ALT-BU-2019-3681-1
Branch sisyphus update bulletin.
Package libwebkitgtk4 updated to version 2.24.2-alt1 for branch sisyphus in task 229994.
Closed vulnerabilities
BDU:2019-02101
Уязвимость модулей отображения веб-страниц WebKitGTK и WPE WebKit, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2019-02102
Уязвимость модулей отображения веб-страниц WebKitGTK и WPE WebKit, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю раскрыть содержимое памяти процессов
BDU:2019-02103
Уязвимость модулей отображения веб-страниц WebKitGTK и WPE WebKit, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2019-8595
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
- https://support.apple.com/HT210118
- https://support.apple.com/HT210119
- https://support.apple.com/HT210120
- https://support.apple.com/HT210123
- https://support.apple.com/HT210124
- https://support.apple.com/HT210125
- https://support.apple.com/HT210212
- https://support.apple.com/HT210118
- https://support.apple.com/HT210212
- https://support.apple.com/HT210125
- https://support.apple.com/HT210124
- https://support.apple.com/HT210123
- https://support.apple.com/HT210120
- https://support.apple.com/HT210119
Modified: 2024-11-21
CVE-2019-8607
An out-of-bounds read was addressed with improved input validation. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, watchOS 5.2.1, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may result in the disclosure of process memory.
- https://support.apple.com/HT210118
- https://support.apple.com/HT210119
- https://support.apple.com/HT210120
- https://support.apple.com/HT210122
- https://support.apple.com/HT210123
- https://support.apple.com/HT210124
- https://support.apple.com/HT210125
- https://support.apple.com/HT210212
- https://support.apple.com/HT210118
- https://support.apple.com/HT210212
- https://support.apple.com/HT210125
- https://support.apple.com/HT210124
- https://support.apple.com/HT210123
- https://support.apple.com/HT210122
- https://support.apple.com/HT210120
- https://support.apple.com/HT210119
Modified: 2024-11-21
CVE-2019-8615
Multiple memory corruption issues were addressed with improved memory handling. This issue is fixed in iOS 12.3, macOS Mojave 10.14.5, tvOS 12.3, Safari 12.1.1, iTunes for Windows 12.9.5, iCloud for Windows 7.12. Processing maliciously crafted web content may lead to arbitrary code execution.
- https://support.apple.com/HT210118
- https://support.apple.com/HT210119
- https://support.apple.com/HT210120
- https://support.apple.com/HT210123
- https://support.apple.com/HT210124
- https://support.apple.com/HT210125
- https://support.apple.com/HT210212
- https://support.apple.com/HT210118
- https://support.apple.com/HT210212
- https://support.apple.com/HT210125
- https://support.apple.com/HT210124
- https://support.apple.com/HT210123
- https://support.apple.com/HT210120
- https://support.apple.com/HT210119
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-10877
In Teeworlds 0.7.2, there is an integer overflow in CMap::Load() in engine/shared/map.cpp that can lead to a buffer overflow, because multiplication of width and height is mishandled.
Modified: 2024-11-21
CVE-2019-10878
In Teeworlds 0.7.2, there is a failed bounds check in CDataFileReader::GetData() and CDataFileReader::ReplaceData() and related functions in engine/shared/datafile.cpp that can lead to an arbitrary free and out-of-bounds pointer write, possibly resulting in remote code execution.
Modified: 2024-11-21
CVE-2019-10879
In Teeworlds 0.7.2, there is an integer overflow in CDataFileReader::Open() in engine/shared/datafile.cpp that can lead to a buffer overflow and possibly remote code execution, because size-related multiplications are mishandled.
Closed bugs
conflict with old python-module-custodia due to files