ALT-BU-2022-5937-1
Branch sisyphus_e2k update bulletin.
Package kernel-headers-common updated to version 1.2.8-alt1 for branch sisyphus_e2k.
Closed bugs
Удалить генерацию perl headers в /var/run/kernel (legacy)
Package zlib updated to version 1.2.12-alt3 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2022-05325
Уязвимость компонента inflate.c библиотеки zlib, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2022-37434
zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).
- 20221030 APPLE-SA-2022-10-27-1 iOS 15.7.1 and iPadOS 15.7.1
- 20221030 APPLE-SA-2022-10-27-2 Additional information for APPLE-SA-2022-10-24-1 iOS 16.1 and iPadOS 16
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-6 Additional information for APPLE-SA-2022-10-24-3 macOS Monterey 12.6.1
- [oss-security] 20220805 zlib buffer overflow
- [oss-security] 20220808 Re: zlib buffer overflow
- https://github.com/curl/curl/issues/9271
- https://github.com/ivd38/zlib_overflow
- https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#L1062-L1063
- https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1
- https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#L762-L764
- [debian-lts-announce] 20220912 [SECURITY] [DLA 3103-1] zlib security update
- FEDORA-2022-b8232d1cca
- FEDORA-2022-15da0cf165
- FEDORA-2022-0b517a5397
- FEDORA-2022-3c28ae0cd8
- FEDORA-2022-25e4dbedf9
- https://security.netapp.com/advisory/ntap-20220901-0005/
- https://security.netapp.com/advisory/ntap-20230427-0007/
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213489
- https://support.apple.com/kb/HT213490
- https://support.apple.com/kb/HT213491
- https://support.apple.com/kb/HT213493
- https://support.apple.com/kb/HT213494
- DSA-5218
- 20221030 APPLE-SA-2022-10-27-1 iOS 15.7.1 and iPadOS 15.7.1
- DSA-5218
- https://support.apple.com/kb/HT213494
- https://support.apple.com/kb/HT213493
- https://support.apple.com/kb/HT213491
- https://support.apple.com/kb/HT213490
- https://support.apple.com/kb/HT213489
- https://support.apple.com/kb/HT213488
- https://security.netapp.com/advisory/ntap-20230427-0007/
- https://security.netapp.com/advisory/ntap-20220901-0005/
- FEDORA-2022-25e4dbedf9
- FEDORA-2022-3c28ae0cd8
- FEDORA-2022-0b517a5397
- FEDORA-2022-15da0cf165
- FEDORA-2022-b8232d1cca
- [debian-lts-announce] 20220912 [SECURITY] [DLA 3103-1] zlib security update
- https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#L762-L764
- https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1
- https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#L1062-L1063
- https://github.com/ivd38/zlib_overflow
- https://github.com/curl/curl/issues/9271
- [oss-security] 20220808 Re: zlib buffer overflow
- [oss-security] 20220805 zlib buffer overflow
- 20221030 APPLE-SA-2022-10-27-6 Additional information for APPLE-SA-2022-10-24-3 macOS Monterey 12.6.1
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-2 Additional information for APPLE-SA-2022-10-24-1 iOS 16.1 and iPadOS 16
Package rsync updated to version 3.2.5-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2022-05325
Уязвимость компонента inflate.c библиотеки zlib, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2022-37434
zlib through 1.2.12 has a heap-based buffer over-read or buffer overflow in inflate in inflate.c via a large gzip header extra field. NOTE: only applications that call inflateGetHeader are affected. Some common applications bundle the affected zlib source code but may be unable to call inflateGetHeader (e.g., see the nodejs/node reference).
