ALT-BU-2022-5906-1
Branch p10_e2k update bulletin.
Package perl-App-cpanminus updated to version 1.9019-alt1 for branch p10_e2k.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-16154
The App::cpanminus package 1.7044 for Perl allows Signature Verification Bypass.
Closed vulnerabilities
BDU:2021-04641
Уязвимость функции call() компонента src/parser.c анализатора потока управления для исходных файлов C Cflow, связанная с использованием памяти после её освобождения, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-16165
GNU cflow through 1.6 has a use-after-free in the reference function in parser.c.
Modified: 2024-11-21
CVE-2019-16166
GNU cflow through 1.6 has a heap-based buffer over-read in the nexttoken function in parser.c.
Modified: 2024-11-21
CVE-2020-23856
Use-after-Free vulnerability in cflow 1.6 in the void call(char *name, int line) function at src/parser.c, which could cause a denial of service via the pointer variable caller->callee.
- https://github.com/yangjiageng/PoC/blob/master/PoC_cflow_uaf_parser_line1284
- https://github.com/yangjiageng/PoC/blob/master/PoC_cflow_uaf_parser_line1284
- FEDORA-2021-6ef76430d0
- FEDORA-2021-6ef76430d0
- FEDORA-2021-e8cab459ab
- FEDORA-2021-e8cab459ab
- https://lists.gnu.org/archive/html/bug-cflow/2020-07/msg00000.html
- https://lists.gnu.org/archive/html/bug-cflow/2020-07/msg00000.html
Package krb5-ticket-watcher updated to version 1.0.3-alt21 for branch p10_e2k.
Closed bugs
Segmentation fault krb5-ticket-watcher 1.0.3
Closed vulnerabilities
BDU:2021-03928
Уязвимость утилиты приема и пересылки почты fetchmail, связанная с некорректной инициализацией ресурса, позволяющая нарушителю получить доступ к конфиденциальной информации
Modified: 2024-11-21
CVE-2021-36386
report_vbuild in report.c in Fetchmail before 6.4.20 sometimes omits initialization of the vsnprintf va_list argument, which might allow mail servers to cause a denial of service or possibly have unspecified other impact via long error messages. NOTE: it is unclear whether use of Fetchmail on any realistic platform results in an impact beyond an inconvenience to the client user.
- http://www.openwall.com/lists/oss-security/2021/07/28/5
- http://www.openwall.com/lists/oss-security/2021/07/28/5
- [oss-security] 20210809 fetchmail 6.4.21 released/regression fix for 6.4.20's security fix, and UPDATE: fetchmail <= 6.4.19 security announcement 2021-01 (CVE-2021-36386)
- [oss-security] 20210809 fetchmail 6.4.21 released/regression fix for 6.4.20's security fix, and UPDATE: fetchmail <= 6.4.19 security announcement 2021-01 (CVE-2021-36386)
- FEDORA-2021-b904d99ce5
- FEDORA-2021-b904d99ce5
- FEDORA-2021-47893f53ed
- FEDORA-2021-47893f53ed
- GLSA-202209-14
- GLSA-202209-14
- https://www.fetchmail.info/fetchmail-SA-2021-01.txt
- https://www.fetchmail.info/fetchmail-SA-2021-01.txt
- https://www.fetchmail.info/security.html
- https://www.fetchmail.info/security.html
Modified: 2024-11-21
CVE-2021-39272
Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH.
- http://www.openwall.com/lists/oss-security/2021/08/27/3
- http://www.openwall.com/lists/oss-security/2021/08/27/3
- FEDORA-2021-ddefbdbb46
- FEDORA-2021-ddefbdbb46
- FEDORA-2021-e61a978fef
- FEDORA-2021-e61a978fef
- FEDORA-2021-9998719311
- FEDORA-2021-9998719311
- https://nostarttls.secvuln.info/
- https://nostarttls.secvuln.info/
- GLSA-202209-14
- GLSA-202209-14
- https://www.fetchmail.info/security.html
- https://www.fetchmail.info/security.html
Closed vulnerabilities
BDU:2021-01897
Уязвимость функции p11_rpc_buffer_get_byte_array_value библиотеки для работы с модулями PKCS P11-kit, связанная с записью за границами буфера, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03158
Уязвимость в распределении массивов библиотеки для работы с модулями PKCS P11-kit, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03634
Уязвимость функции p11_rpc_buffer_get_byte_array библиотеки для работы с модулями PKCS P11-kit, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к конфиденциальным данным
Modified: 2024-11-21
CVE-2020-29361
An issue was discovered in p11-kit 0.21.1 through 0.23.21. Multiple integer overflows have been discovered in the array allocations in the p11-kit library and the p11-kit list command, where overflow checks are missing before calling realloc or calloc.
- https://github.com/p11-glue/p11-kit/releases
- https://github.com/p11-glue/p11-kit/releases
- https://github.com/p11-glue/p11-kit/security/advisories/GHSA-q4r3-hm6m-mvc2
- https://github.com/p11-glue/p11-kit/security/advisories/GHSA-q4r3-hm6m-mvc2
- [bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [debian-lts-announce] 20210104 [SECURITY] [DLA 2513-1] p11-kit security update
- [debian-lts-announce] 20210104 [SECURITY] [DLA 2513-1] p11-kit security update
- DSA-4822
- DSA-4822
Modified: 2024-11-21
CVE-2020-29362
An issue was discovered in p11-kit 0.21.1 through 0.23.21. A heap-based buffer over-read has been discovered in the RPC protocol used by thep11-kit server/remote commands and the client library. When the remote entity supplies a byte array through a serialized PKCS#11 function call, the receiving entity may allow the reading of up to 4 bytes of memory past the heap allocation.
- https://github.com/p11-glue/p11-kit/releases
- https://github.com/p11-glue/p11-kit/releases
- https://github.com/p11-glue/p11-kit/security/advisories/GHSA-5wpq-43j2-6qwc
- https://github.com/p11-glue/p11-kit/security/advisories/GHSA-5wpq-43j2-6qwc
- [debian-lts-announce] 20210104 [SECURITY] [DLA 2513-1] p11-kit security update
- [debian-lts-announce] 20210104 [SECURITY] [DLA 2513-1] p11-kit security update
- DSA-4822
- DSA-4822
Modified: 2024-11-21
CVE-2020-29363
An issue was discovered in p11-kit 0.23.6 through 0.23.21. A heap-based buffer overflow has been discovered in the RPC protocol used by p11-kit server/remote commands and the client library. When the remote entity supplies a serialized byte array in a CK_ATTRIBUTE, the receiving entity may not allocate sufficient length for the buffer to store the deserialized value.
