ALT-BU-2021-3816-2
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-3443
A NULL pointer dereference flaw was found in the way Jasper versions before 2.0.27 handled component references in the JP2 image format decoder. A specially crafted JP2 image file could cause an application using the Jasper library to crash when opened.
Modified: 2024-11-21
CVE-2021-3467
A NULL pointer dereference flaw was found in the way Jasper versions before 2.0.26 handled component references in CDEF box in the JP2 image format decoder. A specially crafted JP2 image file could cause an application using the Jasper library to crash when opened.
Closed vulnerabilities
BDU:2022-05941
Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR и почтового клиента Thunderbird, связанная с неверным ограничением визуализируемых слоев или фреймов пользовательского интерфейса, позволяющая нарушителю проводить спуфинг-атаки
BDU:2022-05942
Уязвимость браузеров Mozilla Firefox, Mozilla Firefox ESR и почтового клиента Thunderbird, связанная с копированием буфера без проверки размера входных данных, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2021-23981
A texture upload of a Pixel Buffer Object could have confused the WebGL code to skip binding the buffer used to unpack it, resulting in memory corruption and a potentially exploitable information leak or crash. This vulnerability affects Firefox ESR < 78.9, Firefox < 87, and Thunderbird < 78.9.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1692832
- https://bugzilla.mozilla.org/show_bug.cgi?id=1692832
- https://www.mozilla.org/security/advisories/mfsa2021-10/
- https://www.mozilla.org/security/advisories/mfsa2021-10/
- https://www.mozilla.org/security/advisories/mfsa2021-11/
- https://www.mozilla.org/security/advisories/mfsa2021-11/
- https://www.mozilla.org/security/advisories/mfsa2021-12/
- https://www.mozilla.org/security/advisories/mfsa2021-12/
Modified: 2024-11-21
CVE-2021-23982
Using techniques that built on the slipstream research, a malicious webpage could have scanned both an internal network's hosts as well as services running on the user's local machine utilizing WebRTC connections. This vulnerability affects Firefox ESR < 78.9, Firefox < 87, and Thunderbird < 78.9.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1677046
- https://bugzilla.mozilla.org/show_bug.cgi?id=1677046
- https://www.mozilla.org/security/advisories/mfsa2021-10/
- https://www.mozilla.org/security/advisories/mfsa2021-10/
- https://www.mozilla.org/security/advisories/mfsa2021-11/
- https://www.mozilla.org/security/advisories/mfsa2021-11/
- https://www.mozilla.org/security/advisories/mfsa2021-12/
- https://www.mozilla.org/security/advisories/mfsa2021-12/
Modified: 2024-11-21
CVE-2021-23983
By causing a transition on a parent node by removing a CSS rule, an invalid property for a marker could have been applied, resulting in memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 87.
Modified: 2024-11-21
CVE-2021-23984
A malicious extension could have opened a popup window lacking an address bar. The title of the popup lacking an address bar should not be fully controllable, but in this situation was. This could have been used to spoof a website and attempt to trick the user into providing credentials. This vulnerability affects Firefox ESR < 78.9, Firefox < 87, and Thunderbird < 78.9.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1693664
- https://bugzilla.mozilla.org/show_bug.cgi?id=1693664
- https://www.mozilla.org/security/advisories/mfsa2021-10/
- https://www.mozilla.org/security/advisories/mfsa2021-10/
- https://www.mozilla.org/security/advisories/mfsa2021-11/
- https://www.mozilla.org/security/advisories/mfsa2021-11/
- https://www.mozilla.org/security/advisories/mfsa2021-12/
- https://www.mozilla.org/security/advisories/mfsa2021-12/
Modified: 2024-11-21
CVE-2021-23985
If an attacker is able to alter specific about:config values (for example malware running on the user's computer), the Devtools remote debugging feature could have been enabled in a way that was unnoticable to the user. This would have allowed a remote attacker (able to make a direct network connection to the victim) to monitor the user's browsing activity and (plaintext) network traffic. This was addressed by providing a visual cue when Devtools has an open network socket. This vulnerability affects Firefox < 87.
Modified: 2024-11-21
CVE-2021-23986
A malicious extension with the 'search' permission could have installed a new search engine whose favicon referenced a cross-origin URL. The response to this cross-origin request could have been read by the extension, allowing a same-origin policy bypass by the extension, which should not have cross-origin permissions. This cross-origin request was made without cookies, so the sensitive information disclosed by the violation was limited to local-network resources or resources that perform IP-based authentication. This vulnerability affects Firefox < 87.
