ALT-BU-2022-5712-1
Branch sisyphus_mipsel update bulletin.
Package mariadb updated to version 10.6.8-alt1 for branch sisyphus_mipsel.
Closed vulnerabilities
BDU:2022-00903
Уязвимость системы управления базами данных MariaDB, связана с переполнением буфера в стеке, позволяющая нарушителю выполнить произвольный код
BDU:2022-01074
Уязвимость компонента SELECT_LEX::nest_level системы управления базами данных MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-01315
Уязвимость функции BN_mod_sqrt() библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-01832
Уязвимость компонента InnoDB системы управления базами данных MariaDB и MySQL, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-01851
Уязвимость компонента InnoDB системы управления базами данных MariaDB и MySQL, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02593
Уязвимость компонента decimal_bin_size системы управления базами данных MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02594
Уязвимость компонента sql/sql_class.cc системы управления базами данных MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02595
Уязвимость компонента Used_tables_and_const_cache::used_tables_and_const_cache_join системы управления базами данных MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-03726
Уязвимость компонента sql/sql_window.cc системы управления базами данных MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-03789
Уязвимость функции xbstream_open системы управления базами данных MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-03790
Уязвимость метода log_statement_ex (plugin/server_audit/server_audit.c) системы управления базами данных MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-03791
Уязвимость метода create_worker_threads системы управления базами данных MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-03792
Уязвимость метода create_worker_threads системы управления базами данных MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-04064
Уязвимость функции Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort системы управления базами данных MariaDB, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность защищаемой информации
BDU:2022-04068
Уязвимость функции Item_args::walk_args системы управления базами данных MariaDB, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность защищаемой информации
BDU:2022-04076
Уязвимость функции Item_func_in::cleanup/Item::cleanup_processor системы управления базами данных MariaDB, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность защищаемой информации
BDU:2022-04080
Уязвимость функции Item_subselect::init_expr_cache_tracker системы управления базами данных MariaDB, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность защищаемой информации
BDU:2022-04087
Уязвимость функции Item_field::fix_outer_field системы управления базами данных MariaDB, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность защищаемой информации
BDU:2022-05677
Уязвимость компонента InnoDB СУБД MariaDB, позволяющая нарушителю нарушить целостность данных, а также вызвать отказ в обслуживании
BDU:2022-05691
Уязвимость компонента sql_lex.cc СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05704
Уязвимость СУБД MariaDB, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05710
Уязвимость компонента ha_maria::extra СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05712
Уязвимость компонента sql_parse.cc СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05752
Уязвимость компонента set_var.cc СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05755
Уязвимость компонентов find_field_in_tables и find_order_in_list СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05757
Уязвимость СУБД MariaDB, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06420
Уязвимость компонента C API системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06894
Уязвимость СУБД MariaDB, связанная с использованием памяти после её освобождения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06904
Уязвимость компонента my_strcasecmp_8bit СУБД MariaDB, связанная с использованием памяти после её освобождения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06906
Уязвимость компонента Item_subselect::init_expr_cache_tracker СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06907
Уязвимость компонента sql/item_cmpfunc.cc СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06909
Уязвимость функции Binary_string::free_buffer() компонента /sql/sql_string.h СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06910
Уязвимость функции Binary_string::free_buffer() компонента /sql/sql_string.h СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06913
Уязвимость компонента /row/row0mysql.cc СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06914
Уязвимость функции VDec::VDec компонента /sql/sql_type.cc СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06915
Уязвимость компонента Create_tmp_table::finalize СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06916