- https://github.com/p11-glue/p11-kit/releases
- https://github.com/p11-glue/p11-kit/releases
- https://github.com/p11-glue/p11-kit/security/advisories/GHSA-5j67-fw89-fp6x
- https://github.com/p11-glue/p11-kit/security/advisories/GHSA-5j67-fw89-fp6x
- DSA-4822
- DSA-4822
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
Closed vulnerabilities
BDU:2020-03979
Уязвимость веб-сервера Coturn, связанная с разыменованием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-03980
Уязвимость веб-сервера Coturn, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2020-03981
Уязвимость буфера ответа STUN/TURN веб-сервера Coturn, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2021-01906
Уязвимость веб-сервера Coturn, связанная с некорректной проверкой вводимых данных, позволяющая нарушителю получить доступ к конфиденциальным данным и нарушить их целостность
Modified: 2024-11-21
CVE-2020-26262
Coturn is free open source implementation of TURN and STUN Server. Coturn before version 4.5.2 by default does not allow peers to connect and relay packets to loopback addresses in the range of `127.x.x.x`. However, it was observed that when sending a `CONNECT` request with the `XOR-PEER-ADDRESS` value of `0.0.0.0`, a successful response was received and subsequently, `CONNECTIONBIND` also received a successful response. Coturn then is able to relay packets to the loopback interface. Additionally, when coturn is listening on IPv6, which is default, the loopback interface can also be reached by making use of either `[::1]` or `[::]` as the peer address. By using the address `0.0.0.0` as the peer address, a malicious user will be able to relay packets to the loopback interface, unless `--denied-peer-ip=0.0.0.0` (or similar) has been specified. Since the default configuration implies that loopback peers are not allowed, coturn administrators may choose to not set the `denied-peer-ip` setting. The issue patched in version 4.5.2. As a workaround the addresses in the address block `0.0.0.0/8`, `[::1]` and `[::]` should be denied by default unless `--allow-loopback-peers` has been specified.
- https://github.com/coturn/coturn/blob/57180ab60afcaeb13537e69ae8cb8aefd8f3f546/ChangeLog#L48
- https://github.com/coturn/coturn/blob/57180ab60afcaeb13537e69ae8cb8aefd8f3f546/ChangeLog#L48
- https://github.com/coturn/coturn/commit/abfe1fd08d78baa0947d17dac0f7411c3d948e4d
- https://github.com/coturn/coturn/commit/abfe1fd08d78baa0947d17dac0f7411c3d948e4d
- https://github.com/coturn/coturn/security/advisories/GHSA-6g6j-r9rf-cm7p
- https://github.com/coturn/coturn/security/advisories/GHSA-6g6j-r9rf-cm7p
- FEDORA-2021-dee141fc61
- FEDORA-2021-dee141fc61
- FEDORA-2021-32d0068851
- FEDORA-2021-32d0068851
Modified: 2024-11-21
CVE-2020-4067
In coturn before version 4.5.1.3, there is an issue whereby STUN/TURN response buffer is not initialized properly. There is a leak of information between different client connections. One client (an attacker) could use their connection to intelligently query coturn to get interesting bytes in the padding bytes from the connection of another client. This has been fixed in 4.5.1.3.
- openSUSE-SU-2020:0937
- openSUSE-SU-2020:0937
- https://github.com/coturn/coturn/blob/aab60340b201d55c007bcdc853230f47aa2dfdf1/ChangeLog#L15
- https://github.com/coturn/coturn/blob/aab60340b201d55c007bcdc853230f47aa2dfdf1/ChangeLog#L15
- https://github.com/coturn/coturn/issues/583
- https://github.com/coturn/coturn/issues/583
- https://github.com/coturn/coturn/security/advisories/GHSA-c8r8-8vp5-6gcm
- https://github.com/coturn/coturn/security/advisories/GHSA-c8r8-8vp5-6gcm
- [debian-lts-announce] 20200701 [SECURITY] [DLA 2271-1] coturn security update
- [debian-lts-announce] 20200701 [SECURITY] [DLA 2271-1] coturn security update
- FEDORA-2020-d946f64eea
- FEDORA-2020-d946f64eea
- FEDORA-2020-9eadf517de
- FEDORA-2020-9eadf517de
- USN-4415-1
- USN-4415-1
- DSA-4711
- DSA-4711
Modified: 2024-11-21
CVE-2020-6061
An exploitable heap out-of-bounds read vulnerability exists in the way CoTURN 4.5.1.1 web server parses POST requests. A specially crafted HTTP POST request can lead to information leaks and other misbehavior. An attacker needs to send an HTTPS request to trigger this vulnerability.
- FEDORA-2020-f3fcb1608a
- FEDORA-2020-f3fcb1608a
- FEDORA-2020-6efa0fc869
- FEDORA-2020-6efa0fc869
- FEDORA-2020-305c173af8
- FEDORA-2020-305c173af8
- https://talosintelligence.com/vulnerability_reports/TALOS-2020-0984
- https://talosintelligence.com/vulnerability_reports/TALOS-2020-0984
- USN-4415-1
- USN-4415-1
- DSA-4711
- DSA-4711
Modified: 2024-11-21
CVE-2020-6062
An exploitable denial-of-service vulnerability exists in the way CoTURN 4.5.1.1 web server parses POST requests. A specially crafted HTTP POST request can lead to server crash and denial of service. An attacker needs to send an HTTP request to trigger this vulnerability.
- FEDORA-2020-f3fcb1608a
- FEDORA-2020-f3fcb1608a
- FEDORA-2020-6efa0fc869
- FEDORA-2020-6efa0fc869
- FEDORA-2020-305c173af8
- FEDORA-2020-305c173af8
- https://talosintelligence.com/vulnerability_reports/TALOS-2020-0985
- https://talosintelligence.com/vulnerability_reports/TALOS-2020-0985
- USN-4415-1
- USN-4415-1
- DSA-4711
- DSA-4711
Closed vulnerabilities
BDU:2022-02071
Уязвимость функции find_color_or_error пакета программ для создания, редактирования и оптимизации GIF-файлов Gifsicle, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-19752
The find_color_or_error function in gifsicle 1.92 contains a NULL pointer dereference.
Closed vulnerabilities
BDU:2021-05087
Уязвимость операционных систем iPadOS, watchOS, iOS, Mac OS, вызванная целочисленным переполнением, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2021-27548
There is a Null Pointer Dereference vulnerability in the XFAScanner::scanNode() function in XFAScanner.cc in xpdf 4.03.
Modified: 2025-02-28
CVE-2021-30860
An integer overflow was addressed with improved input validation. This issue is fixed in Security Update 2021-005 Catalina, iOS 14.8 and iPadOS 14.8, macOS Big Sur 11.6, watchOS 7.6.2. Processing a maliciously crafted PDF may lead to arbitrary code execution. Apple is aware of a report that this issue may have been actively exploited.
