<?xml version="1.0" encoding="utf-8"?>
<feed xmlns="http://www.w3.org/2005/Atom">
	<title type="html"><![CDATA[HyperForum — [Hyperbola] Current security-threads overview]]></title>
	<link rel="self" href="https://forums.hyperbola.info/extern.php?action=feed&amp;tid=1018&amp;type=atom" />
	<updated>2025-06-24T21:31:28Z</updated>
	<generator>PunBB</generator>
	<id>https://forums.hyperbola.info/viewtopic.php?id=1018</id>
		<entry>
			<title type="html"><![CDATA[Re: [Hyperbola] Current security-threads overview]]></title>
			<link rel="alternate" href="https://forums.hyperbola.info/viewtopic.php?pid=8641#p8641" />
			<content type="html"><![CDATA[<p><strong><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-5222">CVE-2025-5222</a></strong>:&nbsp; A stack buffer overflow was found in ICU version 76.0.1. While running the genrb binary the &#039;subtag&#039; struct is overflowed in SRBRoot::addTag function. This may lead to memory corruption and arbitrary code execution.</p><p><strong>Conclusion:</strong> Our version of <strong>icu</strong> is not affected and there is no need for a fix.</p>]]></content>
			<author>
				<name><![CDATA[throgh]]></name>
				<uri>https://forums.hyperbola.info/profile.php?id=347</uri>
			</author>
			<updated>2025-06-24T21:31:28Z</updated>
			<id>https://forums.hyperbola.info/viewtopic.php?pid=8641#p8641</id>
		</entry>
		<entry>
			<title type="html"><![CDATA[Re: [Hyperbola] Current security-threads overview]]></title>
			<link rel="alternate" href="https://forums.hyperbola.info/viewtopic.php?pid=8633#p8633" />
			<content type="html"><![CDATA[<p><strong><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-40775">CVE-2025-40775</a></strong>:&nbsp; When an incoming DNS protocol message includes a Transaction Signature (TSIG), BIND always checks it. If the TSIG contains an invalid value in the algorithm field, BIND immediately aborts with an assertion failure. This issue affects BIND 9 versions 9.20.0 through 9.20.8 and 9.21.0 through 9.21.7. </p><p><strong>Conclusion:</strong> Our version of <strong>bind</strong> is not affected and there is no need for a fix.</p>]]></content>
			<author>
				<name><![CDATA[throgh]]></name>
				<uri>https://forums.hyperbola.info/profile.php?id=347</uri>
			</author>
			<updated>2025-05-22T00:11:26Z</updated>
			<id>https://forums.hyperbola.info/viewtopic.php?pid=8633#p8633</id>
		</entry>
		<entry>
			<title type="html"><![CDATA[Re: [Hyperbola] Current security-threads overview]]></title>
			<link rel="alternate" href="https://forums.hyperbola.info/viewtopic.php?pid=8626#p8626" />
			<content type="html"><![CDATA[<p><strong><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-23016">CVE-2025-23016</a></strong>:&nbsp; FastCGI fcgi2 (aka fcgi) 2.x through 2.4.4 has an integer overflow (and resultant heap-based buffer overflow) via crafted nameLen or valueLen values in data to the IPC socket. This occurs in ReadParams in fcgiapp.c. </p><p><strong>Conclusion:</strong> We have prepared and backported security-patches for our version of <strong>fcgi</strong>.</p>]]></content>
			<author>
				<name><![CDATA[throgh]]></name>
				<uri>https://forums.hyperbola.info/profile.php?id=347</uri>
			</author>
			<updated>2025-05-06T22:21:43Z</updated>
			<id>https://forums.hyperbola.info/viewtopic.php?pid=8626#p8626</id>
		</entry>
		<entry>
			<title type="html"><![CDATA[Re: [Hyperbola] Current security-threads overview]]></title>
			<link rel="alternate" href="https://forums.hyperbola.info/viewtopic.php?pid=8625#p8625" />
			<content type="html"><![CDATA[<p><strong><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2760">CVE-2025-2760</a></strong>: GIMP XWD File Parsing Integer Overflow Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of XWD files. The issue results from the lack of proper validation of user-supplied data, which can result in an integer overflow before allocating a buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25082. </p><p><strong><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-2761">CVE-2025-2761</a></strong>:&nbsp; GIMP FLI File Parsing Out-Of-Bounds Write Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of GIMP. