ALT-BU-2021-3738-2
Branch sisyphus update bulletin.
Closed bugs
Файловые конфликты с пакетом libxforms-demos
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-3481
A flaw was found in Qt. An out-of-bounds read vulnerability was found in QRadialFetchSimd in qt/qtbase/src/gui/painting/qdrawhelper_p.h in Qt/Qtbase. While rendering and displaying a crafted Scalable Vector Graphics (SVG) file this flaw may lead to an unauthorized memory access. The highest threat from this vulnerability is to data confidentiality and the application availability.
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
Package qt5-declarative updated to version 5.15.2-alt1 for branch sisyphus in task 264725.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-3481
A flaw was found in Qt. An out-of-bounds read vulnerability was found in QRadialFetchSimd in qt/qtbase/src/gui/painting/qdrawhelper_p.h in Qt/Qtbase. While rendering and displaying a crafted Scalable Vector Graphics (SVG) file this flaw may lead to an unauthorized memory access. The highest threat from this vulnerability is to data confidentiality and the application availability.
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
Package qt5-xmlpatterns updated to version 5.15.2-alt1 for branch sisyphus in task 264725.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-3481
A flaw was found in Qt. An out-of-bounds read vulnerability was found in QRadialFetchSimd in qt/qtbase/src/gui/painting/qdrawhelper_p.h in Qt/Qtbase. While rendering and displaying a crafted Scalable Vector Graphics (SVG) file this flaw may lead to an unauthorized memory access. The highest threat from this vulnerability is to data confidentiality and the application availability.
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-3481
A flaw was found in Qt. An out-of-bounds read vulnerability was found in QRadialFetchSimd in qt/qtbase/src/gui/painting/qdrawhelper_p.h in Qt/Qtbase. While rendering and displaying a crafted Scalable Vector Graphics (SVG) file this flaw may lead to an unauthorized memory access. The highest threat from this vulnerability is to data confidentiality and the application availability.
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
Package qt5-websockets updated to version 5.15.2-alt1 for branch sisyphus in task 264725.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-3481
A flaw was found in Qt. An out-of-bounds read vulnerability was found in QRadialFetchSimd in qt/qtbase/src/gui/painting/qdrawhelper_p.h in Qt/Qtbase. While rendering and displaying a crafted Scalable Vector Graphics (SVG) file this flaw may lead to an unauthorized memory access. The highest threat from this vulnerability is to data confidentiality and the application availability.
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
Package qt5-multimedia updated to version 5.15.2-alt1 for branch sisyphus in task 264725.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-3481
A flaw was found in Qt. An out-of-bounds read vulnerability was found in QRadialFetchSimd in qt/qtbase/src/gui/painting/qdrawhelper_p.h in Qt/Qtbase. While rendering and displaying a crafted Scalable Vector Graphics (SVG) file this flaw may lead to an unauthorized memory access. The highest threat from this vulnerability is to data confidentiality and the application availability.
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
Package qt5-serialport updated to version 5.15.2-alt1 for branch sisyphus in task 264725.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-3481
A flaw was found in Qt. An out-of-bounds read vulnerability was found in QRadialFetchSimd in qt/qtbase/src/gui/painting/qdrawhelper_p.h in Qt/Qtbase. While rendering and displaying a crafted Scalable Vector Graphics (SVG) file this flaw may lead to an unauthorized memory access. The highest threat from this vulnerability is to data confidentiality and the application availability.
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
Package qt5-location updated to version 5.15.2-alt1 for branch sisyphus in task 264725.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-3481
A flaw was found in Qt. An out-of-bounds read vulnerability was found in QRadialFetchSimd in qt/qtbase/src/gui/painting/qdrawhelper_p.h in Qt/Qtbase. While rendering and displaying a crafted Scalable Vector Graphics (SVG) file this flaw may lead to an unauthorized memory access. The highest threat from this vulnerability is to data confidentiality and the application availability.
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
Package qt5-sensors updated to version 5.15.2-alt1 for branch sisyphus in task 264725.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-3481
A flaw was found in Qt. An out-of-bounds read vulnerability was found in QRadialFetchSimd in qt/qtbase/src/gui/painting/qdrawhelper_p.h in Qt/Qtbase. While rendering and displaying a crafted Scalable Vector Graphics (SVG) file this flaw may lead to an unauthorized memory access. The highest threat from this vulnerability is to data confidentiality and the application availability.
