ALT-BU-2022-4029-1
Branch p10 update bulletin.
Package chromium-gost updated to version 97.0.4692.99-alt0.p10.1 for branch p10 in task 295105.
Closed vulnerabilities
BDU:2021-06051
Уязвимость компонента BFCache браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2021-06100
Уязвимость расширений браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2021-06101
Уязвимость компонента UI браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2021-06102
Уязвимость веб-приложений браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2021-06117
Уязвимость реализации компонента «New Tab Page» («Новая вкладка») браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю оказать влияние на доступность данных или вызвать отказ в обслуживании
BDU:2021-06118
Уязвимость реализации функции автозаполнения Autofill браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2021-06119
Уязвимость библиотеки ANGLE браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2021-06120
Уязвимость загрузчика браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2021-06132
Уязвимость обработчика JavaScript-сценариев V8 браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2021-06136
Уязвимость библиотеки ANGLE браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2021-06137
Уязвимость компонента автодополнения Autofill браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации
BDU:2021-06151
Уязвимость расширения Window Manager браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2021-06157
Уязвимость набора инструментов для веб-разработки DevTools браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2021-06163
Уязвимость функции захват экрана (Screen Capture) браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2021-06243
Уязвимость библиотеки SwiftShader браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2021-06244
Уязвимость библиотеки SwiftShader браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2021-06260
Уязвимость библиотеки ANGLE браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2021-06261
Уязвимость компонента loader браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2021-06276
Уязвимость библиотеки передачи сообщений Mojo браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2021-06277
Уязвимость обработчика JavaScript-сценариев V8 браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2022-00081
Уязвимость интерфейса API браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2022-00082
Уязвимость расширения WebRTC браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2022-00091
Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2022-00744
Уязвимость функции конфиденциальности Fenced Frames браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-00745
Уязвимость реализации push-уведомлений браузера Google Chrome, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-00750
Уязвимость набора инструментов для веб-разработки DevTools браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2022-00792
Уязвимость диспетчера задачTask Manager браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения безопасности
BDU:2022-00834
Уязвимость функции изоляции сайтов (Site Isolation) браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код
BDU:2022-00857
Уязвимость компонента Data Transfer браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии
BDU:2022-00864
Уязвимость компонента Web packaging браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код
BDU:2022-00865
Уязвимость службы Optimization Guide браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии
BDU:2022-00866
Уязвимость реализации функции автозаполнения Autofill браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю обойти существующие ограничения безопасности
BDU:2022-00867
Уязвимость службы Safe Browsing браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код
BDU:2022-00868
Уязвимость компонента Storage браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю обойти ограничения безопасности
BDU:2022-00874
Уязвимость адресной строки Omnibox браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код
BDU:2022-01029
Уязвимость компонента входа в систему Sign-In браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2022-01053
Уязвимость компонента Task Manager браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения безопасности
BDU:2022-01185
Уязвимость компонента SwiftShader браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2022-01186
Уязвимость реализации функции автозаполнения Autofill браузера Google Chrome, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2022-01187
Уязвимость реализации функции автозаполнения Autofill браузера Google Chrome, позволяющая нарушителю оказать воздействие на целостность защищаемой информации
BDU:2022-01198
Уязвимость компонента File Manager API браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2022-01233
Уязвимость элемента управления «Bookmarks» («Закладки») браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код
BDU:2022-01235
Уязвимость реализации функции автозаполнения Autofill браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2022-01287
Уязвимость интерфейса File API браузера Google Chrome, позволяющая нарушителю обойти ограничения безопасности
BDU:2022-01294
Уязвимость интерфейса Web Serial API браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-01300
Уязвимость обработчика JavaScript-сценариев V8 браузера Microsoft Edge и Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2022-01308
Уязвимость интерфейса для поддержки потоковых аудио и видео данных Media streams API браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код в целевой системе
BDU:2022-01310
Уязвимость компонента Compositing браузеров браузеров Microsoft Edge и Google Chrome, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2022-01311
Уязвимость реализации компонента WebShare браузера Google Chrome, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2022-01333
Уязвимость механизма отображения веб-страниц Blink браузера Google Chrome, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2022-01359
Уязвимость функции Navigation браузера Google Chrome, позволяющая нарушителю подделать содержимое адресной строки
BDU:2022-01361
Уязвимость функции захват экрана (Screen Capture) браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2022-01362
