ALT-BU-2021-4259-2
Branch sisyphus update bulletin.
Package firefox-esr updated to version 91.2.0-alt1 for branch sisyphus in task 286488.
Closed vulnerabilities
BDU:2021-05029
Уязвимость операции MessageTasks браузера Mozilla Firefox, позволяющая нарушителю выполнить произвольный код в системе.
BDU:2021-05030
Уязвимость браузера Mozilla Firefox, связанная с ошибками при обработке HTML-содержимого, позволяющая нарушителю, выполнить произвольный код в системе
BDU:2021-05095
Уязвимость объекта nsLanguageAtomService браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код
BDU:2021-05096
Уязвимость браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, вызванная переполнением буфера, позволяющая нарушителю выполнить произвольный код
BDU:2021-05097
Уязвимость функций "Stealer::steal", "Stealer::steal_batch" и "Stealer::steal_batch_and_pop" браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2021-32810
crossbeam-deque is a package of work-stealing deques for building task schedulers when programming in Rust. In versions prior to 0.7.4 and 0.8.0, the result of the race condition is that one or more tasks in the worker queue can be popped twice instead of other tasks that are forgotten and never popped. If tasks are allocated on the heap, this can cause double free and a memory leak. If not, this still can cause a logical bug. Crates using `Stealer::steal`, `Stealer::steal_batch`, or `Stealer::steal_batch_and_pop` are affected by this issue. This has been fixed in crossbeam-deque 0.8.1 and 0.7.4.
- https://github.com/crossbeam-rs/crossbeam/security/advisories/GHSA-pqqp-xmhj-wgcw
- https://github.com/crossbeam-rs/crossbeam/security/advisories/GHSA-pqqp-xmhj-wgcw
- FEDORA-2021-60f0e1bb35
- FEDORA-2021-60f0e1bb35
- FEDORA-2021-e37a366b00
- FEDORA-2021-e37a366b00
- FEDORA-2021-e5ec6d55bf
- FEDORA-2021-e5ec6d55bf
- FEDORA-2021-32c9adf002
- FEDORA-2021-32c9adf002
- FEDORA-2021-a5161737c3
- FEDORA-2021-a5161737c3
- FEDORA-2021-537541ceae
- FEDORA-2021-537541ceae
- FEDORA-2021-0f82e9d6d5
- FEDORA-2021-0f82e9d6d5
- FEDORA-2021-2db6c84087
- FEDORA-2021-2db6c84087
- FEDORA-2021-79ce3cb64a
- FEDORA-2021-79ce3cb64a
- FEDORA-2021-af2eb94426
- FEDORA-2021-af2eb94426
- FEDORA-2021-5e99655cca
- FEDORA-2021-5e99655cca
- FEDORA-2021-67d6c34e5b
- FEDORA-2021-67d6c34e5b
- FEDORA-2021-3cf88e44b4
- FEDORA-2021-3cf88e44b4
- FEDORA-2021-9dc0bd0072
- FEDORA-2021-9dc0bd0072
Modified: 2024-11-21
CVE-2021-38496
During operations on MessageTasks, a task may have been removed while it was still scheduled, resulting in memory corruption and a potentially exploitable crash. This vulnerability affects Thunderbird < 78.15, Thunderbird < 91.2, Firefox ESR < 91.2, Firefox ESR < 78.15, and Firefox < 93.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1725335
- https://bugzilla.mozilla.org/show_bug.cgi?id=1725335
- [debian-lts-announce] 20220104 [SECURITY] [DLA 2874-1] thunderbird security update
- [debian-lts-announce] 20220104 [SECURITY] [DLA 2874-1] thunderbird security update
- DSA-5034
- DSA-5034
- https://www.mozilla.org/security/advisories/mfsa2021-43/
- https://www.mozilla.org/security/advisories/mfsa2021-43/
- https://www.mozilla.org/security/advisories/mfsa2021-44/
- https://www.mozilla.org/security/advisories/mfsa2021-44/
- https://www.mozilla.org/security/advisories/mfsa2021-45/
- https://www.mozilla.org/security/advisories/mfsa2021-45/
- https://www.mozilla.org/security/advisories/mfsa2021-46/
- https://www.mozilla.org/security/advisories/mfsa2021-46/
- https://www.mozilla.org/security/advisories/mfsa2021-47/
- https://www.mozilla.org/security/advisories/mfsa2021-47/
Modified: 2024-11-21
CVE-2021-38497
Through use of reportValidity() and window.open(), a plain-text validation message could have been overlaid on another origin, leading to possible user confusion and spoofing attacks. This vulnerability affects Firefox < 93, Thunderbird < 91.2, and Firefox ESR < 91.2.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1726621
- https://bugzilla.mozilla.org/show_bug.cgi?id=1726621
- https://www.mozilla.org/security/advisories/mfsa2021-43/
- https://www.mozilla.org/security/advisories/mfsa2021-43/
- https://www.mozilla.org/security/advisories/mfsa2021-45/
- https://www.mozilla.org/security/advisories/mfsa2021-45/
- https://www.mozilla.org/security/advisories/mfsa2021-47/
- https://www.mozilla.org/security/advisories/mfsa2021-47/
Modified: 2024-11-21
CVE-2021-38498
During process shutdown, a document could have caused a use-after-free of a languages service object, leading to memory corruption and a potentially exploitable crash. This vulnerability affects Firefox < 93, Thunderbird < 91.2, and Firefox ESR < 91.2.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1729642
- https://bugzilla.mozilla.org/show_bug.cgi?id=1729642
- https://www.mozilla.org/security/advisories/mfsa2021-43/
- https://www.mozilla.org/security/advisories/mfsa2021-43/
- https://www.mozilla.org/security/advisories/mfsa2021-45/
- https://www.mozilla.org/security/advisories/mfsa2021-45/
- https://www.mozilla.org/security/advisories/mfsa2021-47/
- https://www.mozilla.org/security/advisories/mfsa2021-47/
Modified: 2024-11-21
CVE-2021-38500
Mozilla developers reported memory safety bugs present in Firefox 92 and Firefox ESR 91.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Thunderbird < 78.15, Thunderbird < 91.2, Firefox ESR < 91.2, Firefox ESR < 78.15, and Firefox < 93.
