ALT-BU-2018-3492-2
Branch sisyphus update bulletin.
Package adobe-flash-player updated to version 31-alt1 for branch sisyphus in task 213885.
Closed bugs
Пытается заместить flash-plugin от adobe
Package adobe-flash-player-ppapi updated to version 31-alt1 for branch sisyphus in task 213885.
Closed vulnerabilities
BDU:2017-00603
Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2017-00604
Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2017-00640
Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2017-00641
Уязвимость программной платформы Flash Player, позволяющая злоумышленнику нарушить конфиденциальность информации
BDU:2017-00642
Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2017-00643
Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2017-00644
Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2017-00964
Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2017-00965
Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2017-00966
Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2017-00967
Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2017-00968
Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2017-00974
Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2017-00975
Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2017-01201
Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2017-01202
Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2017-01203
Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2017-01204
Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2017-01205
Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2017-01206
Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2017-01207
Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2017-01512
Уязвимость функционала метаданных программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2017-01513
Уязвимость SDK-функционала метаданных профиля медиапотока программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2017-01577
Уязвимость класса LocaleID программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2017-01578
Уязвимость программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2017-01579
Уязвимость компонента, отвечающего за внутреннее представление растровых данных, программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2017-01580
Уязвимость модуля Adobe Texture Format (ATF) программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2017-01581
Уязвимость анализатора PNG изображений программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2017-01582
Уязвимость модуля MPEG-4 AVC программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2017-01583
Уязвимость класса ActionsScript 2 XML программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2018-00200
Уязвимость программной платформы Flash Player, связанная с чтением данных за границами буфера в памяти, позволяющая нарушителю выпонить произвольный код
BDU:2018-00201
Уязвимость программной платформы Flash Player, связанная с чтением данных за границами буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2018-00212
Уязвимость компонента Primetime SDK программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2018-00213
Уязвимость компонента Primetime SDK программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2018-00214
Уязвимость программной платформы Flash Player, вызванная целочисленным переполнением, позволяющая нарушителю выполнить произвольный код
BDU:2018-00449
Уязвимость компонента Primetime SDK программной платформы Flash Player, позволяющая нарушителю выполнить произвольный код
BDU:2018-00894
Уязвимость программной платформы Flash Player, связанная с использованием памяти после её освобождения, позволяющая нарушителю выполнить произвольный код
BDU:2018-00993
Уязвимость программной платформы Flash Player, связанная с использованием памяти после её освобождения, позволяющая нарушителю выполнить произвольный код
BDU:2021-05393
Уязвимость программной платформы Adobe Flash Player, связанная с неправильным индексированием массива данных, позволяющая нарушителю выполнить произвольный код
BDU:2021-05395
Уязвимость программной платформы Adobe Flash Player, связанная с записью данных за пределами буфера, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2017-11213
An issue was discovered in Adobe Flash Player 27.0.0.183 and earlier versions. This vulnerability occurs as a result of a computation that reads data that is past the end of the target buffer due to an integer overflow; the computation is part of the abstraction that creates an arbitrarily sized transparent or opaque bitmap image. The use of an invalid (out-of-range) pointer offset during access of internal data structure fields causes the vulnerability. A successful attack can lead to sensitive data exposure.
Modified: 2024-11-21
CVE-2017-11215
An issue was discovered in Adobe Flash Player 27.0.0.183 and earlier versions. This vulnerability is an instance of a use after free vulnerability in the Primetime SDK. The mismatch between an old and a new object can provide an attacker with unintended memory access -- potentially leading to code corruption, control-flow hijack, or an information leak attack. Successful exploitation could lead to arbitrary code execution.
Modified: 2024-11-21
CVE-2017-11225
An issue was discovered in Adobe Flash Player 27.0.0.183 and earlier versions. This vulnerability is an instance of a use after free vulnerability in the Primetime SDK metadata functionality. The mismatch between an old and a new object can provide an attacker with unintended memory access -- potentially leading to code corruption, control-flow hijack, or an information leak attack. Successful exploitation could lead to arbitrary code execution.
Modified: 2024-11-21
CVE-2017-11281
Adobe Flash Player has an exploitable memory corruption vulnerability in the text handling function. Successful exploitation could lead to arbitrary code execution. This affects 26.0.0.151 and earlier.
- 100710
- 100710
- 1039314
- 1039314
- RHSA-2017:2702
- RHSA-2017:2702
- https://helpx.adobe.com/security/products/flash-player/apsb17-28.html
- https://helpx.adobe.com/security/products/flash-player/apsb17-28.html
- GLSA-201709-16
- GLSA-201709-16
- 42781
- 42781
- 42782
- 42782
- https://www.youtube.com/watch?v=CvmnUeza9zw
- https://www.youtube.com/watch?v=CvmnUeza9zw
Modified: 2024-11-21
CVE-2017-11282
Adobe Flash Player has an exploitable memory corruption vulnerability in the MP4 atom parser. Successful exploitation could lead to arbitrary code execution. This affects 26.0.0.151 and earlier.
- http://packetstormsecurity.com/files/144332/Adobe-Flash-appleToRange-Out-Of-Bounds-Read.html
- http://packetstormsecurity.com/files/144332/Adobe-Flash-appleToRange-Out-Of-Bounds-Read.html
- 100716
- 100716
- 1039314
- 1039314
- RHSA-2017:2702
- RHSA-2017:2702
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1323
- https://bugs.chromium.org/p/project-zero/issues/detail?id=1323
- https://helpx.adobe.com/security/products/flash-player/apsb17-28.html
- https://helpx.adobe.com/security/products/flash-player/apsb17-28.html
- GLSA-201709-16
- GLSA-201709-16
- 42783
- 42783
- https://www.youtube.com/watch?v=6iZnIQbRf5M
- https://www.youtube.com/watch?v=6iZnIQbRf5M
Modified: 2025-02-13
CVE-2017-11292
Adobe Flash Player version 27.0.0.159 and earlier has a flawed bytecode verification procedure, which allows for an untrusted value to be used in the calculation of an array index. This can lead to type confusion, and successful exploitation could lead to arbitrary code execution.
Modified: 2024-11-21
CVE-2017-11305
A regression affecting Adobe Flash Player version 27.0.0.187 (and earlier versions) causes the unintended reset of the global settings preference file when a user clears browser data.
Modified: 2024-11-21
CVE-2017-2997
Adobe Flash Player versions 24.0.0.221 and earlier have an exploitable buffer overflow / underflow vulnerability in the Primetime TVSDK that supports customizing ad information. Successful exploitation could lead to arbitrary code execution.
Modified: 2024-11-21
CVE-2017-2998
Adobe Flash Player versions 24.0.0.221 and earlier have an exploitable memory corruption vulnerability in the Primetime TVSDK API functionality related to timeline interactions. Successful exploitation could lead to arbitrary code execution.
Modified: 2024-11-21
CVE-2017-2999
Adobe Flash Player versions 24.0.0.221 and earlier have an exploitable memory corruption vulnerability in the Primetime TVSDK functionality related to hosting playback surface. Successful exploitation could lead to arbitrary code execution.
