ALT-BU-2024-3939-2
Branch c9f2 update bulletin.
Closed vulnerabilities
BDU:2018-00509
Уязвимость функции read_gif программного обеспечения для просмотра GIF-файлов gifview пакета программ для создания, редактирования и оптимизации GIF-файлов Gifsicle, позволяющая нарушителю выполнить произвольный код
BDU:2022-02071
Уязвимость функции find_color_or_error пакета программ для создания, редактирования и оптимизации GIF-файлов Gifsicle, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2017-1000421
Gifsicle gifview 1.89 and older is vulnerable to a use-after-free in the read_gif function resulting potential code execution
Modified: 2024-11-21
CVE-2017-18120
A double-free bug in the read_gif function in gifread.c in gifsicle 1.90 allows a remote attacker to cause a denial-of-service attack or unspecified other impact via a maliciously crafted file, because last_name is mishandled, a different vulnerability than CVE-2017-1000421.
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878739
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=878739
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=881120
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=881120
- https://github.com/kohler/gifsicle/commit/118a46090c50829dc543179019e6140e1235f909
- https://github.com/kohler/gifsicle/commit/118a46090c50829dc543179019e6140e1235f909
- https://github.com/kohler/gifsicle/issues/117
- https://github.com/kohler/gifsicle/issues/117
Modified: 2024-11-21
CVE-2020-19752
The find_color_or_error function in gifsicle 1.92 contains a NULL pointer dereference.
Modified: 2024-11-21
CVE-2023-46009
gifsicle-1.94 was found to have a floating point exception (FPE) vulnerability via resize_stream at src/xform.c.
Closed vulnerabilities
Modified: 2024-12-17
CVE-2024-1931
NLnet Labs Unbound version 1.18.0 up to and including version 1.19.1 contain a vulnerability that can cause denial of service by a certain code path that can lead to an infinite loop. Unbound 1.18.0 introduced a feature that removes EDE records from responses with size higher than the client's advertised buffer size. Before removing all the EDE records however, it would try to see if trimming the extra text fields on those records would result in an acceptable size while still retaining the EDE codes. Due to an unchecked condition, the code that trims the text of the EDE records could loop indefinitely. This happens when Unbound would reply with attached EDE information on a positive reply and the client's buffer size is smaller than the needed space to include EDE records. The vulnerability can only be triggered when the 'ede: yes' option is used; non default configuration. From version 1.19.2 on, the code is fixed to avoid looping indefinitely.
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4VCBRQ7KMSIGBQ6A4SBL5PF326DIJIIV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4VCBRQ7KMSIGBQ6A4SBL5PF326DIJIIV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B2JUIFPA7H75Q2W3VXW2TUNHK6NVGOX4/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B2JUIFPA7H75Q2W3VXW2TUNHK6NVGOX4/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBR4H7RCVMJ6H76S4LLRSY5EBFTYWGXK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RBR4H7RCVMJ6H76S4LLRSY5EBFTYWGXK/
- https://lists.freebsd.org/archives/freebsd-security/2024-July/000283.html
- https://lists.freebsd.org/archives/freebsd-security/2024-July/000283.html
- https://security.netapp.com/advisory/ntap-20240705-0006/
- https://security.netapp.com/advisory/ntap-20240705-0006/
- https://www.nlnetlabs.nl/downloads/unbound/CVE-2024-1931.txt
- https://www.nlnetlabs.nl/downloads/unbound/CVE-2024-1931.txt
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-38795
In Gitea through 1.17.1, repo cloning can occur in the migration function.
Modified: 2024-11-21
CVE-2022-42968
Gitea before 1.17.3 does not sanitize and escape refs in the git backend. Arguments to git commands are mishandled.
Modified: 2024-11-21
CVE-2023-3515
Open Redirect in GitHub repository go-gitea/gitea prior to 1.19.4.
- https://github.com/go-gitea/gitea/commit/9aaaf980f0ba15611f30568bd67bce3ec12954e2
- https://github.com/go-gitea/gitea/commit/9aaaf980f0ba15611f30568bd67bce3ec12954e2
- https://huntr.dev/bounties/e335cd18-bc4d-4585-adb7-426c817ed053
- https://huntr.dev/bounties/e335cd18-bc4d-4585-adb7-426c817ed053
- https://security.gentoo.org/glsa/202312-13
- https://security.gentoo.org/glsa/202312-13