ALT-BU-2021-4274-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-38297
Go before 1.16.9 and 1.17.x before 1.17.2 has a Buffer Overflow via large arguments in a function invocation from a WASM module, when GOARCH=wasm GOOS=js is used.
- https://groups.google.com/forum/#%21forum/golang-announce
- https://groups.google.com/forum/#%21forum/golang-announce
- https://groups.google.com/g/golang-announce/c/AEBu9j7yj5A
- https://groups.google.com/g/golang-announce/c/AEBu9j7yj5A
- [debian-lts-announce] 20230419 [SECURITY] [DLA 3395-1] golang-1.11 security update
- [debian-lts-announce] 20230419 [SECURITY] [DLA 3395-1] golang-1.11 security update
- FEDORA-2021-2ef35beebf
- FEDORA-2021-2ef35beebf
- FEDORA-2021-2b2dd1b5a7
- FEDORA-2021-2b2dd1b5a7
- GLSA-202208-02
- GLSA-202208-02
- https://security.netapp.com/advisory/ntap-20211118-0006/
- https://security.netapp.com/advisory/ntap-20211118-0006/
Closed vulnerabilities
BDU:2022-05556
Уязвимость расширения XEP-0308 Last Message Correction Jabber/XMPP-клиента Gajim, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-41055
Gajim 1.2.x and 1.3.x before 1.3.3 allows remote attackers to cause a denial of service (crash) via a crafted XMPP Last Message Correction (XEP-0308) message in multi-user chat, where the message ID equals the correction ID.
Package chromium-gost updated to version 94.0.4606.71-alt2 for branch sisyphus in task 286886.
Closed bugs
Не запускается chromium-gost из консоли и из меню
Package python3-module-Pillow updated to version 8.3.2-alt1 for branch sisyphus in task 286917.
Closed vulnerabilities
BDU:2021-05225
Уязвимость компонента Convert.c библиотеки для работы с изображениями Pillow, связанная с переполнением буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-05405
Уязвимость реализации функции convert() или ImagingConvertTransparent() библиотек для работы с изображениями Pillow и PIL (Python Imaging Library, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02242
Уязвимость функции getrgb библиотеки для работы с растровой графикой Pillow, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-23437
The package pillow 5.2.0 and before 8.3.2 are vulnerable to Regular Expression Denial of Service (ReDoS) via the getrgb function.
- https://github.com/python-pillow/Pillow/commit/9e08eb8f78fdfd2f476e1b20b7cf38683754866b
- https://github.com/python-pillow/Pillow/commit/9e08eb8f78fdfd2f476e1b20b7cf38683754866b
- [debian-lts-announce] 20240322 [SECURITY] [DLA 3768-1] pillow security update
- [debian-lts-announce] 20240322 [SECURITY] [DLA 3768-1] pillow security update
- FEDORA-2021-cbfaefb390
- FEDORA-2021-cbfaefb390
- FEDORA-2021-9f020cf155
- FEDORA-2021-9f020cf155
- https://pillow.readthedocs.io/en/stable/releasenotes/8.3.2.html
- https://pillow.readthedocs.io/en/stable/releasenotes/8.3.2.html
- GLSA-202211-10
- GLSA-202211-10
- https://snyk.io/vuln/SNYK-PYTHON-PILLOW-1319443
- https://snyk.io/vuln/SNYK-PYTHON-PILLOW-1319443
Modified: 2024-11-21
CVE-2021-34552
Pillow through 8.2.0 and PIL (aka Python Imaging Library) through 1.1.7 allow an attacker to pass controlled parameters directly into a convert function to trigger a buffer overflow in Convert.c.
- [debian-lts-announce] 20210722 [SECURITY] [DLA 2716-1] pillow security update
- [debian-lts-announce] 20210722 [SECURITY] [DLA 2716-1] pillow security update
- FEDORA-2021-bf01a738f3
- FEDORA-2021-bf01a738f3
- FEDORA-2021-3ec845dc0c
- FEDORA-2021-3ec845dc0c
- https://pillow.readthedocs.io/en/stable/releasenotes/8.3.0.html#buffer-overflow
- https://pillow.readthedocs.io/en/stable/releasenotes/8.3.0.html#buffer-overflow
- https://pillow.readthedocs.io/en/stable/releasenotes/index.html
- https://pillow.readthedocs.io/en/stable/releasenotes/index.html
- GLSA-202211-10
- GLSA-202211-10
Package milkytracker updated to version 1.03.00-alt1_1 for branch sisyphus in task 286909.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-14464
XMFile::read in XMFile.cpp in milkyplay in MilkyTracker 1.02.00 has a heap-based buffer overflow.
