ALT-BU-2021-4054-1
Branch c9f1 update bulletin.
Package libsndfile updated to version 1.0.30-alt2 for branch c9f1 in task 278904.
Closed vulnerabilities
BDU:2018-00012
Уязвимость функции aiff_read_chanmap (aaiff.c) библиотеки libsndfile, позволяющая нарушителю нарушить конфиденциальность, целостность и доступность данных
BDU:2018-00013
Уязвимость функции psf_binheader_writef (common.c) библиотеки libsndfile операционной системы Astra Linux, позволяющая нарушителю нарушить конфиденциальность, целостность и доступность данных или вызвать отказ в обслуживании
BDU:2019-01624
Уязвимость библиотеки libsndfile, связанная с переполнением буфера данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-04529
Уязвимость функции sf_write_int библиотеки libsndfile, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03598
Уязвимость функции wav_write_header () библиотеки для чтения и записи аудиофайлов Libsndfile, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03755
Уязвимость функции double64_init() библиотеки libsndfile, связанная с отсутствием проверки деления на ноль, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03756
Уязвимость функции wav_write_header библиотеки libsndfile, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03758
Уязвимость функции d2alaw_array() библиотеки СИ libsndfile, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к конфиденциальной информации или вызвать отказ в обслуживании
BDU:2021-03761
Уязвимость функции i2ulaw_array библиотеки libsndfile, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03767
Уязвимость функции i2ulaw_array библиотеки libsndfile, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к конфиденциальной информации или вызвать отказ в обслуживании
BDU:2021-04131
Уязвимость функции d2alaw_array() библиотеки СИ libsndfile, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
Modified: 2025-04-20
CVE-2017-12562
Heap-based Buffer Overflow in the psf_binheader_writef function in common.c in libsndfile through 1.0.28 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact.
- https://github.com/erikd/libsndfile/issues/292
- https://lists.debian.org/debian-lts-announce/2022/06/msg00020.html
- https://security.gentoo.org/glsa/201811-23
- https://github.com/erikd/libsndfile/issues/292
- https://lists.debian.org/debian-lts-announce/2022/06/msg00020.html
- https://security.gentoo.org/glsa/201811-23
Modified: 2025-04-20
CVE-2017-14245
An out of bounds read in the function d2alaw_array() in alaw.c of libsndfile 1.0.28 may lead to a remote DoS attack or information disclosure, related to mishandling of the NAN and INFINITY floating-point values.
- https://github.com/erikd/libsndfile/issues/317
- https://lists.debian.org/debian-lts-announce/2018/12/msg00016.html
- https://lists.debian.org/debian-lts-announce/2020/10/msg00030.html
- https://security.gentoo.org/glsa/202007-65
- https://usn.ubuntu.com/4013-1/
- https://github.com/erikd/libsndfile/issues/317
- https://lists.debian.org/debian-lts-announce/2018/12/msg00016.html
- https://lists.debian.org/debian-lts-announce/2020/10/msg00030.html
- https://security.gentoo.org/glsa/202007-65
- https://usn.ubuntu.com/4013-1/
Modified: 2025-04-20
CVE-2017-14246
An out of bounds read in the function d2ulaw_array() in ulaw.c of libsndfile 1.0.28 may lead to a remote DoS attack or information disclosure, related to mishandling of the NAN and INFINITY floating-point values.
- https://github.com/erikd/libsndfile/issues/317
- https://lists.debian.org/debian-lts-announce/2018/12/msg00016.html
- https://lists.debian.org/debian-lts-announce/2020/10/msg00030.html
- https://security.gentoo.org/glsa/202007-65
- https://usn.ubuntu.com/4013-1/
- https://github.com/erikd/libsndfile/issues/317
- https://lists.debian.org/debian-lts-announce/2018/12/msg00016.html
- https://lists.debian.org/debian-lts-announce/2020/10/msg00030.html
- https://security.gentoo.org/glsa/202007-65
- https://usn.ubuntu.com/4013-1/
Modified: 2025-04-20
CVE-2017-14634
In libsndfile 1.0.28, a divide-by-zero error exists in the function double64_init() in double64.c, which may lead to DoS when playing a crafted audio file.