Уязвимость набора инструментов для веб-разработки DevTools браузера Google Chrome, позволяющая нарушителю выйти из изолированной программной среды
BDU:2022-01380
Уязвимость компонента Storage браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2022-01560
Уязвимость механизма отображения веб-страниц Blink браузера Google Chrome, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2022-01561
Уязвимость менеджера паролей браузера Google Chrome, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2022-01563
Уязвимость пользовательского интерфейса браузера Google Chrome, позволяющая нарушителю проводить спуфинг-атаки
BDU:2022-01708
Уязвимость обработчика PDF-содержимого браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2022-01709
Уязвимость функции Navigation браузера Google Chrome, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2022-01710
Уязвимость библиотеки ANGLE браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2021-4052
Use after free in web apps in Google Chrome prior to 96.0.4664.93 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://crbug.com/1267661
- https://crbug.com/1267661
- FEDORA-2021-6a292e2cf4
- FEDORA-2021-6a292e2cf4
- GLSA-202208-25
- GLSA-202208-25
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-4053
Use after free in UI in Google Chrome on Linux prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://crbug.com/1267791
- https://crbug.com/1267791
- FEDORA-2021-6a292e2cf4
- FEDORA-2021-6a292e2cf4
- GLSA-202208-25
- GLSA-202208-25
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-4054
Incorrect security UI in autofill in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to perform domain spoofing via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://crbug.com/1239760
- https://crbug.com/1239760
- FEDORA-2021-6a292e2cf4
- FEDORA-2021-6a292e2cf4
- GLSA-202208-25
- GLSA-202208-25
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-4055
Heap buffer overflow in extensions in Google Chrome prior to 96.0.4664.93 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension.
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://crbug.com/1266510
- https://crbug.com/1266510
- FEDORA-2021-6a292e2cf4
- FEDORA-2021-6a292e2cf4
- GLSA-202208-25
- GLSA-202208-25
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-4056
Type confusion in loader in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://crbug.com/1260939
- https://crbug.com/1260939
- FEDORA-2021-6a292e2cf4
- FEDORA-2021-6a292e2cf4
- GLSA-202208-25
- GLSA-202208-25
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-4057
Use after free in file API in Google Chrome prior to 96.0.4664.93 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
- http://packetstormsecurity.com/files/165486/Chrome-storage-BlobURLStoreImpl-Revoke-Heap-Use-After-Free.html
- http://packetstormsecurity.com/files/165486/Chrome-storage-BlobURLStoreImpl-Revoke-Heap-Use-After-Free.html
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://crbug.com/1262183
- https://crbug.com/1262183
- FEDORA-2021-6a292e2cf4
- FEDORA-2021-6a292e2cf4
- GLSA-202208-25
- GLSA-202208-25
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-4058
Heap buffer overflow in ANGLE in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://crbug.com/1267496
- https://crbug.com/1267496
- FEDORA-2021-6a292e2cf4
- FEDORA-2021-6a292e2cf4
- GLSA-202208-25
- GLSA-202208-25
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-4059
Insufficient data validation in loader in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://crbug.com/1270990
- https://crbug.com/1270990
- FEDORA-2021-6a292e2cf4
- FEDORA-2021-6a292e2cf4
- GLSA-202208-25
- GLSA-202208-25
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-4061
Type confusion in V8 in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://crbug.com/1271456
- https://crbug.com/1271456
- FEDORA-2021-6a292e2cf4
- FEDORA-2021-6a292e2cf4
- GLSA-202208-25
- GLSA-202208-25
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-4062
Heap buffer overflow in BFCache in Google Chrome prior to 96.0.4664.93 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://crbug.com/1272403
- https://crbug.com/1272403
- FEDORA-2021-6a292e2cf4
- FEDORA-2021-6a292e2cf4
- GLSA-202208-25
- GLSA-202208-25
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-4063
Use after free in developer tools in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://crbug.com/1273176
- https://crbug.com/1273176
- FEDORA-2021-6a292e2cf4
- FEDORA-2021-6a292e2cf4
- GLSA-202208-25
- GLSA-202208-25
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-4064
Use after free in screen capture in Google Chrome on ChromeOS prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://crbug.com/1273197
- https://crbug.com/1273197
- FEDORA-2021-6a292e2cf4
- FEDORA-2021-6a292e2cf4
- GLSA-202208-25
- GLSA-202208-25
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-4065
Use after free in autofill in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://crbug.com/1273674
- https://crbug.com/1273674
- FEDORA-2021-6a292e2cf4
- FEDORA-2021-6a292e2cf4
- GLSA-202208-25
- GLSA-202208-25
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-4066
Integer underflow in ANGLE in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://crbug.com/1274499
- https://crbug.com/1274499
- FEDORA-2021-6a292e2cf4
- FEDORA-2021-6a292e2cf4
- GLSA-202208-25
- GLSA-202208-25
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-4067
Use after free in window manager in Google Chrome on ChromeOS prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://crbug.com/1274641
- https://crbug.com/1274641
- FEDORA-2021-6a292e2cf4
- FEDORA-2021-6a292e2cf4
- GLSA-202208-25
- GLSA-202208-25
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-4068
Insufficient data validation in new tab page in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2021/12/stable-channel-update-for-desktop.html
- https://crbug.com/1265197
- https://crbug.com/1265197
- FEDORA-2021-6a292e2cf4
- FEDORA-2021-6a292e2cf4
- GLSA-202208-25
- GLSA-202208-25
- DSA-5046
- DSA-5046
Modified: 2024-11-21
CVE-2021-4078
Type confusion in V8 in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Modified: 2024-11-21
CVE-2021-4079
Out of bounds write in WebRTC in Google Chrome prior to 96.0.4664.93 allowed a remote attacker to potentially exploit heap corruption via crafted WebRTC packets.