Уязвимость компонента Field::set_default СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06919
Уязвимость компонента sql/item_func.cc СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06922
Уязвимость компонента Item_args::walk_arg СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06923
Уязвимость компонента Arg_comparator::compare_real_fixed СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06924
Уязвимость компонента my_decimal::operator СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06927
Уязвимость компонента Item_func_in::cleanup() СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-2372
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.34 and prior and 8.0.25 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
- FEDORA-2021-acef1dc8cf
- FEDORA-2021-acef1dc8cf
- FEDORA-2021-dc4299a8d0
- FEDORA-2021-dc4299a8d0
- FEDORA-2021-df40c41094
- FEDORA-2021-df40c41094
- FEDORA-2021-72d5918529
- FEDORA-2021-72d5918529
- https://security.netapp.com/advisory/ntap-20210723-0001/
- https://security.netapp.com/advisory/ntap-20210723-0001/
- https://www.oracle.com/security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpujul2021.html
Modified: 2024-11-21
CVE-2021-2389
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.34 and prior and 8.0.25 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
- FEDORA-2021-acef1dc8cf
- FEDORA-2021-acef1dc8cf
- FEDORA-2021-72d5918529
- FEDORA-2021-72d5918529
- https://security.netapp.com/advisory/ntap-20210723-0001/
- https://security.netapp.com/advisory/ntap-20210723-0001/
- https://www.oracle.com/security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpujul2021.html
- https://www.zerodayinitiative.com/advisories/ZDI-21-880/
- https://www.zerodayinitiative.com/advisories/ZDI-21-880/
Modified: 2024-11-21
CVE-2021-35604
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.35 and prior and 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
- FEDORA-2021-acef1dc8cf
- FEDORA-2021-acef1dc8cf
- FEDORA-2021-70dd0b9f5d
- FEDORA-2021-70dd0b9f5d
- FEDORA-2021-f74148c6d4
- FEDORA-2021-f74148c6d4
- FEDORA-2021-72d5918529
- FEDORA-2021-72d5918529
- FEDORA-2021-46dc82116b
- FEDORA-2021-46dc82116b
- https://security.netapp.com/advisory/ntap-20211022-0003/
- https://security.netapp.com/advisory/ntap-20211022-0003/
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
Modified: 2024-11-21
CVE-2021-46658
save_window_function_values in MariaDB before 10.6.3 allows an application crash because of incorrect handling of with_window_func=true for a subquery.
Modified: 2024-11-21
CVE-2021-46659
MariaDB before 10.7.2 allows an application crash because it does not recognize that SELECT_LEX::nest_level is local to each VIEW.
- https://jira.mariadb.org/browse/MDEV-25631
- https://jira.mariadb.org/browse/MDEV-25631
- FEDORA-2022-03350936ee
- FEDORA-2022-03350936ee
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-263f7cc483
- FEDORA-2022-263f7cc483
- https://mariadb.com/kb/en/security/
- https://mariadb.com/kb/en/security/
- https://security.netapp.com/advisory/ntap-20220311-0003/
- https://security.netapp.com/advisory/ntap-20220311-0003/
Modified: 2024-11-21
CVE-2021-46661
MariaDB through 10.5.9 allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE).
- https://jira.mariadb.org/browse/MDEV-25766
- https://jira.mariadb.org/browse/MDEV-25766
- FEDORA-2022-03350936ee
- FEDORA-2022-03350936ee
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-263f7cc483
- FEDORA-2022-263f7cc483
- https://mariadb.com/kb/en/security/
- https://mariadb.com/kb/en/security/
- https://security.netapp.com/advisory/ntap-20220221-0002/
- https://security.netapp.com/advisory/ntap-20220221-0002/
Modified: 2024-11-21
CVE-2021-46662
MariaDB through 10.5.9 allows a set_var.cc application crash via certain uses of an UPDATE statement in conjunction with a nested subquery.
Modified: 2024-11-21
CVE-2021-46663
MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements.
- https://jira.mariadb.org/browse/MDEV-26351
- https://jira.mariadb.org/browse/MDEV-26351
- FEDORA-2022-03350936ee
- FEDORA-2022-03350936ee
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-263f7cc483
- FEDORA-2022-263f7cc483
- https://mariadb.com/kb/en/security/
- https://mariadb.com/kb/en/security/
- https://security.netapp.com/advisory/ntap-20220221-0002/
- https://security.netapp.com/advisory/ntap-20220221-0002/
Modified: 2024-11-21
CVE-2021-46664
MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr.
- https://jira.mariadb.org/browse/MDEV-25761
- https://jira.mariadb.org/browse/MDEV-25761
- FEDORA-2022-03350936ee
- FEDORA-2022-03350936ee
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-263f7cc483
- FEDORA-2022-263f7cc483
- https://mariadb.com/kb/en/security/
- https://mariadb.com/kb/en/security/
- https://security.netapp.com/advisory/ntap-20220221-0002/
- https://security.netapp.com/advisory/ntap-20220221-0002/
Modified: 2024-11-21
CVE-2021-46665
MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations.
