ALT-BU-2021-3689-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2018-01493
Уязвимость функции rfbProcessClientNormalMessage() кроссплатформенной библиотеки LibVNCServer, позволяющая нарушителю вызвать отказ в обслуживании и получить несанкционированный доступ к конфиденциальным данным
BDU:2019-00695
Уязвимость библиотеки LibVNC, связанная со считыванием данных за пределами заданного буфера, позволяющая нарушителю выполнить произвольный код
BDU:2019-00696
Уязвимость библиотеки LibVNC, связанная со считыванием данных за пределами заданного буфера, позволяющая нарушителю выполнить произвольный код
BDU:2019-00697
Уязвимость библиотеки LibVNC, связанная со считыванием данных за пределами заданного буфера, позволяющая нарушителю выполнить произвольный код
BDU:2019-00698
Уязвимость библиотеки LibVNC, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-00699
Уязвимость библиотеки LibVNC, связанная с ошибками инициализации в коде клиента, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2019-00700
Уязвимость компонента VNC Repeater библиотеки LibVNC, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2019-00701
Уязвимость библиотеки LibVNC, связанная с ошибками разыменования указателей, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2019-00702
Уязвимость компонента rfbproto.c кроссплатформенной библиотеки LibVNCServer, связанная с записью за границами буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании и получить несанкционированный доступ к конфиденциальным данным
BDU:2019-00703
Уязвимость компонента rfbserver.c кроссплатформенной библиотеки LibVNCServer, связанная с записью за границами буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании и получить несанкционированный доступ к конфиденциальным данным
BDU:2019-00704
Уязвимость компонента rfbserver.c кроссплатформенной библиотеки LibVNCServer, связанная с записью за границами буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании и получить несанкционированный доступ к конфиденциальным данным
BDU:2020-02922
Уязвимость кроссплатформенной библиотеки LibVNCServer, связанная с неосвобождением ресурса после истечения действительного срока его эксплуатирования, позволяющая нарушителю получить несанкционированный доступ к информации
Modified: 2024-11-21
CVE-2018-15127
LibVNC before commit 502821828ed00b4a2c4bef90683d0fd88ce495de contains heap out-of-bound write vulnerability in server code of file transfer extension that can result remote code execution
- RHSA-2019:0059
- RHSA-2019:0059
- https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-028-libvnc-heap-out-of-bound-write/
- https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-028-libvnc-heap-out-of-bound-write/
- [debian-lts-announce] 20181227 [SECURITY] [DLA 1617-1] libvncserver security update
- [debian-lts-announce] 20181227 [SECURITY] [DLA 1617-1] libvncserver security update
- [debian-lts-announce] 20191030 [SECURITY] [DLA 1979-1] italc security update
- [debian-lts-announce] 20191030 [SECURITY] [DLA 1979-1] italc security update
- USN-3877-1
- USN-3877-1
- USN-4547-1
- USN-4547-1
- USN-4587-1
- USN-4587-1
- DSA-4383
- DSA-4383
Modified: 2024-11-21
CVE-2018-20019
LibVNC before commit a83439b9fbe0f03c48eb94ed05729cb016f8b72f contains multiple heap out-of-bound write vulnerabilities in VNC client code that can result remote code execution
- https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf
- https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-029-libvnc-multiple-heap-out-of-bound-vulnerabilities/
- https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-029-libvnc-multiple-heap-out-of-bound-vulnerabilities/
- [debian-lts-announce] 20181227 [SECURITY] [DLA 1617-1] libvncserver security update
- [debian-lts-announce] 20181227 [SECURITY] [DLA 1617-1] libvncserver security update
- [debian-lts-announce] 20191030 [SECURITY] [DLA 1979-1] italc security update