Modified: 2024-11-21
CVE-2017-3000
Adobe Flash Player versions 24.0.0.221 and earlier have a vulnerability in the random number generator used for constant blinding. Successful exploitation could lead to information disclosure.
Modified: 2024-11-21
CVE-2017-3001
Adobe Flash Player versions 24.0.0.221 and earlier have an exploitable use after free vulnerability related to garbage collection in the ActionScript 2 VM. Successful exploitation could lead to arbitrary code execution.
Modified: 2024-11-21
CVE-2017-3002
Adobe Flash Player versions 24.0.0.221 and earlier have an exploitable use after free vulnerability in the ActionScript2 TextField object related to the variable property. Successful exploitation could lead to arbitrary code execution.
Modified: 2024-11-21
CVE-2017-3003
Adobe Flash Player versions 24.0.0.221 and earlier have an exploitable use after free vulnerability related to an interaction between the privacy user interface and the ActionScript 2 Camera object. Successful exploitation could lead to arbitrary code execution.
Modified: 2024-11-21
CVE-2017-3058
Adobe Flash Player versions 25.0.0.127 and earlier have an exploitable use after free vulnerability in the sound class. Successful exploitation could lead to arbitrary code execution.
Modified: 2024-11-21
CVE-2017-3059
Adobe Flash Player versions 25.0.0.127 and earlier have an exploitable use after free vulnerability in the internal script object. Successful exploitation could lead to arbitrary code execution.
Modified: 2024-11-21
CVE-2017-3060
Adobe Flash Player versions 25.0.0.127 and earlier have an exploitable memory corruption vulnerability in the ActionScript2 code parser. Successful exploitation could lead to arbitrary code execution.
Modified: 2024-11-21
CVE-2017-3061
Adobe Flash Player versions 25.0.0.127 and earlier have an exploitable memory corruption vulnerability in the SWF parser. Successful exploitation could lead to arbitrary code execution.
Modified: 2024-11-21
CVE-2017-3062
Adobe Flash Player versions 25.0.0.127 and earlier have an exploitable use after free vulnerability in ActionScript2 when creating a getter/setter property. Successful exploitation could lead to arbitrary code execution.
Modified: 2024-11-21
CVE-2017-3063
Adobe Flash Player versions 25.0.0.127 and earlier have an exploitable use after free vulnerability in the ActionScript2 NetStream class. Successful exploitation could lead to arbitrary code execution.
Modified: 2024-11-21
CVE-2017-3064
Adobe Flash Player versions 25.0.0.127 and earlier have an exploitable memory corruption vulnerability when parsing a shape outline. Successful exploitation could lead to arbitrary code execution.
Modified: 2024-11-21
CVE-2017-3068
Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable memory corruption vulnerability in the Advanced Video Coding engine. Successful exploitation could lead to arbitrary code execution.
Modified: 2024-11-21
CVE-2017-3069
Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable memory corruption vulnerability in the BlendMode class. Successful exploitation could lead to arbitrary code execution.
Modified: 2024-11-21
CVE-2017-3070
Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable memory corruption vulnerability in the ConvolutionFilter class. Successful exploitation could lead to arbitrary code execution.
Modified: 2024-11-21
CVE-2017-3071
Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable use after free vulnerability when masking display objects. Successful exploitation could lead to arbitrary code execution.
Modified: 2024-11-21
CVE-2017-3072
Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable memory corruption vulnerability in the BitmapData class. Successful exploitation could lead to arbitrary code execution.
Modified: 2024-11-21
CVE-2017-3073
Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable use after free vulnerability when handling multiple mask properties of display objects, aka memory corruption. Successful exploitation could lead to arbitrary code execution.
Modified: 2024-11-21
CVE-2017-3074
Adobe Flash Player versions 25.0.0.148 and earlier have an exploitable memory corruption vulnerability in the Graphics class. Successful exploitation could lead to arbitrary code execution.
Modified: 2024-11-21
CVE-2017-3075
Adobe Flash Player versions 25.0.0.171 and earlier have an exploitable use after free vulnerability when manipulating the ActionsScript 2 XML class. Successful exploitation could lead to arbitrary code execution.
Modified: 2024-11-21
CVE-2017-3076
Adobe Flash Player versions 25.0.0.171 and earlier have an exploitable memory corruption vulnerability in the MPEG-4 AVC module. Successful exploitation could lead to arbitrary code execution.
Modified: 2024-11-21
CVE-2017-3077
Adobe Flash Player versions 25.0.0.171 and earlier have an exploitable memory corruption vulnerability in the PNG image parser. Successful exploitation could lead to arbitrary code execution.
Modified: 2024-11-21
CVE-2017-3078
Adobe Flash Player versions 25.0.0.171 and earlier have an exploitable memory corruption vulnerability in the Adobe Texture Format (ATF) module. Successful exploitation could lead to arbitrary code execution.
Modified: 2024-11-21
CVE-2017-3079
Adobe Flash Player versions 25.0.0.171 and earlier have an exploitable memory corruption vulnerability in the internal representation of raster data. Successful exploitation could lead to arbitrary code execution.
Modified: 2024-11-21
CVE-2017-3081
Adobe Flash Player versions 25.0.0.171 and earlier have an exploitable use after free vulnerability during internal computation caused by multiple display object mask manipulations. Successful exploitation could lead to arbitrary code execution.
Modified: 2024-11-21
CVE-2017-3082
Adobe Flash Player versions 25.0.0.171 and earlier have an exploitable memory corruption vulnerability in the LocaleID class. Successful exploitation could lead to arbitrary code execution.
Modified: 2024-11-21
CVE-2017-3083
Adobe Flash Player versions 25.0.0.171 and earlier have an exploitable use after free vulnerability in the Primetime SDK functionality related to the profile metadata of the media stream. Successful exploitation could lead to arbitrary code execution.
Modified: 2024-11-21
CVE-2017-3084
Adobe Flash Player versions 25.0.0.171 and earlier have an exploitable use after free vulnerability in the advertising metadata functionality. Successful exploitation could lead to arbitrary code execution.
Modified: 2024-11-21
CVE-2017-3085
Adobe Flash Player versions 26.0.0.137 and earlier have a security bypass vulnerability that leads to information disclosure when performing URL redirect.
- 100191
- 100191
- 1039088
- 1039088
- http://www.zerodayinitiative.com/advisories/ZDI-17-634/
- http://www.zerodayinitiative.com/advisories/ZDI-17-634/
- RHSA-2017:2457
- RHSA-2017:2457
- https://blog.bjornweb.nl/2017/08/flash-remote-sandbox-escape-windows-user-credentials-leak/
- https://blog.bjornweb.nl/2017/08/flash-remote-sandbox-escape-windows-user-credentials-leak/
- https://helpx.adobe.com/security/products/flash-player/apsb17-23.html
- https://helpx.adobe.com/security/products/flash-player/apsb17-23.html
- GLSA-201709-16
- GLSA-201709-16
Modified: 2024-11-21
CVE-2017-3106
Adobe Flash Player versions 26.0.0.137 and earlier have an exploitable type confusion vulnerability when parsing SWF files. Successful exploitation could lead to arbitrary code execution.
