ALT-BU-2021-4019-1
Branch c9f2 update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-9366
A buffer overflow was found in the way GNU Screen before 4.8.0 treated the special escape OSC 49. Specially crafted output, or a special program, could corrupt memory and crash Screen or possibly have unspecified other impact.
- [oss-security] 20200225 Re: Re: GNU screen "out of bounds access when setting w_xtermosc after OSC 49"
- [oss-security] 20200225 Re: Re: GNU screen "out of bounds access when setting w_xtermosc after OSC 49"
- https://lists.gnu.org/archive/html/screen-devel/2020-02/msg00007.html
- https://lists.gnu.org/archive/html/screen-devel/2020-02/msg00007.html
- GLSA-202003-62
- GLSA-202003-62
- https://www.openwall.com/lists/oss-security/2020/02/06/3
- https://www.openwall.com/lists/oss-security/2020/02/06/3
Closed vulnerabilities
BDU:2020-03947
Уязвимость реализации функций read_fru_area(), read_fru_area_section(), ipmi_spd_print_fru(), ipmi_get_session_info(), ipmi_get_channel_cipher_suites() и get_lan_param_select() утилиты для управления и настройки устройств с поддержкой IPMI ipmitool, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2020-04640
Уязвимость функции read_fru_area_section (lib/ipmi_fru.c) утилиты для управления и настройки устройств с поддержкой IPMI ipmitool, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2020-5208
It's been found that multiple functions in ipmitool before 1.8.19 neglect proper checking of the data received from a remote LAN party, which may lead to buffer overflows and potentially to remote code execution on the ipmitool side. This is especially dangerous if ipmitool is run as a privileged user. This problem is fixed in version 1.8.19.
- openSUSE-SU-2020:0247
- openSUSE-SU-2020:0247
- https://github.com/ipmitool/ipmitool/commit/e824c23316ae50beb7f7488f2055ac65e8b341f2
- https://github.com/ipmitool/ipmitool/commit/e824c23316ae50beb7f7488f2055ac65e8b341f2
- https://github.com/ipmitool/ipmitool/security/advisories/GHSA-g659-9qxw-p7cp
- https://github.com/ipmitool/ipmitool/security/advisories/GHSA-g659-9qxw-p7cp
- [debian-lts-announce] 20200209 [SECURITY] [DLA 2098-1] ipmitool security update
- [debian-lts-announce] 20200209 [SECURITY] [DLA 2098-1] ipmitool security update
- [debian-lts-announce] 20210630 [SECURITY] [DLA 2699-1] ipmitool security update
- [debian-lts-announce] 20210630 [SECURITY] [DLA 2699-1] ipmitool security update
- FEDORA-2020-eb0cf4d268
- FEDORA-2020-eb0cf4d268
- FEDORA-2020-92cc67ff5a
- FEDORA-2020-92cc67ff5a
- GLSA-202101-03
- GLSA-202101-03
Closed bugs
Некорректно отображается пункт программы в меню xfce: значение поля Comment на английском
Closed vulnerabilities
BDU:2021-02928
Уязвимость набора компонентов для построения корпоративных приложений JBoss Core Services, связанная с использованием памяти после ее освобождения, позволяющая нарушителю выполнить произвольный код
BDU:2021-03580
Уязвимость функции sscanf() библиотеки libcurl программного средства для взаимодействия с серверами CURL, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2021-05241
Уязвимость программного средства для взаимодействия с серверами CURL, связанная с раскрытием информации, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2021-05280
Уязвимость функции сопоставления конфигураций программного средства для взаимодействия с серверами CURL, связанная с использованием имени с неправильной ссылкой, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2022-00312
Уязвимость программного средства для взаимодействия с серверами CURL, связанная с обходом аутентификации посредством спуфинга, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2022-00375
Уязвимость реализации протокола Transport Layer Security (TLS) библиотеки libcurl, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Modified: 2024-11-21
CVE-2021-22876
curl 7.1.1 to and including 7.75.0 is vulnerable to an "Exposure of Private Personal Information to an Unauthorized Actor" by leaking credentials in the HTTP Referer: header. libcurl does not strip off user credentials from the URL when automatically populating the Referer: HTTP request header field in outgoing HTTP requests, and therefore risks leaking sensitive data to the server that is the target of the second HTTP request.