- [debian-lts-announce] 20191030 [SECURITY] [DLA 1979-1] italc security update
- GLSA-201908-05
- GLSA-201908-05
- USN-3877-1
- USN-3877-1
- USN-4547-1
- USN-4547-1
- USN-4587-1
- USN-4587-1
- DSA-4383
- DSA-4383
Modified: 2024-11-21
CVE-2018-20020
LibVNC before commit 7b1ef0ffc4815cab9a96c7278394152bdc89dc4d contains heap out-of-bound write vulnerability inside structure in VNC client code that can result remote code execution
- https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-030-libvnc-heap-out-of-bound-write/
- https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-030-libvnc-heap-out-of-bound-write/
- [debian-lts-announce] 20181227 [SECURITY] [DLA 1617-1] libvncserver security update
- [debian-lts-announce] 20181227 [SECURITY] [DLA 1617-1] libvncserver security update
- [debian-lts-announce] 20191030 [SECURITY] [DLA 1979-1] italc security update
- [debian-lts-announce] 20191030 [SECURITY] [DLA 1979-1] italc security update
- [debian-lts-announce] 20191129 [SECURITY] [DLA 2016-1] ssvnc security update
- [debian-lts-announce] 20191129 [SECURITY] [DLA 2016-1] ssvnc security update
- GLSA-201908-05
- GLSA-201908-05
- GLSA-202006-06
- GLSA-202006-06
- USN-3877-1
- USN-3877-1
- USN-4547-1
- USN-4547-1
- USN-4547-2
- USN-4547-2
- USN-4587-1
- USN-4587-1
- DSA-4383
- DSA-4383
Modified: 2024-11-21
CVE-2018-20021
LibVNC before commit c3115350eb8bb635d0fdb4dbbb0d0541f38ed19c contains a CWE-835: Infinite loop vulnerability in VNC client code. Vulnerability allows attacker to consume excessive amount of resources like CPU and RAM
- https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-031-libvnc-infinite-loop/
- https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-031-libvnc-infinite-loop/
- [debian-lts-announce] 20181227 [SECURITY] [DLA 1617-1] libvncserver security update
- [debian-lts-announce] 20181227 [SECURITY] [DLA 1617-1] libvncserver security update
- [debian-lts-announce] 20191030 [SECURITY] [DLA 1979-1] italc security update
- [debian-lts-announce] 20191030 [SECURITY] [DLA 1979-1] italc security update
- [debian-lts-announce] 20191129 [SECURITY] [DLA 2016-1] ssvnc security update
- [debian-lts-announce] 20191129 [SECURITY] [DLA 2016-1] ssvnc security update
- [debian-lts-announce] 20191221 [SECURITY] [DLA 2045-1] tightvnc security update
- [debian-lts-announce] 20191221 [SECURITY] [DLA 2045-1] tightvnc security update
- GLSA-201908-05
- GLSA-201908-05
- GLSA-202006-06
- GLSA-202006-06
- USN-3877-1
- USN-3877-1
- USN-4547-1
- USN-4547-1
- USN-4547-2
- USN-4547-2
- USN-4587-1
- USN-4587-1
- DSA-4383
- DSA-4383
Modified: 2024-11-21
CVE-2018-20022
LibVNC before 2f5b2ad1c6c99b1ac6482c95844a84d66bb52838 contains multiple weaknesses CWE-665: Improper Initialization vulnerability in VNC client code that allows attacker to read stack memory and can be abuse for information disclosure. Combined with another vulnerability, it can be used to leak stack memory layout and in bypassing ASLR
- https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-032-libvnc-multiple-memory-leaks/
- https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-032-libvnc-multiple-memory-leaks/
- [debian-lts-announce] 20181227 [SECURITY] [DLA 1617-1] libvncserver security update
- [debian-lts-announce] 20181227 [SECURITY] [DLA 1617-1] libvncserver security update
- [debian-lts-announce] 20191030 [SECURITY] [DLA 1979-1] italc security update
- [debian-lts-announce] 20191030 [SECURITY] [DLA 1979-1] italc security update
- [debian-lts-announce] 20191129 [SECURITY] [DLA 2016-1] ssvnc security update
- [debian-lts-announce] 20191129 [SECURITY] [DLA 2016-1] ssvnc security update
- [debian-lts-announce] 20191221 [SECURITY] [DLA 2045-1] tightvnc security update
- [debian-lts-announce] 20191221 [SECURITY] [DLA 2045-1] tightvnc security update
- GLSA-201908-05
- GLSA-201908-05
- GLSA-202006-06
- GLSA-202006-06
- USN-3877-1
- USN-3877-1
- USN-4547-1
- USN-4547-1
- USN-4547-2
