ALT-BU-2024-6362-1
Branch sisyphus_e2k update bulletin.
Package xfsprogs updated to version 6.6.0-alt2 for branch sisyphus_e2k.
Closed bugs
xfsprogs зависит от systemd
Package c-ares updated to version 1.28.1-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2023-07647
Уязвимость функции ares_inet_net_pton() библиотеки асинхронных DNS-запросов C-ares, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2023-07649
Уязвимость библиотеки асинхронных DNS-запросов C-ares, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-02612
Уязвимость компонента autotools CARES_RANDOM_FILE библиотеки асинхронных DNS-запросов C-ares, позволяющая нарушителю оказать воздействие на целостность защищаемой информации
Modified: 2025-02-13
CVE-2023-31124
c-ares is an asynchronous resolver library. When cross-compiling c-ares and using the autotools build system, CARES_RANDOM_FILE will not be set, as seen when cross compiling aarch64 android. This will downgrade to using rand() as a fallback which could allow an attacker to take advantage of the lack of entropy by not using a CSPRNG. This issue was patched in version 1.19.1.
- https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1
- https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1
- https://github.com/c-ares/c-ares/security/advisories/GHSA-54xr-f67r-4pc4
- https://github.com/c-ares/c-ares/security/advisories/GHSA-54xr-f67r-4pc4
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5Z5XFNXTNPTCBBVXFDNZQVLLIE6VRBY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5Z5XFNXTNPTCBBVXFDNZQVLLIE6VRBY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBFWILTA33LOSV23P44FGTQQIDRJHIY7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBFWILTA33LOSV23P44FGTQQIDRJHIY7/
- https://security.gentoo.org/glsa/202310-09
- https://security.gentoo.org/glsa/202310-09
Modified: 2025-02-13
CVE-2023-31130
c-ares is an asynchronous resolver library. ares_inet_net_pton() is vulnerable to a buffer underflow for certain ipv6 addresses, in particular "0::00:00:00/2" was found to cause an issue. C-ares only uses this function internally for configuration purposes which would require an administrator to configure such an address via ares_set_sortlist(). However, users may externally use ares_inet_net_pton() for other purposes and thus be vulnerable to more severe issues. This issue has been fixed in 1.19.1.
- https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1
- https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1
- https://github.com/c-ares/c-ares/security/advisories/GHSA-x6mf-cxr9-8q6v
- https://github.com/c-ares/c-ares/security/advisories/GHSA-x6mf-cxr9-8q6v
- https://lists.debian.org/debian-lts-announce/2023/06/msg00034.html
- https://lists.debian.org/debian-lts-announce/2023/06/msg00034.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5Z5XFNXTNPTCBBVXFDNZQVLLIE6VRBY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5Z5XFNXTNPTCBBVXFDNZQVLLIE6VRBY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBFWILTA33LOSV23P44FGTQQIDRJHIY7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBFWILTA33LOSV23P44FGTQQIDRJHIY7/
- https://security.gentoo.org/glsa/202310-09
- https://security.gentoo.org/glsa/202310-09
- https://security.netapp.com/advisory/ntap-20240605-0005/
- https://security.netapp.com/advisory/ntap-20240605-0005/
- https://www.debian.org/security/2023/dsa-5419
- https://www.debian.org/security/2023/dsa-5419
Modified: 2024-11-21
CVE-2023-31147
c-ares is an asynchronous resolver library. When /dev/urandom or RtlGenRandom() are unavailable, c-ares uses rand() to generate random numbers used for DNS query ids. This is not a CSPRNG, and it is also not seeded by srand() so will generate predictable output. Input from the random number generator is fed into a non-compilant RC4 implementation and may not be as strong as the original RC4 implementation. No attempt is made to look for modern OS-provided CSPRNGs like arc4random() that is widely available. This issue has been fixed in version 1.19.1.
