ALT-BU-2019-4070-1
Branch sisyphus update bulletin.
Package 389-ds-base updated to version 1.4.1.10-alt1 for branch sisyphus in task 240781.
Closed vulnerabilities
BDU:2022-05827
Уязвимость плагина deref сервера службы каталогов 389 Directory Server, позволяющая нарушителю получить доступ к конфиденциальным данным
Modified: 2024-11-21
CVE-2019-14824
A flaw was found in the 'deref' plugin of 389-ds-base where it could use the 'search' permission to display attribute values. In some configurations, this could allow an authenticated attacker to view private attributes, such as password hashes.
- RHSA-2019:3981
- RHSA-2019:3981
- RHSA-2020:0464
- RHSA-2020:0464
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14824
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14824
- [debian-lts-announce] 20191129 [SECURITY] [DLA 2004-1] 389-ds-base security update
- [debian-lts-announce] 20191129 [SECURITY] [DLA 2004-1] 389-ds-base security update
- https://lists.debian.org/debian-lts-announce/2023/04/msg00026.html
- https://lists.debian.org/debian-lts-announce/2023/04/msg00026.html
Closed vulnerabilities
BDU:2020-03213
Уязвимость функции cpSeparateBufToContigBuf программного обеспечения для просмотра, редактирования и конвертирования TIFF-файлов, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-03591
Уязвимость компонента tif_getimage.c библиотеки LibTIFF, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-12900
Heap-based buffer overflow in the cpSeparateBufToContigBuf function in tiffcp.c in LibTIFF 3.9.3, 3.9.4, 3.9.5, 3.9.6, 3.9.7, 4.0.0beta7, 4.0.0alpha4, 4.0.0alpha5, 4.0.0alpha6, 4.0.0, 4.0.1, 4.0.2, 4.0.3, 4.0.4, 4.0.4beta, 4.0.5, 4.0.6, 4.0.7, 4.0.8 and 4.0.9 allows remote attackers to cause a denial of service (crash) or possibly have unspecified other impact via a crafted TIFF file.
- http://bugzilla.maptools.org/show_bug.cgi?id=2798
- http://bugzilla.maptools.org/show_bug.cgi?id=2798
- RHSA-2019:2053
- RHSA-2019:2053
- RHSA-2019:3419
- RHSA-2019:3419
- https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2018-12900
- https://github.com/Hack-Me/Pocs_for_Multi_Versions/tree/main/CVE-2018-12900
- [debian-lts-announce] 20191126 [SECURITY] [DLA 2009-1] tiff security update
- [debian-lts-announce] 20191126 [SECURITY] [DLA 2009-1] tiff security update
- USN-3906-1
- USN-3906-1
- USN-3906-2
- USN-3906-2
- DSA-4670
- DSA-4670
Modified: 2024-12-20
CVE-2019-17546
tif_getimage.c in LibTIFF through 4.0.10, as used in GDAL through 3.0.1 and other products, has an integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image, related to a "Negative-size-param" condition.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16443
- https://github.com/OSGeo/gdal/commit/21674033ee246f698887604c7af7ba1962a40ddf
- https://gitlab.com/libtiff/libtiff/commit/4bb584a35f87af42d6cf09d15e9ce8909a839145
- [debian-lts-announce] 20191126 [SECURITY] [DLA 2009-1] tiff security update
- [debian-lts-announce] 20200318 [SECURITY] [DLA 2147-1] gdal security update
- FEDORA-2020-2e9bd06377
- FEDORA-2020-6f1209bb45
- 20200121 [SECURITY] [DSA 4608-1] tiff security update
- GLSA-202003-25
- DSA-4608
- DSA-4670
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16443
- DSA-4670
- https://security.netapp.com/advisory/ntap-20241220-0007/
- DSA-4608
- GLSA-202003-25
- 20200121 [SECURITY] [DSA 4608-1] tiff security update
- FEDORA-2020-6f1209bb45
- FEDORA-2020-2e9bd06377
- [debian-lts-announce] 20200318 [SECURITY] [DLA 2147-1] gdal security update
- [debian-lts-announce] 20191126 [SECURITY] [DLA 2009-1] tiff security update
- https://gitlab.com/libtiff/libtiff/commit/4bb584a35f87af42d6cf09d15e9ce8909a839145
- https://github.com/OSGeo/gdal/commit/21674033ee246f698887604c7af7ba1962a40ddf