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
Package qt5-webglplugin updated to version 5.15.2-alt1 for branch sisyphus in task 264725.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-3481
A flaw was found in Qt. An out-of-bounds read vulnerability was found in QRadialFetchSimd in qt/qtbase/src/gui/painting/qdrawhelper_p.h in Qt/Qtbase. While rendering and displaying a crafted Scalable Vector Graphics (SVG) file this flaw may lead to an unauthorized memory access. The highest threat from this vulnerability is to data confidentiality and the application availability.
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
Package qt5-webchannel updated to version 5.15.2-alt1 for branch sisyphus in task 264725.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-3481
A flaw was found in Qt. An out-of-bounds read vulnerability was found in QRadialFetchSimd in qt/qtbase/src/gui/painting/qdrawhelper_p.h in Qt/Qtbase. While rendering and displaying a crafted Scalable Vector Graphics (SVG) file this flaw may lead to an unauthorized memory access. The highest threat from this vulnerability is to data confidentiality and the application availability.
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
Package qt5-quickcontrols updated to version 5.15.2-alt1 for branch sisyphus in task 264725.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-3481
A flaw was found in Qt. An out-of-bounds read vulnerability was found in QRadialFetchSimd in qt/qtbase/src/gui/painting/qdrawhelper_p.h in Qt/Qtbase. While rendering and displaying a crafted Scalable Vector Graphics (SVG) file this flaw may lead to an unauthorized memory access. The highest threat from this vulnerability is to data confidentiality and the application availability.
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
Package qt5-script updated to version 5.15.2-alt1 for branch sisyphus in task 264725.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-3481
A flaw was found in Qt. An out-of-bounds read vulnerability was found in QRadialFetchSimd in qt/qtbase/src/gui/painting/qdrawhelper_p.h in Qt/Qtbase. While rendering and displaying a crafted Scalable Vector Graphics (SVG) file this flaw may lead to an unauthorized memory access. The highest threat from this vulnerability is to data confidentiality and the application availability.
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
Package qt5-x11extras updated to version 5.15.2-alt1 for branch sisyphus in task 264725.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-3481
A flaw was found in Qt. An out-of-bounds read vulnerability was found in QRadialFetchSimd in qt/qtbase/src/gui/painting/qdrawhelper_p.h in Qt/Qtbase. While rendering and displaying a crafted Scalable Vector Graphics (SVG) file this flaw may lead to an unauthorized memory access. The highest threat from this vulnerability is to data confidentiality and the application availability.
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
Package qt5-imageformats updated to version 5.15.2-alt1 for branch sisyphus in task 264725.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-3481
A flaw was found in Qt. An out-of-bounds read vulnerability was found in QRadialFetchSimd in qt/qtbase/src/gui/painting/qdrawhelper_p.h in Qt/Qtbase. While rendering and displaying a crafted Scalable Vector Graphics (SVG) file this flaw may lead to an unauthorized memory access. The highest threat from this vulnerability is to data confidentiality and the application availability.
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-3481
A flaw was found in Qt. An out-of-bounds read vulnerability was found in QRadialFetchSimd in qt/qtbase/src/gui/painting/qdrawhelper_p.h in Qt/Qtbase. While rendering and displaying a crafted Scalable Vector Graphics (SVG) file this flaw may lead to an unauthorized memory access. The highest threat from this vulnerability is to data confidentiality and the application availability.
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
Package qt5-quickcontrols2 updated to version 5.15.2-alt1 for branch sisyphus in task 264725.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-3481
A flaw was found in Qt. An out-of-bounds read vulnerability was found in QRadialFetchSimd in qt/qtbase/src/gui/painting/qdrawhelper_p.h in Qt/Qtbase. While rendering and displaying a crafted Scalable Vector Graphics (SVG) file this flaw may lead to an unauthorized memory access. The highest threat from this vulnerability is to data confidentiality and the application availability.