- https://jira.mariadb.org/browse/MDEV-25636
- https://jira.mariadb.org/browse/MDEV-25636
- FEDORA-2022-03350936ee
- FEDORA-2022-03350936ee
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-263f7cc483
- FEDORA-2022-263f7cc483
- https://mariadb.com/kb/en/security/
- https://mariadb.com/kb/en/security/
- https://security.netapp.com/advisory/ntap-20220221-0002/
- https://security.netapp.com/advisory/ntap-20220221-0002/
Modified: 2024-11-21
CVE-2021-46667
MariaDB before 10.6.5 has a sql_lex.cc integer overflow, leading to an application crash.
- https://jira.mariadb.org/browse/MDEV-26350
- https://jira.mariadb.org/browse/MDEV-26350
- FEDORA-2022-03350936ee
- FEDORA-2022-03350936ee
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-263f7cc483
- FEDORA-2022-263f7cc483
- https://mariadb.com/kb/en/security/
- https://mariadb.com/kb/en/security/
- https://security.netapp.com/advisory/ntap-20220221-0002/
- https://security.netapp.com/advisory/ntap-20220221-0002/
Modified: 2024-11-21
CVE-2021-46668
MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT statements that improperly interact with storage-engine resource limitations for temporary data structures.
- https://jira.mariadb.org/browse/MDEV-25787
- https://jira.mariadb.org/browse/MDEV-25787
- FEDORA-2022-03350936ee
- FEDORA-2022-03350936ee
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-263f7cc483
- FEDORA-2022-263f7cc483
- https://mariadb.com/kb/en/security/
- https://mariadb.com/kb/en/security/
- https://security.netapp.com/advisory/ntap-20220221-0002/
- https://security.netapp.com/advisory/ntap-20220221-0002/
Modified: 2024-11-21
CVE-2021-46669
MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used.
- https://jira.mariadb.org/browse/MDEV-25638
- https://jira.mariadb.org/browse/MDEV-25638
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- FEDORA-2022-25dcba7104
- FEDORA-2022-25dcba7104
- FEDORA-2022-e6dc7ed871
- FEDORA-2022-e6dc7ed871
- https://mariadb.com/kb/en/security/
- https://mariadb.com/kb/en/security/
- https://security.netapp.com/advisory/ntap-20220221-0002/
- https://security.netapp.com/advisory/ntap-20220221-0002/
Modified: 2024-11-21
CVE-2022-0778
The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).
- http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html
- http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html
- 20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina
- 20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- 20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4
- 20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4
- https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246
- [debian-lts-announce] 20220317 [SECURITY] [DLA 2952-1] openssl security update
- [debian-lts-announce] 20220317 [SECURITY] [DLA 2952-1] openssl security update
- [debian-lts-announce] 20220317 [SECURITY] [DLA 2953-1] openssl1.0 security update
- [debian-lts-announce] 20220317 [SECURITY] [DLA 2953-1] openssl1.0 security update
- FEDORA-2022-9e88b5d8d7
- FEDORA-2022-9e88b5d8d7
- FEDORA-2022-a5f51502f0
- FEDORA-2022-a5f51502f0
- FEDORA-2022-8bb51f6901
- FEDORA-2022-8bb51f6901
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
- GLSA-202210-02
- GLSA-202210-02
- https://security.netapp.com/advisory/ntap-20220321-0002/
- https://security.netapp.com/advisory/ntap-20220321-0002/
- https://security.netapp.com/advisory/ntap-20220429-0005/
- https://security.netapp.com/advisory/ntap-20220429-0005/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://support.apple.com/kb/HT213255
- https://support.apple.com/kb/HT213255
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213257
- https://support.apple.com/kb/HT213257
- DSA-5103
- DSA-5103
- https://www.openssl.org/news/secadv/20220315.txt
- https://www.openssl.org/news/secadv/20220315.txt
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.tenable.com/security/tns-2022-06
- https://www.tenable.com/security/tns-2022-06
- https://www.tenable.com/security/tns-2022-07
- https://www.tenable.com/security/tns-2022-07
- https://www.tenable.com/security/tns-2022-08
- https://www.tenable.com/security/tns-2022-08
- https://www.tenable.com/security/tns-2022-09
- https://www.tenable.com/security/tns-2022-09
Modified: 2024-11-21
CVE-2022-21595
Vulnerability in the MySQL Server product of Oracle MySQL (component: C API). Supported versions that are affected are 5.7.36 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
Modified: 2024-11-21
CVE-2022-24048
MariaDB CONNECT Storage Engine Stack-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16191.
