ALT-BU-2024-10674-1
Branch c10f2 update bulletin.
Closed bugs
Ошибка сегментирования при запуске mpv
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-3578
A flaw was found in mbsync before v1.3.6 and v1.4.2, where an unchecked pointer cast allows a malicious or compromised server to write an arbitrary integer value past the end of a heap-allocated structure by issuing an unexpected APPENDUID response. This could be plausibly exploited for remote code execution on the client.
- [oss-security] 20210607 CVE-2021-3578: possible remote code execution in isync/mbsync
- [oss-security] 20210607 CVE-2021-3578: possible remote code execution in isync/mbsync
- https://bugzilla.redhat.com/show_bug.cgi?id=1961710
- https://bugzilla.redhat.com/show_bug.cgi?id=1961710
- https://bugzilla.redhat.com/show_bug.cgi?id=1967397
- https://bugzilla.redhat.com/show_bug.cgi?id=1967397
- https://github.blog/2021-06-10-privilege-escalation-polkit-root-on-linux-with-bug/
- https://github.blog/2021-06-10-privilege-escalation-polkit-root-on-linux-with-bug/
- [debian-lts-announce] 20220701 [SECURITY] [DLA 3066-1] isync security update
- [debian-lts-announce] 20220701 [SECURITY] [DLA 3066-1] isync security update
- FEDORA-2021-754af4d52b
- FEDORA-2021-754af4d52b
- FEDORA-2021-f236f9f01a
- FEDORA-2021-f236f9f01a
- GLSA-202208-15
- GLSA-202208-15
- https://www.openwall.com/lists/oss-security/2021/06/07/1
- https://www.openwall.com/lists/oss-security/2021/06/07/1
Modified: 2024-11-21
CVE-2021-44143
A flaw was found in mbsync in isync 1.4.0 through 1.4.3. Due to an unchecked condition, a malicious or compromised IMAP server could use a crafted mail message that lacks headers (i.e., one that starts with an empty line) to provoke a heap overflow, which could conceivably be exploited for remote code execution.
- [oss-security] 20211203 CVE-2021-44143: heap overflow in isync/mbsync
- [oss-security] 20211203 CVE-2021-44143: heap overflow in isync/mbsync
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=999804
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=999804
- FEDORA-2021-577129851b
- FEDORA-2021-577129851b
- FEDORA-2021-b7fdb7e69a
- FEDORA-2021-b7fdb7e69a
- GLSA-202208-15
- GLSA-202208-15
- https://sourceforge.net/p/isync/isync/commit_browser
- https://sourceforge.net/p/isync/isync/commit_browser
- https://sourceforge.net/p/isync/isync/ref/master/tags/
- https://sourceforge.net/p/isync/isync/ref/master/tags/
Closed vulnerabilities
BDU:2023-05006
Уязвимость компонентов /libyasm/intnum.c и /elf/elf.c ассемблера Yasm, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-33454
An issue was discovered in yasm version 1.3.0. There is a NULL pointer dereference in yasm_expr_get_intnum() in libyasm/expr.c.
Modified: 2025-01-29
CVE-2023-31975
yasm v1.3.0 was discovered to contain a memory leak via the function yasm_intnum_copy at /libyasm/intnum.c. Note: Multiple third parties dispute this as a bug and not a vulnerability according to the YASM security policy.
