ALT-BU-2020-4063-1
Branch p9 update bulletin.
Closed vulnerabilities
BDU:2021-03438
Уязвимость функции ParseDsdiffHeaderConfig компонента dsdiff.c аудиокодека WavPack, связанная с делением на ноль, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03439
Уязвимость функции ParseCaffHeaderConfig компонента caff.c аудиокодека WavPack, связанная с использованием неинициализированных ранее переменных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03440
Уязвимость функции ParseWave64HeaderConfig компонента wave64.c аудиокодека WavPack, связанная с использованием неинициализированных ранее переменных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03448
Уязвимость функции WavpackSetConfiguration64 компонента pack_utils.c аудиокодека WavPack, связанная с доступом к неинициализированному указателю, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03452
Уязвимость функции WavpackPackInit компонента pack_utils.c аудиокодека WavPack, связанная с бесконечной работой цикла, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03455
Уязвимость функции WavpackVerifySingleBlock компонента open_utils.c аудиокодека WavPack, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-10536
An issue was discovered in WavPack 5.1.0 and earlier. The WAV parser component contains a vulnerability that allows writing to memory because ParseRiffHeaderConfig in riff.c does not reject multiple format chunks.
- http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html
- http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html
- https://github.com/dbry/WavPack/commit/26cb47f99d481ad9b93eeff80d26e6b63bbd7e15
- https://github.com/dbry/WavPack/commit/26cb47f99d481ad9b93eeff80d26e6b63bbd7e15
- https://github.com/dbry/WavPack/issues/30
- https://github.com/dbry/WavPack/issues/30
- https://github.com/dbry/WavPack/issues/31
- https://github.com/dbry/WavPack/issues/31
- https://github.com/dbry/WavPack/issues/32
- https://github.com/dbry/WavPack/issues/32
- FEDORA-2020-e55567b6be
- FEDORA-2020-e55567b6be
- FEDORA-2020-73274c9df4
- FEDORA-2020-73274c9df4
- 20191219 [slackware-security] wavpack (SSA:2019-353-01)
- 20191219 [slackware-security] wavpack (SSA:2019-353-01)
- USN-3637-1
- USN-3637-1
- DSA-4197
- DSA-4197
Modified: 2024-11-21
CVE-2018-10537
An issue was discovered in WavPack 5.1.0 and earlier. The W64 parser component contains a vulnerability that allows writing to memory because ParseWave64HeaderConfig in wave64.c does not reject multiple format chunks.
- http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html
- http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html
- https://github.com/dbry/WavPack/commit/26cb47f99d481ad9b93eeff80d26e6b63bbd7e15
- https://github.com/dbry/WavPack/commit/26cb47f99d481ad9b93eeff80d26e6b63bbd7e15
- https://github.com/dbry/WavPack/issues/30
- https://github.com/dbry/WavPack/issues/30
- https://github.com/dbry/WavPack/issues/31
- https://github.com/dbry/WavPack/issues/31
- https://github.com/dbry/WavPack/issues/32
- https://github.com/dbry/WavPack/issues/32
- FEDORA-2020-e55567b6be
- FEDORA-2020-e55567b6be
- FEDORA-2020-73274c9df4
- FEDORA-2020-73274c9df4
- 20191219 [slackware-security] wavpack (SSA:2019-353-01)
- 20191219 [slackware-security] wavpack (SSA:2019-353-01)
- USN-3637-1
- USN-3637-1
- DSA-4197
- DSA-4197
Modified: 2024-11-21
CVE-2018-10538
An issue was discovered in WavPack 5.1.0 and earlier for WAV input. Out-of-bounds writes can occur because ParseRiffHeaderConfig in riff.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of integer-overflow protection within a bytes_to_copy calculation and subsequent malloc call, leading to insufficient memory allocation.
- http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html
- http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html
- https://github.com/dbry/WavPack/commit/6f8bb34c2993a48ab9afbe353e6d0cff7c8d821d
- https://github.com/dbry/WavPack/commit/6f8bb34c2993a48ab9afbe353e6d0cff7c8d821d
- https://github.com/dbry/WavPack/issues/33
- https://github.com/dbry/WavPack/issues/33
- FEDORA-2020-e55567b6be
- FEDORA-2020-e55567b6be
- FEDORA-2020-73274c9df4
- FEDORA-2020-73274c9df4
- 20191219 [slackware-security] wavpack (SSA:2019-353-01)
- 20191219 [slackware-security] wavpack (SSA:2019-353-01)
- USN-3637-1
- USN-3637-1
- DSA-4197
- DSA-4197
Modified: 2024-11-21
CVE-2018-10539
An issue was discovered in WavPack 5.1.0 and earlier for DSDiff input. Out-of-bounds writes can occur because ParseDsdiffHeaderConfig in dsdiff.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of integer-overflow protection within a bytes_to_copy calculation and subsequent malloc call, leading to insufficient memory allocation.