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
Package qt5-quicktimeline updated to version 5.15.2-alt1 for branch sisyphus in task 264725.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-3481
A flaw was found in Qt. An out-of-bounds read vulnerability was found in QRadialFetchSimd in qt/qtbase/src/gui/painting/qdrawhelper_p.h in Qt/Qtbase. While rendering and displaying a crafted Scalable Vector Graphics (SVG) file this flaw may lead to an unauthorized memory access. The highest threat from this vulnerability is to data confidentiality and the application availability.
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
Package qt5-connectivity updated to version 5.15.2-alt1 for branch sisyphus in task 264725.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-3481
A flaw was found in Qt. An out-of-bounds read vulnerability was found in QRadialFetchSimd in qt/qtbase/src/gui/painting/qdrawhelper_p.h in Qt/Qtbase. While rendering and displaying a crafted Scalable Vector Graphics (SVG) file this flaw may lead to an unauthorized memory access. The highest threat from this vulnerability is to data confidentiality and the application availability.
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
Package qt5-serialbus updated to version 5.15.2-alt1 for branch sisyphus in task 264725.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-3481
A flaw was found in Qt. An out-of-bounds read vulnerability was found in QRadialFetchSimd in qt/qtbase/src/gui/painting/qdrawhelper_p.h in Qt/Qtbase. While rendering and displaying a crafted Scalable Vector Graphics (SVG) file this flaw may lead to an unauthorized memory access. The highest threat from this vulnerability is to data confidentiality and the application availability.
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
Package qt5-translations updated to version 5.15.2-alt1 for branch sisyphus in task 264725.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-3481
A flaw was found in Qt. An out-of-bounds read vulnerability was found in QRadialFetchSimd in qt/qtbase/src/gui/painting/qdrawhelper_p.h in Qt/Qtbase. While rendering and displaying a crafted Scalable Vector Graphics (SVG) file this flaw may lead to an unauthorized memory access. The highest threat from this vulnerability is to data confidentiality and the application availability.
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
Package qt5-graphicaleffects updated to version 5.15.2-alt1 for branch sisyphus in task 264725.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-3481
A flaw was found in Qt. An out-of-bounds read vulnerability was found in QRadialFetchSimd in qt/qtbase/src/gui/painting/qdrawhelper_p.h in Qt/Qtbase. While rendering and displaying a crafted Scalable Vector Graphics (SVG) file this flaw may lead to an unauthorized memory access. The highest threat from this vulnerability is to data confidentiality and the application availability.
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-3481
A flaw was found in Qt. An out-of-bounds read vulnerability was found in QRadialFetchSimd in qt/qtbase/src/gui/painting/qdrawhelper_p.h in Qt/Qtbase. While rendering and displaying a crafted Scalable Vector Graphics (SVG) file this flaw may lead to an unauthorized memory access. The highest threat from this vulnerability is to data confidentiality and the application availability.
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
Package qt5-wayland updated to version 5.15.2-alt1 for branch sisyphus in task 264725.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-3481
A flaw was found in Qt. An out-of-bounds read vulnerability was found in QRadialFetchSimd in qt/qtbase/src/gui/painting/qdrawhelper_p.h in Qt/Qtbase. While rendering and displaying a crafted Scalable Vector Graphics (SVG) file this flaw may lead to an unauthorized memory access. The highest threat from this vulnerability is to data confidentiality and the application availability.
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
Package qt5-webengine updated to version 5.15.2-alt1 for branch sisyphus in task 264725.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-3481
A flaw was found in Qt. An out-of-bounds read vulnerability was found in QRadialFetchSimd in qt/qtbase/src/gui/painting/qdrawhelper_p.h in Qt/Qtbase. While rendering and displaying a crafted Scalable Vector Graphics (SVG) file this flaw may lead to an unauthorized memory access. The highest threat from this vulnerability is to data confidentiality and the application availability.
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-3481
A flaw was found in Qt. An out-of-bounds read vulnerability was found in QRadialFetchSimd in qt/qtbase/src/gui/painting/qdrawhelper_p.h in Qt/Qtbase. While rendering and displaying a crafted Scalable Vector Graphics (SVG) file this flaw may lead to an unauthorized memory access. The highest threat from this vulnerability is to data confidentiality and the application availability.