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the parsing of FLI files. The issue results from the lack of proper validation of user-supplied data, which can result in a write past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the current process. Was ZDI-CAN-25100. </p><p><strong>Conclusion:</strong> We have prepared security-patches for our version of <strong>gimp</strong>. Furthermore we will remove the following plugins:</p><p>file-dds<br />file-ico<br />file-fax3g<br />file-psd</p><p>Sorry for everyone using PSD-files for import / export. But we do not plan with those file-formats as <strong>gimp</strong> has sufficient others. ico-files can be converted and created on different ways (<strong>graphicsmagick</strong>). So there is no loss in any way, just a win in security-fixes.</p>]]></content>
			<author>
				<name><![CDATA[throgh]]></name>
				<uri>https://forums.hyperbola.info/profile.php?id=347</uri>
			</author>
			<updated>2025-05-06T21:26:00Z</updated>
			<id>https://forums.hyperbola.info/viewtopic.php?pid=8625#p8625</id>
		</entry>
		<entry>
			<title type="html"><![CDATA[Re: [Hyperbola] Current security-threads overview]]></title>
			<link rel="alternate" href="https://forums.hyperbola.info/viewtopic.php?pid=8622#p8622" />
			<content type="html"><![CDATA[<p><strong><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32414">CVE-2025-32414</a></strong>: In libxml2 before 2.13.8 and 2.14.x before 2.14.2, out-of-bounds memory access can occur in the Python API (Python bindings) because of an incorrect return value. This occurs in xmlPythonFileRead and xmlPythonFileReadRaw because of a difference between bytes and characters. </p><p><strong><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32415">CVE-2025-32415</a></strong>:&nbsp; In libxml2 before 2.13.8 and 2.14.x before 2.14.2, xmlSchemaIDCFillNodeTables in xmlschemas.c has a heap-based buffer under-read. To exploit this, a crafted XML document must be validated against an XML schema with certain identity constraints, or a crafted XML schema must be used. </p><p><strong>Conclusion:</strong> We have prepared security-patches for our version of <strong>libxml2</strong>.</p>]]></content>
			<author>
				<name><![CDATA[throgh]]></name>
				<uri>https://forums.hyperbola.info/profile.php?id=347</uri>
			</author>
			<updated>2025-04-26T10:03:09Z</updated>
			<id>https://forums.hyperbola.info/viewtopic.php?pid=8622#p8622</id>
		</entry>
		<entry>
			<title type="html"><![CDATA[Re: [Hyperbola] Current security-threads overview]]></title>
			<link rel="alternate" href="https://forums.hyperbola.info/viewtopic.php?pid=8621#p8621" />
			<content type="html"><![CDATA[<p><strong><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-32464">CVE-2025-32464</a></strong>: HAProxy 2.2 through 3.1.6, in certain uncommon configurations, has a sample_conv_regsub heap-based buffer overflow because of mishandling of the replacement of multiple short patterns with a longer one. </p><p><strong>Conclusion:</strong> We have prepared already security-patches for our version of <strong>haproxy</strong>.</p>]]></content>
			<author>
				<name><![CDATA[throgh]]></name>
				<uri>https://forums.hyperbola.info/profile.php?id=347</uri>
			</author>
			<updated>2025-04-23T21:59:01Z</updated>
			<id>https://forums.hyperbola.info/viewtopic.php?pid=8621#p8621</id>
		</entry>
		<entry>
			<title type="html"><![CDATA[Re: [Hyperbola] Current security-threads overview]]></title>
			<link rel="alternate" href="https://forums.hyperbola.info/viewtopic.php?pid=8620#p8620" />
			<content type="html"><![CDATA[<p><strong><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-3155">CVE-2025-3155</a></strong>: A flaw was found in Yelp. The Gnome user help application allows the help document to execute arbitrary scripts. This vulnerability allows malicious users to input help documents, which may exfiltrate user files to an external environment. </p><p><strong>Conclusion:</strong> We have prepared already security-patches for our version of <strong>yelp</strong>.</p>]]></content>
			<author>
				<name><![CDATA[throgh]]></name>
				<uri>https://forums.hyperbola.info/profile.php?id=347</uri>
			</author>
			<updated>2025-04-23T21:51:20Z</updated>
			<id>https://forums.hyperbola.info/viewtopic.php?pid=8620#p8620</id>
		</entry>
		<entry>
			<title type="html"><![CDATA[Re: [Hyperbola] Current security-threads overview]]></title>