Modified: 2024-11-21
CVE-2017-3112
An issue was discovered in Adobe Flash Player 27.0.0.183 and earlier versions. This vulnerability occurs as a result of a computation that reads data that is past the end of the target buffer; the computation is part of AdobePSDK metadata. The use of an invalid (out-of-range) pointer offset during access of internal data structure fields causes the vulnerability. A successful attack can lead to sensitive data exposure.
Modified: 2024-11-21
CVE-2017-3114
An issue was discovered in Adobe Flash Player 27.0.0.183 and earlier versions. This vulnerability occurs as a result of a computation that reads data that is past the end of the target buffer; the computation is part of providing language- and region- or country- specific functionality. The use of an invalid (out-of-range) pointer offset during access of internal data structure fields causes the vulnerability. A successful attack can lead to sensitive data exposure.
Modified: 2024-11-21
CVE-2018-15967
Adobe Flash Player versions 30.0.0.154 and earlier have a privilege escalation vulnerability. Successful exploitation could lead to information disclosure.
Modified: 2024-11-21
CVE-2018-4871
An Out-of-bounds Read issue was discovered in Adobe Flash Player before 28.0.0.137. This vulnerability occurs because of computation that reads data that is past the end of the target buffer. The use of an invalid (out-of-range) pointer offset during access of internal data structure fields causes the vulnerability. A successful attack can lead to sensitive data exposure.
Modified: 2024-11-21
CVE-2018-4877
A use-after-free vulnerability was discovered in Adobe Flash Player before 28.0.0.161. This vulnerability occurs due to a dangling pointer in the Primetime SDK related to media player's quality of service functionality. A successful attack can lead to arbitrary code execution.
Modified: 2025-02-13
CVE-2018-4878
A use-after-free vulnerability was discovered in Adobe Flash Player before 28.0.0.161. This vulnerability occurs due to a dangling pointer in the Primetime SDK related to media player handling of listener objects. A successful attack can lead to arbitrary code execution. This was exploited in the wild in January and February 2018.
- http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html
- 102893
- 1040318
- RHSA-2018:0285
- https://blog.morphisec.com/flash-exploit-cve-2018-4878-spotted-in-the-wild-massive-malspam-campaign
- https://github.com/InQuest/malware-samples/tree/master/CVE-2018-4878-Adobe-Flash-DRM-UAF-0day
- https://github.com/vysec/CVE-2018-4878
- https://helpx.adobe.com/security/products/flash-player/apsb18-03.html
- https://securingtomorrow.mcafee.com/mcafee-labs/hackers-bypassed-adobe-flash-protection-mechanism/
- https://threatpost.com/adobe-flash-player-zero-day-spotted-in-the-wild/129742/
- https://www.darkreading.com/threat-intelligence/adobe-flash-vulnerability-reappears-in-malicious-word-files/d/d-id/1331139
- 44412
- https://www.fireeye.com/blog/threat-research/2018/02/attacks-leveraging-adobe-zero-day.html
- https://www.trendmicro.com/vinfo/us/security/news/vulnerabilities-and-exploits/north-korean-hackers-allegedly-exploit-adobe-flash-player-vulnerability-cve-2018-4878-against-south-korean-targets
- http://blog.talosintelligence.com/2018/02/group-123-goes-wild.html
- https://www.trendmicro.com/vinfo/us/security/news/vulnerabilities-and-exploits/north-korean-hackers-allegedly-exploit-adobe-flash-player-vulnerability-cve-2018-4878-against-south-korean-targets
- https://www.fireeye.com/blog/threat-research/2018/02/attacks-leveraging-adobe-zero-day.html
- 44412
- https://www.darkreading.com/threat-intelligence/adobe-flash-vulnerability-reappears-in-malicious-word-files/d/d-id/1331139
- https://threatpost.com/adobe-flash-player-zero-day-spotted-in-the-wild/129742/
- https://securingtomorrow.mcafee.com/mcafee-labs/hackers-bypassed-adobe-flash-protection-mechanism/
- https://helpx.adobe.com/security/products/flash-player/apsb18-03.html
- https://github.com/vysec/CVE-2018-4878
- https://github.com/InQuest/malware-samples/tree/master/CVE-2018-4878-Adobe-Flash-DRM-UAF-0day
- https://blog.morphisec.com/flash-exploit-cve-2018-4878-spotted-in-the-wild-massive-malspam-campaign
- RHSA-2018:0285
- 1040318
- 102893
Modified: 2024-11-21
CVE-2018-4919
Adobe Flash Player versions 28.0.0.161 and earlier have an exploitable use after free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Modified: 2024-11-21
CVE-2018-4920
Adobe Flash Player versions 28.0.0.161 and earlier have an exploitable type confusion vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Modified: 2024-11-21
CVE-2018-4932
Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable Use-After-Free vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Modified: 2024-11-21
CVE-2018-4933
Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Modified: 2024-11-21
CVE-2018-4934
Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Modified: 2024-11-21
CVE-2018-4935
Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Modified: 2024-11-21
CVE-2018-4936
Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable Heap Overflow vulnerability. Successful exploitation could lead to information disclosure.
Modified: 2024-11-21
CVE-2018-4937
Adobe Flash Player versions 29.0.0.113 and earlier have an exploitable out-of-bounds write vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Modified: 2024-11-21
CVE-2018-4944
Adobe Flash Player versions 29.0.0.140 and earlier have an exploitable type confusion vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Modified: 2024-11-21
CVE-2018-4945
Adobe Flash Player versions 29.0.0.171 and earlier have a Type Confusion vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Modified: 2024-11-21
CVE-2018-5000
Adobe Flash Player versions 29.0.0.171 and earlier have an Integer Overflow vulnerability. Successful exploitation could lead to information disclosure.
Modified: 2024-11-21
CVE-2018-5001
Adobe Flash Player versions 29.0.0.171 and earlier have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Modified: 2025-02-13
CVE-2018-5002
Adobe Flash Player versions 29.0.0.171 and earlier have a Stack-based buffer overflow vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Modified: 2024-11-21
CVE-2018-5007
Adobe Flash Player 30.0.0.113 and earlier versions have a Type Confusion vulnerability. Successful exploitation could lead to arbitrary code execution in the context of the current user.
Modified: 2024-11-21
CVE-2018-5008
Adobe Flash Player 30.0.0.113 and earlier versions have an Out-of-bounds read vulnerability. Successful exploitation could lead to information disclosure.
Closed bugs
update required (known vulnerabilities, blocked in chromium)
chromium ругается на старый flash
Браузер не видит adobe flash player
Closed vulnerabilities
Modified: 2024-11-21
CVE-2016-10246
Buffer overflow in the main function in jstest_main.c in Mujstest in Artifex Software, Inc. MuPDF before 1.10 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted file.
