ALT-BU-2024-6171-2
Branch sisyphus update bulletin.
Closed bugs
nss собран без debuginfo
Package guile-evms updated to version 0.6.5-alt5 for branch sisyphus in task 344446.
Closed bugs
Расширение поддержки LVM (/boot LV внутри LVM, RAID LV)
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-27607
Bento4 1.6.0-639 has a heap-based buffer over-read in the AP4_HvccAtom class, a different issue than CVE-2018-14531.
Modified: 2024-11-21
CVE-2022-35165
An issue in AP4_SgpdAtom::AP4_SgpdAtom() of Bento4-1.6.0-639 allows attackers to cause a Denial of Service (DoS) via a crafted mp4 input.
Modified: 2024-11-21
CVE-2022-3662
A vulnerability was found in Axiomatic Bento4. It has been declared as critical. This vulnerability affects the function GetOffset of the file Ap4Sample.h of the component mp42hls. The manipulation leads to use after free. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-212002 is the identifier assigned to this vulnerability.
- https://github.com/axiomatic-systems/Bento4/files/9817606/mp42hls_cuaf_Ap4Sample99.zip
- https://github.com/axiomatic-systems/Bento4/files/9817606/mp42hls_cuaf_Ap4Sample99.zip
- https://github.com/axiomatic-systems/Bento4/issues/802
- https://github.com/axiomatic-systems/Bento4/issues/802
- https://vuldb.com/?id.212002
- https://vuldb.com/?id.212002
Modified: 2024-11-21
CVE-2022-3663
A vulnerability was found in Axiomatic Bento4. It has been rated as problematic. This issue affects the function AP4_StsdAtom of the file Ap4StsdAtom.cpp of the component MP4fragment. The manipulation leads to null pointer dereference. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-212003.
- https://github.com/axiomatic-systems/Bento4/files/9817303/mp4fragment_npd_Ap4StsdAtom.cpp75.zip
- https://github.com/axiomatic-systems/Bento4/files/9817303/mp4fragment_npd_Ap4StsdAtom.cpp75.zip
- https://github.com/axiomatic-systems/Bento4/issues/800
- https://github.com/axiomatic-systems/Bento4/issues/800
- https://vuldb.com/?id.212003
- https://vuldb.com/?id.212003
Modified: 2024-11-21
CVE-2022-3664
A vulnerability classified as critical has been found in Axiomatic Bento4. Affected is the function AP4_BitStream::WriteBytes of the file Ap4BitStream.cpp of the component avcinfo. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-212004.
- https://github.com/axiomatic-systems/Bento4/files/9746288/avcinfo_poc1.zip
- https://github.com/axiomatic-systems/Bento4/files/9746288/avcinfo_poc1.zip
- https://github.com/axiomatic-systems/Bento4/issues/794
- https://github.com/axiomatic-systems/Bento4/issues/794
- https://vuldb.com/?id.212004
- https://vuldb.com/?id.212004
Modified: 2024-11-21
CVE-2022-3665
A vulnerability classified as critical was found in Axiomatic Bento4. Affected by this vulnerability is an unknown functionality of the file AvcInfo.cpp of the component avcinfo. The manipulation leads to heap-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-212005 was assigned to this vulnerability.
- https://github.com/axiomatic-systems/Bento4/files/9746311/avcinfo_poc2.zip
- https://github.com/axiomatic-systems/Bento4/files/9746311/avcinfo_poc2.zip
- https://github.com/axiomatic-systems/Bento4/issues/794
- https://github.com/axiomatic-systems/Bento4/issues/794
- https://vuldb.com/?id.212005
- https://vuldb.com/?id.212005
Modified: 2024-11-21
CVE-2022-3666
A vulnerability, which was classified as critical, has been found in Axiomatic Bento4. Affected by this issue is the function AP4_LinearReader::Advance of the file Ap4LinearReader.cpp of the component mp42ts. The manipulation leads to use after free. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-212006 is the identifier assigned to this vulnerability.