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
Package qt5-virtualkeyboard updated to version 5.15.2-alt1 for branch sisyphus in task 264725.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-3481
A flaw was found in Qt. An out-of-bounds read vulnerability was found in QRadialFetchSimd in qt/qtbase/src/gui/painting/qdrawhelper_p.h in Qt/Qtbase. While rendering and displaying a crafted Scalable Vector Graphics (SVG) file this flaw may lead to an unauthorized memory access. The highest threat from this vulnerability is to data confidentiality and the application availability.
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-3481
A flaw was found in Qt. An out-of-bounds read vulnerability was found in QRadialFetchSimd in qt/qtbase/src/gui/painting/qdrawhelper_p.h in Qt/Qtbase. While rendering and displaying a crafted Scalable Vector Graphics (SVG) file this flaw may lead to an unauthorized memory access. The highest threat from this vulnerability is to data confidentiality and the application availability.
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
Package qt5-charts updated to version 5.15.2-alt1 for branch sisyphus in task 264725.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-3481
A flaw was found in Qt. An out-of-bounds read vulnerability was found in QRadialFetchSimd in qt/qtbase/src/gui/painting/qdrawhelper_p.h in Qt/Qtbase. While rendering and displaying a crafted Scalable Vector Graphics (SVG) file this flaw may lead to an unauthorized memory access. The highest threat from this vulnerability is to data confidentiality and the application availability.
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
Package qt5-speech updated to version 5.15.2-alt1 for branch sisyphus in task 264725.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-3481
A flaw was found in Qt. An out-of-bounds read vulnerability was found in QRadialFetchSimd in qt/qtbase/src/gui/painting/qdrawhelper_p.h in Qt/Qtbase. While rendering and displaying a crafted Scalable Vector Graphics (SVG) file this flaw may lead to an unauthorized memory access. The highest threat from this vulnerability is to data confidentiality and the application availability.
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
Package qt5-datavis3d updated to version 5.15.2-alt1 for branch sisyphus in task 264725.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-3481
A flaw was found in Qt. An out-of-bounds read vulnerability was found in QRadialFetchSimd in qt/qtbase/src/gui/painting/qdrawhelper_p.h in Qt/Qtbase. While rendering and displaying a crafted Scalable Vector Graphics (SVG) file this flaw may lead to an unauthorized memory access. The highest threat from this vulnerability is to data confidentiality and the application availability.
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
Package qt5-gamepad updated to version 5.15.2-alt1 for branch sisyphus in task 264725.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-3481
A flaw was found in Qt. An out-of-bounds read vulnerability was found in QRadialFetchSimd in qt/qtbase/src/gui/painting/qdrawhelper_p.h in Qt/Qtbase. While rendering and displaying a crafted Scalable Vector Graphics (SVG) file this flaw may lead to an unauthorized memory access. The highest threat from this vulnerability is to data confidentiality and the application availability.
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
Package qt5-webview updated to version 5.15.2-alt1 for branch sisyphus in task 264725.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-3481
A flaw was found in Qt. An out-of-bounds read vulnerability was found in QRadialFetchSimd in qt/qtbase/src/gui/painting/qdrawhelper_p.h in Qt/Qtbase. While rendering and displaying a crafted Scalable Vector Graphics (SVG) file this flaw may lead to an unauthorized memory access. The highest threat from this vulnerability is to data confidentiality and the application availability.
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
Package qt5-networkauth updated to version 5.15.2-alt1 for branch sisyphus in task 264725.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-3481
A flaw was found in Qt. An out-of-bounds read vulnerability was found in QRadialFetchSimd in qt/qtbase/src/gui/painting/qdrawhelper_p.h in Qt/Qtbase. While rendering and displaying a crafted Scalable Vector Graphics (SVG) file this flaw may lead to an unauthorized memory access. The highest threat from this vulnerability is to data confidentiality and the application availability.
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
Package qt5-remoteobjects updated to version 5.15.2-alt1 for branch sisyphus in task 264725.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-3481
A flaw was found in Qt. An out-of-bounds read vulnerability was found in QRadialFetchSimd in qt/qtbase/src/gui/painting/qdrawhelper_p.h in Qt/Qtbase. While rendering and displaying a crafted Scalable Vector Graphics (SVG) file this flaw may lead to an unauthorized memory access. The highest threat from this vulnerability is to data confidentiality and the application availability.
