ALT-BU-2022-6586-1
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2022-06629
Уязвимость пиринговых соединений (Peer Connection) браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2022-06630
Уязвимость пользовательских вкладок браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2022-06875
Уязвимость службы Safe Browsing браузеров Google Chrome и Microsoft Edge, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2022-3445
Use after free in Skia in Google Chrome prior to 106.0.5249.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Modified: 2024-11-21
CVE-2022-3446
Heap buffer overflow in WebSQL in Google Chrome prior to 106.0.5249.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Modified: 2024-11-21
CVE-2022-3447
Inappropriate implementation in Custom Tabs in Google Chrome on Android prior to 106.0.5249.119 allowed a remote attacker to spoof the contents of the Omnibox (URL bar) via a crafted HTML page. (Chromium security severity: High)
Modified: 2024-11-21
CVE-2022-3448
Use after free in Permissions API in Google Chrome prior to 106.0.5249.119 allowed a remote attacker who convinced a user to engage in specific UI gestures to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Modified: 2024-11-21
CVE-2022-3449
Use after free in Safe Browsing in Google Chrome prior to 106.0.5249.119 allowed an attacker who convinced a user to install a malicious extension to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: High)
Modified: 2024-11-21
CVE-2022-3450
Use after free in Peer Connection in Google Chrome prior to 106.0.5249.119 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Package LibreOffice-still updated to version 7.3.6.2-alt2 for branch sisyphus in task 307827.
Closed vulnerabilities
BDU:2022-06246
Уязвимость реализации схемы vnd.libreoffice.command пакета офисных программ LibreOffice, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2022-3140
LibreOffice supports Office URI Schemes to enable browser integration of LibreOffice with MS SharePoint server. An additional scheme 'vnd.libreoffice.command' specific to LibreOffice was added. In the affected versions of LibreOffice links using that scheme could be constructed to call internal macros with arbitrary arguments. Which when clicked on, or activated by document events, could result in arbitrary script execution without warning. This issue affects: The Document Foundation LibreOffice 7.4 versions prior to 7.4.1; 7.3 versions prior to 7.3.6.
- [debian-lts-announce] 20230326 [SECURITY] [DLA 3368-1] libreoffice security update
- [debian-lts-announce] 20230326 [SECURITY] [DLA 3368-1] libreoffice security update
- FEDORA-2022-775c747e4a
- FEDORA-2022-775c747e4a
- GLSA-202212-04
- GLSA-202212-04
- DSA-5252
- DSA-5252
- https://www.libreoffice.org/about-us/security/advisories/CVE-2022-3140
- https://www.libreoffice.org/about-us/security/advisories/CVE-2022-3140
Package installer-feature-xdg-user-dirs updated to version 0.1-alt2 for branch sisyphus in task 308364.
Closed bugs
лишняя зависимость
Closed vulnerabilities
BDU:2021-03922
Уязвимость программы проверки орфографии GNU Aspell, связанная с переполнением буфера в куче, позволяющая нарушителю выполнить произвольный код
BDU:2021-04022
Уязвимость программы проверки орфографии GNU Aspell, связанная с возможностью записи вне поля, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2019-25051
objstack in GNU Aspell 0.60.8 has a heap-based buffer overflow in acommon::ObjStack::dup_top (called from acommon::StringMap::add and acommon::Config::lookup_list).
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18462
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=18462
- https://github.com/gnuaspell/aspell/commit/0718b375425aad8e54e1150313b862e4c6fd324a
- https://github.com/gnuaspell/aspell/commit/0718b375425aad8e54e1150313b862e4c6fd324a
- https://github.com/google/oss-fuzz-vulns/blob/main/vulns/aspell/OSV-2020-521.yaml
- https://github.com/google/oss-fuzz-vulns/blob/main/vulns/aspell/OSV-2020-521.yaml
- [debian-lts-announce] 20210725 [SECURITY] [DLA 2720-1] aspell security update
- [debian-lts-announce] 20210725 [SECURITY] [DLA 2720-1] aspell security update
- FEDORA-2021-69de7c7ca4
- FEDORA-2021-69de7c7ca4
- DSA-4948
- DSA-4948
Package kernel-image-rpi-def updated to version 5.15.73-alt1 for branch sisyphus in task 308369.
Closed vulnerabilities
BDU:2022-07349
Уязвимость драйвера drivers/usb/mon/mon_bin.c ядра операционных систем Linux, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2022-2978
A flaw use after free in the Linux kernel NILFS file system was found in the way user triggers function security_inode_alloc to fail with following call to function nilfs_mdt_destroy. A local user could use this flaw to crash the system or potentially escalate their privileges on the system.
- [debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update
- [debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update
- https://lore.kernel.org/linux-fsdevel/20220816040859.659129-1-dzm91%40hust.edu.cn/T/#u
- https://lore.kernel.org/linux-fsdevel/20220816040859.659129-1-dzm91%40hust.edu.cn/T/#u
Modified: 2024-11-21
CVE-2022-43750
drivers/usb/mon/mon_bin.c in usbmon in the Linux kernel before 5.19.15 and 6.x before 6.0.1 allows a user-space client to corrupt the monitor's internal memory.
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.15
- https://cdn.kernel.org/pub/linux/kernel/v5.x/ChangeLog-5.19.15
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0.1
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.0.1
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a659daf63d16aa883be42f3f34ff84235c302198
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=a659daf63d16aa883be42f3f34ff84235c302198
- https://github.com/torvalds/linux/commit/a659daf63d16aa883be42f3f34ff84235c302198
- https://github.com/torvalds/linux/commit/a659daf63d16aa883be42f3f34ff84235c302198
- [debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update
- [debian-lts-announce] 20221101 [SECURITY] [DLA 3173-1] linux-5.10 security update
- [debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update
- [debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update
Package alterator-datetime updated to version 4.8.0-alt1 for branch sisyphus in task 308393.
Closed bugs
Change Timezone
Некорректное применение часового пояса
Для некоторых стран список часовых поясов не отсортирован
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-3491
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0742.
- https://github.com/vim/vim/commit/3558afe9e9e904cabb8475392d859f2d2fc21041
- https://github.com/vim/vim/commit/3558afe9e9e904cabb8475392d859f2d2fc21041
- https://huntr.dev/bounties/6e6e05c2-2cf7-4aa5-a817-a62007bf92cb
- https://huntr.dev/bounties/6e6e05c2-2cf7-4aa5-a817-a62007bf92cb
- GLSA-202305-16
- GLSA-202305-16
Closed bugs
vim Игнорирует ~/.vimrc