ALT-BU-2021-4308-1
Branch sisyphus update bulletin.
Closed bugs
python3-module-odf and python3-module-odfpy both provide python3(odf)
Closed vulnerabilities
BDU:2021-04606
Уязвимость компонента imap/util.c почтовых клиентов Mutt и NeoMutt, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-32055
Mutt 1.11.0 through 2.0.x before 2.0.7 (and NeoMutt 2019-10-25 through 2021-05-04) has a $imap_qresync issue in which imap/util.c has an out-of-bounds read in situations where an IMAP sequence set ends with a comma. NOTE: the $imap_qresync setting for QRESYNC is not enabled by default.
- http://lists.mutt.org/pipermail/mutt-announce/Week-of-Mon-20210503/000036.html
- http://lists.mutt.org/pipermail/mutt-announce/Week-of-Mon-20210503/000036.html
- https://github.com/neomutt/neomutt/commit/fa1db5785e5cfd9d3cd27b7571b9fe268d2ec2dc
- https://github.com/neomutt/neomutt/commit/fa1db5785e5cfd9d3cd27b7571b9fe268d2ec2dc
- https://gitlab.com/muttmua/mutt/-/commit/7c4779ac24d2fb68a2a47b58c7904118f40965d5
- https://gitlab.com/muttmua/mutt/-/commit/7c4779ac24d2fb68a2a47b58c7904118f40965d5
- GLSA-202105-05
- GLSA-202105-05
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-8293
A missing input validation in Nextcloud Server before 20.0.2, 19.0.5, 18.0.11 allows users to store unlimited data in workflow rules causing load and potential DDoS on later interactions and usage with those rules.
Modified: 2024-11-21
CVE-2020-8294
A missing link validation in Nextcloud Server before 20.0.2, 19.0.5, 18.0.11 allows execution of a stored XSS attack using Internet Explorer when saving a 'javascript:' URL in markdown format.
Modified: 2024-11-21
CVE-2021-22877
A missing user check in Nextcloud prior to 20.0.6 inadvertently populates a user's own credentials for other users external storage configuration when not already configured yet.
- https://github.com/nextcloud/server/issues/24600
- https://github.com/nextcloud/server/issues/24600
- https://github.com/nextcloud/server/pull/25224
- https://github.com/nextcloud/server/pull/25224
- https://hackerone.com/reports/1061591
- https://hackerone.com/reports/1061591
- FEDORA-2021-eac0e52f88
- FEDORA-2021-eac0e52f88
- https://nextcloud.com/security/advisory/?id=NC-SA-2021-004
- https://nextcloud.com/security/advisory/?id=NC-SA-2021-004
Modified: 2024-11-21
CVE-2021-22878
Nextcloud Server prior to 20.0.6 is vulnerable to reflected cross-site scripting (XSS) due to lack of sanitization in `OC.Notification.show`.
- https://github.com/nextcloud/server/pull/25234
- https://github.com/nextcloud/server/pull/25234
- https://hackerone.com/reports/896522
- https://hackerone.com/reports/896522
- FEDORA-2021-eac0e52f88
- FEDORA-2021-eac0e52f88
- https://nextcloud.com/security/advisory/?id=NC-SA-2021-005
- https://nextcloud.com/security/advisory/?id=NC-SA-2021-005
Modified: 2024-11-21
CVE-2021-22915
Nextcloud server before 19.0.11, 20.0.10, 21.0.2 is vulnerable to brute force attacks due to lack of inclusion of IPv6 subnets in rate-limiting considerations. This could potentially result in an attacker bypassing rate-limit controls such as the Nextcloud brute-force protection.
Modified: 2024-11-21
CVE-2021-32653
Nextcloud Server is a Nextcloud package that handles data storage. Nextcloud Server versions prior to 19.0.11, 20.0.10, or 21.0.2 send user IDs to the lookup server even if the user has no fields set to published. The vulnerability is patched in versions 19.0.11, 20.0.10, and 21.0.2; no workarounds outside the updates are known to exist.
