ALT-BU-2022-3705-1
Branch sisyphus update bulletin.
Package kernel-image-centos updated to version 5.14.0.45-alt1.el9 for branch sisyphus in task 293751.
Closed vulnerabilities
BDU:2021-04803
Уязвимость подсистемы Bluetooth ядра операционной системы Linux, позволяющая нарушителю вызвать аварийное завершение системы
BDU:2022-03142
Уязвимость реализации протокола ICMP ядра операционной системы Linux, позволяющая нарушителю получить доступ к конфиденциальной информации
Modified: 2024-11-21
CVE-2021-20322
A flaw in the processing of received ICMP errors (ICMP fragment needed and ICMP redirect) in the Linux kernel functionality was found to allow the ability to quickly scan open UDP ports. This flaw allows an off-path remote user to effectively bypass the source port UDP randomization. The highest threat from this vulnerability is to confidentiality and possibly integrity, because software that relies on UDP source port randomization are indirectly affected as well.
- https://bugzilla.redhat.com/show_bug.cgi?id=2014230
- https://bugzilla.redhat.com/show_bug.cgi?id=2014230
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=4785305c05b25a242e5314cc821f54ade4c18810
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=4785305c05b25a242e5314cc821f54ade4c18810
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=6457378fe796815c973f631a1904e147d6ee33b1
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.15-rc6&id=6457378fe796815c973f631a1904e147d6ee33b1
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6&id=67d6d681e15b578c1725bad8ad079e05d1c48a8e
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv4/route.c?h=v5.15-rc6&id=67d6d681e15b578c1725bad8ad079e05d1c48a8e
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6&id=a00df2caffed3883c341d5685f830434312e4a43
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/net/ipv6/route.c?h=v5.15-rc6&id=a00df2caffed3883c341d5685f830434312e4a43
- [debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
- [debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
- https://security.netapp.com/advisory/ntap-20220303-0002/
- https://security.netapp.com/advisory/ntap-20220303-0002/
- DSA-5096
- DSA-5096
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
Modified: 2024-11-21
CVE-2021-3752
A use-after-free flaw was found in the Linux kernel’s Bluetooth subsystem in the way user calls connect to the socket and disconnect simultaneously due to a race condition. This flaw allows a user to crash the system or escalate their privileges. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
- https://bugzilla.redhat.com/show_bug.cgi?id=1999544
- https://bugzilla.redhat.com/show_bug.cgi?id=1999544
- [debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update
- [debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update
- [debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
- [debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
- https://lore.kernel.org/lkml/20211115165435.133245729%40linuxfoundation.org/
- https://lore.kernel.org/lkml/20211115165435.133245729%40linuxfoundation.org/
- https://security.netapp.com/advisory/ntap-20220318-0009/
- https://security.netapp.com/advisory/ntap-20220318-0009/
- DSA-5096
- DSA-5096
- https://www.openwall.com/lists/oss-security/2021/09/15/4
- https://www.openwall.com/lists/oss-security/2021/09/15/4
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-43860
Flatpak is a Linux application sandboxing and distribution framework. Prior to versions 1.12.3 and 1.10.6, Flatpak doesn't properly validate that the permissions displayed to the user for an app at install time match the actual permissions granted to the app at runtime, in the case that there's a null byte in the metadata file of an app. Therefore apps can grant themselves permissions without the consent of the user. Flatpak shows permissions to the user during install by reading them from the "xa.metadata" key in the commit metadata. This cannot contain a null terminator, because it is an untrusted GVariant. Flatpak compares these permissions to the *actual* metadata, from the "metadata" file to ensure it wasn't lied to. However, the actual metadata contents are loaded in several places where they are read as simple C-style strings. That means that, if the metadata file includes a null terminator, only the content of the file from *before* the terminator gets compared to xa.metadata. Thus, any permissions that appear in the metadata file after a null terminator are applied at runtime but not shown to the user. So maliciously crafted apps can give themselves hidden permissions. Users who have Flatpaks installed from untrusted sources are at risk in case the Flatpak has a maliciously crafted metadata file, either initially or in an update. This issue is patched in versions 1.12.3 and 1.10.6. As a workaround, users can manually check the permissions of installed apps by checking the metadata file or the xa.metadata key on the commit metadata.
- https://github.com/flatpak/flatpak/commit/54ec1a482dfc668127eaae57f135e6a8e0bc52da
- https://github.com/flatpak/flatpak/commit/54ec1a482dfc668127eaae57f135e6a8e0bc52da
- https://github.com/flatpak/flatpak/commit/65cbfac982cb1c83993a9e19aa424daee8e9f042
- https://github.com/flatpak/flatpak/commit/65cbfac982cb1c83993a9e19aa424daee8e9f042
- https://github.com/flatpak/flatpak/commit/93357d357119093804df05acc32ff335839c6451
- https://github.com/flatpak/flatpak/commit/93357d357119093804df05acc32ff335839c6451
- https://github.com/flatpak/flatpak/commit/ba818f504c926baaf6e362be8159cfacf994310e
- https://github.com/flatpak/flatpak/commit/ba818f504c926baaf6e362be8159cfacf994310e
- https://github.com/flatpak/flatpak/commit/d9a8f9d8ccc0b7c1135d0ecde006a75d25f66aee
- https://github.com/flatpak/flatpak/commit/d9a8f9d8ccc0b7c1135d0ecde006a75d25f66aee
- https://github.com/flatpak/flatpak/releases/tag/1.10.6
- https://github.com/flatpak/flatpak/releases/tag/1.10.6
- https://github.com/flatpak/flatpak/releases/tag/1.12.3
- https://github.com/flatpak/flatpak/releases/tag/1.12.3
- https://github.com/flatpak/flatpak/security/advisories/GHSA-qpjc-vq3c-572j
- https://github.com/flatpak/flatpak/security/advisories/GHSA-qpjc-vq3c-572j
- FEDORA-2022-825ca6bf2b
- FEDORA-2022-825ca6bf2b
- GLSA-202312-12
- GLSA-202312-12
- DSA-5049
- DSA-5049
Modified: 2024-11-21
CVE-2022-21682
Flatpak is a Linux application sandboxing and distribution framework. A path traversal vulnerability affects versions of Flatpak prior to 1.12.3 and 1.10.6. flatpak-builder applies `finish-args` last in the build. At this point the build directory will have the full access that is specified in the manifest, so running `flatpak build` against it will gain those permissions. Normally this will not be done, so this is not problem. However, if `--mirror-screenshots-url` is specified, then flatpak-builder will launch `flatpak build --nofilesystem=host appstream-utils mirror-screenshots` after finalization, which can lead to issues even with the `--nofilesystem=host` protection. In normal use, the only issue is that these empty directories can be created wherever the user has write permissions. However, a malicious application could replace the `appstream-util` binary and potentially do something more hostile. This has been resolved in Flatpak 1.12.3 and 1.10.6 by changing the behaviour of `--nofilesystem=home` and `--nofilesystem=host`.