- https://github.com/erikd/libsndfile/issues/318
- https://lists.debian.org/debian-lts-announce/2018/12/msg00016.html
- https://lists.debian.org/debian-lts-announce/2020/10/msg00030.html
- https://security.gentoo.org/glsa/201811-23
- https://usn.ubuntu.com/4013-1/
- https://github.com/erikd/libsndfile/issues/318
- https://lists.debian.org/debian-lts-announce/2018/12/msg00016.html
- https://lists.debian.org/debian-lts-announce/2020/10/msg00030.html
- https://security.gentoo.org/glsa/201811-23
- https://usn.ubuntu.com/4013-1/
Modified: 2025-04-20
CVE-2017-6892
In libsndfile version 1.0.28, an error in the "aiff_read_chanmap()" function (aiff.c) can be exploited to cause an out-of-bounds read memory access via a specially crafted AIFF file.
- https://github.com/erikd/libsndfile/commit/f833c53cb596e9e1792949f762e0b33661822748
- https://lists.debian.org/debian-lts-announce/2020/10/msg00030.html
- https://secuniaresearch.flexerasoftware.com/advisories/76717/
- https://secuniaresearch.flexerasoftware.com/secunia_research/2017-13/
- https://security.gentoo.org/glsa/201811-23
- https://usn.ubuntu.com/4013-1/
- https://github.com/erikd/libsndfile/commit/f833c53cb596e9e1792949f762e0b33661822748
- https://lists.debian.org/debian-lts-announce/2020/10/msg00030.html
- https://secuniaresearch.flexerasoftware.com/advisories/76717/
- https://secuniaresearch.flexerasoftware.com/secunia_research/2017-13/
- https://security.gentoo.org/glsa/201811-23
- https://usn.ubuntu.com/4013-1/
Modified: 2025-04-20
CVE-2017-8361
The flac_buffer_copy function in flac.c in libsndfile 1.0.28 allows remote attackers to cause a denial of service (buffer overflow and application crash) or possibly have unspecified other impact via a crafted audio file.
- https://blogs.gentoo.org/ago/2017/04/29/libsndfile-global-buffer-overflow-in-flac_buffer_copy-flac-c/
- https://lists.debian.org/debian-lts-announce/2018/12/msg00016.html
- https://security.gentoo.org/glsa/201811-23
- https://blogs.gentoo.org/ago/2017/04/29/libsndfile-global-buffer-overflow-in-flac_buffer_copy-flac-c/
- https://lists.debian.org/debian-lts-announce/2018/12/msg00016.html
- https://security.gentoo.org/glsa/201811-23
Modified: 2025-04-20
CVE-2017-8362
The flac_buffer_copy function in flac.c in libsndfile 1.0.28 allows remote attackers to cause a denial of service (invalid read and application crash) via a crafted audio file.
- https://blogs.gentoo.org/ago/2017/04/29/libsndfile-invalid-memory-read-in-flac_buffer_copy-flac-c/
- https://lists.debian.org/debian-lts-announce/2018/12/msg00016.html
- https://security.gentoo.org/glsa/201811-23
- https://blogs.gentoo.org/ago/2017/04/29/libsndfile-invalid-memory-read-in-flac_buffer_copy-flac-c/
- https://lists.debian.org/debian-lts-announce/2018/12/msg00016.html
- https://security.gentoo.org/glsa/201811-23
Modified: 2025-04-20
CVE-2017-8363
The flac_buffer_copy function in flac.c in libsndfile 1.0.28 allows remote attackers to cause a denial of service (heap-based buffer over-read and application crash) via a crafted audio file.
