Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.1.10.2022.0074
Kategorie:Mageia Linux Local Security Checks
Titel:Mageia: Security Advisory (MGASA-2022-0074)
Zusammenfassung:The remote host is missing an update for the 'zxing-cpp' package(s) announced via the MGASA-2022-0074 advisory.
Beschreibung:Summary:
The remote host is missing an update for the 'zxing-cpp' package(s) announced via the MGASA-2022-0074 advisory.

Vulnerability Insight:
Buffer overflow vulnerability in function stbi__extend_receive in stb_image.h
in stb 2.26 via a crafted JPEG file. (CVE-2021-28021)

An issue was discovered in stb stb_image.h 1.33 through 2.27. The HDR loader
parsed truncated end-of-file RLE scanlines as an infinite sequence of
zero-length runs. An attacker could potentially have caused denial of service
in applications using stb_image by submitting crafted HDR files.
(CVE-2021-42715)

An issue was discovered in stb stb_image.h 2.27. The PNM loader incorrectly
interpreted 16-bit PGM files as 8-bit when converting to RGBA, leading to a
buffer overflow when later reinterpreting the result as a 16-bit buffer. An
attacker could potentially have crashed a service using stb_image, or read up
to 1024 bytes of non-consecutive heap data without control over the read
location. (CVE-2021-42716)

Affected Software/OS:
'zxing-cpp' package(s) on Mageia 8.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2021-28021
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G2M5CRSGPRF7G3YB5CLU4FXW7ANNHAYT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AF2CNP4FVC6LDKNOO4WDCGNDYIP3MPK6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VP2YEXEAJWI76FPM7D7VXHWD3WESQEYC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3TDGZFLBOP27LZKLH45WQLSNPSPP7S7Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEGXBDEMTFGINETMJENBZ6SCHVEJQJSY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TXX76TJMZBPN3NU542MGN6B7C7QHRFGB/
https://github.com/nothings/stb/issues/1108
https://lists.debian.org/debian-lts-announce/2023/01/msg00045.html
Common Vulnerability Exposure (CVE) ID: CVE-2021-42715
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CI23LXPEV2GCDQTJSKO6CIILBDTI3R42/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FTZXHFZD36BGE5P6JF252NZZLKMGCY4T/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ID6II3RIKAMVGVMC6ZAQIXXYYDMTVC4N/
https://github.com/nothings/stb/issues/1224
https://github.com/nothings/stb/pull/1223
Common Vulnerability Exposure (CVE) ID: CVE-2021-42716
https://github.com/nothings/stb/issues/1166
https://github.com/nothings/stb/issues/1225
CopyrightCopyright (C) 2022 Greenbone AG

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.