- http://git.ghostscript.com/?p=mupdf.git%3Bh=cfe8f35bca61056363368c343be36812abde0a06
- http://git.ghostscript.com/?p=mupdf.git%3Bh=cfe8f35bca61056363368c343be36812abde0a06
- [oss-security] 20170313 Re: mupdf: mujstest: global-buffer-overflow in main (jstest_main.c)
- [oss-security] 20170313 Re: mupdf: mujstest: global-buffer-overflow in main (jstest_main.c)
- https://blogs.gentoo.org/ago/2016/09/24/mupdf-mujstest-global-buffer-overflow-in-main-jstest_main-c/
- https://blogs.gentoo.org/ago/2016/09/24/mupdf-mujstest-global-buffer-overflow-in-main-jstest_main-c/
- https://bugs.ghostscript.com/show_bug.cgi?id=697020
- [debian-lts-announce] 20210923 [SECURITY] [DLA 2765-1] mupdf security update
- [debian-lts-announce] 20210923 [SECURITY] [DLA 2765-1] mupdf security update
Modified: 2024-11-21
CVE-2016-10247
Buffer overflow in the my_getline function in jstest_main.c in Mujstest in Artifex Software, Inc. MuPDF before 1.10 allows remote attackers to cause a denial of service (out-of-bounds write) via a crafted file.
- http://git.ghostscript.com/?p=mupdf.git%3Bh=446097f97b71ce20fa8d1e45e070f2e62676003e
- http://git.ghostscript.com/?p=mupdf.git%3Bh=446097f97b71ce20fa8d1e45e070f2e62676003e
- [oss-security] 20170313 Re: mupdf: mujstest: global-buffer-overflow in my_getline (jstest_main.c)
- [oss-security] 20170313 Re: mupdf: mujstest: global-buffer-overflow in my_getline (jstest_main.c)
- 97099
- 97099
- https://blogs.gentoo.org/ago/2016/09/24/mupdf-mujstest-global-buffer-overflow-in-my_getline-jstest_main-c/
- https://blogs.gentoo.org/ago/2016/09/24/mupdf-mujstest-global-buffer-overflow-in-my_getline-jstest_main-c/
- https://bugs.ghostscript.com/show_bug.cgi?id=697021
- [debian-lts-announce] 20210923 [SECURITY] [DLA 2765-1] mupdf security update
- [debian-lts-announce] 20210923 [SECURITY] [DLA 2765-1] mupdf security update
Modified: 2024-11-21
CVE-2016-6265
Use-after-free vulnerability in the pdf_load_xref function in pdf/pdf-xref.c in MuPDF allows remote attackers to cause a denial of service (crash) via a crafted PDF file.
- http://bugs.ghostscript.com/show_bug.cgi?id=696941
- http://bugs.ghostscript.com/show_bug.cgi?id=696941
- http://git.ghostscript.com/?p=mupdf.git%3Bh=fa1936405b6a84e5c9bb440912c23d532772f958
- http://git.ghostscript.com/?p=mupdf.git%3Bh=fa1936405b6a84e5c9bb440912c23d532772f958
- openSUSE-SU-2016:1926
- openSUSE-SU-2016:1926
- DSA-3655
- DSA-3655
- [oss-security] 20160721 Re: mupdf library use after free
- [oss-security] 20160721 Re: mupdf library use after free
- 92071
- 92071
- GLSA-201702-12
- GLSA-201702-12
Modified: 2024-11-21
CVE-2016-6525
Heap-based buffer overflow in the pdf_load_mesh_params function in pdf/pdf-shade.c in MuPDF allows remote attackers to cause a denial of service (crash) or execute arbitrary code via a large decode array.
- http://bugs.ghostscript.com/show_bug.cgi?id=696954
- http://bugs.ghostscript.com/show_bug.cgi?id=696954
- http://git.ghostscript.com/?p=mupdf.git%3Bh=39b0f07dd960f34e7e6bf230ffc3d87c41ef0f2e
- http://git.ghostscript.com/?p=mupdf.git%3Bh=39b0f07dd960f34e7e6bf230ffc3d87c41ef0f2e
- DSA-3655
- DSA-3655
- [oss-security] 20160803 Re: CVE request:Heap overflow vulns in MuPDF
- [oss-security] 20160803 Re: CVE request:Heap overflow vulns in MuPDF
- 92266
- 92266
- GLSA-201702-12
- GLSA-201702-12
Modified: 2024-11-21
CVE-2016-8674
The pdf_to_num function in pdf-object.c in MuPDF before 1.10 allows remote attackers to cause a denial of service (use-after-free and application crash) via a crafted file.
- http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=1e03c06456d997435019fb3526fa2d4be7dbc6ec
- http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=1e03c06456d997435019fb3526fa2d4be7dbc6ec
- DSA-3797
- DSA-3797
- [oss-security] 20161015 Re: mupdf: use-after-free in pdf_to_num (pdf-object.c)
- [oss-security] 20161015 Re: mupdf: use-after-free in pdf_to_num (pdf-object.c)
- 93127
- 93127
- https://blogs.gentoo.org/ago/2016/09/22/mupdf-use-after-free-in-pdf_to_num-pdf-object-c/
- https://blogs.gentoo.org/ago/2016/09/22/mupdf-use-after-free-in-pdf_to_num-pdf-object-c/
- https://bugs.ghostscript.com/show_bug.cgi?id=697015
- https://bugs.ghostscript.com/show_bug.cgi?id=697015
- https://bugs.ghostscript.com/show_bug.cgi?id=697019
- https://bugs.ghostscript.com/show_bug.cgi?id=697019
- https://bugzilla.redhat.com/show_bug.cgi?id=1385685
- https://bugzilla.redhat.com/show_bug.cgi?id=1385685
Modified: 2024-11-21
CVE-2017-15369
The build_filter_chain function in pdf/pdf-stream.c in Artifex MuPDF before 2017-09-25 mishandles a certain case where a variable may reside in a register, which allows remote attackers to cause a denial of service (Fitz fz_drop_imp use-after-free and application crash) or possibly have unspecified other impact via a crafted PDF document.
Modified: 2024-11-21
CVE-2017-17866
pdf/pdf-write.c in Artifex MuPDF before 1.12.0 mishandles certain length changes when a repair operation occurs during a clean operation, which allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted PDF document.
Modified: 2024-11-21
CVE-2017-5896
Heap-based buffer overflow in the fz_subsample_pixmap function in fitz/pixmap.c in MuPDF 1.10a allows remote attackers to cause a denial of service (out-of-bounds read and crash) via a crafted image.
- http://git.ghostscript.com/?p=mupdf.git%3Bh=2c4e5867ee699b1081527bc6c6ea0e99a35a5c27
- http://git.ghostscript.com/?p=mupdf.git%3Bh=2c4e5867ee699b1081527bc6c6ea0e99a35a5c27
- DSA-3797
- DSA-3797
- [oss-security] 20170206 mupdf: heap-based buffer overflow in fz_subsample_pixmap
- [oss-security] 20170206 mupdf: heap-based buffer overflow in fz_subsample_pixmap
- [oss-security] 20170207 Re: mupdf: heap-based buffer overflow in fz_subsample_pixmap
- [oss-security] 20170207 Re: mupdf: heap-based buffer overflow in fz_subsample_pixmap
- 96139
- 96139
- https://bugs.ghostscript.com/show_bug.cgi?id=697515
- https://bugs.ghostscript.com/show_bug.cgi?id=697515
- GLSA-201702-12
- GLSA-201702-12
Modified: 2024-11-21
CVE-2017-5991
An issue was discovered in Artifex MuPDF before 1912de5f08e90af1d9d0a9791f58ba3afdb9d465. The pdf_run_xobject function in pdf-op-run.c encounters a NULL pointer dereference during a Fitz fz_paint_pixmap_with_mask painting operation. Versions 1.11 and later are unaffected.