- FEDORA-2022-03350936ee
- FEDORA-2022-03350936ee
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-263f7cc483
- FEDORA-2022-263f7cc483
- https://mariadb.com/kb/en/security/
- https://mariadb.com/kb/en/security/
- https://security.netapp.com/advisory/ntap-20220318-0004/
- https://security.netapp.com/advisory/ntap-20220318-0004/
- https://www.zerodayinitiative.com/advisories/ZDI-22-363/
- https://www.zerodayinitiative.com/advisories/ZDI-22-363/
Modified: 2024-11-21
CVE-2022-24050
MariaDB CONNECT Storage Engine Use-After-Free Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16207.
- FEDORA-2022-03350936ee
- FEDORA-2022-03350936ee
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-263f7cc483
- FEDORA-2022-263f7cc483
- https://mariadb.com/kb/en/security/
- https://mariadb.com/kb/en/security/
- https://security.netapp.com/advisory/ntap-20220318-0004/
- https://security.netapp.com/advisory/ntap-20220318-0004/
- https://www.zerodayinitiative.com/advisories/ZDI-22-364/
- https://www.zerodayinitiative.com/advisories/ZDI-22-364/
Modified: 2024-11-21
CVE-2022-24051
MariaDB CONNECT Storage Engine Format String Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of a user-supplied string before using it as a format specifier. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16193.
- FEDORA-2022-03350936ee
- FEDORA-2022-03350936ee
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-263f7cc483
- FEDORA-2022-263f7cc483
- https://mariadb.com/kb/en/security/
- https://mariadb.com/kb/en/security/
- https://security.netapp.com/advisory/ntap-20220318-0004/
- https://security.netapp.com/advisory/ntap-20220318-0004/
- https://www.zerodayinitiative.com/advisories/ZDI-22-318/
- https://www.zerodayinitiative.com/advisories/ZDI-22-318/
Modified: 2024-11-21
CVE-2022-24052
MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.
- FEDORA-2022-03350936ee
- FEDORA-2022-03350936ee
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-263f7cc483
- FEDORA-2022-263f7cc483
- https://mariadb.com/kb/en/security/
- https://mariadb.com/kb/en/security/
- https://security.netapp.com/advisory/ntap-20220318-0004/
- https://security.netapp.com/advisory/ntap-20220318-0004/
- https://www.zerodayinitiative.com/advisories/ZDI-22-367/
- https://www.zerodayinitiative.com/advisories/ZDI-22-367/
Modified: 2024-11-21
CVE-2022-27376
MariaDB Server v10.6.5 and below was discovered to contain an use-after-free in the component Item_args::walk_arg, which is exploited via specially crafted SQL statements.
- https://jira.mariadb.org/browse/MDEV-26354
- https://jira.mariadb.org/browse/MDEV-26354
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220519-0007/
- https://security.netapp.com/advisory/ntap-20220519-0007/
Modified: 2024-11-21
CVE-2022-27377
MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component Item_func_in::cleanup(), which is exploited via specially crafted SQL statements.
- https://jira.mariadb.org/browse/MDEV-26281
- https://jira.mariadb.org/browse/MDEV-26281
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220526-0007/
- https://security.netapp.com/advisory/ntap-20220526-0007/
Modified: 2024-11-21
CVE-2022-27378
An issue in the component Create_tmp_table::finalize of MariaDB Server v10.7 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.
- https://jira.mariadb.org/browse/MDEV-26423
- https://jira.mariadb.org/browse/MDEV-26423
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220526-0004/
- https://security.netapp.com/advisory/ntap-20220526-0004/
Modified: 2024-11-21
CVE-2022-27379
An issue in the component Arg_comparator::compare_real_fixed of MariaDB Server v10.6.2 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.
- https://jira.mariadb.org/browse/MDEV-26353
- https://jira.mariadb.org/browse/MDEV-26353
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220526-0005/
- https://security.netapp.com/advisory/ntap-20220526-0005/
Modified: 2024-11-21
CVE-2022-27380
An issue in the component my_decimal::operator= of MariaDB Server v10.6.3 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.