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://curl.se/docs/CVE-2021-22876.html
- https://curl.se/docs/CVE-2021-22876.html
- https://hackerone.com/reports/1101882
- https://hackerone.com/reports/1101882
- [debian-lts-announce] 20210517 [SECURITY] [DLA 2664-1] curl security update
- [debian-lts-announce] 20210517 [SECURITY] [DLA 2664-1] curl security update
- FEDORA-2021-26a293c72b
- FEDORA-2021-26a293c72b
- FEDORA-2021-cab5c9befb
- FEDORA-2021-cab5c9befb
- FEDORA-2021-065371f385
- FEDORA-2021-065371f385
- GLSA-202105-36
- GLSA-202105-36
- https://security.netapp.com/advisory/ntap-20210521-0007/
- https://security.netapp.com/advisory/ntap-20210521-0007/
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com//security-alerts/cpujul2021.html
Modified: 2024-11-21
CVE-2021-22890
curl 7.63.0 to and including 7.75.0 includes vulnerability that allows a malicious HTTPS proxy to MITM a connection due to bad handling of TLS 1.3 session tickets. When using a HTTPS proxy and TLS 1.3, libcurl can confuse session tickets arriving from the HTTPS proxy but work as if they arrived from the remote server and then wrongly "short-cut" the host handshake. When confusing the tickets, a HTTPS proxy can trick libcurl to use the wrong session ticket resume for the host and thereby circumvent the server TLS certificate check and make a MITM attack to be possible to perform unnoticed. Note that such a malicious HTTPS proxy needs to provide a certificate that curl will accept for the MITMed server for an attack to work - unless curl has been told to ignore the server certificate check.
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://curl.se/docs/CVE-2021-22890.html
- https://curl.se/docs/CVE-2021-22890.html
- https://hackerone.com/reports/1129529
- https://hackerone.com/reports/1129529
- FEDORA-2021-26a293c72b
- FEDORA-2021-26a293c72b
- FEDORA-2021-cab5c9befb
- FEDORA-2021-cab5c9befb
- FEDORA-2021-065371f385
- FEDORA-2021-065371f385
- GLSA-202105-36
- GLSA-202105-36
- https://security.netapp.com/advisory/ntap-20210521-0007/
- https://security.netapp.com/advisory/ntap-20210521-0007/
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com//security-alerts/cpujul2021.html
Modified: 2024-11-21
CVE-2021-22897
curl 7.61.0 through 7.76.1 suffers from exposure of data element to wrong session due to a mistake in the code for CURLOPT_SSL_CIPHER_LIST when libcurl is built to use the Schannel TLS library. The selected cipher set was stored in a single "static" variable in the library, which has the surprising side-effect that if an application sets up multiple concurrent transfers, the last one that sets the ciphers will accidentally control the set used by all transfers. In a worst-case scenario, this weakens transport security significantly.
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://curl.se/docs/CVE-2021-22897.html
- https://curl.se/docs/CVE-2021-22897.html
- https://github.com/curl/curl/commit/bbb71507b7bab52002f9b1e0880bed6a32834511
- https://github.com/curl/curl/commit/bbb71507b7bab52002f9b1e0880bed6a32834511
- https://hackerone.com/reports/1172857
- https://hackerone.com/reports/1172857
- https://security.netapp.com/advisory/ntap-20210727-0007/
- https://security.netapp.com/advisory/ntap-20210727-0007/
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
Modified: 2024-11-21
CVE-2021-22898
curl 7.7 through 7.76.1 suffers from an information disclosure when the `-t` command line option, known as `CURLOPT_TELNETOPTIONS` in libcurl, is used to send variable=content pairs to TELNET servers. Due to a flaw in the option parser for sending NEW_ENV variables, libcurl could be made to pass on uninitialized data from a stack based buffer to the server, resulting in potentially revealing sensitive internal information to the server using a clear-text network protocol.