- http://git.ghostscript.com/?p=mupdf.git%3Bh=1912de5f08e90af1d9d0a9791f58ba3afdb9d465
- http://git.ghostscript.com/?p=mupdf.git%3Bh=1912de5f08e90af1d9d0a9791f58ba3afdb9d465
- DSA-3797
- DSA-3797
- 96213
- 96213
- https://bugs.ghostscript.com/show_bug.cgi?id=697500
- https://bugs.ghostscript.com/show_bug.cgi?id=697500
- GLSA-201706-08
- GLSA-201706-08
- 42138
- 42138
Modified: 2024-11-21
CVE-2018-1000036
In Artifex MuPDF 1.12.0 and earlier, multiple memory leaks in the PDF parser allow an attacker to cause a denial of service (memory leak) via a crafted file.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5502
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5502
- https://bugs.ghostscript.com/show_bug.cgi?id=698887
- https://bugs.ghostscript.com/show_bug.cgi?id=698887
- https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=8aa2bd34065d2844aae778bd4cc20c74bbcd9406
- [debian-lts-announce] 20210923 [SECURITY] [DLA 2765-1] mupdf security update
- [debian-lts-announce] 20210923 [SECURITY] [DLA 2765-1] mupdf security update
- GLSA-201811-15
- GLSA-201811-15
Modified: 2024-11-21
CVE-2018-1000037
In Artifex MuPDF 1.12.0 and earlier, multiple reachable assertions in the PDF parser allow an attacker to cause a denial of service (assert crash) via a crafted file.
- http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=71ceebcf56e682504da22c4035b39a2d451e8ffd%3Bhp=7f82c01523505052615492f8e220f4348ba46995
- http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=71ceebcf56e682504da22c4035b39a2d451e8ffd%3Bhp=7f82c01523505052615492f8e220f4348ba46995
- http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=8a3257b01faa899dd9b5e35c6bb3403cd709c371%3Bhp=de39f005f12a1afc6973c1f5cec362d6545f70cb
- http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=8a3257b01faa899dd9b5e35c6bb3403cd709c371%3Bhp=de39f005f12a1afc6973c1f5cec362d6545f70cb
- http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=b2e7d38e845c7d4922d05e6e41f3a2dc1bc1b14a%3Bhp=f51836b9732c38d945b87fda0770009a77ba680c
- http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=b2e7d38e845c7d4922d05e6e41f3a2dc1bc1b14a%3Bhp=f51836b9732c38d945b87fda0770009a77ba680c
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5490
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5490
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5501
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5501
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5503
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5503
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5511
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5511
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5564
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5564
- https://bugs.ghostscript.com/show_bug.cgi?id=698882
- https://bugs.ghostscript.com/show_bug.cgi?id=698882
- https://bugs.ghostscript.com/show_bug.cgi?id=698886
- https://bugs.ghostscript.com/show_bug.cgi?id=698886
- https://bugs.ghostscript.com/show_bug.cgi?id=698888
- https://bugs.ghostscript.com/show_bug.cgi?id=698888
- https://bugs.ghostscript.com/show_bug.cgi?id=698890
- https://bugs.ghostscript.com/show_bug.cgi?id=698890
- GLSA-201811-15
- GLSA-201811-15
- DSA-4334
- DSA-4334
Modified: 2024-11-21
CVE-2018-1000038
In Artifex MuPDF 1.12.0 and earlier, a stack buffer overflow in function pdf_lookup_cmap_full in pdf/pdf-cmap.c could allow an attacker to execute arbitrary code via a crafted file.
- http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=71ceebcf56e682504da22c4035b39a2d451e8ffd%3Bhp=7f82c01523505052615492f8e220f4348ba46995
- http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=71ceebcf56e682504da22c4035b39a2d451e8ffd%3Bhp=7f82c01523505052615492f8e220f4348ba46995
- http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=f597300439e62f5e921f0d7b1e880b5c1a1f1607%3Bhp=093fc3b098dc5fadef5d8ad4b225db9fb124758b
- http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=f597300439e62f5e921f0d7b1e880b5c1a1f1607%3Bhp=093fc3b098dc5fadef5d8ad4b225db9fb124758b
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5494
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5494
- https://bugs.ghostscript.com/show_bug.cgi?id=698884
- https://bugs.ghostscript.com/show_bug.cgi?id=698884
- GLSA-201811-15
- GLSA-201811-15
Modified: 2024-11-21
CVE-2018-1000039
In Artifex MuPDF 1.12.0 and earlier, multiple heap use after free bugs in the PDF parser could allow an attacker to execute arbitrary code, read memory, or cause a denial of service via a crafted file.
- http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=4dcc6affe04368461310a21238f7e1871a752a05%3Bhp=8ec561d1bccc46e9db40a9f61310cd8b3763914e
- http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=4dcc6affe04368461310a21238f7e1871a752a05%3Bhp=8ec561d1bccc46e9db40a9f61310cd8b3763914e
- http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=71ceebcf56e682504da22c4035b39a2d451e8ffd%3Bhp=7f82c01523505052615492f8e220f4348ba46995
- http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=71ceebcf56e682504da22c4035b39a2d451e8ffd%3Bhp=7f82c01523505052615492f8e220f4348ba46995
- http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=f597300439e62f5e921f0d7b1e880b5c1a1f1607%3Bhp=093fc3b098dc5fadef5d8ad4b225db9fb124758b
- http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=f597300439e62f5e921f0d7b1e880b5c1a1f1607%3Bhp=093fc3b098dc5fadef5d8ad4b225db9fb124758b
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5492
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5492
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5513
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5513
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5521
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5521
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5604
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5604
- https://bugs.ghostscript.com/show_bug.cgi?id=698883
- https://bugs.ghostscript.com/show_bug.cgi?id=698883
- https://bugs.ghostscript.com/show_bug.cgi?id=698888
- https://bugs.ghostscript.com/show_bug.cgi?id=698888
- https://bugs.ghostscript.com/show_bug.cgi?id=698891
- https://bugs.ghostscript.com/show_bug.cgi?id=698891
- https://bugs.ghostscript.com/show_bug.cgi?id=698892
- https://bugs.ghostscript.com/show_bug.cgi?id=698892
- https://bugs.ghostscript.com/show_bug.cgi?id=698901
- https://bugs.ghostscript.com/show_bug.cgi?id=698901
- GLSA-201811-15
- GLSA-201811-15
Modified: 2024-11-21
CVE-2018-1000040
In Artifex MuPDF 1.12.0 and earlier, multiple use of uninitialized value bugs in the PDF parser could allow an attacker to cause a denial of service (crash) or influence program flow via a crafted file.