- https://jira.mariadb.org/browse/MDEV-26280
- https://jira.mariadb.org/browse/MDEV-26280
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220526-0007/
- https://security.netapp.com/advisory/ntap-20220526-0007/
Modified: 2024-11-21
CVE-2022-27381
An issue in the component Field::set_default of MariaDB Server v10.6 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.
- https://jira.mariadb.org/browse/MDEV-26061
- https://jira.mariadb.org/browse/MDEV-26061
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220519-0006/
- https://security.netapp.com/advisory/ntap-20220519-0006/
Modified: 2024-11-21
CVE-2022-27382
MariaDB Server v10.7 and below was discovered to contain a segmentation fault via the component Item_field::used_tables/update_depend_map_for_order.
Modified: 2024-11-21
CVE-2022-27383
MariaDB Server v10.6 and below was discovered to contain an use-after-free in the component my_strcasecmp_8bit, which is exploited via specially crafted SQL statements.
- https://jira.mariadb.org/browse/MDEV-26323
- https://jira.mariadb.org/browse/MDEV-26323
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220519-0006/
- https://security.netapp.com/advisory/ntap-20220519-0006/
Modified: 2024-11-21
CVE-2022-27384
An issue in the component Item_subselect::init_expr_cache_tracker of MariaDB Server v10.6 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.
- https://jira.mariadb.org/browse/MDEV-26047
- https://jira.mariadb.org/browse/MDEV-26047
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220519-0006/
- https://security.netapp.com/advisory/ntap-20220519-0006/
Modified: 2024-11-21
CVE-2022-27385
An issue in the component Used_tables_and_const_cache::used_tables_and_const_cache_join of MariaDB Server v10.7 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.
Modified: 2024-11-21
CVE-2022-27386
MariaDB Server v10.7 and below was discovered to contain a segmentation fault via the component sql/sql_class.cc.
- https://jira.mariadb.org/browse/MDEV-26406
- https://jira.mariadb.org/browse/MDEV-26406
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220526-0004/
- https://security.netapp.com/advisory/ntap-20220526-0004/
Modified: 2024-11-21
CVE-2022-27387
MariaDB Server v10.7 and below was discovered to contain a global buffer overflow in the component decimal_bin_size, which is exploited via specially crafted SQL statements.
- https://jira.mariadb.org/browse/MDEV-26422
- https://jira.mariadb.org/browse/MDEV-26422
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220526-0004/
- https://security.netapp.com/advisory/ntap-20220526-0004/
Modified: 2024-11-21
CVE-2022-27444
MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_subselect.cc.
Modified: 2024-11-21
CVE-2022-27445
MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/sql_window.cc.
- https://jira.mariadb.org/browse/MDEV-28081
- https://jira.mariadb.org/browse/MDEV-28081
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220526-0006/
- https://security.netapp.com/advisory/ntap-20220526-0006/
Modified: 2024-11-21
CVE-2022-27446
MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_cmpfunc.h.
Modified: 2024-11-21
CVE-2022-27447
MariaDB Server v10.9 and below was discovered to contain a use-after-free via the component Binary_string::free_buffer() at /sql/sql_string.h.
- https://jira.mariadb.org/browse/MDEV-28099
- https://jira.mariadb.org/browse/MDEV-28099
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220526-0006/
- https://security.netapp.com/advisory/ntap-20220526-0006/
Modified: 2024-11-21
CVE-2022-27448
There is an Assertion failure in MariaDB Server v10.9 and below via 'node->pcur->rel_pos == BTR_PCUR_ON' at /row/row0mysql.cc.
- https://jira.mariadb.org/browse/MDEV-28095
- https://jira.mariadb.org/browse/MDEV-28095
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220526-0006/
- https://security.netapp.com/advisory/ntap-20220526-0006/
Modified: 2024-11-21
CVE-2022-27449
MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_func.cc:148.
- https://jira.mariadb.org/browse/MDEV-28089
- https://jira.mariadb.org/browse/MDEV-28089
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220526-0006/
- https://security.netapp.com/advisory/ntap-20220526-0006/
Modified: 2024-11-21
CVE-2022-27451
MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/field_conv.cc.
Modified: 2024-11-21
CVE-2022-27452
MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_cmpfunc.cc.
- https://jira.mariadb.org/browse/MDEV-28090
- https://jira.mariadb.org/browse/MDEV-28090
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220526-0006/
- https://security.netapp.com/advisory/ntap-20220526-0006/
Modified: 2024-11-21
CVE-2022-27455
MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component my_wildcmp_8bit_impl at /strings/ctype-simple.c.