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1725854%2C1728321
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1725854%2C1728321
- [debian-lts-announce] 20220104 [SECURITY] [DLA 2874-1] thunderbird security update
- [debian-lts-announce] 20220104 [SECURITY] [DLA 2874-1] thunderbird security update
- DSA-5034
- DSA-5034
- https://www.mozilla.org/security/advisories/mfsa2021-43/
- https://www.mozilla.org/security/advisories/mfsa2021-43/
- https://www.mozilla.org/security/advisories/mfsa2021-44/
- https://www.mozilla.org/security/advisories/mfsa2021-44/
- https://www.mozilla.org/security/advisories/mfsa2021-45/
- https://www.mozilla.org/security/advisories/mfsa2021-45/
- https://www.mozilla.org/security/advisories/mfsa2021-46/
- https://www.mozilla.org/security/advisories/mfsa2021-46/
- https://www.mozilla.org/security/advisories/mfsa2021-47/
- https://www.mozilla.org/security/advisories/mfsa2021-47/
Modified: 2024-11-21
CVE-2021-38501
Mozilla developers reported memory safety bugs present in Firefox 92 and Firefox ESR 91.1. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 93, Thunderbird < 91.2, and Firefox ESR < 91.2.
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1685354%2C1715755%2C1723176
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1685354%2C1715755%2C1723176
- https://www.mozilla.org/security/advisories/mfsa2021-43/
- https://www.mozilla.org/security/advisories/mfsa2021-43/
- https://www.mozilla.org/security/advisories/mfsa2021-45/
- https://www.mozilla.org/security/advisories/mfsa2021-45/
- https://www.mozilla.org/security/advisories/mfsa2021-47/
- https://www.mozilla.org/security/advisories/mfsa2021-47/
Package containerd updated to version 1.4.11-alt1 for branch sisyphus in task 286532.
Closed vulnerabilities
BDU:2022-00757
Уязвимость среды выполнения контейнеров Containerd, связанная с недостатками разграничения доступа к корневым каталогам и плагинам, позволяющая нарушителю получить доступ на чтение и изменение файлов
Modified: 2024-11-21
CVE-2021-41103
containerd is an open source container runtime with an emphasis on simplicity, robustness and portability. A bug was found in containerd where container root directories and some plugins had insufficiently restricted permissions, allowing otherwise unprivileged Linux users to traverse directory contents and execute programs. When containers included executable programs with extended permission bits (such as setuid), unprivileged Linux users could discover and execute those programs. When the UID of an unprivileged Linux user on the host collided with the file owner or group inside a container, the unprivileged Linux user on the host could discover, read, and modify those files. This vulnerability has been fixed in containerd 1.4.11 and containerd 1.5.7. Users should update to these version when they are released and may restart containers or update directory permissions to mitigate the vulnerability. Users unable to update should limit access to the host to trusted users. Update directory permission on container bundles directories.
- https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf
- https://github.com/containerd/containerd/commit/5b46e404f6b9f661a205e28d59c982d3634148f8
- https://github.com/containerd/containerd/commit/5b46e404f6b9f661a205e28d59c982d3634148f8
- https://github.com/containerd/containerd/security/advisories/GHSA-c2h3-6mxw-7mvq
- https://github.com/containerd/containerd/security/advisories/GHSA-c2h3-6mxw-7mvq
- FEDORA-2021-b5a9a481a2
- FEDORA-2021-b5a9a481a2
- FEDORA-2021-df975338d4
- FEDORA-2021-df975338d4
- GLSA-202401-31
- GLSA-202401-31
- DSA-5002
- DSA-5002
Package docker-engine updated to version 20.10.9-alt1 for branch sisyphus in task 286532.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-39293
In archive/zip in Go before 1.16.8 and 1.17.x before 1.17.1, a crafted archive header (falsely designating that many files are present) can cause a NewReader or OpenReader panic. NOTE: this issue exists because of an incomplete fix for CVE-2021-33196.
- https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf
- https://groups.google.com/g/golang-announce/c/dx9d7IOseHw
- https://groups.google.com/g/golang-announce/c/dx9d7IOseHw
- [debian-lts-announce] 20230419 [SECURITY] [DLA 3395-1] golang-1.11 security update
- [debian-lts-announce] 20230419 [SECURITY] [DLA 3395-1] golang-1.11 security update
- https://security.netapp.com/advisory/ntap-20220217-0009/
- https://security.netapp.com/advisory/ntap-20220217-0009/
Package kernel-image-std-pae updated to version 5.10.71-alt1 for branch sisyphus in task 286552.
Closed vulnerabilities
BDU:2022-00682
Уязвимость подсистемы виртуализации KVM ядра операционной системы Linux, связанная с недостатками разграничения доступа, позволяющая нарушителю повысить свои привилегии
Modified: 2024-11-21
CVE-2021-3653
A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "int_ctl" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.