- [oss-security] 20230620 CVE-2023-31975: memory leak in yasm
- [oss-security] 20230620 CVE-2023-31975: memory leak in yasm
- [oss-security] 20230621 Re: CVE-2023-31975: memory leak in yasm
- [oss-security] 20230621 Re: CVE-2023-31975: memory leak in yasm
- [oss-security] 20230621 Re: CVE-2023-31975: memory leak in yasm
- [oss-security] 20230621 Re: CVE-2023-31975: memory leak in yasm
- [oss-security] 20230621 Re: CVE-2023-31975: memory leak in yasm
- [oss-security] 20230621 Re: CVE-2023-31975: memory leak in yasm
- [oss-security] 20230622 Re: CVE-2023-31975: memory leak in yasm
- [oss-security] 20230622 Re: CVE-2023-31975: memory leak in yasm
- [oss-security] 20230621 Re: CVE-2023-31975: memory leak in yasm
- [oss-security] 20230621 Re: CVE-2023-31975: memory leak in yasm
- [oss-security] 20230621 Re: CVE-2023-31975: memory leak in yasm
- [oss-security] 20230621 Re: CVE-2023-31975: memory leak in yasm
- [oss-security] 20230621 Re: CVE-2023-31975: memory leak in yasm
- [oss-security] 20230621 Re: CVE-2023-31975: memory leak in yasm
- [oss-security] 20230621 Re: CVE-2023-31975: memory leak in yasm
- [oss-security] 20230621 Re: CVE-2023-31975: memory leak in yasm
- [oss-security] 20230621 Re: CVE-2023-31975: memory leak in yasm
- [oss-security] 20230621 Re: CVE-2023-31975: memory leak in yasm
- [oss-security] 20230622 Re: CVE-2023-31975: memory leak in yasm
- [oss-security] 20230622 Re: CVE-2023-31975: memory leak in yasm
- [oss-security] 20230623 Re: CVE-2023-31975: memory leak in yasm
- [oss-security] 20230623 Re: CVE-2023-31975: memory leak in yasm
- [oss-security] 20230623 Re: CVE-2023-31975: memory leak in yasm
- [oss-security] 20230623 Re: CVE-2023-31975: memory leak in yasm
- [oss-security] 20230623 Re: CVE-2023-31975: memory leak in yasm
- [oss-security] 20230623 Re: CVE-2023-31975: memory leak in yasm
- [oss-security] 20230623 Re: CVE-2023-31975: memory leak in yasm
- [oss-security] 20230623 Re: CVE-2023-31975: memory leak in yasm
- [oss-security] 20230623 Re: CVE-2023-31975: memory leak in yasm
- [oss-security] 20230623 Re: CVE-2023-31975: memory leak in yasm
- [oss-security] 20230624 Re: CVE-2023-31975: memory leak in yasm
- [oss-security] 20230624 Re: CVE-2023-31975: memory leak in yasm
- https://github.com/yasm/yasm/issues/210
- https://github.com/yasm/yasm/issues/210
Modified: 2024-11-21
CVE-2023-37732
Yasm v1.3.0.78 was found prone to NULL Pointer Dereference in /libyasm/intnum.c and /elf/elf.c, which allows the attacker to cause a denial of service via a crafted file.
Closed vulnerabilities
BDU:2022-05310
Уязвимость функции JBIG2Stream::readTextRegionSeg() (JBIG2Stream.cc) программного обеспечения для просмотра PDF Xpdf, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2024-01225
Уязвимость функции XRef::fetch (XRef.cc) программного обеспечения для просмотра PDF Xpdf, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-01226
Уязвимость функции AcroForm::scanField программного обеспечения для просмотра PDF Xpdf, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-01305
Уязвимость функции XRef::fetch() программного обеспечения для просмотра PDF Xpdf, позволяющая нарушителю вызвать аварийное завершение работы приложения
BDU:2024-02274
Уязвимость компонент /xpdf/AcroForm.cc:538 программного обеспечения для просмотра PDF Xpdf, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-16369
XRef::fetch in XRef.cc in Xpdf 4.00 allows remote attackers to cause a denial of service (stack consumption) via a crafted pdf file, related to AcroForm::scanField, as demonstrated by pdftohtml. NOTE: this might overlap CVE-2018-7453.
Modified: 2024-11-21
CVE-2018-7453
Infinite recursion in AcroForm::scanField in AcroForm.cc in xpdf 4.00 allows attackers to launch denial of service via a specific pdf file due to lack of loop checking, as demonstrated by pdftohtml.
Modified: 2024-11-21
CVE-2019-16088
Xpdf 3.04 has a SIGSEGV in XRef::fetch in XRef.cc after many recursive calls to Catalog::countPageTree in Catalog.cc.