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
- https://access.redhat.com/security/cve/CVE-2021-3481
- https://bugreports.qt.io/browse/QTBUG-91507
- https://bugzilla.redhat.com/show_bug.cgi?id=1931444
- https://codereview.qt-project.org/c/qt/qtsvg/+/337646
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
Package SDL2_image updated to version 2.0.5-alt1 for branch sisyphus in task 266133.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-5051
An exploitable heap-based buffer overflow vulnerability exists when loading a PCX file in SDL2_image, version 2.0.4. A missing error handler can lead to a buffer overflow and potential code execution. An attacker can provide a specially crafted image file to trigger this vulnerability.
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.html
- https://lists.debian.org/debian-lts-announce/2019/07/msg00026.html
- https://talosintelligence.com/vulnerability_reports/TALOS-2019-0820
- https://usn.ubuntu.com/4238-1/
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.html
- https://lists.debian.org/debian-lts-announce/2019/07/msg00026.html
- https://talosintelligence.com/vulnerability_reports/TALOS-2019-0820
- https://usn.ubuntu.com/4238-1/
Modified: 2024-11-21
CVE-2019-5052
An exploitable integer overflow vulnerability exists when loading a PCX file in SDL2_image 2.0.4. A specially crafted file can cause an integer overflow, resulting in too little memory being allocated, which can lead to a buffer overflow and potential code execution. An attacker can provide a specially crafted image file to trigger this vulnerability.
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00030.html
- https://lists.debian.org/debian-lts-announce/2019/07/msg00021.html
- https://lists.debian.org/debian-lts-announce/2019/07/msg00026.html
- https://talosintelligence.com/vulnerability_reports/TALOS-2019-0821
- https://usn.ubuntu.com/4238-1/
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00030.html
- https://lists.debian.org/debian-lts-announce/2019/07/msg00021.html
- https://lists.debian.org/debian-lts-announce/2019/07/msg00026.html
- https://talosintelligence.com/vulnerability_reports/TALOS-2019-0821
- https://usn.ubuntu.com/4238-1/
Modified: 2024-11-21
CVE-2019-5057
An exploitable code execution vulnerability exists in the PCX image-rendering functionality of SDL2_image 2.0.4. A specially crafted PCX image can cause a heap overflow, resulting in code execution. An attacker can display a specially crafted image to trigger this vulnerability.
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00030.html
- https://talosintelligence.com/vulnerability_reports/TALOS-2019-0841
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00030.html
- https://talosintelligence.com/vulnerability_reports/TALOS-2019-0841
Modified: 2024-11-21
CVE-2019-5058
An exploitable code execution vulnerability exists in the XCF image rendering functionality of SDL2_image 2.0.4. A specially crafted XCF image can cause a heap overflow, resulting in code execution. An attacker can display a specially crafted image to trigger this vulnerability.
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00030.html
- https://talosintelligence.com/vulnerability_reports/TALOS-2019-0842
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00030.html
- https://talosintelligence.com/vulnerability_reports/TALOS-2019-0842
Modified: 2024-11-21
CVE-2019-5059
An exploitable code execution vulnerability exists in the XPM image rendering functionality of SDL2_image 2.0.4. A specially crafted XPM image can cause an integer overflow, allocating too small of a buffer. This buffer can then be written out of bounds resulting in a heap overflow, ultimately ending in code execution. An attacker can display a specially crafted image to trigger this vulnerability.
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00030.html
- https://talosintelligence.com/vulnerability_reports/TALOS-2019-0843
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00030.html
- https://talosintelligence.com/vulnerability_reports/TALOS-2019-0843
Modified: 2024-11-21
CVE-2019-5060
An exploitable code execution vulnerability exists in the XPM image rendering function of SDL2_image 2.0.4. A specially crafted XPM image can cause an integer overflow in the colorhash function, allocating too small of a buffer. This buffer can then be written out of bounds, resulting in a heap overflow, ultimately ending in code execution. An attacker can display a specially crafted image to trigger this vulnerability.
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00030.html
- https://talosintelligence.com/vulnerability_reports/TALOS-2019-0844
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00012.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00014.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2019-09/msg00030.html
- https://talosintelligence.com/vulnerability_reports/TALOS-2019-0844
Closed bugs
собран без поддержки pcre2
Package postgresql13 updated to version 13.2-alt1 for branch sisyphus in task 266168.