- http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html
- http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1983686
- https://bugzilla.redhat.com/show_bug.cgi?id=1983686
- [debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update
- [debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update
- [debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update
- [debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update
- https://www.openwall.com/lists/oss-security/2021/08/16/1
- https://www.openwall.com/lists/oss-security/2021/08/16/1
Modified: 2024-11-21
CVE-2021-3656
A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.
- https://bugzilla.redhat.com/show_bug.cgi?id=1983988
- https://bugzilla.redhat.com/show_bug.cgi?id=1983988
- https://git.kernel.org/pub/scm/virt/kvm/kvm.git/commit/?id=c7dfa4009965a9b2d7b329ee970eb8da0d32f0bc
- https://git.kernel.org/pub/scm/virt/kvm/kvm.git/commit/?id=c7dfa4009965a9b2d7b329ee970eb8da0d32f0bc
- https://github.com/torvalds/linux/commit/c7dfa4009965a9b2d7b329ee970eb8da0d32f0bc
- https://github.com/torvalds/linux/commit/c7dfa4009965a9b2d7b329ee970eb8da0d32f0bc
- https://www.openwall.com/lists/oss-security/2021/08/16/1
- https://www.openwall.com/lists/oss-security/2021/08/16/1
Package kernel-image-std-debug updated to version 5.10.71-alt1 for branch sisyphus in task 286546.
Closed vulnerabilities
BDU:2022-00682
Уязвимость подсистемы виртуализации KVM ядра операционной системы Linux, связанная с недостатками разграничения доступа, позволяющая нарушителю повысить свои привилегии
Modified: 2024-11-21
CVE-2021-3653
A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "int_ctl" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.
- http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html
- http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1983686
- https://bugzilla.redhat.com/show_bug.cgi?id=1983686
- [debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update
- [debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update
- [debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update
- [debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update
- https://www.openwall.com/lists/oss-security/2021/08/16/1
- https://www.openwall.com/lists/oss-security/2021/08/16/1
Modified: 2024-11-21
CVE-2021-3656
A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.
- https://bugzilla.redhat.com/show_bug.cgi?id=1983988
- https://bugzilla.redhat.com/show_bug.cgi?id=1983988
- https://git.kernel.org/pub/scm/virt/kvm/kvm.git/commit/?id=c7dfa4009965a9b2d7b329ee970eb8da0d32f0bc
- https://git.kernel.org/pub/scm/virt/kvm/kvm.git/commit/?id=c7dfa4009965a9b2d7b329ee970eb8da0d32f0bc
- https://github.com/torvalds/linux/commit/c7dfa4009965a9b2d7b329ee970eb8da0d32f0bc
- https://github.com/torvalds/linux/commit/c7dfa4009965a9b2d7b329ee970eb8da0d32f0bc
- https://www.openwall.com/lists/oss-security/2021/08/16/1
- https://www.openwall.com/lists/oss-security/2021/08/16/1
Package chromium-gost updated to version 94.0.4606.71-alt1 for branch sisyphus in task 286559.
Closed vulnerabilities
BDU:2021-04238
Уязвимость библиотеки ANGLE браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2021-04239
Уязвимость компонента WebAudio браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2021-04240
Уязвимость компонента Extensions API браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2021-04241
Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2021-04242
Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2021-04243
Уязвимость функции печати браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2021-04772
Уязвимость компонента макета модуля отображения Blink браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код
BDU:2021-04779
Уязвимость компонента входа в систему Sign-In браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код
BDU:2021-04783
Уязвимость компонента Selection API браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2021-04788
Уязвимость компонента Extensions API браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2021-04790
Уязвимость модуля отображения Blink браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-04791
Уязвимость интерфейса для хранения структурированных данных Indexed DB API браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2021-04792
Уязвимость компонента Permissions браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2021-04793
Уязвимость обработчика JavaScript-сценариев V8 браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-04794
Уязвимость компонента макета модуля отображения Blink браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код
BDU:2021-04795
Уязвимость библиотеки ANGLE браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2021-04796
Уязвимость библиотеки ANGLE браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2021-05094
Уязвимость функции TabStrip браузера Google Chrome, позволяющая нарушителю вызвать переполнение буфера
BDU:2021-05102
Уязвимость набора инструментов DevTools браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации или вызвать отказ в обслуживании
BDU:2021-05181
Уязвимость компонента WebRTC веб-браузера Google Chrome, связанная с использованием памяти после её освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-05350
Уязвимость обработчика Java-Script сценариев Blink браузера Google Chrome, позволяющая нарушителю оказать влияние на конфиденциальность, целостность и доступность