Modified: 2024-11-21
CVE-2021-32654
Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.11, 20.0.10, and 21.0.2, an attacker is able to receive write/read privileges on any Federated File Share. Since public links can be added as federated file share, this can also be exploited on any public link. Users can upgrade to patched versions (19.0.11, 20.0.10 or 21.0.2) or, as a workaround, disable federated file sharing.
Modified: 2024-11-21
CVE-2021-32655
Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.11, 20.0.10, and 21.0.2, an attacker is able to convert a Files Drop link to a federated share. This causes an issue on the UI side of the sharing user. When the sharing user opens the sharing panel and tries to remove the "Create" privileges of this unexpected share, Nextcloud server would silently grant the share read privileges. The vulnerability is patched in versions 19.0.11, 20.0.10 and 21.0.2. No workarounds are known to exist.
Modified: 2024-11-21
CVE-2021-32656
Nextcloud Server is a Nextcloud package that handles data storage. A vulnerability in federated share exists in versions prior to 19.0.11, 20.0.10, and 21.0.2. An attacker can gain access to basic information about users of a server by accessing a public link that a legitimate server user added as a federated share. This happens because Nextcloud supports sharing registered users with other Nextcloud servers, which can be done automatically when selecting the "Add server automatically once a federated share was created successfully" setting. The vulnerability is patched in versions 19.0.11, 20.0.10, and 21.0.2 As a workaround, disable "Add server automatically once a federated share was created successfully" in the Nextcloud settings.
Modified: 2024-11-21
CVE-2021-32657
Nextcloud Server is a Nextcloud package that handles data storage. In versions of Nextcloud Server prior to 10.0.11, 20.0.10, and 21.0.2, a malicious user may be able to break the user administration page. This would disallow administrators to administrate users on the Nextcloud instance. The vulnerability is fixed in versions 19.0.11, 20.0.10, and 21.0.2. As a workaround, administrators can use the OCC command line tool to administrate the Nextcloud users.
Modified: 2024-11-21
CVE-2021-32678
Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.0.11, and 21.0.3, ratelimits are not applied to OCS API responses. This affects any OCS API controller (`OCSController`) using the `@BruteForceProtection` annotation. Risk depends on the installed applications on the Nextcloud Server, but could range from bypassing authentication ratelimits or spamming other Nextcloud users. The vulnerability is patched in versions 19.0.13, 20.0.11, and 21.0.3. No workarounds aside from upgrading are known to exist.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-48rx-3gmf-g74j
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-48rx-3gmf-g74j
- https://github.com/nextcloud/server/pull/27329
- https://github.com/nextcloud/server/pull/27329
- https://hackerone.com/reports/1214158
- https://hackerone.com/reports/1214158
- FEDORA-2021-6f327296fe
- FEDORA-2021-6f327296fe
- FEDORA-2021-9b421b78af
- FEDORA-2021-9b421b78af
- GLSA-202208-17
- GLSA-202208-17
Modified: 2024-11-21
CVE-2021-32679
Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.0.11, and 21.0.3, filenames where not escaped by default in controllers using `DownloadResponse`. When a user-supplied filename was passed unsanitized into a `DownloadResponse`, this could be used to trick users into downloading malicious files with a benign file extension. This would show in UI behaviours where Nextcloud applications would display a benign file extension (e.g. JPEG), but the file will actually be downloaded with an executable file extension. The vulnerability is patched in versions 19.0.13, 20.0.11, and 21.0.3. Administrators of Nextcloud instances do not have a workaround available, but developers of Nextcloud apps may manually escape the file name before passing it into `DownloadResponse`.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-3hjp-26x8-mhf6
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-3hjp-26x8-mhf6
- https://github.com/nextcloud/server/pull/27354
- https://github.com/nextcloud/server/pull/27354
- https://hackerone.com/reports/1215263
- https://hackerone.com/reports/1215263
- FEDORA-2021-6f327296fe
- FEDORA-2021-6f327296fe
- FEDORA-2021-9b421b78af
- FEDORA-2021-9b421b78af
- GLSA-202208-17
- GLSA-202208-17
Modified: 2024-11-21
CVE-2021-32680
