ALT-BU-2020-4062-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2022-01680
Уязвимость компонента stb_image.h реализации кодировщика/декодера SIXEL Libsixel, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-01744
Уязвимость функции dither_func_fs компонента tosixel.c реализации кодировщика/декодера SIXEL Libsixel, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-02074
Уязвимость компонента dither.c реализации кодировщика/декодера SIXEL Libsixel, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02076
Уязвимость функции gif_process_raster компонента fromgif.c реализации кодировщика/декодера SIXEL Libsixel, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-19756
There is a heap-based buffer over-read at stb_image.h (function: stbi__tga_load) in libsixel 1.8.2 that will cause a denial of service.
Modified: 2024-11-21
CVE-2018-19757
There is a NULL pointer dereference at function sixel_helper_set_additional_message (status.c) in libsixel 1.8.2 that will cause a denial of service.
Modified: 2024-11-21
CVE-2018-19759
There is a heap-based buffer over-read at stb_image_write.h (function: stbi_write_png_to_mem) in libsixel 1.8.2 that will cause a denial of service.
Modified: 2024-11-21
CVE-2018-19761
There is an illegal address access at fromsixel.c (function: sixel_decode_raw_impl) in libsixel 1.8.2 that will cause a denial of service.
Modified: 2024-11-21
CVE-2018-19762
There is a heap-based buffer overflow at fromsixel.c (function: image_buffer_resize) in libsixel 1.8.2 that will cause a denial of service or possibly unspecified other impact.
Modified: 2024-11-21
CVE-2018-19763
There is a heap-based buffer over-read at writer.c (function: write_png_to_file) in libsixel 1.8.2 that will cause a denial of service.
Modified: 2024-11-21
CVE-2019-11024
The load_pnm function in frompnm.c in libsixel.a in libsixel 1.8.2 has infinite recursion.
Modified: 2024-11-21
CVE-2019-19635
An issue was discovered in libsixel 1.8.2. There is a heap-based buffer overflow in the function sixel_decode_raw_impl at fromsixel.c.
Modified: 2024-11-21
CVE-2019-19636
An issue was discovered in libsixel 1.8.2. There is an integer overflow in the function sixel_encode_body at tosixel.c.
Modified: 2024-11-21
CVE-2019-19637
An issue was discovered in libsixel 1.8.2. There is an integer overflow in the function sixel_decode_raw_impl at fromsixel.c.
Modified: 2024-11-21
CVE-2019-19638
An issue was discovered in libsixel 1.8.2. There is a heap-based buffer overflow in the function load_pnm at frompnm.c, due to an integer overflow.
Modified: 2024-11-21
CVE-2019-19777
stb_image.h (aka the stb image loader) 2.23, as used in libsixel and other products, has a heap-based buffer over-read in stbi__load_main.
Modified: 2024-11-21
CVE-2019-19778
An issue was discovered in libsixel 1.8.2. There is a heap-based buffer over-read in the function load_sixel at loader.c.
Modified: 2024-11-21
CVE-2019-20022
An invalid memory address dereference was discovered in load_pnm in frompnm.c in libsixel before 1.8.3.
Modified: 2024-11-21
CVE-2019-20023
A memory leak was discovered in image_buffer_resize in fromsixel.c in libsixel 1.8.4.
Modified: 2024-11-21
CVE-2019-20024
A heap-based buffer overflow was discovered in image_buffer_resize in fromsixel.c in libsixel before 1.8.4.
Modified: 2024-11-21
CVE-2019-3573
In libsixel v1.8.2, there is an infinite loop in the function sixel_decode_raw_impl() in the file fromsixel.c, as demonstrated by sixel2png.
Modified: 2024-11-21
CVE-2019-3574
In libsixel v1.8.2, there is a heap-based buffer over-read in the function load_jpeg() in the file loader.c, as demonstrated by img2sixel.
Modified: 2024-11-21
CVE-2020-21048
An issue in the dither.c component of libsixel prior to v1.8.4 allows attackers to cause a denial of service (DOS) via a crafted PNG file.