- https://github.com/flatpak/flatpak/commit/445bddeee657fdc8d2a0a1f0de12975400d4fc1a
- https://github.com/flatpak/flatpak/commit/445bddeee657fdc8d2a0a1f0de12975400d4fc1a
- https://github.com/flatpak/flatpak/commit/4d11f77aa7fd3e64cfa80af89d92567ab9e8e6fa
- https://github.com/flatpak/flatpak/commit/4d11f77aa7fd3e64cfa80af89d92567ab9e8e6fa
- https://github.com/flatpak/flatpak/security/advisories/GHSA-8ch7-5j3h-g4fx
- https://github.com/flatpak/flatpak/security/advisories/GHSA-8ch7-5j3h-g4fx
- FEDORA-2022-825ca6bf2b
- FEDORA-2022-825ca6bf2b
- FEDORA-2022-7e328bd66c
- FEDORA-2022-7e328bd66c
- GLSA-202312-12
- GLSA-202312-12
- DSA-5049
- DSA-5049
Package flatpak-builder updated to version 1.2.2-alt1 for branch sisyphus in task 293753.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-21682
Flatpak is a Linux application sandboxing and distribution framework. A path traversal vulnerability affects versions of Flatpak prior to 1.12.3 and 1.10.6. flatpak-builder applies `finish-args` last in the build. At this point the build directory will have the full access that is specified in the manifest, so running `flatpak build` against it will gain those permissions. Normally this will not be done, so this is not problem. However, if `--mirror-screenshots-url` is specified, then flatpak-builder will launch `flatpak build --nofilesystem=host appstream-utils mirror-screenshots` after finalization, which can lead to issues even with the `--nofilesystem=host` protection. In normal use, the only issue is that these empty directories can be created wherever the user has write permissions. However, a malicious application could replace the `appstream-util` binary and potentially do something more hostile. This has been resolved in Flatpak 1.12.3 and 1.10.6 by changing the behaviour of `--nofilesystem=home` and `--nofilesystem=host`.
- https://github.com/flatpak/flatpak/commit/445bddeee657fdc8d2a0a1f0de12975400d4fc1a
- https://github.com/flatpak/flatpak/commit/445bddeee657fdc8d2a0a1f0de12975400d4fc1a
- https://github.com/flatpak/flatpak/commit/4d11f77aa7fd3e64cfa80af89d92567ab9e8e6fa
- https://github.com/flatpak/flatpak/commit/4d11f77aa7fd3e64cfa80af89d92567ab9e8e6fa
- https://github.com/flatpak/flatpak/security/advisories/GHSA-8ch7-5j3h-g4fx
- https://github.com/flatpak/flatpak/security/advisories/GHSA-8ch7-5j3h-g4fx
- FEDORA-2022-825ca6bf2b
- FEDORA-2022-825ca6bf2b
- FEDORA-2022-7e328bd66c
- FEDORA-2022-7e328bd66c
- GLSA-202312-12
- GLSA-202312-12
- DSA-5049
- DSA-5049
Package virtualbox updated to version 6.1.32-alt1 for branch sisyphus in task 293744.
Closed vulnerabilities
BDU:2022-01603
Уязвимость компонента Core виртуальной машины Oracle VM VirtualBox, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2022-01617
Уязвимость компонента Core виртуальной машины Oracle VM VirtualBox, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2024-11-21
CVE-2019-10219
A vulnerability was found in Hibernate-Validator. The SafeHtml validator annotation fails to properly sanitize payloads consisting of potentially malicious code in HTML comments and instructions. This vulnerability can result in an XSS attack.
- RHSA-2020:0159
- RHSA-2020:0159
- RHSA-2020:0160
- RHSA-2020:0160
- RHSA-2020:0161
- RHSA-2020:0161
- RHSA-2020:0164
- RHSA-2020:0164
- RHSA-2020:0445
- RHSA-2020:0445
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10219
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10219
- [accumulo-notifications] 20200109 [GitHub] [accumulo] milleruntime closed pull request #1469: Update hibernate-validator. Fixes CVE-2019-10219
- [accumulo-notifications] 20200109 [GitHub] [accumulo] milleruntime closed pull request #1469: Update hibernate-validator. Fixes CVE-2019-10219
- [accumulo-notifications] 20200109 [GitHub] [accumulo] milleruntime commented on issue #1469: Update hibernate-validator. Fixes CVE-2019-10219
- [accumulo-notifications] 20200109 [GitHub] [accumulo] milleruntime commented on issue #1469: Update hibernate-validator. Fixes CVE-2019-10219
- [accumulo-notifications] 20200108 [GitHub] [accumulo] milleruntime opened a new pull request #1469: Update hibernate-validator. Fixes CVE-2019-10219
- [accumulo-notifications] 20200108 [GitHub] [accumulo] milleruntime opened a new pull request #1469: Update hibernate-validator. Fixes CVE-2019-10219
- [portals-pluto-scm] 20210714 [portals-pluto] branch master updated: PLUTO-791 Upgrade to hibernate-validator-6.0.20.Final due to CVE-2020-10693 and CVE-2019-10219
- [portals-pluto-scm] 20210714 [portals-pluto] branch master updated: PLUTO-791 Upgrade to hibernate-validator-6.0.20.Final due to CVE-2020-10693 and CVE-2019-10219
- [portals-pluto-dev] 20210714 [jira] [Closed] (PLUTO-791) Upgrade to hibernate-validator-6.0.20.Final due to CVE-2020-10693 and CVE-2019-10219
- [portals-pluto-dev] 20210714 [jira] [Closed] (PLUTO-791) Upgrade to hibernate-validator-6.0.20.Final due to CVE-2020-10693 and CVE-2019-10219
- [portals-pluto-dev] 20210714 [jira] [Created] (PLUTO-791) Upgrade to hibernate-validator-6.0.20.Final due to CVE-2020-10693 and CVE-2019-10219
- [portals-pluto-dev] 20210714 [jira] [Created] (PLUTO-791) Upgrade to hibernate-validator-6.0.20.Final due to CVE-2020-10693 and CVE-2019-10219
- https://security.netapp.com/advisory/ntap-20220210-0024/
- https://security.netapp.com/advisory/ntap-20220210-0024/
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
Modified: 2024-11-21
CVE-2022-21295
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.32. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle VM VirtualBox accessible data. Note: This vulnerability applies to Windows systems only. CVSS 3.1 Base Score 3.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N).
Modified: 2024-11-21
CVE-2022-21394
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.32. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).
Package kernel-modules-virtualbox-addition-un-def updated to version 6.1.32-alt1.331535.1 for branch sisyphus in task 293744.
Closed vulnerabilities
BDU:2022-01603
Уязвимость компонента Core виртуальной машины Oracle VM VirtualBox, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2022-01617
Уязвимость компонента Core виртуальной машины Oracle VM VirtualBox, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2024-11-21
CVE-2019-10219
A vulnerability was found in Hibernate-Validator. The SafeHtml validator annotation fails to properly sanitize payloads consisting of potentially malicious code in HTML comments and instructions. This vulnerability can result in an XSS attack.
