ALT-BU-2018-3595-1
Branch sisyphus update bulletin.
Closed bugs
пересобрать с libftdi1
Closed vulnerabilities
BDU:2021-03097
Уязвимость библиотеки libwebp для кодирования и декодирования изображений в формате WebP, связанная с чтением за границами буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальной информации
BDU:2021-03098
Уязвимость библиотеки libwebp для кодирования и декодирования изображений в формате WebP, связанная с чтением за границами буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальной информации
BDU:2021-03099
Уязвимость библиотеки libwebp для кодирования и декодирования изображений в формате WebP, связанная с переполнением буфера в «куче», позволяющая нарушителю выполнить произвольный код
BDU:2021-03100
Уязвимость библиотеки libwebp для кодирования и декодирования изображений в формате WebP, связанная с переполнением буфера в «куче», позволяющая нарушителю выполнить произвольный код
BDU:2021-03101
Уязвимость библиотеки libwebp для кодирования и декодирования изображений в формате WebP, связанная с использованием памяти после ее освобождения, позволяющая нарушителю выполнить произвольный код
BDU:2021-03102
Уязвимость библиотеки libwebp для кодирования и декодирования изображений в формате WebP, связанная с чтением за границами буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальной информации
BDU:2021-03103
Уязвимость библиотеки libwebp для кодирования и декодирования изображений в формате WebP, связанная с чтением за границами буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальной информации
BDU:2021-03104
Уязвимость библиотеки libwebp для кодирования и декодирования изображений в формате WebP, связанная с чтением за границами буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальной информации
BDU:2021-03105
Уязвимость библиотеки libwebp для кодирования и декодирования изображений в формате WebP, связанная с чтением за границами буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальной информации
BDU:2021-03106
Уязвимость библиотеки libwebp для кодирования и декодирования изображений в формате WebP, связанная с использованием неинициализированной переменной, позволяющая нарушителю выполнить произвольный код
BDU:2021-03107
Уязвимость библиотеки libwebp для кодирования и декодирования изображений в формате WebP, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-25009
A heap-based buffer overflow was found in libwebp in versions before 1.0.1 in GetLE16().
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=9100
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=9100
- https://bugzilla.redhat.com/show_bug.cgi?id=1956917
- https://bugzilla.redhat.com/show_bug.cgi?id=1956917
- https://chromium.googlesource.com/webm/libwebp/+/95fd65070662e01cc9170c4444f5c0859a710097
- https://chromium.googlesource.com/webm/libwebp/+/95fd65070662e01cc9170c4444f5c0859a710097
Modified: 2024-11-21
CVE-2018-25010
A heap-based buffer overflow was found in libwebp in versions before 1.0.1 in ApplyFilter().
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=9105
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=9105
- https://bugzilla.redhat.com/show_bug.cgi?id=1956918
- https://bugzilla.redhat.com/show_bug.cgi?id=1956918
- https://chromium.googlesource.com/webm/libwebp/+/1344a2e947c749d231141a295327e5b99b444d63
- https://chromium.googlesource.com/webm/libwebp/+/1344a2e947c749d231141a295327e5b99b444d63
Modified: 2024-11-21
CVE-2018-25011
A heap-based buffer overflow was found in libwebp in versions before 1.0.1 in PutLE16().
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=9119
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=9119
- https://bugzilla.redhat.com/show_bug.cgi?id=1956919
- https://bugzilla.redhat.com/show_bug.cgi?id=1956919
- https://chromium.googlesource.com/webm/libwebp/+/v1.0.1
- https://chromium.googlesource.com/webm/libwebp/+/v1.0.1
- https://chromium.googlesource.com/webm/libwebp/+log/be738c6d396fa5a272c1b209be4379a7532debfe..29fb8562c60b5a919a75d904ff7366af423f8ab9?pretty=fuller&n=10000
- https://chromium.googlesource.com/webm/libwebp/+log/be738c6d396fa5a272c1b209be4379a7532debfe..29fb8562c60b5a919a75d904ff7366af423f8ab9?pretty=fuller&n=10000
Modified: 2024-11-21
CVE-2018-25012
A heap-based buffer overflow was found in libwebp in versions before 1.0.1 in GetLE24().