Modified: 2024-11-21
CVE-2021-4098
Insufficient data validation in Mojo in Google Chrome prior to 96.0.4664.110 allowed a remote attacker who had compromised the renderer process to potentially perform a sandbox escape via a crafted HTML page.
Modified: 2024-11-21
CVE-2021-4099
Use after free in Swiftshader in Google Chrome prior to 96.0.4664.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Modified: 2024-11-21
CVE-2021-4100
Object lifecycle issue in ANGLE in Google Chrome prior to 96.0.4664.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Modified: 2024-11-21
CVE-2021-4101
Heap buffer overflow in Swiftshader in Google Chrome prior to 96.0.4664.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Modified: 2025-03-13
CVE-2021-4102
Use after free in V8 in Google Chrome prior to 96.0.4664.110 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Modified: 2024-11-21
CVE-2022-0096
Use after free in Storage in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
- https://crbug.com/1275020
- https://crbug.com/1275020
- FEDORA-2022-d1a15f9cdb
- FEDORA-2022-d1a15f9cdb
- FEDORA-2022-49b52819a4
- FEDORA-2022-49b52819a4
- FEDORA-2022-57923346cf
- FEDORA-2022-57923346cf
Modified: 2024-11-21
CVE-2022-0097
Inappropriate implementation in DevTools in Google Chrome prior to 97.0.4692.71 allowed an attacker who convinced a user to install a malicious extension to to potentially allow extension to escape the sandbox via a crafted HTML page.
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
- https://crbug.com/1117173
- https://crbug.com/1117173
- FEDORA-2022-d1a15f9cdb
- FEDORA-2022-d1a15f9cdb
- FEDORA-2022-49b52819a4
- FEDORA-2022-49b52819a4
- FEDORA-2022-57923346cf
- FEDORA-2022-57923346cf
Modified: 2024-11-21
CVE-2022-0098
Use after free in Screen Capture in Google Chrome on Chrome OS prior to 97.0.4692.71 allowed an attacker who convinced a user to perform specific user gestures to potentially exploit heap corruption via specific user gestures.
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
- https://crbug.com/1273609
- https://crbug.com/1273609
- FEDORA-2022-d1a15f9cdb
- FEDORA-2022-d1a15f9cdb
- FEDORA-2022-49b52819a4
- FEDORA-2022-49b52819a4
- FEDORA-2022-57923346cf
- FEDORA-2022-57923346cf
Modified: 2024-11-21
CVE-2022-0099
Use after free in Sign-in in Google Chrome prior to 97.0.4692.71 allowed a remote attacker who convinced a user to perform specific user gestures to potentially exploit heap corruption via specific user gesture.
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
- https://crbug.com/1245629
- https://crbug.com/1245629
- FEDORA-2022-d1a15f9cdb
- FEDORA-2022-d1a15f9cdb
- FEDORA-2022-49b52819a4
- FEDORA-2022-49b52819a4
- FEDORA-2022-57923346cf
- FEDORA-2022-57923346cf
Modified: 2024-11-21
CVE-2022-0100
Heap buffer overflow in Media streams API in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
- https://crbug.com/1238209
- https://crbug.com/1238209
- FEDORA-2022-d1a15f9cdb
- FEDORA-2022-d1a15f9cdb
- FEDORA-2022-49b52819a4
- FEDORA-2022-49b52819a4
- FEDORA-2022-57923346cf
- FEDORA-2022-57923346cf
Modified: 2024-11-21
CVE-2022-0101
Heap buffer overflow in Bookmarks in Google Chrome prior to 97.0.4692.71 allowed a remote attacker who convinced a user to perform specific user gesture to potentially exploit heap corruption via specific user gesture.
