ALT-BU-2022-5349-1
Branch sisyphus update bulletin.
Package maven-shared-utils updated to version 3.3.4-alt1_2jpp11 for branch sisyphus in task 302881.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-29599
In Apache Maven maven-shared-utils prior to version 3.3.3, the Commandline class can emit double-quoted strings without proper escaping, allowing shell injection attacks.
- http://www.openwall.com/lists/oss-security/2022/05/23/3
- https://github.com/apache/maven-shared-utils/pull/40
- https://issues.apache.org/jira/browse/MSHARED-297
- https://lists.debian.org/debian-lts-announce/2022/08/msg00018.html
- https://www.debian.org/security/2022/dsa-5242
- http://www.openwall.com/lists/oss-security/2022/05/23/3
- https://github.com/apache/maven-shared-utils/pull/40
- https://issues.apache.org/jira/browse/MSHARED-297
- https://lists.debian.org/debian-lts-announce/2022/08/msg00018.html
- https://www.debian.org/security/2022/dsa-5242
Closed vulnerabilities
Modified: 2025-05-22
CVE-2021-3782
An internal reference count is held on the buffer pool, incremented every time a new buffer is created from the pool. The reference count is maintained as an int; on LP64 systems this can cause the reference count to overflow if the client creates a large number of wl_shm buffer objects, or if it can coerce the server to create a large number of external references to the buffer storage. With the reference count overflowing, a use-after-free can be constructed on the wl_shm_pool tracking structure, where values may be incremented or decremented; it may also be possible to construct a limited oracle to leak 4 bytes of server-side memory to the attacking client at a time.
Closed bugs
epm play mssql-server: patchelf: команда не найдена