019:2048
- https://bugs.freedesktop.org/show_bug.cgi?id=102483
- https://cgit.freedesktop.org/exempi/commit/?id=886cd1d2314755adb1f4cdb99c16ff00830f0331
- https://lists.debian.org/debian-lts-announce/2018/03/msg00013.html
- https://usn.ubuntu.com/3668-1/
- https://access.redhat.com/errata/RHSA-2019:2048
- https://bugs.freedesktop.org/show_bug.cgi?id=102483
- https://cgit.freedesktop.org/exempi/commit/?id=886cd1d2314755adb1f4cdb99c16ff00830f0331
- https://lists.debian.org/debian-lts-announce/2018/03/msg00013.html
- https://usn.ubuntu.com/3668-1/
Closed vulnerabilities
Modified: 2023-10-16
BDU:2018-00261
Уязвимость компонента DetectEngineContentInspection системы обнаружения и предотвращения вторжений Suricata, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2016-10728
An issue was discovered in Suricata before 3.1.2. If an ICMPv4 error packet is received as the first packet on a flow in the to_client direction, it confuses the rule grouping lookup logic. The toclient inspection will then continue with the wrong rule group. This can lead to missed detection.
- https://github.com/kirillwow/ids_bypass
- https://lists.debian.org/debian-lts-announce/2018/09/msg00019.html
- https://redmine.openinfosecfoundation.org/issues/1880
- https://suricata-ids.org/2016/09/07/suricata-3-1-2-released/
- https://github.com/kirillwow/ids_bypass
- https://lists.debian.org/debian-lts-announce/2018/09/msg00019.html
- https://redmine.openinfosecfoundation.org/issues/1880
- https://suricata-ids.org/2016/09/07/suricata-3-1-2-released/
Modified: 2025-04-20
CVE-2017-15377
In Suricata before 4.x, it was possible to trigger lots of redundant checks on the content of crafted network traffic with a certain signature, because of DetectEngineContentInspection in detect-engine-content-inspection.c. The search engine doesn't stop when it should after no match is found; instead, it stops only upon reaching inspection-recursion-limit (3000 by default).
- https://github.com/OISF/suricata/commit/b9579fbe7dd408200ef03cbe20efddb624b73885
- https://lists.debian.org/debian-lts-announce/2018/12/msg00000.html
- https://redmine.openinfosecfoundation.org/issues/2231
- https://github.com/OISF/suricata/commit/b9579fbe7dd408200ef03cbe20efddb624b73885
- https://lists.debian.org/debian-lts-announce/2018/12/msg00000.html
- https://redmine.openinfosecfoundation.org/issues/2231
Modified: 2025-04-20
CVE-2017-7177
Suricata before 3.2.1 has an IPv4 defragmentation evasion issue caused by lack of a check for the IP protocol during fragment matching.
- http://www.securityfocus.com/bid/97047
- https://github.com/inliniac/suricata/commit/4a04f814b15762eb446a5ead4d69d021512df6f8
- https://lists.debian.org/debian-lts-announce/2018/12/msg00000.html
- https://redmine.openinfosecfoundation.org/issues/2019
- http://www.securityfocus.com/bid/97047
- https://github.com/inliniac/suricata/commit/4a04f814b15762eb446a5ead4d69d021512df6f8
- https://lists.debian.org/debian-lts-announce/2018/12/msg00000.html
- https://redmine.openinfosecfoundation.org/issues/2019