- http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html
- http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html
- https://github.com/dbry/WavPack/commit/6f8bb34c2993a48ab9afbe353e6d0cff7c8d821d
- https://github.com/dbry/WavPack/commit/6f8bb34c2993a48ab9afbe353e6d0cff7c8d821d
- https://github.com/dbry/WavPack/issues/33
- https://github.com/dbry/WavPack/issues/33
- FEDORA-2020-e55567b6be
- FEDORA-2020-e55567b6be
- FEDORA-2020-73274c9df4
- FEDORA-2020-73274c9df4
- 20191219 [slackware-security] wavpack (SSA:2019-353-01)
- 20191219 [slackware-security] wavpack (SSA:2019-353-01)
- USN-3637-1
- USN-3637-1
- DSA-4197
- DSA-4197
Modified: 2024-11-21
CVE-2018-10540
An issue was discovered in WavPack 5.1.0 and earlier for W64 input. Out-of-bounds writes can occur because ParseWave64HeaderConfig in wave64.c does not validate the sizes of unknown chunks before attempting memory allocation, related to a lack of integer-overflow protection within a bytes_to_copy calculation and subsequent malloc call, leading to insufficient memory allocation.
- http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html
- http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html
- https://github.com/dbry/WavPack/commit/6f8bb34c2993a48ab9afbe353e6d0cff7c8d821d
- https://github.com/dbry/WavPack/commit/6f8bb34c2993a48ab9afbe353e6d0cff7c8d821d
- https://github.com/dbry/WavPack/issues/33
- https://github.com/dbry/WavPack/issues/33
- FEDORA-2020-e55567b6be
- FEDORA-2020-e55567b6be
- FEDORA-2020-73274c9df4
- FEDORA-2020-73274c9df4
- 20191219 [slackware-security] wavpack (SSA:2019-353-01)
- 20191219 [slackware-security] wavpack (SSA:2019-353-01)
- USN-3637-1
- USN-3637-1
- DSA-4197
- DSA-4197
Modified: 2024-11-21
CVE-2018-19840
The function WavpackPackInit in pack_utils.c in libwavpack.a in WavPack through 5.1.0 allows attackers to cause a denial-of-service (resource exhaustion caused by an infinite loop) via a crafted wav audio file because WavpackSetConfiguration64 mishandles a sample rate of zero.
- openSUSE-SU-2019:1145
- openSUSE-SU-2019:1145
- http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html
- http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html
- https://github.com/dbry/WavPack/commit/070ef6f138956d9ea9612e69586152339dbefe51
- https://github.com/dbry/WavPack/commit/070ef6f138956d9ea9612e69586152339dbefe51
- https://github.com/dbry/WavPack/issues/53
- https://github.com/dbry/WavPack/issues/53
- [debian-lts-announce] 20210115 [SECURITY] [DLA 2525-1] wavpack security update
- [debian-lts-announce] 20210115 [SECURITY] [DLA 2525-1] wavpack security update
- FEDORA-2019-88f264563f
- FEDORA-2019-88f264563f
- FEDORA-2020-e55567b6be
- FEDORA-2020-e55567b6be
- FEDORA-2020-73274c9df4
- FEDORA-2020-73274c9df4
- FEDORA-2019-1315f2dc3a
- FEDORA-2019-1315f2dc3a
- FEDORA-2019-235c682f35
- FEDORA-2019-235c682f35
- 20191219 [slackware-security] wavpack (SSA:2019-353-01)
- 20191219 [slackware-security] wavpack (SSA:2019-353-01)
- GLSA-202007-19
- GLSA-202007-19
- USN-3839-1
- USN-3839-1
Modified: 2024-11-21
CVE-2018-19841
The function WavpackVerifySingleBlock in open_utils.c in libwavpack.a in WavPack through 5.1.0 allows attackers to cause a denial-of-service (out-of-bounds read and application crash) via a crafted WavPack Lossless Audio file, as demonstrated by wvunpack.
- openSUSE-SU-2019:1145
- openSUSE-SU-2019:1145
- http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html
- http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html
- https://github.com/dbry/WavPack/commit/bba5389dc598a92bdf2b297c3ea34620b6679b5b
- https://github.com/dbry/WavPack/commit/bba5389dc598a92bdf2b297c3ea34620b6679b5b
- https://github.com/dbry/WavPack/issues/54
- https://github.com/dbry/WavPack/issues/54
- [debian-lts-announce] 20210115 [SECURITY] [DLA 2525-1] wavpack security update
- [debian-lts-announce] 20210115 [SECURITY] [DLA 2525-1] wavpack security update
- FEDORA-2019-88f264563f
- FEDORA-2019-88f264563f
- FEDORA-2020-e55567b6be
- FEDORA-2020-e55567b6be
- FEDORA-2020-73274c9df4
- FEDORA-2020-73274c9df4
- FEDORA-2019-1315f2dc3a
- FEDORA-2019-1315f2dc3a
- FEDORA-2019-235c682f35
- FEDORA-2019-235c682f35
- 20191219 [slackware-security] wavpack (SSA:2019-353-01)
- 20191219 [slackware-security] wavpack (SSA:2019-353-01)
- GLSA-202007-19
- GLSA-202007-19
- USN-3839-1
- USN-3839-1
Modified: 2024-11-21
CVE-2018-6767
A stack-based buffer over-read in the ParseRiffHeaderConfig function of cli/riff.c file of WavPack 5.1.0 allows a remote attacker to cause a denial-of-service attack or possibly have unspecified other impact via a maliciously crafted RF64 file.