- http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=83d4dae44c71816c084a635550acc1a51529b881%3Bhp=f597300439e62f5e921f0d7b1e880b5c1a1f1607
- http://git.ghostscript.com/?p=mupdf.git%3Ba=commitdiff%3Bh=83d4dae44c71816c084a635550acc1a51529b881%3Bhp=f597300439e62f5e921f0d7b1e880b5c1a1f1607
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5596
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5596
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5600
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5600
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5603
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5603
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5609
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5609
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5610
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=5610
- https://bugs.ghostscript.com/show_bug.cgi?id=698904
- https://bugs.ghostscript.com/show_bug.cgi?id=698904
- https://bugs.ghostscript.com/show_bug.cgi?id=699086
- https://bugs.ghostscript.com/show_bug.cgi?id=699086
- https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=ace9e69017c08e1e4ce5912014177414c0382004
- https://cgit.ghostscript.com/cgi-bin/cgit.cgi/mupdf.git/commit/?id=ace9e69017c08e1e4ce5912014177414c0382004
- GLSA-201811-15
- GLSA-201811-15
- DSA-4334
- DSA-4334
Closed vulnerabilities
BDU:2019-02464
Уязвимость системы управления конфигурациями и удалённого выполнения операций SaltStack Salt, связанная с недостатками процедуры аутентификации, позволяющая нарушителю обойти процедуру аутентификации или выполнить произвольные команды
BDU:2021-01180
Уязвимость системы управления конфигурациями и удалённого выполнения операций SaltStack Salt, связанная с ошибками процедуры подтверждения подлинности сертификата, позволяющая нарушителю выполнить атаку типа «человек посередине»
BDU:2021-01308
Уязвимость компонента salt-api системы управления конфигурациями SaltStack, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2021-01900
Уязвимость компонента salt-netapi системы управления конфигурациями и удалённого выполнения операций Salt, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-01902
Уязвимость модуля TLS системы управления конфигурациями и удалённого выполнения операций Salt, связанная с неправильным присвоением разрешений для критичного ресурса, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2021-01903
Уязвимость системы управления конфигурациями и удалённого выполнения операций Salt, связанная с отсутствием мер по нейтрализации специальных элементов, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-05977
Уязвимость системы управления конфигурациями и удалённого выполнения операций SaltStack Salt, связанная с неправильным ограничением доступа, позволяющая нарушителю получить несанкционированный доступ к другим ограниченным функциям
BDU:2021-06340
Уязвимость функции salt.utils.thin.gen_thin() системы управления конфигурациями и удалённого выполнения операций SaltStack Salt, позволяющая нарушителю выполнять произвольные команды в целевой системе
BDU:2021-06341
Уязвимость системы управления конфигурациями и удалённого выполнения операций SaltStack Salt, позволяющая нарушителю локально повысить привилегии.
BDU:2021-06345
Уязвимость системы управления конфигурациями и удалённого выполнения операций SaltStack Salt, позволяющая нарушителю выполнять произвольные команды с повышенными привилегиями
BDU:2021-06348
Уязвимость компонента wheel.pillar_roots.write системы управления конфигурациями и удалённого выполнения операций SaltStack Salt, связанная с ошибками при проверке вводимых данных, позволяющая нарушителю выполнить произвольный код
BDU:2022-00038
Уязвимость системы управления конфигурациями и удалённого выполнения операций SaltStack Salt, связанная с ошибками при обработке запросов аутентификации для истекших токенов eauth, позволяющая нарушителю выполнить произвольные команды
BDU:2022-07041
Уязвимость системы управления конфигурациями и удалённого выполнения операций SaltStack Salt, связанная с ошибками процедуры подтверждения подлинности сертификата, позволяющая нарушителю выполнить атаку типа «человек посередине»
BDU:2022-07060
Уязвимость реализации метода salt.wheel.pillar_roots.write системы управления конфигурациями и удалённого выполнения операций SaltStack Salt, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2024-11-21
CVE-2018-15750
Directory Traversal vulnerability in salt-api in SaltStack Salt before 2017.7.8 and 2018.3.x before 2018.3.3 allows remote attackers to determine which files exist on the server.
- openSUSE-SU-2020:1074
- openSUSE-SU-2020:1074
- https://docs.saltstack.com/en/2017.7/topics/releases/2017.7.8.html
- https://docs.saltstack.com/en/2017.7/topics/releases/2017.7.8.html
- https://docs.saltstack.com/en/latest/topics/releases/2018.3.3.html
- https://docs.saltstack.com/en/latest/topics/releases/2018.3.3.html
- [salt-users] 20181024 2017.7.8 Released - Security Advisory
- [salt-users] 20181024 2017.7.8 Released - Security Advisory
- [salt-users] 20181024 2018.3.3 Released - Security Advisory
- [salt-users] 20181024 2018.3.3 Released - Security Advisory
- [debian-lts-announce] 20200728 [SECURITY] [DLA 2294-1] salt security update
- [debian-lts-announce] 20200728 [SECURITY] [DLA 2294-1] salt security update
- USN-4459-1
- USN-4459-1
Modified: 2024-11-21
CVE-2018-15751
SaltStack Salt before 2017.7.8 and 2018.3.x before 2018.3.3 allow remote attackers to bypass authentication and execute arbitrary commands via salt-api(netapi).
- openSUSE-SU-2020:1074
- openSUSE-SU-2020:1074
- https://docs.saltstack.com/en/2017.7/topics/releases/2017.7.8.html
- https://docs.saltstack.com/en/2017.7/topics/releases/2017.7.8.html
- https://docs.saltstack.com/en/latest/topics/releases/2018.3.3.html
- https://docs.saltstack.com/en/latest/topics/releases/2018.3.3.html
- [salt-users] 20181024 2017.7.8 Released - Security Advisory
- [salt-users] 20181024 2017.7.8 Released - Security Advisory
- [salt-users] 20181024 2018.3.3 Released - Security Advisory
- [salt-users] 20181024 2018.3.3 Released - Security Advisory
- [debian-lts-announce] 20200728 [SECURITY] [DLA 2294-1] salt security update
- [debian-lts-announce] 20200728 [SECURITY] [DLA 2294-1] salt security update
- USN-4459-1
- USN-4459-1
Modified: 2025-03-14
CVE-2020-16846
An issue was discovered in SaltStack Salt through 3002. Sending crafted web requests to the Salt API, with the SSH client enabled, can result in shell injection.
