ALT-BU-2022-5350-1
Branch sisyphus update bulletin.
Package google-gson updated to version 2.9.0-alt1_1jpp11 for branch sisyphus in task 303046.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-25647
The package com.google.code.gson:gson before 2.8.9 are vulnerable to Deserialization of Untrusted Data via the writeReplace() method in internal classes, which may lead to DoS attacks.
- https://github.com/google/gson/pull/1991
- https://github.com/google/gson/pull/1991
- https://github.com/google/gson/pull/1991/commits
- https://github.com/google/gson/pull/1991/commits
- [debian-lts-announce] 20220513 [SECURITY] [DLA 3001-1] libgoogle-gson-java security update
- [debian-lts-announce] 20220513 [SECURITY] [DLA 3001-1] libgoogle-gson-java security update
- [debian-lts-announce] 20220907 [SECURITY] [DLA 3100-1] libgoogle-gson-java security update
- [debian-lts-announce] 20220907 [SECURITY] [DLA 3100-1] libgoogle-gson-java security update
- https://security.netapp.com/advisory/ntap-20220901-0009/
- https://security.netapp.com/advisory/ntap-20220901-0009/
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLECODEGSON-1730327
- https://snyk.io/vuln/SNYK-JAVA-COMGOOGLECODEGSON-1730327
- DSA-5227
- DSA-5227
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
Closed vulnerabilities
BDU:2021-06115
Уязвимость сервера приложений Apache Tomcat, связанная с утечкой памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06690
Уязвимость сервера приложений Apache Tomcat, связанная с ошибками синхронизации при использовании общего ресурса, позволяющая нарушителю повысить свои привилегии
Modified: 2024-11-21
CVE-2021-42340
The fix for bug 63362 present in Apache Tomcat 10.1.0-M1 to 10.1.0-M5, 10.0.0-M1 to 10.0.11, 9.0.40 to 9.0.53 and 8.5.60 to 8.5.71 introduced a memory leak. The object introduced to collect metrics for HTTP upgrade connections was not released for WebSocket connections once the connection was closed. This created a memory leak that, over time, could lead to a denial of service via an OutOfMemoryError.
- https://kc.mcafee.com/corporate/index?page=content&id=SB10379
- https://kc.mcafee.com/corporate/index?page=content&id=SB10379
- [myfaces-commits] 20211021 [myfaces-tobago] branch tobago-5.x updated: build: workaround for CVE-2021-42340
- [myfaces-commits] 20211021 [myfaces-tobago] branch tobago-5.x updated: build: workaround for CVE-2021-42340
- https://lists.apache.org/thread.html/r83a35be60f06aca2065f188ee542b9099695d57ced2e70e0885f905c%40%3Cannounce.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/r83a35be60f06aca2065f188ee542b9099695d57ced2e70e0885f905c%40%3Cannounce.tomcat.apache.org%3E
- GLSA-202208-34
- GLSA-202208-34
- https://security.netapp.com/advisory/ntap-20211104-0001/
- https://security.netapp.com/advisory/ntap-20211104-0001/
- DSA-5009
- DSA-5009
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
Modified: 2024-11-21
CVE-2022-23181
The fix for bug CVE-2020-9484 introduced a time of check, time of use vulnerability into Apache Tomcat 10.1.0-M1 to 10.1.0-M8, 10.0.0-M5 to 10.0.14, 9.0.35 to 9.0.56 and 8.5.55 to 8.5.73 that allowed a local attacker to perform actions with the privileges of the user that the Tomcat process is using. This issue is only exploitable when Tomcat is configured to persist sessions using the FileStore.
- https://lists.apache.org/thread/l8x62p3k19yfcb208jo4zrb83k5mfwg9
- https://lists.apache.org/thread/l8x62p3k19yfcb208jo4zrb83k5mfwg9
- [debian-lts-announce] 20221026 [SECURITY] [DLA 3160-1] tomcat9 security update
- [debian-lts-announce] 20221026 [SECURITY] [DLA 3160-1] tomcat9 security update
- https://security.netapp.com/advisory/ntap-20220217-0010/
- https://security.netapp.com/advisory/ntap-20220217-0010/
- DSA-5265
- DSA-5265
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html