- https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1
- https://github.com/c-ares/c-ares/security/advisories/GHSA-8r8p-23f3-64c2
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5Z5XFNXTNPTCBBVXFDNZQVLLIE6VRBY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBFWILTA33LOSV23P44FGTQQIDRJHIY7/
- https://security.gentoo.org/glsa/202310-09
- https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1
- https://security.gentoo.org/glsa/202310-09
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBFWILTA33LOSV23P44FGTQQIDRJHIY7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5Z5XFNXTNPTCBBVXFDNZQVLLIE6VRBY/
- https://github.com/c-ares/c-ares/security/advisories/GHSA-8r8p-23f3-64c2
Modified: 2024-11-21
CVE-2023-32067
c-ares is an asynchronous resolver library. c-ares is vulnerable to denial of service. If a target resolver sends a query, the attacker forges a malformed UDP packet with a length of 0 and returns them to the target resolver. The target resolver erroneously interprets the 0 length as a graceful shutdown of the connection. This issue has been patched in version 1.19.1.
- https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1
- https://github.com/c-ares/c-ares/security/advisories/GHSA-9g78-jv2r-p7vc
- https://lists.debian.org/debian-lts-announce/2023/06/msg00034.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5Z5XFNXTNPTCBBVXFDNZQVLLIE6VRBY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBFWILTA33LOSV23P44FGTQQIDRJHIY7/
- https://security.gentoo.org/glsa/202310-09
- https://security.netapp.com/advisory/ntap-20240605-0004/
- https://www.debian.org/security/2023/dsa-5419
- https://github.com/c-ares/c-ares/releases/tag/cares-1_19_1
- https://www.debian.org/security/2023/dsa-5419
- https://security.netapp.com/advisory/ntap-20240605-0004/
- https://security.gentoo.org/glsa/202310-09
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UBFWILTA33LOSV23P44FGTQQIDRJHIY7/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/B5Z5XFNXTNPTCBBVXFDNZQVLLIE6VRBY/
- https://lists.debian.org/debian-lts-announce/2023/06/msg00034.html
- https://github.com/c-ares/c-ares/security/advisories/GHSA-9g78-jv2r-p7vc
Package tzdata updated to version 2024a-alt1 for branch sisyphus_e2k.
Closed bugs
tzdata: -> 2024a
Package nss updated to version 3.99-alt1 for branch sisyphus_e2k.
Closed bugs
nss собран без debuginfo
Package guile-evms updated to version 0.6.5-alt5 for branch sisyphus_e2k.
Closed bugs
Расширение поддержки LVM (/boot LV внутри LVM, RAID LV)
Package bento4 updated to version 1.6.0.641-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-27607
Bento4 1.6.0-639 has a heap-based buffer over-read in the AP4_HvccAtom class, a different issue than CVE-2018-14531.
Modified: 2024-11-21
CVE-2022-35165
An issue in AP4_SgpdAtom::AP4_SgpdAtom() of Bento4-1.6.0-639 allows attackers to cause a Denial of Service (DoS) via a crafted mp4 input.
Modified: 2024-11-21
CVE-2022-3662
A vulnerability was found in Axiomatic Bento4. It has been declared as critical. This vulnerability affects the function GetOffset of the file Ap4Sample.h of the component mp42hls. The manipulation leads to use after free. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. VDB-212002 is the identifier assigned to this vulnerability.
- https://github.com/axiomatic-systems/Bento4/files/9817606/mp42hls_cuaf_Ap4Sample99.zip
- https://github.com/axiomatic-systems/Bento4/files/9817606/mp42hls_cuaf_Ap4Sample99.zip
- https://github.com/axiomatic-systems/Bento4/issues/802
- https://github.com/axiomatic-systems/Bento4/issues/802
- https://vuldb.com/?id.212002
- https://vuldb.com/?id.212002
Modified: 2024-11-21
CVE-2022-3663
A vulnerability was found in Axiomatic Bento4. It has been rated as problematic. This issue affects the function AP4_StsdAtom of the file Ap4StsdAtom.cpp of the component MP4fragment. The manipulation leads to null pointer dereference. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-212003.
- https://github.com/axiomatic-systems/Bento4/files/9817303/mp4fragment_npd_Ap4StsdAtom.cpp75.zip
- https://github.com/axiomatic-systems/Bento4/files/9817303/mp4fragment_npd_Ap4StsdAtom.cpp75.zip
- https://github.com/axiomatic-systems/Bento4/issues/800
- https://github.com/axiomatic-systems/Bento4/issues/800
- https://vuldb.com/?id.212003
- https://vuldb.com/?id.212003
Modified: 2024-11-21
CVE-2022-3664
A vulnerability classified as critical has been found in Axiomatic Bento4. Affected is the function AP4_BitStream::WriteBytes of the file Ap4BitStream.cpp of the component avcinfo. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-212004.