- http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html
- http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889276
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889276
- https://github.com/dbry/WavPack/commit/d5bf76b5a88d044a1be1d5656698e3ba737167e5
- https://github.com/dbry/WavPack/commit/d5bf76b5a88d044a1be1d5656698e3ba737167e5
- https://github.com/dbry/WavPack/issues/27
- https://github.com/dbry/WavPack/issues/27
- 20191219 [slackware-security] wavpack (SSA:2019-353-01)
- 20191219 [slackware-security] wavpack (SSA:2019-353-01)
- USN-3568-1
- USN-3568-1
- DSA-4125
- DSA-4125
Modified: 2024-11-21
CVE-2018-7253
The ParseDsdiffHeaderConfig function of the cli/dsdiff.c file of WavPack 5.1.0 allows a remote attacker to cause a denial-of-service (heap-based buffer over-read) or possibly overwrite the heap via a maliciously crafted DSDIFF file.
- http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html
- http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889559
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889559
- https://github.com/dbry/WavPack/commit/36a24c7881427d2e1e4dc1cef58f19eee0d13aec
- https://github.com/dbry/WavPack/commit/36a24c7881427d2e1e4dc1cef58f19eee0d13aec
- https://github.com/dbry/WavPack/issues/28
- https://github.com/dbry/WavPack/issues/28
- 20191219 [slackware-security] wavpack (SSA:2019-353-01)
- 20191219 [slackware-security] wavpack (SSA:2019-353-01)
- USN-3578-1
- USN-3578-1
- DSA-4125
- DSA-4125
Modified: 2024-11-21
CVE-2018-7254
The ParseCaffHeaderConfig function of the cli/caff.c file of WavPack 5.1.0 allows a remote attacker to cause a denial-of-service (global buffer over-read), or possibly trigger a buffer overflow or incorrect memory allocation, via a maliciously crafted CAF file.
- http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html
- http://packetstormsecurity.com/files/155743/Slackware-Security-Advisory-wavpack-Updates.html
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889274
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=889274
- https://github.com/dbry/WavPack/commit/8e3fe45a7bac31d9a3b558ae0079e2d92a04799e
- https://github.com/dbry/WavPack/commit/8e3fe45a7bac31d9a3b558ae0079e2d92a04799e
- https://github.com/dbry/WavPack/issues/26
- https://github.com/dbry/WavPack/issues/26
- 20191219 [slackware-security] wavpack (SSA:2019-353-01)
- 20191219 [slackware-security] wavpack (SSA:2019-353-01)
- USN-3578-1
- USN-3578-1
- DSA-4125
- DSA-4125
- 44154
- 44154
Modified: 2024-11-21
CVE-2019-1010315
WavPack 5.1 and earlier is affected by: CWE 369: Divide by Zero. The impact is: Divide by zero can lead to sudden crash of a software/service that tries to parse a .wav file. The component is: ParseDsdiffHeaderConfig (dsdiff.c:282). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc.
- https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc
- https://github.com/dbry/WavPack/commit/4c0faba32fddbd0745cbfaf1e1aeb3da5d35b9fc
- https://github.com/dbry/WavPack/issues/65
- https://github.com/dbry/WavPack/issues/65
- [debian-lts-announce] 20210115 [SECURITY] [DLA 2525-1] wavpack security update
- [debian-lts-announce] 20210115 [SECURITY] [DLA 2525-1] wavpack security update
- FEDORA-2020-e55567b6be
- FEDORA-2020-e55567b6be
- FEDORA-2020-73274c9df4
- FEDORA-2020-73274c9df4
- USN-4062-1
- USN-4062-1
Modified: 2024-11-21
CVE-2019-1010317
WavPack 5.1.0 and earlier is affected by: CWE-457: Use of Uninitialized Variable. The impact is: Unexpected control flow, crashes, and segfaults. The component is: ParseCaffHeaderConfig (caff.c:486). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://github.com/dbry/WavPack/commit/f68a9555b548306c5b1ee45199ccdc4a16a6101b.
