ALT-BU-2020-3701-1
Branch c8.1 update bulletin.
Closed vulnerabilities
No data currently available.
Package libnss-role updated to version 0.4.1-alt1 for branch c8.1 in task 244180.
Closed bugs
Регрегрессия при назначении групп
Closed vulnerabilities
BDU:2021-03592
Уязвимость функции generateDirectionalRuns() библиотеки Qt, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-18281
An out-of-bounds memory access in the generateDirectionalRuns() function in qtextengine.cpp in Qt qtbase 5.11.x and 5.12.x before 5.12.5 allows attackers to cause a denial of service by crashing an application via a text file containing many directional characters.
- https://bugreports.qt.io/browse/QTBUG-77819
- https://bugreports.qt.io/browse/QTBUG-77819
- https://bugs.launchpad.net/ubuntu/+source/qtbase-opensource-src/+bug/1848784
- https://bugs.launchpad.net/ubuntu/+source/qtbase-opensource-src/+bug/1848784
- https://codereview.qt-project.org/c/qt/qtbase/+/271889
- https://codereview.qt-project.org/c/qt/qtbase/+/271889
- 20191104 [SECURITY] [DSA 4556-1] qtbase-opensource-src security update
- 20191104 [SECURITY] [DSA 4556-1] qtbase-opensource-src security update
- GLSA-202003-60
- GLSA-202003-60
- USN-4275-1
- USN-4275-1
- DSA-4556
- DSA-4556
Modified: 2024-11-21
CVE-2020-0569
Out of bounds write in Intel(R) PROSet/Wireless WiFi products on Windows 10 may allow an authenticated user to potentially enable denial of service via local access.
Modified: 2024-11-21
CVE-2020-0570
Uncontrolled search path in the QT Library before 5.14.0, 5.12.7 and 5.9.10 may allow an authenticated user to potentially enable elevation of privilege via local access.
- https://bugreports.qt.io/browse/QTBUG-81272
- https://bugzilla.redhat.com/show_bug.cgi?id=1800604
- https://lists.qt-project.org/pipermail/development/2020-January/038534.html
- https://bugreports.qt.io/browse/QTBUG-81272
- https://lists.qt-project.org/pipermail/development/2020-January/038534.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1800604