Closed vulnerabilities
BDU:2021-00810
Уязвимость системы управления базами данных PostgreSQL, связанная с ошибками механизмов безопасности, позволяющая нарушителю получить значения столбцов из сообщения об ошибке (без привилегии SELECT)
BDU:2021-01131
Уязвимость системы управления базами данных PostgreSQL, связанная с недостатками механизма авторизации, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Modified: 2024-11-21
CVE-2021-20229
A flaw was found in PostgreSQL in versions before 13.2. This flaw allows a user with SELECT privilege on one column to craft a special query that returns all columns of the table. The highest threat from this vulnerability is to confidentiality.
- https://bugzilla.redhat.com/show_bug.cgi?id=1925296
- https://security.gentoo.org/glsa/202105-32
- https://security.netapp.com/advisory/ntap-20210326-0005/
- https://bugzilla.redhat.com/show_bug.cgi?id=1925296
- https://security.gentoo.org/glsa/202105-32
- https://security.netapp.com/advisory/ntap-20210326-0005/
Modified: 2024-11-21
CVE-2021-3393
An information leak was discovered in postgresql in versions before 13.2, before 12.6 and before 11.11. A user having UPDATE permission but not SELECT permission to a particular column could craft queries which, under some circumstances, might disclose values from that column in error messages. An attacker could use this flaw to obtain information stored in a column they are allowed to write but not read.
- https://bugzilla.redhat.com/show_bug.cgi?id=1924005
- https://security.gentoo.org/glsa/202105-32
- https://security.netapp.com/advisory/ntap-20210507-0006/
- https://bugzilla.redhat.com/show_bug.cgi?id=1924005
- https://security.gentoo.org/glsa/202105-32
- https://security.netapp.com/advisory/ntap-20210507-0006/
Package postgresql11 updated to version 11.11-alt1 for branch sisyphus in task 266168.
Closed vulnerabilities
BDU:2021-00810
Уязвимость системы управления базами данных PostgreSQL, связанная с ошибками механизмов безопасности, позволяющая нарушителю получить значения столбцов из сообщения об ошибке (без привилегии SELECT)
Modified: 2024-11-21
CVE-2021-3393
An information leak was discovered in postgresql in versions before 13.2, before 12.6 and before 11.11. A user having UPDATE permission but not SELECT permission to a particular column could craft queries which, under some circumstances, might disclose values from that column in error messages. An attacker could use this flaw to obtain information stored in a column they are allowed to write but not read.
- https://bugzilla.redhat.com/show_bug.cgi?id=1924005
- https://security.gentoo.org/glsa/202105-32
- https://security.netapp.com/advisory/ntap-20210507-0006/
- https://bugzilla.redhat.com/show_bug.cgi?id=1924005
- https://security.gentoo.org/glsa/202105-32
- https://security.netapp.com/advisory/ntap-20210507-0006/
Package postgresql12 updated to version 12.6-alt1 for branch sisyphus in task 266168.
Closed vulnerabilities
BDU:2021-00810
Уязвимость системы управления базами данных PostgreSQL, связанная с ошибками механизмов безопасности, позволяющая нарушителю получить значения столбцов из сообщения об ошибке (без привилегии SELECT)
Modified: 2024-11-21
CVE-2021-3393
An information leak was discovered in postgresql in versions before 13.2, before 12.6 and before 11.11. A user having UPDATE permission but not SELECT permission to a particular column could craft queries which, under some circumstances, might disclose values from that column in error messages. An attacker could use this flaw to obtain information stored in a column they are allowed to write but not read.
- https://bugzilla.redhat.com/show_bug.cgi?id=1924005
- https://security.gentoo.org/glsa/202105-32
- https://security.netapp.com/advisory/ntap-20210507-0006/
- https://bugzilla.redhat.com/show_bug.cgi?id=1924005
- https://security.gentoo.org/glsa/202105-32
- https://security.netapp.com/advisory/ntap-20210507-0006/
Package postgresql12-1C updated to version 12.5-alt4 for branch sisyphus in task 266179.