- RHSA-2020:0159
- RHSA-2020:0159
- RHSA-2020:0160
- RHSA-2020:0160
- RHSA-2020:0161
- RHSA-2020:0161
- RHSA-2020:0164
- RHSA-2020:0164
- RHSA-2020:0445
- RHSA-2020:0445
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10219
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10219
- [accumulo-notifications] 20200109 [GitHub] [accumulo] milleruntime closed pull request #1469: Update hibernate-validator. Fixes CVE-2019-10219
- [accumulo-notifications] 20200109 [GitHub] [accumulo] milleruntime closed pull request #1469: Update hibernate-validator. Fixes CVE-2019-10219
- [accumulo-notifications] 20200109 [GitHub] [accumulo] milleruntime commented on issue #1469: Update hibernate-validator. Fixes CVE-2019-10219
- [accumulo-notifications] 20200109 [GitHub] [accumulo] milleruntime commented on issue #1469: Update hibernate-validator. Fixes CVE-2019-10219
- [accumulo-notifications] 20200108 [GitHub] [accumulo] milleruntime opened a new pull request #1469: Update hibernate-validator. Fixes CVE-2019-10219
- [accumulo-notifications] 20200108 [GitHub] [accumulo] milleruntime opened a new pull request #1469: Update hibernate-validator. Fixes CVE-2019-10219
- [portals-pluto-scm] 20210714 [portals-pluto] branch master updated: PLUTO-791 Upgrade to hibernate-validator-6.0.20.Final due to CVE-2020-10693 and CVE-2019-10219
- [portals-pluto-scm] 20210714 [portals-pluto] branch master updated: PLUTO-791 Upgrade to hibernate-validator-6.0.20.Final due to CVE-2020-10693 and CVE-2019-10219
- [portals-pluto-dev] 20210714 [jira] [Closed] (PLUTO-791) Upgrade to hibernate-validator-6.0.20.Final due to CVE-2020-10693 and CVE-2019-10219
- [portals-pluto-dev] 20210714 [jira] [Closed] (PLUTO-791) Upgrade to hibernate-validator-6.0.20.Final due to CVE-2020-10693 and CVE-2019-10219
- [portals-pluto-dev] 20210714 [jira] [Created] (PLUTO-791) Upgrade to hibernate-validator-6.0.20.Final due to CVE-2020-10693 and CVE-2019-10219
- [portals-pluto-dev] 20210714 [jira] [Created] (PLUTO-791) Upgrade to hibernate-validator-6.0.20.Final due to CVE-2020-10693 and CVE-2019-10219
- https://security.netapp.com/advisory/ntap-20220210-0024/
- https://security.netapp.com/advisory/ntap-20220210-0024/
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
Modified: 2024-11-21
CVE-2022-21295
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.32. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle VM VirtualBox accessible data. Note: This vulnerability applies to Windows systems only. CVSS 3.1 Base Score 3.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N).
Modified: 2024-11-21
CVE-2022-21394
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.32. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).
Package kernel-modules-virtualbox-un-def updated to version 6.1.32-alt1.331535.1 for branch sisyphus in task 293744.
Closed vulnerabilities
BDU:2022-01603
Уязвимость компонента Core виртуальной машины Oracle VM VirtualBox, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2022-01617
Уязвимость компонента Core виртуальной машины Oracle VM VirtualBox, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2024-11-21
CVE-2019-10219
A vulnerability was found in Hibernate-Validator. The SafeHtml validator annotation fails to properly sanitize payloads consisting of potentially malicious code in HTML comments and instructions. This vulnerability can result in an XSS attack.
- RHSA-2020:0159
- RHSA-2020:0159
- RHSA-2020:0160
- RHSA-2020:0160
- RHSA-2020:0161
- RHSA-2020:0161
- RHSA-2020:0164
- RHSA-2020:0164
- RHSA-2020:0445
- RHSA-2020:0445
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10219
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10219
- [accumulo-notifications] 20200109 [GitHub] [accumulo] milleruntime closed pull request #1469: Update hibernate-validator. Fixes CVE-2019-10219
- [accumulo-notifications] 20200109 [GitHub] [accumulo] milleruntime closed pull request #1469: Update hibernate-validator. Fixes CVE-2019-10219
- [accumulo-notifications] 20200109 [GitHub] [accumulo] milleruntime commented on issue #1469: Update hibernate-validator. Fixes CVE-2019-10219
- [accumulo-notifications] 20200109 [GitHub] [accumulo] milleruntime commented on issue #1469: Update hibernate-validator. Fixes CVE-2019-10219
- [accumulo-notifications] 20200108 [GitHub] [accumulo] milleruntime opened a new pull request #1469: Update hibernate-validator. Fixes CVE-2019-10219
- [accumulo-notifications] 20200108 [GitHub] [accumulo] milleruntime opened a new pull request #1469: Update hibernate-validator. Fixes CVE-2019-10219
- [portals-pluto-scm] 20210714 [portals-pluto] branch master updated: PLUTO-791 Upgrade to hibernate-validator-6.0.20.Final due to CVE-2020-10693 and CVE-2019-10219
- [portals-pluto-scm] 20210714 [portals-pluto] branch master updated: PLUTO-791 Upgrade to hibernate-validator-6.0.20.Final due to CVE-2020-10693 and CVE-2019-10219
- [portals-pluto-dev] 20210714 [jira] [Closed] (PLUTO-791) Upgrade to hibernate-validator-6.0.20.Final due to CVE-2020-10693 and CVE-2019-10219
- [portals-pluto-dev] 20210714 [jira] [Closed] (PLUTO-791) Upgrade to hibernate-validator-6.0.20.Final due to CVE-2020-10693 and CVE-2019-10219
- [portals-pluto-dev] 20210714 [jira] [Created] (PLUTO-791) Upgrade to hibernate-validator-6.0.20.Final due to CVE-2020-10693 and CVE-2019-10219
- [portals-pluto-dev] 20210714 [jira] [Created] (PLUTO-791) Upgrade to hibernate-validator-6.0.20.Final due to CVE-2020-10693 and CVE-2019-10219
- https://security.netapp.com/advisory/ntap-20220210-0024/
- https://security.netapp.com/advisory/ntap-20220210-0024/
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
Modified: 2024-11-21
CVE-2022-21295
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.32. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle VM VirtualBox accessible data. Note: This vulnerability applies to Windows systems only. CVSS 3.1 Base Score 3.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N).
Modified: 2024-11-21
CVE-2022-21394
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.32. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).
Package kernel-modules-virtualbox-std-def updated to version 6.1.32-alt1.330332.1 for branch sisyphus in task 293744.
Closed vulnerabilities
BDU:2022-01603
Уязвимость компонента Core виртуальной машины Oracle VM VirtualBox, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2022-01617
Уязвимость компонента Core виртуальной машины Oracle VM VirtualBox, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2024-11-21
CVE-2019-10219
A vulnerability was found in Hibernate-Validator. The SafeHtml validator annotation fails to properly sanitize payloads consisting of potentially malicious code in HTML comments and instructions. This vulnerability can result in an XSS attack.