Nextcloud Server is a Nextcloud package that handles data storage. In versions priot to 19.0.13, 20.0.11, and 21.0.3, Nextcloud Server audit logging functionality wasn't properly logging events for the unsetting of a share expiration date. This event is supposed to be logged. This issue is patched in versions 19.0.13, 20.0.11, and 21.0.3.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-fxpq-wq7c-vppf
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-fxpq-wq7c-vppf
- https://github.com/nextcloud/server/pull/27024
- https://github.com/nextcloud/server/pull/27024
- https://hackerone.com/reports/1200810
- https://hackerone.com/reports/1200810
- FEDORA-2021-6f327296fe
- FEDORA-2021-6f327296fe
- FEDORA-2021-9b421b78af
- FEDORA-2021-9b421b78af
- GLSA-202208-17
- GLSA-202208-17
Modified: 2024-11-21
CVE-2021-32688
Nextcloud Server is a Nextcloud package that handles data storage. Nextcloud Server supports application specific tokens for authentication purposes. These tokens are supposed to be granted to a specific applications (e.g. DAV sync clients), and can also be configured by the user to not have any filesystem access. Due to a lacking permission check, the tokens were able to change their own permissions in versions prior to 19.0.13, 20.0.11, and 21.0.3. Thus fileystem limited tokens were able to grant themselves access to the filesystem. The issue is patched in versions 19.0.13, 20.0.11, and 21.0.3. There are no known workarounds aside from upgrading.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-48m7-7r2r-838r
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-48m7-7r2r-838r
- https://github.com/nextcloud/server/pull/27000
- https://github.com/nextcloud/server/pull/27000
- https://hackerone.com/reports/1193321
- https://hackerone.com/reports/1193321
- FEDORA-2021-6f327296fe
- FEDORA-2021-6f327296fe
- FEDORA-2021-9b421b78af
- FEDORA-2021-9b421b78af
- GLSA-202208-17
- GLSA-202208-17
Modified: 2024-11-21
CVE-2021-32703
Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.011, and 21.0.3, there was a lack of ratelimiting on the shareinfo endpoint. This may have allowed an attacker to enumerate potentially valid share tokens. The issue was fixed in versions 19.0.13, 20.0.11, and 21.0.3. There are no known workarounds.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-375p-cxxq-gc9p
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-375p-cxxq-gc9p
- https://github.com/nextcloud/server/pull/26945
- https://github.com/nextcloud/server/pull/26945
- https://hackerone.com/reports/1173684
- https://hackerone.com/reports/1173684
- FEDORA-2021-6f327296fe
- FEDORA-2021-6f327296fe
- FEDORA-2021-9b421b78af
- FEDORA-2021-9b421b78af
- GLSA-202208-17
- GLSA-202208-17
Modified: 2024-11-21
CVE-2021-32705
Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.011, and 21.0.3, there was a lack of ratelimiting on the public DAV endpoint. This may have allowed an attacker to enumerate potentially valid share tokens or credentials. The issue was fixed in versions 19.0.13, 20.0.11, and 21.0.3. There are no known workarounds.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-fjv7-283f-5m54
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-fjv7-283f-5m54
- https://github.com/nextcloud/server/pull/27610
- https://github.com/nextcloud/server/pull/27610
- https://hackerone.com/reports/1192159
- https://hackerone.com/reports/1192159
- FEDORA-2021-6f327296fe
- FEDORA-2021-6f327296fe
- FEDORA-2021-9b421b78af
- FEDORA-2021-9b421b78af
- GLSA-202208-17
- GLSA-202208-17
Modified: 2024-11-21
CVE-2021-32725
Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.011, and 21.0.3, default share permissions were not being respected for federated reshares of files and folders. The issue was fixed in versions 19.0.13, 20.0.11, and 21.0.3. There are no known workarounds.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6f6v-h9x9-jj4v
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6f6v-h9x9-jj4v
- https://github.com/nextcloud/server/pull/26946
- https://github.com/nextcloud/server/pull/26946
- https://hackerone.com/reports/1178320
- https://hackerone.com/reports/1178320
- GLSA-202208-17
- GLSA-202208-17
Modified: 2024-11-21
CVE-2021-32726
Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.011, and 21.0.3, webauthn tokens were not deleted after a user has been deleted. If a victim reused an earlier used username, the previous user could gain access to their account. The issue was fixed in versions 19.0.13, 20.0.11, and 21.0.3. There are no known workarounds.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6qr9-c846-j8mg
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6qr9-c846-j8mg
- https://github.com/nextcloud/server/pull/27532
- https://github.com/nextcloud/server/pull/27532
- https://hackerone.com/reports/1202590
