ALT-BU-2018-3272-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2019-01637
Уязвимость функции III_Afficantize_sample приложения для кодирования аудио LAME, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2015-9099
The lame_init_params function in lame.c in libmp3lame.a in LAME 3.99.5 allows remote attackers to cause a denial of service (invalid read and application crash) via a crafted audio file with a negative sample rate.
Modified: 2024-11-21
CVE-2015-9100
The fill_buffer_resample function in util.c in libmp3lame.a in LAME 3.99.5 allows remote attackers to cause a denial of service (NULL pointer dereference and application crash) via a crafted audio file.
Modified: 2024-11-21
CVE-2015-9101
The fill_buffer_resample function in util.c in libmp3lame.a in LAME 3.98.4, 3.98.2, 3.98, 3.99, 3.99.1, 3.99.2, 3.99.3, 3.99.4 and 3.99.5 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted audio file.
- 99269
- 99269
- https://blogs.gentoo.org/ago/2017/06/17/lame-heap-based-buffer-overflow-in-fill_buffer_resample-util-c/
- https://blogs.gentoo.org/ago/2017/06/17/lame-heap-based-buffer-overflow-in-fill_buffer_resample-util-c/
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777161
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=777161
- https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2015-9101
- https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2015-9101
Modified: 2024-11-21
CVE-2017-11720
There is a division-by-zero vulnerability in LAME 3.99.5, caused by a malformed input file.
- https://blogs.gentoo.org/ago/2017/06/17/lame-divide-by-zero-in-parse_wave_header-get_audio-c/
- https://blogs.gentoo.org/ago/2017/06/17/lame-divide-by-zero-in-parse_wave_header-get_audio-c/
- https://bugs.debian.org/777159
- https://bugs.debian.org/777159
- https://sourceforge.net/p/lame/bugs/460/
- https://sourceforge.net/p/lame/bugs/460/
Modified: 2024-11-21
CVE-2017-13712
NULL Pointer Dereference in the id3v2AddAudioDuration function in libmp3lame/id3tag.c in LAME 3.99.5 allows attackers to perform Denial of Service by triggering a NULL first argument.
Modified: 2024-11-21
CVE-2017-15018
LAME 3.99.5, 3.99.4, 3.99.3, 3.99.2, 3.99.1, 3.99, 3.98.4, 3.98.2 and 3.98 have a heap-based buffer over-read when handling a malformed file in k_34_4 in vbrquantize.c.
Modified: 2024-11-21
CVE-2017-15019
LAME 3.99.5 has a NULL Pointer Dereference in the hip_decode_init function within libmp3lame/mpglib_interface.c via a malformed mpg file, because of an incorrect calloc call.
Modified: 2024-11-21
CVE-2017-15045
LAME 3.99, 3.99.1, 3.99.2, 3.99.3, 3.99.4, 3.99.5, 3.98.4, 3.98.2 and 3.98 has a heap-based buffer over-read in fill_buffer in libmp3lame/util.c, related to lame_encode_buffer_sample_t in libmp3lame/lame.c, a different vulnerability than CVE-2017-9410.
Modified: 2024-11-21
CVE-2017-15046
LAME 3.99.5, 3.99.4, 3.98.4, 3.98.2, 3.98 and 3.97 have a stack-based buffer overflow in unpack_read_samples in frontend/get_audio.c, a different vulnerability than CVE-2017-9412.
Modified: 2024-11-21
CVE-2017-8419
LAME through 3.99.5 relies on the signed integer data type for values in a WAV or AIFF header, which allows remote attackers to cause a denial of service (stack-based buffer overflow or heap-based buffer overflow) or possibly have unspecified other impact via a crafted file, as demonstrated by mishandling of num_channels.
Modified: 2024-11-21
CVE-2017-9412
The unpack_read_samples function in frontend/get_audio.c in LAME 3.99.5 allows remote attackers to cause a denial of service (invalid memory read and application crash) via a crafted wav file.
Modified: 2024-11-21
CVE-2017-9869
The II_step_one function in layer2.c in mpglib, as used in libmpgdecoder.a in LAME 3.99.5 and other products, allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted audio file.
Modified: 2024-11-21
CVE-2017-9870
The III_i_stereo function in layer3.c in mpglib, as used in libmpgdecoder.a in LAME 3.99.5 and other products, allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted audio file that is mishandled in the code for the "block_type == 2" case, a similar issue to CVE-2017-11126.
Modified: 2024-11-21
CVE-2017-9871
The III_i_stereo function in layer3.c in mpglib, as used in libmpgdecoder.a in LAME 3.99.5 and other products, allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted audio file.
Modified: 2024-11-21
CVE-2017-9872
The III_dequantize_sample function in layer3.c in mpglib, as used in libmpgdecoder.a in LAME 3.99.5 and other products, allows remote attackers to cause a denial of service (stack-based buffer overflow and application crash) or possibly have unspecified other impact via a crafted audio file.