- RHSA-2020:0159
- RHSA-2020:0159
- RHSA-2020:0160
- RHSA-2020:0160
- RHSA-2020:0161
- RHSA-2020:0161
- RHSA-2020:0164
- RHSA-2020:0164
- RHSA-2020:0445
- RHSA-2020:0445
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10219
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10219
- [accumulo-notifications] 20200109 [GitHub] [accumulo] milleruntime closed pull request #1469: Update hibernate-validator. Fixes CVE-2019-10219
- [accumulo-notifications] 20200109 [GitHub] [accumulo] milleruntime closed pull request #1469: Update hibernate-validator. Fixes CVE-2019-10219
- [accumulo-notifications] 20200109 [GitHub] [accumulo] milleruntime commented on issue #1469: Update hibernate-validator. Fixes CVE-2019-10219
- [accumulo-notifications] 20200109 [GitHub] [accumulo] milleruntime commented on issue #1469: Update hibernate-validator. Fixes CVE-2019-10219
- [accumulo-notifications] 20200108 [GitHub] [accumulo] milleruntime opened a new pull request #1469: Update hibernate-validator. Fixes CVE-2019-10219
- [accumulo-notifications] 20200108 [GitHub] [accumulo] milleruntime opened a new pull request #1469: Update hibernate-validator. Fixes CVE-2019-10219
- [portals-pluto-scm] 20210714 [portals-pluto] branch master updated: PLUTO-791 Upgrade to hibernate-validator-6.0.20.Final due to CVE-2020-10693 and CVE-2019-10219
- [portals-pluto-scm] 20210714 [portals-pluto] branch master updated: PLUTO-791 Upgrade to hibernate-validator-6.0.20.Final due to CVE-2020-10693 and CVE-2019-10219
- [portals-pluto-dev] 20210714 [jira] [Closed] (PLUTO-791) Upgrade to hibernate-validator-6.0.20.Final due to CVE-2020-10693 and CVE-2019-10219
- [portals-pluto-dev] 20210714 [jira] [Closed] (PLUTO-791) Upgrade to hibernate-validator-6.0.20.Final due to CVE-2020-10693 and CVE-2019-10219
- [portals-pluto-dev] 20210714 [jira] [Created] (PLUTO-791) Upgrade to hibernate-validator-6.0.20.Final due to CVE-2020-10693 and CVE-2019-10219
- [portals-pluto-dev] 20210714 [jira] [Created] (PLUTO-791) Upgrade to hibernate-validator-6.0.20.Final due to CVE-2020-10693 and CVE-2019-10219
- https://security.netapp.com/advisory/ntap-20220210-0024/
- https://security.netapp.com/advisory/ntap-20220210-0024/
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
Modified: 2024-11-21
CVE-2022-21295
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.32. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle VM VirtualBox accessible data. Note: This vulnerability applies to Windows systems only. CVSS 3.1 Base Score 3.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N).
Modified: 2024-11-21
CVE-2022-21394
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.32. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).
Package kernel-modules-virtualbox-addition-std-def updated to version 6.1.32-alt1.330332.1 for branch sisyphus in task 293744.
Closed vulnerabilities
BDU:2022-01603
Уязвимость компонента Core виртуальной машины Oracle VM VirtualBox, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2022-01617
Уязвимость компонента Core виртуальной машины Oracle VM VirtualBox, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2024-11-21
CVE-2019-10219
A vulnerability was found in Hibernate-Validator. The SafeHtml validator annotation fails to properly sanitize payloads consisting of potentially malicious code in HTML comments and instructions. This vulnerability can result in an XSS attack.
- RHSA-2020:0159
- RHSA-2020:0159
- RHSA-2020:0160
- RHSA-2020:0160
- RHSA-2020:0161
- RHSA-2020:0161
- RHSA-2020:0164
- RHSA-2020:0164
- RHSA-2020:0445
- RHSA-2020:0445
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10219
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-10219
- [accumulo-notifications] 20200109 [GitHub] [accumulo] milleruntime closed pull request #1469: Update hibernate-validator. Fixes CVE-2019-10219
- [accumulo-notifications] 20200109 [GitHub] [accumulo] milleruntime closed pull request #1469: Update hibernate-validator. Fixes CVE-2019-10219
- [accumulo-notifications] 20200109 [GitHub] [accumulo] milleruntime commented on issue #1469: Update hibernate-validator. Fixes CVE-2019-10219
- [accumulo-notifications] 20200109 [GitHub] [accumulo] milleruntime commented on issue #1469: Update hibernate-validator. Fixes CVE-2019-10219
- [accumulo-notifications] 20200108 [GitHub] [accumulo] milleruntime opened a new pull request #1469: Update hibernate-validator. Fixes CVE-2019-10219
- [accumulo-notifications] 20200108 [GitHub] [accumulo] milleruntime opened a new pull request #1469: Update hibernate-validator. Fixes CVE-2019-10219
- [portals-pluto-scm] 20210714 [portals-pluto] branch master updated: PLUTO-791 Upgrade to hibernate-validator-6.0.20.Final due to CVE-2020-10693 and CVE-2019-10219
- [portals-pluto-scm] 20210714 [portals-pluto] branch master updated: PLUTO-791 Upgrade to hibernate-validator-6.0.20.Final due to CVE-2020-10693 and CVE-2019-10219
- [portals-pluto-dev] 20210714 [jira] [Closed] (PLUTO-791) Upgrade to hibernate-validator-6.0.20.Final due to CVE-2020-10693 and CVE-2019-10219
- [portals-pluto-dev] 20210714 [jira] [Closed] (PLUTO-791) Upgrade to hibernate-validator-6.0.20.Final due to CVE-2020-10693 and CVE-2019-10219
- [portals-pluto-dev] 20210714 [jira] [Created] (PLUTO-791) Upgrade to hibernate-validator-6.0.20.Final due to CVE-2020-10693 and CVE-2019-10219
- [portals-pluto-dev] 20210714 [jira] [Created] (PLUTO-791) Upgrade to hibernate-validator-6.0.20.Final due to CVE-2020-10693 and CVE-2019-10219
- https://security.netapp.com/advisory/ntap-20220210-0024/
- https://security.netapp.com/advisory/ntap-20220210-0024/
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
Modified: 2024-11-21
CVE-2022-21295
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.32. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized read access to a subset of Oracle VM VirtualBox accessible data. Note: This vulnerability applies to Windows systems only. CVSS 3.1 Base Score 3.8 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N).
Modified: 2024-11-21
CVE-2022-21394
Vulnerability in the Oracle VM VirtualBox product of Oracle Virtualization (component: Core). The supported version that is affected is Prior to 6.1.32. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data. CVSS 3.1 Base Score 6.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N).