Modified: 2024-11-21
CVE-2022-27456
MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component VDec::VDec at /sql/sql_type.cc.
- https://jira.mariadb.org/browse/MDEV-28093
- https://jira.mariadb.org/browse/MDEV-28093
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220526-0007/
- https://security.netapp.com/advisory/ntap-20220526-0007/
Modified: 2024-11-21
CVE-2022-27457
MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component my_mb_wc_latin1 at /strings/ctype-latin1.c.
Modified: 2024-05-02
CVE-2022-27458
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-27447. Reason: This candidate is a reservation duplicate of CVE-2022-27447. Notes: All CVE users should reference CVE-2022-27447 instead of this candidate.
Modified: 2024-11-21
CVE-2022-31621
MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_xbstream.cc, when an error occurs (stream_ctxt->dest_file == NULL) while executing the method xbstream_open, the held lock is not released correctly, which allows local users to trigger a denial of service due to the deadlock. Note: The vendor argues this is just an improper locking bug and not a vulnerability with adverse effects.
- https://github.com/MariaDB/server/commit/b1351c15946349f9daa7e5297fb2ac6f3139e4a8
- https://github.com/MariaDB/server/commit/b1351c15946349f9daa7e5297fb2ac6f3139e4a8
- https://jira.mariadb.org/browse/MDEV-26561
- https://jira.mariadb.org/browse/MDEV-26561
- https://jira.mariadb.org/browse/MDEV-26574
- https://jira.mariadb.org/browse/MDEV-26574
- https://jira.mariadb.org/browse/MDEV-26574?filter=-2
- https://jira.mariadb.org/browse/MDEV-26574?filter=-2
- https://security.netapp.com/advisory/ntap-20220707-0006/
- https://security.netapp.com/advisory/ntap-20220707-0006/
Modified: 2024-11-21
CVE-2022-31622
MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_compress.cc, when an error occurs (pthread_create returns a nonzero value) while executing the method create_worker_threads, the held lock is not released correctly, which allows local users to trigger a denial of service due to the deadlock. Note: The vendor argues this is just an improper locking bug and not a vulnerability with adverse effects.
- https://github.com/MariaDB/server/commit/e1eb39a446c30b8459c39fd7f2ee1c55a36e97d2
- https://github.com/MariaDB/server/commit/e1eb39a446c30b8459c39fd7f2ee1c55a36e97d2
- https://jira.mariadb.org/browse/MDEV-26561
- https://jira.mariadb.org/browse/MDEV-26561
- https://jira.mariadb.org/browse/MDEV-26561?filter=-2
- https://jira.mariadb.org/browse/MDEV-26561?filter=-2
- https://jira.mariadb.org/browse/MDEV-26574
- https://jira.mariadb.org/browse/MDEV-26574
- https://security.netapp.com/advisory/ntap-20220707-0006/
- https://security.netapp.com/advisory/ntap-20220707-0006/
Modified: 2024-11-21
CVE-2022-31623
MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_compress.cc, when an error occurs (i.e., going to the err label) while executing the method create_worker_threads, the held lock thd->ctrl_mutex is not released correctly, which allows local users to trigger a denial of service due to the deadlock. Note: The vendor argues this is just an improper locking bug and not a vulnerability with adverse effects.
- https://github.com/MariaDB/server/commit/7c30bc38a588b22b01f11130cfe99e7f36accf94
- https://github.com/MariaDB/server/commit/7c30bc38a588b22b01f11130cfe99e7f36accf94
- https://github.com/MariaDB/server/pull/1938
- https://github.com/MariaDB/server/pull/1938
- https://jira.mariadb.org/browse/MDEV-26561
- https://jira.mariadb.org/browse/MDEV-26561
- https://jira.mariadb.org/browse/MDEV-26574
- https://jira.mariadb.org/browse/MDEV-26574
- https://security.netapp.com/advisory/ntap-20220707-0006/
- https://security.netapp.com/advisory/ntap-20220707-0006/
Modified: 2024-11-21
CVE-2022-31624
MariaDB Server before 10.7 is vulnerable to Denial of Service. While executing the plugin/server_audit/server_audit.c method log_statement_ex, the held lock lock_bigbuffer is not released correctly, which allows local users to trigger a denial of service due to the deadlock.