- https://blogs.gentoo.org/ago/2017/04/29/libsndfile-heap-based-buffer-overflow-in-flac_buffer_copy-flac-c/
- https://lists.debian.org/debian-lts-announce/2018/12/msg00016.html
- https://security.gentoo.org/glsa/201811-23
- https://blogs.gentoo.org/ago/2017/04/29/libsndfile-heap-based-buffer-overflow-in-flac_buffer_copy-flac-c/
- https://lists.debian.org/debian-lts-announce/2018/12/msg00016.html
- https://security.gentoo.org/glsa/201811-23
Modified: 2025-04-20
CVE-2017-8365
The i2les_array function in pcm.c in libsndfile 1.0.28 allows remote attackers to cause a denial of service (buffer over-read and application crash) via a crafted audio file.
- https://blogs.gentoo.org/ago/2017/04/29/libsndfile-global-buffer-overflow-in-i2les_array-pcm-c/
- https://lists.debian.org/debian-lts-announce/2018/12/msg00016.html
- https://security.gentoo.org/glsa/201811-23
- https://blogs.gentoo.org/ago/2017/04/29/libsndfile-global-buffer-overflow-in-i2les_array-pcm-c/
- https://lists.debian.org/debian-lts-announce/2018/12/msg00016.html
- https://security.gentoo.org/glsa/201811-23
Modified: 2024-11-21
CVE-2018-13139
A stack-based buffer overflow in psf_memset in common.c in libsndfile 1.0.28 allows remote attackers to cause a denial of service (application crash) or possibly have unspecified other impact via a crafted audio file. The vulnerability can be triggered by the executable sndfile-deinterleave.
- https://github.com/erikd/libsndfile/issues/397
- https://lists.debian.org/debian-lts-announce/2018/12/msg00016.html
- https://security.gentoo.org/glsa/201811-23
- https://usn.ubuntu.com/4013-1/
- https://github.com/erikd/libsndfile/issues/397
- https://lists.debian.org/debian-lts-announce/2018/12/msg00016.html
- https://security.gentoo.org/glsa/201811-23
- https://usn.ubuntu.com/4013-1/
Modified: 2024-11-21
CVE-2018-13419
An issue has been found in libsndfile 1.0.28. There is a memory leak in psf_allocate in common.c, as demonstrated by sndfile-convert. NOTE: The maintainer and third parties were unable to reproduce and closed the issue
Modified: 2024-11-21
CVE-2018-19432
An issue was discovered in libsndfile 1.0.28. There is a NULL pointer dereference in the function sf_write_int in sndfile.c, which will lead to a denial of service.
- http://www.securityfocus.com/bid/105996
- https://github.com/erikd/libsndfile/issues/427
- https://lists.debian.org/debian-lts-announce/2018/12/msg00016.html
- https://usn.ubuntu.com/4013-1/
- http://www.securityfocus.com/bid/105996
- https://github.com/erikd/libsndfile/issues/427
- https://lists.debian.org/debian-lts-announce/2018/12/msg00016.html
- https://usn.ubuntu.com/4013-1/
Modified: 2024-11-21
CVE-2018-19661
An issue was discovered in libsndfile 1.0.28. There is a buffer over-read in the function i2ulaw_array in ulaw.c that will lead to a denial of service.
- https://github.com/erikd/libsndfile/issues/429
- https://lists.debian.org/debian-lts-announce/2018/12/msg00016.html
- https://lists.debian.org/debian-lts-announce/2020/10/msg00030.html
- https://usn.ubuntu.com/4013-1/
- https://github.com/erikd/libsndfile/issues/429
- https://lists.debian.org/debian-lts-announce/2018/12/msg00016.html
- https://lists.debian.org/debian-lts-announce/2020/10/msg00030.html
- https://usn.ubuntu.com/4013-1/
Modified: 2024-11-21
CVE-2018-19662
An issue was discovered in libsndfile 1.0.28. There is a buffer over-read in the function i2alaw_array in alaw.c that will lead to a denial of service.
- https://github.com/erikd/libsndfile/issues/429
- https://lists.debian.org/debian-lts-announce/2018/12/msg00016.html
- https://lists.debian.org/debian-lts-announce/2020/10/msg00030.html
- https://usn.ubuntu.com/4013-1/
- https://github.com/erikd/libsndfile/issues/429
- https://lists.debian.org/debian-lts-announce/2018/12/msg00016.html
- https://lists.debian.org/debian-lts-announce/2020/10/msg00030.html
- https://usn.ubuntu.com/4013-1/
Modified: 2024-11-21
CVE-2018-19758
There is a heap-based buffer over-read at wav.c in wav_write_header in libsndfile 1.0.28 that will cause a denial of service.