- USN-4547-2
- USN-4587-1
- USN-4587-1
- DSA-4383
- DSA-4383
Modified: 2024-11-21
CVE-2018-20023
LibVNC before 8b06f835e259652b0ff026898014fc7297ade858 contains CWE-665: Improper Initialization vulnerability in VNC Repeater client code that allows attacker to read stack memory and can be abuse for information disclosure. Combined with another vulnerability, it can be used to leak stack memory layout and in bypassing ASLR
- https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-033-libvnc-memory-leak/
- https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-033-libvnc-memory-leak/
- [debian-lts-announce] 20181227 [SECURITY] [DLA 1617-1] libvncserver security update
- [debian-lts-announce] 20181227 [SECURITY] [DLA 1617-1] libvncserver security update
- [debian-lts-announce] 20191030 [SECURITY] [DLA 1979-1] italc security update
- [debian-lts-announce] 20191030 [SECURITY] [DLA 1979-1] italc security update
- GLSA-201908-05
- GLSA-201908-05
- USN-3877-1
- USN-3877-1
- USN-4547-1
- USN-4547-1
- USN-4587-1
- USN-4587-1
- DSA-4383
- DSA-4383
Modified: 2024-11-21
CVE-2018-20024
LibVNC before commit 4a21bbd097ef7c44bb000c3bd0907f96a10e4ce7 contains null pointer dereference in VNC client code that can result DoS.
- https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-034-libvnc-null-pointer-dereference/
- https://ics-cert.kaspersky.com/advisories/klcert-advisories/2018/12/19/klcert-18-034-libvnc-null-pointer-dereference/
- [debian-lts-announce] 20181227 [SECURITY] [DLA 1617-1] libvncserver security update
- [debian-lts-announce] 20181227 [SECURITY] [DLA 1617-1] libvncserver security update
- [debian-lts-announce] 20191030 [SECURITY] [DLA 1979-1] italc security update
- [debian-lts-announce] 20191030 [SECURITY] [DLA 1979-1] italc security update
- [debian-lts-announce] 20191129 [SECURITY] [DLA 2016-1] ssvnc security update
- [debian-lts-announce] 20191129 [SECURITY] [DLA 2016-1] ssvnc security update
- GLSA-201908-05
- GLSA-201908-05
- GLSA-202006-06
- GLSA-202006-06
- USN-3877-1
- USN-3877-1
- USN-4547-1
- USN-4547-1
- USN-4547-2
- USN-4547-2
- USN-4587-1
- USN-4587-1
- DSA-4383
- DSA-4383
Modified: 2024-11-21
CVE-2018-20748
LibVNC before 0.9.12 contains multiple heap out-of-bounds write vulnerabilities in libvncclient/rfbproto.c. The fix for CVE-2018-20019 was incomplete.
- https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf
- https://github.com/LibVNC/libvncserver/commit/a64c3b37af9a6c8f8009d7516874b8d266b42bae
- https://github.com/LibVNC/libvncserver/commit/a64c3b37af9a6c8f8009d7516874b8d266b42bae
- https://github.com/LibVNC/libvncserver/commit/c2c4b81e6cb3b485fb1ec7ba9e7defeb889f6ba7
- https://github.com/LibVNC/libvncserver/commit/c2c4b81e6cb3b485fb1ec7ba9e7defeb889f6ba7
- https://github.com/LibVNC/libvncserver/commit/c5ba3fee85a7ecbbca1df5ffd46d32b92757bc2a
- https://github.com/LibVNC/libvncserver/commit/c5ba3fee85a7ecbbca1df5ffd46d32b92757bc2a
- https://github.com/LibVNC/libvncserver/commit/e34bcbb759ca5bef85809967a268fdf214c1ad2c
- https://github.com/LibVNC/libvncserver/commit/e34bcbb759ca5bef85809967a268fdf214c1ad2c
- https://github.com/LibVNC/libvncserver/issues/273
- https://github.com/LibVNC/libvncserver/issues/273
- [debian-lts-announce] 20190131 [SECURITY] [DLA 1652-1] libvncserver security update
- [debian-lts-announce] 20190131 [SECURITY] [DLA 1652-1] libvncserver security update
- [debian-lts-announce] 20191030 [SECURITY] [DLA 1979-1] italc security update
- [debian-lts-announce] 20191030 [SECURITY] [DLA 1979-1] italc security update
- USN-3877-1
- USN-3877-1
- USN-4547-1
- USN-4547-1
- USN-4587-1
- USN-4587-1
- https://www.openwall.com/lists/oss-security/2018/12/10/8
- https://www.openwall.com/lists/oss-security/2018/12/10/8
Modified: 2024-11-21
CVE-2018-20749
LibVNC before 0.9.12 contains a heap out-of-bounds write vulnerability in libvncserver/rfbserver.c. The fix for CVE-2018-15127 was incomplete.