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
- https://crbug.com/1249426
- https://crbug.com/1249426
- FEDORA-2022-d1a15f9cdb
- FEDORA-2022-d1a15f9cdb
- FEDORA-2022-49b52819a4
- FEDORA-2022-49b52819a4
- FEDORA-2022-57923346cf
- FEDORA-2022-57923346cf
Modified: 2024-11-21
CVE-2022-0102
Type confusion in V8 in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
- https://crbug.com/1260129
- https://crbug.com/1260129
- FEDORA-2022-d1a15f9cdb
- FEDORA-2022-d1a15f9cdb
- FEDORA-2022-49b52819a4
- FEDORA-2022-49b52819a4
- FEDORA-2022-57923346cf
- FEDORA-2022-57923346cf
Modified: 2024-11-21
CVE-2022-0103
Use after free in SwiftShader in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
- https://crbug.com/1272266
- https://crbug.com/1272266
- FEDORA-2022-d1a15f9cdb
- FEDORA-2022-d1a15f9cdb
- FEDORA-2022-49b52819a4
- FEDORA-2022-49b52819a4
- FEDORA-2022-57923346cf
- FEDORA-2022-57923346cf
Modified: 2024-11-21
CVE-2022-0104
Heap buffer overflow in ANGLE in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
- https://crbug.com/1273661
- https://crbug.com/1273661
- FEDORA-2022-d1a15f9cdb
- FEDORA-2022-d1a15f9cdb
- FEDORA-2022-49b52819a4
- FEDORA-2022-49b52819a4
- FEDORA-2022-57923346cf
- FEDORA-2022-57923346cf
Modified: 2024-11-21
CVE-2022-0105
Use after free in PDF Accessibility in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
- https://crbug.com/1274376
- https://crbug.com/1274376
- FEDORA-2022-d1a15f9cdb
- FEDORA-2022-d1a15f9cdb
- FEDORA-2022-49b52819a4
- FEDORA-2022-49b52819a4
- FEDORA-2022-57923346cf
- FEDORA-2022-57923346cf
Modified: 2024-11-21
CVE-2022-0106
Use after free in Autofill in Google Chrome prior to 97.0.4692.71 allowed a remote attacker who convinced a user to perform specific user gesture to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
- https://crbug.com/1278960
- https://crbug.com/1278960
- FEDORA-2022-d1a15f9cdb
- FEDORA-2022-d1a15f9cdb
- FEDORA-2022-49b52819a4
- FEDORA-2022-49b52819a4
- FEDORA-2022-57923346cf
- FEDORA-2022-57923346cf
Modified: 2024-11-21
CVE-2022-0107
Use after free in File Manager API in Google Chrome on Chrome OS prior to 97.0.4692.71 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
- https://crbug.com/1248438
- https://crbug.com/1248438
- FEDORA-2022-d1a15f9cdb
- FEDORA-2022-d1a15f9cdb
- FEDORA-2022-49b52819a4
- FEDORA-2022-49b52819a4
- FEDORA-2022-57923346cf
- FEDORA-2022-57923346cf
Modified: 2024-11-21
CVE-2022-0108
Inappropriate implementation in Navigation in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
- [oss-security] 20230421 WebKitGTK and WPE WebKit Security Advisory WSA-2023-0003
- [oss-security] 20230421 WebKitGTK and WPE WebKit Security Advisory WSA-2023-0003
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
- https://crbug.com/1248444
- https://crbug.com/1248444
- [debian-lts-announce] 20230512 [SECURITY] [DLA 3419-1] webkit2gtk security update
- [debian-lts-announce] 20230512 [SECURITY] [DLA 3419-1] webkit2gtk security update
- FEDORA-2023-a4bbf02a57
- FEDORA-2023-a4bbf02a57
- FEDORA-2022-d1a15f9cdb
- FEDORA-2022-d1a15f9cdb
- FEDORA-2023-5b61346bbe
- FEDORA-2023-5b61346bbe
- FEDORA-2023-8900b35c6f
- FEDORA-2023-8900b35c6f
- FEDORA-2022-49b52819a4
- FEDORA-2022-49b52819a4
- FEDORA-2022-57923346cf
- FEDORA-2022-57923346cf
- DSA-5396
- DSA-5396
- DSA-5397
- DSA-5397
Modified: 2024-11-21
CVE-2022-0109
Inappropriate implementation in Autofill in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to obtain potentially sensitive information via a crafted HTML page.