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=9123
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=9123
- https://bugzilla.redhat.com/show_bug.cgi?id=1956922
- https://bugzilla.redhat.com/show_bug.cgi?id=1956922
- https://chromium.googlesource.com/webm/libwebp/+/95fd65070662e01cc9170c4444f5c0859a710097
- https://chromium.googlesource.com/webm/libwebp/+/95fd65070662e01cc9170c4444f5c0859a710097
Modified: 2024-11-21
CVE-2018-25013
A heap-based buffer overflow was found in libwebp in versions before 1.0.1 in ShiftBytes().
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=9417
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=9417
- https://bugzilla.redhat.com/show_bug.cgi?id=1956926
- https://bugzilla.redhat.com/show_bug.cgi?id=1956926
- https://chromium.googlesource.com/webm/libwebp/+/907208f97ead639bd521cf355a2f203f462eade6
- https://chromium.googlesource.com/webm/libwebp/+/907208f97ead639bd521cf355a2f203f462eade6
Modified: 2024-11-21
CVE-2018-25014
A use of uninitialized value was found in libwebp in versions before 1.0.1 in ReadSymbol().
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=9496
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=9496
- https://bugzilla.redhat.com/show_bug.cgi?id=1956927
- https://bugzilla.redhat.com/show_bug.cgi?id=1956927
- https://chromium.googlesource.com/webm/libwebp/+log/78ad57a36ad69a9c22874b182d49d64125c380f2..907208f97ead639bd52
- https://chromium.googlesource.com/webm/libwebp/+log/78ad57a36ad69a9c22874b182d49d64125c380f2..907208f97ead639bd52
Modified: 2024-11-21
CVE-2020-36328
A flaw was found in libwebp in versions before 1.0.1. A heap-based buffer overflow in function WebPDecodeRGBInto is possible due to an invalid check for buffer size. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
- 20210723 APPLE-SA-2021-07-21-1 iOS 14.7 and iPadOS 14.7
- 20210723 APPLE-SA-2021-07-21-1 iOS 14.7 and iPadOS 14.7
- https://bugzilla.redhat.com/show_bug.cgi?id=1956829
- https://bugzilla.redhat.com/show_bug.cgi?id=1956829
- [debian-lts-announce] 20210605 [SECURITY] [DLA 2672-1] libwebp security update
- [debian-lts-announce] 20210605 [SECURITY] [DLA 2672-1] libwebp security update
- [debian-lts-announce] 20210606 [SECURITY] [DLA 2677-1] libwebp security update
- [debian-lts-announce] 20210606 [SECURITY] [DLA 2677-1] libwebp security update
- https://security.netapp.com/advisory/ntap-20211112-0001/
- https://security.netapp.com/advisory/ntap-20211112-0001/
- https://support.apple.com/kb/HT212601
- https://support.apple.com/kb/HT212601
- DSA-4930
- DSA-4930
Modified: 2024-11-21
CVE-2020-36329
A flaw was found in libwebp in versions before 1.0.1. A use-after-free was found due to a thread being killed too early. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
- 20210723 APPLE-SA-2021-07-21-1 iOS 14.7 and iPadOS 14.7
- 20210723 APPLE-SA-2021-07-21-1 iOS 14.7 and iPadOS 14.7
- https://bugzilla.redhat.com/show_bug.cgi?id=1956843
- https://bugzilla.redhat.com/show_bug.cgi?id=1956843
- [debian-lts-announce] 20210605 [SECURITY] [DLA 2672-1] libwebp security update
- [debian-lts-announce] 20210605 [SECURITY] [DLA 2672-1] libwebp security update
- [debian-lts-announce] 20210606 [SECURITY] [DLA 2677-1] libwebp security update
- [debian-lts-announce] 20210606 [SECURITY] [DLA 2677-1] libwebp security update
- https://security.netapp.com/advisory/ntap-20211112-0001/
- https://security.netapp.com/advisory/ntap-20211112-0001/
- https://support.apple.com/kb/HT212601
- https://support.apple.com/kb/HT212601
- DSA-4930
- DSA-4930
Modified: 2024-11-21
CVE-2020-36330
A flaw was found in libwebp in versions before 1.0.1. An out-of-bounds read was found in function ChunkVerifyAndAssign. The highest threat from this vulnerability is to data confidentiality and to the service availability.