Modified: 2024-11-21
CVE-2021-23987
Mozilla developers and community members reported memory safety bugs present in Firefox 86 and Firefox ESR 78.8. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox ESR < 78.9, Firefox < 87, and Thunderbird < 78.9.
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1513519%2C1683439%2C1690169%2C1690718
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1513519%2C1683439%2C1690169%2C1690718
- https://www.mozilla.org/security/advisories/mfsa2021-10/
- https://www.mozilla.org/security/advisories/mfsa2021-10/
- https://www.mozilla.org/security/advisories/mfsa2021-11/
- https://www.mozilla.org/security/advisories/mfsa2021-11/
- https://www.mozilla.org/security/advisories/mfsa2021-12/
- https://www.mozilla.org/security/advisories/mfsa2021-12/
Modified: 2024-11-21
CVE-2021-23988
Mozilla developers reported memory safety bugs present in Firefox 86. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 87.
Modified: 2024-11-21
CVE-2021-29955
A transient execution vulnerability, named Floating Point Value Injection (FPVI) allowed an attacker to leak arbitrary memory addresses and may have also enabled JIT type confusion attacks. (A related vulnerability, Speculative Code Store Bypass (SCSB), did not affect Firefox.). This vulnerability affects Firefox ESR < 78.9 and Firefox < 87.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1692972
- https://bugzilla.mozilla.org/show_bug.cgi?id=1692972
- https://www.mozilla.org/security/advisories/mfsa2021-10/
- https://www.mozilla.org/security/advisories/mfsa2021-10/
- https://www.mozilla.org/security/advisories/mfsa2021-11/
- https://www.mozilla.org/security/advisories/mfsa2021-11/
Closed vulnerabilities
BDU:2015-04793
Уязвимость операционной системы openSUSE, позволяющая злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-07553
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-07575
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-07580
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-07588
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08214
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08215
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08216
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08217
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08218
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08219
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08220
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08221
Уязвимости операционной системы Red Hat Linux, позволяющие удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-09613
Уязвимость операционной системы Gentoo Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2024-11-21
CVE-2001-1162
Directory traversal vulnerability in the %m macro in the smb.conf configuration file in Samba before 2.2.0a allows remote attackers to overwrite certain files via a .. in a NETBIOS name, which is used as the name for a .log file.
- 20011002-01-P
- 20011002-01-P
- L-105
- L-105
- CLA-2001:405
- CLA-2001:405
- IMNX-2001-70-027-01
- IMNX-2001-70-027-01
- http://us1.samba.org/samba/whatsnew/macroexploit.html
- http://us1.samba.org/samba/whatsnew/macroexploit.html
- CSSA-2001-024.0
- CSSA-2001-024.0
- DSA-065
- DSA-065
- MDKSA-2001-062
- MDKSA-2001-062
- RHSA-2001:086
- RHSA-2001:086
- HPSBUX0107-157
- HPSBUX0107-157
- 20010623 smbd remote file creation vulnerability
- 20010623 smbd remote file creation vulnerability
- 2928
- 2928
- samba-netbios-file-creation(6731)
- samba-netbios-file-creation(6731)
Modified: 2024-11-21
CVE-2003-0085
Buffer overflow in the SMB/CIFS packet fragment re-assembly code for SMB daemon (smbd) in Samba before 2.2.8, and Samba-TNG before 0.3.1, allows remote attackers to execute arbitrary code.
- 20030302-01-I
- 20030302-01-I
- 20030317 GLSA: samba (200303-11)
- 20030317 GLSA: samba (200303-11)
- 20030317 Security Bugfix for Samba - Samba 2.2.8 Released
- 20030317 Security Bugfix for Samba - Samba 2.2.8 Released
- 20030318 [OpenPKG-SA-2003.021] OpenPKG Security Advisory (samba)
- 20030318 [OpenPKG-SA-2003.021] OpenPKG Security Advisory (samba)
- 8299
- 8299
- 8303
- 8303
- DSA-262
- DSA-262
- GLSA-200303-11
- GLSA-200303-11
- VU#298233
- VU#298233
- MDKSA-2003:032
- MDKSA-2003:032
- SuSE-SA:2003:016
- SuSE-SA:2003:016
- RHSA-2003:095
- RHSA-2003:095
- RHSA-2003:096
- RHSA-2003:096
- 20030325 Fwd: APPLE-SA-2003-03-24 Samba, OpenSSL
- 20030325 Fwd: APPLE-SA-2003-03-24 Samba, OpenSSL
- APPLE-SA-2003-03-24
- APPLE-SA-2003-03-24
- 20030401 Immunix Secured OS 7+ samba update
- 20030401 Immunix Secured OS 7+ samba update
- IMNX-2003-7+-003-01
- IMNX-2003-7+-003-01
- 7106
- 7106
- oval:org.mitre.oval:def:552
- oval:org.mitre.oval:def:552
Modified: 2024-11-21
CVE-2003-0086
The code for writing reg files in Samba before 2.2.8 allows local users to overwrite arbitrary files via a race condition involving chown.