- 20221030 APPLE-SA-2022-10-27-1 iOS 15.7.1 and iPadOS 15.7.1
- 20221030 APPLE-SA-2022-10-27-2 Additional information for APPLE-SA-2022-10-24-1 iOS 16.1 and iPadOS 16
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-6 Additional information for APPLE-SA-2022-10-24-3 macOS Monterey 12.6.1
- [oss-security] 20220805 zlib buffer overflow
- [oss-security] 20220808 Re: zlib buffer overflow
- https://github.com/curl/curl/issues/9271
- https://github.com/ivd38/zlib_overflow
- https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#L1062-L1063
- https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1
- https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#L762-L764
- [debian-lts-announce] 20220912 [SECURITY] [DLA 3103-1] zlib security update
- FEDORA-2022-b8232d1cca
- FEDORA-2022-15da0cf165
- FEDORA-2022-0b517a5397
- FEDORA-2022-3c28ae0cd8
- FEDORA-2022-25e4dbedf9
- https://security.netapp.com/advisory/ntap-20220901-0005/
- https://security.netapp.com/advisory/ntap-20230427-0007/
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213489
- https://support.apple.com/kb/HT213490
- https://support.apple.com/kb/HT213491
- https://support.apple.com/kb/HT213493
- https://support.apple.com/kb/HT213494
- DSA-5218
- 20221030 APPLE-SA-2022-10-27-1 iOS 15.7.1 and iPadOS 15.7.1
- DSA-5218
- https://support.apple.com/kb/HT213494
- https://support.apple.com/kb/HT213493
- https://support.apple.com/kb/HT213491
- https://support.apple.com/kb/HT213490
- https://support.apple.com/kb/HT213489
- https://support.apple.com/kb/HT213488
- https://security.netapp.com/advisory/ntap-20230427-0007/
- https://security.netapp.com/advisory/ntap-20220901-0005/
- FEDORA-2022-25e4dbedf9
- FEDORA-2022-3c28ae0cd8
- FEDORA-2022-0b517a5397
- FEDORA-2022-15da0cf165
- FEDORA-2022-b8232d1cca
- [debian-lts-announce] 20220912 [SECURITY] [DLA 3103-1] zlib security update
- https://github.com/nodejs/node/blob/75b68c6e4db515f76df73af476eccf382bbcb00a/deps/zlib/inflate.c#L762-L764
- https://github.com/madler/zlib/commit/eff308af425b67093bab25f80f1ae950166bece1
- https://github.com/madler/zlib/blob/21767c654d31d2dccdde4330529775c6c5fd5389/zlib.h#L1062-L1063
- https://github.com/ivd38/zlib_overflow
- https://github.com/curl/curl/issues/9271
- [oss-security] 20220808 Re: zlib buffer overflow
- [oss-security] 20220805 zlib buffer overflow
- 20221030 APPLE-SA-2022-10-27-6 Additional information for APPLE-SA-2022-10-24-3 macOS Monterey 12.6.1
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-2 Additional information for APPLE-SA-2022-10-24-1 iOS 16.1 and iPadOS 16
Package libusb updated to version 1.0.26-alt2 for branch sisyphus_e2k.
Closed bugs
Не работает сканирование по usb на МФУ Inc. f+ imaging M60ade
Package token-manager updated to version 0.12-alt10 for branch sisyphus_e2k.
Closed bugs
token-manager не запускается
Не выводит сообщение о том, что не установлено КриптоПРО
Package moodle updated to version 3.11.8-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2022-03176
Уязвимость виртуальной обучающей среды Moodle, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю проводить межсайтовые сценарные атаки
BDU:2022-03179
Уязвимость реализации конфигурации moodle/badges:configurecriteria виртуальной обучающей среды Moodle, позволяющая нарушителю выполнить произвольный SQL-код
BDU:2022-03182
Уязвимость реализации класса core_auth виртуальной обучающей среды Moodle, позволяющая нарушителю обойти ограничения безопасности
BDU:2022-03183
Уязвимость реализации класса core_user виртуальной обучающей среды Moodle, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2022-03231
Уязвимость реализации класса core_search виртуальной обучающей среды Moodle, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2022-04906
Уязвимость виртуальной обучающей среды moodle, существующая из-за непринятия мер по защите структуры веб-страницы, позволяющая нарушителю выполнить произвольный код и раскрыть защищаемую информацию
BDU:2022-04907
Уязвимость реализации функции автоматического входа в систему с мобильных устройств виртуальной обучающей среды Moodle, позволяющая нарушителю провести фишинговую атаку и раскрыть защищаемую информацию
BDU:2022-04908
Уязвимость модуля LTI виртуальной обучающей среды Moodle, позволяющая нарушителю проводить фишинговые атаки или раскрыть защищаемую информацию
BDU:2022-06403
Уязвимость виртуальной обучающей среды Moodle, связанная с неправильной проверкой входных данных, позволяющая нарушителю выполнить произвольный код
BDU:2022-06405
Уязвимость виртуальной обучающей среды Moodle, связанная с недостаточной проверкой входных данных, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2024-11-21
CVE-2022-30596
A flaw was found in moodle where ID numbers displayed when bulk allocating markers to assignments required additional sanitizing to prevent a stored XSS risk.