BDU:2021-05432
Уязвимость настройки разрешений Permissions браузера Google Chrome, позволяющая нарушителю оказать влияние на конфиденциальность, целостность и доступность защищаемой информации
BDU:2021-05464
Уязвимость прикладного программного интерфейса для обмена данными Web Share браузера Google Chrome, позволяющая нарушителю оказать влияние на конфиденциальность, целостность и доступность
BDU:2021-05507
Уязвимость компонента Portals браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выйти из изолированной программной среды
BDU:2021-05925
Уязвимость компонента Navigation браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2021-06078
Уязвимость элемента управления «Bookmarks» («Закладки») браузера Microsoft Edge, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность информации
BDU:2021-06079
Уязвимость компонента автодополнения Autofill браузера Microsoft Edge, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность информации
BDU:2021-06080
Уязвимость компонента Media браузера Microsoft Edge, связанная с использованием памяти после её освобождения, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность информации
BDU:2021-06081
Уязвимость компонента автодополнения Autofill браузера Microsoft Edge, связанная с обходом аутентификации посредством спуфинга, позволяющая нарушителю проводить спуфинг-атаки
BDU:2021-06082
Уязвимость модуля отображения Blink браузера Microsoft Edge, позволяющая нарушителю обойти существующие ограничения доступа
BDU:2021-06085
Уязвимость установщика веб-приложений браузера Microsoft Edge, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность информации
BDU:2021-06193
Уязвимость кодека libjpeg-turbo, связанная с чтением за границами буфера, позволяющая нарушителю получить доступ к конфиденциальной информации или вызвать отказ в обслуживании
BDU:2021-06418
Уязвимость расширения WebRTC браузера Microsoft Edge, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность информации
BDU:2021-06421
Уязвимость автономного режима браузера Google Chrome, связанная с использованием памяти после её освобождения, позволяющая нарушителю выполнить код в контексте привилегированного процесса
BDU:2021-06424
Уязвимость программного интерфейса Background Fetch API браузера Google Chrome, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2021-06426
Уязвимость реализации функции автозаполнения Autofill браузера Microsoft Edge, позволяющая нарушителю проводить спуфинг-атаки
BDU:2021-06427
Уязвимость реализации технологии WebRTC браузера Microsoft Edge, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность информации
BDU:2021-06431
Уязвимость интерфейса File System API браузера Google Chrome , связанная с использованием памяти после её освобождения, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2022-00050
Уязвимость приложение для загрузки программ Google Updater браузера Google Chrome, операционной системы Windows , связанная с небезопасным управлением привилегиями, позволяющая нарушителю повысить свои привилегии через созданный файл
BDU:2022-00051
Уязвимость компонента Tab Strip браузера Google Chrome, связанная с использованием памяти после её освобождения, позволяющая нарушителю обойти существующие ограничения безопасности с помощью специально созданной HTML страницы
BDU:2022-00052
Уязвимость функции Navigation браузера Google Chrome, операционной системы Windows , позволяющая нарушителю обойти существующие ограничения безопасности с помощью специально созданной HTML страницы
BDU:2022-00053
Уязвимость диспетчера задач браузера Google Chrome, связанная с использованием памяти после её освобождения, позволяющая нарушителю выполнить произвольные команды
BDU:2022-00054
Уязвимость компонента ChromeOS Networking браузера Google Chrome, позволяющая нарушителю получить привилегированный доступ к инфраструктуре через созданный файл ONC
BDU:2022-00056
Уязвимость пользовательского интерфейса браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения безопасности с помощью специально созданной HTML страницы
BDU:2022-00059
Уязвимость API для работы с компьютерной графикой WebGPU браузера Google Chrome , связанная с использованием памяти после её освобождения, позволяющая нарушителю обойти существующие ограничения безопасности
BDU:2022-00060
Уязвимость компонента Performance Manager браузера Google Chrome, позволяющая нарушителю выполнить код в контексте привилегированного процесса с помощью специально созданной HTML страницы
BDU:2022-00070
Уязвимость механизма отображения веб-страниц Blink браузера Microsoft Edge, позволяющая нарушителю обойти существующую политику ограничения доступа
BDU:2022-00074
Уязвимость набора инструментов для веб-разработки DevTools браузера Google Chrome, позволяющие нарушителю обойти существующие ограничения безопасности с помощью специально созданной HTML страницы
BDU:2022-00075
Уязвимость компонента compositing браузера Google Chrome, позволяющая нарушителю подделать содержимое адресной строки с помощью специально созданной HTML страницы
BDU:2022-00076
Уязвимость программного интерфейса Background Fetch API браузера Google Chrome , связанная с раскрытием информации в ошибочной области данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2022-00077
Уязвимость программного интерфейса Background Fetch API браузера Google Chrome, связанная с раскрытием информации в ошибочной области данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2022-00079
