CVE-2020-29074
https://notcve.org/view.php?id=CVE-2020-29074
scan.c in x11vnc 0.9.16 uses IPC_CREAT|0777 in shmget calls, which allows access by actors other than the current user. El archivo scan.c en x11vnc versión 0.9.16, usa IPC_CREAT|0777 en llamadas shmget, lo que permite el acceso de actores distintos al usuario actual • https://github.com/LibVNC/x11vnc/commit/69eeb9f7baa14ca03b16c9de821f9876def7a36a https://lists.debian.org/debian-lts-announce/2020/12/msg00018.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/H2FLWSVH32O6JXLRQBYDQLP7XRSTLUPQ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MHVXHZE3YIP4RTWGQ24IDBSW44XPRDOC https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/PZL6NQTNK5PT63D2JX5YVV5OLUL76S5C https://www.debian.org/security • CWE-732: Incorrect Permission Assignment for Critical Resource •
CVE-2020-26890
https://notcve.org/view.php?id=CVE-2020-26890
Matrix Synapse before 1.20.0 erroneously permits non-standard NaN, Infinity, and -Infinity JSON values in fields of m.room.member events, allowing remote attackers to execute a denial of service attack against the federation and common Matrix clients. If such a malformed event is accepted into the room's state, the impact is long-lasting and is not fixed by an upgrade to a newer version, requiring the event to be manually redacted instead. Since events are replicated to servers of other room members, the impact is not constrained to the server of the event sender. Matrix Synapse versiones anteriores a 1.20.0, permite erróneamente valores de JSON NaN, Infinity e -Infinity no estándar en campos de eventos m.room.member, permitiendo a atacantes remotos ejecutar un ataque de denegación de servicio contra la federación y unos clientes comunes de Matrix. Si un evento malformado es aceptado en el estado de la sala, el impacto es duradero y no es corregido con una actualización a una versión más nueva, requiriendo que el evento sea redactado manualmente. • https://github.com/matrix-org/synapse/security/advisories/GHSA-4mp3-385r-v63f https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/G7YXMMYQP46PYL664JQUXCA3LPBJU7DQ https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/U34DPP4ZLOEDUY2ZCWOHQPU5GA5LYNUQ • CWE-20: Improper Input Validation •
CVE-2020-25725
https://notcve.org/view.php?id=CVE-2020-25725
In Xpdf 4.02, SplashOutputDev::endType3Char(GfxState *state) SplashOutputDev.cc:3079 is trying to use the freed `t3GlyphStack->cache`, which causes an `heap-use-after-free` problem. The codes of a previous fix for nested Type 3 characters wasn't correctly handling the case where a Type 3 char referred to another char in the same Type 3 font. En Xpdf versión 4.02, la función SplashOutputDev::endType3Char(GfxState *state) en el archivo SplashOutputDev.cc:3079, está tratando de usar "t3GlyphStack-)cache", el liberado, lo que causa un problema de "heap-use-after-free". Los códigos de una solución anterior para caracteres Type 3 anidados no manejaban correctamente el caso en el que un carácter Type 3 referenciada a otro carácter en la misma fuente Type 3 • https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-25725 https://forum.xpdfreader.com/viewtopic.php?f=3&t=41915 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/4ZUU5QG6SSVRTKZTR3A72LDRVZETEI63 https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VLOYVJSM54IL6I5RY4QTJGRS7PIEG44X • CWE-416: Use After Free •
CVE-2020-20740
https://notcve.org/view.php?id=CVE-2020-20740
PDFResurrect before 0.20 lack of header validation checks causes heap-buffer-overflow in pdf_get_version(). PDFResurrect versiones anteriores a 0,20, una falta de comprobaciones de la validación del encabezado causa un desbordamiento del búfer en la región heap de la memoria en la función pdf_get_version() • https://github.com/enferex/pdfresurrect/commit/1b422459f07353adce2878806d5247d9e91fb397 https://github.com/enferex/pdfresurrect/issues/14 https://lists.debian.org/debian-lts-announce/2020/12/msg00002.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JMEEEPBBGER5LPABBRVZLMCC6Z24RBXW https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZOIEVFM3SIMAEOFJKKMYH2TLZ7PXLSUD • CWE-787: Out-of-bounds Write •
CVE-2020-20739
https://notcve.org/view.php?id=CVE-2020-20739
im_vips2dz in /libvips/libvips/deprecated/im_vips2dz.c in libvips before 8.8.2 has an uninitialized variable which may cause the leakage of remote server path or stack address. En la función im_vips2dz en la biblioteca /libvips/libvips/deprecated/im_vips2dz.c en libvips versiones anteriores a 8.8.2, presenta una variable no inicializada que puede causar la filtración de la ruta del servidor remoto o la dirección de pila • https://github.com/libvips/libvips/commit/2ab5aa7bf515135c2b02d42e9a72e4c98e17031a https://github.com/libvips/libvips/issues/1419 https://lists.debian.org/debian-lts-announce/2020/11/msg00049.html https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZULVPQQ4QDFSQCXFYBUXEM7UXJAOKLSP • CWE-909: Missing Initialization of Resource •