- 20210723 APPLE-SA-2021-07-21-1 iOS 14.7 and iPadOS 14.7
- 20210723 APPLE-SA-2021-07-21-1 iOS 14.7 and iPadOS 14.7
- https://bugzilla.redhat.com/show_bug.cgi?id=1956853
- https://bugzilla.redhat.com/show_bug.cgi?id=1956853
- [debian-lts-announce] 20210605 [SECURITY] [DLA 2672-1] libwebp security update
- [debian-lts-announce] 20210605 [SECURITY] [DLA 2672-1] libwebp security update
- [debian-lts-announce] 20210606 [SECURITY] [DLA 2677-1] libwebp security update
- [debian-lts-announce] 20210606 [SECURITY] [DLA 2677-1] libwebp security update
- https://security.netapp.com/advisory/ntap-20211104-0004/
- https://security.netapp.com/advisory/ntap-20211104-0004/
- https://support.apple.com/kb/HT212601
- https://support.apple.com/kb/HT212601
- DSA-4930
- DSA-4930
Modified: 2024-11-21
CVE-2020-36331
A flaw was found in libwebp in versions before 1.0.1. An out-of-bounds read was found in function ChunkAssignData. The highest threat from this vulnerability is to data confidentiality and to the service availability.
- 20210723 APPLE-SA-2021-07-21-1 iOS 14.7 and iPadOS 14.7
- 20210723 APPLE-SA-2021-07-21-1 iOS 14.7 and iPadOS 14.7
- https://bugzilla.redhat.com/show_bug.cgi?id=1956856
- https://bugzilla.redhat.com/show_bug.cgi?id=1956856
- [debian-lts-announce] 20210605 [SECURITY] [DLA 2672-1] libwebp security update
- [debian-lts-announce] 20210605 [SECURITY] [DLA 2672-1] libwebp security update
- [debian-lts-announce] 20210606 [SECURITY] [DLA 2677-1] libwebp security update
- [debian-lts-announce] 20210606 [SECURITY] [DLA 2677-1] libwebp security update
- https://security.netapp.com/advisory/ntap-20211112-0001/
- https://security.netapp.com/advisory/ntap-20211112-0001/
- https://support.apple.com/kb/HT212601
- https://support.apple.com/kb/HT212601
- DSA-4930
- DSA-4930
Modified: 2024-11-21
CVE-2020-36332
A flaw was found in libwebp in versions before 1.0.1. When reading a file libwebp allocates an excessive amount of memory. The highest threat from this vulnerability is to the service availability.
Package libsoundtouch updated to version 2.1.1-alt1 for branch sisyphus in task 216743.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-17097
The WavFileBase class in WavFile.cpp in Olli Parviainen SoundTouch 2.0 allows remote attackers to cause a denial of service (double free) or possibly have unspecified other impact, as demonstrated by SoundStretch.
Package openssl1.1 updated to version 1.1.0j-alt1 for branch sisyphus in task 216647.
