ALT-BU-2023-5792-1
Branch p10 update bulletin.
Package LibreOffice-still updated to version 7.5.6.2-alt0.p10.1 for branch p10 in task 326098.
Closed vulnerabilities
BDU:2023-02967
Уязвимость модуля Spreadsheet пакета офисных программ LibreOffice, позволяющая нарушителю выполнить произвольный код
BDU:2023-02968
Уязвимость компонента Floating Frames пакета офисных программ LibreOffice, позволяющая нарушителю выполнить спуфинговую атаку
Modified: 2024-11-21
CVE-2023-0950
Improper Validation of Array Index vulnerability in the spreadsheet component of The Document Foundation LibreOffice allows an attacker to craft a spreadsheet document that will cause an array index underflow when loaded. In the affected versions of LibreOffice certain malformed spreadsheet formulas, such as AGGREGATE, could be created with less parameters passed to the formula interpreter than it expected, leading to an array index underflow, in which case there is a risk that arbitrary code could be executed. This issue affects: The Document Foundation LibreOffice 7.4 versions prior to 7.4.6; 7.5 versions prior to 7.5.1.
- [debian-lts-announce] 20230813 [SECURITY] [DLA 3526-1] libreoffice security update
- [debian-lts-announce] 20230813 [SECURITY] [DLA 3526-1] libreoffice security update
- GLSA-202311-15
- GLSA-202311-15
- DSA-5415
- DSA-5415
- https://www.libreoffice.org/about-us/security/advisories/CVE-2023-0950
- https://www.libreoffice.org/about-us/security/advisories/CVE-2023-0950
Modified: 2024-11-21
CVE-2023-1183
A flaw was found in the Libreoffice package. An attacker can craft an odb containing a "database/script" file with a SCRIPT command where the contents of the file could be written to a new file whose location was determined by the attacker.
- http://www.openwall.com/lists/oss-security/2023/12/28/4
- http://www.openwall.com/lists/oss-security/2023/12/28/4
- http://www.openwall.com/lists/oss-security/2024/01/03/4
- http://www.openwall.com/lists/oss-security/2024/01/03/4
- https://access.redhat.com/security/cve/CVE-2023-1183
- https://access.redhat.com/security/cve/CVE-2023-1183
- RHBZ#2208506
- RHBZ#2208506
- https://www.libreoffice.org/about-us/security/advisories/cve-2023-1183/
- https://www.libreoffice.org/about-us/security/advisories/cve-2023-1183/
Modified: 2024-11-21
CVE-2023-2255
Improper access control in editor components of The Document Foundation LibreOffice allowed an attacker to craft a document that would cause external links to be loaded without prompt. In the affected versions of LibreOffice documents that used "floating frames" linked to external files, would load the contents of those frames without prompting the user for permission to do so. This was inconsistent with the treatment of other linked content in LibreOffice. This issue affects: The Document Foundation LibreOffice 7.4 versions prior to 7.4.7; 7.5 versions prior to 7.5.3.
- [debian-lts-announce] 20230813 [SECURITY] [DLA 3526-1] libreoffice security update
- GLSA-202311-15
- DSA-5415
- https://www.libreoffice.org/about-us/security/advisories/CVE-2023-2255
- [debian-lts-announce] 20230813 [SECURITY] [DLA 3526-1] libreoffice security update
- https://www.libreoffice.org/about-us/security/advisories/CVE-2023-2255
- DSA-5415
- GLSA-202311-15
Closed bugs
Обновить стабильную версию LibreOffice-still
Closed bugs
Не раскрывается содержимое CONTENTS.cpio в RPM
Не работают регулярные выражения в mc.ext.ini, работающие в p10
отделить *.desktop и *.png в отдельный пакет
Package python3-module-lxml updated to version 4.9.3-alt1 for branch p10 in task 329617.
Closed vulnerabilities
BDU:2022-00756
Уязвимость реализации модуля Class Cleaner библиотеки для обработки разметки XML и HTML Lxml, позволяющая нарушителю осуществлять межсайтовые сценарные атаки
Modified: 2024-11-21
CVE-2021-43818
lxml is a library for processing XML and HTML in the Python language. Prior to version 4.6.5, the HTML Cleaner in lxml.html lets certain crafted script content pass through, as well as script content in SVG files embedded using data URIs. Users that employ the HTML cleaner in a security relevant context should upgrade to lxml 4.6.5 to receive a patch. There are no known workarounds available.