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
- https://crbug.com/1261689
- https://crbug.com/1261689
- FEDORA-2022-d1a15f9cdb
- FEDORA-2022-d1a15f9cdb
- FEDORA-2022-49b52819a4
- FEDORA-2022-49b52819a4
- FEDORA-2022-57923346cf
- FEDORA-2022-57923346cf
Modified: 2024-11-21
CVE-2022-0110
Incorrect security UI in Autofill in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
- https://crbug.com/1237310
- https://crbug.com/1237310
- FEDORA-2022-d1a15f9cdb
- FEDORA-2022-d1a15f9cdb
- FEDORA-2022-49b52819a4
- FEDORA-2022-49b52819a4
- FEDORA-2022-57923346cf
- FEDORA-2022-57923346cf
Modified: 2024-11-21
CVE-2022-0111
Inappropriate implementation in Navigation in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to incorrectly set origin via a crafted HTML page.
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
- https://crbug.com/1241188
- https://crbug.com/1241188
- FEDORA-2022-d1a15f9cdb
- FEDORA-2022-d1a15f9cdb
- FEDORA-2022-49b52819a4
- FEDORA-2022-49b52819a4
- FEDORA-2022-57923346cf
- FEDORA-2022-57923346cf
Modified: 2024-11-21
CVE-2022-0112
Incorrect security UI in Browser UI in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to display missing URL or incorrect URL via a crafted URL.
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
- https://crbug.com/1255713
- https://crbug.com/1255713
- FEDORA-2022-d1a15f9cdb
- FEDORA-2022-d1a15f9cdb
- FEDORA-2022-49b52819a4
- FEDORA-2022-49b52819a4
- FEDORA-2022-57923346cf
- FEDORA-2022-57923346cf
Modified: 2024-11-21
CVE-2022-0113
Inappropriate implementation in Blink in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
- https://crbug.com/1039885
- https://crbug.com/1039885
- FEDORA-2022-d1a15f9cdb
- FEDORA-2022-d1a15f9cdb
- FEDORA-2022-49b52819a4
- FEDORA-2022-49b52819a4
- FEDORA-2022-57923346cf
- FEDORA-2022-57923346cf
Modified: 2024-11-21
CVE-2022-0114
Out of bounds memory access in Blink Serial API in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to perform an out of bounds memory read via a crafted HTML page and virtual serial port driver.
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
- https://crbug.com/1267627
- https://crbug.com/1267627
- FEDORA-2022-d1a15f9cdb
- FEDORA-2022-d1a15f9cdb
- FEDORA-2022-49b52819a4
- FEDORA-2022-49b52819a4
- FEDORA-2022-57923346cf
- FEDORA-2022-57923346cf
Modified: 2024-11-21
CVE-2022-0115
Uninitialized use in File API in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially perform out of bounds memory access via a crafted HTML page.
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
- https://crbug.com/1268903
- https://crbug.com/1268903
- FEDORA-2022-d1a15f9cdb
- FEDORA-2022-d1a15f9cdb
- FEDORA-2022-49b52819a4
- FEDORA-2022-49b52819a4
- FEDORA-2022-57923346cf
- FEDORA-2022-57923346cf
Modified: 2024-11-21
CVE-2022-0116
Inappropriate implementation in Compositing in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page.
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
- https://crbug.com/1272250
- https://crbug.com/1272250
- FEDORA-2022-d1a15f9cdb
- FEDORA-2022-d1a15f9cdb
- FEDORA-2022-49b52819a4
- FEDORA-2022-49b52819a4
- FEDORA-2022-57923346cf
- FEDORA-2022-57923346cf
Modified: 2024-11-21
CVE-2022-0117
Policy bypass in Blink in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to leak cross-origin data via a crafted HTML page.
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
- https://crbug.com/1115847
- https://crbug.com/1115847
- FEDORA-2022-d1a15f9cdb
- FEDORA-2022-d1a15f9cdb
- FEDORA-2022-49b52819a4
- FEDORA-2022-49b52819a4
- FEDORA-2022-57923346cf
- FEDORA-2022-57923346cf
Modified: 2024-11-21
CVE-2022-0118
Inappropriate implementation in WebShare in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially hide the contents of the Omnibox (URL bar) via a crafted HTML page.
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
- https://crbug.com/1238631
- https://crbug.com/1238631
- FEDORA-2022-d1a15f9cdb
- FEDORA-2022-d1a15f9cdb
- FEDORA-2022-49b52819a4
- FEDORA-2022-49b52819a4
- FEDORA-2022-57923346cf
- FEDORA-2022-57923346cf
Modified: 2024-11-21
CVE-2022-0120
Inappropriate implementation in Passwords in Google Chrome prior to 97.0.4692.71 allowed a remote attacker to potentially leak cross-origin data via a malicious website.