- 20030302-01-I
- 20030302-01-I
- 20030317 GLSA: samba (200303-11)
- 20030317 GLSA: samba (200303-11)
- 20030318 [OpenPKG-SA-2003.021] OpenPKG Security Advisory (samba)
- 20030318 [OpenPKG-SA-2003.021] OpenPKG Security Advisory (samba)
- 8299
- 8299
- 8303
- 8303
- DSA-262
- DSA-262
- GLSA-200303-11
- GLSA-200303-11
- MDKSA-2003:032
- MDKSA-2003:032
- SuSE-SA:2003:016
- SuSE-SA:2003:016
- RHSA-2003:095
- RHSA-2003:095
- RHSA-2003:096
- RHSA-2003:096
- 20030325 Fwd: APPLE-SA-2003-03-24 Samba, OpenSSL
- 20030325 Fwd: APPLE-SA-2003-03-24 Samba, OpenSSL
- APPLE-SA-2003-03-24
- APPLE-SA-2003-03-24
- 7107
- 7107
- oval:org.mitre.oval:def:554
- oval:org.mitre.oval:def:554
Modified: 2024-11-21
CVE-2003-0196
Multiple buffer overflows in Samba before 2.2.8a may allow remote attackers to execute arbitrary code or cause a denial of service, as discovered by the Samba team and a different vulnerability than CVE-2003-0201.
- 20030407 [OpenPKG-SA-2003.028] OpenPKG Security Advisory (samba)
- 20030407 [OpenPKG-SA-2003.028] OpenPKG Security Advisory (samba)
- 20030407 Immunix Secured OS 7+ samba update
- 20030407 Immunix Secured OS 7+ samba update
- DSA-280
- DSA-280
- MDKSA-2003:044
- MDKSA-2003:044
- RHSA-2003:137
- RHSA-2003:137
- oval:org.mitre.oval:def:564
- oval:org.mitre.oval:def:564
Modified: 2024-11-21
CVE-2003-0201
Buffer overflow in the call_trans2open function in trans2.c for Samba 2.2.x before 2.2.8a, 2.0.10 and earlier 2.0.x versions, and Samba-TNG before 0.3.2, allows remote attackers to execute arbitrary code.
- 20030403-01-P
- 20030403-01-P
- CLA-2003:624
- CLA-2003:624
- 20030407 [DDI-1013] Buffer Overflow in Samba allows remote root compromise
- 20030407 [DDI-1013] Buffer Overflow in Samba allows remote root compromise
- 20030407 Immunix Secured OS 7+ samba update
- 20030407 Immunix Secured OS 7+ samba update
- 20030408 [Sorcerer-spells] SAMBA--SORCERER2003-04-08
- 20030408 [Sorcerer-spells] SAMBA--SORCERER2003-04-08
- 20030409 GLSA: samba (200304-02)
- 20030409 GLSA: samba (200304-02)
- DSA-280
- DSA-280
- http://www.digitaldefense.net/labs/advisories/DDI-1013.txt
- http://www.digitaldefense.net/labs/advisories/DDI-1013.txt
- VU#267873
- VU#267873
- MDKSA-2003:044
- MDKSA-2003:044
- SuSE-SA:2003:025
- SuSE-SA:2003:025
- RHSA-2003:137
- RHSA-2003:137
- 7294
- 7294
- oval:org.mitre.oval:def:2163
- oval:org.mitre.oval:def:2163
- oval:org.mitre.oval:def:567
- oval:org.mitre.oval:def:567
Modified: 2024-11-21
CVE-2004-0815
The unix_clean_name function in Samba 2.2.x through 2.2.11, and 3.0.x before 3.0.2a, trims certain directory names down to absolute paths, which could allow remote attackers to bypass the specified share restrictions and read, write, or list arbitrary files via "/.////" style sequences in pathnames.
