ALT-BU-2018-3237-1
Branch sisyphus update bulletin.
Package adobe-flash-player-ppapi updated to version 29-alt1.S1 for branch sisyphus in task 205651.
Closed vulnerabilities
BDU:2018-00894
Уязвимость программной платформы Flash Player, связанная с использованием памяти после её освобождения, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2018-4919
Adobe Flash Player versions 28.0.0.161 and earlier have an exploitable use after free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Modified: 2024-11-21
CVE-2018-4920
Adobe Flash Player versions 28.0.0.161 and earlier have an exploitable type confusion vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Modified: 2024-11-21
CVE-2018-4932
Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable Use-After-Free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Modified: 2024-11-21
CVE-2018-4933
Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Modified: 2024-11-21
CVE-2018-4934
Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Modified: 2024-11-21
CVE-2018-4935
Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Modified: 2024-11-21
CVE-2018-4936
Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable Heap Overflow vulnerability. Successful exploitation could lead to information disclosure.
Modified: 2024-11-21
CVE-2018-4937
Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Closed bugs
chromium ругается на старый flash
Closed bugs
Ошибка в spec (Requires)
Closed vulnerabilities
BDU:2018-01512
Уязвимость консольной утилиты для загрузки файлов wget, связанной с недостаточной проверкой вводимых данных, позволяющая нарушителю оказать воздействие на целостность данных
Modified: 2024-11-21
CVE-2018-0494
GNU Wget before 1.19.5 is prone to a cookie injection vulnerability in the resp_new function in http.c via a \r\n sequence in a continuation line.
- 104129
- 104129
- 1040838
- 1040838
- RHSA-2018:3052
- RHSA-2018:3052
- https://git.savannah.gnu.org/cgit/wget.git/commit/?id=1fc9c95ec144499e69dc8ec76dbe07799d7d82cd
- https://git.savannah.gnu.org/cgit/wget.git/commit/?id=1fc9c95ec144499e69dc8ec76dbe07799d7d82cd
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1375-1] wget security update
- [debian-lts-announce] 20180511 [SECURITY] [DLA 1375-1] wget security update
- https://lists.gnu.org/archive/html/bug-wget/2018-05/msg00020.html
- https://lists.gnu.org/archive/html/bug-wget/2018-05/msg00020.html
- https://savannah.gnu.org/bugs/?53763
- https://savannah.gnu.org/bugs/?53763
- GLSA-201806-01
- GLSA-201806-01
- https://sintonen.fi/advisories/gnu-wget-cookie-injection.txt
- https://sintonen.fi/advisories/gnu-wget-cookie-injection.txt
- USN-3643-1
- USN-3643-1
- USN-3643-2
- USN-3643-2
- DSA-4195
- DSA-4195
- 44601
- 44601
Closed vulnerabilities
BDU:2018-01503
Уязвимость функции pack интерпретатора Perl, позволяющая нарушителю вызвать отказ в обслуживании, получить доступ к конфиденциальным данным или нарушить их целостность
Modified: 2024-11-21
CVE-2018-6913
Heap-based buffer overflow in the pack function in Perl before 5.26.2 allows context-dependent attackers to execute arbitrary code via a large item count.
- 103953
- 103953
- 1040681
- 1040681
- [debian-lts-announce] 20180414 [SECURITY] [DLA 1345-1] perl security update
- [debian-lts-announce] 20180414 [SECURITY] [DLA 1345-1] perl security update
- https://rt.perl.org/Public/Bug/Display.html?id=131844
- https://rt.perl.org/Public/Bug/Display.html?id=131844
- GLSA-201909-01
- GLSA-201909-01
- USN-3625-1
- USN-3625-1
- USN-3625-2
- USN-3625-2
- DSA-4172
- DSA-4172
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
Package advancecomp updated to version 2.1-alt1_4 for branch sisyphus in task 205683.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-1056
An out-of-bounds heap buffer read flaw was found in the way advancecomp before 2.1-2018/02 handled processing of ZIP files. An attacker could potentially use this flaw to crash the advzip utility by tricking it into processing crafted ZIP files.
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889270
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889270
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1056
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2018-1056
- [debian-lts-announce] 20180213 [SECURITY] [DLA 1281-1] advancecomp security update
- [debian-lts-announce] 20180213 [SECURITY] [DLA 1281-1] advancecomp security update
- [debian-lts-announce] 20190302 [SECURITY] [DLA 1702-1] advancecomp security update
- [debian-lts-announce] 20190302 [SECURITY] [DLA 1702-1] advancecomp security update
- [debian-lts-announce] 20211229 [SECURITY] [DLA 2868-1] advancecomp security update
- [debian-lts-announce] 20211229 [SECURITY] [DLA 2868-1] advancecomp security update
- https://sourceforge.net/p/advancemame/bugs/259/
- https://sourceforge.net/p/advancemame/bugs/259/
- USN-3570-1
- USN-3570-1
Modified: 2024-11-21
CVE-2019-8379
An issue was discovered in AdvanceCOMP through 2.1. A NULL pointer dereference exists in the function be_uint32_read() located in endianrw.h. It can be triggered by sending a crafted file to a binary. It allows an attacker to cause a Denial of Service (Segmentation fault) or possibly have unspecified other impact when a victim opens a specially crafted file.
- RHSA-2019:2332
- [debian-lts-announce] 20211229 [SECURITY] [DLA 2868-1] advancecomp security update
- FEDORA-2019-b30b48200c
- https://research.loginsoft.com/bugs/null-pointer-dereference-vulnerability-in-the-function-be_uint32_read-advancecomp/
- https://sourceforge.net/p/advancemame/bugs/271/
- RHSA-2019:2332
- https://sourceforge.net/p/advancemame/bugs/271/
- https://research.loginsoft.com/bugs/null-pointer-dereference-vulnerability-in-the-function-be_uint32_read-advancecomp/
- FEDORA-2019-b30b48200c
- [debian-lts-announce] 20211229 [SECURITY] [DLA 2868-1] advancecomp security update