ALT-BU-2025-7790-1
Branch c10f2 update bulletin.
Closed vulnerabilities
BDU:2023-03850
Уязвимость функции write_status_text_and_buffer компонента cpr.c программы для шифрования информации и создания электронных цифровых подписей GnuPG, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность
Modified: 2024-11-21
CVE-2022-34903
GnuPG through 2.3.6, in unusual situations where an attacker possesses any secret-key information from a victim's keyring and other constraints (e.g., use of GPGME) are met, allows signature forgery via injection into the status line.
- [oss-security] 20220702 Re: GnuPG signature spoofing via status line injection
- [oss-security] 20220702 Re: GnuPG signature spoofing via status line injection
- https://bugs.debian.org/1014157
- https://bugs.debian.org/1014157
- https://dev.gnupg.org/T6027
- https://dev.gnupg.org/T6027
- FEDORA-2022-0dbfb7e270
- FEDORA-2022-0dbfb7e270
- FEDORA-2022-aa14d396dd
- FEDORA-2022-aa14d396dd
- FEDORA-2022-1124e5882d
- FEDORA-2022-1124e5882d
- FEDORA-2022-1747eea46c
- FEDORA-2022-1747eea46c
- https://security.netapp.com/advisory/ntap-20220826-0005/
- https://security.netapp.com/advisory/ntap-20220826-0005/
- DSA-5174
- DSA-5174
- https://www.openwall.com/lists/oss-security/2022/06/30/1
- https://www.openwall.com/lists/oss-security/2022/06/30/1
Closed vulnerabilities
BDU:2022-01763
Уязвимость функции libpff_item_tree_create_node библиотеки для доступа к файлам PFF и OFF Libpff, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-11723
The libpff_name_to_id_map_entry_read function in libpff_name_to_id_map.c in libyal libpff through 2018-04-28 allows remote attackers to cause an information disclosure (heap-based buffer over-read) via a crafted pff file. NOTE: the vendor has disputed this as described in libyal/libpff issue 66 on GitHub
Modified: 2024-11-21
CVE-2018-20348
libpff_item_tree_create_node in libpff_item_tree.c in libpff before experimental-20180714 allows attackers to cause a denial of service (infinite recursion) via a crafted file, related to libfdata_tree_get_node_value in libfdata_tree.c.
Modified: 2024-11-21
CVE-2020-18897
An use-after-free vulnerability in the libpff_item_tree_create_node function of libyal Libpff before 20180623 allows attackers to cause a denial of service (DOS) or execute arbitrary code via a crafted pff file.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2017-9130
The faacEncOpen function in libfaac/frame.c in Freeware Advanced Audio Coder (FAAC) 1.28 allows remote attackers to cause a denial of service (invalid memory read and application crash) via a crafted wav file.
Package google-gson updated to version 2.9.1-alt1_1jpp11 for branch c10f2 in task 385533.
Closed vulnerabilities
BDU:2023-09014
Уязвимость пакета com.google.code.gson:gson библиотеки Gson, позволяющая нарушителю выполнить атаку типа «отказ в обслуживании» (DoS)
Modified: 2024-11-21
CVE-2022-25647
The package com.google.code.gson:gson before 2.8.9 are vulnerable to Deserialization of Untrusted Data via the writeReplace() method in internal classes, which may lead to DoS attacks.
- https://github.com/google/gson/pull/1991
- https://github.com/google/gson/pull/1991
- https://github.com/google/gson/pull/1991/commits
- https://github.com/google/gson/pull/1991/commits
- [debian-lts-announce] 20220513 [SECURITY] [DLA 3001-1] libgoogle-gson-java security update
- [debian-lts-announce] 20220513 [SECURITY] [DLA 3001-1] libgoogle-gson-java security update
- [debian-lts-announce] 20220907 [SECURITY] [DLA 3100-1] libgoogle-gson-java security update
- [debian-lts-announce] 20220907 [SECURITY] [DLA 3100-1] libgoogle-gson-java security update
- https://security.netapp.com/advisory/ntap-20220901-0009/
- https://security.netapp.com/advisory/ntap-20220901-0009/
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLECODEGSON-1730327
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLECODEGSON-1730327
- DSA-5227
- DSA-5227
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html