			<link rel="alternate" href="https://forums.hyperbola.info/viewtopic.php?pid=8579#p8579" />
			<content type="html"><![CDATA[<p><strong><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-49043">CVE-2022-49043</a></strong>: xmlXIncludeAddNode in xinclude.c in libxml2 before 2.11.0 has a use-after-free. </p><p><strong><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-39615">CVE-2023-39615</a></strong>: Xmlsoft Libxml2 v2.11.0 was discovered to contain an out-of-bounds read via the xmlSAX2StartElement() function at /libxml2/SAX2.c. This vulnerability allows attackers to cause a Denial of Service (DoS) via supplying a crafted XML file. NOTE: the vendor&#039;s position is that the product does not support the legacy SAX1 interface with custom callbacks; there is a crash even without crafted input.</p><p><strong><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-45322">CVE-2023-45322</a></strong>: libxml2 through 2.11.5 has a use-after-free that can only occur after a certain memory allocation fails. This occurs in xmlUnlinkNode in tree.c. NOTE: the vendor&#039;s position is &quot;I don&#039;t think these issues are critical enough to warrant a CVE ID ... because an attacker typically can&#039;t control when memory allocations fail.&quot;</p><p><strong><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-25062">CVE-2024-25062</a></strong>: An issue was discovered in libxml2 before 2.11.7 and 2.12.x before 2.12.5. When using the XML Reader interface with DTD validation and XInclude expansion enabled, processing crafted XML documents can lead to an xmlValidatePopElement use-after-free.</p><p><strong>Conclusion:</strong> We have prepared already security-patches for our version of <strong>libxml2</strong>.</p>]]></content>
			<author>
				<name><![CDATA[throgh]]></name>
				<uri>https://forums.hyperbola.info/profile.php?id=347</uri>
			</author>
			<updated>2025-02-23T23:39:11Z</updated>
			<id>https://forums.hyperbola.info/viewtopic.php?pid=8579#p8579</id>
		</entry>
		<entry>
			<title type="html"><![CDATA[Re: [Hyperbola] Current security-threads overview]]></title>
			<link rel="alternate" href="https://forums.hyperbola.info/viewtopic.php?pid=8577#p8577" />
			<content type="html"><![CDATA[<p><strong><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-41160">CVE-2021-41160</a></strong>: In affected versions a malicious server might trigger out of bound writes in a connected client. Connections using GDI or SurfaceCommands to send graphics updates to the client might send `0` width/height or out of bound rectangles to trigger out of bound writes. With `0` width or heigth the memory allocation will be `0` but the missing bounds checks allow writing to the pointer at this (not allocated) region.</p><p><strong><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-24883">CVE-2022-24883</a></strong>: Prior to version 2.7.0, server side authentication against a `SAM` file might be successful for invalid credentials if the server has configured an invalid `SAM` file path. FreeRDP based clients are not affected. RDP server implementations using FreeRDP to authenticate against a `SAM` file are affected. Version 2.7.0 contains a fix for this issue. As a workaround, use custom authentication via `HashCallback` and/or ensure the `SAM` database path configured is valid and the application has file handles left. </p><p><strong>Conclusion:</strong> We have prepared already security-patches for our version of <strong>freerdp</strong>.</p>]]></content>
			<author>
				<name><![CDATA[throgh]]></name>
				<uri>https://forums.hyperbola.info/profile.php?id=347</uri>
			</author>
			<updated>2025-02-17T00:04:58Z</updated>
			<id>https://forums.hyperbola.info/viewtopic.php?pid=8577#p8577</id>
		</entry>
		<entry>
			<title type="html"><![CDATA[Re: [Hyperbola] Current security-threads overview]]></title>
			<link rel="alternate" href="https://forums.hyperbola.info/viewtopic.php?pid=8480#p8480" />
