ALT-BU-2025-1873-2
Branch p10 update bulletin.
Closed vulnerabilities
Modified: 2025-02-21
CVE-2024-45336
The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to a.com/ containing an Authorization header which is redirected to b.com/ will not send that header to b.com. In the event that the client received a subsequent same-domain redirect, however, the sensitive headers would be restored. For example, a chain of redirects from a.com/, to b.com/1, and finally to b.com/2 would incorrectly send the Authorization header to b.com/2.
Modified: 2025-02-21
CVE-2024-45341
A certificate with a URI which has a IPv6 address with a zone ID may incorrectly satisfy a URI name constraint that applies to the certificate chain. Certificates containing URIs are not permitted in the web PKI, so this only affects users of private PKIs which make use of URIs.
Closed vulnerabilities
BDU:2024-03241
Уязвимость функции JpegEncoder::Encode декодера и кодировщика форматов файлов libheif, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-09439
Уязвимость функции ImageOverlay::parse() декодера и кодировщика форматов видео и фото файлов libheif, позволяющая нарушителю получить доступ к конфиденциальной информации
Modified: 2025-03-24
CVE-2024-25269
libheif <= 1.17.6 contains a memory leak in the function JpegEncoder::Encode. This flaw allows an attacker to cause a denial of service attack.
Modified: 2025-03-24
CVE-2024-41311
In Libheif 1.17.6, insufficient checks in ImageOverlay::parse() decoding a heif file containing an overlay image with forged offsets can lead to an out-of-bounds read and write.
- https://gist.github.com/flyyee/79f1b224069842ee320115cafa5c35c0
- https://github.com/strukturag/libheif/commit/a3ed1b1eb178c5d651d6ac619c8da3d71ac2be36
- https://github.com/strukturag/libheif/issues/1226
- https://github.com/strukturag/libheif/pull/1227
- https://lists.debian.org/debian-lts-announce/2024/10/msg00025.html