Уязвимость браузера Microsoft Edge, связанная с использованием памяти после её освобождения, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность информации
Modified: 2024-11-21
CVE-2021-30598
Type confusion in V8 in Google Chrome prior to 92.0.4515.159 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html
- https://crbug.com/1234764
- https://crbug.com/1234764
- FEDORA-2021-78b9d84299
- FEDORA-2021-78b9d84299
- FEDORA-2021-02b301441f
- FEDORA-2021-02b301441f
- FEDORA-2021-6225d60814
- FEDORA-2021-6225d60814
Modified: 2024-11-21
CVE-2021-30599
Type confusion in V8 in Google Chrome prior to 92.0.4515.159 allowed a remote attacker to execute arbitrary code inside a sandbox via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html
- https://crbug.com/1234770
- https://crbug.com/1234770
- FEDORA-2021-78b9d84299
- FEDORA-2021-78b9d84299
- FEDORA-2021-02b301441f
- FEDORA-2021-02b301441f
- FEDORA-2021-6225d60814
- FEDORA-2021-6225d60814
Modified: 2024-11-21
CVE-2021-30600
Use after free in Printing in Google Chrome prior to 92.0.4515.159 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html
- https://crbug.com/1231134
- https://crbug.com/1231134
- FEDORA-2021-78b9d84299
- FEDORA-2021-78b9d84299
- FEDORA-2021-02b301441f
- FEDORA-2021-02b301441f
- FEDORA-2021-6225d60814
- FEDORA-2021-6225d60814
Modified: 2024-11-21
CVE-2021-30601
Use after free in Extensions API in Google Chrome prior to 92.0.4515.159 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html
- https://crbug.com/1234009
- https://crbug.com/1234009
- FEDORA-2021-78b9d84299
- FEDORA-2021-78b9d84299
- FEDORA-2021-02b301441f
- FEDORA-2021-02b301441f
- FEDORA-2021-6225d60814
- FEDORA-2021-6225d60814
Modified: 2024-11-21
CVE-2021-30602
Use after free in WebRTC in Google Chrome prior to 92.0.4515.159 allowed an attacker who convinced a user to visit a malicious website to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html
- https://crbug.com/1230767
- https://crbug.com/1230767
- FEDORA-2021-78b9d84299
- FEDORA-2021-78b9d84299
- FEDORA-2021-02b301441f
- FEDORA-2021-02b301441f
- FEDORA-2021-6225d60814
- FEDORA-2021-6225d60814
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1348
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1348
Modified: 2024-11-21
CVE-2021-30603
Data race in WebAudio in Google Chrome prior to 92.0.4515.159 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- http://packetstormsecurity.com/files/164259/Chrome-HRTFDatabaseLoader-WaitForLoaderThreadCompletion-Data-Race.html
- http://packetstormsecurity.com/files/164259/Chrome-HRTFDatabaseLoader-WaitForLoaderThreadCompletion-Data-Race.html
- https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html
- https://crbug.com/1233564
- https://crbug.com/1233564
- FEDORA-2021-78b9d84299
- FEDORA-2021-78b9d84299
- FEDORA-2021-02b301441f
- FEDORA-2021-02b301441f
- FEDORA-2021-6225d60814
- FEDORA-2021-6225d60814
Modified: 2024-11-21
CVE-2021-30604
Use after free in ANGLE in Google Chrome prior to 92.0.4515.159 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/08/stable-channel-update-for-desktop.html
- https://crbug.com/1234829
- https://crbug.com/1234829
- FEDORA-2021-78b9d84299
- FEDORA-2021-78b9d84299
- FEDORA-2021-02b301441f
- FEDORA-2021-02b301441f
- FEDORA-2021-6225d60814
- FEDORA-2021-6225d60814
Modified: 2024-11-21
CVE-2021-30606
Chromium: CVE-2021-30606 Use after free in Blink
Modified: 2024-11-21
CVE-2021-30607
Chromium: CVE-2021-30607 Use after free in Permissions
Modified: 2024-11-21
CVE-2021-30608
Chromium: CVE-2021-30608 Use after free in Web Share
Modified: 2024-11-21
CVE-2021-30609
Chromium: CVE-2021-30609 Use after free in Sign-In
Modified: 2024-11-21
CVE-2021-30610
Chromium: CVE-2021-30610 Use after free in Extensions API
Modified: 2024-11-21
CVE-2021-30611
Chromium: CVE-2021-30611 Use after free in WebRTC
Modified: 2024-11-21
CVE-2021-30612
Chromium: CVE-2021-30612 Use after free in WebRTC
Modified: 2024-11-21
CVE-2021-30613
Chromium: CVE-2021-30613 Use after free in Base internals
Modified: 2024-11-21
CVE-2021-30614
Chromium: CVE-2021-30614 Heap buffer overflow in TabStrip
Modified: 2024-11-21
CVE-2021-30615
Chromium: CVE-2021-30615 Cross-origin data leak in Navigation
Modified: 2024-11-21
CVE-2021-30616
Chromium: CVE-2021-30616 Use after free in Media
Modified: 2024-11-21
CVE-2021-30617
Chromium: CVE-2021-30617 Policy bypass in Blink
Modified: 2024-11-21
CVE-2021-30618
Chromium: CVE-2021-30618 Inappropriate implementation in DevTools
Modified: 2024-11-21
CVE-2021-30619
Chromium: CVE-2021-30619 UI Spoofing in Autofill
Modified: 2024-11-21
CVE-2021-30620
Chromium: CVE-2021-30620 Insufficient policy enforcement in Blink
Modified: 2024-11-21
CVE-2021-30621
Chromium: CVE-2021-30621 UI Spoofing in Autofill
Modified: 2024-11-21
CVE-2021-30622
Chromium: CVE-2021-30622 Use after free in WebApp Installs
Modified: 2024-11-21
CVE-2021-30623
Chromium: CVE-2021-30623 Use after free in Bookmarks
Modified: 2024-11-21
CVE-2021-30624
Chromium: CVE-2021-30624 Use after free in Autofill
Modified: 2024-11-21
CVE-2021-30625
Use after free in Selection API in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who convinced the user the visit a malicious website to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html
- https://crbug.com/1237533
- https://crbug.com/1237533
- FEDORA-2021-ab09a05562
- FEDORA-2021-ab09a05562
- FEDORA-2021-591b3a2af0
- FEDORA-2021-591b3a2af0