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop.html
- https://crbug.com/1262953
- https://crbug.com/1262953
- FEDORA-2022-d1a15f9cdb
- FEDORA-2022-d1a15f9cdb
- FEDORA-2022-49b52819a4
- FEDORA-2022-49b52819a4
- FEDORA-2022-57923346cf
- FEDORA-2022-57923346cf
Modified: 2024-11-21
CVE-2022-0289
Use after free in Safe browsing in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- http://packetstormsecurity.com/files/166547/Chrome-safe_browsing-ThreatDetails-OnReceivedThreatDOMDetails-Use-After-Free.html
- http://packetstormsecurity.com/files/166547/Chrome-safe_browsing-ThreatDetails-OnReceivedThreatDOMDetails-Use-After-Free.html
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop_19.html
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop_19.html
- https://crbug.com/1284367
- https://crbug.com/1284367
Modified: 2024-11-21
CVE-2022-0290
Use after free in Site isolation in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to potentially perform a sandbox escape via a crafted HTML page.
- http://packetstormsecurity.com/files/166080/Chrome-RenderFrameHostImpl-Use-After-Free.html
- http://packetstormsecurity.com/files/166080/Chrome-RenderFrameHostImpl-Use-After-Free.html
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop_19.html
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop_19.html
- https://crbug.com/1260134
- https://crbug.com/1260134
Modified: 2024-11-21
CVE-2022-0291
Inappropriate implementation in Storage in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.
Modified: 2024-11-21
CVE-2022-0292
Inappropriate implementation in Fenced Frames in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who had compromised the renderer process to bypass navigation restrictions via a crafted HTML page.
Modified: 2024-11-21
CVE-2022-0293
Use after free in Web packaging in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Modified: 2024-11-21
CVE-2022-0294
Inappropriate implementation in Push messaging in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.
Modified: 2024-11-21
CVE-2022-0295
Use after free in Omnibox in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who convinced the user to engage is specific user interactions to potentially exploit heap corruption via a crafted HTML page.
Modified: 2024-11-21
CVE-2022-0296
Use after free in Printing in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who convinced the user to engage is specific user interactions to potentially exploit heap corruption via a crafted HTML page.
Modified: 2024-11-21
CVE-2022-0297
Use after free in Vulkan in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Modified: 2024-11-21
CVE-2022-0298
Use after free in Scheduling in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Modified: 2024-11-21
CVE-2022-0300
Use after free in Text Input Method Editor in Google Chrome on Android prior to 97.0.4692.99 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted HTML page.
Modified: 2024-11-21
CVE-2022-0301
Heap buffer overflow in DevTools in Google Chrome prior to 97.0.4692.99 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted HTML page.
Modified: 2024-11-21
CVE-2022-0302
Use after free in Omnibox in Google Chrome prior to 97.0.4692.99 allowed an attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted HTML page.
Modified: 2024-11-21
CVE-2022-0304
Use after free in Bookmarks in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who convinced a user to engage in specific user interactions to potentially exploit heap corruption via a crafted HTML page.
Modified: 2024-11-21
CVE-2022-0305
Inappropriate implementation in Service Worker API in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who had compromised the renderer process to bypass site isolation via a crafted HTML page.
Modified: 2024-11-21
CVE-2022-0306
Heap buffer overflow in PDFium in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
- http://packetstormsecurity.com/files/166367/Chrome-chrome_pdf-PDFiumEngine-RequestThumbnail-Heap-Buffer-Overflow.html
- http://packetstormsecurity.com/files/166367/Chrome-chrome_pdf-PDFiumEngine-RequestThumbnail-Heap-Buffer-Overflow.html
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop_19.html
- https://chromereleases.googleblog.com/2022/01/stable-channel-update-for-desktop_19.html
- https://crbug.com/1283198
- https://crbug.com/1283198
Modified: 2024-11-21
CVE-2022-0307
Use after free in Optimization Guide in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.
Modified: 2024-11-21
CVE-2022-0308
Use after free in Data Transfer in Google Chrome on Chrome OS prior to 97.0.4692.99 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.
Modified: 2024-11-21
CVE-2022-0309
Inappropriate implementation in Autofill in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to bypass navigation restrictions via a crafted HTML page.
Modified: 2024-11-21
CVE-2022-0310
Heap buffer overflow in Task Manager in Google Chrome prior to 97.0.4692.99 allowed a remote attacker to potentially exploit heap corruption via specific user interactions.
Modified: 2024-11-21
CVE-2022-0311
Heap buffer overflow in Task Manager in Google Chrome prior to 97.0.4692.99 allowed a remote attacker who convinced a user to engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.
Package kernel-image-std-def updated to version 5.10.100-alt1 for branch p10 in task 295213.