- 106825
- 106825
- https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf
- https://github.com/LibVNC/libvncserver/commit/15bb719c03cc70f14c36a843dcb16ed69b405707
- https://github.com/LibVNC/libvncserver/commit/15bb719c03cc70f14c36a843dcb16ed69b405707
- https://github.com/LibVNC/libvncserver/issues/273
- https://github.com/LibVNC/libvncserver/issues/273
- [debian-lts-announce] 20190131 [SECURITY] [DLA 1652-1] libvncserver security update
- [debian-lts-announce] 20190131 [SECURITY] [DLA 1652-1] libvncserver security update
- [debian-lts-announce] 20191030 [SECURITY] [DLA 1979-1] italc security update
- [debian-lts-announce] 20191030 [SECURITY] [DLA 1979-1] italc security update
- USN-3877-1
- USN-3877-1
- USN-4547-1
- USN-4547-1
- USN-4587-1
- USN-4587-1
- https://www.openwall.com/lists/oss-security/2018/12/10/8
- https://www.openwall.com/lists/oss-security/2018/12/10/8
Modified: 2024-11-21
CVE-2018-20750
LibVNC through 0.9.12 contains a heap out-of-bounds write vulnerability in libvncserver/rfbserver.c. The fix for CVE-2018-15127 was incomplete.
- 106825
- 106825
- https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf
- https://github.com/LibVNC/libvncserver/commit/09e8fc02f59f16e2583b34fe1a270c238bd9ffec
- https://github.com/LibVNC/libvncserver/commit/09e8fc02f59f16e2583b34fe1a270c238bd9ffec
- https://github.com/LibVNC/libvncserver/issues/273
- https://github.com/LibVNC/libvncserver/issues/273
- [debian-lts-announce] 20190131 [SECURITY] [DLA 1652-1] libvncserver security update
- [debian-lts-announce] 20190131 [SECURITY] [DLA 1652-1] libvncserver security update
- [debian-lts-announce] 20191030 [SECURITY] [DLA 1979-1] italc security update
- [debian-lts-announce] 20191030 [SECURITY] [DLA 1979-1] italc security update
- USN-3877-1
- USN-3877-1
- USN-4547-1
- USN-4547-1
- USN-4587-1
- USN-4587-1
- https://www.openwall.com/lists/oss-security/2018/12/10/8
- https://www.openwall.com/lists/oss-security/2018/12/10/8
Modified: 2024-11-21
CVE-2018-7225
An issue was discovered in LibVNCServer through 0.9.11. rfbProcessClientNormalMessage() in rfbserver.c does not sanitize msg.cct.length, leading to access to uninitialized and potentially sensitive data or possibly unspecified other impact (e.g., an integer overflow) via specially crafted VNC packets.