- [oss-security] 20210721 [SECURITY ADVISORY] curl: TELNET stack contents disclosure again
- [oss-security] 20210721 [SECURITY ADVISORY] curl: TELNET stack contents disclosure again
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://curl.se/docs/CVE-2021-22898.html
- https://curl.se/docs/CVE-2021-22898.html
- https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
- https://github.com/curl/curl/commit/39ce47f219b09c380b81f89fe54ac586c8db6bde
- https://hackerone.com/reports/1176461
- https://hackerone.com/reports/1176461
- [guacamole-issues] 20210618 [jira] [Created] (GUACAMOLE-1368) Latest docker image fails security scans.
- [guacamole-issues] 20210618 [jira] [Created] (GUACAMOLE-1368) Latest docker image fails security scans.
- [debian-lts-announce] 20210813 [SECURITY] [DLA 2734-1] curl security update
- [debian-lts-announce] 20210813 [SECURITY] [DLA 2734-1] curl security update
- [debian-lts-announce] 20220828 [SECURITY] [DLA 3085-1] curl security update
- [debian-lts-announce] 20220828 [SECURITY] [DLA 3085-1] curl security update
- FEDORA-2021-5d21b90a30
- FEDORA-2021-5d21b90a30
- FEDORA-2021-83fdddca0f
- FEDORA-2021-83fdddca0f
- DSA-5197
- DSA-5197
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
Modified: 2024-11-21
CVE-2021-22901
curl 7.75.0 through 7.76.1 suffers from a use-after-free vulnerability resulting in already freed memory being used when a TLS 1.3 session ticket arrives over a connection. A malicious server can use this in rare unfortunate circumstances to potentially reach remote code execution in the client. When libcurl at run-time sets up support for TLS 1.3 session tickets on a connection using OpenSSL, it stores pointers to the transfer in-memory object for later retrieval when a session ticket arrives. If the connection is used by multiple transfers (like with a reused HTTP/1.1 connection or multiplexed HTTP/2 connection) that first transfer object might be freed before the new session is established on that connection and then the function will access a memory buffer that might be freed. When using that memory, libcurl might even call a function pointer in the object, making it possible for a remote code execution if the server could somehow manage to get crafted memory content into the correct place in memory.
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
- https://curl.se/docs/CVE-2021-22901.html
- https://curl.se/docs/CVE-2021-22901.html
- https://github.com/curl/curl/commit/7f4a9a9b2a49547eae24d2e19bc5c346e9026479
- https://github.com/curl/curl/commit/7f4a9a9b2a49547eae24d2e19bc5c346e9026479
- https://hackerone.com/reports/1180380
- https://hackerone.com/reports/1180380
- https://security.netapp.com/advisory/ntap-20210723-0001/
- https://security.netapp.com/advisory/ntap-20210723-0001/
- https://security.netapp.com/advisory/ntap-20210727-0007/
- https://security.netapp.com/advisory/ntap-20210727-0007/
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
Modified: 2024-11-21
CVE-2021-22924
libcurl keeps previously used connections in a connection pool for subsequenttransfers to reuse, if one of them matches the setup.Due to errors in the logic, the config matching function did not take 'issuercert' into account and it compared the involved paths *case insensitively*,which could lead to libcurl reusing wrong connections.File paths are, or can be, case sensitive on many systems but not all, and caneven vary depending on used file systems.The comparison also didn't include the 'issuer cert' which a transfer can setto qualify how to verify the server certificate.
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-484086.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-732250.pdf
- https://hackerone.com/reports/1223565
- https://hackerone.com/reports/1223565
- [kafka-dev] 20210831 Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image
- [kafka-dev] 20210831 Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image
- [kafka-users] 20210831 Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image
- [kafka-users] 20210831 Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image
- [kafka-dev] 20210901 Re: [EXTERNAL] Re: Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image
- [kafka-dev] 20210901 Re: [EXTERNAL] Re: Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image
- [kafka-users] 20210901 Re: [EXTERNAL] Re: Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image
- [kafka-users] 20210901 Re: [EXTERNAL] Re: Security vulnerabilities in kafka:2.13-2.6.0/2.7.0 docker image
- [debian-lts-announce] 20210813 [SECURITY] [DLA 2734-1] curl security update
- [debian-lts-announce] 20210813 [SECURITY] [DLA 2734-1] curl security update
- [debian-lts-announce] 20220828 [SECURITY] [DLA 3085-1] curl security update
- [debian-lts-announce] 20220828 [SECURITY] [DLA 3085-1] curl security update
- FEDORA-2021-5d21b90a30
- FEDORA-2021-5d21b90a30
- https://security.netapp.com/advisory/ntap-20210902-0003/
- https://security.netapp.com/advisory/ntap-20210902-0003/
- DSA-5197
- DSA-5197
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-24994
Stack overflow in the parse_tag function in libass/ass_parse.c in libass before 0.15.0 allows remote attackers to cause a denial of service or remote code execution via a crafted file.