- https://bitbucket.org/netbsd/pkgsrc/commits/6f0c011cbfccdffa635d04c84433b1a02687adad
- https://bitbucket.org/netbsd/pkgsrc/commits/6f0c011cbfccdffa635d04c84433b1a02687adad
- https://github.com/saitoha/libsixel/blob/master/ChangeLog
- https://github.com/saitoha/libsixel/blob/master/ChangeLog
- https://github.com/saitoha/libsixel/commit/cb373ab6614c910407c5e5a93ab935144e62b037
- https://github.com/saitoha/libsixel/commit/cb373ab6614c910407c5e5a93ab935144e62b037
- https://github.com/saitoha/libsixel/issues/73
- https://github.com/saitoha/libsixel/issues/73
- https://github.com/saitoha/libsixel/releases/tag/v1.8.4
- https://github.com/saitoha/libsixel/releases/tag/v1.8.4
Modified: 2024-11-21
CVE-2020-21049
An invalid read in the stb_image.h component of libsixel prior to v1.8.5 allows attackers to cause a denial of service (DOS) via a crafted PSD file.
- https://bitbucket.org/netbsd/pkgsrc/commits/970a81d31ec7498e04d09b6b7771cef35f63cd28
- https://bitbucket.org/netbsd/pkgsrc/commits/970a81d31ec7498e04d09b6b7771cef35f63cd28
- https://github.com/saitoha/libsixel/blob/master/ChangeLog
- https://github.com/saitoha/libsixel/blob/master/ChangeLog
- https://github.com/saitoha/libsixel/commit/0b1e0b3f7b44233f84e5c9f512f8c90d6bbbe33d
- https://github.com/saitoha/libsixel/commit/0b1e0b3f7b44233f84e5c9f512f8c90d6bbbe33d
- https://github.com/saitoha/libsixel/issues/74
- https://github.com/saitoha/libsixel/issues/74
- https://github.com/saitoha/libsixel/releases/tag/v1.8.5
- https://github.com/saitoha/libsixel/releases/tag/v1.8.5
Modified: 2024-11-21
CVE-2020-21050
Libsixel prior to v1.8.3 contains a stack buffer overflow in the function gif_process_raster at fromgif.c.
- https://bitbucket.org/netbsd/pkgsrc/commits/a27113e21179cbfbfae0c35f6a9edd6aa498faae
- https://bitbucket.org/netbsd/pkgsrc/commits/a27113e21179cbfbfae0c35f6a9edd6aa498faae
- https://cwe.mitre.org/data/definitions/121.html
- https://cwe.mitre.org/data/definitions/121.html
- https://github.com/saitoha/libsixel/blob/master/ChangeLog
- https://github.com/saitoha/libsixel/blob/master/ChangeLog
- https://github.com/saitoha/libsixel/commit/7808a06b88c11dbc502318cdd51fa374f8cd47ee
- https://github.com/saitoha/libsixel/commit/7808a06b88c11dbc502318cdd51fa374f8cd47ee
- https://github.com/saitoha/libsixel/issues/75
- https://github.com/saitoha/libsixel/issues/75
- https://github.com/saitoha/libsixel/releases/tag/v1.8.5
- https://github.com/saitoha/libsixel/releases/tag/v1.8.5
Modified: 2024-11-21
CVE-2020-21547
Libsixel 1.8.2 contains a heap-based buffer overflow in the dither_func_fs function in tosixel.c.
Package altmediawriter updated to version 0.4.7-alt1 for branch sisyphus in task 259033.
Closed bugs
Добавить при открытии в фильтр видимых файлов несжатых образов img
Closed vulnerabilities
BDU:2020-04039
Уязвимость интерпретатора языка программирования Perl, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-04040
Уязвимость параметра PL_regkind[OP(n)] == NOTHING интерпретатора языка программирования Perl, позволяющая нарушителю выполнить произвольный код
BDU:2020-04041
Уязвимость реализации функции S_study_chunk интерпретатора языка программирования Perl, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-10543
Perl before 5.30.3 on 32-bit platforms allows a heap-based buffer overflow because nested regular expression quantifiers have an integer overflow.
- openSUSE-SU-2020:0850
- https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod
- https://github.com/perl/perl5/commit/897d1f7fd515b828e4b198d8b8bef76c6faf03ed
- https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3
- FEDORA-2020-fd73c08076
- GLSA-202006-03
- https://security.netapp.com/advisory/ntap-20200611-0001/
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- openSUSE-SU-2020:0850
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://security.netapp.com/advisory/ntap-20200611-0001/
- GLSA-202006-03
- FEDORA-2020-fd73c08076
- https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3
- https://github.com/perl/perl5/commit/897d1f7fd515b828e4b198d8b8bef76c6faf03ed
- https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod
Modified: 2024-11-21
CVE-2020-10878
Perl before 5.30.3 has an integer overflow related to mishandling of a "PL_regkind[OP(n)] == NOTHING" situation. A crafted regular expression could lead to malformed bytecode with a possibility of instruction injection.