- 20210917 APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8
- 20210917 APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8
- 20210917 APPLE-SA-2021-09-13-2 watchOS 7.6.2
- 20210917 APPLE-SA-2021-09-13-2 watchOS 7.6.2
- 20210917 APPLE-SA-2021-09-13-3 macOS Big Sur 11.6
- 20210917 APPLE-SA-2021-09-13-3 macOS Big Sur 11.6
- 20210917 APPLE-SA-2021-09-13-4 Security Update 2021-005 Catalina
- 20210917 APPLE-SA-2021-09-13-4 Security Update 2021-005 Catalina
- 20210921 APPLE-SA-2021-09-20-6 Additional information for APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8
- 20210921 APPLE-SA-2021-09-20-6 Additional information for APPLE-SA-2021-09-13-1 iOS 14.8 and iPadOS 14.8
- 20210921 APPLE-SA-2021-09-20-7 Additional information for APPLE-SA-2021-09-13-3 macOS Big Sur 11.6
- 20210921 APPLE-SA-2021-09-20-7 Additional information for APPLE-SA-2021-09-13-3 macOS Big Sur 11.6
- 20210921 APPLE-SA-2021-09-20-8 Additional information for APPLE-SA-2021-09-13-4 Security Update 2021-005 Catalina
- 20210921 APPLE-SA-2021-09-20-8 Additional information for APPLE-SA-2021-09-13-4 Security Update 2021-005 Catalina
- 20210924 APPLE-SA-2021-09-23-1 iOS 12.5.5
- 20210924 APPLE-SA-2021-09-23-1 iOS 12.5.5
- [oss-security] 20220902 JBIG2 integer overflow fixed in Xpdf 4.04, Poppler 22.09.0
- [oss-security] 20220902 JBIG2 integer overflow fixed in Xpdf 4.04, Poppler 22.09.0
- GLSA-202209-21
- GLSA-202209-21
- https://support.apple.com/en-us/HT212804
- https://support.apple.com/en-us/HT212804
- https://support.apple.com/en-us/HT212805
- https://support.apple.com/en-us/HT212805
- https://support.apple.com/en-us/HT212806
- https://support.apple.com/en-us/HT212806
- https://support.apple.com/en-us/HT212807
- https://support.apple.com/en-us/HT212807
- https://support.apple.com/kb/HT212824
- https://support.apple.com/kb/HT212824
Modified: 2025-03-27
CVE-2021-36493
Buffer Overflow vulnerability in pdfimages in xpdf 4.03 allows attackers to crash the application via crafted command.
Modified: 2024-11-21
CVE-2022-24106
In Xpdf prior to 4.04, the DCT (JPEG) decoder was incorrectly allowing the 'interleaved' flag to be changed after the first scan of the image, leading to an unknown integer-related vulnerability in Stream.cc.
Modified: 2024-11-21
CVE-2022-27135
xpdf 4.03 has heap buffer overflow in the function readXRefTable located in XRef.cc. An attacker can exploit this bug to cause a Denial of Service (Segmentation fault) or other unspecified effects by sending a crafted PDF file to the pdftoppm binary.
- https://forum.xpdfreader.com/viewtopic.php?f=3&t=42232
- https://forum.xpdfreader.com/viewtopic.php?f=3&t=42232
- https://github.com/verf1sh/Poc/blob/master/pic_ppm.png
- https://github.com/verf1sh/Poc/blob/master/pic_ppm.png
- https://github.com/verf1sh/Poc/blob/master/poc_ppm
- https://github.com/verf1sh/Poc/blob/master/poc_ppm
Closed bugs
Несовместимость библиотек
Closed vulnerabilities
BDU:2022-00903
Уязвимость системы управления базами данных MariaDB, связана с переполнением буфера в стеке, позволяющая нарушителю выполнить произвольный код
BDU:2022-01074
Уязвимость компонента SELECT_LEX::nest_level системы управления базами данных MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-01315
Уязвимость функции BN_mod_sqrt() библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-01641
Уязвимость библиотеки zlib, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-01832
Уязвимость компонента InnoDB системы управления базами данных MariaDB и MySQL, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-01851
Уязвимость компонента InnoDB системы управления базами данных MariaDB и MySQL, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02593
Уязвимость компонента decimal_bin_size системы управления базами данных MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02594
Уязвимость компонента sql/sql_class.cc системы управления базами данных MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02595
Уязвимость компонента Used_tables_and_const_cache::used_tables_and_const_cache_join системы управления базами данных MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-03726
Уязвимость компонента sql/sql_window.cc системы управления базами данных MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-03789
Уязвимость функции xbstream_open системы управления базами данных MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-03790
Уязвимость метода log_statement_ex (plugin/server_audit/server_audit.c) системы управления базами данных MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-03791
Уязвимость метода create_worker_threads системы управления базами данных MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-03792
Уязвимость метода create_worker_threads системы управления базами данных MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-04064
Уязвимость функции Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort системы управления базами данных MariaDB, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность защищаемой информации
BDU:2022-04068
Уязвимость функции Item_args::walk_args системы управления базами данных MariaDB, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность защищаемой информации
BDU:2022-04075
Уязвимость функции prepare_inplace_add_virtual системы управления базами данных MariaDB, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность защищаемой информации
BDU:2022-04076
Уязвимость функции Item_func_in::cleanup/Item::cleanup_processor системы управления базами данных MariaDB, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность защищаемой информации
BDU:2022-04078
Уязвимость компонента sub_select системы управления базами данных MariaDB, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность защищаемой информации
BDU:2022-04079
Уязвимость функции st_select_lex_unit::exclude_level системы управления базами данных MariaDB, позволяющая нарушителю оказать воздействие на доступность защищаемой информации
BDU:2022-04080
Уязвимость функции Item_subselect::init_expr_cache_tracker системы управления базами данных MariaDB, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность защищаемой информации
BDU:2022-04082
Уязвимость функции __interceptor_memset (/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc) системы управления базами данных MariaDB, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность защищаемой информации
BDU:2022-04087
Уязвимость функции Item_field::fix_outer_field системы управления базами данных MariaDB, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность защищаемой информации
BDU:2022-05553
Уязвимость компонента dict0dict.cc системы управления базами данных MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05677
Уязвимость компонента InnoDB СУБД MariaDB, позволяющая нарушителю нарушить целостность данных, а также вызвать отказ в обслуживании
BDU:2022-05691
Уязвимость компонента sql_lex.cc СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05704
Уязвимость СУБД MariaDB, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05710
Уязвимость компонента ha_maria::extra СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05712
Уязвимость компонента sql_parse.cc СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05752
Уязвимость компонента set_var.cc СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05755
Уязвимость компонентов find_field_in_tables и find_order_in_list СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05757
Уязвимость СУБД MariaDB, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06420
Уязвимость компонента C API системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06894
Уязвимость СУБД MariaDB, связанная с использованием памяти после её освобождения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06904
Уязвимость компонента my_strcasecmp_8bit СУБД MariaDB, связанная с использованием памяти после её освобождения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06906
Уязвимость компонента Item_subselect::init_expr_cache_tracker СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06907
Уязвимость компонента sql/item_cmpfunc.cc СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06909
Уязвимость функции Binary_string::free_buffer() компонента /sql/sql_string.h СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06910
Уязвимость функции Binary_string::free_buffer() компонента /sql/sql_string.h СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06913
Уязвимость компонента /row/row0mysql.cc СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06914
Уязвимость функции VDec::VDec компонента /sql/sql_type.cc СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06915
Уязвимость компонента Create_tmp_table::finalize СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06916
Уязвимость компонента Field::set_default СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06919
Уязвимость компонента sql/item_func.cc СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06922
Уязвимость компонента Item_args::walk_arg СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06923
Уязвимость компонента Arg_comparator::compare_real_fixed СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06924
Уязвимость компонента my_decimal::operator СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06927
Уязвимость компонента Item_func_in::cleanup() СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-03-28
CVE-2018-25032
zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.