- https://github.com/axiomatic-systems/Bento4/files/9746288/avcinfo_poc1.zip
- https://github.com/axiomatic-systems/Bento4/files/9746288/avcinfo_poc1.zip
- https://github.com/axiomatic-systems/Bento4/issues/794
- https://github.com/axiomatic-systems/Bento4/issues/794
- https://vuldb.com/?id.212004
- https://vuldb.com/?id.212004
Modified: 2024-11-21
CVE-2022-3665
A vulnerability classified as critical was found in Axiomatic Bento4. Affected by this vulnerability is an unknown functionality of the file AvcInfo.cpp of the component avcinfo. The manipulation leads to heap-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-212005 was assigned to this vulnerability.
- https://github.com/axiomatic-systems/Bento4/files/9746311/avcinfo_poc2.zip
- https://github.com/axiomatic-systems/Bento4/files/9746311/avcinfo_poc2.zip
- https://github.com/axiomatic-systems/Bento4/issues/794
- https://github.com/axiomatic-systems/Bento4/issues/794
- https://vuldb.com/?id.212005
- https://vuldb.com/?id.212005
Modified: 2024-11-21
CVE-2022-3666
A vulnerability, which was classified as critical, has been found in Axiomatic Bento4. Affected by this issue is the function AP4_LinearReader::Advance of the file Ap4LinearReader.cpp of the component mp42ts. The manipulation leads to use after free. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-212006 is the identifier assigned to this vulnerability.
- https://github.com/axiomatic-systems/Bento4/files/9744391/mp42ts_poc.zip
- https://github.com/axiomatic-systems/Bento4/files/9744391/mp42ts_poc.zip
- https://github.com/axiomatic-systems/Bento4/issues/793
- https://github.com/axiomatic-systems/Bento4/issues/793
- https://vuldb.com/?id.212006
- https://vuldb.com/?id.212006
Modified: 2024-11-21
CVE-2022-3667
A vulnerability, which was classified as critical, was found in Axiomatic Bento4. This affects the function AP4_MemoryByteStream::WritePartial of the file Ap4ByteStream.cpp of the component mp42aac. The manipulation leads to heap-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-212007.
- https://github.com/17ssDP/fuzzer_crashes/blob/main/Bento4/mp42aac-hbo-01
- https://github.com/17ssDP/fuzzer_crashes/blob/main/Bento4/mp42aac-hbo-01
- https://github.com/axiomatic-systems/Bento4/issues/789
- https://github.com/axiomatic-systems/Bento4/issues/789
- https://vuldb.com/?id.212007
- https://vuldb.com/?id.212007
Modified: 2024-11-21
CVE-2022-3668
A vulnerability has been found in Axiomatic Bento4 and classified as problematic. This vulnerability affects the function AP4_AtomFactory::CreateAtomFromStream of the component mp4edit. The manipulation leads to memory leak. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-212008.
- https://github.com/axiomatic-systems/Bento4/files/9640968/Bug_1_POC.zip
- https://github.com/axiomatic-systems/Bento4/files/9640968/Bug_1_POC.zip
- https://github.com/axiomatic-systems/Bento4/issues/776
- https://github.com/axiomatic-systems/Bento4/issues/776
- https://vuldb.com/?id.212008
- https://vuldb.com/?id.212008
Modified: 2024-11-21
CVE-2022-3669
A vulnerability was found in Axiomatic Bento4 and classified as problematic. This issue affects the function AP4_AvccAtom::Create of the component mp4edit. The manipulation leads to memory leak. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-212009 was assigned to this vulnerability.