Closed vulnerabilities
BDU:2021-05417
Уязвимость функции nv_replace() текстового редактора VIM, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2021-05633
Уязвимость функции utf_ptr2char() текстового редактора VIM, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2021-06187
Уязвимость редактора Vim, связанная с чтением за границами буфера, позволяющая нарушителю выполнить произвольные команды
BDU:2021-06188
Уязвимость функции vim drawscreen.c win_redr_status() текстового редактора Vim, связанная с записью за границами буфера, позволяющая нарушителю вызвать переполнение буфера на основе кучи
BDU:2021-06189
Уязвимость текстового редактора Vim, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать переполнение буфера
BDU:2022-00978
Уязвимость функции compile_get_env() текстового редактора vim , вызванная переполнением буфера в динамической памяти, позволяющая нарушителю выполнить произвольный код
BDU:2022-00979
Уязвимость текстового редактора vim, связанная с использованием памяти после её освобождения, позволяющая нарушителю оказать воздействие на доступность информации
BDU:2022-00980
Уязвимость функции win_linetabsize() текстового редактора vim, позволяющая нарушителю оказать воздействие на конфиденциальность целостность доступность информации
BDU:2022-00981
Уязвимость функции compile_def_function() текстового редактора vim, позволяющая нарушителю выполнить произвольный код
BDU:2022-00989
Уязвимость функции ex_open() (src/ex_docmd.c) текстового редактора vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность информации
BDU:2022-00990
Уязвимость функции block_insert() (src/ops.c) текстового редактора vim, позволяющая нарушителю вызвать переполнение буфера
BDU:2022-00991
Уязвимость функции eval_lambda() (src/eval.c) текстового редактора vim, позволяющая нарушителю вызвать переполнение буфера
BDU:2022-05500
Уязвимость текстового редактора Vim, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2022-05501
Уязвимость текстового редактора Vim, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2022-05921
Уязвимость функции spell_iswordp() компонента spell.c текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-05922
Уязвимость компонента findfile.c текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-05924
Уязвимость компонента regexp_nfa.c текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-05970
Уязвимость функции getvcol компонента src/charset.c текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2022-07169
Уязвимость текстового редактора Vim, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
BDU:2023-00288
Уязвимость текстового редактора Vim, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-3770
vim is vulnerable to Heap-based Buffer Overflow
- [oss-security] 20210930 3 new CVE's in vim
- [oss-security] 20210930 3 new CVE's in vim
- https://github.com/vim/vim/commit/b7081e135a16091c93f6f5f7525a5c58fb7ca9f9
- https://github.com/vim/vim/commit/b7081e135a16091c93f6f5f7525a5c58fb7ca9f9
- https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365
- https://huntr.dev/bounties/016ad2f2-07c1-4d14-a8ce-6eed10729365
- FEDORA-2021-5fa81a2b04
- FEDORA-2021-5fa81a2b04
- FEDORA-2021-4a43cbe0b4
- FEDORA-2021-4a43cbe0b4
- FEDORA-2021-e982f972f2
- FEDORA-2021-e982f972f2
- GLSA-202208-32
- GLSA-202208-32
- https://security.netapp.com/advisory/ntap-20221124-0003/
- https://security.netapp.com/advisory/ntap-20221124-0003/
Modified: 2024-11-21
CVE-2021-3778
vim is vulnerable to Heap-based Buffer Overflow
- [oss-security] 20210930 3 new CVE's in vim
- [oss-security] 20210930 3 new CVE's in vim
- https://github.com/vim/vim/commit/65b605665997fad54ef39a93199e305af2fe4d7f
- https://github.com/vim/vim/commit/65b605665997fad54ef39a93199e305af2fe4d7f
- https://huntr.dev/bounties/d9c17308-2c99-4f9f-a706-f7f72c24c273
- https://huntr.dev/bounties/d9c17308-2c99-4f9f-a706-f7f72c24c273
- [debian-lts-announce] 20220110 [SECURITY] [DLA 2876-1] vim security update
- [debian-lts-announce] 20220110 [SECURITY] [DLA 2876-1] vim security update
- FEDORA-2021-6988830606
- FEDORA-2021-6988830606
- FEDORA-2021-84f4cf3244
- FEDORA-2021-84f4cf3244
- FEDORA-2021-968f57ec98
- FEDORA-2021-968f57ec98
- GLSA-202208-32
- GLSA-202208-32
- https://security.netapp.com/advisory/ntap-20221118-0003/
- https://security.netapp.com/advisory/ntap-20221118-0003/
Modified: 2024-11-21
CVE-2021-3796
vim is vulnerable to Use After Free
- [oss-security] 20210930 3 new CVE's in vim
- [oss-security] 20210930 3 new CVE's in vim
- https://github.com/vim/vim/commit/35a9a00afcb20897d462a766793ff45534810dc3
- https://github.com/vim/vim/commit/35a9a00afcb20897d462a766793ff45534810dc3
- https://huntr.dev/bounties/ab60b7f3-6fb1-4ac2-a4fa-4d592e08008d
- https://huntr.dev/bounties/ab60b7f3-6fb1-4ac2-a4fa-4d592e08008d
- [debian-lts-announce] 20220110 [SECURITY] [DLA 2876-1] vim security update
- [debian-lts-announce] 20220110 [SECURITY] [DLA 2876-1] vim security update
- FEDORA-2021-6988830606
- FEDORA-2021-6988830606
- FEDORA-2021-84f4cf3244
- FEDORA-2021-84f4cf3244
- FEDORA-2021-968f57ec98
- FEDORA-2021-968f57ec98
- GLSA-202208-32
- GLSA-202208-32
- https://security.netapp.com/advisory/ntap-20221118-0004/
- https://security.netapp.com/advisory/ntap-20221118-0004/
Modified: 2024-11-21
CVE-2021-3872
vim is vulnerable to Heap-based Buffer Overflow
- https://github.com/vim/vim/commit/826bfe4bbd7594188e3d74d2539d9707b1c6a14b
- https://github.com/vim/vim/commit/826bfe4bbd7594188e3d74d2539d9707b1c6a14b
- https://huntr.dev/bounties/c958013b-1c09-4939-92ca-92f50aa169e8
- https://huntr.dev/bounties/c958013b-1c09-4939-92ca-92f50aa169e8
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- FEDORA-2021-6988830606
- FEDORA-2021-6988830606
- FEDORA-2021-84f4cf3244
- FEDORA-2021-84f4cf3244
- GLSA-202208-32
- GLSA-202208-32
Modified: 2024-11-21
CVE-2021-3875
vim is vulnerable to Heap-based Buffer Overflow
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/35a319b77f897744eec1155b736e9372c9c5575f
- https://github.com/vim/vim/commit/35a319b77f897744eec1155b736e9372c9c5575f
- https://huntr.dev/bounties/5cdbc168-6ba1-4bc2-ba6c-28be12166a53
- https://huntr.dev/bounties/5cdbc168-6ba1-4bc2-ba6c-28be12166a53
- FEDORA-2021-6988830606
- FEDORA-2021-6988830606
- FEDORA-2021-84f4cf3244
- FEDORA-2021-84f4cf3244
- GLSA-202208-32
- GLSA-202208-32
Modified: 2024-11-21
CVE-2021-3903
vim is vulnerable to Heap-based Buffer Overflow
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/777e7c21b7627be80961848ac560cb0a9978ff43
