ALT-BU-2020-3964-1
Branch sisyphus update bulletin.
Package kernel-image-rt updated to version 4.19.135-alt1.rt60 for branch sisyphus in task 255975.
Closed vulnerabilities
BDU:2021-03189
Уязвимость подсистемы cgroupv2 ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии
Modified: 2024-11-21
CVE-2020-14356
A flaw null pointer dereference in the Linux kernel cgroupv2 subsystem in versions before 5.7.10 was found in the way when reboot the system. A local user could use this flaw to crash the system or escalate their privileges on the system.
- openSUSE-SU-2020:1236
- openSUSE-SU-2020:1236
- openSUSE-SU-2020:1325
- openSUSE-SU-2020:1325
- https://bugzilla.kernel.org/show_bug.cgi?id=208003
- https://bugzilla.kernel.org/show_bug.cgi?id=208003
- https://bugzilla.redhat.com/show_bug.cgi?id=1868453
- https://bugzilla.redhat.com/show_bug.cgi?id=1868453
- [debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update
- [debian-lts-announce] 20200928 [SECURITY] [DLA 2385-1] linux-4.19 security update
- [debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update
- [debian-lts-announce] 20201030 [SECURITY] [DLA 2420-1] linux security update
- [debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update
- [debian-lts-announce] 20201031 [SECURITY] [DLA 2420-2] linux regression update
- https://lore.kernel.org/netdev/CAM_iQpUKQJrj8wE+Qa8NGR3P0L+5Uz=qo-O5+k_P60HzTde6aw%40mail.gmail.com/t/
- https://lore.kernel.org/netdev/CAM_iQpUKQJrj8wE+Qa8NGR3P0L+5Uz=qo-O5+k_P60HzTde6aw%40mail.gmail.com/t/
- https://security.netapp.com/advisory/ntap-20200904-0002/
- https://security.netapp.com/advisory/ntap-20200904-0002/
- USN-4483-1
- USN-4483-1
- USN-4484-1
- USN-4484-1
- USN-4526-1
- USN-4526-1
Package LibreOffice-still updated to version 6.4.5.2-alt1 for branch sisyphus in task 255931.
Closed vulnerabilities
BDU:2020-02358
Уязвимость пакета офисных программ LibreOffice, связанная с ошибками при шифровании информации, позволяющая нарушителю получить доступ к защищаемой информации
BDU:2020-03672
Уязвимость компонента «скрытый режим» офисного пакета LibreOffice, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2020-03673
Уязвимость офисного пакета LibreOffice, связанная с некоректной проверкой вводимых данных, позволяющая нарушителю оказать воздействие на целостность данных
Modified: 2024-11-21
CVE-2020-12801
If LibreOffice has an encrypted document open and crashes, that document is auto-saved encrypted. On restart, LibreOffice offers to restore the document and prompts for the password to decrypt it. If the recovery is successful, and if the file format of the recovered document was not LibreOffice's default ODF file format, then affected versions of LibreOffice default that subsequent saves of the document are unencrypted. This may lead to a user accidentally saving a MSOffice file format document unencrypted while believing it to be encrypted. This issue affects: LibreOffice 6-3 series versions prior to 6.3.6; 6-4 series versions prior to 6.4.3.
- openSUSE-SU-2020:0786
- [debian-lts-announce] 20231231 [SECURITY] [DLA 3703-1] libreoffice security update
- https://www.libreoffice.org/about-us/security/advisories/CVE-2020-12801
- openSUSE-SU-2020:0786
- https://www.libreoffice.org/about-us/security/advisories/CVE-2020-12801
- [debian-lts-announce] 20231231 [SECURITY] [DLA 3703-1] libreoffice security update
Modified: 2024-11-21
CVE-2020-12802
LibreOffice has a 'stealth mode' in which only documents from locations deemed 'trusted' are allowed to retrieve remote resources. This mode is not the default mode, but can be enabled by users who want to disable LibreOffice's ability to include remote resources within a document. A flaw existed where remote graphic links loaded from docx documents were omitted from this protection prior to version 6.4.4. This issue affects: The Document Foundation LibreOffice versions prior to 6.4.4.
- openSUSE-SU-2020:1222
- openSUSE-SU-2020:1261
- [debian-lts-announce] 20231231 [SECURITY] [DLA 3703-1] libreoffice security update
- FEDORA-2020-8922773bc4
- https://www.libreoffice.org/about-us/security/advisories/CVE-2020-12802
- openSUSE-SU-2020:1222
- https://www.libreoffice.org/about-us/security/advisories/CVE-2020-12802
- FEDORA-2020-8922773bc4
- [debian-lts-announce] 20231231 [SECURITY] [DLA 3703-1] libreoffice security update
- openSUSE-SU-2020:1261
Modified: 2024-11-21
CVE-2020-12803
ODF documents can contain forms to be filled out by the user. Similar to HTML forms, the contained form data can be submitted to a URI, for example, to an external web server. To create submittable forms, ODF implements the XForms W3C standard, which allows data to be submitted without the need for macros or other active scripting Prior to version 6.4.4 LibreOffice allowed forms to be submitted to any URI, including file: URIs, enabling form submissions to overwrite local files. User-interaction is required to submit the form, but to avoid the possibility of malicious documents engineered to maximize the possibility of inadvertent user submission this feature has now been limited to http[s] URIs, removing the possibility to overwrite local files. This issue affects: The Document Foundation LibreOffice versions prior to 6.4.4.
- openSUSE-SU-2020:1222
- openSUSE-SU-2020:1261
- [debian-lts-announce] 20231231 [SECURITY] [DLA 3703-1] libreoffice security update
- FEDORA-2020-8922773bc4
- https://www.libreoffice.org/about-us/security/advisories/CVE-2020-12803
- openSUSE-SU-2020:1222
- https://www.libreoffice.org/about-us/security/advisories/CVE-2020-12803
- FEDORA-2020-8922773bc4
- [debian-lts-announce] 20231231 [SECURITY] [DLA 3703-1] libreoffice security update
- openSUSE-SU-2020:1261