- https://github.com/dbry/WavPack/commit/f68a9555b548306c5b1ee45199ccdc4a16a6101b
- https://github.com/dbry/WavPack/commit/f68a9555b548306c5b1ee45199ccdc4a16a6101b
- https://github.com/dbry/WavPack/issues/66
- https://github.com/dbry/WavPack/issues/66
- [debian-lts-announce] 20210115 [SECURITY] [DLA 2525-1] wavpack security update
- [debian-lts-announce] 20210115 [SECURITY] [DLA 2525-1] wavpack security update
- FEDORA-2020-e55567b6be
- FEDORA-2020-e55567b6be
- FEDORA-2020-73274c9df4
- FEDORA-2020-73274c9df4
- FEDORA-2019-8eeb8f9d3f
- FEDORA-2019-8eeb8f9d3f
- FEDORA-2019-c72f5f6361
- FEDORA-2019-c72f5f6361
- USN-4062-1
- USN-4062-1
Modified: 2024-11-21
CVE-2019-1010319
WavPack 5.1.0 and earlier is affected by: CWE-457: Use of Uninitialized Variable. The impact is: Unexpected control flow, crashes, and segfaults. The component is: ParseWave64HeaderConfig (wave64.c:211). The attack vector is: Maliciously crafted .wav file. The fixed version is: After commit https://github.com/dbry/WavPack/commit/33a0025d1d63ccd05d9dbaa6923d52b1446a62fe.
- https://github.com/dbry/WavPack/commit/33a0025d1d63ccd05d9dbaa6923d52b1446a62fe
- https://github.com/dbry/WavPack/commit/33a0025d1d63ccd05d9dbaa6923d52b1446a62fe
- https://github.com/dbry/WavPack/issues/68
- https://github.com/dbry/WavPack/issues/68
- [debian-lts-announce] 20210115 [SECURITY] [DLA 2525-1] wavpack security update
- [debian-lts-announce] 20210115 [SECURITY] [DLA 2525-1] wavpack security update
- FEDORA-2020-e55567b6be
- FEDORA-2020-e55567b6be
- FEDORA-2020-73274c9df4
- FEDORA-2020-73274c9df4
- FEDORA-2019-8eeb8f9d3f
- FEDORA-2019-8eeb8f9d3f
- FEDORA-2019-c72f5f6361
- FEDORA-2019-c72f5f6361
- USN-4062-1
- USN-4062-1
Modified: 2024-11-21
CVE-2019-11498
WavpackSetConfiguration64 in pack_utils.c in libwavpack.a in WavPack through 5.1.0 has a "Conditional jump or move depends on uninitialised value" condition, which might allow attackers to cause a denial of service (application crash) via a DFF file that lacks valid sample-rate data.
- https://github.com/dbry/WavPack/commit/bc6cba3f552c44565f7f1e66dc1580189addb2b4
- https://github.com/dbry/WavPack/commit/bc6cba3f552c44565f7f1e66dc1580189addb2b4
- https://github.com/dbry/WavPack/issues/67
- https://github.com/dbry/WavPack/issues/67
- [debian-lts-announce] 20210115 [SECURITY] [DLA 2525-1] wavpack security update
- [debian-lts-announce] 20210115 [SECURITY] [DLA 2525-1] wavpack security update
- FEDORA-2020-e55567b6be
- FEDORA-2020-e55567b6be
- FEDORA-2020-73274c9df4
- FEDORA-2020-73274c9df4
- FEDORA-2019-52145aa7ca
- FEDORA-2019-52145aa7ca
- FEDORA-2019-b8a704ff4b
- FEDORA-2019-b8a704ff4b
- GLSA-202007-19
- GLSA-202007-19
- USN-3960-1
- USN-3960-1
Package ghostscript updated to version 9.27-alt1.M90P.1 for branch p9 in task 258832.
Closed vulnerabilities
BDU:2019-03223
Уязвимость процедуры .buildfont1 программы конвертирования файлов формата PostScript Ghostscript, позволяющая нарушителю повысить свои привилегии и получить доступ к файловой системе
BDU:2019-03225
Уязвимость процедуры .pdf_hook_DSC_Creator программы конвертирования файлов формата PostScript Ghostscript, позволяющая нарушителю получить доступ к файловой системе
BDU:2019-03226
Уязвимость процедуры .setuserparams2 программы конвертирования файлов формата PostScript Ghostscript, позволяющая нарушителю выполнить произвольные команды или получить доступ к файловой системе
BDU:2019-03227
Уязвимость процедуры setsystemparams программы конвертирования файлов формата PostScript Ghostscript, позволяющая нарушителю выполнить произвольные команды или получить доступ к файловой системе
BDU:2019-03228
Уязвимость процедуры .pdfexectoken программы конвертирования файлов формата PostScript Ghostscript, позволяющая нарушителю выполнить произвольные команды или получить доступ к файловой системе
BDU:2020-01769
Уязвимость процедуры .charkeys интерпретатора PostScript/PDF Ghostscript, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-10216
In ghostscript before version 9.50, the .buildfont1 procedure did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. An attacker could abuse this flaw by creating a specially crafted PostScript file that could escalate privileges and access files outside of restricted areas.
Modified: 2024-11-21
CVE-2019-14811
A flaw was found in, ghostscript versions prior to 9.50, in the .pdf_hook_DSC_Creator procedure where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.