- CLA-2004:873
- CLA-2004:873
- 20040930 Samba Security Announcement -- Potential Arbitrary File Access
- 20040930 Samba Security Announcement -- Potential Arbitrary File Access
- 101584
- 101584
- 57664
- 57664
- 200529
- 200529
- http://us4.samba.org/samba/news/#security_2.2.12
- http://us4.samba.org/samba/news/#security_2.2.12
- DSA-600
- DSA-600
- 20040930 Samba Arbitrary File Access Vulnerability
- 20040930 Samba Arbitrary File Access Vulnerability
- MDKSA-2004:104
- MDKSA-2004:104
- SUSE-SA:2004:035
- SUSE-SA:2004:035
- RHSA-2004:498
- RHSA-2004:498
- 20041005 ERRATA: Potential Arbitrary File Access (CAN-2004-0815)
- 20041005 ERRATA: Potential Arbitrary File Access (CAN-2004-0815)
- 11281
- 11281
- 2004-0051
- 2004-0051
- FLSA:2102
- FLSA:2102
- samba-file-access(17556)
- samba-file-access(17556)
Modified: 2024-11-21
CVE-2004-1154
Integer overflow in the Samba daemon (smbd) in Samba 2.x and 3.0.x through 3.0.9 allows remote authenticated users to cause a denial of service (application crash) and possibly execute arbitrary code via a Samba request with a large number of security descriptors that triggers a heap-based buffer overflow.
- SCOSA-2005.17
- SCOSA-2005.17
- APPLE-SA-2005-03-21
- APPLE-SA-2005-03-21
- 13453
- 13453
- 101643
- 101643
- 57730
- 57730
- DSA-701
- DSA-701
- 20041216 Samba smbd Security Descriptor Integer Overflow Vulnerability
- 20041216 Samba smbd Security Descriptor Integer Overflow Vulnerability
- VU#226184
- VU#226184
- SUSE-SA:2004:045
- SUSE-SA:2004:045
- RHSA-2005:020
- RHSA-2005:020
- http://www.samba.org/samba/security/CAN-2004-1154.html
- http://www.samba.org/samba/security/CAN-2004-1154.html
- 11973
- 11973
- samba-msrpc-heap-corruption(18519)
- samba-msrpc-heap-corruption(18519)
- oval:org.mitre.oval:def:10236
- oval:org.mitre.oval:def:10236
- oval:org.mitre.oval:def:1459
- oval:org.mitre.oval:def:1459
- oval:org.mitre.oval:def:642
- oval:org.mitre.oval:def:642
Modified: 2024-11-21
CVE-2007-6015
Stack-based buffer overflow in the send_mailslot function in nmbd in Samba 3.0.0 through 3.0.27a, when the "domain logons" option is enabled, allows remote attackers to execute arbitrary code via a GETDC mailslot request composed of a long GETDC string following an offset username in a SAMLOGON logon request.
- http://bugs.gentoo.org/show_bug.cgi?id=200773
- http://bugs.gentoo.org/show_bug.cgi?id=200773
- http://docs.info.apple.com/article.html?artnum=307430
- http://docs.info.apple.com/article.html?artnum=307430
- APPLE-SA-2008-02-11
- APPLE-SA-2008-02-11
- [Security-announce] 20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates
- [Security-announce] 20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates
- HPSBUX02316
- HPSBUX02316
- SSRT071495
- SSRT071495
- 27760
- 27760
- 27894
- 27894
- 27977
- 27977
- 27993
- 27993
- 27999
- 27999
- 28003
- 28003
- 28028
- 28028
- 28029
- 28029
- 28037
- 28037
- 28067
- 28067
- 28089
- 28089
- 28891
- 28891
- 29032
- 29032
- 29341
- 29341
- 30484
- 30484
- 30835
- 30835
- http://secunia.com/secunia_research/2007-99/advisory/
- http://secunia.com/secunia_research/2007-99/advisory/
- GLSA-200712-10
- GLSA-200712-10
- 3438
- 3438
- SSA:2007-344-01
- SSA:2007-344-01
- 238251
- 238251
- 1019295
- 1019295
- http://support.avaya.com/elmodocs2/security/ASA-2007-520.htm
- http://support.avaya.com/elmodocs2/security/ASA-2007-520.htm
- DSA-1427
- DSA-1427
- VU#438395
- VU#438395
- MDKSA-2007:244
- MDKSA-2007:244
- SUSE-SA:2007:068
- SUSE-SA:2007:068
- RHSA-2007:1114
- RHSA-2007:1114
- RHSA-2007:1117
- RHSA-2007:1117
- http://www.samba.org/samba/security/CVE-2007-6015.html
- http://www.samba.org/samba/security/CVE-2007-6015.html
- 20071210 Secunia Research: Samba "send_mailslot()" Buffer OverflowVulnerability
- 20071210 Secunia Research: Samba "send_mailslot()" Buffer OverflowVulnerability
