ALT-BU-2022-5027-1
Branch sisyphus_e2k update bulletin.
Package glpi updated to version 10.0.0-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-24867
GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. When you pass the config to the javascript, some entries are filtered out. The variable ldap_pass is not filtered and when you look at the source code of the rendered page, we can see the password for the root dn. Users are advised to upgrade. There is no known workaround for this issue.
- https://github.com/glpi-project/glpi/commit/26f0a20810db11641afdcf671bac7a309acbb94e
- https://github.com/glpi-project/glpi/commit/26f0a20810db11641afdcf671bac7a309acbb94e
- https://github.com/glpi-project/glpi/security/advisories/GHSA-4r49-52q9-5fgr
- https://github.com/glpi-project/glpi/security/advisories/GHSA-4r49-52q9-5fgr
Modified: 2024-11-21
CVE-2022-24868
GLPI is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In versions prior to 10.0.0 one can exploit a lack of sanitization on SVG file uploads and inject javascript into their user avatar. As a result any user viewing the avatar will be subject to a cross site scripting attack. Users of GLPI are advised to upgrade. Users unable to upgrade should disallow SVG avatars.
- https://github.com/glpi-project/glpi/commit/1aa9fcc4741a46fa5a9f11d71b409b911ffc190f
- https://github.com/glpi-project/glpi/commit/1aa9fcc4741a46fa5a9f11d71b409b911ffc190f
- https://github.com/glpi-project/glpi/security/advisories/GHSA-9hg4-fpwv-gx78
- https://github.com/glpi-project/glpi/security/advisories/GHSA-9hg4-fpwv-gx78
Package sysvinit updated to version 3.00-alt2 for branch sisyphus_e2k.
Closed bugs
[PATCH] временная ссылка /run/initctl -> /dev/initctl
Package clamav updated to version 0.103.6-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2022-02931
Уязвимость библиотеки сканирования пакета антивирусных программ ClamAV и средства защиты от вредоносного программного обеспечения Cisco AMP для конечных устройств, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02932
Уязвимость библиотеки сканирования пакета антивирусных программ ClamAV и средства защиты от вредоносного программного обеспечения Cisco AMP для конечных устройств, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02933
Уязвимость библиотеки сканирования пакета антивирусных программ ClamAV и средства защиты от вредоносного программного обеспечения Cisco AMP для конечных устройств, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02934
Уязвимость библиотеки сканирования пакета антивирусных программ ClamAV и средства защиты от вредоносного программного обеспечения Cisco AMP для конечных устройств, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-03420
Уязвимость пакета антивирусных программ ClamAV, связанная с переполнением буфера в куче, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2022-20770
On April 20, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed: A vulnerability in CHM file parser of Clam AntiVirus (ClamAV) versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. For a description of this vulnerability, see the ClamAV blog. This advisory will be updated as additional information becomes available.
- [debian-lts-announce] 20220603 [SECURITY] [DLA 3042-1] clamav security update
- [debian-lts-announce] 20220603 [SECURITY] [DLA 3042-1] clamav security update
- FEDORA-2022-b8691af27b
- FEDORA-2022-b8691af27b
- FEDORA-2022-a910a41a17
- FEDORA-2022-a910a41a17
- FEDORA-2022-0ac71a8f3a
- FEDORA-2022-0ac71a8f3a
- GLSA-202310-01
- GLSA-202310-01
- 20220504 ClamAV CHM File Parsing Denial of Service Vulnerability Affecting Cisco Products: April 2022
- 20220504 ClamAV CHM File Parsing Denial of Service Vulnerability Affecting Cisco Products: April 2022
Modified: 2024-11-21
CVE-2022-20771
On April 20, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed: A vulnerability in the TIFF file parser of Clam AntiVirus (ClamAV) versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. For a description of this vulnerability, see the ClamAV blog. This advisory will be updated as additional information becomes available.
- [debian-lts-announce] 20220603 [SECURITY] [DLA 3042-1] clamav security update
- [debian-lts-announce] 20220603 [SECURITY] [DLA 3042-1] clamav security update
- FEDORA-2022-b8691af27b
- FEDORA-2022-b8691af27b
- FEDORA-2022-a910a41a17
- FEDORA-2022-a910a41a17
- FEDORA-2022-0ac71a8f3a
- FEDORA-2022-0ac71a8f3a
- GLSA-202310-01
- GLSA-202310-01
- 20220504 ClamAV TIFF File Parsing Denial of Service Vulnerability Affecting Cisco Products: April 2022
- 20220504 ClamAV TIFF File Parsing Denial of Service Vulnerability Affecting Cisco Products: April 2022
Modified: 2024-11-21
CVE-2022-20785
On April 20, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed: A vulnerability in HTML file parser of Clam AntiVirus (ClamAV) versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. For a description of this vulnerability, see the ClamAV blog. This advisory will be updated as additional information becomes available.
- [debian-lts-announce] 20220603 [SECURITY] [DLA 3042-1] clamav security update
- [debian-lts-announce] 20220603 [SECURITY] [DLA 3042-1] clamav security update
- FEDORA-2022-b8691af27b
- FEDORA-2022-b8691af27b
- FEDORA-2022-a910a41a17
- FEDORA-2022-a910a41a17
- FEDORA-2022-0ac71a8f3a
- FEDORA-2022-0ac71a8f3a
- GLSA-202310-01
- GLSA-202310-01
- 20220504 ClamAV HTML Scanning Memory Leak Vulnerability Affecting Cisco Products: April 2022
- 20220504 ClamAV HTML Scanning Memory Leak Vulnerability Affecting Cisco Products: April 2022
Modified: 2024-11-21
CVE-2022-20792
A vulnerability in the regex module used by the signature database load module of Clam AntiVirus (ClamAV) versions 0.104.0 through 0.104.2 and LTS version 0.103.5 and prior versions could allow an authenticated, local attacker to crash ClamAV at database load time, and possibly gain code execution. The vulnerability is due to improper bounds checking that may result in a multi-byte heap buffer overwflow write. An attacker could exploit this vulnerability by placing a crafted CDB ClamAV signature database file in the ClamAV database directory. An exploit could allow the attacker to run code as the clamav user.
Modified: 2024-11-21
CVE-2022-20796
On May 4, 2022, the following vulnerability in the ClamAV scanning library versions 0.103.5 and earlier and 0.104.2 and earlier was disclosed: A vulnerability in Clam AntiVirus (ClamAV) versions 0.103.4, 0.103.5, 0.104.1, and 0.104.2 could allow an authenticated, local attacker to cause a denial of service condition on an affected device. For a description of this vulnerability, see the ClamAV blog.
- [debian-lts-announce] 20220603 [SECURITY] [DLA 3042-1] clamav security update
- [debian-lts-announce] 20220603 [SECURITY] [DLA 3042-1] clamav security update
- FEDORA-2022-b8691af27b
- FEDORA-2022-b8691af27b
- FEDORA-2022-a910a41a17
- FEDORA-2022-a910a41a17
- FEDORA-2022-0ac71a8f3a
- FEDORA-2022-0ac71a8f3a
- GLSA-202310-01
- GLSA-202310-01
- 20220504 ClamAV Truncated File Denial of Service Vulnerability Affecting Cisco Products: April 2022
- 20220504 ClamAV Truncated File Denial of Service Vulnerability Affecting Cisco Products: April 2022