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-74204
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-74204
- https://bugzilla.redhat.com/show_bug.cgi?id=2083583
- https://bugzilla.redhat.com/show_bug.cgi?id=2083583
- FEDORA-2022-bd4457bcc4
- FEDORA-2022-bd4457bcc4
- FEDORA-2022-89bfefbe48
- FEDORA-2022-89bfefbe48
- FEDORA-2022-530fdc5202
- FEDORA-2022-530fdc5202
- https://moodle.org/mod/forum/discuss.php?d=434578
- https://moodle.org/mod/forum/discuss.php?d=434578
Modified: 2024-11-21
CVE-2022-30597
A flaw was found in moodle where the description user field was not hidden when being set as a hidden user field.
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-74318
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-74318
- https://bugzilla.redhat.com/show_bug.cgi?id=2083585
- https://bugzilla.redhat.com/show_bug.cgi?id=2083585
- FEDORA-2022-bd4457bcc4
- FEDORA-2022-bd4457bcc4
- FEDORA-2022-89bfefbe48
- FEDORA-2022-89bfefbe48
- FEDORA-2022-530fdc5202
- FEDORA-2022-530fdc5202
- https://moodle.org/mod/forum/discuss.php?d=434579
- https://moodle.org/mod/forum/discuss.php?d=434579
Modified: 2024-11-21
CVE-2022-30598
A flaw was found in moodle where global search results could include author information on some activities where a user may not otherwise have access to it.
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-71623
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-71623
- https://bugzilla.redhat.com/show_bug.cgi?id=2083592
- https://bugzilla.redhat.com/show_bug.cgi?id=2083592
- FEDORA-2022-bd4457bcc4
- FEDORA-2022-bd4457bcc4
- FEDORA-2022-89bfefbe48
- FEDORA-2022-89bfefbe48
- FEDORA-2022-530fdc5202
- FEDORA-2022-530fdc5202
- https://moodle.org/mod/forum/discuss.php?d=434580
- https://moodle.org/mod/forum/discuss.php?d=434580
Modified: 2024-11-21
CVE-2022-30599
A flaw was found in moodle where an SQL injection risk was identified in Badges code relating to configuring criteria.
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-74333
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-74333
- https://bugzilla.redhat.com/show_bug.cgi?id=2083610
- https://bugzilla.redhat.com/show_bug.cgi?id=2083610
- FEDORA-2022-bd4457bcc4
- FEDORA-2022-bd4457bcc4
- FEDORA-2022-89bfefbe48
- FEDORA-2022-89bfefbe48
- FEDORA-2022-530fdc5202
- FEDORA-2022-530fdc5202
- https://moodle.org/mod/forum/discuss.php?d=434581
- https://moodle.org/mod/forum/discuss.php?d=434581
Modified: 2024-11-21
CVE-2022-30600
A flaw was found in moodle where logic used to count failed login attempts could result in the account lockout threshold being bypassed.
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-73736
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-73736
- https://bugzilla.redhat.com/show_bug.cgi?id=2083613
- https://bugzilla.redhat.com/show_bug.cgi?id=2083613
- FEDORA-2022-bd4457bcc4
- FEDORA-2022-bd4457bcc4
- FEDORA-2022-89bfefbe48
- FEDORA-2022-89bfefbe48
- FEDORA-2022-530fdc5202
- FEDORA-2022-530fdc5202
- https://moodle.org/mod/forum/discuss.php?d=434582
- https://moodle.org/mod/forum/discuss.php?d=434582
Modified: 2024-11-21
CVE-2022-35649
The vulnerability was found in Moodle, occurs due to improper input validation when parsing PostScript code. An omitted execution parameter results in a remote code execution risk for sites running GhostScript versions older than 9.50. Successful exploitation of this vulnerability may result in complete compromise of vulnerable system.