- https://github.com/vim/vim/commit/777e7c21b7627be80961848ac560cb0a9978ff43
- https://huntr.dev/bounties/35738a4f-55ce-446c-b836-2fb0b39625f8
- https://huntr.dev/bounties/35738a4f-55ce-446c-b836-2fb0b39625f8
- [debian-lts-announce] 20220620 [SECURITY] [DLA 3053-1] vim security update
- [debian-lts-announce] 20220620 [SECURITY] [DLA 3053-1] vim security update
- FEDORA-2021-a5e55a9e02
- FEDORA-2021-a5e55a9e02
- FEDORA-2021-af135cabe2
- FEDORA-2021-af135cabe2
- FEDORA-2021-b0ac29efb1
- FEDORA-2021-b0ac29efb1
Modified: 2024-11-21
CVE-2021-3927
vim is vulnerable to Heap-based Buffer Overflow
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/0b5b06cb4777d1401fdf83e7d48d287662236e7e
- https://github.com/vim/vim/commit/0b5b06cb4777d1401fdf83e7d48d287662236e7e
- https://huntr.dev/bounties/9c2b2c82-48bb-4be9-ab8f-a48ea252d1b0
- https://huntr.dev/bounties/9c2b2c82-48bb-4be9-ab8f-a48ea252d1b0
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- FEDORA-2021-cfadac570a
- FEDORA-2021-cfadac570a
- FEDORA-2021-b0ac29efb1
- FEDORA-2021-b0ac29efb1
- FEDORA-2021-58ab85548d
- FEDORA-2021-58ab85548d
- GLSA-202208-32
- GLSA-202208-32
Modified: 2024-11-21
CVE-2021-3928
vim is vulnerable to Use of Uninitialized Variable
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/15d9890eee53afc61eb0a03b878a19cb5672f732
- https://github.com/vim/vim/commit/15d9890eee53afc61eb0a03b878a19cb5672f732
- https://huntr.dev/bounties/29c3ebd2-d601-481c-bf96-76975369d0cd
- https://huntr.dev/bounties/29c3ebd2-d601-481c-bf96-76975369d0cd
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- FEDORA-2021-cfadac570a
- FEDORA-2021-cfadac570a
- FEDORA-2021-b0ac29efb1
- FEDORA-2021-b0ac29efb1
- FEDORA-2021-58ab85548d
- FEDORA-2021-58ab85548d
- GLSA-202208-32
- GLSA-202208-32
Modified: 2024-11-21
CVE-2021-3973
vim is vulnerable to Heap-based Buffer Overflow
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847
- https://github.com/vim/vim/commit/615ddd5342b50a6878a907062aa471740bd9a847
- https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e
- https://huntr.dev/bounties/ce6e8609-77c6-4e17-b9fc-a2e5abed052e
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- FEDORA-2021-b0ac29efb1
- FEDORA-2021-b0ac29efb1
- FEDORA-2021-5cd9df120e
- FEDORA-2021-5cd9df120e
- GLSA-202208-32
- GLSA-202208-32
Modified: 2024-11-21
CVE-2021-3974
vim is vulnerable to Use After Free
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6
- https://github.com/vim/vim/commit/64066b9acd9f8cffdf4840f797748f938a13f2d6
- https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4
- https://huntr.dev/bounties/e402cb2c-8ec4-4828-a692-c95f8e0de6d4
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- FEDORA-2021-b0ac29efb1
- FEDORA-2021-b0ac29efb1
- FEDORA-2021-5cd9df120e
- FEDORA-2021-5cd9df120e
- GLSA-202208-32
- GLSA-202208-32
Modified: 2024-11-21
CVE-2021-3984
vim is vulnerable to Heap-based Buffer Overflow
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655
- https://github.com/vim/vim/commit/2de9b7c7c8791da8853a9a7ca9c467867465b655
- https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a
- https://huntr.dev/bounties/b114b5a2-18e2-49f0-b350-15994d71426a
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- FEDORA-2021-b0ac29efb1
- FEDORA-2021-b0ac29efb1
- GLSA-202208-32
- GLSA-202208-32
Modified: 2024-11-21
CVE-2021-4019
vim is vulnerable to Heap-based Buffer Overflow
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142
- https://github.com/vim/vim/commit/bd228fd097b41a798f90944b5d1245eddd484142
- https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92
- https://huntr.dev/bounties/d8798584-a6c9-4619-b18f-001b9a6fca92
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- FEDORA-2021-469afb66c9
- FEDORA-2021-469afb66c9
- FEDORA-2021-b0ac29efb1
- FEDORA-2021-b0ac29efb1
- GLSA-202208-32
- GLSA-202208-32
Modified: 2024-11-21
CVE-2021-4069
vim is vulnerable to Use After Free
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9
- https://github.com/vim/vim/commit/e031fe90cf2e375ce861ff5e5e281e4ad229ebb9
- https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74
- https://huntr.dev/bounties/0efd6d23-2259-4081-9ff1-3ade26907d74
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- FEDORA-2021-b0ac29efb1
- FEDORA-2021-b0ac29efb1
- FEDORA-2021-541ddd1f94
- FEDORA-2021-541ddd1f94
- GLSA-202208-32
- GLSA-202208-32
Modified: 2024-11-21
CVE-2021-4136
vim is vulnerable to Heap-based Buffer Overflow
- 20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
- 20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/605ec91e5a7330d61be313637e495fa02a6dc264
- https://github.com/vim/vim/commit/605ec91e5a7330d61be313637e495fa02a6dc264
- https://huntr.dev/bounties/5c6b93c1-2d27-4e98-a931-147877b8c938
- https://huntr.dev/bounties/5c6b93c1-2d27-4e98-a931-147877b8c938
- FEDORA-2022-a3d70b50f0
- FEDORA-2022-a3d70b50f0
- FEDORA-2022-48b86d586f
- FEDORA-2022-48b86d586f
- GLSA-202208-32
- GLSA-202208-32
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213343
- https://support.apple.com/kb/HT213343
Modified: 2024-11-21
CVE-2021-4166
vim is vulnerable to Out-of-bounds Read
- 20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
- 20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682
- https://github.com/vim/vim/commit/6f98371532fcff911b462d51bc64f2ce8a6ae682
- https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035
- https://huntr.dev/bounties/229df5dd-5507-44e9-832c-c70364bdf035
- FEDORA-2022-a3d70b50f0
- FEDORA-2022-a3d70b50f0
- FEDORA-2022-48b86d586f
- FEDORA-2022-48b86d586f
- GLSA-202208-32
- GLSA-202208-32
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213343
- https://support.apple.com/kb/HT213343
Modified: 2024-11-21
CVE-2021-4173
vim is vulnerable to Use After Free
- 20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
- 20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/9c23f9bb5fe435b28245ba8ac65aa0ca6b902c04
- https://github.com/vim/vim/commit/9c23f9bb5fe435b28245ba8ac65aa0ca6b902c04
- https://huntr.dev/bounties/a1b236b9-89fb-4ccf-9689-ba11b471e766
- https://huntr.dev/bounties/a1b236b9-89fb-4ccf-9689-ba11b471e766
- FEDORA-2022-a3d70b50f0
- FEDORA-2022-a3d70b50f0
- FEDORA-2022-48b86d586f
- FEDORA-2022-48b86d586f
- GLSA-202208-32
- GLSA-202208-32
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213343
- https://support.apple.com/kb/HT213343
Modified: 2024-11-21
CVE-2021-4187
vim is vulnerable to Use After Free
- 20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