			<content type="html"><![CDATA[<p><strong><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-0847">CVE-2022-0847</a></strong>: A flaw was found in the way the &quot;flags&quot; member of the new pipe buffer structure was lacking proper initialization in copy_page_to_iter_pipe and push_pipe functions in the Linux kernel and could thus contain stale values. An unprivileged local user could use this flaw to write to pages in the page cache backed by read only files and as such escalate their privileges on the system. </p><p><strong>Conclusion:</strong> The security-threat does not apply to our system / kernel.</p>]]></content>
			<author>
				<name><![CDATA[throgh]]></name>
				<uri>https://forums.hyperbola.info/profile.php?id=347</uri>
			</author>
			<updated>2024-12-04T17:18:49Z</updated>
			<id>https://forums.hyperbola.info/viewtopic.php?pid=8480#p8480</id>
		</entry>
		<entry>
			<title type="html"><![CDATA[Re: [Hyperbola] Current security-threads overview]]></title>
			<link rel="alternate" href="https://forums.hyperbola.info/viewtopic.php?pid=8474#p8474" />
			<content type="html"><![CDATA[<p><strong>Generic:</strong>&nbsp; A generic warning about interpreter-projects like <a href="https://godotengine.org/">Godot</a>. As of now further details gone clear we can clearly state that we won&#039;t package and include any of those interpreter-engines at any given time, especially not the <strong>Godot</strong> named framework. The reasoning behind is here to read: <a href="https://research.checkpoint.com/2024/gaming-engines-an-undetected-playground-for-malware-loaders/">https://research.checkpoint.com/2024/ga … e-loaders/</a></p><p>We can only warn about too much trust, even though the projects and packages are marked as &quot;free and permissive&quot;. Nevertheless never forget they are software running and the more complex it gets the more problematic it can be.</p><p>Use also verification of attack-vectors, common known steps from recurring attacks:</p><ul><li><p><strong>Manipulated repositories:</strong> Attacker using widely known and used platforms like Github to create false or fake projects, including malicious code</p></li><li><p><strong>Compromised dependencies:</strong> In this case malicious code is added within the libraries and frameworks other projects are using</p></li><li><p><strong>Social engineering:</strong> In some cases attacking groups and / or individuals pretend first to grant help and support for a project and when getting more rights likewise to modify and add code start with adding their malicious actions</p></li></ul><p>Free software is always based on trust and therefore those attacks are very harmful for the future of free and libre software and culture. Also the further analysis of this current thread shows exactly why Hyperbola as project persists on exactly a full package and software running <strong>only local</strong> after the installation. We do not plan to include any kind of software sideloading further data after its installation without the users knowledge and we will always patch or remove packages (applications) when adding such demands and features.</p>]]></content>
			<author>
				<name><![CDATA[throgh]]></name>
				<uri>https://forums.hyperbola.info/profile.php?id=347</uri>
			</author>
			<updated>2024-11-29T02:42:33Z</updated>
			<id>https://forums.hyperbola.info/viewtopic.php?pid=8474#p8474</id>
		</entry>
		<entry>
			<title type="html"><![CDATA[Re: [Hyperbola] Current security-threads overview]]></title>
			<link rel="alternate" href="https://forums.hyperbola.info/viewtopic.php?pid=8458#p8458" />
			<content type="html"><![CDATA[<p><strong><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-9680">CVE-2024-9680</a></strong>: An attacker was able to achieve code execution in the content process by exploiting a use-after-free in Animation timelines. We have had reports of this vulnerability being exploited in the wild. This vulnerability affects Firefox &lt; 131.0.2, Firefox ESR &lt; 128.3.1, Firefox ESR &lt; 115.16.1, Thunderbird &lt; 131.0.1, Thunderbird &lt; 128.3.1, and Thunderbird &lt; 115.16.0. </p><p><strong>Conclusion:</strong> The security-threat does not apply to UXP and therefore not to <strong>iceweasel-uxp</strong> and <strong>icedove-uxp</strong>.</p>]]></content>
			<author>
				<name><![CDATA[throgh]]></name>
				<uri>https://forums.hyperbola.info/profile.php?id=347</uri>
			</author>
			<updated>2024-11-28T00:04:50Z</updated>
			<id>https://forums.hyperbola.info/viewtopic.php?pid=8458#p8458</id>
		</entry>
		<entry>