- https://github.com/axiomatic-systems/Bento4/files/9744391/mp42ts_poc.zip
- https://github.com/axiomatic-systems/Bento4/files/9744391/mp42ts_poc.zip
- https://github.com/axiomatic-systems/Bento4/issues/793
- https://github.com/axiomatic-systems/Bento4/issues/793
- https://vuldb.com/?id.212006
- https://vuldb.com/?id.212006
Modified: 2024-11-21
CVE-2022-3667
A vulnerability, which was classified as critical, was found in Axiomatic Bento4. This affects the function AP4_MemoryByteStream::WritePartial of the file Ap4ByteStream.cpp of the component mp42aac. The manipulation leads to heap-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-212007.
- https://github.com/17ssDP/fuzzer_crashes/blob/main/Bento4/mp42aac-hbo-01
- https://github.com/17ssDP/fuzzer_crashes/blob/main/Bento4/mp42aac-hbo-01
- https://github.com/axiomatic-systems/Bento4/issues/789
- https://github.com/axiomatic-systems/Bento4/issues/789
- https://vuldb.com/?id.212007
- https://vuldb.com/?id.212007
Modified: 2024-11-21
CVE-2022-3668
A vulnerability has been found in Axiomatic Bento4 and classified as problematic. This vulnerability affects the function AP4_AtomFactory::CreateAtomFromStream of the component mp4edit. The manipulation leads to memory leak. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-212008.
- https://github.com/axiomatic-systems/Bento4/files/9640968/Bug_1_POC.zip
- https://github.com/axiomatic-systems/Bento4/files/9640968/Bug_1_POC.zip
- https://github.com/axiomatic-systems/Bento4/issues/776
- https://github.com/axiomatic-systems/Bento4/issues/776
- https://vuldb.com/?id.212008
- https://vuldb.com/?id.212008
Modified: 2024-11-21
CVE-2022-3669
A vulnerability was found in Axiomatic Bento4 and classified as problematic. This issue affects the function AP4_AvccAtom::Create of the component mp4edit. The manipulation leads to memory leak. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-212009 was assigned to this vulnerability.
- https://github.com/axiomatic-systems/Bento4/files/9675042/Bug_2_POC.zip
- https://github.com/axiomatic-systems/Bento4/files/9675042/Bug_2_POC.zip
- https://github.com/axiomatic-systems/Bento4/issues/776
- https://github.com/axiomatic-systems/Bento4/issues/776
- https://vuldb.com/?id.212009
- https://vuldb.com/?id.212009
Modified: 2024-11-21
CVE-2022-3670
A vulnerability was found in Axiomatic Bento4. It has been classified as critical. Affected is the function WriteSample of the component mp42hevc. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-212010 is the identifier assigned to this vulnerability.
- https://github.com/axiomatic-systems/Bento4/files/9675049/Bug_3_POC.zip
- https://github.com/axiomatic-systems/Bento4/files/9675049/Bug_3_POC.zip
- https://github.com/axiomatic-systems/Bento4/issues/776
- https://github.com/axiomatic-systems/Bento4/issues/776
- https://vuldb.com/?id.212010
- https://vuldb.com/?id.212010
Modified: 2024-11-21
CVE-2022-3784
A vulnerability classified as critical was found in Axiomatic Bento4 5e7bb34. Affected by this vulnerability is the function AP4_Mp4AudioDsiParser::ReadBits of the file Ap4Mp4AudioInfo.cpp of the component mp4hls. The manipulation leads to heap-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-212563.
- https://github.com/axiomatic-systems/Bento4/files/9849116/mp42hls_ReadBits_Ap4Mp4AudioInfo66.zip
- https://github.com/axiomatic-systems/Bento4/files/9849116/mp42hls_ReadBits_Ap4Mp4AudioInfo66.zip
- https://github.com/axiomatic-systems/Bento4/issues/806
- https://github.com/axiomatic-systems/Bento4/issues/806
- https://vuldb.com/?id.212563
- https://vuldb.com/?id.212563
Modified: 2024-11-21
CVE-2022-3785
A vulnerability, which was classified as critical, has been found in Axiomatic Bento4. Affected by this issue is the function AP4_DataBuffer::SetDataSize of the component Avcinfo. The manipulation leads to heap-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-212564.
