ALT-BU-2019-3858-1
Branch p9 update bulletin.
Package LibreOffice updated to version 6.3.0.3-alt1 for branch p9 in task 235650.
Closed vulnerabilities
BDU:2019-02759
Уязвимость программного модуля LibreLogo пакета офисных программ LibreOffice, позволяющая нарушителю выполнить произвольный код в целевой системе
BDU:2019-02924
Уязвимость режима stealth mode пакета офисных программ LibreOffice, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации, выполнить произвольный код или вызвать отказ в обслуживании
BDU:2019-03147
Уязвимость программного модуля LibreLogo пакета офисных программ LibreOffice, позволяющая нарушителю выполнить произвольный код в целевой системе
BDU:2019-03148
Уязвимость программного модуля LibreLogo пакета офисных программ LibreOffice, позволяющая нарушителю выполнить произвольный код в целевой системе
BDU:2019-03149
Уязвимость программного модуля LibreLogo пакета офисных программ LibreOffice, позволяющая нарушителю выполнить произвольный код в целевой системе
Modified: 2024-11-21
CVE-2019-9848
LibreOffice has a feature where documents can specify that pre-installed scripts can be executed on various document events such as mouse-over, etc. LibreOffice is typically also bundled with LibreLogo, a programmable turtle vector graphics script, which can be manipulated into executing arbitrary python commands. By using the document event feature to trigger LibreLogo to execute python contained within a document a malicious document could be constructed which would execute arbitrary python commands silently without warning. In the fixed versions, LibreLogo cannot be called from a document event handler. This issue affects: Document Foundation LibreOffice versions prior to 6.2.5.
- openSUSE-SU-2019:2057
- openSUSE-SU-2019:2183
- 109374
- [debian-lts-announce] 20191006 [SECURITY] [DLA 1947-1] libreoffice security update
- FEDORA-2019-2fe22a3a2c
- FEDORA-2019-5561d20558
- 20190815 [SECURITY] [DSA 4501-1] libreoffice security update
- GLSA-201908-13
- USN-4063-1
- https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9848
- openSUSE-SU-2019:2057
- https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9848
- USN-4063-1
- GLSA-201908-13
- 20190815 [SECURITY] [DSA 4501-1] libreoffice security update
- FEDORA-2019-5561d20558
- FEDORA-2019-2fe22a3a2c
- [debian-lts-announce] 20191006 [SECURITY] [DLA 1947-1] libreoffice security update
- 109374
- openSUSE-SU-2019:2183
Modified: 2024-11-21
CVE-2019-9849
LibreOffice has a 'stealth mode' in which only documents from locations deemed 'trusted' are allowed to retrieve remote resources. This mode is not the default mode, but can be enabled by users who want to disable LibreOffice's ability to include remote resources within a document. A flaw existed where bullet graphics were omitted from this protection prior to version 6.2.5. This issue affects: Document Foundation LibreOffice versions prior to 6.2.5.
- openSUSE-SU-2019:2057
- openSUSE-SU-2019:2183
- 109374
- [debian-lts-announce] 20191006 [SECURITY] [DLA 1947-1] libreoffice security update
- FEDORA-2019-2fe22a3a2c
- FEDORA-2019-5561d20558
- GLSA-201908-13
- USN-4063-1
- https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9849
- openSUSE-SU-2019:2057
- https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9849
- USN-4063-1
- GLSA-201908-13
- FEDORA-2019-5561d20558
- FEDORA-2019-2fe22a3a2c
- [debian-lts-announce] 20191006 [SECURITY] [DLA 1947-1] libreoffice security update
- 109374
- openSUSE-SU-2019:2183
Modified: 2024-11-21
CVE-2019-9850
LibreOffice is typically bundled with LibreLogo, a programmable turtle vector graphics script, which can execute arbitrary python commands contained with the document it is launched from. LibreOffice also has a feature where documents can specify that pre-installed scripts can be executed on various document script events such as mouse-over, etc. Protection was added, to address CVE-2019-9848, to block calling LibreLogo from script event handers. However an insufficient url validation vulnerability in LibreOffice allowed malicious to bypass that protection and again trigger calling LibreLogo from script event handlers. This issue affects: Document Foundation LibreOffice versions prior to 6.2.6.