			<title type="html"><![CDATA[Re: [Hyperbola] Current security-threads overview]]></title>
			<link rel="alternate" href="https://forums.hyperbola.info/viewtopic.php?pid=8331#p8331" />
			<content type="html"><![CDATA[<p><strong><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43167">CVE-2024-43167</a></strong>: A NULL pointer dereference flaw was found in the ub_ctx_set_fwd function in Unbound. This issue could allow an attacker who can invoke specific sequences of API calls to cause a segmentation fault. When certain API functions such as ub_ctx_set_fwd and ub_ctx_resolvconf are called in a particular order, the program attempts to read from a NULL pointer, leading to a crash. This issue can result in a denial of service by causing the application to terminate unexpectedly. </p><p><strong>Conclusion:</strong> We have backported a fix and patch our package <strong>unbound</strong>.</p>]]></content>
			<author>
				<name><![CDATA[throgh]]></name>
				<uri>https://forums.hyperbola.info/profile.php?id=347</uri>
			</author>
			<updated>2024-09-11T00:34:58Z</updated>
			<id>https://forums.hyperbola.info/viewtopic.php?pid=8331#p8331</id>
		</entry>
		<entry>
			<title type="html"><![CDATA[Re: [Hyperbola] Current security-threads overview]]></title>
			<link rel="alternate" href="https://forums.hyperbola.info/viewtopic.php?pid=8330#p8330" />
			<content type="html"><![CDATA[<p><strong><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-7055">CVE-2024-7055</a></strong>: A vulnerability was found in FFmpeg up to 7.0.1. It has been classified as critical. This affects the function pnm_decode_frame in the library /libavcodec/pnmdec.c. The manipulation leads to heap-based buffer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.</p><p><strong>Conclusion:</strong> We will update our package <strong>ffmpeg</strong> to version 4.4.5.</p>]]></content>
			<author>
				<name><![CDATA[throgh]]></name>
				<uri>https://forums.hyperbola.info/profile.php?id=347</uri>
			</author>
			<updated>2024-09-10T20:54:53Z</updated>
			<id>https://forums.hyperbola.info/viewtopic.php?pid=8330#p8330</id>
		</entry>
		<entry>
			<title type="html"><![CDATA[Re: [Hyperbola] Current security-threads overview]]></title>
			<link rel="alternate" href="https://forums.hyperbola.info/viewtopic.php?pid=8329#p8329" />
			<content type="html"><![CDATA[<p><strong><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-41957">CVE-2024-41957</a></strong>: Vim is a command line text editor. Vim &lt; v9.1.0647 has double free in src/alloc.c:616. When closing a window, the corresponding tagstack data will be cleared and freed. However a bit later, the quickfix list belonging to that window will also be cleared and if that quickfix list points to the same tagstack data, Vim will try to free it again, resulting in a double-free/use-after-free access exception. Impact is low since the user must intentionally execute vim with several non-default flags, but it may cause a crash of Vim. The issue has been fixed as of Vim patch v9.1.0647 </p><p><strong><a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-43374">CVE-2024-43374</a></strong>: The UNIX editor Vim prior to version 9.1.0678 has a use-after-free error in argument list handling. When adding a new file to the argument list, this triggers `Buf*` autocommands. If in such an autocommand the buffer that was just opened is closed (including the window where it is shown), this causes the window structure to be freed which contains a reference to the argument list that we are actually modifying. Once the autocommands are completed, the references to the window and argument list are no longer valid and as such cause an use-after-free. Impact is low since the user must either intentionally add some unusual autocommands that wipe a buffer during creation (either manually or by sourcing a malicious plugin), but it will crash Vim. The issue has been fixed as of Vim patch v9.1.0678. </p><p><strong>Conclusion:</strong> We will update our package <strong>vim</strong> to version 9.1.0707.</p>]]></content>
			<author>
				<name><![CDATA[throgh]]></name>
				<uri>https://forums.hyperbola.info/profile.php?id=347</uri>
			</author>
			<updated>2024-09-10T20:50:38Z</updated>
			<id>https://forums.hyperbola.info/viewtopic.php?pid=8329#p8329</id>
		</entry>
</feed>