- https://github.com/axiomatic-systems/Bento4/files/9658653/POC_avcinfo_15644345.zip
- https://github.com/axiomatic-systems/Bento4/files/9658653/POC_avcinfo_15644345.zip
- https://github.com/axiomatic-systems/Bento4/issues/780
- https://github.com/axiomatic-systems/Bento4/issues/780
- https://vuldb.com/?id.212564
- https://vuldb.com/?id.212564
Modified: 2024-11-21
CVE-2022-3809
A vulnerability was found in Axiomatic Bento4 and classified as problematic. Affected by this issue is the function ParseCommandLine of the file Mp4Tag/Mp4Tag.cpp of the component mp4tag. The manipulation leads to denial of service. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-212666 is the identifier assigned to this vulnerability.
- https://github.com/axiomatic-systems/Bento4/files/9653209/poc_Bento4.zip
- https://github.com/axiomatic-systems/Bento4/files/9653209/poc_Bento4.zip
- https://github.com/axiomatic-systems/Bento4/issues/779
- https://github.com/axiomatic-systems/Bento4/issues/779
- https://vuldb.com/?id.212666
- https://vuldb.com/?id.212666
Modified: 2024-11-21
CVE-2022-3810
A vulnerability was found in Axiomatic Bento4. It has been classified as problematic. This affects the function AP4_File::AP4_File of the file Mp42Hevc.cpp of the component mp42hevc. The manipulation leads to denial of service. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-212667.
- https://github.com/axiomatic-systems/Bento4/files/9653209/poc_Bento4.zip
- https://github.com/axiomatic-systems/Bento4/files/9653209/poc_Bento4.zip
- https://github.com/axiomatic-systems/Bento4/issues/779
- https://github.com/axiomatic-systems/Bento4/issues/779
- https://vuldb.com/?id.212667
- https://vuldb.com/?id.212667
Modified: 2024-11-21
CVE-2022-3812
A vulnerability was found in Axiomatic Bento4. It has been rated as problematic. Affected by this issue is the function AP4_ContainerAtom::AP4_ContainerAtom of the component mp4encrypt. The manipulation leads to memory leak. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-212678 is the identifier assigned to this vulnerability.
- https://github.com/axiomatic-systems/Bento4/files/9726934/POC_mp4encrypt_631000973.zip
- https://github.com/axiomatic-systems/Bento4/files/9726934/POC_mp4encrypt_631000973.zip
- https://github.com/axiomatic-systems/Bento4/issues/792
- https://github.com/axiomatic-systems/Bento4/issues/792
- https://vuldb.com/?id.212678
- https://vuldb.com/?id.212678
Modified: 2024-11-21
CVE-2022-3813
A vulnerability classified as problematic has been found in Axiomatic Bento4. This affects an unknown part of the component mp4edit. The manipulation leads to memory leak. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-212679.
- https://github.com/axiomatic-systems/Bento4/files/9726974/POC_mp4edit_728838793.zip
- https://github.com/axiomatic-systems/Bento4/files/9726974/POC_mp4edit_728838793.zip
- https://github.com/axiomatic-systems/Bento4/issues/792
- https://github.com/axiomatic-systems/Bento4/issues/792
- https://vuldb.com/?id.212679
- https://vuldb.com/?id.212679
Modified: 2024-11-21
CVE-2022-3814
A vulnerability classified as problematic was found in Axiomatic Bento4. This vulnerability affects unknown code of the component mp4decrypt. The manipulation leads to memory leak. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-212680.
- https://github.com/axiomatic-systems/Bento4/files/9727002/POC_mp4decrypt_477546304.zip
- https://github.com/axiomatic-systems/Bento4/files/9727002/POC_mp4decrypt_477546304.zip
- https://github.com/axiomatic-systems/Bento4/issues/792
- https://github.com/axiomatic-systems/Bento4/issues/792
- https://vuldb.com/?id.212680
- https://vuldb.com/?id.212680
Modified: 2024-11-21
CVE-2022-3815
A vulnerability, which was classified as problematic, has been found in Axiomatic Bento4. This issue affects some unknown processing of the component mp4decrypt. The manipulation leads to memory leak. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-212681 was assigned to this vulnerability.
- https://github.com/axiomatic-systems/Bento4/files/9727048/POC_mp4decrypt_34393864.zip
- https://github.com/axiomatic-systems/Bento4/files/9727048/POC_mp4decrypt_34393864.zip
- https://github.com/axiomatic-systems/Bento4/issues/792
- https://github.com/axiomatic-systems/Bento4/issues/792
- https://vuldb.com/?id.212681
- https://vuldb.com/?id.212681
Modified: 2024-11-21
CVE-2022-3816
A vulnerability, which was classified as problematic, was found in Axiomatic Bento4. Affected is an unknown function of the component mp4decrypt. The manipulation leads to memory leak. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-212682 is the identifier assigned to this vulnerability.