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-75044
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-75044
- https://bugzilla.redhat.com/show_bug.cgi?id=2106273
- https://bugzilla.redhat.com/show_bug.cgi?id=2106273
- FEDORA-2022-81ce74b2dd
- FEDORA-2022-81ce74b2dd
- FEDORA-2022-7e7ce7df2e
- FEDORA-2022-7e7ce7df2e
- https://moodle.org/mod/forum/discuss.php?d=436456
- https://moodle.org/mod/forum/discuss.php?d=436456
Modified: 2024-11-21
CVE-2022-35650
The vulnerability was found in Moodle, occurs due to input validation error when importing lesson questions. This insufficient path checks results in arbitrary file read risk. This vulnerability allows a remote attacker to perform directory traversal attacks. The capability to access this feature is only available to teachers, managers and admins by default.
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-72029
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-72029
- https://bugzilla.redhat.com/show_bug.cgi?id=2106274
- https://bugzilla.redhat.com/show_bug.cgi?id=2106274
- FEDORA-2022-81ce74b2dd
- FEDORA-2022-81ce74b2dd
- FEDORA-2022-7e7ce7df2e
- FEDORA-2022-7e7ce7df2e
- https://moodle.org/mod/forum/discuss.php?d=436457
- https://moodle.org/mod/forum/discuss.php?d=436457
Modified: 2024-11-21
CVE-2022-35651
A stored XSS and blind SSRF vulnerability was found in Moodle, occurs due to insufficient sanitization of user-supplied data in the SCORM track details. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website to steal potentially sensitive information, change appearance of the web page, can perform phishing and drive-by-download attacks.
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-71921
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-71921
- https://bugzilla.redhat.com/show_bug.cgi?id=2106275
- https://bugzilla.redhat.com/show_bug.cgi?id=2106275
- FEDORA-2022-81ce74b2dd
- FEDORA-2022-81ce74b2dd
- FEDORA-2022-7e7ce7df2e
- FEDORA-2022-7e7ce7df2e
- https://moodle.org/mod/forum/discuss.php?d=436458
- https://moodle.org/mod/forum/discuss.php?d=436458
Modified: 2024-11-21
CVE-2022-35652
An open redirect issue was found in Moodle due to improper sanitization of user-supplied data in mobile auto-login feature. A remote attacker can create a link that leads to a trusted website, however, when clicked, it redirects the victims to arbitrary URL/domain. Successful exploitation of this vulnerability may allow a remote attacker to perform a phishing attack and steal potentially sensitive information.
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-72171
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-72171
- https://bugzilla.redhat.com/show_bug.cgi?id=2106276
- https://bugzilla.redhat.com/show_bug.cgi?id=2106276
- FEDORA-2022-81ce74b2dd
- FEDORA-2022-81ce74b2dd
- FEDORA-2022-7e7ce7df2e
- FEDORA-2022-7e7ce7df2e
- https://moodle.org/mod/forum/discuss.php?d=436459
- https://moodle.org/mod/forum/discuss.php?d=436459
Modified: 2024-11-21
CVE-2022-35653
A reflected XSS issue was identified in the LTI module of Moodle. The vulnerability exists due to insufficient sanitization of user-supplied data in the LTI module. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in user's browser in context of vulnerable website to steal potentially sensitive information, change appearance of the web page, can perform phishing and drive-by-download attacks. This vulnerability does not impact authenticated users.
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-72299
- http://git.moodle.org/gw?p=moodle.git&a=search&h=HEAD&st=commit&s=MDL-72299
- https://bugzilla.redhat.com/show_bug.cgi?id=2106277
- https://bugzilla.redhat.com/show_bug.cgi?id=2106277
- FEDORA-2022-81ce74b2dd
- FEDORA-2022-81ce74b2dd
- FEDORA-2022-7e7ce7df2e
- FEDORA-2022-7e7ce7df2e
- https://moodle.org/mod/forum/discuss.php?d=436460
- https://moodle.org/mod/forum/discuss.php?d=436460
Package jobe updated to version 1.6.7-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-4297
A vulnerability has been found in trampgeek jobe up to 1.6.4 and classified as problematic. This vulnerability affects the function runs_post of the file application/controllers/Restapi.php. The manipulation of the argument sourcefilename leads to an unknown weakness. Upgrading to version 1.6.5 is able to address this issue. The patch is identified as 694da5013dbecc8d30dd83e2a83e78faadf93771. It is recommended to upgrade the affected component. VDB-217174 is the identifier assigned to this vulnerability.