Closed vulnerabilities
BDU:2021-00810
Уязвимость системы управления базами данных PostgreSQL, связанная с ошибками механизмов безопасности, позволяющая нарушителю получить значения столбцов из сообщения об ошибке (без привилегии SELECT)
Modified: 2024-11-21
CVE-2021-3393
An information leak was discovered in postgresql in versions before 13.2, before 12.6 and before 11.11. A user having UPDATE permission but not SELECT permission to a particular column could craft queries which, under some circumstances, might disclose values from that column in error messages. An attacker could use this flaw to obtain information stored in a column they are allowed to write but not read.
- https://bugzilla.redhat.com/show_bug.cgi?id=1924005
- https://security.gentoo.org/glsa/202105-32
- https://security.netapp.com/advisory/ntap-20210507-0006/
- https://bugzilla.redhat.com/show_bug.cgi?id=1924005
- https://security.gentoo.org/glsa/202105-32
- https://security.netapp.com/advisory/ntap-20210507-0006/
Closed bugs
apol: не открывается справка
Closed vulnerabilities
BDU:2021-00816
Уязвимость функции g_byte_array_new_take() библиотеки Glib, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2021-27218
An issue was discovered in GNOME GLib before 2.66.7 and 2.67.x before 2.67.4. If g_byte_array_new_take() was called with a buffer of 4GB or more on a 64-bit platform, the length would be truncated modulo 2**32, causing unintended length truncation.
- https://gitlab.gnome.org/GNOME/glib/-/merge_requests/1942
- https://gitlab.gnome.org/GNOME/glib/-/merge_requests/1944
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2022/06/msg00006.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2REA7RVKN7ZHRLJOEGBRQKJIPZQPAELZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJMPNDO4GDVURYQFYKFOWY5HAF4FTEPN/
- https://security.gentoo.org/glsa/202107-13
- https://security.netapp.com/advisory/ntap-20210319-0004/
- https://gitlab.gnome.org/GNOME/glib/-/merge_requests/1942
- https://gitlab.gnome.org/GNOME/glib/-/merge_requests/1944
- https://lists.apache.org/thread.html/r58af02e294bd07f487e2c64ffc0a29b837db5600e33b6e698b9d696b%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf4c02775860db415b4955778a131c2795223f61cb8c6a450893651e4%40%3Cissues.bookkeeper.apache.org%3E
- https://lists.apache.org/thread.html/rf9fa47ab66495c78bb4120b0754dd9531ca2ff0430f6685ac9b07772%40%3Cdev.mina.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2022/06/msg00006.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2REA7RVKN7ZHRLJOEGBRQKJIPZQPAELZ/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JJMPNDO4GDVURYQFYKFOWY5HAF4FTEPN/
- https://security.gentoo.org/glsa/202107-13
- https://security.netapp.com/advisory/ntap-20210319-0004/
Package libwebkitgtk4 updated to version 2.30.5-alt1 for branch sisyphus in task 266194.
Closed vulnerabilities
BDU:2022-00324
Уязвимость модуля отображения веб-страниц WebKit, связанная с использованием памяти после её освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-00344
Уязвимость модуля отображения веб-страниц WebKit, связанная с использованием памяти после её освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-21775
A use-after-free vulnerability exists in the way certain events are processed for ImageLoader objects of Webkit WebKitGTK 2.30.4. A specially crafted web page can lead to a potential information leak and further memory corruption. In order to trigger the vulnerability, a victim must be tricked into visiting a malicious webpage.
- http://www.openwall.com/lists/oss-security/2021/07/23/1
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KYMMBQN4PRVDLMIJT2LY2BWHLYBD57P3/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V4QORERLPDN3UNNJFJSOMHZZCU2G75Q6/
- https://talosintelligence.com/vulnerability_reports/TALOS-2021-1229
- https://www.debian.org/security/2021/dsa-4945
- http://www.openwall.com/lists/oss-security/2021/07/23/1
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KYMMBQN4PRVDLMIJT2LY2BWHLYBD57P3/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V4QORERLPDN3UNNJFJSOMHZZCU2G75Q6/
- https://talosintelligence.com/vulnerability_reports/TALOS-2021-1229
- https://www.debian.org/security/2021/dsa-4945
Modified: 2024-11-21
CVE-2021-21779
A use-after-free vulnerability exists in the way Webkit’s GraphicsContext handles certain events in WebKitGTK 2.30.4. A specially crafted web page can lead to a potential information leak and further memory corruption. A victim must be tricked into visiting a malicious web page to trigger this vulnerability.