- https://hackerone.com/reports/1202590
- GLSA-202208-17
- GLSA-202208-17
Modified: 2024-11-21
CVE-2021-32733
Nextcloud Text is a collaborative document editing application that uses Markdown. A cross-site scripting vulnerability is present in versions prior to 19.0.13, 20.0.11, and 21.0.3. The Nextcloud Text application shipped with Nextcloud server used a `text/html` Content-Type when serving files to users. Due the strict Content-Security-Policy shipped with Nextcloud, this issue is not exploitable on modern browsers supporting Content-Security-Policy. The issue was fixed in versions 19.0.13, 20.0.11, and 21.0.3. As a workaround, use a browser that has support for Content-Security-Policy.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-x4w3-jhcr-57pq
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-x4w3-jhcr-57pq
- https://github.com/nextcloud/text/pull/1689
- https://github.com/nextcloud/text/pull/1689
- https://hackerone.com/reports/1241460
- https://hackerone.com/reports/1241460
Modified: 2024-11-21
CVE-2021-32734
Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.011, and 21.0.3, the Nextcloud Text application shipped with Nextcloud Server returned verbatim exception messages to the user. This could result in a full path disclosure on shared files. The issue was fixed in versions 19.0.13, 20.0.11, and 21.0.3. As a workaround, one may disable the Nextcloud Text application in Nextcloud Server app settings.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6hf5-c2c4-2526
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6hf5-c2c4-2526
- https://github.com/nextcloud/text/pull/1695
- https://github.com/nextcloud/text/pull/1695
- https://hackerone.com/reports/1246721
- https://hackerone.com/reports/1246721
- GLSA-202208-17
- GLSA-202208-17
Modified: 2024-11-21
CVE-2021-32741
Nextcloud Server is a Nextcloud package that handles data storage. In versions prior to 19.0.13, 20.011, and 21.0.3, there was a lack of ratelimiting on the public share link mount endpoint. This may have allowed an attacker to enumerate potentially valid share tokens. The issue was fixed in versions 19.0.13, 20.0.11, and 21.0.3. There are no known workarounds.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-crvj-vmf7-xrvr
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-crvj-vmf7-xrvr
- https://github.com/nextcloud/server/pull/26958
- https://github.com/nextcloud/server/pull/26958
- https://hackerone.com/reports/1192144
- https://hackerone.com/reports/1192144
Modified: 2024-11-21
CVE-2021-32766
Nextcloud Text is an open source plaintext editing application which ships with the nextcloud server. In affected versions the Nextcloud Text application returned different error messages depending on whether a folder existed in a public link share. This is problematic in case the public link share has been created with "Upload Only" privileges. (aka "File Drop"). A link share recipient is not expected to see which folders or files exist in a "File Drop" share. Using this vulnerability an attacker is able to enumerate folders in such a share. Exploitation requires that the attacker has access to a valid affected "File Drop" link share. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.0.1. Users who are unable to upgrade are advised to disable the Nextcloud Text application in the app settings.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gcf3-3wmc-88jr
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gcf3-3wmc-88jr
- https://github.com/nextcloud/text/pull/1716
- https://github.com/nextcloud/text/pull/1716
- https://hackerone.com/reports/1253475
- https://hackerone.com/reports/1253475
Modified: 2024-11-21
CVE-2021-32800
Nextcloud server is an open source, self hosted personal cloud. In affected versions an attacker is able to bypass Two Factor Authentication in Nextcloud. Thus knowledge of a password, or access to a WebAuthN trusted device of a user was sufficient to gain access to an account. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. There are no workaround for this vulnerability.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gv5w-8q25-785v
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-gv5w-8q25-785v
- https://github.com/nextcloud/server/pull/28078
- https://github.com/nextcloud/server/pull/28078
- https://hackerone.com/reports/1271052
- https://hackerone.com/reports/1271052
- GLSA-202208-17
- GLSA-202208-17
Modified: 2024-11-21
CVE-2021-32801