- http://www.openwall.com/lists/oss-security/2018/02/18/1
- http://www.openwall.com/lists/oss-security/2018/02/18/1
- 103107
- 103107
- RHSA-2018:1055
- RHSA-2018:1055
- https://github.com/LibVNC/libvncserver/issues/218
- https://github.com/LibVNC/libvncserver/issues/218
- [debian-lts-announce] 20180330 [SECURITY] [DLA 1332-1] libvncserver security update
- [debian-lts-announce] 20180330 [SECURITY] [DLA 1332-1] libvncserver security update
- [debian-lts-announce] 20191030 [SECURITY] [DLA 1979-1] italc security update
- [debian-lts-announce] 20191030 [SECURITY] [DLA 1979-1] italc security update
- [debian-lts-announce] 20191129 [SECURITY] [DLA 2014-1] vino security update
- [debian-lts-announce] 20191129 [SECURITY] [DLA 2014-1] vino security update
- [debian-lts-announce] 20191221 [SECURITY] [DLA 2045-1] tightvnc security update
- [debian-lts-announce] 20191221 [SECURITY] [DLA 2045-1] tightvnc security update
- GLSA-201908-05
- GLSA-201908-05
- USN-3618-1
- USN-3618-1
- USN-4547-1
- USN-4547-1
- USN-4573-1
- USN-4573-1
- USN-4587-1
- USN-4587-1
- DSA-4221
- DSA-4221
Modified: 2024-11-21
CVE-2019-15681
LibVNC commit before d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a contains a memory leak (CWE-655) in VNC server code, which allow an attacker to read stack memory and can be abused for information disclosure. Combined with another vulnerability, it can be used to leak stack memory and bypass ASLR. This attack appear to be exploitable via network connectivity. These vulnerabilities have been fixed in commit d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a.
- openSUSE-SU-2020:0624
- openSUSE-SU-2020:0624
- openSUSE-SU-2020:1071
- openSUSE-SU-2020:1071
- https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-390195.pdf
- https://github.com/LibVNC/libvncserver/commit/d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a
- https://github.com/LibVNC/libvncserver/commit/d01e1bb4246323ba6fcee3b82ef1faa9b1dac82a
- [debian-lts-announce] 20191030 [SECURITY] [DLA 1977-1] libvncserver security update
- [debian-lts-announce] 20191030 [SECURITY] [DLA 1977-1] libvncserver security update
- [debian-lts-announce] 20191030 [SECURITY] [DLA 1979-1] italc security update
- [debian-lts-announce] 20191030 [SECURITY] [DLA 1979-1] italc security update
- [debian-lts-announce] 20191129 [SECURITY] [DLA 2014-1] vino security update
- [debian-lts-announce] 20191129 [SECURITY] [DLA 2014-1] vino security update
- [debian-lts-announce] 20191221 [SECURITY] [DLA 2045-1] tightvnc security update
- [debian-lts-announce] 20191221 [SECURITY] [DLA 2045-1] tightvnc security update
- USN-4407-1
- USN-4407-1
- USN-4547-1
- USN-4547-1
- USN-4573-1
- USN-4573-1
- USN-4587-1
- USN-4587-1
Closed bugs
grub-install создает запись с нерабочим загрузчиком на некоторых материнках с UEFI (отсутствует BOOT/BOOTX64.EFI)
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-21261
Flatpak is a system for building, distributing, and running sandboxed desktop applications on Linux. A bug was discovered in the `flatpak-portal` service that can allow sandboxed applications to execute arbitrary code on the host system (a sandbox escape). This sandbox-escape bug is present in versions from 0.11.4 and before fixed versions 1.8.5 and 1.10.0. The Flatpak portal D-Bus service (`flatpak-portal`, also known by its D-Bus service name `org.freedesktop.portal.Flatpak`) allows apps in a Flatpak sandbox to launch their own subprocesses in a new sandbox instance, either with the same security settings as the caller or with more restrictive security settings. For example, this is used in Flatpak-packaged web browsers such as Chromium to launch subprocesses that will process untrusted web content, and give those subprocesses a more restrictive sandbox than the browser itself. In vulnerable versions, the Flatpak portal service passes caller-specified environment variables to non-sandboxed processes on the host system, and in particular to the `flatpak run` command that is used to launch the new sandbox instance. A malicious or compromised Flatpak app could set environment variables that are trusted by the `flatpak run` command, and use them to execute arbitrary code that is not in a sandbox. As a workaround, this vulnerability can be mitigated by preventing the `flatpak-portal` service from starting, but that mitigation will prevent many Flatpak apps from working correctly. This is fixed in versions 1.8.5 and 1.10.0.