- https://github.com/libass/libass/commit/6835731c2fe4164a0c50bc91d12c43b2a2b4e
- https://github.com/libass/libass/commit/6835731c2fe4164a0c50bc91d12c43b2a2b4e
- https://github.com/libass/libass/issues/422
- https://github.com/libass/libass/issues/422
- https://github.com/libass/libass/issues/422#issuecomment-806002919
- https://github.com/libass/libass/issues/422#issuecomment-806002919
- https://github.com/libass/libass/issues/423
- https://github.com/libass/libass/issues/423
Modified: 2024-11-21
CVE-2020-26682
In libass 0.14.0, the `ass_outline_construct`'s call to `outline_stroke` causes a signed integer overflow.
- [oss-security] 20201119 Re: libass ass_outline.c signed integer overflow
- [oss-security] 20201119 Re: libass ass_outline.c signed integer overflow
- https://github.com/libass/libass/issues/431
- https://github.com/libass/libass/issues/431
- https://github.com/libass/libass/pull/432
- https://github.com/libass/libass/pull/432
- GLSA-202012-12
- GLSA-202012-12
Closed vulnerabilities
BDU:2022-00328
Уязвимость компонента url.cpp библиотеки для управления конфигурацией прокси Libproxy, связанная с недостатком механизма проверки размера копируемых данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-00336
Уязвимость функции url::recvline компонента url.cpp библиотеки для управления конфигурацией прокси Libproxy, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-25219
url::recvline in url.cpp in libproxy 0.4.x through 0.4.15 allows a remote HTTP server to trigger uncontrolled recursion via a response composed of an infinite stream that lacks a newline character. This leads to stack exhaustion.
- openSUSE-SU-2020:1676
- openSUSE-SU-2020:1676
- openSUSE-SU-2020:1680
- openSUSE-SU-2020:1680
- https://github.com/libproxy/libproxy/issues/134
- https://github.com/libproxy/libproxy/issues/134
- [debian-lts-announce] 20200912 [SECURITY] [DLA 2372-1] libproxy security update
- [debian-lts-announce] 20200912 [SECURITY] [DLA 2372-1] libproxy security update
- FEDORA-2020-2407cb0512
- FEDORA-2020-2407cb0512
- FEDORA-2020-f92d372cf1
- FEDORA-2020-f92d372cf1
- FEDORA-2020-7e1e9abf77
- FEDORA-2020-7e1e9abf77
- USN-4514-1
- USN-4514-1
- DSA-4800
- DSA-4800
Modified: 2024-11-21
CVE-2020-26154
url.cpp in libproxy through 0.4.15 is prone to a buffer overflow when PAC is enabled, as demonstrated by a large PAC file that is delivered without a Content-length header.
- openSUSE-SU-2020:1676
- openSUSE-SU-2020:1676
- openSUSE-SU-2020:1680
- openSUSE-SU-2020:1680
- https://bugs.debian.org/968366
- https://bugs.debian.org/968366
- https://github.com/libproxy/libproxy/pull/126
- https://github.com/libproxy/libproxy/pull/126
- [debian-lts-announce] 20201113 [SECURITY] [DLA 2450-1] libproxy security update
- [debian-lts-announce] 20201113 [SECURITY] [DLA 2450-1] libproxy security update
- FEDORA-2020-15b775b07e
- FEDORA-2020-15b775b07e
- FEDORA-2020-941b563a80
- FEDORA-2020-941b563a80
- DSA-4800
- DSA-4800
Package libsndfile updated to version 1.0.30-alt2 for branch c9f2 in task 276679.