Nextcloud server is an open source, self hosted personal cloud. In affected versions logging of exceptions may have resulted in logging potentially sensitive key material for the Nextcloud Encryption-at-Rest functionality. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. If upgrading is not an option users are advised to disable system logging to resolve this issue until such time that an upgrade can be performed Note that ff you do not use the Encryption-at-Rest functionality of Nextcloud you are not affected by this bug.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-mcpf-v65v-359h
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-mcpf-v65v-359h
- https://github.com/nextcloud/server/pull/28082
- https://github.com/nextcloud/server/pull/28082
- https://hackerone.com/reports/1251776
- https://hackerone.com/reports/1251776
- GLSA-202208-17
- GLSA-202208-17
Modified: 2024-11-21
CVE-2021-32802
Nextcloud server is an open source, self hosted personal cloud. Nextcloud supports rendering image previews for user provided file content. For some image types, the Nextcloud server was invoking a third-party library that wasn't suited for untrusted user-supplied content. There are several security concerns with passing user-generated content to this library, such as Server-Side-Request-Forgery, file disclosure or potentially executing code on the system. The risk depends on your system configuration and the installed library version. It is recommended that the Nextcloud Server is upgraded to 20.0.12, 21.0.4 or 22.1.0. These versions do not use this library anymore. As a workaround users may disable previews by setting `enable_previews` to `false` in `config.php`.
- https://docs.nextcloud.com/server/21/admin_manual/configuration_files/previews_configuration.html#disabling-previews
- https://docs.nextcloud.com/server/21/admin_manual/configuration_files/previews_configuration.html#disabling-previews
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-m682-v4g9-wrq7
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-m682-v4g9-wrq7
- https://hackerone.com/reports/1261413
- https://hackerone.com/reports/1261413
- GLSA-202208-17
- GLSA-202208-17
Modified: 2024-11-21
CVE-2021-41177
Nextcloud is an open-source, self-hosted productivity platform. Prior to versions 20.0.13, 21.0.5, and 22.2.0, Nextcloud Server did not implement a database backend for rate-limiting purposes. Any component of Nextcloud using rate-limits (as as `AnonRateThrottle` or `UserRateThrottle`) was thus not rate limited on instances not having a memory cache backend configured. In the case of a default installation, this would notably include the rate-limits on the two factor codes. It is recommended that the Nextcloud Server be upgraded to 20.0.13, 21.0.5, or 22.2.0. As a workaround, enable a memory cache backend in `config.php`.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-fj39-4qx4-m3f2
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-fj39-4qx4-m3f2
- https://github.com/nextcloud/server/pull/28728
- https://github.com/nextcloud/server/pull/28728
- https://hackerone.com/reports/1265709
- https://hackerone.com/reports/1265709
- GLSA-202208-17
- GLSA-202208-17
Closed bugs
Нет maintenance:install (нужно для Альт Образование 10.0)
Closed vulnerabilities
BDU:2022-01682
Уязвимость библиотеки для управления метаданными медиафайлов Exiv2, связанная с недостатком использования функции assert(), позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-01776
Уязвимость библиотеки для управления метаданными медиафайлов Exiv2, связанная с отсутствием проверки деления на ноль, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-01777
Уязвимость библиотеки для управления метаданными медиафайлов Exiv2, связанная с выполнением цикла с недоступным условием выхода, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-01671
Уязвимость команд библиотеки для управления метаданными медиафайлов Exiv2, связанная с выполнением цикла с недоступным условием выхода, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-01673
Уязвимость команд библиотеки для управления метаданными медиафайлов Exiv2, связанная с выполнением цикла с недоступным условием выхода, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-01704
Уязвимость библиотеки для управления метаданными медиафайлов Exiv2, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-32815
Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. The assertion failure is triggered when Exiv2 is used to modify the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when modifying the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as `fi`. ### Patches The bug is fixed in version v0.27.5. ### References Regression test and bug fix: #1739 ### For more information Please see our [security policy](https://github.com/Exiv2/exiv2/security/policy) for information about Exiv2 security.