- 20071210 [SECURITY] Buffer overrun in send_mailslot()
- 20071210 [SECURITY] Buffer overrun in send_mailslot()
- 20071210 rPSA-2007-0261-1 samba samba-swat
- 20071210 rPSA-2007-0261-1 samba samba-swat
- 20071214 POC for samba send_mailslot()
- 20071214 POC for samba send_mailslot()
- 20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates
- 20080221 VMSA-2008-0003 Moderate: Updated aacraid driver and samba and python service console updates
- 26791
- 26791
- 1019065
- 1019065
- USN-556-1
- USN-556-1
- TA08-043B
- TA08-043B
- ADV-2007-4153
- ADV-2007-4153
- ADV-2008-0495
- ADV-2008-0495
- ADV-2008-0637
- ADV-2008-0637
- ADV-2008-0859
- ADV-2008-0859
- ADV-2008-1712
- ADV-2008-1712
- ADV-2008-1908
- ADV-2008-1908
- HPSBUX02341
- HPSBUX02341
- SSRT080075
- SSRT080075
- samba-sendmailslot-bo(38965)
- samba-sendmailslot-bo(38965)
- https://issues.rpath.com/browse/RPL-1976
- https://issues.rpath.com/browse/RPL-1976
- oval:org.mitre.oval:def:11572
- oval:org.mitre.oval:def:11572
- oval:org.mitre.oval:def:5605
- oval:org.mitre.oval:def:5605
- FEDORA-2007-4269
- FEDORA-2007-4269
- FEDORA-2007-4275
- FEDORA-2007-4275
Closed vulnerabilities
BDU:2021-02099
Уязвимость программного обеспечения Samba, связанная со считыванием данных за пределами заданного буфера, позволяющая нарушителю вызвать аварийное завершение работы приложения
Modified: 2024-11-21
CVE-2020-27840
A flaw was found in samba. Spaces used in a string around a domain name (DN), while supposed to be ignored, can cause invalid DN strings with spaces to instead write a zero-byte into out-of-bounds memory, resulting in a crash. The highest threat from this vulnerability is to system availability.
- https://bugzilla.redhat.com/show_bug.cgi?id=1941400
- https://bugzilla.redhat.com/show_bug.cgi?id=1941400
- [debian-lts-announce] 20210331 [SECURITY] [DLA 2611-1] ldb security update
- [debian-lts-announce] 20210331 [SECURITY] [DLA 2611-1] ldb security update
- FEDORA-2021-c93a3a5d3f
- FEDORA-2021-c93a3a5d3f
- FEDORA-2021-c2d8628d33
- FEDORA-2021-c2d8628d33
- FEDORA-2021-1a8e93a285
- FEDORA-2021-1a8e93a285
- GLSA-202105-22
- GLSA-202105-22
- https://security.netapp.com/advisory/ntap-20210326-0007/
- https://security.netapp.com/advisory/ntap-20210326-0007/
- DSA-4884
- DSA-4884
- https://www.samba.org/samba/security/CVE-2020-27840.html
- https://www.samba.org/samba/security/CVE-2020-27840.html
Modified: 2024-11-21
CVE-2021-20277
A flaw was found in Samba's libldb. Multiple, consecutive leading spaces in an LDAP attribute can lead to an out-of-bounds memory write, leading to a crash of the LDAP server process handling the request. The highest threat from this vulnerability is to system availability.
- https://bugzilla.redhat.com/show_bug.cgi?id=1941402
- https://bugzilla.redhat.com/show_bug.cgi?id=1941402
- [debian-lts-announce] 20210331 [SECURITY] [DLA 2611-1] ldb security update
- [debian-lts-announce] 20210331 [SECURITY] [DLA 2611-1] ldb security update
- FEDORA-2021-c93a3a5d3f
- FEDORA-2021-c93a3a5d3f
- FEDORA-2021-c2d8628d33
- FEDORA-2021-c2d8628d33
- FEDORA-2021-1a8e93a285
- FEDORA-2021-1a8e93a285
- GLSA-202105-22
- GLSA-202105-22
- https://security.netapp.com/advisory/ntap-20210326-0007/
- https://security.netapp.com/advisory/ntap-20210326-0007/
- DSA-4884
- DSA-4884
- https://www.samba.org/samba/security/CVE-2021-20277.html
- https://www.samba.org/samba/security/CVE-2021-20277.html
Package gperftools updated to version 2.9.1-alt1 for branch sisyphus in task 268324.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-13420
Google gperftools 2.7 has a memory leak in malloc_extension.cc, related to MallocExtension::Register and InitModule. NOTE: the software maintainer indicates that this is not a bug; it is only a false-positive report from the LeakSanitizer program