- https://github.com/lxml/lxml/commit/12fa9669007180a7bb87d990c375cf91ca5b664a
- https://github.com/lxml/lxml/commit/12fa9669007180a7bb87d990c375cf91ca5b664a
- https://github.com/lxml/lxml/commit/a3eacbc0dcf1de1c822ec29fb7d090a4b1712a9c#diff-59130575b4fb2932c957db2922977d7d89afb0b2085357db1a14615a2fcad776
- https://github.com/lxml/lxml/commit/a3eacbc0dcf1de1c822ec29fb7d090a4b1712a9c#diff-59130575b4fb2932c957db2922977d7d89afb0b2085357db1a14615a2fcad776
- https://github.com/lxml/lxml/commit/f2330237440df7e8f39c3ad1b1aa8852be3b27c0
- https://github.com/lxml/lxml/commit/f2330237440df7e8f39c3ad1b1aa8852be3b27c0
- https://github.com/lxml/lxml/security/advisories/GHSA-55x5-fj6c-h6m8
- https://github.com/lxml/lxml/security/advisories/GHSA-55x5-fj6c-h6m8
- [debian-lts-announce] 20211230 [SECURITY] [DLA 2871-1] lxml security update
- [debian-lts-announce] 20211230 [SECURITY] [DLA 2871-1] lxml security update
- FEDORA-2022-96c79bf003
- FEDORA-2022-96c79bf003
- FEDORA-2022-7129fbaeed
- FEDORA-2022-7129fbaeed
- FEDORA-2021-9f9e7c5c4f
- FEDORA-2021-9f9e7c5c4f
- FEDORA-2021-6e8fb79f90
- FEDORA-2021-6e8fb79f90
- GLSA-202208-06
- GLSA-202208-06
- https://security.netapp.com/advisory/ntap-20220107-0005/
- https://security.netapp.com/advisory/ntap-20220107-0005/
- DSA-5043
- DSA-5043
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
Modified: 2024-11-21
CVE-2022-2309
NULL Pointer Dereference allows attackers to cause a denial of service (or application crash). This only applies when lxml is used together with libxml2 2.9.10 through 2.9.14. libxml2 2.9.9 and earlier are not affected. It allows triggering crashes through forged input data, given a vulnerable code sequence in the application. The vulnerability is caused by the iterwalk function (also used by the canonicalize function). Such code shouldn't be in wide-spread use, given that parsing + iterwalk would usually be replaced with the more efficient iterparse function. However, an XML converter that serialises to C14N would also be vulnerable, for example, and there are legitimate use cases for this code sequence. If untrusted input is received (also remotely) and processed via iterwalk function, a crash can be triggered.
- https://github.com/lxml/lxml/commit/86368e9cf70a0ad23cccd5ee32de847149af0c6f
- https://github.com/lxml/lxml/commit/86368e9cf70a0ad23cccd5ee32de847149af0c6f
- https://huntr.dev/bounties/8264e74f-edda-4c40-9956-49de635105ba
- https://huntr.dev/bounties/8264e74f-edda-4c40-9956-49de635105ba
- FEDORA-2022-ed17f59c1d
- FEDORA-2022-ed17f59c1d
- FEDORA-2022-ed0eeb6a20
- FEDORA-2022-ed0eeb6a20
- GLSA-202208-06
- GLSA-202208-06
- https://security.netapp.com/advisory/ntap-20220915-0006/
- https://security.netapp.com/advisory/ntap-20220915-0006/
Closed vulnerabilities
Modified: 2025-02-13
CVE-2023-20897
Salt masters prior to 3005.2 or 3006.2 contain a DOS in minion return. After receiving several bad packets on the request server equal to the number of worker threads, the master will become unresponsive to return requests until restarted.
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OMWJIHQZXHK6FH2E3IWAZCYIRI7FLVOL/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OMWJIHQZXHK6FH2E3IWAZCYIRI7FLVOL/
- https://saltproject.io/security-announcements/2023-08-10-advisory/
- https://saltproject.io/security-announcements/2023-08-10-advisory/
Modified: 2025-02-13
CVE-2023-20898
Git Providers can read from the wrong environment because they get the same cache directory base name in Salt masters prior to 3005.2 or 3006.2. Anything that uses Git Providers with different environments can get garbage data or the wrong data, which can lead to wrongful data disclosure, wrongful executions, data corruption and/or crash.
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OMWJIHQZXHK6FH2E3IWAZCYIRI7FLVOL/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OMWJIHQZXHK6FH2E3IWAZCYIRI7FLVOL/
- https://saltproject.io/security-announcements/2023-08-10-advisory/
- https://saltproject.io/security-announcements/2023-08-10-advisory/