ALT-BU-2020-4117-3
Branch p9 update bulletin.
Closed vulnerabilities
BDU:2018-00509
Уязвимость функции read_gif программного обеспечения для просмотра GIF-файлов gifview пакета программ для создания, редактирования и оптимизации GIF-файлов Gifsicle, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2017-1000421
Gifsicle gifview 1.89 and older is vulnerable to a use-after-free in the read_gif function resulting potential code execution
Modified: 2024-11-21
CVE-2017-18120
A double-free bug in the read_gif function in gifread.c in gifsicle 1.90 allows a remote attacker to cause a denial-of-service attack or unspecified other impact via a maliciously crafted file, because last_name is mishandled, a different vulnerability than CVE-2017-1000421.
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878739
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878739
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=881120
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=881120
- https://github.com/kohler/gifsicle/commit/118a46090c50829dc543179019e6140e1235f909
- https://github.com/kohler/gifsicle/commit/118a46090c50829dc543179019e6140e1235f909
- https://github.com/kohler/gifsicle/issues/117
- https://github.com/kohler/gifsicle/issues/117
Modified: 2024-11-21
CVE-2023-36193
Gifsicle v1.9.3 was discovered to contain a heap buffer overflow via the ambiguity_error component at /src/clp.c.
Modified: 2024-11-21
CVE-2023-46009
gifsicle-1.94 was found to have a floating point exception (FPE) vulnerability via resize_stream at src/xform.c.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2015-0928
libhtp 0.5.15 allows remote attackers to cause a denial of service (NULL pointer dereference).
Modified: 2024-11-21
CVE-2018-10243
htp_parse_authorization_digest in htp_parsers.c in LibHTP 0.5.26 allows remote attackers to cause a heap-based buffer over-read via an authorization digest header.
Modified: 2024-11-21
CVE-2019-17420
In OISF LibHTP before 0.5.31, as used in Suricata 4.1.4 and other products, an HTTP protocol parsing error causes the http_header signature to not alert on a response with a single \r\n ending.
Closed vulnerabilities
BDU:2022-06171
Уязвимость демона InspIRCd, связанная с ошибками разыменования указателей, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06172
Уязвимость демона InspIRCd, связанная с использованием памяти после ее освобождения, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-20917
An issue was discovered in InspIRCd 2 before 2.0.28 and 3 before 3.3.0. The mysql module contains a NULL pointer dereference when built against mariadb-connector-c 3.0.5 or newer. When combined with the sqlauth or sqloper modules, this vulnerability can be used for remote crashing of an InspIRCd server by any user able to connect to a server.
- https://docs.inspircd.org/security/2019-02/
- https://docs.inspircd.org/security/2019-02/
- https://github.com/inspircd/inspircd/commit/2cc35d8625b7ea5cbd1d1ebb116aff86c5280162
- https://github.com/inspircd/inspircd/commit/2cc35d8625b7ea5cbd1d1ebb116aff86c5280162
- https://github.com/inspircd/inspircd/commit/8745660fcdac7c1b80c94cfc0ff60928cd4dd4b7
- https://github.com/inspircd/inspircd/commit/8745660fcdac7c1b80c94cfc0ff60928cd4dd4b7
- [debian-lts-announce] 20200920 [SECURITY] [DLA 2375-1] inspircd security update
- [debian-lts-announce] 20200920 [SECURITY] [DLA 2375-1] inspircd security update
- DSA-4764
- DSA-4764
Modified: 2024-11-21
CVE-2020-25269
An issue was discovered in InspIRCd 2 before 2.0.29 and 3 before 3.6.0. The pgsql module contains a use after free vulnerability. When combined with the sqlauth or sqloper modules, this vulnerability can be used for remote crashing of an InspIRCd server by any user able to connect to a server.
- https://docs.inspircd.org/security/2020-01/
- https://docs.inspircd.org/security/2020-01/
- https://github.com/inspircd/inspircd/compare/426d1c8...b3f1db9
- https://github.com/inspircd/inspircd/compare/426d1c8...b3f1db9
- https://github.com/inspircd/inspircd/compare/v2.0.28...07d7dea
- https://github.com/inspircd/inspircd/compare/v2.0.28...07d7dea
- [debian-lts-announce] 20200920 [SECURITY] [DLA 2375-1] inspircd security update
- [debian-lts-announce] 20200920 [SECURITY] [DLA 2375-1] inspircd security update
- DSA-4764
- DSA-4764
Closed vulnerabilities
BDU:2021-03734
Уязвимость обработчика SNMP-trap SNMPTT, связанная с неправильной проверкой удаленных пользователей, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-24361
SNMPTT before 1.4.2 allows attackers to execute shell code via EXEC, PREXEC, or unknown_trap_exec.