Closed vulnerabilities
BDU:2018-00012
Уязвимость функции aiff_read_chanmap (aaiff.c) библиотеки libsndfile, позволяющая нарушителю нарушить конфиденциальность, целостность и доступность данных
BDU:2018-00013
Уязвимость функции psf_binheader_writef (common.c) библиотеки libsndfile операционной системы Astra Linux, позволяющая нарушителю нарушить конфиденциальность, целостность и доступность данных или вызвать отказ в обслуживании
BDU:2019-01624
Уязвимость библиотеки libsndfile, связанная с переполнением буфера данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-04529
Уязвимость функции sf_write_int библиотеки libsndfile, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03598
Уязвимость функции wav_write_header () библиотеки для чтения и записи аудиофайлов Libsndfile, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03755
Уязвимость функции double64_init() библиотеки libsndfile, связанная с отсутствием проверки деления на ноль, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03756
Уязвимость функции wav_write_header библиотеки libsndfile, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03758
Уязвимость функции d2alaw_array() библиотеки СИ libsndfile, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к конфиденциальной информации или вызвать отказ в обслуживании
BDU:2021-03761
Уязвимость функции i2ulaw_array библиотеки libsndfile, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03767
Уязвимость функции i2ulaw_array библиотеки libsndfile, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к конфиденциальной информации или вызвать отказ в обслуживании
BDU:2021-04131
Уязвимость функции d2alaw_array() библиотеки СИ libsndfile, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2017-12562
Heap-based Buffer Overflow in the psf_binheader_writef function in common.c in libsndfile through 1.0.28 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.
Modified: 2024-11-21
CVE-2017-14245
An out of bounds read in the function d2alaw_array() in alaw.c of libsndfile 1.0.28 may lead to a remote DoS attack or information disclosure, related to mishandling of the NAN and INFINITY floating-point values.
- https://github.com/erikd/libsndfile/issues/317
- https://github.com/erikd/libsndfile/issues/317
- [debian-lts-announce] 20181226 [SECURITY] [DLA 1618-1] libsndfile security update
- [debian-lts-announce] 20181226 [SECURITY] [DLA 1618-1] libsndfile security update
- [debian-lts-announce] 20201029 [SECURITY] [DLA 2418-1] libsndfile security update
- [debian-lts-announce] 20201029 [SECURITY] [DLA 2418-1] libsndfile security update
- GLSA-202007-65
- GLSA-202007-65
- USN-4013-1
- USN-4013-1
Modified: 2024-11-21
CVE-2017-14246
An out of bounds read in the function d2ulaw_array() in ulaw.c of libsndfile 1.0.28 may lead to a remote DoS attack or information disclosure, related to mishandling of the NAN and INFINITY floating-point values.
- https://github.com/erikd/libsndfile/issues/317
- https://github.com/erikd/libsndfile/issues/317
- [debian-lts-announce] 20181226 [SECURITY] [DLA 1618-1] libsndfile security update
- [debian-lts-announce] 20181226 [SECURITY] [DLA 1618-1] libsndfile security update
- [debian-lts-announce] 20201029 [SECURITY] [DLA 2418-1] libsndfile security update
- [debian-lts-announce] 20201029 [SECURITY] [DLA 2418-1] libsndfile security update
- GLSA-202007-65
- GLSA-202007-65
- USN-4013-1
- USN-4013-1
Modified: 2024-11-21
CVE-2017-14634
In libsndfile 1.0.28, a divide-by-zero error exists in the function double64_init() in double64.c, which may lead to DoS when playing a crafted audio file.
- https://github.com/erikd/libsndfile/issues/318
- https://github.com/erikd/libsndfile/issues/318
- [debian-lts-announce] 20181226 [SECURITY] [DLA 1618-1] libsndfile security update
- [debian-lts-announce] 20181226 [SECURITY] [DLA 1618-1] libsndfile security update
- [debian-lts-announce] 20201029 [SECURITY] [DLA 2418-1] libsndfile security update
- [debian-lts-announce] 20201029 [SECURITY] [DLA 2418-1] libsndfile security update
- GLSA-201811-23
- GLSA-201811-23
- USN-4013-1
- USN-4013-1
Modified: 2024-11-21
CVE-2017-6892
In libsndfile version 1.0.28, an error in the "aiff_read_chanmap()" function (aiff.c) can be exploited to cause an out-of-bounds read memory access via a specially crafted AIFF file.