- openSUSE-SU-2019:2057
- openSUSE-SU-2019:2183
- [debian-lts-announce] 20191006 [SECURITY] [DLA 1947-1] libreoffice security update
- FEDORA-2019-2fe22a3a2c
- FEDORA-2019-dd9d207c17
- 20190815 [SECURITY] [DSA 4501-1] libreoffice security update
- USN-4102-1
- DSA-4501
- https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9850
- openSUSE-SU-2019:2057
- https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9850
- DSA-4501
- USN-4102-1
- 20190815 [SECURITY] [DSA 4501-1] libreoffice security update
- FEDORA-2019-dd9d207c17
- FEDORA-2019-2fe22a3a2c
- [debian-lts-announce] 20191006 [SECURITY] [DLA 1947-1] libreoffice security update
- openSUSE-SU-2019:2183
Modified: 2024-11-21
CVE-2019-9851
LibreOffice is typically bundled with LibreLogo, a programmable turtle vector graphics script, which can execute arbitrary python commands contained with the document it is launched from. Protection was added, to address CVE-2019-9848, to block calling LibreLogo from document event script handers, e.g. mouse over. However LibreOffice also has a separate feature where documents can specify that pre-installed scripts can be executed on various global script events such as document-open, etc. In the fixed versions, global script event handlers are validated equivalently to document script event handlers. This issue affects: Document Foundation LibreOffice versions prior to 6.2.6.
- openSUSE-SU-2019:2057
- openSUSE-SU-2019:2183
- http://packetstormsecurity.com/files/154168/LibreOffice-Macro-Python-Code-Execution.html
- [debian-lts-announce] 20191006 [SECURITY] [DLA 1947-1] libreoffice security update
- FEDORA-2019-2fe22a3a2c
- 20190815 [SECURITY] [DSA 4501-1] libreoffice security update
- USN-4102-1
- DSA-4501
- https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9851
- openSUSE-SU-2019:2057
- https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9851
- DSA-4501
- USN-4102-1
- 20190815 [SECURITY] [DSA 4501-1] libreoffice security update
- FEDORA-2019-2fe22a3a2c
- [debian-lts-announce] 20191006 [SECURITY] [DLA 1947-1] libreoffice security update
- http://packetstormsecurity.com/files/154168/LibreOffice-Macro-Python-Code-Execution.html
- openSUSE-SU-2019:2183
Modified: 2024-11-21
CVE-2019-9852
LibreOffice has a feature where documents can specify that pre-installed macros can be executed on various script events such as mouse-over, document-open etc. Access is intended to be restricted to scripts under the share/Scripts/python, user/Scripts/python sub-directories of the LibreOffice install. Protection was added, to address CVE-2018-16858, to avoid a directory traversal attack where scripts in arbitrary locations on the file system could be executed. However this new protection could be bypassed by a URL encoding attack. In the fixed versions, the parsed url describing the script location is correctly encoded before further processing. This issue affects: Document Foundation LibreOffice versions prior to 6.2.6.
- openSUSE-SU-2019:2057
- openSUSE-SU-2019:2183
- [debian-lts-announce] 20191006 [SECURITY] [DLA 1947-1] libreoffice security update
- FEDORA-2019-2fe22a3a2c
- 20190815 [SECURITY] [DSA 4501-1] libreoffice security update
- 20190910 [SECURITY] [DSA 4519-1] libreoffice security update
- USN-4102-1
- DSA-4501
- https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9852
- openSUSE-SU-2019:2057
- https://www.libreoffice.org/about-us/security/advisories/CVE-2019-9852
- DSA-4501
- USN-4102-1
- 20190910 [SECURITY] [DSA 4519-1] libreoffice security update
- 20190815 [SECURITY] [DSA 4501-1] libreoffice security update
- FEDORA-2019-2fe22a3a2c
- [debian-lts-announce] 20191006 [SECURITY] [DLA 1947-1] libreoffice security update
- openSUSE-SU-2019:2183
Closed bugs
Включить pentaho-reporting-flow-engine
Package libnss-role updated to version 0.4.1-alt1 for branch p9 in task 235613.
Closed bugs
Регрегрессия при назначении групп
Closed vulnerabilities
BDU:2019-02514
Уязвимость компонента daemon/gvfsbackendadmin.c подсистемы GVFS среды рабочего стола GNOME операционных систем Linux, позволяющая нарушителю оказать воздействие на целостность, конфиденциальность и доступность защищаемой информации
BDU:2019-02515
Уязвимость компонента daemon/gvfsbackendadmin.c подсистемы GVFS среды рабочего стола GNOME операционных систем Linux, позволяющая нарушителю оказать воздействие на целостность, конфиденциальность и доступность защищаемой информации
BDU:2019-02516
Уязвимость компонента daemon/gvfsbackendadmin.c подсистемы GVFS среды рабочего стола GNOME операционных систем Linux, позволяющая нарушителю оказать воздействие на целостность, конфиденциальность и доступность защищаемой информации
BDU:2019-02517
Уязвимость компонента daemon/gvfsbackendadmin.c подсистемы GVFS среды рабочего стола GNOME операционных систем Linux, позволяющая нарушителю подключиться к D-Bus серверу
Modified: 2024-11-21
CVE-2019-12447
An issue was discovered in GNOME gvfs 1.29.4 through 1.41.2. daemon/gvfsbackendadmin.c mishandles file ownership because setfsuid is not used.