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1352
- https://www.talosintelligence.com/vulnerability_reports/TALOS-2021-1352
Modified: 2024-11-21
CVE-2021-30626
Out of bounds memory access in ANGLE in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html
- https://crbug.com/1241036
- https://crbug.com/1241036
- FEDORA-2021-ab09a05562
- FEDORA-2021-ab09a05562
- FEDORA-2021-591b3a2af0
- FEDORA-2021-591b3a2af0
Modified: 2024-11-21
CVE-2021-30627
Type confusion in Blink layout in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html
- https://crbug.com/1245786
- https://crbug.com/1245786
- FEDORA-2021-ab09a05562
- FEDORA-2021-ab09a05562
- FEDORA-2021-591b3a2af0
- FEDORA-2021-591b3a2af0
Modified: 2024-11-21
CVE-2021-30628
Stack buffer overflow in ANGLE in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit stack corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html
- https://crbug.com/1241123
- https://crbug.com/1241123
- FEDORA-2021-ab09a05562
- FEDORA-2021-ab09a05562
- FEDORA-2021-591b3a2af0
- FEDORA-2021-591b3a2af0
Modified: 2024-11-21
CVE-2021-30629
Use after free in Permissions in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html
- https://crbug.com/1243646
- https://crbug.com/1243646
- FEDORA-2021-ab09a05562
- FEDORA-2021-ab09a05562
- FEDORA-2021-591b3a2af0
- FEDORA-2021-591b3a2af0
Modified: 2024-11-21
CVE-2021-30630
Inappropriate implementation in Blink in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html
- https://crbug.com/1244568
- https://crbug.com/1244568
- FEDORA-2021-ab09a05562
- FEDORA-2021-ab09a05562
- FEDORA-2021-591b3a2af0
- FEDORA-2021-591b3a2af0
Modified: 2023-11-07
CVE-2021-30631
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none
Modified: 2025-02-19
CVE-2021-30632
Out of bounds write in V8 in Google Chrome prior to 93.0.4577.82 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- http://packetstormsecurity.com/files/172845/Chrome-JIT-Compiler-Type-Confusion.html
- http://packetstormsecurity.com/files/172845/Chrome-JIT-Compiler-Type-Confusion.html
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html
- https://crbug.com/1247763
- https://crbug.com/1247763
- FEDORA-2021-ab09a05562
- FEDORA-2021-ab09a05562
- FEDORA-2021-591b3a2af0
- FEDORA-2021-591b3a2af0
Modified: 2025-02-19
CVE-2021-30633
Use after free in Indexed DB API in Google Chrome prior to 93.0.4577.82 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop.html
- https://crbug.com/1247766
- https://crbug.com/1247766
- FEDORA-2021-ab09a05562
- FEDORA-2021-ab09a05562
- FEDORA-2021-591b3a2af0
- FEDORA-2021-591b3a2af0
Modified: 2024-11-21
CVE-2021-37956
Use after free in Offline use in Google Chrome on Android prior to 94.0.4606.54 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://crbug.com/1243117
- https://crbug.com/1243117
- FEDORA-2021-ab09a05562
- FEDORA-2021-ab09a05562
- FEDORA-2021-591b3a2af0
- FEDORA-2021-591b3a2af0
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-37957
Use after free in WebGPU in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://crbug.com/1242269
- https://crbug.com/1242269
- FEDORA-2021-ab09a05562
- FEDORA-2021-ab09a05562
- FEDORA-2021-591b3a2af0
- FEDORA-2021-591b3a2af0
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-37958
Inappropriate implementation in Navigation in Google Chrome on Windows prior to 94.0.4606.54 allowed a remote attacker to inject scripts or HTML into a privileged page via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://crbug.com/1223290
- https://crbug.com/1223290
- FEDORA-2021-ab09a05562
- FEDORA-2021-ab09a05562
- FEDORA-2021-591b3a2af0
- FEDORA-2021-591b3a2af0
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-37959
Use after free in Task Manager in Google Chrome prior to 94.0.4606.54 allowed an attacker who convinced a user to enage in a series of user gestures to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://crbug.com/1229625
- https://crbug.com/1229625
- FEDORA-2021-ab09a05562
- FEDORA-2021-ab09a05562
- FEDORA-2021-591b3a2af0
- FEDORA-2021-591b3a2af0
- DSA-5046
- DSA-5046
Modified: 2023-11-07
CVE-2021-37960
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none
Modified: 2024-11-21
CVE-2021-37961
Use after free in Tab Strip in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://crbug.com/1228557
- https://crbug.com/1228557
- FEDORA-2021-ab09a05562
- FEDORA-2021-ab09a05562
- FEDORA-2021-591b3a2af0
- FEDORA-2021-591b3a2af0
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-37962
Use after free in Performance Manager in Google Chrome prior to 94.0.4606.54 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://crbug.com/1231933
- https://crbug.com/1231933
- FEDORA-2021-ab09a05562
- FEDORA-2021-ab09a05562
- FEDORA-2021-591b3a2af0
- FEDORA-2021-591b3a2af0
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-37963
Side-channel information leakage in DevTools in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to bypass site isolation via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://crbug.com/1199865
- https://crbug.com/1199865
- FEDORA-2021-ab09a05562
- FEDORA-2021-ab09a05562
- FEDORA-2021-591b3a2af0
- FEDORA-2021-591b3a2af0
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-37964
Inappropriate implementation in ChromeOS Networking in Google Chrome on ChromeOS prior to 94.0.4606.54 allowed an attacker with a rogue wireless access point to to potentially carryout a wifi impersonation attack via a crafted ONC file.