- openSUSE-SU-2019:2223
- openSUSE-SU-2019:2223
- openSUSE-SU-2019:2222
- openSUSE-SU-2019:2222
- RHBA-2019:2824
- RHBA-2019:2824
- RHSA-2019:2594
- RHSA-2019:2594
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14811
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14811
- [debian-lts-announce] 20190909 [SECURITY] [DLA 1915-1] ghostscript security update
- [debian-lts-announce] 20190909 [SECURITY] [DLA 1915-1] ghostscript security update
- FEDORA-2019-ebd6c4f15a
- FEDORA-2019-ebd6c4f15a
- FEDORA-2019-0a9d525d71
- FEDORA-2019-0a9d525d71
- FEDORA-2019-953fc0f16d
- FEDORA-2019-953fc0f16d
- 20190910 [SECURITY] [DSA 4518-1] ghostscript security update
- 20190910 [SECURITY] [DSA 4518-1] ghostscript security update
- GLSA-202004-03
- GLSA-202004-03
- DSA-4518
- DSA-4518
Modified: 2024-11-21
CVE-2019-14812
A flaw was found in all ghostscript versions 9.x before 9.50, in the .setuserparams2 procedure where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=885444fcbe10dc42787ecb76686c8ee4dd33bf33
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=885444fcbe10dc42787ecb76686c8ee4dd33bf33
- https://access.redhat.com/security/cve/cve-2019-14812
- https://access.redhat.com/security/cve/cve-2019-14812
- https://bugs.ghostscript.com/show_bug.cgi?id=701444
- https://bugs.ghostscript.com/show_bug.cgi?id=701444
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14812
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14812
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LBUC4DBBJTRFNCR3IODBV4IXB2C2HI3V/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LBUC4DBBJTRFNCR3IODBV4IXB2C2HI3V/
- GLSA-202004-03
- GLSA-202004-03
Modified: 2024-11-21
CVE-2019-14813
A flaw was found in ghostscript, versions 9.x before 9.50, in the setsystemparams procedure where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=885444fcbe10dc42787ecb76686c8ee4dd33bf33
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=885444fcbe10dc42787ecb76686c8ee4dd33bf33
- openSUSE-SU-2019:2223
- openSUSE-SU-2019:2223
- openSUSE-SU-2019:2222
- openSUSE-SU-2019:2222
- RHBA-2019:2824
- RHBA-2019:2824
- RHSA-2019:2594
- RHSA-2019:2594
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14813
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14813
- [debian-lts-announce] 20190909 [SECURITY] [DLA 1915-1] ghostscript security update
- [debian-lts-announce] 20190909 [SECURITY] [DLA 1915-1] ghostscript security update
- FEDORA-2019-ebd6c4f15a
- FEDORA-2019-ebd6c4f15a
- FEDORA-2019-0a9d525d71
- FEDORA-2019-0a9d525d71
- FEDORA-2019-953fc0f16d
- FEDORA-2019-953fc0f16d
- 20190910 [SECURITY] [DSA 4518-1] ghostscript security update
- 20190910 [SECURITY] [DSA 4518-1] ghostscript security update
- GLSA-202004-03
- GLSA-202004-03
- DSA-4518
- DSA-4518
Modified: 2024-11-21
CVE-2019-14817
A flaw was found in, ghostscript versions prior to 9.50, in the .pdfexectoken and other procedures where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. A specially crafted PostScript file could disable security protection and then have access to the file system, or execute arbitrary commands.
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=cd1b1cacadac2479e291efe611979bdc1b3bdb19
- http://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=cd1b1cacadac2479e291efe611979bdc1b3bdb19
- openSUSE-SU-2019:2223
- openSUSE-SU-2019:2223
- openSUSE-SU-2019:2222
- openSUSE-SU-2019:2222
- RHBA-2019:2824
- RHBA-2019:2824
- RHSA-2019:2594
- RHSA-2019:2594
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14817
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14817
- [debian-lts-announce] 20190909 [SECURITY] [DLA 1915-1] ghostscript security update
- [debian-lts-announce] 20190909 [SECURITY] [DLA 1915-1] ghostscript security update
- FEDORA-2019-ebd6c4f15a
- FEDORA-2019-ebd6c4f15a
- FEDORA-2019-0a9d525d71
- FEDORA-2019-0a9d525d71
- FEDORA-2019-953fc0f16d
- FEDORA-2019-953fc0f16d
- 20190910 [SECURITY] [DSA 4518-1] ghostscript security update
- 20190910 [SECURITY] [DSA 4518-1] ghostscript security update
- GLSA-202004-03
- GLSA-202004-03
- DSA-4518
- DSA-4518
Modified: 2024-11-21
CVE-2019-14869
A flaw was found in all versions of ghostscript 9.x before 9.50, where the `.charkeys` procedure, where it did not properly secure its privileged calls, enabling scripts to bypass `-dSAFER` restrictions. An attacker could abuse this flaw by creating a specially crafted PostScript file that could escalate privileges within the Ghostscript and access files outside of restricted areas or execute commands.