Closed vulnerabilities
BDU:2017-02604
Уязвимость программного обеспечение для преобразования образов bchunk операционной системы Debian GNU/Linux, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать аварийное завершение работы приложения
BDU:2017-02605
Уязвимость программного обеспечение для преобразования образов bchunk операционной системы Debian GNU/Linux, вызванная переполнением буфера в динамической памяти, позволяющая нарушителю вызвать аварийное завершение работы приложения
BDU:2017-02606
Уязвимость программного обеспечение для преобразования образов bchunk операционной системы Debian GNU/Linux, вызванная переполнением буфера в динамической памяти, позволяющая нарушителю вызвать аварийное завершение работы приложения
Modified: 2024-11-21
CVE-2017-15953
bchunk (related to BinChunker) 1.2.0 and 1.2.1 is vulnerable to a heap-based buffer overflow and crash when processing a malformed CUE (.cue) file.
- https://github.com/extramaster/bchunk/issues/2
- https://github.com/extramaster/bchunk/issues/2
- https://github.com/hessu/bchunk/issues/1
- https://github.com/hessu/bchunk/issues/1
- [debian-lts-announce] 20171102 [SECURITY] [DLA 1158-1] bchunk security update
- [debian-lts-announce] 20171102 [SECURITY] [DLA 1158-1] bchunk security update
- DSA-4026
- DSA-4026
Modified: 2024-11-21
CVE-2017-15954
bchunk (related to BinChunker) 1.2.0 and 1.2.1 is vulnerable to a heap-based buffer overflow (with a resultant invalid free) and crash when processing a malformed CUE (.cue) file.
- https://github.com/extramaster/bchunk/issues/3
- https://github.com/extramaster/bchunk/issues/3
- https://github.com/hessu/bchunk/issues/1
- https://github.com/hessu/bchunk/issues/1
- [debian-lts-announce] 20171102 [SECURITY] [DLA 1158-1] bchunk security update
- [debian-lts-announce] 20171102 [SECURITY] [DLA 1158-1] bchunk security update
- DSA-4026
- DSA-4026
Modified: 2024-11-21
CVE-2017-15955
bchunk (related to BinChunker) 1.2.0 and 1.2.1 is vulnerable to an "Access violation near NULL on destination operand" and crash when processing a malformed CUE (.cue) file.
- https://github.com/extramaster/bchunk/issues/4
- https://github.com/extramaster/bchunk/issues/4
- https://github.com/hessu/bchunk/issues/2
- https://github.com/hessu/bchunk/issues/2
- [debian-lts-announce] 20171102 [SECURITY] [DLA 1158-1] bchunk security update
- [debian-lts-announce] 20171102 [SECURITY] [DLA 1158-1] bchunk security update
- DSA-4026
- DSA-4026
Closed vulnerabilities
BDU:2016-00921
Уязвимость программного средства для монтирования образа диска FuseISO, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2016-00922
Уязвимость программного средства для монтирования образа диска FuseISO, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
Modified: 2024-11-21
CVE-2015-8836
Integer overflow in the isofs_real_read_zf function in isofs.c in FuseISO 20070708 might allow remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a large ZF block size in an ISO file, leading to a heap-based buffer overflow.
- DSA-3551
- DSA-3551
- [oss-security] 20150206 older fuseiso stuff
- [oss-security] 20150206 older fuseiso stuff
- [oss-security] 20150223 Re: older fuseiso stuff
- [oss-security] 20150223 Re: older fuseiso stuff
- https://bugzilla.redhat.com/show_bug.cgi?id=861358
- https://bugzilla.redhat.com/show_bug.cgi?id=861358
- https://bugzilla.redhat.com/show_bug.cgi?id=863102
- https://bugzilla.redhat.com/show_bug.cgi?id=863102
Modified: 2024-11-21
CVE-2015-8837
Stack-based buffer overflow in the isofs_real_readdir function in isofs.c in FuseISO 20070708 allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a long pathname in an ISO file.
- DSA-3551
- DSA-3551
- [oss-security] 20150206 older fuseiso stuff
- [oss-security] 20150206 older fuseiso stuff
- [oss-security] 20150223 Re: older fuseiso stuff
- [oss-security] 20150223 Re: older fuseiso stuff
- https://bugzilla.redhat.com/show_bug.cgi?id=862211
- https://bugzilla.redhat.com/show_bug.cgi?id=862211
- https://bugzilla.redhat.com/show_bug.cgi?id=863091
- https://bugzilla.redhat.com/show_bug.cgi?id=863091
- GLSA-202007-20
- GLSA-202007-20