Closed vulnerabilities
BDU:2019-01256
Уязвимость реализации алгоритма шифрования DSA (Digital Signature Algorithm) библиотеки OpenSSL, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2019-01881
Уязвимость реализации алгоритма шифрования ECDSA библиотеки OpenSSL, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Modified: 2024-11-21
CVE-2018-0734
The OpenSSL DSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.1a (Affected 1.1.1). Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.0.2q (Affected 1.0.2-1.0.2p).
- openSUSE-SU-2019:1547
- openSUSE-SU-2019:1547
- openSUSE-SU-2019:1814
- openSUSE-SU-2019:1814
- 105758
- 105758
- RHSA-2019:2304
- RHSA-2019:2304
- RHSA-2019:3700
- RHSA-2019:3700
- RHSA-2019:3932
- RHSA-2019:3932
- RHSA-2019:3933
- RHSA-2019:3933
- RHSA-2019:3935
- RHSA-2019:3935
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=43e6a58d4991a451daf4891ff05a48735df871ac
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=43e6a58d4991a451daf4891ff05a48735df871ac
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8abfe72e8c1de1b95f50aa0d9134803b4d00070f
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=8abfe72e8c1de1b95f50aa0d9134803b4d00070f
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ef11e19d1365eea2b1851e6f540a0bf365d303e7
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=ef11e19d1365eea2b1851e6f540a0bf365d303e7
- FEDORA-2019-db06efdea1
- FEDORA-2019-db06efdea1
- FEDORA-2019-9a0a7c0986
- FEDORA-2019-9a0a7c0986
- FEDORA-2019-00c25b9379
- FEDORA-2019-00c25b9379
- https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/
- https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/
- https://security.netapp.com/advisory/ntap-20181105-0002/
- https://security.netapp.com/advisory/ntap-20181105-0002/
- https://security.netapp.com/advisory/ntap-20190118-0002/
- https://security.netapp.com/advisory/ntap-20190118-0002/
- https://security.netapp.com/advisory/ntap-20190423-0002/
- https://security.netapp.com/advisory/ntap-20190423-0002/
- USN-3840-1
- USN-3840-1
- DSA-4348
- DSA-4348
- DSA-4355
- DSA-4355
- https://www.openssl.org/news/secadv/20181030.txt
- https://www.openssl.org/news/secadv/20181030.txt
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://www.tenable.com/security/tns-2018-16
- https://www.tenable.com/security/tns-2018-16
- https://www.tenable.com/security/tns-2018-17
- https://www.tenable.com/security/tns-2018-17
Modified: 2024-11-21
CVE-2018-0735
The OpenSSL ECDSA signature algorithm has been shown to be vulnerable to a timing side channel attack. An attacker could use variations in the signing algorithm to recover the private key. Fixed in OpenSSL 1.1.0j (Affected 1.1.0-1.1.0i). Fixed in OpenSSL 1.1.1a (Affected 1.1.1).
- 105750
- 105750
- 1041986
- 1041986
- RHSA-2019:3700
- RHSA-2019:3700
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=56fb454d281a023b3f950d969693553d3f3ceea1
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=56fb454d281a023b3f950d969693553d3f3ceea1
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=b1d6d55ece1c26fa2829e2b819b038d7b6d692b4
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=b1d6d55ece1c26fa2829e2b819b038d7b6d692b4
- [debian-lts-announce] 20181121 [SECURITY] [DLA 1586-1] openssl security update
- [debian-lts-announce] 20181121 [SECURITY] [DLA 1586-1] openssl security update
- https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/
- https://nodejs.org/en/blog/vulnerability/november-2018-security-releases/
- https://security.netapp.com/advisory/ntap-20181105-0002/
- https://security.netapp.com/advisory/ntap-20181105-0002/
- USN-3840-1
- USN-3840-1
- DSA-4348
- DSA-4348
- https://www.openssl.org/news/secadv/20181029.txt
- https://www.openssl.org/news/secadv/20181029.txt
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.html
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://www.oracle.com/technetwork/security-advisory/cpujan2019-5072801.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html