ALT-PU-2025-10401-2
Closed vulnerabilities
BDU:2015-07399
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-07400
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-07401
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-07402
Уязвимость операционной системы Red Hat Enterprise Linux, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08513
Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08514
Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08515
Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
BDU:2015-08516
Уязвимость операционной системы CentOS, позволяющая удаленному злоумышленнику нарушить конфиденциальность, целостность и доступность защищаемой информации
Modified: 2025-04-03
CVE-2006-3376
Integer overflow in player.c in libwmf 0.2.8.4, as used in multiple products including (1) wv, (2) abiword, (3) freetype, (4) gimp, (5) libgsf, and (6) imagemagick allows remote attackers to execute arbitrary code via the MaxRecordSize header field in a WMF file.
- http://rhn.redhat.com/errata/RHSA-2006-0597.html
- http://secunia.com/advisories/20921
- http://secunia.com/advisories/21064
- http://secunia.com/advisories/21261
- http://secunia.com/advisories/21419
- http://secunia.com/advisories/21459
- http://secunia.com/advisories/21473
- http://secunia.com/advisories/22311
- http://security.gentoo.org/glsa/glsa-200608-17.xml
- http://securityreason.com/securityalert/1190
- http://securitytracker.com/id?1016518
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:132
- http://www.novell.com/linux/security/advisories/2006_19_sr.html
- http://www.securityfocus.com/archive/1/438803/100/0/threaded
- http://www.securityfocus.com/bid/18751
- http://www.ubuntu.com/usn/usn-333-1
- http://www.vupen.com/english/advisories/2006/2646
- https://exchange.xforce.ibmcloud.com/vulnerabilities/27516
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10262
- https://www.debian.org/security/2006/dsa-1194
- http://rhn.redhat.com/errata/RHSA-2006-0597.html
- http://secunia.com/advisories/20921
- http://secunia.com/advisories/21064
- http://secunia.com/advisories/21261
- http://secunia.com/advisories/21419
- http://secunia.com/advisories/21459
- http://secunia.com/advisories/21473
- http://secunia.com/advisories/22311
- http://security.gentoo.org/glsa/glsa-200608-17.xml
- http://securityreason.com/securityalert/1190
- http://securitytracker.com/id?1016518
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:132
- http://www.novell.com/linux/security/advisories/2006_19_sr.html
- http://www.securityfocus.com/archive/1/438803/100/0/threaded
- http://www.securityfocus.com/bid/18751
- http://www.ubuntu.com/usn/usn-333-1
- http://www.vupen.com/english/advisories/2006/2646
- https://exchange.xforce.ibmcloud.com/vulnerabilities/27516
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10262
- https://www.debian.org/security/2006/dsa-1194
Modified: 2025-04-09
CVE-2009-1364
Use-after-free vulnerability in the embedded GD library in libwmf 0.2.8.4 allows context-dependent attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted WMF file.