- https://github.com/axiomatic-systems/Bento4/files/9727059/POC_mp4decrypt_654515280.zip
- https://github.com/axiomatic-systems/Bento4/files/9727059/POC_mp4decrypt_654515280.zip
- https://github.com/axiomatic-systems/Bento4/issues/792
- https://github.com/axiomatic-systems/Bento4/issues/792
- https://vuldb.com/?id.212682
- https://vuldb.com/?id.212682
Modified: 2024-11-21
CVE-2022-3817
A vulnerability has been found in Axiomatic Bento4 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component mp4mux. The manipulation leads to memory leak. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-212683.
- https://github.com/axiomatic-systems/Bento4/files/9727057/POC_mp4mux_1729452038.zip
- https://github.com/axiomatic-systems/Bento4/files/9727057/POC_mp4mux_1729452038.zip
- https://github.com/axiomatic-systems/Bento4/issues/792
- https://github.com/axiomatic-systems/Bento4/issues/792
- https://vuldb.com/?id.212683
- https://vuldb.com/?id.212683
Modified: 2024-11-21
CVE-2022-40438
Buffer overflow vulnerability in function AP4_MemoryByteStream::WritePartial in mp42aac in Bento4 v1.6.0-639, allows attackers to cause a denial of service via a crafted file.
Modified: 2024-11-21
CVE-2022-40439
An memory leak issue was discovered in AP4_StdcFileByteStream::Create in mp42ts in Bento4 v1.6.0-639, allows attackers to cause a denial of service via a crafted file.
Modified: 2024-11-21
CVE-2022-40736
An issue was discovered in Bento4 1.6.0-639. There ie excessive memory consumption in AP4_CttsAtom::Create in Core/Ap4CttsAtom.cpp.
Modified: 2024-11-21
CVE-2022-40737
An issue was discovered in Bento4 through 1.6.0-639. A buffer over-read exists in the function AP4_StdcFileByteStream::WritePartial located in System/StdC/Ap4StdCFileByteStream.cpp, called from AP4_ByteStream::Write and AP4_HdlrAtom::WriteFields.
Modified: 2024-11-21
CVE-2022-40738
An issue was discovered in Bento4 through 1.6.0-639. A NULL pointer dereference occurs in AP4_DescriptorListWriter::Action in Core/Ap4Descriptor.h, called from AP4_EsDescriptor::WriteFields and AP4_Expandable::Write.
Modified: 2024-11-21
CVE-2022-40774
An issue was discovered in Bento4 through 1.6.0-639. There is a NULL pointer dereference in AP4_StszAtom::GetSampleSize.
Modified: 2024-11-21
CVE-2022-40775
An issue was discovered in Bento4 through 1.6.0-639. A NULL pointer dereference occurs in AP4_StszAtom::WriteFields.
Modified: 2024-11-21
CVE-2022-40885
Bento4 v1.6.0-639 has a memory allocation issue that can cause denial of service.
Modified: 2024-11-21
CVE-2022-41419
Bento4 v1.6.0-639 was discovered to contain a memory leak via the AP4_Processor::Process function in the mp4encrypt binary.
Modified: 2024-11-21
CVE-2022-41423
Bento4 v1.6.0-639 was discovered to contain a segmentation violation in the mp4fragment component.
Modified: 2024-11-21
CVE-2022-41424
Bento4 v1.6.0-639 was discovered to contain a memory leak via the AP4_SttsAtom::Create function in mp42hls.
Modified: 2024-11-21
CVE-2022-41425
Bento4 v1.6.0-639 was discovered to contain a segmentation violation via the AP4_Processor::ProcessFragments function in mp4decrypt.
Modified: 2024-11-21
CVE-2022-41426
Bento4 v1.6.0-639 was discovered to contain a memory leak via the AP4_AtomFactory::CreateAtomFromStream function in mp4split.
Modified: 2024-11-21
CVE-2022-41427
Bento4 v1.6.0-639 was discovered to contain a memory leak in the AP4_AvcFrameParser::Feed function in mp4mux.
