ALT-BU-2025-1496-1
Branch c9f2 update bulletin.
Closed vulnerabilities
BDU:2021-01391
Уязвимость функции rebuild_vlists в lib/dotgen/conc.c библиотеки dotgen ПО для визуализации графиков Graphviz, связанная с разыменованием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-10196
NULL pointer dereference vulnerability in the rebuild_vlists function in lib/dotgen/conc.c in the dotgen library in Graphviz 2.40.1 allows remote attackers to cause a denial of service (application crash) via a crafted file.
- https://bugzilla.redhat.com/show_bug.cgi?id=1579254
- https://bugzilla.redhat.com/show_bug.cgi?id=1579254
- https://gitlab.com/graphviz/graphviz/issues/1367
- https://gitlab.com/graphviz/graphviz/issues/1367
- [debian-lts-announce] 20210513 [SECURITY] [DLA 2659-1] graphviz security update
- [debian-lts-announce] 20210513 [SECURITY] [DLA 2659-1] graphviz security update
- FEDORA-2018-25674bb48e
- FEDORA-2018-25674bb48e
- FEDORA-2018-fd850e033d
- FEDORA-2018-fd850e033d
- USN-3731-1
- USN-3731-1
Modified: 2024-11-21
CVE-2019-9904
An issue was discovered in lib\cdt\dttree.c in libcdt.a in graphviz 2.40.1. Stack consumption occurs because of recursive agclose calls in lib\cgraph\graph.c in libcgraph.a, related to agfstsubg in lib\cgraph\subg.c.
- https://gitlab.com/graphviz/graphviz/issues/1512
- https://research.loginsoft.com/bugs/stack-buffer-overflow-in-function-agclose-graphviz/
- GLSA-202107-04
- https://gitlab.com/graphviz/graphviz/issues/1512
- GLSA-202107-04
- https://research.loginsoft.com/bugs/stack-buffer-overflow-in-function-agclose-graphviz/
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-3848
In the ffghbn function in NASA CFITSIO 3.42, specially crafted images parsed via the library can cause a stack-based buffer overflow overwriting arbitrary data. An attacker can deliver an FIT image to trigger this vulnerability and potentially gain code execution.
Modified: 2024-11-21
CVE-2018-3849
In the ffghtb function in NASA CFITSIO 3.42, specially crafted images parsed via the library can cause a stack-based buffer overflow overwriting arbitrary data. An attacker can deliver an FIT image to trigger this vulnerability and potentially gain code execution.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-7998
In libvips before 8.6.3, a NULL function pointer dereference vulnerability was found in the vips_region_generate function in region.c, which allows remote attackers to cause a denial of service or possibly have unspecified other impact via a crafted image file. This occurs because of a race condition involving a failed delayed load and other worker threads.
- https://github.com/jcupitt/libvips/commit/20d840e6da15c1574b3ed998bc92f91d1e36c2a5
- https://github.com/jcupitt/libvips/commit/20d840e6da15c1574b3ed998bc92f91d1e36c2a5
- https://github.com/jcupitt/libvips/issues/893
- https://github.com/jcupitt/libvips/issues/893
- [debian-lts-announce] 20180311 [SECURITY] [DLA 1306-1] vips security update
- [debian-lts-announce] 20180311 [SECURITY] [DLA 1306-1] vips security update
Modified: 2024-11-21
CVE-2019-17534
vips_foreign_load_gif_scan_image in foreign/gifload.c in libvips before 8.8.2 tries to access a color map before a DGifGetImageDesc call, leading to a use-after-free.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16796
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16796
- https://github.com/libvips/libvips/commit/ce684dd008532ea0bf9d4a1d89bacb35f4a83f4d
- https://github.com/libvips/libvips/commit/ce684dd008532ea0bf9d4a1d89bacb35f4a83f4d
- https://github.com/libvips/libvips/compare/v8.8.1...v8.8.2
- https://github.com/libvips/libvips/compare/v8.8.1...v8.8.2
Modified: 2024-11-21
CVE-2019-6976
libvips before 8.7.4 generates output images from uninitialized memory locations when processing corrupted input image data because iofuncs/memory.c does not zero out allocated memory. This can result in leaking raw process memory contents through the output image.