- https://github.com/erikd/libsndfile/commit/f833c53cb596e9e1792949f762e0b33661822748
- https://github.com/erikd/libsndfile/commit/f833c53cb596e9e1792949f762e0b33661822748
- [debian-lts-announce] 20201029 [SECURITY] [DLA 2418-1] libsndfile security update
- [debian-lts-announce] 20201029 [SECURITY] [DLA 2418-1] libsndfile security update
- https://secuniaresearch.flexerasoftware.com/advisories/76717/
- https://secuniaresearch.flexerasoftware.com/advisories/76717/
- https://secuniaresearch.flexerasoftware.com/secunia_research/2017-13/
- https://secuniaresearch.flexerasoftware.com/secunia_research/2017-13/
- GLSA-201811-23
- GLSA-201811-23
- USN-4013-1
- USN-4013-1
Modified: 2024-11-21
CVE-2017-8361
The flac_buffer_copy function in flac.c in libsndfile 1.0.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted audio file.
- https://blogs.gentoo.org/ago/2017/04/29/libsndfile-global-buffer-overflow-in-flac_buffer_copy-flac-c/
- https://blogs.gentoo.org/ago/2017/04/29/libsndfile-global-buffer-overflow-in-flac_buffer_copy-flac-c/
- [debian-lts-announce] 20181226 [SECURITY] [DLA 1618-1] libsndfile security update
- [debian-lts-announce] 20181226 [SECURITY] [DLA 1618-1] libsndfile security update
- GLSA-201811-23
- GLSA-201811-23
Modified: 2024-11-21
CVE-2017-8362
The flac_buffer_copy function in flac.c in libsndfile 1.0.28 allows remote attackers to cause a denial of service (invalid read and application crash) via a crafted audio file.
- https://blogs.gentoo.org/ago/2017/04/29/libsndfile-invalid-memory-read-in-flac_buffer_copy-flac-c/
- https://blogs.gentoo.org/ago/2017/04/29/libsndfile-invalid-memory-read-in-flac_buffer_copy-flac-c/
- [debian-lts-announce] 20181226 [SECURITY] [DLA 1618-1] libsndfile security update
- [debian-lts-announce] 20181226 [SECURITY] [DLA 1618-1] libsndfile security update
- GLSA-201811-23
- GLSA-201811-23
Modified: 2024-11-21
CVE-2017-8363
The flac_buffer_copy function in flac.c in libsndfile 1.0.28 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted audio file.
- https://blogs.gentoo.org/ago/2017/04/29/libsndfile-heap-based-buffer-overflow-in-flac_buffer_copy-flac-c/
- https://blogs.gentoo.org/ago/2017/04/29/libsndfile-heap-based-buffer-overflow-in-flac_buffer_copy-flac-c/
- [debian-lts-announce] 20181226 [SECURITY] [DLA 1618-1] libsndfile security update
- [debian-lts-announce] 20181226 [SECURITY] [DLA 1618-1] libsndfile security update
- GLSA-201811-23
- GLSA-201811-23
Modified: 2024-11-21
CVE-2017-8365
The i2les_array function in pcm.c in libsndfile 1.0.28 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted audio file.
- https://blogs.gentoo.org/ago/2017/04/29/libsndfile-global-buffer-overflow-in-i2les_array-pcm-c/
- https://blogs.gentoo.org/ago/2017/04/29/libsndfile-global-buffer-overflow-in-i2les_array-pcm-c/
- [debian-lts-announce] 20181226 [SECURITY] [DLA 1618-1] libsndfile security update
- [debian-lts-announce] 20181226 [SECURITY] [DLA 1618-1] libsndfile security update
- GLSA-201811-23
- GLSA-201811-23
Modified: 2024-11-21
CVE-2018-13139
A stack-based buffer overflow in psf_memset in common.c in libsndfile 1.0.28 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted audio file. The vulnerability can be triggered by the executable sndfile-deinterleave.