- JVN#52486659
- JVN#52486659
- openSUSE-SU-2019:2534
- openSUSE-SU-2019:2534
- openSUSE-SU-2019:2535
- openSUSE-SU-2019:2535
- [oss-security] 20191115 CVE-2019-14869 ghostscript: -dSAFER escape in .charkeys
- [oss-security] 20191115 CVE-2019-14869 ghostscript: -dSAFER escape in .charkeys
- RHSA-2020:0222
- RHSA-2020:0222
- https://bugs.ghostscript.com/show_bug.cgi?id=701841
- https://bugs.ghostscript.com/show_bug.cgi?id=701841
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14869
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14869
- https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=485904772c5f
- https://git.ghostscript.com/?p=ghostpdl.git%3Ba=commitdiff%3Bh=485904772c5f
- FEDORA-2019-7debdd1807
- FEDORA-2019-7debdd1807
- FEDORA-2019-6cdb10aa59
- FEDORA-2019-6cdb10aa59
- FEDORA-2019-17f42f585a
- FEDORA-2019-17f42f585a
- 20191118 [SECURITY] [DSA 4569-1] ghostscript security update
- 20191118 [SECURITY] [DSA 4569-1] ghostscript security update
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-19451
When GNOME Dia before 2019-11-27 is launched with a filename argument that is not a valid codepoint in the current encoding, it enters an endless loop, thus endlessly writing text to stdout. If this launch is from a thumbnailer service, this output will usually be written to disk via the system's logging facility (potentially with elevated privileges), thus filling up the disk and eventually rendering the system unusable. (The filename can be for a nonexistent file.) NOTE: this does not affect an upstream release, but affects certain Linux distribution packages with version numbers such as 0.97.3.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-15095
Versions of the npm CLI prior to 6.14.6 are vulnerable to an information exposure vulnerability through log files. The CLI supports URLs like "
- openSUSE-SU-2020:1616
- openSUSE-SU-2020:1616
- openSUSE-SU-2020:1644
- openSUSE-SU-2020:1644
- openSUSE-SU-2020:1660
- openSUSE-SU-2020:1660
- https://github.com/npm/cli/blob/66aab417f836a901f8afb265251f761bb0422463/CHANGELOG.md#6146-2020-07-07
- https://github.com/npm/cli/blob/66aab417f836a901f8afb265251f761bb0422463/CHANGELOG.md#6146-2020-07-07
- https://github.com/npm/cli/commit/a9857b8f6869451ff058789c4631fadfde5bbcbc
- https://github.com/npm/cli/commit/a9857b8f6869451ff058789c4631fadfde5bbcbc
- https://github.com/npm/cli/security/advisories/GHSA-93f3-23rq-pjfp
- https://github.com/npm/cli/security/advisories/GHSA-93f3-23rq-pjfp
- FEDORA-2020-43d5a372fc
- FEDORA-2020-43d5a372fc
- GLSA-202101-07
- GLSA-202101-07
Closed vulnerabilities
BDU:2020-03621
Уязвимость реализации протокола TLS программной платформы Node.js, позволяющая нарушителю реализовать атаку типа «человек посередине»
BDU:2020-04460
Уязвимость функций napi_get_value_string_latin1(), napi_get_value_string_utf8(), napi_get_value_string_utf16() программной платформы Node.js, позволяющая нарушителю выполнить произвольный код
BDU:2020-04461
Уязвимость библиотеки nghttp2, связанная с ошибками при использовании выделенной памяти при обработке пакетов HTTP/2 SETTINGS, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-05054
Уязвимость компонента Cluster: JS module (Node.js) системы управления базами данных Oracle MySQL Cluster, позволяющая нарушителю выполнить произвольный код
BDU:2020-05657
Уязвимость программной платформы Node.js, связанная с ошибкой обработки имен HTTP - заголовка, позволяющая нарушителю получить доступ к защищаемой информации или повысить свои привилегии
BDU:2020-05687
Уязвимость программной платформы Node.js, связанная с ошибкой обработки имен HTTP - заголовка, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-11080
In nghttp2 before version 1.41.0, the overly large HTTP/2 SETTINGS frame payload causes denial of service. The proof of concept attack involves a malicious client constructing a SETTINGS frame with a length of 14,400 bytes (2400 individual settings entries) over and over again. The attack causes the CPU to spike at 100%. nghttp2 v1.41.0 fixes this vulnerability. There is a workaround to this vulnerability. Implement nghttp2_on_frame_recv_callback callback, and if received frame is SETTINGS frame and the number of settings entries are large (e.g., > 32), then drop the connection.