Closed bugs
lame: new version
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-11354
In Wireshark 2.6.0, the IEEE 1905.1a dissector could crash. This was addressed in epan/dissectors/packet-ieee1905.c by making a certain correction to string handling.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104308
- 104308
- 1041036
- 1041036
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14647
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14647
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=cb517a4a434387e74a2f75ebb106ee3c3893251c
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=cb517a4a434387e74a2f75ebb106ee3c3893251c
- https://www.wireshark.org/security/wnpa-sec-2018-26.html
- https://www.wireshark.org/security/wnpa-sec-2018-26.html
Modified: 2024-11-21
CVE-2018-11355
In Wireshark 2.6.0, the RTCP dissector could crash. This was addressed in epan/dissectors/packet-rtcp.c by avoiding a buffer overflow for packet status chunks.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104308
- 104308
- 1041036
- 1041036
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14673
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14673
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=99d27a5fd2c540f837154aca3b3647f5ccfa0c33
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=99d27a5fd2c540f837154aca3b3647f5ccfa0c33
- https://www.wireshark.org/security/wnpa-sec-2018-27.html
- https://www.wireshark.org/security/wnpa-sec-2018-27.html
Modified: 2024-11-21
CVE-2018-11356
In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the DNS dissector could crash. This was addressed in epan/dissectors/packet-dns.c by avoiding a NULL pointer dereference for an empty name in an SRV record.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104308
- 104308
- 1041036
- 1041036
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14681
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14681
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4425716ddba99374749bd033d9bc0f4add2fb973
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=4425716ddba99374749bd033d9bc0f4add2fb973
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-29.html
- https://www.wireshark.org/security/wnpa-sec-2018-29.html
Modified: 2024-11-21
CVE-2018-11357
In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the LTP dissector and other dissectors could consume excessive memory. This was addressed in epan/tvbuff.c by rejecting negative lengths.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104308
- 104308
- 1041036
- 1041036
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14678
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14678
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=ab8a33ef083b9732c89117747a83a905a676faf6
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=ab8a33ef083b9732c89117747a83a905a676faf6
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-28.html
- https://www.wireshark.org/security/wnpa-sec-2018-28.html
Modified: 2024-11-21
CVE-2018-11358
In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the Q.931 dissector could crash. This was addressed in epan/dissectors/packet-q931.c by avoiding a use-after-free after a malformed packet prevented certain cleanup.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104308
- 104308
- 1041036
- 1041036
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14689
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14689
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=ccb1ac3c8cec47fbbbf2e80ced80644005c65252
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=ccb1ac3c8cec47fbbbf2e80ced80644005c65252
- [debian-lts-announce] 20180528 [SECURITY] [DLA 1388-1] wireshark security update
- [debian-lts-announce] 20180528 [SECURITY] [DLA 1388-1] wireshark security update
- DSA-4217
- DSA-4217
- https://www.wireshark.org/security/wnpa-sec-2018-31.html
- https://www.wireshark.org/security/wnpa-sec-2018-31.html
Modified: 2024-11-21
CVE-2018-11359
In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the RRC dissector and other dissectors could crash. This was addressed in epan/proto.c by avoiding a NULL pointer dereference.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104308
- 104308
- 1041036
- 1041036
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14703
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14703
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=beaebe91b14564fb9f86f0726bab09927872721b
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=beaebe91b14564fb9f86f0726bab09927872721b
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- [debian-lts-announce] 20190115 [SECURITY] [DLA 1634-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2018-33.html
- https://www.wireshark.org/security/wnpa-sec-2018-33.html
Modified: 2024-11-21
CVE-2018-11360
In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the GSM A DTAP dissector could crash. This was addressed in epan/dissectors/packet-gsm_a_dtap.c by fixing an off-by-one error that caused a buffer overflow.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104308
- 104308
- 1041036
- 1041036
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14688
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14688
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a55b36c51f83a7b9680824e8ee3a6ce8429ab24b
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=a55b36c51f83a7b9680824e8ee3a6ce8429ab24b
- DSA-4217
- DSA-4217
- https://www.wireshark.org/security/wnpa-sec-2018-30.html
- https://www.wireshark.org/security/wnpa-sec-2018-30.html
Modified: 2024-11-21
CVE-2018-11361
In Wireshark 2.6.0, the IEEE 802.11 protocol dissector could crash. This was addressed in epan/crypt/dot11decrypt.c by avoiding a buffer overflow during FTE processing in Dot11DecryptTDLSDeriveKey.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104308
- 104308
- 1041036
- 1041036
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14686
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14686
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=1b52f9929238ce3948ec924ae4f9456b5e9df558
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=1b52f9929238ce3948ec924ae4f9456b5e9df558
- https://www.wireshark.org/security/wnpa-sec-2018-32.html
- https://www.wireshark.org/security/wnpa-sec-2018-32.html
Modified: 2024-11-21
CVE-2018-11362
In Wireshark 2.6.0, 2.4.0 to 2.4.6, and 2.2.0 to 2.2.14, the LDSS dissector could crash. This was addressed in epan/dissectors/packet-ldss.c by avoiding a buffer over-read upon encountering a missing '\0' character.
- openSUSE-SU-2020:0362
- openSUSE-SU-2020:0362
- 104308
- 104308
- 1041036
- 1041036
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14615
- https://bugs.wireshark.org/bugzilla/show_bug.cgi?id=14615
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f177008b04a530640de835ca878892e58b826d58
- https://code.wireshark.org/review/gitweb?p=wireshark.git%3Ba=commit%3Bh=f177008b04a530640de835ca878892e58b826d58
- [debian-lts-announce] 20180528 [SECURITY] [DLA 1388-1] wireshark security update
- [debian-lts-announce] 20180528 [SECURITY] [DLA 1388-1] wireshark security update
- DSA-4217
- DSA-4217
- https://www.wireshark.org/security/wnpa-sec-2018-25.html
- https://www.wireshark.org/security/wnpa-sec-2018-25.html
Closed bugs
Функция "platform.linux_distribution()" из python3 возвращает "fedora" вместо "altlinux".
Closed bugs
new version
Package libuthash-devel updated to version 2.0.2-alt1 for branch sisyphus in task 206954.
Closed bugs
Просьба обновить до 2.0.2
Closed bugs
gcc не прилинковывает libpthread принудительно при добавлении флага -pthread