ALT-BU-2021-4764-1
Branch sisyphus_riscv64 update bulletin.
Package libebml updated to version 1.4.2-alt2 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2021-05267
Уязвимость реализации EbmlString::ReadData и EbmlUnicodeString::ReadData библиотеки для анализа файлов EBML Libebml, связанная с записью за границами буфера, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-3405
A flaw was found in libebml before 1.4.2. A heap overflow bug exists in the implementation of EbmlString::ReadData and EbmlUnicodeString::ReadData in libebml.
- https://github.com/Matroska-Org/libebml/issues/74
- https://github.com/Matroska-Org/libebml/issues/74
- [debian-lts-announce] 20210418 [SECURITY] [DLA 2629-1] libebml security update
- [debian-lts-announce] 20210418 [SECURITY] [DLA 2629-1] libebml security update
- FEDORA-2021-aa78f97893
- FEDORA-2021-aa78f97893
- FEDORA-2021-e283997bb9
- FEDORA-2021-e283997bb9
- FEDORA-2021-9a0fff8455
- FEDORA-2021-9a0fff8455
- GLSA-202208-21
- GLSA-202208-21
Package gimp updated to version 2.10.30-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2022-02388
Уязвимость функции load_cache графического редактора GIMP, позволяющая нарушителю передавать специальные данные приложению и выполнять произвольные команды ОС в целевой системе
Modified: 2024-11-21
CVE-2021-45463
load_cache in GEGL before 0.4.34 allows shell expansion when a pathname in a constructed command line is not escaped or filtered. This is caused by use of the system library function for execution of the ImageMagick convert fallback in magick-load. NOTE: GEGL releases before 0.4.34 are used in GIMP releases before 2.10.30; however, this does not imply that GIMP builds enable the vulnerable feature.
- https://gitlab.gnome.org/GNOME/gegl/-/blob/master/docs/NEWS.adoc
- https://gitlab.gnome.org/GNOME/gegl/-/blob/master/docs/NEWS.adoc
- https://gitlab.gnome.org/GNOME/gegl/-/commit/bfce470f0f2f37968862129d5038b35429f2909b
- https://gitlab.gnome.org/GNOME/gegl/-/commit/bfce470f0f2f37968862129d5038b35429f2909b
- https://gitlab.gnome.org/GNOME/gegl/-/issues/298
- https://gitlab.gnome.org/GNOME/gegl/-/issues/298
- https://gitlab.gnome.org/GNOME/gimp/-/commit/e8a31ba4f2ce7e6bc34882dc27c97fba993f5868
- https://gitlab.gnome.org/GNOME/gimp/-/commit/e8a31ba4f2ce7e6bc34882dc27c97fba993f5868
- FEDORA-2022-a1c5b18362
- FEDORA-2022-a1c5b18362
- FEDORA-2022-5b5a738d7a
- FEDORA-2022-5b5a738d7a
- https://www.gimp.org/news/2021/12/21/gimp-2-10-30-released/
- https://www.gimp.org/news/2021/12/21/gimp-2-10-30-released/
Package libgegl updated to version 0.4.34-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2022-02388
Уязвимость функции load_cache графического редактора GIMP, позволяющая нарушителю передавать специальные данные приложению и выполнять произвольные команды ОС в целевой системе
Modified: 2024-11-21
CVE-2021-45463
load_cache in GEGL before 0.4.34 allows shell expansion when a pathname in a constructed command line is not escaped or filtered. This is caused by use of the system library function for execution of the ImageMagick convert fallback in magick-load. NOTE: GEGL releases before 0.4.34 are used in GIMP releases before 2.10.30; however, this does not imply that GIMP builds enable the vulnerable feature.
- https://gitlab.gnome.org/GNOME/gegl/-/blob/master/docs/NEWS.adoc
- https://gitlab.gnome.org/GNOME/gegl/-/blob/master/docs/NEWS.adoc
- https://gitlab.gnome.org/GNOME/gegl/-/commit/bfce470f0f2f37968862129d5038b35429f2909b
- https://gitlab.gnome.org/GNOME/gegl/-/commit/bfce470f0f2f37968862129d5038b35429f2909b
- https://gitlab.gnome.org/GNOME/gegl/-/issues/298
- https://gitlab.gnome.org/GNOME/gegl/-/issues/298
- https://gitlab.gnome.org/GNOME/gimp/-/commit/e8a31ba4f2ce7e6bc34882dc27c97fba993f5868
- https://gitlab.gnome.org/GNOME/gimp/-/commit/e8a31ba4f2ce7e6bc34882dc27c97fba993f5868
- FEDORA-2022-a1c5b18362
- FEDORA-2022-a1c5b18362
- FEDORA-2022-5b5a738d7a
- FEDORA-2022-5b5a738d7a
- https://www.gimp.org/news/2021/12/21/gimp-2-10-30-released/
- https://www.gimp.org/news/2021/12/21/gimp-2-10-30-released/