- https://github.com/Exiv2/exiv2/pull/1739
- https://github.com/Exiv2/exiv2/pull/1739
- https://github.com/Exiv2/exiv2/security/advisories/GHSA-mv9g-fxh2-m49m
- https://github.com/Exiv2/exiv2/security/advisories/GHSA-mv9g-fxh2-m49m
- [debian-lts-announce] 20230110 [SECURITY] [DLA 3265-1] exiv2 security update
- [debian-lts-announce] 20230110 [SECURITY] [DLA 3265-1] exiv2 security update
- FEDORA-2021-399f869889
- FEDORA-2021-399f869889
- FEDORA-2021-cbaef8e2d5
- FEDORA-2021-cbaef8e2d5
- GLSA-202312-06
- GLSA-202312-06
Modified: 2024-11-21
CVE-2021-34334
Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An infinite loop is triggered when Exiv2 is used to read the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. The bug is fixed in version v0.27.5.
- https://github.com/Exiv2/exiv2/pull/1766
- https://github.com/Exiv2/exiv2/pull/1766
- https://github.com/Exiv2/exiv2/security/advisories/GHSA-hqjh-hpv8-8r9p
- https://github.com/Exiv2/exiv2/security/advisories/GHSA-hqjh-hpv8-8r9p
- [debian-lts-announce] 20230110 [SECURITY] [DLA 3265-1] exiv2 security update
- [debian-lts-announce] 20230110 [SECURITY] [DLA 3265-1] exiv2 security update
- FEDORA-2021-399f869889
- FEDORA-2021-399f869889
- FEDORA-2021-cbaef8e2d5
- FEDORA-2021-cbaef8e2d5
- GLSA-202312-06
- GLSA-202312-06
Modified: 2024-11-21
CVE-2021-34335
Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. A floating point exception (FPE) due to an integer divide by zero was found in Exiv2 versions v0.27.4 and earlier. The FPE is triggered when Exiv2 is used to print the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when printing the interpreted (translated) data, which is a less frequently used Exiv2 operation that requires an extra command line option (`-p t` or `-P t`). The bug is fixed in version v0.27.5.
- https://github.com/Exiv2/exiv2/pull/1750
- https://github.com/Exiv2/exiv2/pull/1750
- https://github.com/Exiv2/exiv2/security/advisories/GHSA-pvjp-m4f6-q984
- https://github.com/Exiv2/exiv2/security/advisories/GHSA-pvjp-m4f6-q984
- FEDORA-2021-399f869889
- FEDORA-2021-399f869889
- FEDORA-2021-cbaef8e2d5
- FEDORA-2021-cbaef8e2d5
- GLSA-202312-06
- GLSA-202312-06
Modified: 2024-11-21
CVE-2021-37615
Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. A null pointer dereference was found in Exiv2 versions v0.27.4 and earlier. The null pointer dereference is triggered when Exiv2 is used to print the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when printing the interpreted (translated) data, which is a less frequently used Exiv2 operation that requires an extra command line option (`-p t` or `-P t`). The bug is fixed in version v0.27.5.