- http://www.openwall.com/lists/oss-security/2021/07/23/1
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KYMMBQN4PRVDLMIJT2LY2BWHLYBD57P3/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V4QORERLPDN3UNNJFJSOMHZZCU2G75Q6/
- https://talosintelligence.com/vulnerability_reports/TALOS-2021-1238
- https://www.debian.org/security/2021/dsa-4945
- http://www.openwall.com/lists/oss-security/2021/07/23/1
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KYMMBQN4PRVDLMIJT2LY2BWHLYBD57P3/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/V4QORERLPDN3UNNJFJSOMHZZCU2G75Q6/
- https://talosintelligence.com/vulnerability_reports/TALOS-2021-1238
- https://www.debian.org/security/2021/dsa-4945
Package docker-engine updated to version 20.10.3-alt1 for branch sisyphus in task 266041.
Closed vulnerabilities
BDU:2021-01892
Уязвимость демона dockerd средства автоматизации развёртывания и управления приложениями в средах с поддержкой контейнеризации Docker, связанная с ошибкой механизма контроля расходуемых ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-01893
Уязвимость опции --userns-remap средства автоматизации развёртывания и управления приложениями в средах с поддержкой контейнеризации Docker, связанная с некорректным ограничением имени пути к каталогу, позволяющая нарушителю оказать воздействие на целостность данных
Modified: 2024-11-21
CVE-2021-21284
In Docker before versions 9.03.15, 20.10.3 there is a vulnerability involving the --userns-remap option in which access to remapped root allows privilege escalation to real root. When using "--userns-remap", if the root user in the remapped namespace has access to the host filesystem they can modify files under "/var/lib/docker/
- https://docs.docker.com/engine/release-notes/#20103
- https://github.com/moby/moby/commit/64bd4485b3a66a597c02c95f5776395e540b2c7c
- https://github.com/moby/moby/releases/tag/v19.03.15
- https://github.com/moby/moby/releases/tag/v20.10.3
- https://github.com/moby/moby/security/advisories/GHSA-7452-xqpj-6rpc
- https://security.gentoo.org/glsa/202107-23
- https://security.netapp.com/advisory/ntap-20210226-0005/
- https://www.debian.org/security/2021/dsa-4865
- https://docs.docker.com/engine/release-notes/#20103
- https://github.com/moby/moby/commit/64bd4485b3a66a597c02c95f5776395e540b2c7c
- https://github.com/moby/moby/releases/tag/v19.03.15
- https://github.com/moby/moby/releases/tag/v20.10.3
- https://github.com/moby/moby/security/advisories/GHSA-7452-xqpj-6rpc
- https://security.gentoo.org/glsa/202107-23
- https://security.netapp.com/advisory/ntap-20210226-0005/
- https://www.debian.org/security/2021/dsa-4865
Modified: 2024-11-21
CVE-2021-21285
In Docker before versions 9.03.15, 20.10.3 there is a vulnerability in which pulling an intentionally malformed Docker image manifest crashes the dockerd daemon. Versions 20.10.3 and 19.03.15 contain patches that prevent the daemon from crashing.
- https://docs.docker.com/engine/release-notes/#20103
- https://github.com/moby/moby/commit/8d3179546e79065adefa67cc697c09d0ab137d30
- https://github.com/moby/moby/releases/tag/v19.03.15
- https://github.com/moby/moby/releases/tag/v20.10.3
- https://github.com/moby/moby/security/advisories/GHSA-6fj5-m822-rqx8
- https://security.gentoo.org/glsa/202107-23
- https://security.netapp.com/advisory/ntap-20210226-0005/
- https://www.debian.org/security/2021/dsa-4865
- https://docs.docker.com/engine/release-notes/#20103
- https://github.com/moby/moby/commit/8d3179546e79065adefa67cc697c09d0ab137d30
- https://github.com/moby/moby/releases/tag/v19.03.15
- https://github.com/moby/moby/releases/tag/v20.10.3
- https://github.com/moby/moby/security/advisories/GHSA-6fj5-m822-rqx8
- https://security.gentoo.org/glsa/202107-23
- https://security.netapp.com/advisory/ntap-20210226-0005/
- https://www.debian.org/security/2021/dsa-4865