- https://github.com/flatpak/flatpak/commit/6d1773d2a54dde9b099043f07a2094a4f1c2f486
- https://github.com/flatpak/flatpak/commit/6d1773d2a54dde9b099043f07a2094a4f1c2f486
- https://github.com/flatpak/flatpak/commit/6e5ae7a109cdfa9735ea7ccbd8cb79f9e8d3ae8b
- https://github.com/flatpak/flatpak/commit/6e5ae7a109cdfa9735ea7ccbd8cb79f9e8d3ae8b
- https://github.com/flatpak/flatpak/commit/aeb6a7ab0abaac4a8f4ad98b3df476d9de6b8bd4
- https://github.com/flatpak/flatpak/commit/aeb6a7ab0abaac4a8f4ad98b3df476d9de6b8bd4
- https://github.com/flatpak/flatpak/commit/cc1401043c075268ecc652eac557ef8076b5eaba
- https://github.com/flatpak/flatpak/commit/cc1401043c075268ecc652eac557ef8076b5eaba
- https://github.com/flatpak/flatpak/releases/tag/1.8.5
- https://github.com/flatpak/flatpak/releases/tag/1.8.5
- https://github.com/flatpak/flatpak/security/advisories/GHSA-4ppf-fxf6-vxg2
- https://github.com/flatpak/flatpak/security/advisories/GHSA-4ppf-fxf6-vxg2
- GLSA-202101-21
- GLSA-202101-21
- DSA-4830
- DSA-4830
Closed bugs
libtifftcl3.9.7.so: undefined symbol: TIFFPredictorInit
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-15631
Improper access control in the Discuss App of Odoo Community 12.0 and earlier, and Odoo Enterprise 12.0 and earlier allows remote authenticated attackers to e-mail themselves arbitrary files from the database, via a crafted RPC request.
Modified: 2024-11-21
CVE-2018-15635
Cross-site scripting vulnerability in the Discuss App of Odoo Community 12.0 and earlier, and Odoo Enterprise 12.0 and earlier allows remote attackers to inject arbitrary web script in the browser of an internal user of the system by tricking them into inviting a follower on a document with a crafted name.
Modified: 2024-11-21
CVE-2018-15638
Cross-site scripting (XSS) issue in mail module in Odoo Community 13.0 and earlier and Odoo Enterprise 13.0 and earlier, allows remote attackers to inject arbitrary web script in the browser of a victim via crafted channel names.
Modified: 2024-11-21
CVE-2018-15640
Improper access control in the Helpdesk App of Odoo Enterprise 10.0 through 12.0 allows remote authenticated attackers to obtain elevated privileges via a crafted request.
Modified: 2024-11-21
CVE-2018-15645
Improper access control in message routing in Odoo Community 12.0 and earlier and Odoo Enterprise 12.0 and earlier allows remote authenticated users to create arbitrary records via crafted payloads, which may allow privilege escalation.
Modified: 2024-11-21
CVE-2019-11781
Improper input validation in portal component in Odoo Community 12.0 and earlier and Odoo Enterprise 12.0 and earlier, allows remote attackers to trick victims into modifying their account via crafted links, leading to privilege escalation.
Modified: 2024-11-21
CVE-2019-11785
Improper access control in mail module (followers) in Odoo Community 13.0 and earlier and Odoo Enterprise 13.0 and earlier, allows remote authenticated users to obtain access to messages posted on business records there were not given access to, and subscribe to receive future messages.
Modified: 2024-11-21
CVE-2019-11786
Improper access control in Odoo Community 13.0 and earlier and Odoo Enterprise 13.0 and earlier, allows remote authenticated users to modify translated terms, which may lead to arbitrary content modification on translatable elements.
Modified: 2024-11-21
CVE-2021-44460
Improper access control in Odoo Community 13.0 and earlier and Odoo Enterprise 13.0 and earlier allows users with deactivated accounts to access the system with the deactivated account and any permission it still holds, via crafted RPC requests.
Modified: 2025-02-03
CVE-2021-44465
Improper access control in Odoo Community 13.0 and earlier and Odoo Enterprise 13.0 and earlier allows authenticated attackers to subscribe to receive future notifications and comments related to arbitrary business records in the system, via crafted RPC requests.
Closed bugs
odoo is written in python3, it should not depend on python2