Modified: 2024-11-21
CVE-2022-41428
Bento4 v1.6.0-639 was discovered to contain a heap overflow via the AP4_BitReader::ReadBits function in mp4mux.
Modified: 2024-11-21
CVE-2022-41429
Bento4 v1.6.0-639 was discovered to contain a heap overflow via the AP4_Atom::TypeFromString function in mp4tag.
Modified: 2024-11-21
CVE-2022-41430
Bento4 v1.6.0-639 was discovered to contain a heap overflow via the AP4_BitReader::ReadBit function in mp4mux.
Modified: 2024-11-21
CVE-2022-41841
An issue was discovered in Bento4 through 1.6.0-639. A NULL pointer dereference occurs in AP4_File::ParseStream in Core/Ap4File.cpp, which is called from AP4_File::AP4_File.
Modified: 2024-11-21
CVE-2022-41845
An issue was discovered in Bento4 1.6.0-639. There ie excessive memory consumption in the function AP4_Array
Modified: 2024-11-21
CVE-2022-41846
An issue was discovered in Bento4 1.6.0-639. There ie excessive memory consumption in the function AP4_DataBuffer::ReallocateBuffer in Core/Ap4DataBuffer.cpp.
Modified: 2024-11-21
CVE-2022-41847
An issue was discovered in Bento4 1.6.0-639. A memory leak exists in AP4_StdcFileByteStream::Create(AP4_FileByteStream*, char const*, AP4_FileByteStream::Mode, AP4_ByteStream*&) in System/StdC/Ap4StdCFileByteStream.cpp.
- https://github.com/axiomatic-systems/Bento4/issues/750
- https://github.com/axiomatic-systems/Bento4/issues/750
- https://github.com/axiomatic-systems/Bento4/issues/759
- https://github.com/axiomatic-systems/Bento4/issues/759
- https://github.com/axiomatic-systems/Bento4/issues/775
- https://github.com/axiomatic-systems/Bento4/issues/775
Modified: 2024-11-21
CVE-2022-43032
An issue was discovered in Bento4 v1.6.0-639. There is a memory leak in AP4_DescriptorFactory::CreateDescriptorFromStream in Core/Ap4DescriptorFactory.cpp, as demonstrated by mp42aac.
Modified: 2024-11-21
CVE-2022-43033
An issue was discovered in Bento4 1.6.0-639. There is a bad free in the component AP4_HdlrAtom::~AP4_HdlrAtom() which allows attackers to cause a Denial of Service (DoS) via a crafted input.
Modified: 2024-11-21
CVE-2022-43034
An issue was discovered in Bento4 v1.6.0-639. There is a heap buffer overflow vulnerability in the AP4_BitReader::SkipBits(unsigned int) function in mp42ts.
Modified: 2024-11-21
CVE-2022-43035
An issue was discovered in Bento4 v1.6.0-639. There is a heap-buffer-overflow in AP4_Dec3Atom::AP4_Dec3Atom at Ap4Dec3Atom.cpp, leading to a Denial of Service (DoS), as demonstrated by mp42aac.
Modified: 2024-11-21
CVE-2022-43037
An issue was discovered in Bento4 1.6.0-639. There is a memory leak in the function AP4_File::ParseStream in /Core/Ap4File.cpp.
Modified: 2024-11-21
CVE-2022-43038
Bento4 v1.6.0-639 was discovered to contain a heap overflow via the AP4_BitReader::ReadCache() function in mp42ts.
Modified: 2024-11-21
CVE-2022-4584
A vulnerability was found in Axiomatic Bento4 up to 1.6.0-639. It has been rated as critical. Affected by this issue is some unknown functionality of the component mp42aac. The manipulation leads to heap-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-216170 is the identifier assigned to this vulnerability.
- https://github.com/axiomatic-systems/Bento4/files/10095915/POC2.tar.gz
- https://github.com/axiomatic-systems/Bento4/files/10095915/POC2.tar.gz
- https://github.com/axiomatic-systems/Bento4/issues/818
- https://github.com/axiomatic-systems/Bento4/issues/818
- https://vuldb.com/?ctiid.216170
- https://vuldb.com/?ctiid.216170
- https://vuldb.com/?id.216170
- https://vuldb.com/?id.216170
Modified: 2025-02-07
CVE-2023-29573
Bento4 v1.6.0-639 was discovered to contain an out-of-memory bug in the mp4info component.
