ALT-BU-2022-6603-1
Branch sisyphus update bulletin.
Package dotnet-bootstrap-3.1 updated to version 3.1.26-alt1 for branch sisyphus in task 304822.
Closed vulnerabilities
Modified: 2025-07-31
BDU:2022-05512
Уязвимость средства разработки программного обеспечения Microsoft Visual Studio и программной платформы Microsoft.NET Framework, связанная c некорректной зачисткой или освобождением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-07-31
BDU:2022-05513
Уязвимость средства разработки программного обеспечения Microsoft Visual Studio и программной платформы Microsoft.NET Framework, связанная c некорректной зачисткой или освобождением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-07-31
BDU:2022-05514
Уязвимость средства разработки программного обеспечения Microsoft Visual Studio и программной платформы Microsoft.NET Framework, связанная c некорректной зачисткой или освобождением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-01-02
CVE-2022-23267
.NET and Visual Studio Denial of Service Vulnerability
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23267
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNXQL7EZORGU4PZCPJ5EPQ4P7IEY3ZZO/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IBYSBUDJYQ76HK4TULXVIIPCKK2U6WDB/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W5FPEQ6BTYRGTS6IYCDTZW6YF5HLQ3BY/
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23267
Modified: 2025-01-02
CVE-2022-29117
.NET and Visual Studio Denial of Service Vulnerability
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29117
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNXQL7EZORGU4PZCPJ5EPQ4P7IEY3ZZO/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IBYSBUDJYQ76HK4TULXVIIPCKK2U6WDB/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W5FPEQ6BTYRGTS6IYCDTZW6YF5HLQ3BY/
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29117
Modified: 2025-01-02
CVE-2022-29145
.NET and Visual Studio Denial of Service Vulnerability
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29145
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNXQL7EZORGU4PZCPJ5EPQ4P7IEY3ZZO/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IBYSBUDJYQ76HK4TULXVIIPCKK2U6WDB/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W5FPEQ6BTYRGTS6IYCDTZW6YF5HLQ3BY/
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29145
Modified: 2025-02-28
CVE-2022-30184
.NET and Visual Studio Information Disclosure Vulnerability
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30184
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DMP34G53EA2DBTBLFOAQCDZRRENE2EA2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWNH4AC3LFVX35MDRX5OBZDGD2AMH66K/
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30184
Package dotnet-coreclr-3.1 updated to version 3.1.26-alt1 for branch sisyphus in task 304822.
Closed vulnerabilities
Modified: 2025-07-31
BDU:2022-05512
Уязвимость средства разработки программного обеспечения Microsoft Visual Studio и программной платформы Microsoft.NET Framework, связанная c некорректной зачисткой или освобождением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-07-31
BDU:2022-05513
Уязвимость средства разработки программного обеспечения Microsoft Visual Studio и программной платформы Microsoft.NET Framework, связанная c некорректной зачисткой или освобождением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-07-31
BDU:2022-05514
Уязвимость средства разработки программного обеспечения Microsoft Visual Studio и программной платформы Microsoft.NET Framework, связанная c некорректной зачисткой или освобождением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-01-02
CVE-2022-23267
.NET and Visual Studio Denial of Service Vulnerability
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-23267
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNXQL7EZORGU4PZCPJ5EPQ4P7IEY3ZZO/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IBYSBUDJYQ76HK4TULXVIIPCKK2U6WDB/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W5FPEQ6BTYRGTS6IYCDTZW6YF5HLQ3BY/
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-23267
Modified: 2025-01-02
CVE-2022-29117
.NET and Visual Studio Denial of Service Vulnerability
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29117
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNXQL7EZORGU4PZCPJ5EPQ4P7IEY3ZZO/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IBYSBUDJYQ76HK4TULXVIIPCKK2U6WDB/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W5FPEQ6BTYRGTS6IYCDTZW6YF5HLQ3BY/
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29117
Modified: 2025-01-02
CVE-2022-29145
.NET and Visual Studio Denial of Service Vulnerability
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-29145
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GNXQL7EZORGU4PZCPJ5EPQ4P7IEY3ZZO/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/IBYSBUDJYQ76HK4TULXVIIPCKK2U6WDB/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W5FPEQ6BTYRGTS6IYCDTZW6YF5HLQ3BY/
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-29145
Modified: 2025-02-28
CVE-2022-30184
.NET and Visual Studio Information Disclosure Vulnerability
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2022-30184
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/DMP34G53EA2DBTBLFOAQCDZRRENE2EA2/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XWNH4AC3LFVX35MDRX5OBZDGD2AMH66K/
- https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2022-30184
Closed vulnerabilities
Modified: 2024-09-30
BDU:2020-04085
Уязвимость программного обеспечения для СУБД SQLite, связанная с ошибками при обработке чисел, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-19603
SQLite 3.30.1 mishandles certain SELECT statements with a nonexistent VIEW, leading to an application crash.
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13
- https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E
- https://security.netapp.com/advisory/ntap-20191223-0001/
- https://usn.ubuntu.com/4394-1/
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.sqlite.org/
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13
- https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E
- https://security.netapp.com/advisory/ntap-20191223-0001/
- https://usn.ubuntu.com/4394-1/
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.sqlite.org/
Modified: 2024-11-21
CVE-2021-41767
Apache Guacamole 1.3.0 and older may incorrectly include a private tunnel identifier in the non-private details of some REST responses. This may allow an authenticated user who already has permission to access a particular connection to read from or interact with another user's active use of that same connection.
Modified: 2024-11-21
CVE-2021-43999
Apache Guacamole 1.2.0 and 1.3.0 do not properly validate responses received from a SAML identity provider. If SAML support is enabled, this may allow a malicious user to assume the identity of another Guacamole user.