- 20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/4bf1006cae7e87259ccd5219128c3dba75774441
- https://github.com/vim/vim/commit/4bf1006cae7e87259ccd5219128c3dba75774441
- https://huntr.dev/bounties/a8bee03a-6e2e-43bf-bee3-4968c5386a2e
- https://huntr.dev/bounties/a8bee03a-6e2e-43bf-bee3-4968c5386a2e
- FEDORA-2022-a3d70b50f0
- FEDORA-2022-a3d70b50f0
- FEDORA-2022-48b86d586f
- FEDORA-2022-48b86d586f
- GLSA-202208-32
- GLSA-202208-32
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213343
- https://support.apple.com/kb/HT213343
Modified: 2024-11-21
CVE-2021-4192
vim is vulnerable to Use After Free
- 20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
- 20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952
- https://github.com/vim/vim/commit/4c13e5e6763c6eb36a343a2b8235ea227202e952
- https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22
- https://huntr.dev/bounties/6dd9cb2e-a940-4093-856e-59b502429f22
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- FEDORA-2022-48b86d586f
- FEDORA-2022-48b86d586f
- GLSA-202208-32
- GLSA-202208-32
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213343
- https://support.apple.com/kb/HT213343
Modified: 2024-11-21
CVE-2021-4193
vim is vulnerable to Out-of-bounds Read
- 20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
- 20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b
- https://github.com/vim/vim/commit/94f3192b03ed27474db80b4d3a409e107140738b
- https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0
- https://huntr.dev/bounties/92c1940d-8154-473f-84ce-0de43b0c2eb0
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20220311 [SECURITY] [DLA 2947-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- FEDORA-2022-48b86d586f
- FEDORA-2022-48b86d586f
- GLSA-202208-32
- GLSA-202208-32
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213343
- https://support.apple.com/kb/HT213343
Modified: 2024-11-21
CVE-2022-0128
vim is vulnerable to Out-of-bounds Read
- 20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
- 20220721 APPLE-SA-2022-07-20-4 Security Update 2022-005 Catalina
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/d3a117814d6acbf0dca3eff1a7626843b9b3734a
- https://github.com/vim/vim/commit/d3a117814d6acbf0dca3eff1a7626843b9b3734a
- https://huntr.dev/bounties/63f51299-008a-4112-b85b-1e904aadd4ba
- https://huntr.dev/bounties/63f51299-008a-4112-b85b-1e904aadd4ba
- GLSA-202208-32
- GLSA-202208-32
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213343
- https://support.apple.com/kb/HT213343
Modified: 2024-11-21
CVE-2022-0156
vim is vulnerable to Use After Free
- 20220721 APPLE-SA-2022-07-20-3 macOS Big Sur 11.6.8
- 20220721 APPLE-SA-2022-07-20-3 macOS Big Sur 11.6.8
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/9f1a39a5d1cd7989ada2d1cb32f97d84360e050f
- https://github.com/vim/vim/commit/9f1a39a5d1cd7989ada2d1cb32f97d84360e050f
- https://huntr.dev/bounties/47dded34-3767-4725-8c7c-9dcb68c70b36
- https://huntr.dev/bounties/47dded34-3767-4725-8c7c-9dcb68c70b36
- FEDORA-2022-48b86d586f
- FEDORA-2022-48b86d586f
- FEDORA-2022-20e66c6698
- FEDORA-2022-20e66c6698
- GLSA-202208-32
- GLSA-202208-32
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213344
- https://support.apple.com/kb/HT213344
Modified: 2024-11-21
CVE-2022-0158
vim is vulnerable to Heap-based Buffer Overflow
- 20220721 APPLE-SA-2022-07-20-3 macOS Big Sur 11.6.8
- 20220721 APPLE-SA-2022-07-20-3 macOS Big Sur 11.6.8
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- 20220314 APPLE-SA-2022-03-14-4 macOS Monterey 12.3
- [oss-security] 20220114 Re: 3 new CVE's in vim
- [oss-security] 20220114 Re: 3 new CVE's in vim
- https://github.com/vim/vim/commit/5f25c3855071bd7e26255c68bf458b1b5cf92f39
- https://github.com/vim/vim/commit/5f25c3855071bd7e26255c68bf458b1b5cf92f39
- https://huntr.dev/bounties/ac5d7005-07c6-4a0a-b251-ba9cdbf6738b
- https://huntr.dev/bounties/ac5d7005-07c6-4a0a-b251-ba9cdbf6738b
- FEDORA-2022-48b86d586f
- FEDORA-2022-48b86d586f
- FEDORA-2022-20e66c6698
- FEDORA-2022-20e66c6698
- GLSA-202208-32
- GLSA-202208-32
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213183
- https://support.apple.com/kb/HT213344
- https://support.apple.com/kb/HT213344
Modified: 2024-11-21
CVE-2022-0261
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2.
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6
- 20221030 APPLE-SA-2022-10-27-7 Additional information for APPLE-SA-2022-09-12-4 macOS Monterey 12.6
- https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc
- https://github.com/vim/vim/commit/9f8c304c8a390ade133bac29963dc8e56ab14cbc
- https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82
- https://huntr.dev/bounties/fa795954-8775-4f23-98c6-d4d4d3fe8a82
- [debian-lts-announce] 20220516 [SECURITY] [DLA 3011-1] vim security update
- [debian-lts-announce] 20220516 [SECURITY] [DLA 3011-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- GLSA-202208-32
- GLSA-202208-32
- https://support.apple.com/kb/HT213444
- https://support.apple.com/kb/HT213444
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213488
Closed bugs
syntax/spec.vim не подсвечивает длинные CVE
Добавить подсветку тега vcs
Package appstream-data updated to version 20220119-alt1 for branch sisyphus in task 293763.
Closed bugs
Устарело содержимое
Closed bugs
Segmentation fault
Package kernel-image-un-def updated to version 5.16.1-alt1 for branch sisyphus in task 293765.
Closed vulnerabilities
BDU:2022-07326
Уязвимость функции _rtw_init_xmit_priv в модуле drivers/staging/r8188eu/core/rtw_xmit.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии
BDU:2022-07327
Уязвимость функции free_charger_irq() в модуле drivers/power/supply/wm8350_power.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии
BDU:2022-07328
Уязвимость функции ef100_update_stats в модуле drivers/net/hyperv/netvsc_drv.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии
BDU:2022-07329
Уязвимость функции kfd_parse_subtype_iolink в модуле drivers/gpu/drm/amd/amdkfd/kfd_crat.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии
BDU:2022-07330
Уязвимость функции ef100_update_stats в модуле drivers/net/ethernet/sfc/ef100_nic.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-07331
Уязвимость функции amvdec_set_canvases() в модуле drivers/staging/media/meson/vdec/vdec_helpers.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии
BDU:2022-07332
Уязвимость функции lkdtm_ARRAY_BOUNDS модуля drivers/misc/lkdtm/bugs.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии.