Modified: 2025-02-08
CVE-2023-29574
Bento4 v1.6.0-639 was discovered to contain an out-of-memory bug in the mp42avc component.
Modified: 2025-02-05
CVE-2023-29575
Bento4 v1.6.0-639 was discovered to contain an out-of-memory bug in the mp42aac component.
Modified: 2025-02-10
CVE-2023-29576
Bento4 v1.6.0-639 was discovered to contain a segmentation violation via the AP4_TrunAtom::SetDataOffset(int) function in Ap4TrunAtom.h.
Modified: 2024-11-21
CVE-2023-38666
Bento4 v1.6.0-639 was discovered to contain a segmentation violation via the AP4_Processor::ProcessFragments function in mp4encrypt.
Closed vulnerabilities
BDU:2022-07107
Уязвимость функции must_mkdir_and_open_with_perms() утилиты snap-confine операционной системы Ubuntu, позволяющая нарушителю
Modified: 2024-11-21
CVE-2022-3328
Race condition in snap-confine's must_mkdir_and_open_with_perms()
Modified: 2024-11-21
CVE-2023-1523
Using the TIOCLINUX ioctl request, a malicious snap could inject contents into the input of the controlling terminal which could allow it to cause arbitrary commands to be executed outside of the snap sandbox after the snap exits. Graphical terminal emulators like xterm, gnome-terminal and others are not affected - this can only be exploited when snaps are run on a virtual console.
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1523
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-1523
- https://github.com/snapcore/snapd/pull/12849
- https://github.com/snapcore/snapd/pull/12849
- https://marc.info/?l=oss-security&m=167879021709955&w=2
- https://marc.info/?l=oss-security&m=167879021709955&w=2
- https://ubuntu.com/security/notices/USN-6125-1
- https://ubuntu.com/security/notices/USN-6125-1
Closed vulnerabilities
Modified: 2024-11-21
CVE-2024-1441
An off-by-one error flaw was found in the udevListInterfacesByStatus() function in libvirt when the number of interfaces exceeds the size of the `names` array. This issue can be reproduced by sending specially crafted data to the libvirt daemon, allowing an unprivileged client to perform a denial of service attack by causing the libvirt daemon to crash.
- RHSA-2024:2560
- RHSA-2024:2560
- https://access.redhat.com/security/cve/CVE-2024-1441
- https://access.redhat.com/security/cve/CVE-2024-1441
- RHBZ#2263841
- RHBZ#2263841
- https://lists.debian.org/debian-lts-announce/2024/04/msg00000.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/45FFKU3LODT345LAB5T4XZA5WKYMXJYU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E6MVZO5GXDB7RHY6MS3ZXES3HPK34P3A/
Closed vulnerabilities
BDU:2024-02061
Уязвимость функции HttpStateData() декодера Chunked прокси-сервера Squid, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-02-26
CVE-2024-25111
Squid is a web proxy cache. Starting in version 3.5.27 and prior to version 6.8, Squid may be vulnerable to a Denial of Service attack against HTTP Chunked decoder due to an uncontrolled recursion bug. This problem allows a remote attacker to cause Denial of Service when sending a crafted, chunked, encoded HTTP Message. This bug is fixed in Squid version 6.8. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives. There is no workaround for this issue.
- http://www.squid-cache.org/Versions/v6/SQUID-2024_1.patch
- http://www.squid-cache.org/Versions/v6/SQUID-2024_1.patch
- https://github.com/squid-cache/squid/security/advisories/GHSA-72c2-c3wm-8qxc
- https://github.com/squid-cache/squid/security/advisories/GHSA-72c2-c3wm-8qxc
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7R4KPSO3MQT3KAOZV7LC2GG3CYMCGK7H/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7R4KPSO3MQT3KAOZV7LC2GG3CYMCGK7H/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWQHRDRHDM5PQTU6BHH4C5KGL37X6TVI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XWQHRDRHDM5PQTU6BHH4C5KGL37X6TVI/
- https://security.netapp.com/advisory/ntap-20240605-0001/
- https://security.netapp.com/advisory/ntap-20240605-0001/