- https://github.com/axiomatic-systems/Bento4/files/9675042/Bug_2_POC.zip
- https://github.com/axiomatic-systems/Bento4/files/9675042/Bug_2_POC.zip
- https://github.com/axiomatic-systems/Bento4/issues/776
- https://github.com/axiomatic-systems/Bento4/issues/776
- https://vuldb.com/?id.212009
- https://vuldb.com/?id.212009
Modified: 2024-11-21
CVE-2022-3670
A vulnerability was found in Axiomatic Bento4. It has been classified as critical. Affected is the function WriteSample of the component mp42hevc. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-212010 is the identifier assigned to this vulnerability.
- https://github.com/axiomatic-systems/Bento4/files/9675049/Bug_3_POC.zip
- https://github.com/axiomatic-systems/Bento4/files/9675049/Bug_3_POC.zip
- https://github.com/axiomatic-systems/Bento4/issues/776
- https://github.com/axiomatic-systems/Bento4/issues/776
- https://vuldb.com/?id.212010
- https://vuldb.com/?id.212010
Modified: 2024-11-21
CVE-2022-3784
A vulnerability classified as critical was found in Axiomatic Bento4 5e7bb34. Affected by this vulnerability is the function AP4_Mp4AudioDsiParser::ReadBits of the file Ap4Mp4AudioInfo.cpp of the component mp4hls. The manipulation leads to heap-based buffer overflow. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-212563.
- https://github.com/axiomatic-systems/Bento4/files/9849116/mp42hls_ReadBits_Ap4Mp4AudioInfo66.zip
- https://github.com/axiomatic-systems/Bento4/files/9849116/mp42hls_ReadBits_Ap4Mp4AudioInfo66.zip
- https://github.com/axiomatic-systems/Bento4/issues/806
- https://github.com/axiomatic-systems/Bento4/issues/806
- https://vuldb.com/?id.212563
- https://vuldb.com/?id.212563
Modified: 2024-11-21
CVE-2022-3785
A vulnerability, which was classified as critical, has been found in Axiomatic Bento4. Affected by this issue is the function AP4_DataBuffer::SetDataSize of the component Avcinfo. The manipulation leads to heap-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-212564.
- https://github.com/axiomatic-systems/Bento4/files/9658653/POC_avcinfo_15644345.zip
- https://github.com/axiomatic-systems/Bento4/files/9658653/POC_avcinfo_15644345.zip
- https://github.com/axiomatic-systems/Bento4/issues/780
- https://github.com/axiomatic-systems/Bento4/issues/780
- https://vuldb.com/?id.212564
- https://vuldb.com/?id.212564
Modified: 2024-11-21
CVE-2022-3809
A vulnerability was found in Axiomatic Bento4 and classified as problematic. Affected by this issue is the function ParseCommandLine of the file Mp4Tag/Mp4Tag.cpp of the component mp4tag. The manipulation leads to denial of service. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-212666 is the identifier assigned to this vulnerability.
- https://github.com/axiomatic-systems/Bento4/files/9653209/poc_Bento4.zip
- https://github.com/axiomatic-systems/Bento4/files/9653209/poc_Bento4.zip
- https://github.com/axiomatic-systems/Bento4/issues/779
- https://github.com/axiomatic-systems/Bento4/issues/779
- https://vuldb.com/?id.212666
- https://vuldb.com/?id.212666
Modified: 2024-11-21
CVE-2022-3810
A vulnerability was found in Axiomatic Bento4. It has been classified as problematic. This affects the function AP4_File::AP4_File of the file Mp42Hevc.cpp of the component mp42hevc. The manipulation leads to denial of service. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-212667.
- https://github.com/axiomatic-systems/Bento4/files/9653209/poc_Bento4.zip
- https://github.com/axiomatic-systems/Bento4/files/9653209/poc_Bento4.zip
- https://github.com/axiomatic-systems/Bento4/issues/779
- https://github.com/axiomatic-systems/Bento4/issues/779
- https://vuldb.com/?id.212667
- https://vuldb.com/?id.212667
Modified: 2024-11-21
CVE-2022-3812
A vulnerability was found in Axiomatic Bento4. It has been rated as problematic. Affected by this issue is the function AP4_ContainerAtom::AP4_ContainerAtom of the component mp4encrypt. The manipulation leads to memory leak. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-212678 is the identifier assigned to this vulnerability.