Modified: 2024-11-21
CVE-2019-9587
There is a stack consumption issue in md5Round1() located in Decrypt.cc in Xpdf 4.01. It can be triggered by sending a crafted pdf file to (for example) the pdfimages binary. It allows an attacker to cause Denial of Service (Segmentation fault) or possibly have unspecified other impact. This is related to Catalog::countPageTree.
- https://forum.xpdfreader.com/viewtopic.php?f=3&t=41263
- https://research.loginsoft.com/bugs/stack-based-buffer-overflow-vulnerability-in-function-md5round1-xpdf-4-01/
- https://forum.xpdfreader.com/viewtopic.php?f=3&t=41263
- https://research.loginsoft.com/bugs/stack-based-buffer-overflow-vulnerability-in-function-md5round1-xpdf-4-01/
Modified: 2024-11-21
CVE-2019-9588
There is an Invalid memory access in gAtomicIncrement() located at GMutex.h in Xpdf 4.01. It can be triggered by sending a crafted pdf file to (for example) the pdftops binary. It allows an attacker to cause Denial of Service (Segmentation fault) or possibly have unspecified other impact.
- https://forum.xpdfreader.com/viewtopic.php?f=3&t=41261
- https://research.loginsoft.com/bugs/invalid-memory-access-in-gatomiccounter-gatomicincrement-xpdf-4-01/
- https://forum.xpdfreader.com/viewtopic.php?f=3&t=41261
- https://research.loginsoft.com/bugs/invalid-memory-access-in-gatomiccounter-gatomicincrement-xpdf-4-01/
Modified: 2024-11-21
CVE-2022-30524
There is an invalid memory access in the TextLine class in TextOutputDev.cc in Xpdf 4.0.4 because the text extractor mishandles characters at large y coordinates. It can be triggered by (for example) sending a crafted pdf file to the pdftotext binary, which allows a remote attacker to cause a Denial of Service (Segmentation fault) or possibly have unspecified other impact.
Modified: 2024-11-21
CVE-2022-30775
xpdf 4.04 allocates excessive memory when presented with crafted input. This can be triggered by (for example) sending a crafted PDF document to the pdftoppm binary. It is most easily reproduced with the DCMAKE_CXX_COMPILER=afl-clang-fast++ option.
Modified: 2024-11-21
CVE-2022-33108
XPDF v4.04 was discovered to contain a stack overflow vulnerability via the Object::Copy class of object.cc files.
- https://forum.xpdfreader.com/viewtopic.php?f=3&t=42284
- https://forum.xpdfreader.com/viewtopic.php?f=3&t=42284
- https://forum.xpdfreader.com/viewtopic.php?f=3&t=42286
- https://forum.xpdfreader.com/viewtopic.php?f=3&t=42286
- https://forum.xpdfreader.com/viewtopic.php?f=3&t=42287
- https://forum.xpdfreader.com/viewtopic.php?f=3&t=42287
Modified: 2024-11-21
CVE-2022-36561
XPDF v4.0.4 was discovered to contain a segmentation violation via the component /xpdf/AcroForm.cc:538.
Modified: 2024-11-21
CVE-2022-38171
Xpdf prior to version 4.04 contains an integer overflow in the JBIG2 decoder (JBIG2Stream::readTextRegionSeg() in JBIG2Stream.cc). Processing a specially crafted PDF file or JBIG2 image could lead to a crash or the execution of arbitrary code. This is similar to the vulnerability described by CVE-2021-30860 (Apple CoreGraphics).
- [oss-security] 20220902 JBIG2 integer overflow fixed in Xpdf 4.04, Poppler 22.09.0
- http://www.xpdfreader.com/security-fixes.html
- https://dl.xpdfreader.com/xpdf-4.04.tar.gz
- https://github.com/jeffssh/CVE-2021-30860
- https://github.com/zmanion/Vulnerabilities/blob/main/CVE-2022-38171.md
- https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html
- https://www.cve.org/CVERecord?id=CVE-2021-30860
- [oss-security] 20220902 JBIG2 integer overflow fixed in Xpdf 4.04, Poppler 22.09.0
- https://www.cve.org/CVERecord?id=CVE-2021-30860
- https://googleprojectzero.blogspot.com/2021/12/a-deep-dive-into-nso-zero-click.html
- https://github.com/zmanion/Vulnerabilities/blob/main/CVE-2022-38171.md
- https://github.com/jeffssh/CVE-2021-30860
- https://dl.xpdfreader.com/xpdf-4.04.tar.gz
- http://www.xpdfreader.com/security-fixes.html
Modified: 2024-11-21
CVE-2022-38222
There is a use-after-free issue in JBIG2Stream::close() located in JBIG2Stream.cc in Xpdf 4.04. It can be triggered by sending a crafted PDF file to (for example) the pdfimages binary. It allows an attacker to cause Denial of Service or possibly have unspecified other impact.
