ALT-BU-2023-2247-1
Branch p10 update bulletin.
Closed vulnerabilities
BDU:2020-04085
Уязвимость программного обеспечения для СУБД SQLite, связанная с ошибками при обработке чисел, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-19603
SQLite 3.30.1 mishandles certain SELECT statements with a nonexistent VIEW, leading to an application crash.
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13
- https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E
- https://security.netapp.com/advisory/ntap-20191223-0001/
- https://usn.ubuntu.com/4394-1/
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.sqlite.org/
- https://cert-portal.siemens.com/productcert/pdf/ssa-389290.pdf
- https://github.com/sqlite/sqlite/commit/527cbd4a104cb93bf3994b3dd3619a6299a78b13
- https://lists.apache.org/thread.html/rc713534b10f9daeee2e0990239fa407e2118e4aa9e88a7041177497c%40%3Cissues.guacamole.apache.org%3E
- https://security.netapp.com/advisory/ntap-20191223-0001/
- https://usn.ubuntu.com/4394-1/
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.sqlite.org/
Modified: 2024-11-21
CVE-2021-41767
Apache Guacamole 1.3.0 and older may incorrectly include a private tunnel identifier in the non-private details of some REST responses. This may allow an authenticated user who already has permission to access a particular connection to read from or interact with another user's active use of that same connection.
Modified: 2024-11-21
CVE-2021-43999
Apache Guacamole 1.2.0 and 1.3.0 do not properly validate responses received from a SAML identity provider. If SAML support is enabled, this may allow a malicious user to assume the identity of another Guacamole user.
Package openuds-server updated to version 3.5.0-alt4 for branch p10 in task 308566.
Closed bugs
Подключение HTML5 RDP - не создается каталог для обмена файлами
Package openuds-tunnel updated to version 3.5.0-alt3 for branch p10 in task 308566.
Closed bugs
Подключение HTML5 RDP - не создается каталог для обмена файлами
Closed vulnerabilities
BDU:2021-02074
Уязвимость фунции exif_data_load_data_content (exif-data.c) операционной системы Android, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-0181
In exif_data_load_data_thumbnail of exif-data.c, there is a possible denial of service due to an integer overflow. This could lead to remote denial of service with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-145075076
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ELDZR6USD5PR34MRK2ZISLCYJ465FNKN/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVBD5JRUQPN4LQHTAAJHA3MR5M7YTAC7/
- https://security.gentoo.org/glsa/202011-19
- https://source.android.com/security/bulletin/pixel/2020-06-01
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ELDZR6USD5PR34MRK2ZISLCYJ465FNKN/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVBD5JRUQPN4LQHTAAJHA3MR5M7YTAC7/
- https://security.gentoo.org/glsa/202011-19
- https://source.android.com/security/bulletin/pixel/2020-06-01
Modified: 2024-11-21
CVE-2020-0198
In exif_data_load_data_content of exif-data.c, there is a possible UBSAN abort due to an integer overflow. This could lead to remote denial of service with no additional execution privileges needed. User interaction is needed for exploitation.Product: AndroidVersions: Android-10Android ID: A-146428941
- https://lists.debian.org/debian-lts-announce/2020/06/msg00020.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ELDZR6USD5PR34MRK2ZISLCYJ465FNKN/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVBD5JRUQPN4LQHTAAJHA3MR5M7YTAC7/
- https://security.gentoo.org/glsa/202011-19
- https://source.android.com/security/bulletin/pixel/2020-06-01
- https://usn.ubuntu.com/4396-1/
- https://lists.debian.org/debian-lts-announce/2020/06/msg00020.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ELDZR6USD5PR34MRK2ZISLCYJ465FNKN/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/SVBD5JRUQPN4LQHTAAJHA3MR5M7YTAC7/
- https://security.gentoo.org/glsa/202011-19
- https://source.android.com/security/bulletin/pixel/2020-06-01
- https://usn.ubuntu.com/4396-1/