- openSUSE-SU-2019:1699
- openSUSE-SU-2019:1699
- openSUSE-SU-2019:1697
- openSUSE-SU-2019:1697
- [oss-security] 20190709 Privileged File Access from Desktop Applications
- [oss-security] 20190709 Privileged File Access from Desktop Applications
- https://gitlab.gnome.org/GNOME/gvfs/commit/d7d362995aa0cb8905c8d5c2a2a4c305d2ffff80
- https://gitlab.gnome.org/GNOME/gvfs/commit/d7d362995aa0cb8905c8d5c2a2a4c305d2ffff80
- FEDORA-2019-e6b02af8b8
- FEDORA-2019-e6b02af8b8
- FEDORA-2019-6ed5523cc0
- FEDORA-2019-6ed5523cc0
- USN-4053-1
- USN-4053-1
Modified: 2024-11-21
CVE-2019-12448
An issue was discovered in GNOME gvfs 1.29.4 through 1.41.2. daemon/gvfsbackendadmin.c has race conditions because the admin backend doesn't implement query_info_on_read/write.
- openSUSE-SU-2019:1699
- openSUSE-SU-2019:1699
- openSUSE-SU-2019:1697
- openSUSE-SU-2019:1697
- [oss-security] 20190709 Privileged File Access from Desktop Applications
- [oss-security] 20190709 Privileged File Access from Desktop Applications
- https://gitlab.gnome.org/GNOME/gvfs/commit/764e9af7522e3096c0f44613c330377d31c9bbb5
- https://gitlab.gnome.org/GNOME/gvfs/commit/764e9af7522e3096c0f44613c330377d31c9bbb5
- FEDORA-2019-e6b02af8b8
- FEDORA-2019-e6b02af8b8
- FEDORA-2019-6ed5523cc0
- FEDORA-2019-6ed5523cc0
- USN-4053-1
- USN-4053-1
Modified: 2024-11-21
CVE-2019-12449
An issue was discovered in GNOME gvfs 1.29.4 through 1.41.2. daemon/gvfsbackendadmin.c mishandles a file's user and group ownership during move (and copy with G_FILE_COPY_ALL_METADATA) operations from admin:// to file:// URIs, because root privileges are unavailable.
- openSUSE-SU-2019:1699
- openSUSE-SU-2019:1699
- openSUSE-SU-2019:1697
- openSUSE-SU-2019:1697
- [oss-security] 20190709 Privileged File Access from Desktop Applications
- [oss-security] 20190709 Privileged File Access from Desktop Applications
- https://gitlab.gnome.org/GNOME/gvfs/commit/409619412e11be146a31b9a99ed965925f1aabb8
- https://gitlab.gnome.org/GNOME/gvfs/commit/409619412e11be146a31b9a99ed965925f1aabb8
- FEDORA-2019-e6b02af8b8
- FEDORA-2019-e6b02af8b8
- FEDORA-2019-6ed5523cc0
- FEDORA-2019-6ed5523cc0
- USN-4053-1
- USN-4053-1
Modified: 2024-11-21
CVE-2019-12795
daemon/gvfsdaemon.c in gvfsd from GNOME gvfs before 1.38.3, 1.40.x before 1.40.2, and 1.41.x before 1.41.3 opened a private D-Bus server socket without configuring an authorization rule. A local attacker could connect to this server socket and issue D-Bus method calls. (Note that the server socket only accepts a single connection, so the attacker would have to discover the server and connect to the socket before its owner does.)
- openSUSE-SU-2019:1699
- openSUSE-SU-2019:1699
- openSUSE-SU-2019:1697
- openSUSE-SU-2019:1697
- 108741
- 108741
- RHSA-2019:3553
- RHSA-2019:3553
- https://gitlab.gnome.org/GNOME/gvfs/commit/70dbfc68a79faac49bd3423e079cb6902522082a
- https://gitlab.gnome.org/GNOME/gvfs/commit/70dbfc68a79faac49bd3423e079cb6902522082a
- https://gitlab.gnome.org/GNOME/gvfs/commit/d8c9138bf240975848b1c54db648ec4cd516a48f
- https://gitlab.gnome.org/GNOME/gvfs/commit/d8c9138bf240975848b1c54db648ec4cd516a48f
- https://gitlab.gnome.org/GNOME/gvfs/commit/e3808a1b4042761055b1d975333a8243d67b8bfe
- https://gitlab.gnome.org/GNOME/gvfs/commit/e3808a1b4042761055b1d975333a8243d67b8bfe
- [debian-lts-announce] 20190619 [SECURITY] [DLA 1827-1] gvfs security update
- [debian-lts-announce] 20190619 [SECURITY] [DLA 1827-1] gvfs security update
- FEDORA-2019-e6b02af8b8
- FEDORA-2019-e6b02af8b8
- FEDORA-2019-6ed5523cc0
- FEDORA-2019-6ed5523cc0
- USN-4053-1
- USN-4053-1
Closed bugs
Некорректно отображается пункт программы в меню xfce: значение поля Comment на английском