- 20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina
- 20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- 20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4
- 20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4
- [oss-security] 20220325 Re: zlib memory corruption on deflate (i.e. compress)
- [oss-security] 20220325 Re: zlib memory corruption on deflate (i.e. compress)
- [oss-security] 20220326 Re: zlib memory corruption on deflate (i.e. compress)
- [oss-security] 20220326 Re: zlib memory corruption on deflate (i.e. compress)
- https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf
- https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
- https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
- https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
- https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
- https://github.com/madler/zlib/issues/605
- https://github.com/madler/zlib/issues/605
- [debian-lts-announce] 20220402 [SECURITY] [DLA 2968-1] zlib security update
- [debian-lts-announce] 20220402 [SECURITY] [DLA 2968-1] zlib security update
- [debian-lts-announce] 20220507 [SECURITY] [DLA 2993-1] libz-mingw-w64 security update
- [debian-lts-announce] 20220507 [SECURITY] [DLA 2993-1] libz-mingw-w64 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- FEDORA-2022-b58a85e167
- FEDORA-2022-b58a85e167
- FEDORA-2022-61cf1c64f6
- FEDORA-2022-61cf1c64f6
- FEDORA-2022-3a92250fd5
- FEDORA-2022-3a92250fd5
- FEDORA-2022-413a80a102
- FEDORA-2022-413a80a102
- FEDORA-2022-12b89e2aad
- FEDORA-2022-12b89e2aad
- FEDORA-2022-dbd2935e44
- FEDORA-2022-dbd2935e44
- GLSA-202210-42
- GLSA-202210-42
- https://security.netapp.com/advisory/ntap-20220526-0009/
- https://security.netapp.com/advisory/ntap-20220526-0009/
- https://security.netapp.com/advisory/ntap-20220729-0004/
- https://security.netapp.com/advisory/ntap-20220729-0004/
- https://support.apple.com/kb/HT213255
- https://support.apple.com/kb/HT213255
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213257
- https://support.apple.com/kb/HT213257
- DSA-5111
- DSA-5111
- https://www.openwall.com/lists/oss-security/2022/03/24/1
- https://www.openwall.com/lists/oss-security/2022/03/24/1
- https://www.openwall.com/lists/oss-security/2022/03/28/1
- https://www.openwall.com/lists/oss-security/2022/03/28/1
- https://www.openwall.com/lists/oss-security/2022/03/28/3
- https://www.openwall.com/lists/oss-security/2022/03/28/3
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
Modified: 2024-11-21
CVE-2021-2372
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.34 and prior and 8.0.25 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
- FEDORA-2021-acef1dc8cf
- FEDORA-2021-acef1dc8cf
- FEDORA-2021-dc4299a8d0
- FEDORA-2021-dc4299a8d0
- FEDORA-2021-df40c41094
- FEDORA-2021-df40c41094
- FEDORA-2021-72d5918529
- FEDORA-2021-72d5918529
- https://security.netapp.com/advisory/ntap-20210723-0001/
- https://security.netapp.com/advisory/ntap-20210723-0001/
- https://www.oracle.com/security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpujul2021.html
Modified: 2024-11-21
CVE-2021-2389
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.34 and prior and 8.0.25 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
- FEDORA-2021-acef1dc8cf
- FEDORA-2021-acef1dc8cf
- FEDORA-2021-72d5918529
- FEDORA-2021-72d5918529
- https://security.netapp.com/advisory/ntap-20210723-0001/
- https://security.netapp.com/advisory/ntap-20210723-0001/
- https://www.oracle.com/security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpujul2021.html
- https://www.zerodayinitiative.com/advisories/ZDI-21-880/
- https://www.zerodayinitiative.com/advisories/ZDI-21-880/
Modified: 2024-11-21
CVE-2021-35604
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.35 and prior and 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
- FEDORA-2021-acef1dc8cf
- FEDORA-2021-acef1dc8cf
- FEDORA-2021-70dd0b9f5d
- FEDORA-2021-70dd0b9f5d
- FEDORA-2021-f74148c6d4
- FEDORA-2021-f74148c6d4
- FEDORA-2021-72d5918529
- FEDORA-2021-72d5918529
- FEDORA-2021-46dc82116b
- FEDORA-2021-46dc82116b
- https://security.netapp.com/advisory/ntap-20211022-0003/
- https://security.netapp.com/advisory/ntap-20211022-0003/
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
Modified: 2024-11-21
CVE-2021-46658
save_window_function_values in MariaDB before 10.6.3 allows an application crash because of incorrect handling of with_window_func=true for a subquery.
Modified: 2024-11-21
CVE-2021-46659
MariaDB before 10.7.2 allows an application crash because it does not recognize that SELECT_LEX::nest_level is local to each VIEW.
- https://jira.mariadb.org/browse/MDEV-25631
- https://jira.mariadb.org/browse/MDEV-25631
- FEDORA-2022-03350936ee
- FEDORA-2022-03350936ee
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-263f7cc483
- FEDORA-2022-263f7cc483
- https://mariadb.com/kb/en/security/
- https://mariadb.com/kb/en/security/
- https://security.netapp.com/advisory/ntap-20220311-0003/
- https://security.netapp.com/advisory/ntap-20220311-0003/
Modified: 2024-11-21
CVE-2021-46661
MariaDB through 10.5.9 allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE).
- https://jira.mariadb.org/browse/MDEV-25766
- https://jira.mariadb.org/browse/MDEV-25766
- FEDORA-2022-03350936ee
- FEDORA-2022-03350936ee
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-263f7cc483
- FEDORA-2022-263f7cc483
- https://mariadb.com/kb/en/security/
- https://mariadb.com/kb/en/security/
- https://security.netapp.com/advisory/ntap-20220221-0002/
- https://security.netapp.com/advisory/ntap-20220221-0002/
Modified: 2024-11-21
CVE-2021-46662
MariaDB through 10.5.9 allows a set_var.cc application crash via certain uses of an UPDATE statement in conjunction with a nested subquery.
Modified: 2024-11-21
CVE-2021-46663
MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements.