- https://github.com/trampgeek/jobe/commit/694da5013dbecc8d30dd83e2a83e78faadf93771
- https://github.com/trampgeek/jobe/commit/694da5013dbecc8d30dd83e2a83e78faadf93771
- https://github.com/trampgeek/jobe/issues/46
- https://github.com/trampgeek/jobe/issues/46
- https://vuldb.com/?ctiid.217174
- https://vuldb.com/?ctiid.217174
- https://vuldb.com/?id.217174
- https://vuldb.com/?id.217174
Package devscripts updated to version 2.22.2-alt2 for branch sisyphus_e2k.
Closed bugs
Непрописанный файловый конфликт с пакетом dmd
Package nss-mdns updated to version 0.15.1-alt2 for branch sisyphus_e2k.
Closed bugs
В модуле mdns4_minimal системы nsswitch захардкожен неправильный адрес сокета avahi
Package opengostfont updated to version 0.3-alt4 for branch sisyphus_e2k.
Closed bugs
Мета пакет opengostfont не имеет смысла
Package libtasn1 updated to version 4.19.0-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2022-06694
Уязвимость функции asn1_encode_simple_der() библиотеки Libtasn1, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-46848
GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der.
- https://bugs.gentoo.org/866237
- https://bugs.gentoo.org/866237
- https://gitlab.com/gnutls/libtasn1/-/commit/44a700d2051a666235748970c2df047ff207aeb5
- https://gitlab.com/gnutls/libtasn1/-/commit/44a700d2051a666235748970c2df047ff207aeb5
- https://gitlab.com/gnutls/libtasn1/-/issues/32
- https://gitlab.com/gnutls/libtasn1/-/issues/32
- [debian-lts-announce] 20230109 [SECURITY] [DLA 3263-1] libtasn1-6 security update
- [debian-lts-announce] 20230109 [SECURITY] [DLA 3263-1] libtasn1-6 security update
- FEDORA-2022-3c933ffaca
- FEDORA-2022-3c933ffaca
- FEDORA-2022-3f9ee1ad91
- FEDORA-2022-3f9ee1ad91
- FEDORA-2022-061f857481
- FEDORA-2022-061f857481
- FEDORA-2022-19056934a7
- FEDORA-2022-19056934a7
- https://security.netapp.com/advisory/ntap-20221118-0006/
- https://security.netapp.com/advisory/ntap-20221118-0006/
Package nextcloud updated to version 24.0.4-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-41233
Nextcloud text is a collaborative document editing using Markdown built for the nextcloud server. Due to an issue with the Nextcloud Text application, which is by default shipped with Nextcloud Server, an attacker is able to access the folder names of "File Drop". For successful exploitation an attacker requires knowledge of the sharing link. It is recommended that users upgrade their Nextcloud Server to 20.0.14, 21.0.6 or 22.2.1. Users unable to upgrade should disable the Nextcloud Text application in the application settings.
Modified: 2024-11-21
CVE-2021-41239
Nextcloud server is a self hosted system designed to provide cloud style services. In affected versions the User Status API did not consider the user enumeration settings by the administrator. This allowed a user to enumerate other users on the instance, even when user listings where disabled. It is recommended that the Nextcloud Server is upgraded to 20.0.14, 21.0.6 or 22.2.1. There are no known workarounds.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g722-cm3h-8wrx
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-g722-cm3h-8wrx
- https://github.com/nextcloud/server/issues/27122
- https://github.com/nextcloud/server/issues/27122
- https://github.com/nextcloud/server/pull/29260
- https://github.com/nextcloud/server/pull/29260
- GLSA-202208-17
- GLSA-202208-17
Modified: 2024-11-21
CVE-2021-41241
Nextcloud server is a self hosted system designed to provide cloud style services. The groupfolders application for Nextcloud allows sharing a folder with a group of people. In addition, it allows setting "advanced permissions" on subfolders, for example, a user could be granted access to the groupfolder but not specific subfolders. Due to a lacking permission check in affected versions, a user could still access these subfolders by copying the groupfolder to another location. It is recommended that the Nextcloud Server is upgraded to 20.0.14, 21.0.6 or 22.2.1. Users unable to upgrade should disable the "groupfolders" application in the admin settings.
