Post Content
Category Archives: Advisories
GLSA 202501-11: PHP: Multiple Vulnerabilities
GLSA 202501-10: Mozilla Firefox: Multiple Vulnerabilities
GLSA 202501-09: QtWebEngine: Multiple Vulnerabilities
GLSA 202501-08: Qt: Buffer Overflow
DSA-5848-1 chromium – security update
Security issues were discovered in Chromium which could result
in the execution of arbitrary code, denial of service, or information
disclosure.
USN-7225-1: HTMLDOC vulnerabilities
It was discovered that HTMLDOC incorrectly handled memory in the
image_set_mask, git_read_lzw, write_header and write_node functions, which
could lead to a heap buffer overflow. An attacker could possibly use this
issue to cause a denial of service or execute arbitrary code. This issue
only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS, Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2022-0137, CVE-2022-24191, CVE-2022-34033,
CVE-2022-34035)
It was discovered that HTMLDOC incorrectly handled memory in the
gif_get_code function, which could lead to a segmentation fault. If a
user or application were tricked into opening a crafted GIF file, an
attacker could possibly use this issue to cause a denial of service.
This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS,
Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2022-0534)
It was discovered that HTMLDOC did not perform proper bounds checks on
image dimensions when loading JPEG images, which could lead to a buffer
overflow. If a user or application were tricked into opening a crafted
JPEG image, an attacker could possibly use this issue to cause a denial
of service. This issue only affected Ubuntu 14.04 LTS, Ubuntu 16.04 LTS,
Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS. (CVE-2022-27114)
It was discovered that HTMLDOC incorrectly handled memory in the
pdf_write_names function, which could lead to a heap buffer overflow. If
a user or application were tricked into opening a specially crafted file,
an attacker could possibly use this issue to cause a denial of service or
leak sensitive information. This issue only affected Ubuntu 14.04 LTS,
Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
(CVE-2022-28085)
It was discovered that HTMLDOC could be made to write out of bounds when
attempting to strip whitespace. An attacker could use this issue to cause
a denial of service or execute arbitrary code. (CVE-2024-45508)
It was discovered that HTMLDOC incorrectly handled memory in the parse_pre
function, which could lead to a heap buffer overflow. If a user or
application were tricked into opening a specially crafted file, an attacker
could possibly use this issue to cause a denial of service or execute
arbitrary code. (CVE-2024-46478)
USN-7224-1: Cyrus IMAP Server vulnerabilities
It was discovered that non-authentication-related HTTP requests could be
interpreted in an authentication context by a Cyrus IMAP Server when
multiple requests arrived over the same connection. An unauthenticated
attacker could possibly use this issue to perform a privilege escalation
attack. This issue only affected Ubuntu 18.04 LTS. (CVE-2019-18928)
Matthew Horsfall discovered that Cyrus IMAP Server utilized a poor string
hashing algorithm that could be abused to control where data was being
stored. An attacker could possibly use this issue to perform a denial of
service. This issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS.
(CVE-2021-33582)
Damian Poddebniak discovered that Cyrus IMAP Server could interpret
specially crafted commands to exploit a memory issue. An authenticated
attacker could possibly use this issue to perform a denial of service.
This issue only affected Ubuntu 22.04 LTS and Ubuntu 24.04 LTS.
(CVE-2024-34055)
USN-7223-1: OpenJPEG vulnerabilities
Frank Zeng discovered that OpenJPEG incorrectly handled memory when using
the decompression utility. An attacker could possibly use this issue to
cause a denial of service or execute arbitrary code. (CVE-2024-56826,
CVE-2024-56827)
USN-7222-1: BlueZ vulnerabilities
Lucas Leong discovered that BlueZ incorrectly handled the Phone Book Access
profile. If a user were tricked into connecting to a malicious Bluetooth
device, a remote attacker could possibly use this issue to execute
arbitrary code.