- openSUSE-SU-2020:0850
- https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod
- https://github.com/perl/perl5/commit/0a320d753fe7fca03df259a4dfd8e641e51edaa8
- https://github.com/perl/perl5/commit/3295b48defa0f8570114877b063fe546dd348b3c
- https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3
- FEDORA-2020-fd73c08076
- GLSA-202006-03
- https://security.netapp.com/advisory/ntap-20200611-0001/
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- openSUSE-SU-2020:0850
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://security.netapp.com/advisory/ntap-20200611-0001/
- GLSA-202006-03
- FEDORA-2020-fd73c08076
- https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3
- https://github.com/perl/perl5/commit/3295b48defa0f8570114877b063fe546dd348b3c
- https://github.com/perl/perl5/commit/0a320d753fe7fca03df259a4dfd8e641e51edaa8
- https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod
Modified: 2024-11-21
CVE-2020-12723
regcomp.c in Perl before 5.30.3 allows a buffer overflow via a crafted regular expression because of recursive S_study_chunk calls.
- openSUSE-SU-2020:0850
- https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod
- https://github.com/perl/perl5/commit/66bbb51b93253a3f87d11c2695cfb7bdb782184a
- https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3
- https://github.com/Perl/perl5/issues/16947
- https://github.com/Perl/perl5/issues/17743
- FEDORA-2020-fd73c08076
- GLSA-202006-03
- https://security.netapp.com/advisory/ntap-20200611-0001/
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- openSUSE-SU-2020:0850
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://security.netapp.com/advisory/ntap-20200611-0001/
- GLSA-202006-03
- FEDORA-2020-fd73c08076
- https://github.com/Perl/perl5/issues/17743
- https://github.com/Perl/perl5/issues/16947
- https://github.com/Perl/perl5/compare/v5.30.2...v5.30.3
- https://github.com/perl/perl5/commit/66bbb51b93253a3f87d11c2695cfb7bdb782184a
- https://github.com/Perl/perl5/blob/blead/pod/perl5303delta.pod
Package ghostscript updated to version 9.28-alt0.rc1.2 for branch sisyphus in task 259037.
Closed vulnerabilities
BDU:2020-01769
Уязвимость процедуры .charkeys интерпретатора PostScript/PDF Ghostscript, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-14869
A flaw was found in all versions of ghostscript 9.x before 9.50, where the `.charkeys` procedure, where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. An attacker could abuse this flaw by creating a specially crafted PostScript file that could escalate privileges within the Ghostscript and access files outside of restricted areas or execute commands.
- JVN#52486659
- JVN#52486659
- openSUSE-SU-2019:2534
- openSUSE-SU-2019:2534
- openSUSE-SU-2019:2535
- openSUSE-SU-2019:2535
- [oss-security] 20191115 CVE-2019-14869 ghostscript: -dSAFER escape in .charkeys
- [oss-security] 20191115 CVE-2019-14869 ghostscript: -dSAFER escape in .charkeys
- RHSA-2020:0222
- RHSA-2020:0222
- https://bugs.ghostscript.com/show_bug.cgi?id=701841
- https://bugs.ghostscript.com/show_bug.cgi?id=701841
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14869
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14869
- https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=485904772c5f
- https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=485904772c5f
- FEDORA-2019-7debdd1807
- FEDORA-2019-7debdd1807
- FEDORA-2019-6cdb10aa59
- FEDORA-2019-6cdb10aa59
- FEDORA-2019-17f42f585a
- FEDORA-2019-17f42f585a
- 20191118 [SECURITY] [DSA 4569-1] ghostscript security update
- 20191118 [SECURITY] [DSA 4569-1] ghostscript security update
Closed bugs
/etc/eepm/repack.d/zoom.sh: строка 7: return: возврат можно выполнить только из функции или исходного скрипта
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-15953
LibEtPan through 1.9.4, as used in MailCore 2 through 0.6.3 and other products, has a STARTTLS buffering issue that affects IMAP, SMTP, and POP3. When a server sends a "begin TLS" response, the client reads additional data (e.g., from a meddler-in-the-middle attacker) and evaluates it in a TLS context, aka "response injection."