- https://github.com/nextcloud/groupfolders/issues/1692
- https://github.com/nextcloud/groupfolders/issues/1692
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-m4wp-r357-4q94
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-m4wp-r357-4q94
- https://github.com/nextcloud/server/pull/29362
- https://github.com/nextcloud/server/pull/29362
- GLSA-202208-17
- GLSA-202208-17
Modified: 2024-11-21
CVE-2022-24741
Nextcloud server is an open source, self hosted cloud style services platform. In affected versions an attacker can cause a denial of service by uploading specially crafted files which will cause the server to allocate too much memory / CPU. It is recommended that the Nextcloud Server is upgraded to 21.0.8 , 22.2.4 or 23.0.1. Users unable to upgrade should disable preview generation with the `'enable_previews'` config flag.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jf3h-xf4q-mh89
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-jf3h-xf4q-mh89
- https://github.com/nextcloud/server/pull/30291
- https://github.com/nextcloud/server/pull/30291
- https://hackerone.com/reports/1261225
- https://hackerone.com/reports/1261225
- GLSA-202208-17
- GLSA-202208-17
Modified: 2024-11-21
CVE-2022-24888
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Prior to versions 20.0.14.4, 21.0.8, 22.2.4, and 23.0.1, it is possible to create files and folders that have leading and trailing \n, \r, \t, and \v characters. The server rejects files and folders that have these characters in the middle of their names, so this might be an opportunity for injection. This issue is fixed in versions 20.0.14.4, 21.0.8, 22.2.4, and 23.0.1. There are currently no known workarounds.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-w3h6-p64h-q9jp
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-w3h6-p64h-q9jp
- https://github.com/nextcloud/server/pull/29895
- https://github.com/nextcloud/server/pull/29895
- https://hackerone.com/reports/1402249
- https://hackerone.com/reports/1402249
- GLSA-202208-17
- GLSA-202208-17
Modified: 2024-11-21
CVE-2022-24889
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Prior to versions 21.0.8, 22.2.4, and 23.0.1, it is possible to trick administrators into enabling "recommended" apps for the Nextcloud server that they do not need, thus expanding their attack surface unnecessarily. This issue is fixed in versions 21.0.8 , 22.2.4, and 23.0.1.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5vw6-6prg-gvw6
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-5vw6-6prg-gvw6
- https://github.com/nextcloud/server/pull/30615
- https://github.com/nextcloud/server/pull/30615
- https://hackerone.com/reports/1403614
- https://hackerone.com/reports/1403614
- GLSA-202208-17
- GLSA-202208-17
Modified: 2024-11-21
CVE-2022-29163
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Prior to versions 22.2.6 and 23.0.3, a user can create a link that is not password protected even if the administrator requires links to be password protected. Versions 22.2.6 and 23.0.3 contain a patch for this issue. There are currently no known workarounds.