- https://github.com/Exiv2/exiv2/pull/1758
- https://github.com/Exiv2/exiv2/pull/1758
- https://github.com/Exiv2/exiv2/security/advisories/GHSA-h9x9-4f77-336w
- https://github.com/Exiv2/exiv2/security/advisories/GHSA-h9x9-4f77-336w
- FEDORA-2021-399f869889
- FEDORA-2021-399f869889
- FEDORA-2021-cbaef8e2d5
- FEDORA-2021-cbaef8e2d5
- GLSA-202312-06
- GLSA-202312-06
Modified: 2024-11-21
CVE-2021-37616
Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. A null pointer dereference was found in Exiv2 versions v0.27.4 and earlier. The null pointer dereference is triggered when Exiv2 is used to print the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when printing the interpreted (translated) data, which is a less frequently used Exiv2 operation that requires an extra command line option (`-p t` or `-P t`). The bug is fixed in version v0.27.5.
- https://github.com/Exiv2/exiv2/pull/1758
- https://github.com/Exiv2/exiv2/pull/1758
- https://github.com/Exiv2/exiv2/security/advisories/GHSA-54f7-vvj7-545w
- https://github.com/Exiv2/exiv2/security/advisories/GHSA-54f7-vvj7-545w
- FEDORA-2021-399f869889
- FEDORA-2021-399f869889
- FEDORA-2021-cbaef8e2d5
- FEDORA-2021-cbaef8e2d5
- GLSA-202312-06
- GLSA-202312-06
Modified: 2024-11-21
CVE-2021-37618
Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.4 and earlier. The out-of-bounds read is triggered when Exiv2 is used to print the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when printing the image ICC profile, which is a less frequently used Exiv2 operation that requires an extra command line option (`-p C`). The bug is fixed in version v0.27.5.
- https://github.com/Exiv2/exiv2/pull/1759
- https://github.com/Exiv2/exiv2/pull/1759
- https://github.com/Exiv2/exiv2/security/advisories/GHSA-583f-w9pm-99r2
- https://github.com/Exiv2/exiv2/security/advisories/GHSA-583f-w9pm-99r2
- FEDORA-2021-399f869889
- FEDORA-2021-399f869889
- FEDORA-2021-cbaef8e2d5
- FEDORA-2021-cbaef8e2d5
- GLSA-202312-06
- GLSA-202312-06
Modified: 2024-11-21
CVE-2021-37619
Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.4 and earlier. The out-of-bounds read is triggered when Exiv2 is used to write metadata into a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service by crashing Exiv2, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when writing the metadata, which is a less frequently used Exiv2 operation than reading the metadata. For example, to trigger the bug in the Exiv2 command-line application, you need to add an extra command-line argument such as insert. The bug is fixed in version v0.27.5.
- https://github.com/Exiv2/exiv2/pull/1752
- https://github.com/Exiv2/exiv2/pull/1752
- https://github.com/Exiv2/exiv2/security/advisories/GHSA-mxw9-qx4c-6m8v
- https://github.com/Exiv2/exiv2/security/advisories/GHSA-mxw9-qx4c-6m8v
- FEDORA-2021-399f869889
- FEDORA-2021-399f869889
- FEDORA-2021-cbaef8e2d5
- FEDORA-2021-cbaef8e2d5
- GLSA-202312-06
- GLSA-202312-06
Modified: 2024-11-21
CVE-2021-37620
Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An out-of-bounds read was found in Exiv2 versions v0.27.4 and earlier. The out-of-bounds read is triggered when Exiv2 is used to read the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. The bug is fixed in version v0.27.5.