- https://github.com/MariaDB/server/commit/d627d00b13ab2f2c0954ea7b77202470cb102944
- https://github.com/MariaDB/server/commit/d627d00b13ab2f2c0954ea7b77202470cb102944
- https://jira.mariadb.org/browse/MDEV-26556?filter=-2
- https://jira.mariadb.org/browse/MDEV-26556?filter=-2
- https://security.netapp.com/advisory/ntap-20220707-0006/
- https://security.netapp.com/advisory/ntap-20220707-0006/
Modified: 2024-11-21
CVE-2022-32083
MariaDB v10.2 to v10.6.1 was discovered to contain a segmentation fault via the component Item_subselect::init_expr_cache_tracker.
- https://jira.mariadb.org/browse/MDEV-26047
- https://jira.mariadb.org/browse/MDEV-26047
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220826-0006/
- https://security.netapp.com/advisory/ntap-20220826-0006/
Modified: 2024-11-21
CVE-2022-32085
MariaDB v10.2 to v10.7 was discovered to contain a segmentation fault via the component Item_func_in::cleanup/Item::cleanup_processor.
- https://jira.mariadb.org/browse/MDEV-26407
- https://jira.mariadb.org/browse/MDEV-26407
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220818-0005/
- https://security.netapp.com/advisory/ntap-20220818-0005/
Modified: 2024-11-21
CVE-2022-32086
MariaDB v10.4 to v10.8 was discovered to contain a segmentation fault via the component Item_field::fix_outer_field.
Modified: 2024-11-21
CVE-2022-32087
MariaDB v10.2 to v10.7 was discovered to contain a segmentation fault via the component Item_args::walk_args.
- https://jira.mariadb.org/browse/MDEV-26437
- https://jira.mariadb.org/browse/MDEV-26437
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220818-0005/
- https://security.netapp.com/advisory/ntap-20220818-0005/
Modified: 2024-11-21
CVE-2022-32088
MariaDB v10.2 to v10.7 was discovered to contain a segmentation fault via the component Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort.
- https://jira.mariadb.org/browse/MDEV-26419
- https://jira.mariadb.org/browse/MDEV-26419
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220818-0005/
- https://security.netapp.com/advisory/ntap-20220818-0005/
Closed bugs
mysql.lib: CopyLibs: invalid or missing DESTDIR specified
без пакета mariadb-pam пакет mariadb-server нерабочий
Зависит от libmariadb-devel
Package zlib updated to version 1.2.12-alt3 for branch sisyphus_mipsel.
Closed vulnerabilities
BDU:2022-05325
Уязвимость компонента inflate.c библиотеки zlib, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2022-37434
zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).
- 20221030 APPLE-SA-2022-10-27-1 iOS 15.7.1 and iPadOS 15.7.1
- 20221030 APPLE-SA-2022-10-27-2 Additional information for APPLE-SA-2022-10-24-1 iOS 16.1 and iPadOS 16
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-6 Additional information for APPLE-SA-2022-10-24-3 macOS Monterey 12.6.1
- [oss-security] 20220805 zlib buffer overflow
- [oss-security] 20220808 Re: zlib buffer overflow
- https://github.com/curl/curl/issues/9271
- https://github.com/ivd38/zlib_overflow
- https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#L1062-L1063
- https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1
- https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#L762-L764
- [debian-lts-announce] 20220912 [SECURITY] [DLA 3103-1] zlib security update
- FEDORA-2022-b8232d1cca
- FEDORA-2022-15da0cf165
- FEDORA-2022-0b517a5397
- FEDORA-2022-3c28ae0cd8
- FEDORA-2022-25e4dbedf9
- https://security.netapp.com/advisory/ntap-20220901-0005/
- https://security.netapp.com/advisory/ntap-20230427-0007/
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213489
- https://support.apple.com/kb/HT213490
- https://support.apple.com/kb/HT213491
- https://support.apple.com/kb/HT213493
- https://support.apple.com/kb/HT213494
- DSA-5218
- 20221030 APPLE-SA-2022-10-27-1 iOS 15.7.1 and iPadOS 15.7.1
- DSA-5218
- https://support.apple.com/kb/HT213494
- https://support.apple.com/kb/HT213493
- https://support.apple.com/kb/HT213491
- https://support.apple.com/kb/HT213490
- https://support.apple.com/kb/HT213489
- https://support.apple.com/kb/HT213488
- https://security.netapp.com/advisory/ntap-20230427-0007/
- https://security.netapp.com/advisory/ntap-20220901-0005/
- FEDORA-2022-25e4dbedf9
- FEDORA-2022-3c28ae0cd8
- FEDORA-2022-0b517a5397
- FEDORA-2022-15da0cf165
- FEDORA-2022-b8232d1cca
- [debian-lts-announce] 20220912 [SECURITY] [DLA 3103-1] zlib security update
- https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#L762-L764
- https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1
- https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#L1062-L1063
- https://github.com/ivd38/zlib_overflow
- https://github.com/curl/curl/issues/9271
- [oss-security] 20220808 Re: zlib buffer overflow
- [oss-security] 20220805 zlib buffer overflow
- 20221030 APPLE-SA-2022-10-27-6 Additional information for APPLE-SA-2022-10-24-3 macOS Monterey 12.6.1
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-2 Additional information for APPLE-SA-2022-10-24-1 iOS 16.1 and iPadOS 16
Package rsync updated to version 3.2.5-alt0.2 for branch sisyphus_mipsel.