- openSUSE-SU-2020:1868
- openSUSE-SU-2020:1868
- http://packetstormsecurity.com/files/160039/SaltStack-Salt-REST-API-Arbitrary-Command-Execution.html
- http://packetstormsecurity.com/files/160039/SaltStack-Salt-REST-API-Arbitrary-Command-Execution.html
- https://github.com/saltstack/salt/releases
- https://github.com/saltstack/salt/releases
- [debian-lts-announce] 20201204 [SECURITY] [DLA 2480-1] salt security update
- [debian-lts-announce] 20201204 [SECURITY] [DLA 2480-1] salt security update
- [debian-lts-announce] 20220103 [SECURITY] [DLA 2480-2] salt regression update
- [debian-lts-announce] 20220103 [SECURITY] [DLA 2480-2] salt regression update
- FEDORA-2020-9e040bd6dd
- FEDORA-2020-9e040bd6dd
- GLSA-202011-13
- GLSA-202011-13
- DSA-4837
- DSA-4837
- https://www.saltstack.com/blog/on-november-3-2020-saltstack-publicly-disclosed-three-new-cves/
- https://www.saltstack.com/blog/on-november-3-2020-saltstack-publicly-disclosed-three-new-cves/
- https://www.zerodayinitiative.com/advisories/ZDI-20-1379/
- https://www.zerodayinitiative.com/advisories/ZDI-20-1379/
- https://www.zerodayinitiative.com/advisories/ZDI-20-1380/
- https://www.zerodayinitiative.com/advisories/ZDI-20-1380/
- https://www.zerodayinitiative.com/advisories/ZDI-20-1381/
- https://www.zerodayinitiative.com/advisories/ZDI-20-1381/
- https://www.zerodayinitiative.com/advisories/ZDI-20-1382/
- https://www.zerodayinitiative.com/advisories/ZDI-20-1382/
- https://www.zerodayinitiative.com/advisories/ZDI-20-1383/
- https://www.zerodayinitiative.com/advisories/ZDI-20-1383/
Modified: 2024-11-21
CVE-2020-17490
The TLS module within SaltStack Salt through 3002 creates certificates with weak file permissions.
- openSUSE-SU-2020:1868
- openSUSE-SU-2020:1868
- https://docs.saltstack.com/en/latest/topics/releases/index.html#latest-branch-release
- https://docs.saltstack.com/en/latest/topics/releases/index.html#latest-branch-release
- [debian-lts-announce] 20201204 [SECURITY] [DLA 2480-1] salt security update
- [debian-lts-announce] 20201204 [SECURITY] [DLA 2480-1] salt security update
- FEDORA-2020-9e040bd6dd
- FEDORA-2020-9e040bd6dd
- GLSA-202011-13
- GLSA-202011-13
- DSA-4837
- DSA-4837
- https://www.saltstack.com/blog/on-november-3-2020-saltstack-publicly-disclosed-three-new-cves/
- https://www.saltstack.com/blog/on-november-3-2020-saltstack-publicly-disclosed-three-new-cves/
Modified: 2024-11-21
CVE-2020-25592
In SaltStack Salt through 3002, salt-netapi improperly validates eauth credentials and tokens. A user can bypass authentication and invoke Salt SSH.
- openSUSE-SU-2020:1868
- openSUSE-SU-2020:1868
- http://packetstormsecurity.com/files/160039/SaltStack-Salt-REST-API-Arbitrary-Command-Execution.html
- http://packetstormsecurity.com/files/160039/SaltStack-Salt-REST-API-Arbitrary-Command-Execution.html
- https://docs.saltstack.com/en/latest/topics/releases/index.html
- https://docs.saltstack.com/en/latest/topics/releases/index.html
- [debian-lts-announce] 20201204 [SECURITY] [DLA 2480-1] salt security update
- [debian-lts-announce] 20201204 [SECURITY] [DLA 2480-1] salt security update
- FEDORA-2020-9e040bd6dd
- FEDORA-2020-9e040bd6dd
- GLSA-202011-13
- GLSA-202011-13
- DSA-4837
- DSA-4837
- https://www.saltstack.com/blog/on-november-3-2020-saltstack-publicly-disclosed-three-new-cves/
- https://www.saltstack.com/blog/on-november-3-2020-saltstack-publicly-disclosed-three-new-cves/
Modified: 2024-11-21
CVE-2020-28243
An issue was discovered in SaltStack Salt before 3002.5. The minion's restartcheck is vulnerable to command injection via a crafted process name. This allows for a local privilege escalation by any user able to create a files on the minion in a non-blacklisted directory.
- https://github.com/stealthcopter/CVE-2020-28243
- https://github.com/stealthcopter/CVE-2020-28243
- [debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update
- [debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update
- [debian-lts-announce] 20220103 [SECURITY] [DLA 2480-2] salt regression update
- [debian-lts-announce] 20220103 [SECURITY] [DLA 2480-2] salt regression update
- FEDORA-2021-5756fbf8a6
- FEDORA-2021-5756fbf8a6
- FEDORA-2021-43eb5584ad
- FEDORA-2021-43eb5584ad
- FEDORA-2021-904a2dbc0c
- FEDORA-2021-904a2dbc0c
- https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
- https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
- https://sec.stealthcopter.com/cve-2020-28243/
- https://sec.stealthcopter.com/cve-2020-28243/
- GLSA-202103-01
- GLSA-202103-01
- GLSA-202310-22
- GLSA-202310-22
- DSA-5011
- DSA-5011
Modified: 2024-11-21
CVE-2020-28972
In SaltStack Salt before 3002.5, authentication to VMware vcenter, vsphere, and esxi servers (in the vmware.py files) does not always validate the SSL/TLS certificate.
- [debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update
- [debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update
- FEDORA-2021-5756fbf8a6
- FEDORA-2021-5756fbf8a6
- FEDORA-2021-43eb5584ad
- FEDORA-2021-43eb5584ad
- FEDORA-2021-904a2dbc0c
- FEDORA-2021-904a2dbc0c
- https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
- https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
- GLSA-202103-01
- GLSA-202103-01
- GLSA-202310-22
- GLSA-202310-22
- DSA-5011
- DSA-5011
Modified: 2024-11-21
CVE-2020-35662
In SaltStack Salt before 3002.5, when authenticating to services using certain modules, the SSL certificate is not always validated.
- [debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update
- [debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update
- FEDORA-2021-5756fbf8a6
- FEDORA-2021-5756fbf8a6
- FEDORA-2021-43eb5584ad
- FEDORA-2021-43eb5584ad
- FEDORA-2021-904a2dbc0c
- FEDORA-2021-904a2dbc0c
- https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
- https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
- GLSA-202103-01
- GLSA-202103-01
- GLSA-202310-22
- GLSA-202310-22
- DSA-5011
- DSA-5011
Modified: 2024-11-21
CVE-2021-25281
An issue was discovered in through SaltStack Salt before 3002.5. salt-api does not honor eauth credentials for the wheel_async client. Thus, an attacker can remotely run any wheel modules on the master.
- http://packetstormsecurity.com/files/162058/SaltStack-Salt-API-Unauthenticated-Remote-Command-Execution.html
- http://packetstormsecurity.com/files/162058/SaltStack-Salt-API-Unauthenticated-Remote-Command-Execution.html
- https://github.com/saltstack/salt/releases
- https://github.com/saltstack/salt/releases
- [debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update
- [debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update
- FEDORA-2021-5756fbf8a6
- FEDORA-2021-5756fbf8a6
- FEDORA-2021-43eb5584ad
- FEDORA-2021-43eb5584ad
- FEDORA-2021-904a2dbc0c
- FEDORA-2021-904a2dbc0c
- https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
- https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
- GLSA-202103-01
- GLSA-202103-01
- GLSA-202310-22
- GLSA-202310-22
- DSA-5011
- DSA-5011
- https://www.saltstack.com/blog/active-saltstack-cve-announced-2021-jan-21/
- https://www.saltstack.com/blog/active-saltstack-cve-announced-2021-jan-21/
Modified: 2024-11-21
CVE-2021-25282
An issue was discovered in through SaltStack Salt before 3002.5. The salt.wheel.pillar_roots.write method is vulnerable to directory traversal.