- https://github.com/Exiv2/exiv2/pull/1769
- https://github.com/Exiv2/exiv2/pull/1769
- https://github.com/Exiv2/exiv2/security/advisories/GHSA-v5g7-46xf-h728
- https://github.com/Exiv2/exiv2/security/advisories/GHSA-v5g7-46xf-h728
- [debian-lts-announce] 20230110 [SECURITY] [DLA 3265-1] exiv2 security update
- [debian-lts-announce] 20230110 [SECURITY] [DLA 3265-1] exiv2 security update
- FEDORA-2021-399f869889
- FEDORA-2021-399f869889
- FEDORA-2021-cbaef8e2d5
- FEDORA-2021-cbaef8e2d5
- GLSA-202312-06
- GLSA-202312-06
Modified: 2024-11-21
CVE-2021-37621
Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An infinite loop was found in Exiv2 versions v0.27.4 and earlier. The infinite loop is triggered when Exiv2 is used to print the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when printing the image ICC profile, which is a less frequently used Exiv2 operation that requires an extra command line option (`-p C`). The bug is fixed in version v0.27.5.
- https://github.com/Exiv2/exiv2/pull/1778
- https://github.com/Exiv2/exiv2/pull/1778
- https://github.com/Exiv2/exiv2/security/advisories/GHSA-m479-7frc-gqqg
- https://github.com/Exiv2/exiv2/security/advisories/GHSA-m479-7frc-gqqg
- [debian-lts-announce] 20230110 [SECURITY] [DLA 3265-1] exiv2 security update
- [debian-lts-announce] 20230110 [SECURITY] [DLA 3265-1] exiv2 security update
- FEDORA-2021-399f869889
- FEDORA-2021-399f869889
- FEDORA-2021-cbaef8e2d5
- FEDORA-2021-cbaef8e2d5
- GLSA-202312-06
- GLSA-202312-06
Modified: 2024-11-21
CVE-2021-37622
Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An infinite loop was found in Exiv2 versions v0.27.4 and earlier. The infinite loop is triggered when Exiv2 is used to modify the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when deleting the IPTC data, which is a less frequently used Exiv2 operation that requires an extra command line option (`-d I rm`). The bug is fixed in version v0.27.5.
- https://github.com/Exiv2/exiv2/pull/1788
- https://github.com/Exiv2/exiv2/pull/1788
- https://github.com/Exiv2/exiv2/security/advisories/GHSA-9jh3-fcc3-g6hv
- https://github.com/Exiv2/exiv2/security/advisories/GHSA-9jh3-fcc3-g6hv
- [debian-lts-announce] 20230110 [SECURITY] [DLA 3265-1] exiv2 security update
- [debian-lts-announce] 20230110 [SECURITY] [DLA 3265-1] exiv2 security update
- FEDORA-2021-399f869889
- FEDORA-2021-399f869889
- FEDORA-2021-cbaef8e2d5
- FEDORA-2021-cbaef8e2d5
- GLSA-202312-06
- GLSA-202312-06
Modified: 2024-11-21
CVE-2021-37623
Exiv2 is a command-line utility and C++ library for reading, writing, deleting, and modifying the metadata of image files. An infinite loop was found in Exiv2 versions v0.27.4 and earlier. The infinite loop is triggered when Exiv2 is used to modify the metadata of a crafted image file. An attacker could potentially exploit the vulnerability to cause a denial of service, if they can trick the victim into running Exiv2 on a crafted image file. Note that this bug is only triggered when deleting the IPTC data, which is a less frequently used Exiv2 operation that requires an extra command line option (`-d I rm`). The bug is fixed in version v0.27.5.
- https://github.com/Exiv2/exiv2/pull/1790
- https://github.com/Exiv2/exiv2/pull/1790
- https://github.com/Exiv2/exiv2/security/advisories/GHSA-mvc4-g5pv-4qqq
- https://github.com/Exiv2/exiv2/security/advisories/GHSA-mvc4-g5pv-4qqq
- FEDORA-2021-399f869889
- FEDORA-2021-399f869889
- FEDORA-2021-cbaef8e2d5
- FEDORA-2021-cbaef8e2d5
- GLSA-202312-06
- GLSA-202312-06