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://crbug.com/1203612
- https://crbug.com/1203612
- FEDORA-2021-ab09a05562
- FEDORA-2021-ab09a05562
- FEDORA-2021-591b3a2af0
- FEDORA-2021-591b3a2af0
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-37965
Inappropriate implementation in Background Fetch API in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://crbug.com/1239709
- https://crbug.com/1239709
- FEDORA-2021-ab09a05562
- FEDORA-2021-ab09a05562
- FEDORA-2021-591b3a2af0
- FEDORA-2021-591b3a2af0
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-37966
Inappropriate implementation in Compositing in Google Chrome on Android prior to 94.0.4606.54 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://crbug.com/1238944
- https://crbug.com/1238944
- FEDORA-2021-ab09a05562
- FEDORA-2021-ab09a05562
- FEDORA-2021-591b3a2af0
- FEDORA-2021-591b3a2af0
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-37967
Inappropriate implementation in Background Fetch API in Google Chrome prior to 94.0.4606.54 allowed a remote attacker who had compromised the renderer process to leak cross-origin data via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://crbug.com/1243622
- https://crbug.com/1243622
- FEDORA-2021-ab09a05562
- FEDORA-2021-ab09a05562
- FEDORA-2021-591b3a2af0
- FEDORA-2021-591b3a2af0
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-37968
Inappropriate implementation in Background Fetch API in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://crbug.com/1245053
- https://crbug.com/1245053
- FEDORA-2021-ab09a05562
- FEDORA-2021-ab09a05562
- FEDORA-2021-591b3a2af0
- FEDORA-2021-591b3a2af0
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-37969
Inappropriate implementation in Google Updater in Google Chrome on Windows prior to 94.0.4606.54 allowed a remote attacker to perform local privilege escalation via a crafted file.
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://crbug.com/1245879
- https://crbug.com/1245879
- FEDORA-2021-ab09a05562
- FEDORA-2021-ab09a05562
- FEDORA-2021-591b3a2af0
- FEDORA-2021-591b3a2af0
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-37970
Use after free in File System API in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://crbug.com/1248030
- https://crbug.com/1248030
- FEDORA-2021-ab09a05562
- FEDORA-2021-ab09a05562
- FEDORA-2021-591b3a2af0
- FEDORA-2021-591b3a2af0
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-37971
Incorrect security UI in Web Browser UI in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://crbug.com/1219354
- https://crbug.com/1219354
- FEDORA-2021-ab09a05562
- FEDORA-2021-ab09a05562
- FEDORA-2021-591b3a2af0
- FEDORA-2021-591b3a2af0
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-37972
Out of bounds read in libjpeg-turbo in Google Chrome prior to 94.0.4606.54 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_21.html
- https://crbug.com/1234259
- https://crbug.com/1234259
- FEDORA-2021-ab09a05562
- FEDORA-2021-ab09a05562
- FEDORA-2021-359a715688
- FEDORA-2021-359a715688
- FEDORA-2021-591b3a2af0
- FEDORA-2021-591b3a2af0
- DSA-5046
- DSA-5046
Modified: 2025-03-06
CVE-2021-37973
Use after free in Portals in Google Chrome prior to 94.0.4606.61 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_24.html
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_24.html
- https://crbug.com/1251727
- https://crbug.com/1251727
- FEDORA-2021-ab09a05562
- FEDORA-2021-ab09a05562
- FEDORA-2021-591b3a2af0
- FEDORA-2021-591b3a2af0
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-37974
Use after free in Safebrowsing in Google Chrome prior to 94.0.4606.71 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_30.html
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_30.html
- https://crbug.com/1245578
- https://crbug.com/1245578
- FEDORA-2021-116eff380f
- FEDORA-2021-116eff380f
- FEDORA-2021-5ffabdc080
- FEDORA-2021-5ffabdc080
- FEDORA-2021-5093f11905
- FEDORA-2021-5093f11905
- DSA-5046
- DSA-5046
Modified: 2025-02-19
CVE-2021-37975
Use after free in V8 in Google Chrome prior to 94.0.4606.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- http://packetstormsecurity.com/files/172847/Chrome-V8-Logic-Bug-Use-After-Free.html
- http://packetstormsecurity.com/files/172847/Chrome-V8-Logic-Bug-Use-After-Free.html
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_30.html
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_30.html
- https://crbug.com/1252918
- https://crbug.com/1252918
- FEDORA-2021-116eff380f
- FEDORA-2021-116eff380f
- FEDORA-2021-5ffabdc080
- FEDORA-2021-5ffabdc080
- FEDORA-2021-5093f11905
- FEDORA-2021-5093f11905
- DSA-5046
- DSA-5046
Modified: 2025-02-20
CVE-2021-37976
Inappropriate implementation in Memory in Google Chrome prior to 94.0.4606.71 allowed a remote attacker to obtain potentially sensitive information from process memory via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_30.html
- https://chromereleases.googleblog.com/2021/09/stable-channel-update-for-desktop_30.html
- https://crbug.com/1251787
- https://crbug.com/1251787
- FEDORA-2021-116eff380f
- FEDORA-2021-116eff380f
- FEDORA-2021-5ffabdc080
- FEDORA-2021-5ffabdc080
- FEDORA-2021-5093f11905
- FEDORA-2021-5093f11905
- DSA-5046
- DSA-5046
Closed bugs
Собрать с поддержкой pipewire
Package kernel-image-std-def updated to version 5.10.71-alt1 for branch sisyphus in task 286549.
Closed vulnerabilities
BDU:2022-00682
Уязвимость подсистемы виртуализации KVM ядра операционной системы Linux, связанная с недостатками разграничения доступа, позволяющая нарушителю повысить свои привилегии
Modified: 2024-11-21
CVE-2021-3653
A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "int_ctl" field, this issue could allow a malicious L1 to enable AVIC support (Advanced Virtual Interrupt Controller) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape. This flaw affects Linux kernel versions prior to 5.14-rc7.
