ALT-BU-2018-3140-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-11713
WebCore/platform/network/soup/SocketStreamHandleImplSoup.cpp in the libsoup network backend of WebKit, as used in WebKitGTK+ prior to version 2.20.0 or without libsoup 2.62.0, unexpectedly failed to use system proxy settings for WebSocket connections. As a result, users could be deanonymized by crafted web sites via a WebSocket connection.
Package libwebkitgtk4 updated to version 2.20.0-alt1 for branch sisyphus in task 201896.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-11713
WebCore/platform/network/soup/SocketStreamHandleImplSoup.cpp in the libsoup network backend of WebKit, as used in WebKitGTK+ prior to version 2.20.0 or without libsoup 2.62.0, unexpectedly failed to use system proxy settings for WebSocket connections. As a result, users could be deanonymized by crafted web sites via a WebSocket connection.
Closed vulnerabilities
BDU:2020-01530
Уязвимость компонента backend/tiff/tiff-document.c программного средства просмотра документов Evince, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2019-1010006
Evince 3.26.0 is affected by buffer overflow. The impact is: DOS / Possible code execution. The component is: backend/tiff/tiff-document.c. The attack vector is: Victim must open a crafted PDF file. The issue occurs because of an incorrect integer overflow protection mechanism in tiff_document_render and tiff_document_get_thumbnail.
- http://bugzilla.maptools.org/show_bug.cgi?id=2745
- http://bugzilla.maptools.org/show_bug.cgi?id=2745
- openSUSE-SU-2019:1908
- openSUSE-SU-2019:1908
- https://bugzilla.gnome.org/show_bug.cgi?id=788980
- https://bugzilla.gnome.org/show_bug.cgi?id=788980
- [debian-lts-announce] 20190813 [SECURITY] [DLA 1881-1] evince security update
- [debian-lts-announce] 20190813 [SECURITY] [DLA 1881-1] evince security update
- [debian-lts-announce] 20190813 [SECURITY] [DLA 1882-1] atril security update
- [debian-lts-announce] 20190813 [SECURITY] [DLA 1882-1] atril security update
- 20200216 [SECURITY] [DSA 4624-1] evince security update
- 20200216 [SECURITY] [DSA 4624-1] evince security update
- USN-4067-1
- USN-4067-1
- DSA-4624
- DSA-4624
Package gnome-keyring updated to version 3.28.0.1-alt1 for branch sisyphus in task 201896.
Closed vulnerabilities
BDU:2019-01411
Уязвимость сервиса хранения имен пользователей и паролей GNOME Keyring, связанная с ошибками управления регистрационными данными, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Modified: 2024-11-21
CVE-2018-20781
In pam/gkr-pam-module.c in GNOME Keyring before 3.27.2, the user's password is kept in a session-child process spawned from the LightDM daemon. This can expose the credential in cleartext.
- https://bugs.launchpad.net/ubuntu/+source/gnome-keyring/+bug/1772919
- https://bugs.launchpad.net/ubuntu/+source/gnome-keyring/+bug/1772919
- https://bugzilla.gnome.org/show_bug.cgi?id=781486
- https://bugzilla.gnome.org/show_bug.cgi?id=781486
- https://github.com/huntergregal/mimipenguin
- https://github.com/huntergregal/mimipenguin
- https://github.com/huntergregal/mimipenguin/tree/d95f1e08ce79783794f38433bbf7de5abd9792da
- https://github.com/huntergregal/mimipenguin/tree/d95f1e08ce79783794f38433bbf7de5abd9792da
- https://gitlab.gnome.org/GNOME/gnome-keyring/issues/3
- https://gitlab.gnome.org/GNOME/gnome-keyring/issues/3
- https://gitlab.gnome.org/GNOME/gnome-keyring/tags/3.27.2
- https://gitlab.gnome.org/GNOME/gnome-keyring/tags/3.27.2
- USN-3894-1
- USN-3894-1
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujan2021.html
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-14108
libgedit.a in GNOME gedit through 3.22.1 allows remote attackers to cause a denial of service (CPU consumption) via a file that begins with many '\0' characters.
- https://bugzilla.gnome.org/show_bug.cgi?id=791037
- https://bugzilla.gnome.org/show_bug.cgi?id=791037
- https://cxsecurity.com/issue/WLB-2017090008
- https://cxsecurity.com/issue/WLB-2017090008
- https://packetstormsecurity.com/files/143983/libgedit.a-3.22.1-Denial-Of-Service.html
- https://packetstormsecurity.com/files/143983/libgedit.a-3.22.1-Denial-Of-Service.html