- https://bugzilla.redhat.com/show_bug.cgi?id=1643812
- https://lists.debian.org/debian-lts-announce/2019/01/msg00008.html
- https://lists.debian.org/debian-lts-announce/2020/10/msg00030.html
- https://usn.ubuntu.com/4013-1/
- https://bugzilla.redhat.com/show_bug.cgi?id=1643812
- https://lists.debian.org/debian-lts-announce/2019/01/msg00008.html
- https://lists.debian.org/debian-lts-announce/2020/10/msg00030.html
- https://usn.ubuntu.com/4013-1/
Modified: 2024-11-21
CVE-2019-3832
It was discovered the fix for CVE-2018-19758 (libsndfile) was not complete and still allows a read beyond the limits of a buffer in wav_write_header() function in wav.c. A local attacker may use this flaw to make the application crash.
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3832
- https://github.com/erikd/libsndfile/issues/456
- https://github.com/erikd/libsndfile/pull/460
- https://lists.debian.org/debian-lts-announce/2020/10/msg00030.html
- https://security.gentoo.org/glsa/202007-65
- https://usn.ubuntu.com/4013-1/
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-3832
- https://github.com/erikd/libsndfile/issues/456
- https://github.com/erikd/libsndfile/pull/460
- https://lists.debian.org/debian-lts-announce/2020/10/msg00030.html
- https://security.gentoo.org/glsa/202007-65
- https://usn.ubuntu.com/4013-1/
Closed vulnerabilities
Modified: 2025-04-11
CVE-2013-1364
The user.login function in Zabbix before 1.8.16 and 2.x before 2.0.5rc1 allows remote attackers to override LDAP configuration via the cnf parameter.
- http://secunia.com/advisories/55824
- http://security.gentoo.org/glsa/glsa-201311-15.xml
- http://www.securityfocus.com/bid/57471
- http://www.zabbix.com/rn1.8.16.php
- http://www.zabbix.com/rn2.0.5rc1.php
- https://support.zabbix.com/browse/ZBX-6097
- http://secunia.com/advisories/55824
- http://security.gentoo.org/glsa/glsa-201311-15.xml
- http://www.securityfocus.com/bid/57471
- http://www.zabbix.com/rn1.8.16.php
- http://www.zabbix.com/rn2.0.5rc1.php
- https://support.zabbix.com/browse/ZBX-6097
Modified: 2024-11-21
CVE-2020-15803
Zabbix before 3.0.32rc1, 4.x before 4.0.22rc1, 4.1.x through 4.4.x before 4.4.10rc1, and 5.x before 5.0.2rc1 allows stored XSS in the URL Widget.
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2020/08/msg00007.html
- https://lists.debian.org/debian-lts-announce/2021/04/msg00018.html
- https://lists.debian.org/debian-lts-announce/2023/04/msg00013.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZHHIUYIVA5GZYLKW6A5G6HRELPOBZFE/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TIRIMOXH6GSBAANDCB3ANLJK4CRLWRXT/
- https://support.zabbix.com/browse/ZBX-18057
- http://lists.opensuse.org/opensuse-security-announce/2020-10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2020/08/msg00007.html
- https://lists.debian.org/debian-lts-announce/2021/04/msg00018.html
- https://lists.debian.org/debian-lts-announce/2023/04/msg00013.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2ZHHIUYIVA5GZYLKW6A5G6HRELPOBZFE/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/TIRIMOXH6GSBAANDCB3ANLJK4CRLWRXT/
- https://support.zabbix.com/browse/ZBX-18057
Closed bugs
обновить конфигурацию доступа для httpd-2.4
Права доступа к каталогу и миграция параметров с zabbix4
Нет double.sql необходимого для обновления баз с 4-й версии до 5-й
Пакет Zabbix Agent 2