Closed vulnerabilities
BDU:2022-00737
Уязвимость функции cgroup_release_agent_write (kernel/cgroup/cgroup-v1.c) ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии в системе или вызвать отказ в обслуживании
BDU:2022-02564
Уязвимость реализации сетевого протокола TIPC операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии
BDU:2022-03863
Уязвимость реализации функции copy_info_records_to_user() ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2022-0435
A stack overflow flaw was found in the Linux kernel's TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.
- https://bugzilla.redhat.com/show_bug.cgi?id=2048738
- https://bugzilla.redhat.com/show_bug.cgi?id=2048738
- https://security.netapp.com/advisory/ntap-20220602-0001/
- https://security.netapp.com/advisory/ntap-20220602-0001/
- https://www.openwall.com/lists/oss-security/2022/02/10/1
- https://www.openwall.com/lists/oss-security/2022/02/10/1
Modified: 2024-11-21
CVE-2022-0492
A vulnerability was found in the Linux kernel’s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.
- http://packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LSN-0085-1.html
- http://packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LSN-0085-1.html
- http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html
- http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html
- http://packetstormsecurity.com/files/176099/Docker-cgroups-Container-Escape.html
- http://packetstormsecurity.com/files/176099/Docker-cgroups-Container-Escape.html
- https://bugzilla.redhat.com/show_bug.cgi?id=2051505
- https://bugzilla.redhat.com/show_bug.cgi?id=2051505
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af
- [debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update
- [debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update
- [debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
- [debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
- https://security.netapp.com/advisory/ntap-20220419-0002/
- https://security.netapp.com/advisory/ntap-20220419-0002/
- DSA-5095
- DSA-5095
- DSA-5096
- DSA-5096
Modified: 2024-11-21
CVE-2022-1998
A use after free in the Linux kernel File System notify functionality was found in the way user triggers copy_info_records_to_user() call to fail in copy_event_to_user(). A local user could use this flaw to crash the system or potentially escalate their privileges on the system.
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/notify/fanotify/fanotify_user.c?h=v5.17&id=ee12595147ac1fbfb5bcb23837e26dd58d94b15d
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/notify/fanotify/fanotify_user.c?h=v5.17&id=ee12595147ac1fbfb5bcb23837e26dd58d94b15d
- https://seclists.org/oss-sec/2022/q1/99
- https://seclists.org/oss-sec/2022/q1/99
- https://security.netapp.com/advisory/ntap-20220707-0009/
- https://security.netapp.com/advisory/ntap-20220707-0009/
Modified: 2024-11-21
CVE-2022-2938
A flaw was found in the Linux kernel's implementation of Pressure Stall Information. While the feature is disabled by default, it could allow an attacker to crash the system or have other memory-corruption side effects.
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a06247c6804f1a7c86a2e5398a4c1f1db1471848
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a06247c6804f1a7c86a2e5398a4c1f1db1471848
- https://security.netapp.com/advisory/ntap-20221223-0002/
- https://security.netapp.com/advisory/ntap-20221223-0002/
Package kernel-image-un-def updated to version 5.15.23-alt1 for branch p10 in task 295209.
Closed vulnerabilities
BDU:2022-00515
Уязвимость ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии
BDU:2022-00737
Уязвимость функции cgroup_release_agent_write (kernel/cgroup/cgroup-v1.c) ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии в системе или вызвать отказ в обслуживании
BDU:2022-01472
Уязвимость функции legacy_parse_param ядра операционной системы Linux, связанная с целочисленным переполнением, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-02564
Уязвимость реализации сетевого протокола TIPC операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании или повысить свои привилегии
BDU:2022-03863
Уязвимость реализации функции copy_info_records_to_user() ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии или вызвать отказ в обслуживании
Modified: 2025-04-03
CVE-2022-0185
A heap-based buffer overflow flaw was found in the way the legacy_parse_param function in the Filesystem Context functionality of the Linux kernel verified the supplied parameters length. An unprivileged (in case of unprivileged user namespaces enabled, otherwise needs namespaced CAP_SYS_ADMIN privilege) local user able to open a filesystem that does not support the Filesystem Context API (and thus fallbacks to legacy handling) could use this flaw to escalate their privileges on the system.
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=722d94847de2
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=722d94847de2
- https://github.com/Crusaders-of-Rust/CVE-2022-0185
- https://github.com/Crusaders-of-Rust/CVE-2022-0185
- https://security.netapp.com/advisory/ntap-20220225-0003/
- https://security.netapp.com/advisory/ntap-20220225-0003/
- https://www.openwall.com/lists/oss-security/2022/01/18/7
- https://www.openwall.com/lists/oss-security/2022/01/18/7
- https://www.willsroot.io/2022/01/cve-2022-0185.html
- https://www.willsroot.io/2022/01/cve-2022-0185.html
Modified: 2024-11-21
CVE-2022-0435
A stack overflow flaw was found in the Linux kernel's TIPC protocol functionality in the way a user sends a packet with malicious content where the number of domain member nodes is higher than the 64 allowed. This flaw allows a remote user to crash the system or possibly escalate their privileges if they have access to the TIPC network.