- https://github.com/axiomatic-systems/Bento4/files/9726934/POC_mp4encrypt_631000973.zip
- https://github.com/axiomatic-systems/Bento4/files/9726934/POC_mp4encrypt_631000973.zip
- https://github.com/axiomatic-systems/Bento4/issues/792
- https://github.com/axiomatic-systems/Bento4/issues/792
- https://vuldb.com/?id.212678
- https://vuldb.com/?id.212678
Modified: 2024-11-21
CVE-2022-3813
A vulnerability classified as problematic has been found in Axiomatic Bento4. This affects an unknown part of the component mp4edit. The manipulation leads to memory leak. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-212679.
- https://github.com/axiomatic-systems/Bento4/files/9726974/POC_mp4edit_728838793.zip
- https://github.com/axiomatic-systems/Bento4/files/9726974/POC_mp4edit_728838793.zip
- https://github.com/axiomatic-systems/Bento4/issues/792
- https://github.com/axiomatic-systems/Bento4/issues/792
- https://vuldb.com/?id.212679
- https://vuldb.com/?id.212679
Modified: 2024-11-21
CVE-2022-3814
A vulnerability classified as problematic was found in Axiomatic Bento4. This vulnerability affects unknown code of the component mp4decrypt. The manipulation leads to memory leak. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier of this vulnerability is VDB-212680.
- https://github.com/axiomatic-systems/Bento4/files/9727002/POC_mp4decrypt_477546304.zip
- https://github.com/axiomatic-systems/Bento4/files/9727002/POC_mp4decrypt_477546304.zip
- https://github.com/axiomatic-systems/Bento4/issues/792
- https://github.com/axiomatic-systems/Bento4/issues/792
- https://vuldb.com/?id.212680
- https://vuldb.com/?id.212680
Modified: 2024-11-21
CVE-2022-3815
A vulnerability, which was classified as problematic, has been found in Axiomatic Bento4. This issue affects some unknown processing of the component mp4decrypt. The manipulation leads to memory leak. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-212681 was assigned to this vulnerability.
- https://github.com/axiomatic-systems/Bento4/files/9727048/POC_mp4decrypt_34393864.zip
- https://github.com/axiomatic-systems/Bento4/files/9727048/POC_mp4decrypt_34393864.zip
- https://github.com/axiomatic-systems/Bento4/issues/792
- https://github.com/axiomatic-systems/Bento4/issues/792
- https://vuldb.com/?id.212681
- https://vuldb.com/?id.212681
Modified: 2024-11-21
CVE-2022-3816
A vulnerability, which was classified as problematic, was found in Axiomatic Bento4. Affected is an unknown function of the component mp4decrypt. The manipulation leads to memory leak. It is possible to launch the attack remotely. The exploit has been disclosed to the public and may be used. VDB-212682 is the identifier assigned to this vulnerability.
- https://github.com/axiomatic-systems/Bento4/files/9727059/POC_mp4decrypt_654515280.zip
- https://github.com/axiomatic-systems/Bento4/files/9727059/POC_mp4decrypt_654515280.zip
- https://github.com/axiomatic-systems/Bento4/issues/792
- https://github.com/axiomatic-systems/Bento4/issues/792
- https://vuldb.com/?id.212682
- https://vuldb.com/?id.212682
Modified: 2024-11-21
CVE-2022-3817
A vulnerability has been found in Axiomatic Bento4 and classified as problematic. Affected by this vulnerability is an unknown functionality of the component mp4mux. The manipulation leads to memory leak. The attack can be launched remotely. The exploit has been disclosed to the public and may be used. The associated identifier of this vulnerability is VDB-212683.
- https://github.com/axiomatic-systems/Bento4/files/9727057/POC_mp4mux_1729452038.zip
- https://github.com/axiomatic-systems/Bento4/files/9727057/POC_mp4mux_1729452038.zip
- https://github.com/axiomatic-systems/Bento4/issues/792
- https://github.com/axiomatic-systems/Bento4/issues/792
- https://vuldb.com/?id.212683
- https://vuldb.com/?id.212683
Modified: 2024-11-21
CVE-2022-40438
Buffer overflow vulnerability in function AP4_MemoryByteStream::WritePartial in mp42aac in Bento4 v1.6.0-639, allows attackers to cause a denial of service via a crafted file.
