ALT-BU-2021-4214-1
Branch sisyphus update bulletin.
Package linux-tools updated to version 5.14-alt2 for branch sisyphus in task 285484.
Closed bugs
Add bootconfig utility
Closed vulnerabilities
BDU:2021-05231
Уязвимость функции idxGetTableInfo компонента командной строки встраиваемой СУБД SQLite, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-36690
A segmentation fault can occur in the sqlite3.exe command-line component of SQLite 3.36.0 via the idxGetTableInfo function when there is a crafted SQL query. NOTE: the vendor disputes the relevance of this report because a sqlite3.exe user already has full privileges (e.g., is intentionally allowed to execute commands). This report does NOT imply any problem in the SQLite library.
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-3 Additional information for APPLE-SA-2022-09-12-1 iOS 16
- 20221030 APPLE-SA-2022-10-27-3 Additional information for APPLE-SA-2022-09-12-1 iOS 16
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-11 tvOS 16
- 20221030 APPLE-SA-2022-10-27-11 tvOS 16
- 20221030 APPLE-SA-2022-10-27-13 watchOS 9
- 20221030 APPLE-SA-2022-10-27-13 watchOS 9
- https://support.apple.com/kb/HT213446
- https://support.apple.com/kb/HT213446
- https://support.apple.com/kb/HT213486
- https://support.apple.com/kb/HT213486
- https://support.apple.com/kb/HT213487
- https://support.apple.com/kb/HT213487
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213488
- https://www.sqlite.org/forum/forumpost/718c0a8d17
- https://www.sqlite.org/forum/forumpost/718c0a8d17
Closed vulnerabilities
BDU:2022-02042
Уязвимость функции decode_chars рендерера субтитров формата ASS/SSA Libass, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-36430
libass 0.15.x before 0.15.1 has a heap-based buffer overflow in decode_chars (called from decode_font and process_text) because the wrong integer data type is used for subtraction.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26674
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=26674
- https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libass/OSV-2020-2099.yaml
- https://github.com/google/oss-fuzz-vulns/blob/main/vulns/libass/OSV-2020-2099.yaml
- https://github.com/libass/libass/commit/017137471d0043e0321e377ed8da48e45a3ec632
- https://github.com/libass/libass/commit/017137471d0043e0321e377ed8da48e45a3ec632
- FEDORA-2022-2af150223a
- FEDORA-2022-2af150223a
- GLSA-202208-13
- GLSA-202208-13
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-3403
In ytnef 1.9.3, the TNEFSubjectHandler function in lib/ytnef.c allows remote attackers to cause a denial-of-service (and potentially code execution) due to a double free which can be triggered via a crafted file.
Modified: 2024-11-21
CVE-2021-3404
In ytnef 1.9.3, the SwapWord function in lib/ytnef.c allows remote attackers to cause a denial-of-service (and potentially code execution) due to a heap buffer overflow which can be triggered via a crafted file.