Modified: 2024-11-21
CVE-2022-38334
XPDF v4.04 and earlier was discovered to contain a stack overflow via the function Catalog::countPageTree() at Catalog.cc.
Modified: 2024-11-21
CVE-2022-38928
XPDF 4.04 is vulnerable to Null Pointer Dereference in FoFiType1C.cc:2393.
Modified: 2024-11-21
CVE-2022-41842
An issue was discovered in Xpdf 4.04. There is a crash in gfseek(_IO_FILE*, long, int) in goo/gfile.cc.
Modified: 2024-11-21
CVE-2022-41843
An issue was discovered in Xpdf 4.04. There is a crash in convertToType0 in fofi/FoFiType1C.cc, a different vulnerability than CVE-2022-38928.
Modified: 2024-11-21
CVE-2022-41844
An issue was discovered in Xpdf 4.04. There is a crash in XRef::fetch(int, int, Object*, int) in xpdf/XRef.cc, a different vulnerability than CVE-2018-16369 and CVE-2019-16088.
- http://www.xpdfreader.com/download.html
- http://www.xpdfreader.com/download.html
- https://forum.xpdfreader.com/viewtopic.php?f=1&t=42340&p=43928&hilit=gfseek#p43928
- https://forum.xpdfreader.com/viewtopic.php?f=1&t=42340&p=43928&hilit=gfseek#p43928
- https://forum.xpdfreader.com/viewtopic.php?f=3&t=42308&p=43844&hilit=XRef%3A%3Afetch#p43844
- https://forum.xpdfreader.com/viewtopic.php?f=3&t=42308&p=43844&hilit=XRef%3A%3Afetch#p43844
Modified: 2024-11-21
CVE-2022-43071
A stack overflow in the Catalog::readPageLabelTree2(Object*) function of XPDF v4.04 allows attackers to cause a Denial of Service (DoS) via a crafted PDF file.
Modified: 2024-11-21
CVE-2022-43295
XPDF v4.04 was discovered to contain a stack overflow via the function FileStream::copy() at xpdf/Stream.cc:795.
Modified: 2025-03-19
CVE-2022-45586
Stack overflow vulnerability in function Dict::find in xpdf/Dict.cc in xpdf 4.04, allows local attackers to cause a denial of service.
Modified: 2025-03-19
CVE-2022-45587
Stack overflow vulnerability in function gmalloc in goo/gmem.cc in xpdf 4.04, allows local attackers to cause a denial of service.
Modified: 2025-01-24
CVE-2023-2662
In Xpdf 4.04 (and earlier), a bad color space object in the input PDF file can cause a divide-by-zero.
Modified: 2025-01-24
CVE-2023-2663
In Xpdf 4.04 (and earlier), a PDF object loop in the page label tree leads to infinite recursion and a stack overflow.
Modified: 2024-11-21
CVE-2023-2664
In Xpdf 4.04 (and earlier), a PDF object loop in the embedded file tree leads to infinite recursion and a stack overflow.
Modified: 2024-11-21
CVE-2023-26930
Buffer Overflow vulnerability found in XPDF v.4.04 allows an attacker to cause a Denial of Service via the PDFDoc malloc in the pdftotext.cc function. NOTE: Vendor states “it's an expected abort on out-of-memory error.”
Modified: 2024-11-21
CVE-2023-3044
An excessively large PDF page size (found in fuzz testing, unlikely in normal PDF files) can result in a divide-by-zero in Xpdf's text extraction code. This is related to CVE-2022-30524, but the problem here is caused by a very large page size, rather than by a very large character coordinate.