- https://jira.mariadb.org/browse/MDEV-26351
- https://jira.mariadb.org/browse/MDEV-26351
- FEDORA-2022-03350936ee
- FEDORA-2022-03350936ee
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-263f7cc483
- FEDORA-2022-263f7cc483
- https://mariadb.com/kb/en/security/
- https://mariadb.com/kb/en/security/
- https://security.netapp.com/advisory/ntap-20220221-0002/
- https://security.netapp.com/advisory/ntap-20220221-0002/
Modified: 2024-11-21
CVE-2021-46664
MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr.
- https://jira.mariadb.org/browse/MDEV-25761
- https://jira.mariadb.org/browse/MDEV-25761
- FEDORA-2022-03350936ee
- FEDORA-2022-03350936ee
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-263f7cc483
- FEDORA-2022-263f7cc483
- https://mariadb.com/kb/en/security/
- https://mariadb.com/kb/en/security/
- https://security.netapp.com/advisory/ntap-20220221-0002/
- https://security.netapp.com/advisory/ntap-20220221-0002/
Modified: 2024-11-21
CVE-2021-46665
MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations.
- https://jira.mariadb.org/browse/MDEV-25636
- https://jira.mariadb.org/browse/MDEV-25636
- FEDORA-2022-03350936ee
- FEDORA-2022-03350936ee
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-263f7cc483
- FEDORA-2022-263f7cc483
- https://mariadb.com/kb/en/security/
- https://mariadb.com/kb/en/security/
- https://security.netapp.com/advisory/ntap-20220221-0002/
- https://security.netapp.com/advisory/ntap-20220221-0002/
Modified: 2024-11-21
CVE-2021-46667
MariaDB before 10.6.5 has a sql_lex.cc integer overflow, leading to an application crash.
- https://jira.mariadb.org/browse/MDEV-26350
- https://jira.mariadb.org/browse/MDEV-26350
- FEDORA-2022-03350936ee
- FEDORA-2022-03350936ee
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-263f7cc483
- FEDORA-2022-263f7cc483
- https://mariadb.com/kb/en/security/
- https://mariadb.com/kb/en/security/
- https://security.netapp.com/advisory/ntap-20220221-0002/
- https://security.netapp.com/advisory/ntap-20220221-0002/
Modified: 2024-11-21
CVE-2021-46668
MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT statements that improperly interact with storage-engine resource limitations for temporary data structures.
- https://jira.mariadb.org/browse/MDEV-25787
- https://jira.mariadb.org/browse/MDEV-25787
- FEDORA-2022-03350936ee
- FEDORA-2022-03350936ee
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-263f7cc483
- FEDORA-2022-263f7cc483
- https://mariadb.com/kb/en/security/
- https://mariadb.com/kb/en/security/
- https://security.netapp.com/advisory/ntap-20220221-0002/
- https://security.netapp.com/advisory/ntap-20220221-0002/
Modified: 2024-11-21
CVE-2021-46669
MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used.
- https://jira.mariadb.org/browse/MDEV-25638
- https://jira.mariadb.org/browse/MDEV-25638
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- FEDORA-2022-25dcba7104
- FEDORA-2022-25dcba7104
- FEDORA-2022-e6dc7ed871
- FEDORA-2022-e6dc7ed871
- https://mariadb.com/kb/en/security/
- https://mariadb.com/kb/en/security/
- https://security.netapp.com/advisory/ntap-20220221-0002/
- https://security.netapp.com/advisory/ntap-20220221-0002/
Modified: 2024-11-21
CVE-2022-0778
The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).
- http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html
- http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html
- 20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina
- 20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- 20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4
- 20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4
- https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246
- [debian-lts-announce] 20220317 [SECURITY] [DLA 2952-1] openssl security update
- [debian-lts-announce] 20220317 [SECURITY] [DLA 2952-1] openssl security update
- [debian-lts-announce] 20220317 [SECURITY] [DLA 2953-1] openssl1.0 security update
- [debian-lts-announce] 20220317 [SECURITY] [DLA 2953-1] openssl1.0 security update
- FEDORA-2022-9e88b5d8d7
- FEDORA-2022-9e88b5d8d7
- FEDORA-2022-a5f51502f0
- FEDORA-2022-a5f51502f0
- FEDORA-2022-8bb51f6901
- FEDORA-2022-8bb51f6901
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
- GLSA-202210-02
- GLSA-202210-02
- https://security.netapp.com/advisory/ntap-20220321-0002/
- https://security.netapp.com/advisory/ntap-20220321-0002/
- https://security.netapp.com/advisory/ntap-20220429-0005/
- https://security.netapp.com/advisory/ntap-20220429-0005/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://support.apple.com/kb/HT213255
- https://support.apple.com/kb/HT213255
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213257
- https://support.apple.com/kb/HT213257
- DSA-5103
- DSA-5103
- https://www.openssl.org/news/secadv/20220315.txt
- https://www.openssl.org/news/secadv/20220315.txt
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.tenable.com/security/tns-2022-06
- https://www.tenable.com/security/tns-2022-06
- https://www.tenable.com/security/tns-2022-07
- https://www.tenable.com/security/tns-2022-07
- https://www.tenable.com/security/tns-2022-08
- https://www.tenable.com/security/tns-2022-08
- https://www.tenable.com/security/tns-2022-09
- https://www.tenable.com/security/tns-2022-09
Modified: 2024-11-21
CVE-2022-21595
Vulnerability in the MySQL Server product of Oracle MySQL (component: C API). Supported versions that are affected are 5.7.36 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
Modified: 2024-11-21
CVE-2022-24048
MariaDB CONNECT Storage Engine Stack-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16191.
- FEDORA-2022-03350936ee
- FEDORA-2022-03350936ee
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-263f7cc483
- FEDORA-2022-263f7cc483
- https://mariadb.com/kb/en/security/
- https://mariadb.com/kb/en/security/
- https://security.netapp.com/advisory/ntap-20220318-0004/
- https://security.netapp.com/advisory/ntap-20220318-0004/
- https://www.zerodayinitiative.com/advisories/ZDI-22-363/
- https://www.zerodayinitiative.com/advisories/ZDI-22-363/
Modified: 2024-11-21
CVE-2022-24050
MariaDB CONNECT Storage Engine Use-After-Free Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16207.
- FEDORA-2022-03350936ee
- FEDORA-2022-03350936ee
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-263f7cc483
- FEDORA-2022-263f7cc483
- https://mariadb.com/kb/en/security/
- https://mariadb.com/kb/en/security/
- https://security.netapp.com/advisory/ntap-20220318-0004/
- https://security.netapp.com/advisory/ntap-20220318-0004/
- https://www.zerodayinitiative.com/advisories/ZDI-22-364/
- https://www.zerodayinitiative.com/advisories/ZDI-22-364/
Modified: 2024-11-21
CVE-2022-24051
MariaDB CONNECT Storage Engine Format String Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of a user-supplied string before using it as a format specifier. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16193.