- http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html
- http://lists.opensuse.org/opensuse-updates/2015-06/msg00051.html
- http://lists.opensuse.org/opensuse-updates/2015-06/msg00053.html
- http://rhn.redhat.com/errata/RHSA-2009-0457.html
- http://secunia.com/advisories/34901
- http://secunia.com/advisories/34964
- http://secunia.com/advisories/35001
- http://secunia.com/advisories/35025
- http://secunia.com/advisories/35190
- http://secunia.com/advisories/35416
- http://secunia.com/advisories/35686
- http://security.gentoo.org/glsa/glsa-200907-01.xml
- http://wvware.cvs.sourceforge.net/viewvc/wvware/libwmf2/src/extra/Makefile.am?hideattic=0&view=log
- http://www.debian.org/security/2009/dsa-1796
- http://www.mandriva.com/security/advisories?name=MDVSA-2009:106
- http://www.securityfocus.com/bid/34792
- http://www.securitytracker.com/id?1022154
- http://www.ubuntu.com/usn/USN-769-1
- http://www.vupen.com/english/advisories/2009/1228
- https://bugzilla.redhat.com/show_bug.cgi?id=496864
- https://exchange.xforce.ibmcloud.com/vulnerabilities/50290
- https://launchpad.net/bugs/cve/2009-1364
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10959
- https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01263.html
- https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01266.html
- https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01269.html
- http://lists.opensuse.org/opensuse-security-announce/2009-06/msg00003.html
- http://lists.opensuse.org/opensuse-updates/2015-06/msg00051.html
- http://lists.opensuse.org/opensuse-updates/2015-06/msg00053.html
- http://rhn.redhat.com/errata/RHSA-2009-0457.html
- http://secunia.com/advisories/34901
- http://secunia.com/advisories/34964
- http://secunia.com/advisories/35001
- http://secunia.com/advisories/35025
- http://secunia.com/advisories/35190
- http://secunia.com/advisories/35416
- http://secunia.com/advisories/35686
- http://security.gentoo.org/glsa/glsa-200907-01.xml
- http://wvware.cvs.sourceforge.net/viewvc/wvware/libwmf2/src/extra/Makefile.am?hideattic=0&view=log
- http://www.debian.org/security/2009/dsa-1796
- http://www.mandriva.com/security/advisories?name=MDVSA-2009:106
- http://www.securityfocus.com/bid/34792
- http://www.securitytracker.com/id?1022154
- http://www.ubuntu.com/usn/USN-769-1
- http://www.vupen.com/english/advisories/2009/1228
- https://bugzilla.redhat.com/show_bug.cgi?id=496864
- https://exchange.xforce.ibmcloud.com/vulnerabilities/50290
- https://launchpad.net/bugs/cve/2009-1364
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10959
- https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01263.html
- https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01266.html
- https://www.redhat.com/archives/fedora-package-announce/2009-May/msg01269.html
Modified: 2025-04-12
CVE-2015-0848
Heap-based buffer overflow in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted BMP image.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160668.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168507.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165547.html
- http://lists.opensuse.org/opensuse-updates/2015-06/msg00051.html
- http://lists.opensuse.org/opensuse-updates/2015-06/msg00053.html
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00018.html
- http://rhn.redhat.com/errata/RHSA-2015-1917.html
- http://www.debian.org/security/2015/dsa-3302
- http://www.openwall.com/lists/oss-security/2015/06/01/2
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/74923
- http://www.securitytracker.com/id/1032771
- http://www.ubuntu.com/usn/USN-2670-1
- https://security.gentoo.org/glsa/201602-03
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160668.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-October/168507.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/165547.html
- http://lists.opensuse.org/opensuse-updates/2015-06/msg00051.html
- http://lists.opensuse.org/opensuse-updates/2015-06/msg00053.html
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00018.html
- http://rhn.redhat.com/errata/RHSA-2015-1917.html
- http://www.debian.org/security/2015/dsa-3302
- http://www.openwall.com/lists/oss-security/2015/06/01/2
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/74923
- http://www.securitytracker.com/id/1032771
- http://www.ubuntu.com/usn/USN-2670-1
- https://security.gentoo.org/glsa/201602-03
Modified: 2025-04-12
CVE-2015-4588
Heap-based buffer overflow in the DecodeImage function in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (crash) or possibly execute arbitrary code via a crafted "run-length count" in an image in a WMF file.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160668.html
- http://lists.opensuse.org/opensuse-updates/2015-06/msg00051.html