- openSUSE-SU-2020:0802
- https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
- https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
- https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
- [debian-lts-announce] 20211017 [SECURITY] [DLA 2786-1] nghttp2 security update
- [debian-lts-announce] 20231016 [SECURITY] [DLA 3621-1] nghttp2 security update
- FEDORA-2020-43d5a372fc
- FEDORA-2020-f7d15c8b77
- DSA-4696
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- openSUSE-SU-2020:0802
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com//security-alerts/cpujul2021.html
- DSA-4696
- FEDORA-2020-f7d15c8b77
- FEDORA-2020-43d5a372fc
- [debian-lts-announce] 20231016 [SECURITY] [DLA 3621-1] nghttp2 security update
- [debian-lts-announce] 20211017 [SECURITY] [DLA 2786-1] nghttp2 security update
- https://github.com/nghttp2/nghttp2/security/advisories/GHSA-q5wr-xfw9-q7xr
- https://github.com/nghttp2/nghttp2/commit/f8da73bd042f810f34d19f9eae02b46d870af394
- https://github.com/nghttp2/nghttp2/commit/336a98feb0d56b9ac54e12736b18785c27f75090
Modified: 2024-11-21
CVE-2020-8172
TLS session reuse can lead to host certificate verification bypass in node version < 12.18.0 and < 14.4.0.
- https://hackerone.com/reports/811502
- https://hackerone.com/reports/811502
- https://nodejs.org/en/blog/vulnerability/june-2020-security-releases/
- https://nodejs.org/en/blog/vulnerability/june-2020-security-releases/
- GLSA-202101-07
- GLSA-202101-07
- https://security.netapp.com/advisory/ntap-20200625-0002/
- https://security.netapp.com/advisory/ntap-20200625-0002/
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
Modified: 2024-11-21
CVE-2020-8174
napi_get_value_string_*() allows various kinds of memory corruption in node < 10.21.0, 12.18.0, and < 14.4.0.
- https://hackerone.com/reports/784186
- https://hackerone.com/reports/784186
- GLSA-202101-07
- GLSA-202101-07
- https://security.netapp.com/advisory/ntap-20201023-0003/
- https://security.netapp.com/advisory/ntap-20201023-0003/
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
Modified: 2024-11-21
CVE-2020-8201
Node.js < 12.18.4 and < 14.11 can be exploited to perform HTTP desync attacks and deliver malicious payloads to unsuspecting users. The payloads can be crafted by an attacker to hijack user sessions, poison cookies, perform clickjacking, and a multitude of other attacks depending on the architecture of the underlying system. The attack was possible due to a bug in processing of carrier-return symbols in the HTTP header names.
- openSUSE-SU-2020:1616
- openSUSE-SU-2020:1616
- https://hackerone.com/reports/922597
- https://hackerone.com/reports/922597
- FEDORA-2020-43d5a372fc
- FEDORA-2020-43d5a372fc
- https://nodejs.org/en/blog/vulnerability/september-2020-security-releases/
- https://nodejs.org/en/blog/vulnerability/september-2020-security-releases/
- GLSA-202101-07
- GLSA-202101-07
- https://security.netapp.com/advisory/ntap-20201009-0004/
- https://security.netapp.com/advisory/ntap-20201009-0004/
Modified: 2024-11-21
CVE-2020-8251
Node.js < 14.11.0 is vulnerable to HTTP denial of service (DoS) attacks based on delayed requests submission which can make the server unable to accept new connections.
- https://hackerone.com/reports/868834
- https://hackerone.com/reports/868834
- FEDORA-2020-43d5a372fc
- FEDORA-2020-43d5a372fc
- https://nodejs.org/en/blog/vulnerability/september-2020-security-releases/
- https://nodejs.org/en/blog/vulnerability/september-2020-security-releases/
- GLSA-202101-07
- GLSA-202101-07
- https://security.netapp.com/advisory/ntap-20201009-0004/
- https://security.netapp.com/advisory/ntap-20201009-0004/
Modified: 2024-11-21
CVE-2020-8252
The implementation of realpath in libuv < 10.22.1, < 12.18.4, and < 14.9.0 used within Node.js incorrectly determined the buffer size which can result in a buffer overflow if the resolved path is longer than 256 bytes.
- openSUSE-SU-2020:1616
- openSUSE-SU-2020:1616
- openSUSE-SU-2020:1660
- openSUSE-SU-2020:1660
- https://hackerone.com/reports/965914
- https://hackerone.com/reports/965914
- FEDORA-2020-43d5a372fc
- FEDORA-2020-43d5a372fc
- https://nodejs.org/en/blog/vulnerability/september-2020-security-releases/
- https://nodejs.org/en/blog/vulnerability/september-2020-security-releases/
- GLSA-202009-15
- GLSA-202009-15
- https://security.netapp.com/advisory/ntap-20201009-0004/
- https://security.netapp.com/advisory/ntap-20201009-0004/
- USN-4548-1
- USN-4548-1
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-18862
maidag in GNU Mailutils before 3.8 is installed setuid and allows local privilege escalation in the url mode.