- https://github.com/erikd/libsndfile/issues/397
- https://github.com/erikd/libsndfile/issues/397
- [debian-lts-announce] 20181226 [SECURITY] [DLA 1618-1] libsndfile security update
- [debian-lts-announce] 20181226 [SECURITY] [DLA 1618-1] libsndfile security update
- GLSA-201811-23
- GLSA-201811-23
- USN-4013-1
- USN-4013-1
Modified: 2024-11-21
CVE-2018-13419
An issue has been found in libsndfile 1.0.28. There is a memory leak in psf_allocate in common.c, as demonstrated by sndfile-convert. NOTE: The maintainer and third parties were unable to reproduce and closed the issue
Modified: 2024-11-21
CVE-2018-19432
An issue was discovered in libsndfile 1.0.28. There is a NULL pointer dereference in the function sf_write_int in sndfile.c, which will lead to a denial of service.
Modified: 2024-11-21
CVE-2018-19661
An issue was discovered in libsndfile 1.0.28. There is a buffer over-read in the function i2ulaw_array in ulaw.c that will lead to a denial of service.
- https://github.com/erikd/libsndfile/issues/429
- https://github.com/erikd/libsndfile/issues/429
- [debian-lts-announce] 20181226 [SECURITY] [DLA 1618-1] libsndfile security update
- [debian-lts-announce] 20181226 [SECURITY] [DLA 1618-1] libsndfile security update
- [debian-lts-announce] 20201029 [SECURITY] [DLA 2418-1] libsndfile security update
- [debian-lts-announce] 20201029 [SECURITY] [DLA 2418-1] libsndfile security update
- USN-4013-1
- USN-4013-1
Modified: 2024-11-21
CVE-2018-19662
An issue was discovered in libsndfile 1.0.28. There is a buffer over-read in the function i2alaw_array in alaw.c that will lead to a denial of service.
- https://github.com/erikd/libsndfile/issues/429
- https://github.com/erikd/libsndfile/issues/429
- [debian-lts-announce] 20181226 [SECURITY] [DLA 1618-1] libsndfile security update
- [debian-lts-announce] 20181226 [SECURITY] [DLA 1618-1] libsndfile security update
- [debian-lts-announce] 20201029 [SECURITY] [DLA 2418-1] libsndfile security update
- [debian-lts-announce] 20201029 [SECURITY] [DLA 2418-1] libsndfile security update
- USN-4013-1
- USN-4013-1
Modified: 2024-11-21
CVE-2018-19758
There is a heap-based buffer over-read at wav.c in wav_write_header in libsndfile 1.0.28 that will cause a denial of service.
- https://bugzilla.redhat.com/show_bug.cgi?id=1643812
- https://bugzilla.redhat.com/show_bug.cgi?id=1643812
- [debian-lts-announce] 20190110 [SECURITY] [DLA 1632-1] libsndfile security update
- [debian-lts-announce] 20190110 [SECURITY] [DLA 1632-1] libsndfile security update
- [debian-lts-announce] 20201029 [SECURITY] [DLA 2418-1] libsndfile security update
- [debian-lts-announce] 20201029 [SECURITY] [DLA 2418-1] libsndfile security update
- USN-4013-1
- USN-4013-1
Modified: 2024-11-21
CVE-2019-3832
It was discovered the fix for CVE-2018-19758 (libsndfile) was not complete and still allows a read beyond the limits of a buffer in wav_write_header() function in wav.c. A local attacker may use this flaw to make the application crash.
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3832
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3832
- https://github.com/erikd/libsndfile/issues/456
- https://github.com/erikd/libsndfile/issues/456
- https://github.com/erikd/libsndfile/pull/460
- https://github.com/erikd/libsndfile/pull/460
- [debian-lts-announce] 20201029 [SECURITY] [DLA 2418-1] libsndfile security update
- [debian-lts-announce] 20201029 [SECURITY] [DLA 2418-1] libsndfile security update
- GLSA-202007-65
- GLSA-202007-65
- USN-4013-1
- USN-4013-1
Closed vulnerabilities
BDU:2022-05961
Уязвимость компонента packet.c библиотеки реализации протокола SSH2 Libssh2, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-17498
In libssh2 v1.9.0 and earlier versions, the SSH_MSG_DISCONNECT logic in packet.c has an integer overflow in a bounds check, enabling an attacker to specify an arbitrary (out-of-bounds) offset for a subsequent memory read. A crafted SSH server may be able to disclose sensitive information or cause a denial of service condition on the client system when a user connects to the server.
