ALT-BU-2022-5349-1
Branch sisyphus update bulletin.
Package maven-shared-utils updated to version 3.3.4-alt1_2jpp11 for branch sisyphus in task 302881.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-29599
In Apache Maven maven-shared-utils prior to version 3.3.3, the Commandline class can emit double-quoted strings without proper escaping, allowing shell injection attacks.
- [oss-security] 20220523 CVE-2022-29599: Apache Maven: Commandline class shell injection vulnerabilities
- [oss-security] 20220523 CVE-2022-29599: Apache Maven: Commandline class shell injection vulnerabilities
- https://github.com/apache/maven-shared-utils/pull/40
- https://github.com/apache/maven-shared-utils/pull/40
- https://issues.apache.org/jira/browse/MSHARED-297
- https://issues.apache.org/jira/browse/MSHARED-297
- [debian-lts-announce] 20220829 [SECURITY] [DLA 3086-1] maven-shared-utils security update
- [debian-lts-announce] 20220829 [SECURITY] [DLA 3086-1] maven-shared-utils security update
- DSA-5242
- DSA-5242
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-3782
An internal reference count is held on the buffer pool, incremented every time a new buffer is created from the pool. The reference count is maintained as an int; on LP64 systems this can cause the reference count to overflow if the client creates a large number of wl_shm buffer objects, or if it can coerce the server to create a large number of external references to the buffer storage. With the reference count overflowing, a use-after-free can be constructed on the wl_shm_pool tracking structure, where values may be incremented or decremented; it may also be possible to construct a limited oracle to leak 4 bytes of server-side memory to the attacking client at a time.
Closed bugs
epm play mssql-server: patchelf: команда не найдена