- http://packetstormsecurity.com/files/155425/GNU-Mailutils-3.7-Privilege-Escalation.html
- http://packetstormsecurity.com/files/155425/GNU-Mailutils-3.7-Privilege-Escalation.html
- https://git.savannah.gnu.org/cgit/mailutils.git/tree/NEWS
- https://git.savannah.gnu.org/cgit/mailutils.git/tree/NEWS
- GLSA-202006-12
- GLSA-202006-12
Closed bugs
[FR] сборка без emacs при --without mh
Closed vulnerabilities
BDU:2022-07438
Уязвимость функции CServer::SendMsg (engine/server/server.cpp) пакета teeworlds операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-20787
Teeworlds before 0.7.4 has an integer overflow when computing a tilemap size.
Modified: 2024-11-21
CVE-2020-12066
CServer::SendMsg in engine/server/server.cpp in Teeworlds 0.7.x before 0.7.5 allows remote attackers to shut down the server.
- openSUSE-SU-2020:0557
- openSUSE-SU-2020:0563
- https://github.com/teeworlds/teeworlds/commit/c68402fa7e279d42886d5951d1ea8ac2facc1ea5
- FEDORA-2020-0d6b80678a
- USN-4553-1
- DSA-4763
- https://www.teeworlds.com/forum/viewtopic.php?id=14785
- openSUSE-SU-2020:0557
- https://www.teeworlds.com/forum/viewtopic.php?id=14785
- DSA-4763
- USN-4553-1
- FEDORA-2020-0d6b80678a
- https://github.com/teeworlds/teeworlds/commit/c68402fa7e279d42886d5951d1ea8ac2facc1ea5
- openSUSE-SU-2020:0563
Package libqwt6-qt5 updated to version 6.1.5-alt1 for branch p9 in task 258886.
Closed bugs
Обновить до 6.1.5
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-11243
PackLinuxElf64::unpack in p_lx_elf.cpp in UPX 3.95 allows remote attackers to cause a denial of service (double free), limit the ability of a malware scanner to operate on the entire original data, or possibly have unspecified other impact via a crafted file.
- openSUSE-SU-2020:0162
- openSUSE-SU-2020:0162
- openSUSE-SU-2020:0163
- openSUSE-SU-2020:0163
- openSUSE-SU-2020:0180
- openSUSE-SU-2020:0180
- openSUSE-SU-2020:0179
- openSUSE-SU-2020:0179
- https://github.com/upx/upx/blob/devel/NEWS
- https://github.com/upx/upx/blob/devel/NEWS
- https://github.com/upx/upx/issues/206
- https://github.com/upx/upx/issues/206
- https://github.com/upx/upx/issues/207
- https://github.com/upx/upx/issues/207
- FEDORA-2020-20cf0743f5
- FEDORA-2020-20cf0743f5
- FEDORA-2020-67590fbf08
- FEDORA-2020-67590fbf08
Modified: 2024-11-21
CVE-2019-14295
An Integer overflow in the getElfSections function in p_vmlinx.cpp in UPX 3.95 allows remote attackers to cause a denial of service (crash) via a skewed offset larger than the size of the PE section in a UPX packed executable, which triggers an allocation of excessive memory.
Modified: 2024-11-21
CVE-2019-14296
canUnpack in p_vmlinx.cpp in UPX 3.95 allows remote attackers to cause a denial of service (SEGV or buffer overflow, and application crash) or possibly have unspecified other impact via a crafted UPX packed file.
Modified: 2024-11-21
CVE-2019-20021
A heap-based buffer over-read was discovered in canUnpack in p_mach.cpp in UPX 3.95 via a crafted Mach-O file.
Modified: 2024-11-21
CVE-2019-20051
A floating-point exception was discovered in PackLinuxElf::elf_hash in p_lx_elf.cpp in UPX 3.95. The vulnerability causes an application crash, which leads to denial of service.
Modified: 2024-11-21
CVE-2019-20053
An invalid memory address dereference was discovered in the canUnpack function in p_mach.cpp in UPX 3.95 via a crafted Mach-O file.
Modified: 2024-11-21
CVE-2019-20805
p_lx_elf.cpp in UPX before 3.96 has an integer overflow during unpacking via crafted values in a PT_DYNAMIC segment.
Modified: 2024-11-21
CVE-2020-27787
A Segmentaation fault was found in UPX in invert_pt_dynamic() function in p_lx_elf.cpp. An attacker with a crafted input file allows invalid memory address access that could lead to a denial of service.
Modified: 2024-11-21
CVE-2020-27788
An out-of-bounds read access vulnerability was discovered in UPX in PackLinuxElf64::canPack() function of p_lx_elf.cpp file. An attacker with a crafted input file could trigger this issue that could cause a crash leading to a denial of service.
Modified: 2024-11-21
CVE-2020-27790
A floating point exception issue was discovered in UPX in PackLinuxElf64::invert_pt_dynamic() function of p_lx_elf.cpp file. An attacker with a crafted input file could trigger this issue that could cause a crash leading to a denial of service. The highest impact is to Availability.