- openSUSE-SU-2020:1454
- openSUSE-SU-2020:1454
- openSUSE-SU-2020:1505
- openSUSE-SU-2020:1505
- https://github.com/dinhvh/libetpan/issues/386
- https://github.com/dinhvh/libetpan/issues/386
- [debian-lts-announce] 20200816 [SECURITY] [DLA 2329-1] libetpan security update
- [debian-lts-announce] 20200816 [SECURITY] [DLA 2329-1] libetpan security update
- FEDORA-2020-44e52ef729
- FEDORA-2020-44e52ef729
- FEDORA-2020-13ae5f7221
- FEDORA-2020-13ae5f7221
- GLSA-202007-55
- GLSA-202007-55
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-15173
In ACCEL-PPP (an implementation of PPTP/PPPoE/L2TP/SSTP), there is a buffer overflow when receiving an l2tp control packet ith an AVP which type is a string and no hidden flags, length set to less than 6. If your application is used in open networks or there are untrusted nodes in the network it is highly recommended to apply the patch. The problem was patched with commit 2324bcd5ba12cf28f47357a8f03cd41b7c04c52b As a workaround changes of commit 2324bcd5ba12cf28f47357a8f03cd41b7c04c52b can be applied to older versions.
- https://github.com/accel-ppp/accel-ppp/commit/2324bcd5ba12cf28f47357a8f03cd41b7c04c52b
- https://github.com/accel-ppp/accel-ppp/commit/2324bcd5ba12cf28f47357a8f03cd41b7c04c52b
- https://github.com/accel-ppp/accel-ppp/security/advisories/GHSA-rr68-fchr-69vf
- https://github.com/accel-ppp/accel-ppp/security/advisories/GHSA-rr68-fchr-69vf
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-11243
PackLinuxElf64::unpack in p_lx_elf.cpp in UPX 3.95 allows remote attackers to cause a denial of service (double free), limit the ability of a malware scanner to operate on the entire original data, or possibly have unspecified other impact via a crafted file.
- openSUSE-SU-2020:0162
- openSUSE-SU-2020:0162
- openSUSE-SU-2020:0163
- openSUSE-SU-2020:0163
- openSUSE-SU-2020:0180
- openSUSE-SU-2020:0180
- openSUSE-SU-2020:0179
- openSUSE-SU-2020:0179
- https://github.com/upx/upx/blob/devel/NEWS
- https://github.com/upx/upx/blob/devel/NEWS
- https://github.com/upx/upx/issues/206
- https://github.com/upx/upx/issues/206
- https://github.com/upx/upx/issues/207
- https://github.com/upx/upx/issues/207
- FEDORA-2020-20cf0743f5
- FEDORA-2020-20cf0743f5
- FEDORA-2020-67590fbf08
- FEDORA-2020-67590fbf08
Modified: 2024-11-21
CVE-2019-14295
An Integer overflow in the getElfSections function in p_vmlinx.cpp in UPX 3.95 allows remote attackers to cause a denial of service (crash) via a skewed offset larger than the size of the PE section in a UPX packed executable, which triggers an allocation of excessive memory.
Modified: 2024-11-21
CVE-2019-14296
canUnpack in p_vmlinx.cpp in UPX 3.95 allows remote attackers to cause a denial of service (SEGV or buffer overflow, and application crash) or possibly have unspecified other impact via a crafted UPX packed file.
Modified: 2024-11-21
CVE-2019-20021
A heap-based buffer over-read was discovered in canUnpack in p_mach.cpp in UPX 3.95 via a crafted Mach-O file.
Modified: 2024-11-21
CVE-2019-20051
A floating-point exception was discovered in PackLinuxElf::elf_hash in p_lx_elf.cpp in UPX 3.95. The vulnerability causes an application crash, which leads to denial of service.
Modified: 2024-11-21
CVE-2019-20053
An invalid memory address dereference was discovered in the canUnpack function in p_mach.cpp in UPX 3.95 via a crafted Mach-O file.
Modified: 2024-11-21
CVE-2019-20805
p_lx_elf.cpp in UPX before 3.96 has an integer overflow during unpacking via crafted values in a PT_DYNAMIC segment.
Modified: 2024-11-21
CVE-2020-27787
A Segmentaation fault was found in UPX in invert_pt_dynamic() function in p_lx_elf.cpp. An attacker with a crafted input file allows invalid memory address access that could lead to a denial of service.
Modified: 2024-11-21
CVE-2020-27788
An out-of-bounds read access vulnerability was discovered in UPX in PackLinuxElf64::canPack() function of p_lx_elf.cpp file. An attacker with a crafted input file could trigger this issue that could cause a crash leading to a denial of service.
Modified: 2024-11-21
CVE-2020-27790
A floating point exception issue was discovered in UPX in PackLinuxElf64::invert_pt_dynamic() function of p_lx_elf.cpp file. An attacker with a crafted input file could trigger this issue that could cause a crash leading to a denial of service. The highest impact is to Availability.