- https://bugzilla.redhat.com/show_bug.cgi?id=2048738
- https://bugzilla.redhat.com/show_bug.cgi?id=2048738
- https://security.netapp.com/advisory/ntap-20220602-0001/
- https://security.netapp.com/advisory/ntap-20220602-0001/
- https://www.openwall.com/lists/oss-security/2022/02/10/1
- https://www.openwall.com/lists/oss-security/2022/02/10/1
Modified: 2024-11-21
CVE-2022-0492
A vulnerability was found in the Linux kernel’s cgroup_release_agent_write in the kernel/cgroup/cgroup-v1.c function. This flaw, under certain circumstances, allows the use of the cgroups v1 release_agent feature to escalate privileges and bypass the namespace isolation unexpectedly.
- http://packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LSN-0085-1.html
- http://packetstormsecurity.com/files/166444/Kernel-Live-Patch-Security-Notice-LSN-0085-1.html
- http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html
- http://packetstormsecurity.com/files/167386/Kernel-Live-Patch-Security-Notice-LSN-0086-1.html
- http://packetstormsecurity.com/files/176099/Docker-cgroups-Container-Escape.html
- http://packetstormsecurity.com/files/176099/Docker-cgroups-Container-Escape.html
- https://bugzilla.redhat.com/show_bug.cgi?id=2051505
- https://bugzilla.redhat.com/show_bug.cgi?id=2051505
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=24f6008564183aa120d07c03d9289519c2fe02af
- [debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update
- [debian-lts-announce] 20220309 [SECURITY] [DLA 2940-1] linux security update
- [debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
- [debian-lts-announce] 20220309 [SECURITY] [DLA 2941-1] linux-4.19 security update
- https://security.netapp.com/advisory/ntap-20220419-0002/
- https://security.netapp.com/advisory/ntap-20220419-0002/
- DSA-5095
- DSA-5095
- DSA-5096
- DSA-5096
Modified: 2024-11-21
CVE-2022-1998
A use after free in the Linux kernel File System notify functionality was found in the way user triggers copy_info_records_to_user() call to fail in copy_event_to_user(). A local user could use this flaw to crash the system or potentially escalate their privileges on the system.
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/notify/fanotify/fanotify_user.c?h=v5.17&id=ee12595147ac1fbfb5bcb23837e26dd58d94b15d
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/fs/notify/fanotify/fanotify_user.c?h=v5.17&id=ee12595147ac1fbfb5bcb23837e26dd58d94b15d
- https://seclists.org/oss-sec/2022/q1/99
- https://seclists.org/oss-sec/2022/q1/99
- https://security.netapp.com/advisory/ntap-20220707-0009/
- https://security.netapp.com/advisory/ntap-20220707-0009/
Modified: 2024-11-21
CVE-2022-24122
kernel/ucount.c in the Linux kernel 5.14 through 5.16.4, when unprivileged user namespaces are enabled, allows a use-after-free and privilege escalation because a ucounts object can outlive its namespace.
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f9d87929d451d3e649699d0f1d74f71f77ad38f5
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=f9d87929d451d3e649699d0f1d74f71f77ad38f5
- https://github.com/torvalds/linux/commit/f9d87929d451d3e649699d0f1d74f71f77ad38f5
- https://github.com/torvalds/linux/commit/f9d87929d451d3e649699d0f1d74f71f77ad38f5
- FEDORA-2022-57fd391bf8
- FEDORA-2022-57fd391bf8
- FEDORA-2022-667a5c6e26
- FEDORA-2022-667a5c6e26
- https://security.netapp.com/advisory/ntap-20220221-0001/
- https://security.netapp.com/advisory/ntap-20220221-0001/
- https://www.openwall.com/lists/oss-security/2022/01/29/1
- https://www.openwall.com/lists/oss-security/2022/01/29/1
Modified: 2024-11-21
CVE-2022-2938
A flaw was found in the Linux kernel's implementation of Pressure Stall Information. While the feature is disabled by default, it could allow an attacker to crash the system or have other memory-corruption side effects.
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a06247c6804f1a7c86a2e5398a4c1f1db1471848
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=a06247c6804f1a7c86a2e5398a4c1f1db1471848
- https://security.netapp.com/advisory/ntap-20221223-0002/
- https://security.netapp.com/advisory/ntap-20221223-0002/