ALT-BU-2018-3465-1
Branch sisyphus update bulletin.
Package libfreeimage updated to version 3.18.0-alt1 for branch sisyphus in task 211059.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2015-0852
Multiple integer underflows in PluginPCX.cpp in FreeImage 3.17.0 and earlier allow remote attackers to cause a denial of service (heap memory corruption) via vectors related to the height and width of a window.
- FEDORA-2015-decbab7c9f
- FEDORA-2015-decbab7c9f
- FEDORA-2015-992342e82f
- FEDORA-2015-992342e82f
- FEDORA-2015-16105
- FEDORA-2015-16105
- FEDORA-2015-16104
- FEDORA-2015-16104
- FEDORA-2015-16106
- FEDORA-2015-16106
- DSA-3392
- DSA-3392
- [oss-security] 20150828 CVE-2015-0852 [FreeImage] Integer overflow in PluginPCX.cpp
- [oss-security] 20150828 CVE-2015-0852 [FreeImage] Integer overflow in PluginPCX.cpp
- 1034077
- 1034077
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=797165
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=797165
- GLSA-201701-68
- GLSA-201701-68
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
Modified: 2024-11-21
CVE-2016-5684
An exploitable out-of-bounds write vulnerability exists in the XMP image handling functionality of the FreeImage library. A specially crafted XMP file can cause an arbitrary memory overwrite resulting in code execution. An attacker can provide a malicious image to trigger this vulnerability.
- 93287
- 93287
- http://www.talosintelligence.com/reports/TALOS-2016-0189/
- http://www.talosintelligence.com/reports/TALOS-2016-0189/
- GLSA-201701-68
- GLSA-201701-68
- USN-3925-1
- USN-3925-1
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-16391
Several buffer overflows when handling responses from a Muscle Card in muscle_list_files in libopensc/card-muscle.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
- RHSA-2019:2154
- RHSA-2019:2154
- https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-477b7a40136bb418b10ce271c8664536
- https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-477b7a40136bb418b10ce271c8664536
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
Modified: 2024-11-21
CVE-2018-16392
Several buffer overflows when handling responses from a TCOS Card in tcos_select_file in libopensc/card-tcos.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
- RHSA-2019:2154
- RHSA-2019:2154
- https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-b2a356323a9ff2024d041cf2d7e89dd3
- https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-b2a356323a9ff2024d041cf2d7e89dd3
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
Modified: 2024-11-21
CVE-2018-16393
Several buffer overflows when handling responses from a Gemsafe V1 Smartcard in gemsafe_get_cert_len in libopensc/pkcs15-gemsafeV1.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
- RHSA-2019:2154
- RHSA-2019:2154
- https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad
- https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
Modified: 2024-11-21
CVE-2018-16418
A buffer overflow when handling string concatenation in util_acl_to_str in tools/util.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
- RHSA-2019:2154
- RHSA-2019:2154
- https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-628c8445c4e7ae92bbc4be08ba11a4c3
- https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-628c8445c4e7ae92bbc4be08ba11a4c3
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
Modified: 2024-11-21
CVE-2018-16419
Several buffer overflows when handling responses from a Cryptoflex card in read_public_key in tools/cryptoflex-tool.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
- RHSA-2019:2154
- RHSA-2019:2154
- https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-a6074523a9cbd875e26c58e20868fb15
- https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-a6074523a9cbd875e26c58e20868fb15
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
Modified: 2024-11-21
CVE-2018-16420
Several buffer overflows when handling responses from an ePass 2003 Card in decrypt_response in libopensc/card-epass2003.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
- RHSA-2019:2154
- RHSA-2019:2154
- https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-b36536074d13447fbbec061e0e64d15d
- https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-b36536074d13447fbbec061e0e64d15d
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
Modified: 2024-11-21
CVE-2018-16421
Several buffer overflows when handling responses from a CAC Card in cac_get_serial_nr_from_CUID in libopensc/card-cac.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
- RHSA-2019:2154
- RHSA-2019:2154
- https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-848b13147a344ba2c6361d91ca77feb1
- https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-848b13147a344ba2c6361d91ca77feb1
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
Modified: 2024-11-21
CVE-2018-16422
A single byte buffer overflow when handling responses from an esteid Card in sc_pkcs15emu_esteid_init in libopensc/pkcs15-esteid.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
- RHSA-2019:2154
- RHSA-2019:2154
- https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-d64c08c80437cf0006ada91e50f20ba0
- https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-d64c08c80437cf0006ada91e50f20ba0
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
Modified: 2024-11-21
CVE-2018-16423
A double free when handling responses from a smartcard in sc_file_set_sec_attr in libopensc/sc.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
- RHSA-2019:2154
- RHSA-2019:2154
- https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-db0cd89ff279ad8c7b3bb780cdf2770a
- https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-db0cd89ff279ad8c7b3bb780cdf2770a
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
Modified: 2024-11-21
CVE-2018-16424
A double free when handling responses in read_file in tools/egk-tool.c (aka the eGK card tool) in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
- https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-476b3b2a03c4eef331b4b0bfece4b063
- https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-476b3b2a03c4eef331b4b0bfece4b063
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
Modified: 2024-11-21
CVE-2018-16425
A double free when handling responses from an HSM Card in sc_pkcs15emu_sc_hsm_init in libopensc/pkcs15-sc-hsm.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to cause a denial of service (application crash) or possibly have unspecified other impact.