- https://blog.silentsignal.eu/2019/04/18/drop-by-drop-bleeding-through-libvips/
- https://github.com/libvips/libvips/commit/00622428bda8d7521db8d74260b519fa41d69d0a
- https://github.com/libvips/libvips/releases/tag/v8.7.4
- https://blog.silentsignal.eu/2019/04/18/drop-by-drop-bleeding-through-libvips/
- https://github.com/libvips/libvips/releases/tag/v8.7.4
- https://github.com/libvips/libvips/commit/00622428bda8d7521db8d74260b519fa41d69d0a
Modified: 2024-11-21
CVE-2020-20739
im_vips2dz in /libvips/libvips/deprecated/im_vips2dz.c in libvips before 8.8.2 has an uninitialized variable which may cause the leakage of remote server path or stack address.
- https://github.com/libvips/libvips/commit/2ab5aa7bf515135c2b02d42e9a72e4c98e17031a
- https://github.com/libvips/libvips/commit/2ab5aa7bf515135c2b02d42e9a72e4c98e17031a
- https://github.com/libvips/libvips/issues/1419
- https://github.com/libvips/libvips/issues/1419
- [debian-lts-announce] 20201130 [SECURITY] [DLA 2473-1] vips security update
- [debian-lts-announce] 20201130 [SECURITY] [DLA 2473-1] vips security update
- FEDORA-2020-d82261f7b1
- FEDORA-2020-d82261f7b1
Closed vulnerabilities
BDU:2021-03591
Уязвимость компонента tif_getimage.c библиотеки LibTIFF, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-03342
Уязвимость функции OGRExpatRealloc файла ogr/ogr_expat.cpp. библиотеки-транслятора для геопространственных данных GDAL, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-17545
GDAL through 3.0.1 has a poolDestroy double free in OGRExpatRealloc in ogr/ogr_expat.cpp when the 10MB threshold is exceeded.
- openSUSE-SU-2019:2466
- openSUSE-SU-2019:2466
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16178
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16178
- https://github.com/OSGeo/gdal/commit/148115fcc40f1651a5d15fa34c9a8c528e7147bb
- https://github.com/OSGeo/gdal/commit/148115fcc40f1651a5d15fa34c9a8c528e7147bb
- [debian-lts-announce] 20191109 [SECURITY] [DLA 1984-1] gdal security update
- [debian-lts-announce] 20191109 [SECURITY] [DLA 1984-1] gdal security update
- [debian-lts-announce] 20220112 [SECURITY] [DLA 2877-1] gdal security update
- [debian-lts-announce] 20220112 [SECURITY] [DLA 2877-1] gdal security update
- [debian-lts-announce] 20220930 [SECURITY] [DLA 3129-1] gdal security update
- [debian-lts-announce] 20220930 [SECURITY] [DLA 3129-1] gdal security update
- FEDORA-2019-f511b38b1f
- FEDORA-2019-f511b38b1f
- FEDORA-2019-a6960910d8
- FEDORA-2019-a6960910d8
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com//security-alerts/cpujul2021.html
Modified: 2024-12-20
CVE-2019-17546
tif_getimage.c in LibTIFF through 4.0.10, as used in GDAL through 3.0.1 and other products, has an integer overflow that potentially causes a heap-based buffer overflow via a crafted RGBA image, related to a "Negative-size-param" condition.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16443
- https://github.com/OSGeo/gdal/commit/21674033ee246f698887604c7af7ba1962a40ddf
- https://gitlab.com/libtiff/libtiff/commit/4bb584a35f87af42d6cf09d15e9ce8909a839145
- [debian-lts-announce] 20191126 [SECURITY] [DLA 2009-1] tiff security update
- [debian-lts-announce] 20200318 [SECURITY] [DLA 2147-1] gdal security update
- FEDORA-2020-2e9bd06377
- FEDORA-2020-6f1209bb45
- 20200121 [SECURITY] [DSA 4608-1] tiff security update
- GLSA-202003-25
- DSA-4608
- DSA-4670
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=16443
- DSA-4670
- https://security.netapp.com/advisory/ntap-20241220-0007/
- DSA-4608
- GLSA-202003-25
- 20200121 [SECURITY] [DSA 4608-1] tiff security update
- FEDORA-2020-6f1209bb45
- FEDORA-2020-2e9bd06377
- [debian-lts-announce] 20200318 [SECURITY] [DLA 2147-1] gdal security update
- [debian-lts-announce] 20191126 [SECURITY] [DLA 2009-1] tiff security update
- https://gitlab.com/libtiff/libtiff/commit/4bb584a35f87af42d6cf09d15e9ce8909a839145
- https://github.com/OSGeo/gdal/commit/21674033ee246f698887604c7af7ba1962a40ddf