BDU:2022-07333
Уязвимость функции uapi_finalize() в модуле drivers/infiniband/core/uverbs_uapi.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-07334
Уязвимость функции imx_register_uart_clocks() в модуле drivers/clk/imx/clk.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии
BDU:2022-07335
Уязвимость функции malidp_crtc_reset() в модуле drivers/gpu/drm/arm/malidp_crtc.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии
BDU:2022-07337
Уязвимость функции mtk_vcodec_fw_vpu_init() в модуле drivers/media/platform/mtk-vcodec/mtk_vcodec_fw_vpu.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии
Modified: 2024-11-21
CVE-2022-3104
An issue was discovered in the Linux kernel through 5.16-rc6. lkdtm_ARRAY_BOUNDS in drivers/misc/lkdtm/bugs.c lacks check of the return value of kmalloc() and will cause the null pointer dereference.
- https://bugzilla.redhat.com/show_bug.cgi?id=2153062
- https://bugzilla.redhat.com/show_bug.cgi?id=2153062
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=4a9800c81d2f34afb66b4b42e0330ae8298019a2
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=4a9800c81d2f34afb66b4b42e0330ae8298019a2
Modified: 2024-11-21
CVE-2022-3105
An issue was discovered in the Linux kernel through 5.16-rc6. uapi_finalize in drivers/infiniband/core/uverbs_uapi.c lacks check of kmalloc_array().
- https://bugzilla.redhat.com/show_bug.cgi?id=2153067
- https://bugzilla.redhat.com/show_bug.cgi?id=2153067
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=7694a7de22c53a312ea98960fcafc6ec62046531
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=7694a7de22c53a312ea98960fcafc6ec62046531
Modified: 2024-11-21
CVE-2022-3106
An issue was discovered in the Linux kernel through 5.16-rc6. ef100_update_stats in drivers/net/ethernet/sfc/ef100_nic.c lacks check of the return value of kmalloc().
- https://bugzilla.redhat.com/show_bug.cgi?id=2153066
- https://bugzilla.redhat.com/show_bug.cgi?id=2153066
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=407ecd1bd726f240123f704620d46e285ff30dd9
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=407ecd1bd726f240123f704620d46e285ff30dd9
Modified: 2024-11-21
CVE-2022-3107
An issue was discovered in the Linux kernel through 5.16-rc6. netvsc_get_ethtool_stats in drivers/net/hyperv/netvsc_drv.c lacks check of the return value of kvmalloc_array() and will cause the null pointer dereference.
- https://bugzilla.redhat.com/show_bug.cgi?id=2153060
- https://bugzilla.redhat.com/show_bug.cgi?id=2153060
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=886e44c9298a6b428ae046e2fa092ca52e822e6a
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=886e44c9298a6b428ae046e2fa092ca52e822e6a
Modified: 2024-11-21
CVE-2022-3108
An issue was discovered in the Linux kernel through 5.16-rc6. kfd_parse_subtype_iolink in drivers/gpu/drm/amd/amdkfd/kfd_crat.c lacks check of the return value of kmemdup().
- https://bugzilla.redhat.com/show_bug.cgi?id=2153052
- https://bugzilla.redhat.com/show_bug.cgi?id=2153052
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=abfaf0eee97925905e742aa3b0b72e04a918fa9e
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=abfaf0eee97925905e742aa3b0b72e04a918fa9e
Modified: 2024-11-21
CVE-2022-3110
An issue was discovered in the Linux kernel through 5.16-rc6. _rtw_init_xmit_priv in drivers/staging/r8188eu/core/rtw_xmit.c lacks check of the return value of rtw_alloc_hwxmits() and will cause the null pointer dereference.
- https://bugzilla.redhat.com/show_bug.cgi?id=2153055
- https://bugzilla.redhat.com/show_bug.cgi?id=2153055
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=f94b47c6bde624d6c07f43054087607c52054a95
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=f94b47c6bde624d6c07f43054087607c52054a95
Modified: 2024-11-21
CVE-2022-3111
An issue was discovered in the Linux kernel through 5.16-rc6. free_charger_irq() in drivers/power/supply/wm8350_power.c lacks free of WM8350_IRQ_CHG_FAST_RDY, which is registered in wm8350_init_charger().
- https://bugzilla.redhat.com/show_bug.cgi?id=2153059
- https://bugzilla.redhat.com/show_bug.cgi?id=2153059
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=6dee930f6f6776d1e5a7edf542c6863b47d9f078
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=6dee930f6f6776d1e5a7edf542c6863b47d9f078
Modified: 2024-11-21
CVE-2022-3112
An issue was discovered in the Linux kernel through 5.16-rc6. amvdec_set_canvases in drivers/staging/media/meson/vdec/vdec_helpers.c lacks check of the return value of kzalloc() and will cause the null pointer dereference.
- https://bugzilla.redhat.com/show_bug.cgi?id=2153068
- https://bugzilla.redhat.com/show_bug.cgi?id=2153068
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=c8c80c996182239ff9b05eda4db50184cf3b2e99
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=c8c80c996182239ff9b05eda4db50184cf3b2e99
Modified: 2024-11-21
CVE-2022-3113
An issue was discovered in the Linux kernel through 5.16-rc6. mtk_vcodec_fw_vpu_init in drivers/media/platform/mtk-vcodec/mtk_vcodec_fw_vpu.c lacks check of the return value of devm_kzalloc() and will cause the null pointer dereference.
- https://bugzilla.redhat.com/show_bug.cgi?id=2153053
- https://bugzilla.redhat.com/show_bug.cgi?id=2153053
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=e25a89f743b18c029bfbe5e1663ae0c7190912b0
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=e25a89f743b18c029bfbe5e1663ae0c7190912b0
Modified: 2024-11-21
CVE-2022-3114
An issue was discovered in the Linux kernel through 5.16-rc6. imx_register_uart_clocks in drivers/clk/imx/clk.c lacks check of the return value of kcalloc() and will cause the null pointer dereference.
- https://bugzilla.redhat.com/show_bug.cgi?id=2153054
- https://bugzilla.redhat.com/show_bug.cgi?id=2153054
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=ed713e2bc093239ccd380c2ce8ae9e4162f5c037
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=ed713e2bc093239ccd380c2ce8ae9e4162f5c037
Modified: 2024-11-21
CVE-2022-3115
An issue was discovered in the Linux kernel through 5.16-rc6. malidp_crtc_reset in drivers/gpu/drm/arm/malidp_crtc.c lacks check of the return value of kzalloc() and will cause the null pointer dereference.
- https://bugzilla.redhat.com/show_bug.cgi?id=2153058
- https://bugzilla.redhat.com/show_bug.cgi?id=2153058
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=73c3ed7495c67b8fbdc31cf58e6ca8757df31a33
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?h=v5.19-rc2&id=73c3ed7495c67b8fbdc31cf58e6ca8757df31a33
Package rpm-build-perl updated to version 0.85-alt3 for branch sisyphus in task 293787.
Closed bugs
Fails to load shared libraries located not in public place