- https://github.com/milkytracker/MilkyTracker/issues/184
- https://github.com/milkytracker/MilkyTracker/issues/184
- [debian-lts-announce] 20191021 [SECURITY] [DLA 1961-1] milkytracker security update
- [debian-lts-announce] 20191021 [SECURITY] [DLA 1961-1] milkytracker security update
- [debian-lts-announce] 20200727 [SECURITY] [DLA 2292-1] milkytracker security update
- [debian-lts-announce] 20200727 [SECURITY] [DLA 2292-1] milkytracker security update
- FEDORA-2019-3d5f61419f
- FEDORA-2019-3d5f61419f
- FEDORA-2019-04babe66b5
- FEDORA-2019-04babe66b5
- USN-4499-1
- USN-4499-1
Modified: 2024-11-21
CVE-2019-14496
LoaderXM::load in LoaderXM.cpp in milkyplay in MilkyTracker 1.02.00 has a stack-based buffer overflow.
- https://github.com/milkytracker/MilkyTracker/issues/183
- https://github.com/milkytracker/MilkyTracker/issues/183
- [debian-lts-announce] 20191021 [SECURITY] [DLA 1961-1] milkytracker security update
- [debian-lts-announce] 20191021 [SECURITY] [DLA 1961-1] milkytracker security update
- [debian-lts-announce] 20200727 [SECURITY] [DLA 2292-1] milkytracker security update
- [debian-lts-announce] 20200727 [SECURITY] [DLA 2292-1] milkytracker security update
- USN-4499-1
- USN-4499-1
Modified: 2024-11-21
CVE-2019-14497
ModuleEditor::convertInstrument in tracker/ModuleEditor.cpp in MilkyTracker 1.02.00 has a heap-based buffer overflow.
- https://github.com/milkytracker/MilkyTracker/issues/182
- https://github.com/milkytracker/MilkyTracker/issues/182
- [debian-lts-announce] 20191021 [SECURITY] [DLA 1961-1] milkytracker security update
- [debian-lts-announce] 20191021 [SECURITY] [DLA 1961-1] milkytracker security update
- [debian-lts-announce] 20200727 [SECURITY] [DLA 2292-1] milkytracker security update
- [debian-lts-announce] 20200727 [SECURITY] [DLA 2292-1] milkytracker security update
- USN-4499-1
- USN-4499-1
Modified: 2024-11-21
CVE-2020-15569
PlayerGeneric.cpp in MilkyTracker through 1.02.00 has a use-after-free in the PlayerGeneric destructor.
- https://github.com/milkytracker/MilkyTracker/commit/7afd55c42ad80d01a339197a2d8b5461d214edaf
- https://github.com/milkytracker/MilkyTracker/commit/7afd55c42ad80d01a339197a2d8b5461d214edaf
- [debian-lts-announce] 20200727 [SECURITY] [DLA 2292-1] milkytracker security update
- [debian-lts-announce] 20200727 [SECURITY] [DLA 2292-1] milkytracker security update
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-39209
GLPI is a free Asset and IT management software package. In versions prior to 9.5.6, a user who is logged in to GLPI can bypass Cross-Site Request Forgery (CSRF) protection in many places. This could allow a malicious actor to perform many actions on GLPI. This issue is fixed in version 9.5.6. There are no workarounds aside from upgrading.
Modified: 2024-11-21
CVE-2021-39210
GLPI is a free Asset and IT management software package. In versions prior to 9.5.6, the cookie used to store the autologin cookie (when a user uses the "remember me" feature) is accessible by scripts. A malicious plugin that could steal this cookie would be able to use it to autologin. This issue is fixed in version 9.5.6. As a workaround, one may avoid using the "remember me" feature.
- https://github.com/glpi-project/glpi/releases/tag/9.5.6
- https://github.com/glpi-project/glpi/releases/tag/9.5.6
- https://github.com/glpi-project/glpi/security/advisories/GHSA-hwxq-4c5f-m4v2
- https://github.com/glpi-project/glpi/security/advisories/GHSA-hwxq-4c5f-m4v2
- https://huntr.dev/bounties/b2e99a41-b904-419f-a274-ae383e4925f2/
- https://huntr.dev/bounties/b2e99a41-b904-419f-a274-ae383e4925f2/
Modified: 2024-11-21
CVE-2021-39211
GLPI is a free Asset and IT management software package. Starting in version 9.2 and prior to version 9.5.6, the telemetry endpoint discloses GLPI and server information. This issue is fixed in version 9.5.6. As a workaround, remove the file `ajax/telemetry.php`, which is not needed for usual functions of GLPI.
Modified: 2024-11-21
CVE-2021-39213
GLPI is a free Asset and IT management software package. Starting in version 9.1 and prior to version 9.5.6, GLPI with API Rest enabled is vulnerable to API bypass with custom header injection. This issue is fixed in version 9.5.6. One may disable API Rest as a workaround.