- http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html
- http://packetstormsecurity.com/files/165477/Kernel-Live-Patch-Security-Notice-LSN-0083-1.html
- https://bugzilla.redhat.com/show_bug.cgi?id=1983686
- https://bugzilla.redhat.com/show_bug.cgi?id=1983686
- [debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update
- [debian-lts-announce] 20211015 [SECURITY] [DLA 2785-1] linux-4.19 security update
- [debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update
- [debian-lts-announce] 20211216 [SECURITY] [DLA 2843-1] linux security update
- https://www.openwall.com/lists/oss-security/2021/08/16/1
- https://www.openwall.com/lists/oss-security/2021/08/16/1
Modified: 2024-11-21
CVE-2021-3656
A flaw was found in the KVM's AMD code for supporting SVM nested virtualization. The flaw occurs when processing the VMCB (virtual machine control block) provided by the L1 guest to spawn/handle a nested guest (L2). Due to improper validation of the "virt_ext" field, this issue could allow a malicious L1 to disable both VMLOAD/VMSAVE intercepts and VLS (Virtual VMLOAD/VMSAVE) for the L2 guest. As a result, the L2 guest would be allowed to read/write physical pages of the host, resulting in a crash of the entire system, leak of sensitive data or potential guest-to-host escape.
- https://bugzilla.redhat.com/show_bug.cgi?id=1983988
- https://bugzilla.redhat.com/show_bug.cgi?id=1983988
- https://git.kernel.org/pub/scm/virt/kvm/kvm.git/commit/?id=c7dfa4009965a9b2d7b329ee970eb8da0d32f0bc
- https://git.kernel.org/pub/scm/virt/kvm/kvm.git/commit/?id=c7dfa4009965a9b2d7b329ee970eb8da0d32f0bc
- https://github.com/torvalds/linux/commit/c7dfa4009965a9b2d7b329ee970eb8da0d32f0bc
- https://github.com/torvalds/linux/commit/c7dfa4009965a9b2d7b329ee970eb8da0d32f0bc
- https://www.openwall.com/lists/oss-security/2021/08/16/1
- https://www.openwall.com/lists/oss-security/2021/08/16/1
Modified: 2024-11-21
CVE-2021-38300
arch/mips/net/bpf_jit.c in the Linux kernel before 5.4.10 can generate undesirable machine code when transforming unprivileged cBPF programs, allowing execution of arbitrary code within the kernel context. This occurs because conditional branches can exceed the 128 KB limit of the MIPS architecture.
- http://www.openwall.com/lists/oss-security/2021/09/15/5
- http://www.openwall.com/lists/oss-security/2021/09/15/5
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.10
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.14.10
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=37cb28ec7d3a36a5bace7063a3dba633ab110f8b
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=37cb28ec7d3a36a5bace7063a3dba633ab110f8b
- [debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
- [debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
- https://security.netapp.com/advisory/ntap-20211008-0003/
- https://security.netapp.com/advisory/ntap-20211008-0003/
- DSA-5096
- DSA-5096
Modified: 2024-11-21
CVE-2021-4028
A flaw in the Linux kernel's implementation of RDMA communications manager listener code allowed an attacker with local access to setup a socket to listen on a high port allowing for a list element to be used after free. Given the ability to execute code, a local attacker could leverage this use-after-free to crash the system or possibly escalate privileges on the system.
- https://access.redhat.com/security/cve/CVE-2021-4028
- https://access.redhat.com/security/cve/CVE-2021-4028
- https://bugzilla.redhat.com/show_bug.cgi?id=2027201
- https://bugzilla.redhat.com/show_bug.cgi?id=2027201
- https://bugzilla.suse.com/show_bug.cgi?id=1193167#c0
- https://bugzilla.suse.com/show_bug.cgi?id=1193167#c0
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bc0bdc5afaa74
- https://lkml.org/lkml/2021/10/4/697
- https://lkml.org/lkml/2021/10/4/697
- https://security.netapp.com/advisory/ntap-20221228-0002/
- https://security.netapp.com/advisory/ntap-20221228-0002/
Package docker-cli updated to version 20.10.9-alt1 for branch sisyphus in task 286532.
Closed vulnerabilities
BDU:2022-05502
Уязвимость интерфейса командной строки (CLI) средства автоматизации развёртывания и управления приложениями в средах с поддержкой контейнеризации Docker, позволяющая нарушителю получить произвольные учетные данные
Modified: 2024-11-21
CVE-2021-41092
Docker CLI is the command line interface for the docker container runtime. A bug was found in the Docker CLI where running `docker login my-private-registry.example.com` with a misconfigured configuration file (typically `~/.docker/config.json`) listing a `credsStore` or `credHelpers` that could not be executed would result in any provided credentials being sent to `registry-1.docker.io` rather than the intended private registry. This bug has been fixed in Docker CLI 20.10.9. Users should update to this version as soon as possible. For users unable to update ensure that any configured credsStore or credHelpers entries in the configuration file reference an installed credential helper that is executable and on the PATH.
- https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-222547.pdf
- https://github.com/docker/cli/commit/893e52cf4ba4b048d72e99748e0f86b2767c6c6b
- https://github.com/docker/cli/commit/893e52cf4ba4b048d72e99748e0f86b2767c6c6b
- https://github.com/docker/cli/security/advisories/GHSA-99pg-grm5-qq3v
- https://github.com/docker/cli/security/advisories/GHSA-99pg-grm5-qq3v
- FEDORA-2021-b5a9a481a2
- FEDORA-2021-b5a9a481a2
- FEDORA-2021-df975338d4
- FEDORA-2021-df975338d4