Modified: 2024-11-21
CVE-2022-40439
An memory leak issue was discovered in AP4_StdcFileByteStream::Create in mp42ts in Bento4 v1.6.0-639, allows attackers to cause a denial of service via a crafted file.
Modified: 2024-11-21
CVE-2022-40736
An issue was discovered in Bento4 1.6.0-639. There ie excessive memory consumption in AP4_CttsAtom::Create in Core/Ap4CttsAtom.cpp.
Modified: 2024-11-21
CVE-2022-40737
An issue was discovered in Bento4 through 1.6.0-639. A buffer over-read exists in the function AP4_StdcFileByteStream::WritePartial located in System/StdC/Ap4StdCFileByteStream.cpp, called from AP4_ByteStream::Write and AP4_HdlrAtom::WriteFields.
Modified: 2024-11-21
CVE-2022-40738
An issue was discovered in Bento4 through 1.6.0-639. A NULL pointer dereference occurs in AP4_DescriptorListWriter::Action in Core/Ap4Descriptor.h, called from AP4_EsDescriptor::WriteFields and AP4_Expandable::Write.
Modified: 2024-11-21
CVE-2022-40774
An issue was discovered in Bento4 through 1.6.0-639. There is a NULL pointer dereference in AP4_StszAtom::GetSampleSize.
Modified: 2024-11-21
CVE-2022-40775
An issue was discovered in Bento4 through 1.6.0-639. A NULL pointer dereference occurs in AP4_StszAtom::WriteFields.
Modified: 2024-11-21
CVE-2022-40885
Bento4 v1.6.0-639 has a memory allocation issue that can cause denial of service.
Modified: 2024-11-21
CVE-2022-41419
Bento4 v1.6.0-639 was discovered to contain a memory leak via the AP4_Processor::Process function in the mp4encrypt binary.
Modified: 2024-11-21
CVE-2022-41423
Bento4 v1.6.0-639 was discovered to contain a segmentation violation in the mp4fragment component.
Modified: 2024-11-21
CVE-2022-41424
Bento4 v1.6.0-639 was discovered to contain a memory leak via the AP4_SttsAtom::Create function in mp42hls.
Modified: 2024-11-21
CVE-2022-41425
Bento4 v1.6.0-639 was discovered to contain a segmentation violation via the AP4_Processor::ProcessFragments function in mp4decrypt.
Modified: 2024-11-21
CVE-2022-41426
Bento4 v1.6.0-639 was discovered to contain a memory leak via the AP4_AtomFactory::CreateAtomFromStream function in mp4split.
Modified: 2024-11-21
CVE-2022-41427
Bento4 v1.6.0-639 was discovered to contain a memory leak in the AP4_AvcFrameParser::Feed function in mp4mux.
Modified: 2024-11-21
CVE-2022-41428
Bento4 v1.6.0-639 was discovered to contain a heap overflow via the AP4_BitReader::ReadBits function in mp4mux.
Modified: 2024-11-21
CVE-2022-41429
Bento4 v1.6.0-639 was discovered to contain a heap overflow via the AP4_Atom::TypeFromString function in mp4tag.
Modified: 2024-11-21
CVE-2022-41430
Bento4 v1.6.0-639 was discovered to contain a heap overflow via the AP4_BitReader::ReadBit function in mp4mux.
Modified: 2024-11-21
CVE-2022-41841
An issue was discovered in Bento4 through 1.6.0-639. A NULL pointer dereference occurs in AP4_File::ParseStream in Core/Ap4File.cpp, which is called from AP4_File::AP4_File.
Modified: 2024-11-21
CVE-2022-41845
An issue was discovered in Bento4 1.6.0-639. There ie excessive memory consumption in the function AP4_Array
Modified: 2024-11-21
CVE-2022-41846
An issue was discovered in Bento4 1.6.0-639. There ie excessive memory consumption in the function AP4_DataBuffer::ReallocateBuffer in Core/Ap4DataBuffer.cpp.
Modified: 2024-11-21
CVE-2022-41847
An issue was discovered in Bento4 1.6.0-639. A memory leak exists in AP4_StdcFileByteStream::Create(AP4_FileByteStream*, char const*, AP4_FileByteStream::Mode, AP4_ByteStream*&) in System/StdC/Ap4StdCFileByteStream.cpp.