- http://packetstormsecurity.com/files/162058/SaltStack-Salt-API-Unauthenticated-Remote-Command-Execution.html
- http://packetstormsecurity.com/files/162058/SaltStack-Salt-API-Unauthenticated-Remote-Command-Execution.html
- https://github.com/saltstack/salt/releases
- https://github.com/saltstack/salt/releases
- [debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update
- [debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update
- [debian-lts-announce] 20220103 [SECURITY] [DLA 2480-2] salt regression update
- [debian-lts-announce] 20220103 [SECURITY] [DLA 2480-2] salt regression update
- FEDORA-2021-5756fbf8a6
- FEDORA-2021-5756fbf8a6
- FEDORA-2021-43eb5584ad
- FEDORA-2021-43eb5584ad
- FEDORA-2021-904a2dbc0c
- FEDORA-2021-904a2dbc0c
- https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
- https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
- GLSA-202103-01
- GLSA-202103-01
- GLSA-202310-22
- GLSA-202310-22
- DSA-5011
- DSA-5011
Modified: 2024-11-21
CVE-2021-25283
An issue was discovered in through SaltStack Salt before 3002.5. The jinja renderer does not protect against server side template injection attacks.
- https://github.com/saltstack/salt/releases
- https://github.com/saltstack/salt/releases
- [debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update
- [debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update
- FEDORA-2021-5756fbf8a6
- FEDORA-2021-5756fbf8a6
- FEDORA-2021-43eb5584ad
- FEDORA-2021-43eb5584ad
- FEDORA-2021-904a2dbc0c
- FEDORA-2021-904a2dbc0c
- https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
- https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
- GLSA-202103-01
- GLSA-202103-01
- GLSA-202310-22
- GLSA-202310-22
- DSA-5011
- DSA-5011
Modified: 2024-11-21
CVE-2021-25284
An issue was discovered in through SaltStack Salt before 3002.5. salt.modules.cmdmod can log credentials to the info or error log level.
- https://github.com/saltstack/salt/releases
- https://github.com/saltstack/salt/releases
- [debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update
- [debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update
- [debian-lts-announce] 20220103 [SECURITY] [DLA 2480-2] salt regression update
- [debian-lts-announce] 20220103 [SECURITY] [DLA 2480-2] salt regression update
- FEDORA-2021-5756fbf8a6
- FEDORA-2021-5756fbf8a6
- FEDORA-2021-43eb5584ad
- FEDORA-2021-43eb5584ad
- FEDORA-2021-904a2dbc0c
- FEDORA-2021-904a2dbc0c
- https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
- https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
- GLSA-202103-01
- GLSA-202103-01
- GLSA-202310-22
- GLSA-202310-22
- DSA-5011
- DSA-5011
Modified: 2024-11-21
CVE-2021-3144
In SaltStack Salt before 3002.5, eauth tokens can be used once after expiration. (They might be used to run command against the salt master or minions.)
- https://github.com/saltstack/salt/releases
- https://github.com/saltstack/salt/releases
- [debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update
- [debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update
- FEDORA-2021-5756fbf8a6
- FEDORA-2021-5756fbf8a6
- FEDORA-2021-43eb5584ad
- FEDORA-2021-43eb5584ad
- FEDORA-2021-904a2dbc0c
- FEDORA-2021-904a2dbc0c
- https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
- https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
- GLSA-202103-01
- GLSA-202103-01
- GLSA-202310-22
- GLSA-202310-22
- DSA-5011
- DSA-5011
Modified: 2024-11-21
CVE-2021-3148
An issue was discovered in SaltStack Salt before 3002.5. Sending crafted web requests to the Salt API can result in salt.utils.thin.gen_thin() command injection because of different handling of single versus double quotes. This is related to salt/utils/thin.py.
- https://github.com/saltstack/salt/releases
- https://github.com/saltstack/salt/releases
- [debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update
- [debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update
- FEDORA-2021-5756fbf8a6
- FEDORA-2021-5756fbf8a6
- FEDORA-2021-43eb5584ad
- FEDORA-2021-43eb5584ad
- FEDORA-2021-904a2dbc0c
- FEDORA-2021-904a2dbc0c
- https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
- https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
- GLSA-202103-01
- GLSA-202103-01
- GLSA-202310-22
- GLSA-202310-22
- DSA-5011
- DSA-5011
Modified: 2024-11-21
CVE-2021-3197
An issue was discovered in SaltStack Salt before 3002.5. The salt-api's ssh client is vulnerable to a shell injection by including ProxyCommand in an argument, or via ssh_options provided in an API request.
- https://github.com/saltstack/salt/releases
- https://github.com/saltstack/salt/releases
- [debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update
- [debian-lts-announce] 20211110 [SECURITY] [DLA 2815-1] salt security update
- [debian-lts-announce] 20220103 [SECURITY] [DLA 2480-2] salt regression update
- [debian-lts-announce] 20220103 [SECURITY] [DLA 2480-2] salt regression update
- FEDORA-2021-5756fbf8a6
- FEDORA-2021-5756fbf8a6
- FEDORA-2021-43eb5584ad
- FEDORA-2021-43eb5584ad
- FEDORA-2021-904a2dbc0c
- FEDORA-2021-904a2dbc0c
- https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
- https://saltproject.io/security_announcements/active-saltstack-cve-release-2021-feb-25/
- GLSA-202103-01
- GLSA-202103-01
- GLSA-202310-22
- GLSA-202310-22
- DSA-5011
- DSA-5011
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-16872
An issue was discovered in Teluu pjproject (pjlib and pjlib-util) in PJSIP before 2.7.1. Parsing the numeric header fields in a SIP message (like cseq, ttl, port, etc.) all had the potential to overflow, either causing unintended values to be captured or, if the values were subsequently converted back to strings, a buffer overrun. This will lead to a potential exploit using carefully crafted invalid values.
Modified: 2024-11-21
CVE-2017-16875
An issue was discovered in Teluu pjproject (pjlib and pjlib-util) in PJSIP before 2.7.1. The ioqueue component may issue a double key unregistration after an attacker initiates a socket connection with specific settings and sequences. Such double key unregistration will trigger an integer overflow, which may cause ioqueue backends to reject future key registrations.
Modified: 2024-11-21
CVE-2018-1000098
Teluu PJSIP version 2.7.1 and earlier contains a Integer Overflow vulnerability in pjmedia SDP parsing that can result in Crash. This attack appear to be exploitable via Sending a specially crafted message. This vulnerability appears to have been fixed in 2.7.2.
Modified: 2024-11-21
CVE-2018-1000099
Teluu PJSIP version 2.7.1 and earlier contains a Access of Null/Uninitialized Pointer vulnerability in pjmedia SDP parsing that can result in Crash. This attack appear to be exploitable via Sending a specially crafted message. This vulnerability appears to have been fixed in 2.7.2.