Closed vulnerabilities
BDU:2022-05325
Уязвимость компонента inflate.c библиотеки zlib, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2022-37434
zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).
- 20221030 APPLE-SA-2022-10-27-1 iOS 15.7.1 and iPadOS 15.7.1
- 20221030 APPLE-SA-2022-10-27-2 Additional information for APPLE-SA-2022-10-24-1 iOS 16.1 and iPadOS 16
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-6 Additional information for APPLE-SA-2022-10-24-3 macOS Monterey 12.6.1
- [oss-security] 20220805 zlib buffer overflow
- [oss-security] 20220808 Re: zlib buffer overflow
- https://github.com/curl/curl/issues/9271
- https://github.com/ivd38/zlib_overflow
- https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#L1062-L1063
- https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1
- https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#L762-L764
- [debian-lts-announce] 20220912 [SECURITY] [DLA 3103-1] zlib security update
- FEDORA-2022-b8232d1cca
- FEDORA-2022-15da0cf165
- FEDORA-2022-0b517a5397
- FEDORA-2022-3c28ae0cd8
- FEDORA-2022-25e4dbedf9
- https://security.netapp.com/advisory/ntap-20220901-0005/
- https://security.netapp.com/advisory/ntap-20230427-0007/
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213489
- https://support.apple.com/kb/HT213490
- https://support.apple.com/kb/HT213491
- https://support.apple.com/kb/HT213493
- https://support.apple.com/kb/HT213494
- DSA-5218
- 20221030 APPLE-SA-2022-10-27-1 iOS 15.7.1 and iPadOS 15.7.1
- DSA-5218
- https://support.apple.com/kb/HT213494
- https://support.apple.com/kb/HT213493
- https://support.apple.com/kb/HT213491
- https://support.apple.com/kb/HT213490
- https://support.apple.com/kb/HT213489
- https://support.apple.com/kb/HT213488
- https://security.netapp.com/advisory/ntap-20230427-0007/
- https://security.netapp.com/advisory/ntap-20220901-0005/
- FEDORA-2022-25e4dbedf9
- FEDORA-2022-3c28ae0cd8
- FEDORA-2022-0b517a5397
- FEDORA-2022-15da0cf165
- FEDORA-2022-b8232d1cca
- [debian-lts-announce] 20220912 [SECURITY] [DLA 3103-1] zlib security update
- https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#L762-L764
- https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1
- https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#L1062-L1063
- https://github.com/ivd38/zlib_overflow
- https://github.com/curl/curl/issues/9271
- [oss-security] 20220808 Re: zlib buffer overflow
- [oss-security] 20220805 zlib buffer overflow
- 20221030 APPLE-SA-2022-10-27-6 Additional information for APPLE-SA-2022-10-24-3 macOS Monterey 12.6.1
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-2 Additional information for APPLE-SA-2022-10-24-1 iOS 16.1 and iPadOS 16
Package license-list-xml updated to version 3.17-alt2 for branch sisyphus_mipsel.
Closed bugs
Добавить лицензию Яндекс браузера
Package libteam updated to version 1.31-alt2.g69a7494 for branch sisyphus_mipsel.
Closed bugs
teamd@.service безполезен
Не работает NetworkManager + teamd
teamd 100% CPU usage