- https://github.com/axiomatic-systems/Bento4/issues/750
- https://github.com/axiomatic-systems/Bento4/issues/750
- https://github.com/axiomatic-systems/Bento4/issues/759
- https://github.com/axiomatic-systems/Bento4/issues/759
- https://github.com/axiomatic-systems/Bento4/issues/775
- https://github.com/axiomatic-systems/Bento4/issues/775
Modified: 2024-11-21
CVE-2022-43032
An issue was discovered in Bento4 v1.6.0-639. There is a memory leak in AP4_DescriptorFactory::CreateDescriptorFromStream in Core/Ap4DescriptorFactory.cpp, as demonstrated by mp42aac.
Modified: 2024-11-21
CVE-2022-43033
An issue was discovered in Bento4 1.6.0-639. There is a bad free in the component AP4_HdlrAtom::~AP4_HdlrAtom() which allows attackers to cause a Denial of Service (DoS) via a crafted input.
Modified: 2024-11-21
CVE-2022-43034
An issue was discovered in Bento4 v1.6.0-639. There is a heap buffer overflow vulnerability in the AP4_BitReader::SkipBits(unsigned int) function in mp42ts.
Modified: 2024-11-21
CVE-2022-43035
An issue was discovered in Bento4 v1.6.0-639. There is a heap-buffer-overflow in AP4_Dec3Atom::AP4_Dec3Atom at Ap4Dec3Atom.cpp, leading to a Denial of Service (DoS), as demonstrated by mp42aac.
Modified: 2024-11-21
CVE-2022-43037
An issue was discovered in Bento4 1.6.0-639. There is a memory leak in the function AP4_File::ParseStream in /Core/Ap4File.cpp.
Modified: 2024-11-21
CVE-2022-43038
Bento4 v1.6.0-639 was discovered to contain a heap overflow via the AP4_BitReader::ReadCache() function in mp42ts.
Modified: 2024-11-21
CVE-2022-4584
A vulnerability was found in Axiomatic Bento4 up to 1.6.0-639. It has been rated as critical. Affected by this issue is some unknown functionality of the component mp42aac. The manipulation leads to heap-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. VDB-216170 is the identifier assigned to this vulnerability.
- https://github.com/axiomatic-systems/Bento4/files/10095915/POC2.tar.gz
- https://github.com/axiomatic-systems/Bento4/files/10095915/POC2.tar.gz
- https://github.com/axiomatic-systems/Bento4/issues/818
- https://github.com/axiomatic-systems/Bento4/issues/818
- https://vuldb.com/?ctiid.216170
- https://vuldb.com/?ctiid.216170
- https://vuldb.com/?id.216170
- https://vuldb.com/?id.216170
Modified: 2025-02-07
CVE-2023-29573
Bento4 v1.6.0-639 was discovered to contain an out-of-memory bug in the mp4info component.
Modified: 2025-02-08
CVE-2023-29574
Bento4 v1.6.0-639 was discovered to contain an out-of-memory bug in the mp42avc component.
Modified: 2025-02-05
CVE-2023-29575
Bento4 v1.6.0-639 was discovered to contain an out-of-memory bug in the mp42aac component.
Modified: 2025-02-10
CVE-2023-29576
Bento4 v1.6.0-639 was discovered to contain a segmentation violation via the AP4_TrunAtom::SetDataOffset(int) function in Ap4TrunAtom.h.
Modified: 2024-11-21
CVE-2023-38666
Bento4 v1.6.0-639 was discovered to contain a segmentation violation via the AP4_Processor::ProcessFragments function in mp4encrypt.
Package rpm-build-python3 updated to version 0.1.25-alt1 for branch sisyphus_e2k.
Closed bugs
macros %py3_shebang_fix
Package shutter updated to version 0.99.5-alt1 for branch sisyphus_e2k.
Closed bugs
perl-devel is needed by (installed) shutter-0.99.4-alt1.noarch
Package alt-app-starter updated to version 1.3.1-alt1 for branch sisyphus_e2k.
Closed bugs
Некорректный порядок перехода между полями по кнопке TAB