Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.10.2021.0549
Kategorie:Mageia Linux Local Security Checks
Titel:Mageia: Security Advisory (MGASA-2021-0549)
Zusammenfassung:The remote host is missing an update for the 'curaengine' package(s) announced via the MGASA-2021-0549 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'curaengine' package(s) announced via the MGASA-2021-0549 advisory.

Vulnerability Insight:
Buffer overflow vulnerability in function stbi__extend_receive in
stb_image.h in stb 2.26 via a crafted JPEG file. (CVE-2021-28021)

An issue was discovered in stb stb_image.h 1.33 through 2.27. The HDR
loader parsed truncated end-of-file RLE scanlines as an infinite sequence
of zero-length runs. An attacker could potentially have caused denial of
service in applications using stb_image by submitting crafted HDR files.
(CVE-2021-42715)

An issue was discovered in stb stb_image.h 2.27. The PNM loader
incorrectly interpreted 16-bit PGM files as 8-bit when converting to RGBA,
leading to a buffer overflow when later reinterpreting the result as a
16-bit buffer. An attacker could potentially have crashed a service using
stb_image, or read up to 1024 bytes of non-consecutive heap data without
control over the read location. (CVE-2021-42716)

Affected Software/OS:
'curaengine' package(s) on Mageia 8.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2021-28021
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G2M5CRSGPRF7G3YB5CLU4FXW7ANNHAYT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AF2CNP4FVC6LDKNOO4WDCGNDYIP3MPK6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VP2YEXEAJWI76FPM7D7VXHWD3WESQEYC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3TDGZFLBOP27LZKLH45WQLSNPSPP7S7Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEGXBDEMTFGINETMJENBZ6SCHVEJQJSY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TXX76TJMZBPN3NU542MGN6B7C7QHRFGB/
https://github.com/nothings/stb/issues/1108
https://lists.debian.org/debian-lts-announce/2023/01/msg00045.html
Common Vulnerability Exposure (CVE) ID: CVE-2021-42715
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CI23LXPEV2GCDQTJSKO6CIILBDTI3R42/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FTZXHFZD36BGE5P6JF252NZZLKMGCY4T/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ID6II3RIKAMVGVMC6ZAQIXXYYDMTVC4N/
https://github.com/nothings/stb/issues/1224
https://github.com/nothings/stb/pull/1223
Common Vulnerability Exposure (CVE) ID: CVE-2021-42716
https://github.com/nothings/stb/issues/1166
https://github.com/nothings/stb/issues/1225
CopyrightCopyright (C) 2022 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.