ALT-BU-2020-4118-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2025-04-12
CVE-2014-8123
Buffer overflow in the bGetPPS function in wordole.c in Antiword 0.37 allows remote attackers to cause a denial of service (crash) via a crafted document.
- http://www.openwall.com/lists/oss-security/2014/12/01/4
- http://www.openwall.com/lists/oss-security/2014/12/02/1
- http://www.securityfocus.com/bid/71386
- http://www.openwall.com/lists/oss-security/2014/12/01/4
- http://www.openwall.com/lists/oss-security/2014/12/02/1
- http://www.securityfocus.com/bid/71386
Closed vulnerabilities
Modified: 2025-04-11
CVE-2013-4420
Multiple directory traversal vulnerabilities in the (1) tar_extract_glob and (2) tar_extract_all functions in libtar 1.2.20 and earlier allow remote attackers to overwrite arbitrary files via a .. (dot dot) in a crafted tar file.
- http://www.debian.org/security/2014/dsa-2863
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731860
- https://lists.feep.net:8080/pipermail/libtar/2014-February/000403.html
- http://www.debian.org/security/2014/dsa-2863
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=731860
- https://lists.feep.net:8080/pipermail/libtar/2014-February/000403.html
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-15690
In Nim before 1.2.6, the standard library asyncftpclient lacks a check for whether a message contains a newline character.
- http://www.openwall.com/lists/oss-security/2021/02/04/3
- https://consensys.net/diligence/vulnerabilities/nim-asyncftpd-crlf-injection/
- https://github.com/nim-lang/Nim/blob/dc5a40f3f39c6ea672e6dc6aca7f8118a69dda99/lib/pure/asyncftpclient.nim#L145
- https://github.com/nim-lang/Nim/compare/v1.2.4...v1.2.6
- https://github.com/tintinweb/pub/tree/master/pocs/cve-2020-15690
- http://www.openwall.com/lists/oss-security/2021/02/04/3
- https://consensys.net/diligence/vulnerabilities/nim-asyncftpd-crlf-injection/
- https://github.com/nim-lang/Nim/blob/dc5a40f3f39c6ea672e6dc6aca7f8118a69dda99/lib/pure/asyncftpclient.nim#L145
- https://github.com/nim-lang/Nim/compare/v1.2.4...v1.2.6
- https://github.com/tintinweb/pub/tree/master/pocs/cve-2020-15690
Modified: 2024-11-21
CVE-2020-15692
In Nim 1.2.4, the standard library browsers mishandles the URL argument to browsers.openDefaultBrowser. This argument can be a local file path that will be opened in the default explorer. An attacker can pass one argument to the underlying open command to execute arbitrary registered system commands.
- http://www.openwall.com/lists/oss-security/2021/02/04/1
- https://consensys.net/diligence/vulnerabilities/nim-browsers-argument-injection/
- https://github.com/nim-lang/Nim/blob/dc5a40f3f39c6ea672e6dc6aca7f8118a69dda99/lib/pure/browsers.nim#L48
- https://nim-lang.org/blog/2020/07/30/versions-126-and-108-released.html
- http://www.openwall.com/lists/oss-security/2021/02/04/1
- https://consensys.net/diligence/vulnerabilities/nim-browsers-argument-injection/
- https://github.com/nim-lang/Nim/blob/dc5a40f3f39c6ea672e6dc6aca7f8118a69dda99/lib/pure/browsers.nim#L48
- https://nim-lang.org/blog/2020/07/30/versions-126-and-108-released.html
Modified: 2024-11-21
CVE-2020-15693
In Nim 1.2.4, the standard library httpClient is vulnerable to a CR-LF injection in the target URL. An injection is possible if the attacker controls any part of the URL provided in a call (such as httpClient.get or httpClient.post), the User-Agent header value, or custom HTTP header names or values.
- http://www.openwall.com/lists/oss-security/2021/02/04/2
- https://consensys.net/diligence/vulnerabilities/nim-httpclient-header-crlf-injection/
- https://github.com/nim-lang/Nim/blob/dc5a40f3f39c6ea672e6dc6aca7f8118a69dda99/lib/pure/httpclient.nim#L1023
- https://nim-lang.org/blog/2020/07/30/versions-126-and-108-released.html
- http://www.openwall.com/lists/oss-security/2021/02/04/2
- https://consensys.net/diligence/vulnerabilities/nim-httpclient-header-crlf-injection/
- https://github.com/nim-lang/Nim/blob/dc5a40f3f39c6ea672e6dc6aca7f8118a69dda99/lib/pure/httpclient.nim#L1023
- https://nim-lang.org/blog/2020/07/30/versions-126-and-108-released.html
Modified: 2024-11-21
CVE-2020-15694
In Nim 1.2.4, the standard library httpClient fails to properly validate the server response. For example, httpClient.get().contentLength() does not raise any error if a malicious server provides a negative Content-Length.
- http://www.openwall.com/lists/oss-security/2021/02/04/2
- https://consensys.net/diligence/vulnerabilities/nim-httpclient-header-crlf-injection/
- https://github.com/nim-lang/Nim/blob/dc5a40f3f39c6ea672e6dc6aca7f8118a69dda99/lib/pure/httpclient.nim#L241
- https://nim-lang.org/blog/2020/07/30/versions-126-and-108-released.html
- http://www.openwall.com/lists/oss-security/2021/02/04/2
- https://consensys.net/diligence/vulnerabilities/nim-httpclient-header-crlf-injection/
- https://github.com/nim-lang/Nim/blob/dc5a40f3f39c6ea672e6dc6aca7f8118a69dda99/lib/pure/httpclient.nim#L241
- https://nim-lang.org/blog/2020/07/30/versions-126-and-108-released.html
Package extra-cmake-modules updated to version 5.75.0-alt2 for branch sisyphus in task 260685.
Closed bugs
extra-cmake-modules pulls in clang-devel