- FEDORA-2022-03350936ee
- FEDORA-2022-03350936ee
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-263f7cc483
- FEDORA-2022-263f7cc483
- https://mariadb.com/kb/en/security/
- https://mariadb.com/kb/en/security/
- https://security.netapp.com/advisory/ntap-20220318-0004/
- https://security.netapp.com/advisory/ntap-20220318-0004/
- https://www.zerodayinitiative.com/advisories/ZDI-22-318/
- https://www.zerodayinitiative.com/advisories/ZDI-22-318/
Modified: 2024-11-21
CVE-2022-24052
MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.
- FEDORA-2022-03350936ee
- FEDORA-2022-03350936ee
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-263f7cc483
- FEDORA-2022-263f7cc483
- https://mariadb.com/kb/en/security/
- https://mariadb.com/kb/en/security/
- https://security.netapp.com/advisory/ntap-20220318-0004/
- https://security.netapp.com/advisory/ntap-20220318-0004/
- https://www.zerodayinitiative.com/advisories/ZDI-22-367/
- https://www.zerodayinitiative.com/advisories/ZDI-22-367/
Modified: 2024-11-21
CVE-2022-27376
MariaDB Server v10.6.5 and below was discovered to contain an use-after-free in the component Item_args::walk_arg, which is exploited via specially crafted SQL statements.
- https://jira.mariadb.org/browse/MDEV-26354
- https://jira.mariadb.org/browse/MDEV-26354
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220519-0007/
- https://security.netapp.com/advisory/ntap-20220519-0007/
Modified: 2024-11-21
CVE-2022-27377
MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component Item_func_in::cleanup(), which is exploited via specially crafted SQL statements.
- https://jira.mariadb.org/browse/MDEV-26281
- https://jira.mariadb.org/browse/MDEV-26281
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220526-0007/
- https://security.netapp.com/advisory/ntap-20220526-0007/
Modified: 2024-11-21
CVE-2022-27378
An issue in the component Create_tmp_table::finalize of MariaDB Server v10.7 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.
- https://jira.mariadb.org/browse/MDEV-26423
- https://jira.mariadb.org/browse/MDEV-26423
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220526-0004/
- https://security.netapp.com/advisory/ntap-20220526-0004/
Modified: 2024-11-21
CVE-2022-27379
An issue in the component Arg_comparator::compare_real_fixed of MariaDB Server v10.6.2 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.
- https://jira.mariadb.org/browse/MDEV-26353
- https://jira.mariadb.org/browse/MDEV-26353
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220526-0005/
- https://security.netapp.com/advisory/ntap-20220526-0005/
Modified: 2024-11-21
CVE-2022-27380
An issue in the component my_decimal::operator= of MariaDB Server v10.6.3 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.
- https://jira.mariadb.org/browse/MDEV-26280
- https://jira.mariadb.org/browse/MDEV-26280
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220526-0007/
- https://security.netapp.com/advisory/ntap-20220526-0007/
Modified: 2024-11-21
CVE-2022-27381
An issue in the component Field::set_default of MariaDB Server v10.6 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.
- https://jira.mariadb.org/browse/MDEV-26061
- https://jira.mariadb.org/browse/MDEV-26061
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220519-0006/
- https://security.netapp.com/advisory/ntap-20220519-0006/
Modified: 2024-11-21
CVE-2022-27382
MariaDB Server v10.7 and below was discovered to contain a segmentation fault via the component Item_field::used_tables/update_depend_map_for_order.
Modified: 2024-11-21
CVE-2022-27383
MariaDB Server v10.6 and below was discovered to contain an use-after-free in the component my_strcasecmp_8bit, which is exploited via specially crafted SQL statements.
- https://jira.mariadb.org/browse/MDEV-26323
- https://jira.mariadb.org/browse/MDEV-26323
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220519-0006/
- https://security.netapp.com/advisory/ntap-20220519-0006/
Modified: 2024-11-21
CVE-2022-27384
An issue in the component Item_subselect::init_expr_cache_tracker of MariaDB Server v10.6 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.
- https://jira.mariadb.org/browse/MDEV-26047
- https://jira.mariadb.org/browse/MDEV-26047
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220519-0006/
- https://security.netapp.com/advisory/ntap-20220519-0006/
Modified: 2024-11-21
CVE-2022-27385
An issue in the component Used_tables_and_const_cache::used_tables_and_const_cache_join of MariaDB Server v10.7 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.
Modified: 2024-11-21
CVE-2022-27386
MariaDB Server v10.7 and below was discovered to contain a segmentation fault via the component sql/sql_class.cc.
- https://jira.mariadb.org/browse/MDEV-26406
- https://jira.mariadb.org/browse/MDEV-26406
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220526-0004/
- https://security.netapp.com/advisory/ntap-20220526-0004/
Modified: 2024-11-21
CVE-2022-27387
MariaDB Server v10.7 and below was discovered to contain a global buffer overflow in the component decimal_bin_size, which is exploited via specially crafted SQL statements.
- https://jira.mariadb.org/browse/MDEV-26422
- https://jira.mariadb.org/browse/MDEV-26422
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220526-0004/
- https://security.netapp.com/advisory/ntap-20220526-0004/
Modified: 2024-11-21
CVE-2022-27444
MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_subselect.cc.
Modified: 2024-11-21
CVE-2022-27445
MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/sql_window.cc.
- https://jira.mariadb.org/browse/MDEV-28081
- https://jira.mariadb.org/browse/MDEV-28081
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220526-0006/
- https://security.netapp.com/advisory/ntap-20220526-0006/
Modified: 2024-11-21
CVE-2022-27446
MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_cmpfunc.h.
Modified: 2024-11-21
CVE-2022-27447
MariaDB Server v10.9 and below was discovered to contain a use-after-free via the component Binary_string::free_buffer() at /sql/sql_string.h.
- https://jira.mariadb.org/browse/MDEV-28099
- https://jira.mariadb.org/browse/MDEV-28099
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220526-0006/
- https://security.netapp.com/advisory/ntap-20220526-0006/
Modified: 2024-11-21
CVE-2022-27448
There is an Assertion failure in MariaDB Server v10.9 and below via 'node->pcur->rel_pos == BTR_PCUR_ON' at /row/row0mysql.cc.
- https://jira.mariadb.org/browse/MDEV-28095
- https://jira.mariadb.org/browse/MDEV-28095
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220526-0006/
- https://security.netapp.com/advisory/ntap-20220526-0006/
Modified: 2024-11-21
CVE-2022-27449
MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_func.cc:148.
- https://jira.mariadb.org/browse/MDEV-28089
- https://jira.mariadb.org/browse/MDEV-28089
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220526-0006/
- https://security.netapp.com/advisory/ntap-20220526-0006/
Modified: 2024-11-21
CVE-2022-27451
MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/field_conv.cc.
Modified: 2024-11-21
CVE-2022-27452
MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_cmpfunc.cc.
- https://jira.mariadb.org/browse/MDEV-28090
- https://jira.mariadb.org/browse/MDEV-28090
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220526-0006/
- https://security.netapp.com/advisory/ntap-20220526-0006/
Modified: 2024-11-21
CVE-2022-27455
MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component my_wildcmp_8bit_impl at /strings/ctype-simple.c.
