Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.1.10.2021.0549
Categoría:Mageia Linux Local Security Checks
Título:Mageia: Security Advisory (MGASA-2021-0549)
Resumen:The remote host is missing an update for the 'curaengine' package(s) announced via the MGASA-2021-0549 advisory.
Descripción:Summary:
The remote host is missing an update for the 'curaengine' package(s) announced via the MGASA-2021-0549 advisory.

Vulnerability Insight:
Buffer overflow vulnerability in function stbi__extend_receive in
stb_image.h in stb 2.26 via a crafted JPEG file. (CVE-2021-28021)

An issue was discovered in stb stb_image.h 1.33 through 2.27. The HDR
loader parsed truncated end-of-file RLE scanlines as an infinite sequence
of zero-length runs. An attacker could potentially have caused denial of
service in applications using stb_image by submitting crafted HDR files.
(CVE-2021-42715)

An issue was discovered in stb stb_image.h 2.27. The PNM loader
incorrectly interpreted 16-bit PGM files as 8-bit when converting to RGBA,
leading to a buffer overflow when later reinterpreting the result as a
16-bit buffer. An attacker could potentially have crashed a service using
stb_image, or read up to 1024 bytes of non-consecutive heap data without
control over the read location. (CVE-2021-42716)

Affected Software/OS:
'curaengine' package(s) on Mageia 8.

Solution:
Please install the updated package(s).

CVSS Score:
6.8

CVSS Vector:
AV:N/AC:M/Au:N/C:P/I:P/A:P

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2021-28021
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G2M5CRSGPRF7G3YB5CLU4FXW7ANNHAYT/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AF2CNP4FVC6LDKNOO4WDCGNDYIP3MPK6/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VP2YEXEAJWI76FPM7D7VXHWD3WESQEYC/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3TDGZFLBOP27LZKLH45WQLSNPSPP7S7Z/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/BEGXBDEMTFGINETMJENBZ6SCHVEJQJSY/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TXX76TJMZBPN3NU542MGN6B7C7QHRFGB/
https://github.com/nothings/stb/issues/1108
https://lists.debian.org/debian-lts-announce/2023/01/msg00045.html
Common Vulnerability Exposure (CVE) ID: CVE-2021-42715
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CI23LXPEV2GCDQTJSKO6CIILBDTI3R42/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FTZXHFZD36BGE5P6JF252NZZLKMGCY4T/
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ID6II3RIKAMVGVMC6ZAQIXXYYDMTVC4N/
https://github.com/nothings/stb/issues/1224
https://github.com/nothings/stb/pull/1223
Common Vulnerability Exposure (CVE) ID: CVE-2021-42716
https://github.com/nothings/stb/issues/1166
https://github.com/nothings/stb/issues/1225
CopyrightCopyright (C) 2022 Greenbone AG

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.