Modified: 2024-11-21
CVE-2023-3436
Xpdf 4.04 will deadlock on a PDF object stream whose "Length" field is itself in another object stream.
Closed bugs
исправить путь к шрифтам в xpdfrc
Не отображаются иконки в панели меню инструментов
Closed vulnerabilities
BDU:2023-02021
Уязвимость компонента mod_proxy_uwsgi веб-сервера Apache HTTP Server связанная с недостатками обработки HTTP-запросов, позволяющая нарушителю выполнять атаку "контрабанда HTTP-запросов"
Modified: 2025-02-13
CVE-2023-27522
HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55. Special characters in the origin response header can truncate/split the response forwarded to the client.
- https://httpd.apache.org/security/vulnerabilities_24.html
- https://httpd.apache.org/security/vulnerabilities_24.html
- https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html
- https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html
- https://security.gentoo.org/glsa/202309-01
- https://security.gentoo.org/glsa/202309-01
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-47022
An issue was discovered in open-mpi hwloc 2.1.0 allows attackers to cause a denial of service or other unspecified impacts via glibc-cpuset in topology-linux.c.
Closed bugs
Файловый конфликт при установке libvxl-devel
Closed bugs
xapp-sn-wathcer крашится после ПКМ по приложению в трее
Closed vulnerabilities
BDU:2023-09066
Уязвимость файла cookie zbx_session универсальной системы мониторинга Zabbix, позволяющая нарушителю повысить свои привилегии
BDU:2024-00033
Уязвимость функции icmpping универсальной системы мониторинга Zabbix, позволяющая нарушителю выполнить произвольный код
BDU:2024-00645
Уязвимость компонента DNS Response Handler агента универсальной системы мониторинга Zabbix, позволяющая нарушителю вызвать переполнение буфера
BDU:2024-02409
Уязвимость компонента smart.disk.get универсальной системы мониторинга Zabbix, позволяющая нарушителю выполнить произвольный код
BDU:2024-04280
Уязвимость универсальной системы мониторинга Zabbix, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю провести атаку межсайтового скриптинга (XSS)
Modified: 2024-11-21
CVE-2023-32725
The website configured in the URL widget will receive a session cookie when testing or executing scheduled reports. The received session cookie can then be used to access the frontend as the particular user.
Modified: 2024-11-21
CVE-2023-32726
The vulnerability is caused by improper check for check if RDLENGTH does not overflow the buffer in response from DNS server.
- https://lists.debian.org/debian-lts-announce/2024/01/msg00012.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BYSYLA7VTHR25CBLYO5ZLEJFGU7HTHQB/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UMFKNV5E4LG2DIZNPRWQ2ENH75H6UEQT/
- https://support.zabbix.com/browse/ZBX-23855
- https://lists.debian.org/debian-lts-announce/2024/01/msg00012.html
- https://support.zabbix.com/browse/ZBX-23855
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UMFKNV5E4LG2DIZNPRWQ2ENH75H6UEQT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BYSYLA7VTHR25CBLYO5ZLEJFGU7HTHQB/
Modified: 2024-11-21
CVE-2023-32727
An attacker who has the privilege to configure Zabbix items can use function icmpping() with additional malicious command inside it to execute arbitrary code on the current Zabbix server.
Modified: 2024-11-21
CVE-2023-32728
The Zabbix Agent 2 item key smart.disk.get does not sanitize its parameters before passing them to a shell command resulting possible vulnerability for remote code execution.
Modified: 2024-11-21
CVE-2024-22119
The cause of vulnerability is improper validation of form input field “Name” on Graph page in Items section.
Closed bugs
отсутствует зависимость на zabbix-phpfrontend-engine
Несколько неприятных CVE в Zabbix 6.0.22: CVE-2023-32728, CVE-2023-32727, CVE-2023-32726
Closed bugs
[FR] втащить апстримный коммит для поддержки e2k
Пожалуйста обновите до до версии 1.5.2
Во время сборки zstd на riscv64 не проходят некоторые тесты по таймау