- http://lists.opensuse.org/opensuse-updates/2015-06/msg00053.html
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00018.html
- http://rhn.redhat.com/errata/RHSA-2015-1917.html
- http://www.debian.org/security/2015/dsa-3302
- http://www.openwall.com/lists/oss-security/2015/06/03/6
- http://www.openwall.com/lists/oss-security/2015/06/16/4
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/75230
- http://www.securitytracker.com/id/1032771
- http://www.ubuntu.com/usn/USN-2670-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1227243
- https://security.gentoo.org/glsa/201602-03
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/160668.html
- http://lists.opensuse.org/opensuse-updates/2015-06/msg00051.html
- http://lists.opensuse.org/opensuse-updates/2015-06/msg00053.html
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00018.html
- http://rhn.redhat.com/errata/RHSA-2015-1917.html
- http://www.debian.org/security/2015/dsa-3302
- http://www.openwall.com/lists/oss-security/2015/06/03/6
- http://www.openwall.com/lists/oss-security/2015/06/16/4
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/75230
- http://www.securitytracker.com/id/1032771
- http://www.ubuntu.com/usn/USN-2670-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1227243
- https://security.gentoo.org/glsa/201602-03
Modified: 2025-04-12
CVE-2015-4695
meta.h in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (out-of-bounds read) via a crafted WMF file.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162569.html
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00018.html
- http://rhn.redhat.com/errata/RHSA-2015-1917.html
- http://www.debian.org/security/2015/dsa-3302
- http://www.openwall.com/lists/oss-security/2015/06/17/3
- http://www.openwall.com/lists/oss-security/2015/06/21/3
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/75329
- http://www.securitytracker.com/id/1032771
- http://www.ubuntu.com/usn/USN-2670-1
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784205
- https://security.gentoo.org/glsa/201602-03
- http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162569.html
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00018.html
- http://rhn.redhat.com/errata/RHSA-2015-1917.html
- http://www.debian.org/security/2015/dsa-3302
- http://www.openwall.com/lists/oss-security/2015/06/17/3
- http://www.openwall.com/lists/oss-security/2015/06/21/3
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/75329
- http://www.securitytracker.com/id/1032771
- http://www.ubuntu.com/usn/USN-2670-1
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784205
- https://security.gentoo.org/glsa/201602-03
Modified: 2025-04-12
CVE-2015-4696
Use-after-free vulnerability in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (crash) via a crafted WMF file to the (1) wmf2gd or (2) wmf2eps command.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162569.html
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00018.html
- http://rhn.redhat.com/errata/RHSA-2015-1917.html
- http://www.debian.org/security/2015/dsa-3302
- http://www.openwall.com/lists/oss-security/2015/06/17/3
- http://www.openwall.com/lists/oss-security/2015/06/21/3
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/75331
- http://www.securitytracker.com/id/1032771
- http://www.ubuntu.com/usn/USN-2670-1
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784192
- https://security.gentoo.org/glsa/201602-03
- http://lists.fedoraproject.org/pipermail/package-announce/2015-July/162569.html
- http://lists.opensuse.org/opensuse-updates/2015-07/msg00018.html
- http://rhn.redhat.com/errata/RHSA-2015-1917.html
- http://www.debian.org/security/2015/dsa-3302
- http://www.openwall.com/lists/oss-security/2015/06/17/3
- http://www.openwall.com/lists/oss-security/2015/06/21/3
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/75331
- http://www.securitytracker.com/id/1032771
- http://www.ubuntu.com/usn/USN-2670-1
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=784192
- https://security.gentoo.org/glsa/201602-03
Modified: 2025-04-20
CVE-2016-9011
The wmf_malloc function in api.c in libwmf 0.2.8.4 allows remote attackers to cause a denial of service (application crash) via a crafted wmf file, which triggers a memory allocation failure.
- http://www.openwall.com/lists/oss-security/2016/10/25/1
- http://www.securityfocus.com/bid/93860
- https://blogs.gentoo.org/ago/2016/10/18/libwmf-memory-allocation-failure-in-wmf_malloc-api-c
- https://bugzilla.redhat.com/show_bug.cgi?id=1388450
- http://www.openwall.com/lists/oss-security/2016/10/25/1
- http://www.securityfocus.com/bid/93860
- https://blogs.gentoo.org/ago/2016/10/18/libwmf-memory-allocation-failure-in-wmf_malloc-api-c
- https://bugzilla.redhat.com/show_bug.cgi?id=1388450