Modified: 2024-11-21
CVE-2022-27456
MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component VDec::VDec at /sql/sql_type.cc.
- https://jira.mariadb.org/browse/MDEV-28093
- https://jira.mariadb.org/browse/MDEV-28093
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220526-0007/
- https://security.netapp.com/advisory/ntap-20220526-0007/
Modified: 2024-11-21
CVE-2022-27457
MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component my_mb_wc_latin1 at /strings/ctype-latin1.c.
Modified: 2024-05-02
CVE-2022-27458
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-27447. Reason: This candidate is a reservation duplicate of CVE-2022-27447. Notes: All CVE users should reference CVE-2022-27447 instead of this candidate.
Modified: 2024-11-21
CVE-2022-31621
MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_xbstream.cc, when an error occurs (stream_ctxt->dest_file == NULL) while executing the method xbstream_open, the held lock is not released correctly, which allows local users to trigger a denial of service due to the deadlock. Note: The vendor argues this is just an improper locking bug and not a vulnerability with adverse effects.
- https://github.com/MariaDB/server/commit/b1351c15946349f9daa7e5297fb2ac6f3139e4a8
- https://github.com/MariaDB/server/commit/b1351c15946349f9daa7e5297fb2ac6f3139e4a8
- https://jira.mariadb.org/browse/MDEV-26561
- https://jira.mariadb.org/browse/MDEV-26561
- https://jira.mariadb.org/browse/MDEV-26574
- https://jira.mariadb.org/browse/MDEV-26574
- https://jira.mariadb.org/browse/MDEV-26574?filter=-2
- https://jira.mariadb.org/browse/MDEV-26574?filter=-2
- https://security.netapp.com/advisory/ntap-20220707-0006/
- https://security.netapp.com/advisory/ntap-20220707-0006/
Modified: 2024-11-21
CVE-2022-31622
MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_compress.cc, when an error occurs (pthread_create returns a nonzero value) while executing the method create_worker_threads, the held lock is not released correctly, which allows local users to trigger a denial of service due to the deadlock. Note: The vendor argues this is just an improper locking bug and not a vulnerability with adverse effects.
- https://github.com/MariaDB/server/commit/e1eb39a446c30b8459c39fd7f2ee1c55a36e97d2
- https://github.com/MariaDB/server/commit/e1eb39a446c30b8459c39fd7f2ee1c55a36e97d2
- https://jira.mariadb.org/browse/MDEV-26561
- https://jira.mariadb.org/browse/MDEV-26561
- https://jira.mariadb.org/browse/MDEV-26561?filter=-2
- https://jira.mariadb.org/browse/MDEV-26561?filter=-2
- https://jira.mariadb.org/browse/MDEV-26574
- https://jira.mariadb.org/browse/MDEV-26574
- https://security.netapp.com/advisory/ntap-20220707-0006/
- https://security.netapp.com/advisory/ntap-20220707-0006/
Modified: 2024-11-21
CVE-2022-31623
MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_compress.cc, when an error occurs (i.e., going to the err label) while executing the method create_worker_threads, the held lock thd->ctrl_mutex is not released correctly, which allows local users to trigger a denial of service due to the deadlock. Note: The vendor argues this is just an improper locking bug and not a vulnerability with adverse effects.
- https://github.com/MariaDB/server/commit/7c30bc38a588b22b01f11130cfe99e7f36accf94
- https://github.com/MariaDB/server/commit/7c30bc38a588b22b01f11130cfe99e7f36accf94
- https://github.com/MariaDB/server/pull/1938
- https://github.com/MariaDB/server/pull/1938
- https://jira.mariadb.org/browse/MDEV-26561
- https://jira.mariadb.org/browse/MDEV-26561
- https://jira.mariadb.org/browse/MDEV-26574
- https://jira.mariadb.org/browse/MDEV-26574
- https://security.netapp.com/advisory/ntap-20220707-0006/
- https://security.netapp.com/advisory/ntap-20220707-0006/
Modified: 2024-11-21
CVE-2022-31624
MariaDB Server before 10.7 is vulnerable to Denial of Service. While executing the plugin/server_audit/server_audit.c method log_statement_ex, the held lock lock_bigbuffer is not released correctly, which allows local users to trigger a denial of service due to the deadlock.
- https://github.com/MariaDB/server/commit/d627d00b13ab2f2c0954ea7b77202470cb102944
- https://github.com/MariaDB/server/commit/d627d00b13ab2f2c0954ea7b77202470cb102944
- https://jira.mariadb.org/browse/MDEV-26556?filter=-2
- https://jira.mariadb.org/browse/MDEV-26556?filter=-2
- https://security.netapp.com/advisory/ntap-20220707-0006/
- https://security.netapp.com/advisory/ntap-20220707-0006/
Modified: 2024-11-21
CVE-2022-32081
MariaDB v10.4 to v10.7 was discovered to contain an use-after-poison in prepare_inplace_add_virtual at /storage/innobase/handler/handler0alter.cc.
- https://jira.mariadb.org/browse/MDEV-26420
- https://jira.mariadb.org/browse/MDEV-26420
- FEDORA-2022-e0e9a43546
- FEDORA-2022-e0e9a43546
- FEDORA-2022-333df1c4aa
- FEDORA-2022-333df1c4aa
- FEDORA-2022-cf88f807f9
- FEDORA-2022-cf88f807f9
- https://security.netapp.com/advisory/ntap-20220818-0005/
- https://security.netapp.com/advisory/ntap-20220818-0005/
Modified: 2024-11-21
CVE-2022-32082
MariaDB v10.5 to v10.7 was discovered to contain an assertion failure at table->get_ref_count() == 0 in dict0dict.cc.
- https://jira.mariadb.org/browse/MDEV-26433
- https://jira.mariadb.org/browse/MDEV-26433
- FEDORA-2022-e0e9a43546
- FEDORA-2022-e0e9a43546
- FEDORA-2022-333df1c4aa
- FEDORA-2022-333df1c4aa
- FEDORA-2022-cf88f807f9
- FEDORA-2022-cf88f807f9
- https://security.netapp.com/advisory/ntap-20220818-0005/
- https://security.netapp.com/advisory/ntap-20220818-0005/
Modified: 2024-11-21
CVE-2022-32083
MariaDB v10.2 to v10.6.1 was discovered to contain a segmentation fault via the component Item_subselect::init_expr_cache_tracker.
- https://jira.mariadb.org/browse/MDEV-26047
- https://jira.mariadb.org/browse/MDEV-26047
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220826-0006/
- https://security.netapp.com/advisory/ntap-20220826-0006/
Modified: 2024-11-21
CVE-2022-32084
MariaDB v10.2 to v10.7 was discovered to contain a segmentation fault via the component sub_select.