- openSUSE-SU-2019:2483
- openSUSE-SU-2019:2483
- http://packetstormsecurity.com/files/172835/libssh2-1.9.0-Out-Of-Bounds-Read.html
- http://packetstormsecurity.com/files/172835/libssh2-1.9.0-Out-Of-Bounds-Read.html
- https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
- https://blog.semmle.com/libssh2-integer-overflow-CVE-2019-17498/
- https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
- https://github.com/kevinbackhouse/SecurityExploits/tree/8cbdbbe6363510f7d9ceec685373da12e6fc752d/libssh2/out_of_bounds_read_disconnect_CVE-2019-17498
- https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
- https://github.com/libssh2/libssh2/blob/42d37aa63129a1b2644bf6495198923534322d64/src/packet.c#L480
- https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
- https://github.com/libssh2/libssh2/commit/dedcbd106f8e52d5586b0205bc7677e4c9868f9c
- [debian-lts-announce] 20191113 [SECURITY] [DLA 1991-1] libssh2 security update
- [debian-lts-announce] 20191113 [SECURITY] [DLA 1991-1] libssh2 security update
- [debian-lts-announce] 20211217 [SECURITY] [DLA 2848-1] libssh2 security update
- [debian-lts-announce] 20211217 [SECURITY] [DLA 2848-1] libssh2 security update
- [debian-lts-announce] 20230908 [SECURITY] [DLA 3559-1] libssh2 security update
- [debian-lts-announce] 20230908 [SECURITY] [DLA 3559-1] libssh2 security update
- FEDORA-2019-ec04c34768
- FEDORA-2019-ec04c34768
- FEDORA-2019-91529f19e4
- FEDORA-2019-91529f19e4
- https://security.netapp.com/advisory/ntap-20220909-0004/
- https://security.netapp.com/advisory/ntap-20220909-0004/
Closed vulnerabilities
BDU:2021-01776
Уязвимость компонента scan.c VNC-сервера X11vnc, связанная с отсутствием механизма авторизации, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-29074
scan.c in x11vnc 0.9.16 uses IPC_CREAT|0777 in shmget calls, which allows access by actors other than the current user.
- https://github.com/LibVNC/x11vnc/commit/69eeb9f7baa14ca03b16c9de821f9876def7a36a
- https://github.com/LibVNC/x11vnc/commit/69eeb9f7baa14ca03b16c9de821f9876def7a36a
- [debian-lts-announce] 20201210 [SECURITY] [DLA 2490-1] x11vnc security update
- [debian-lts-announce] 20201210 [SECURITY] [DLA 2490-1] x11vnc security update
- FEDORA-2021-93911302d6
- FEDORA-2021-93911302d6
- FEDORA-2021-c5b679877e
- FEDORA-2021-c5b679877e
- FEDORA-2021-069c0c3950
- FEDORA-2021-069c0c3950
- DSA-4799
- DSA-4799
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-15803
Zabbix before 3.0.32rc1, 4.x before 4.0.22rc1, 4.1.x through 4.4.x before 4.4.10rc1, and 5.x before 5.0.2rc1 allows stored XSS in the URL Widget.
- openSUSE-SU-2020:1604
- openSUSE-SU-2020:1604
- [debian-lts-announce] 20200803 [SECURITY] [DLA 2311-1] zabbix security update
- [debian-lts-announce] 20200803 [SECURITY] [DLA 2311-1] zabbix security update
- [debian-lts-announce] 20210421 [SECURITY] [DLA 2631-1] zabbix security update
- [debian-lts-announce] 20210421 [SECURITY] [DLA 2631-1] zabbix security update
- [debian-lts-announce] 20230412 [SECURITY] [DLA 3390-1] zabbix security update
- [debian-lts-announce] 20230412 [SECURITY] [DLA 3390-1] zabbix security update
- FEDORA-2020-02cf7850ca
- FEDORA-2020-02cf7850ca
- FEDORA-2020-519516feec
- FEDORA-2020-519516feec
- https://support.zabbix.com/browse/ZBX-18057
- https://support.zabbix.com/browse/ZBX-18057
Closed bugs
обновить конфигурацию доступа для httpd-2.4
Права доступа к каталогу и миграция параметров с zabbix4
Нет double.sql необходимого для обновления баз с 4-й версии до 5-й
Пакет Zabbix Agent 2