- https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-d643a0fa169471dbf2912f4866dc49c5
- https://github.com/OpenSC/OpenSC/commit/360e95d45ac4123255a4c796db96337f332160ad#diff-d643a0fa169471dbf2912f4866dc49c5
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
Modified: 2024-11-21
CVE-2018-16426
Endless recursion when handling responses from an IAS-ECC card in iasecc_select_file in libopensc/card-iasecc.c in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to hang or crash the opensc library using programs.
- RHSA-2019:2154
- RHSA-2019:2154
- https://github.com/OpenSC/OpenSC/commit/03628449b75a93787eb2359412a3980365dda49b#diff-f8c0128e14031ed9307d47f10f601b54
- https://github.com/OpenSC/OpenSC/commit/03628449b75a93787eb2359412a3980365dda49b#diff-f8c0128e14031ed9307d47f10f601b54
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
Modified: 2024-11-21
CVE-2018-16427
Various out of bounds reads when handling responses in OpenSC before 0.19.0-rc1 could be used by attackers able to supply crafted smartcards to potentially crash the opensc library using programs.
- RHSA-2019:2154
- RHSA-2019:2154
- https://github.com/OpenSC/OpenSC/pull/1447/commits/8fe377e93b4b56060e5bbfb6f3142ceaeca744fa
- https://github.com/OpenSC/OpenSC/pull/1447/commits/8fe377e93b4b56060e5bbfb6f3142ceaeca744fa
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- https://github.com/OpenSC/OpenSC/releases/tag/0.19.0-rc1
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- [debian-lts-announce] 20190911 [SECURITY] [DLA 1916-1] opensc security update
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
- https://www.x41-dsec.de/lab/advisories/x41-2018-002-OpenSC/
Package plasma5-kwallet-pam updated to version 5.12.6-alt2.S1 for branch sisyphus in task 213008.
Closed bugs
Не работает интеграция с sddm
Closed vulnerabilities
BDU:2021-01386
Уязвимость библиотеки libdw набора утилит для обработки объектов ELF Elfutils, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01387
Уязвимость функции dwarf_getaranges в dwarf_getaranges.c набора утилит для обработки объектов ELF Elfutils, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05869
Уязвимость компонента libelf/elf_end.c утилиты для модификации и анализа бинарных файлов ELF Elfutils, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-16062
dwarf_getaranges in dwarf_getaranges.c in libdw in elfutils before 2018-08-18 allows remote attackers to cause a denial of service (heap-based buffer over-read) via a crafted file.
- openSUSE-SU-2019:1590
- openSUSE-SU-2019:1590
- RHSA-2019:2197
- RHSA-2019:2197
- [debian-lts-announce] 20190225 [SECURITY] [DLA 1689-1] elfutils security update
- [debian-lts-announce] 20190225 [SECURITY] [DLA 1689-1] elfutils security update
- [debian-lts-announce] 20211030 [SECURITY] [DLA 2802-1] elfutils security update
- [debian-lts-announce] 20211030 [SECURITY] [DLA 2802-1] elfutils security update
- https://sourceware.org/bugzilla/show_bug.cgi?id=23541
- https://sourceware.org/bugzilla/show_bug.cgi?id=23541
- https://sourceware.org/git/?p=elfutils.git%3Ba=commit%3Bh=29e31978ba51c1051743a503ee325b5ebc03d7e9
- https://sourceware.org/git/?p=elfutils.git%3Ba=commit%3Bh=29e31978ba51c1051743a503ee325b5ebc03d7e9
- USN-4012-1
- USN-4012-1
Modified: 2024-11-21
CVE-2018-16402
libelf/elf_end.c in elfutils 0.173 allows remote attackers to cause a denial of service (double free and application crash) or possibly have unspecified other impact because it tries to decompress twice.
- openSUSE-SU-2019:1590
- openSUSE-SU-2019:1590
- RHSA-2019:2197
- RHSA-2019:2197
- [bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image
- [bookkeeper-issues] 20200729 [GitHub] [bookkeeper] padma81 opened a new issue #2387: Security vulnerabilities in the apache/bookkeeper-4.9.2 image
- [debian-lts-announce] 20211030 [SECURITY] [DLA 2802-1] elfutils security update
- [debian-lts-announce] 20211030 [SECURITY] [DLA 2802-1] elfutils security update
- https://sourceware.org/bugzilla/show_bug.cgi?id=23528
- https://sourceware.org/bugzilla/show_bug.cgi?id=23528
- USN-4012-1
- USN-4012-1
Modified: 2024-11-21
CVE-2018-16403
libdw in elfutils 0.173 checks the end of the attributes list incorrectly in dwarf_getabbrev in dwarf_getabbrev.c and dwarf_hasattr in dwarf_hasattr.c, leading to a heap-based buffer over-read and an application crash.
- openSUSE-SU-2019:1590
- openSUSE-SU-2019:1590
- RHSA-2019:2197
- RHSA-2019:2197
- https://sourceware.org/bugzilla/show_bug.cgi?id=23529
- https://sourceware.org/bugzilla/show_bug.cgi?id=23529
- https://sourceware.org/git/?p=elfutils.git%3Ba=commit%3Bh=6983e59b727458a6c64d9659c85f08218bc4fcda
- https://sourceware.org/git/?p=elfutils.git%3Ba=commit%3Bh=6983e59b727458a6c64d9659c85f08218bc4fcda
- USN-4012-1
- USN-4012-1