- https://jira.mariadb.org/browse/MDEV-26427
- https://jira.mariadb.org/browse/MDEV-26427
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- FEDORA-2022-e0e9a43546
- FEDORA-2022-e0e9a43546
- FEDORA-2022-333df1c4aa
- FEDORA-2022-333df1c4aa
- FEDORA-2022-cf88f807f9
- FEDORA-2022-cf88f807f9
- https://security.netapp.com/advisory/ntap-20220818-0005/
- https://security.netapp.com/advisory/ntap-20220818-0005/
Modified: 2024-11-21
CVE-2022-32085
MariaDB v10.2 to v10.7 was discovered to contain a segmentation fault via the component Item_func_in::cleanup/Item::cleanup_processor.
- https://jira.mariadb.org/browse/MDEV-26407
- https://jira.mariadb.org/browse/MDEV-26407
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220818-0005/
- https://security.netapp.com/advisory/ntap-20220818-0005/
Modified: 2024-11-21
CVE-2022-32086
MariaDB v10.4 to v10.8 was discovered to contain a segmentation fault via the component Item_field::fix_outer_field.
Modified: 2024-11-21
CVE-2022-32087
MariaDB v10.2 to v10.7 was discovered to contain a segmentation fault via the component Item_args::walk_args.
- https://jira.mariadb.org/browse/MDEV-26437
- https://jira.mariadb.org/browse/MDEV-26437
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220818-0005/
- https://security.netapp.com/advisory/ntap-20220818-0005/
Modified: 2024-11-21
CVE-2022-32088
MariaDB v10.2 to v10.7 was discovered to contain a segmentation fault via the component Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort.
- https://jira.mariadb.org/browse/MDEV-26419
- https://jira.mariadb.org/browse/MDEV-26419
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220818-0005/
- https://security.netapp.com/advisory/ntap-20220818-0005/
Modified: 2024-11-21
CVE-2022-32089
MariaDB v10.5 to v10.7 was discovered to contain a segmentation fault via the component st_select_lex_unit::exclude_level.
- https://jira.mariadb.org/browse/MDEV-26410
- https://jira.mariadb.org/browse/MDEV-26410
- FEDORA-2022-e0e9a43546
- FEDORA-2022-e0e9a43546
- FEDORA-2022-333df1c4aa
- FEDORA-2022-333df1c4aa
- FEDORA-2022-cf88f807f9
- FEDORA-2022-cf88f807f9
- https://security.netapp.com/advisory/ntap-20220818-0005/
- https://security.netapp.com/advisory/ntap-20220818-0005/
Modified: 2024-11-21
CVE-2022-32091
MariaDB v10.7 was discovered to contain an use-after-poison in in __interceptor_memset at /libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc.
- https://jira.mariadb.org/browse/MDEV-26431
- https://jira.mariadb.org/browse/MDEV-26431
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- FEDORA-2022-e0e9a43546
- FEDORA-2022-e0e9a43546
- FEDORA-2022-333df1c4aa
- FEDORA-2022-333df1c4aa
- FEDORA-2022-cf88f807f9
- FEDORA-2022-cf88f807f9
- https://security.netapp.com/advisory/ntap-20220818-0005/
- https://security.netapp.com/advisory/ntap-20220818-0005/
Modified: 2024-11-21
CVE-2022-38791
In MariaDB before 10.9.2, compress_write in extra/mariabackup/ds_compress.cc does not release data_mutex upon a stream write failure, which allows local users to trigger a deadlock.
- https://jira.mariadb.org/browse/MDEV-28719
- https://jira.mariadb.org/browse/MDEV-28719
- FEDORA-2022-e0e9a43546
- FEDORA-2022-e0e9a43546
- FEDORA-2022-333df1c4aa
- FEDORA-2022-333df1c4aa
- FEDORA-2022-cf88f807f9
- FEDORA-2022-cf88f807f9
- https://security.netapp.com/advisory/ntap-20221104-0008/
- https://security.netapp.com/advisory/ntap-20221104-0008/
Closed bugs
mysql.lib: CopyLibs: invalid or missing DESTDIR specified
без пакета mariadb-pam пакет mariadb-server нерабочий
Зависит от libmariadb-devel
Package python3-module-django updated to version 3.2.15-alt1 for branch p10_e2k.
Closed vulnerabilities
BDU:2022-04199
Уязвимость функции Trunc/Extract фреймворка для веб-разработки Django, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
Modified: 2024-11-21
CVE-2022-34265
An issue was discovered in Django 3.2 before 3.2.14 and 4.0 before 4.0.6. The Trunc() and Extract() database functions are subject to SQL injection if untrusted data is used as a kind/lookup_name value. Applications that constrain the lookup name and kind choice to a known safe list are unaffected.
- https://docs.djangoproject.com/en/4.0/releases/security/
- https://docs.djangoproject.com/en/4.0/releases/security/
- https://groups.google.com/forum/#%21forum/django-announce
- https://groups.google.com/forum/#%21forum/django-announce
- FEDORA-2023-8fed428c5e
- FEDORA-2023-8fed428c5e
- FEDORA-2023-a53ab7c969
- FEDORA-2023-a53ab7c969
- https://security.netapp.com/advisory/ntap-20220818-0006/
- https://security.netapp.com/advisory/ntap-20220818-0006/
- DSA-5254
- DSA-5254
- https://www.djangoproject.com/weblog/2022/jul/04/security-releases/
- https://www.djangoproject.com/weblog/2022/jul/04/security-releases/
Modified: 2024-11-21
CVE-2022-36359
An issue was discovered in the HTTP FileResponse class in Django 3.2 before 3.2.15 and 4.0 before 4.0.7. An application is vulnerable to a reflected file download (RFD) attack that sets the Content-Disposition header of a FileResponse when the filename is derived from user-supplied input.
- [oss-security] 20220803 Django: CVE-2022-36359: Potential reflected file download vulnerability in FileResponse.
- https://docs.djangoproject.com/en/4.0/releases/security/
- https://groups.google.com/g/django-announce/c/8cz--gvaJr4
- FEDORA-2023-8fed428c5e
- FEDORA-2023-a53ab7c969
- https://security.netapp.com/advisory/ntap-20220915-0008/
- DSA-5254
- https://www.djangoproject.com/weblog/2022/aug/03/security-releases/
- [oss-security] 20220803 Django: CVE-2022-36359: Potential reflected file download vulnerability in FileResponse.
- https://www.djangoproject.com/weblog/2022/aug/03/security-releases/
- DSA-5254
- https://security.netapp.com/advisory/ntap-20220915-0008/
- FEDORA-2023-a53ab7c969
- FEDORA-2023-8fed428c5e
- https://groups.google.com/g/django-announce/c/8cz--gvaJr4
- https://docs.djangoproject.com/en/4.0/releases/security/
Package branding-alt-workstation updated to version 10.0.910-alt1 for branch p10_e2k.
Closed bugs
На странице с информацией о системе кнопка Яндекс Дзен сплющена