- https://github.com/nextcloud/circles/pull/866
- https://github.com/nextcloud/circles/pull/866
- https://github.com/nextcloud/circles/pull/926
- https://github.com/nextcloud/circles/pull/926
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-pwjv-h37v-c4fx
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-pwjv-h37v-c4fx
- https://hackerone.com/reports/1406926
- https://hackerone.com/reports/1406926
Modified: 2024-11-21
CVE-2022-29243
Nextcloud Server is the file server software for Nextcloud, a self-hosted productivity platform. Prior to versions 22.2.7 and 23.0.4, missing input-size validation of new session names allows users to create app passwords with long names. These long names are then loaded into memory on usage, resulting in impacted performance. Versions 22.2.7 and 23.0.4 contain a fix for this issue. There are currently no known workarounds available.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7cwm-qph5-4h5w
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-7cwm-qph5-4h5w
- https://github.com/nextcloud/server/pull/31658
- https://github.com/nextcloud/server/pull/31658
- https://hackerone.com/reports/1153138
- https://hackerone.com/reports/1153138
- GLSA-202208-17
- GLSA-202208-17
Modified: 2024-11-21
CVE-2022-31014
Nextcloud server is an open source personal cloud server. Affected versions were found to be vulnerable to SMTP command injection. The impact varies based on which commands are supported by the backend SMTP server. However, the main risk here is that the attacker can then hijack an already-authenticated SMTP session and run arbitrary SMTP commands as the email user, such as sending emails to other users, changing the FROM user, and so on. As before, this depends on the configuration of the server itself, but newlines should be sanitized to mitigate such arbitrary SMTP command injection. It is recommended that the Nextcloud Server is upgraded to 22.2.8 , 23.0.5 or 24.0.1. There are no known workarounds for this issue.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-264h-3v4w-6xh2
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-264h-3v4w-6xh2
- https://github.com/nextcloud/server/pull/32428
- https://github.com/nextcloud/server/pull/32428
- https://hackerone.com/reports/1516377
- https://hackerone.com/reports/1516377
Modified: 2024-11-21
CVE-2022-31118
Nextcloud server is an open source personal cloud solution. In affected versions an attacker could brute force to find if federated sharing is being used and potentially try to brute force access tokens for federated shares (`a-zA-Z0-9` ^ 15). It is recommended that the Nextcloud Server is upgraded to 22.2.9, 23.0.6 or 24.0.2. Users unable to upgrade may disable federated sharing via the Admin Sharing settings in `index.php/settings/admin/sharing`.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2vwh-5v93-3vcq
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-2vwh-5v93-3vcq
- https://github.com/nextcloud/server/pull/32843/commits/6eb692da7fe73c899cb6a8d2aa045eddb1f14018
- https://github.com/nextcloud/server/pull/32843/commits/6eb692da7fe73c899cb6a8d2aa045eddb1f14018
Modified: 2024-11-21
CVE-2022-31120
Nextcloud server is an open source personal cloud solution. The audit log is used to get a full trail of the actions which has been incompletely populated. In affected versions federated share events were not properly logged which would allow brute force attacks to go unnoticed. This behavior exacerbates the impact of CVE-2022-31118. It is recommended that the Nextcloud Server is upgraded to 22.2.7, 23.0.4 or 24.0.0. There are no workarounds available.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-9qvg-7fwg-722x
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-9qvg-7fwg-722x
- https://github.com/nextcloud/server/pull/31594/commits/1d8bf9a89c6856218802a1d365000a5831be8655
- https://github.com/nextcloud/server/pull/31594/commits/1d8bf9a89c6856218802a1d365000a5831be8655
- https://portal.nextcloud.com/article/using-the-audit-log-44.html
- https://portal.nextcloud.com/article/using-the-audit-log-44.html
Modified: 2024-11-21
CVE-2022-36074
Nextcloud server is an open source personal cloud product. Affected versions of this package are vulnerable to Information Exposure which fails to strip the Authorization header on HTTP downgrade. This can lead to account access exposure and compromise. It is recommended that the Nextcloud Server is upgraded to 23.0.7 or 24.0.3. It is recommended that the Nextcloud Enterprise Server is upgraded to 22.2.11, 23.0.7 or 24.0.3. There are no known workarounds for this issue.
Modified: 2024-11-21
CVE-2022-39211
Nextcloud server is an open source personal cloud platform. In affected versions it was found that locally running webservices can be found and requested erroneously. It is recommended that the Nextcloud Server is upgraded to 23.0.8 or 24.0.4. It is recommended that the Nextcloud Enterprise Server is upgraded to 22.2.10.4, 23.0.8 or 24.0.4. There are no known workarounds for this issue.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-rmf9-w497-8cq8
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-rmf9-w497-8cq8
- https://github.com/nextcloud/server/pull/32988
- https://github.com/nextcloud/server/pull/32988
- https://github.com/nextcloud/server/pull/33031
- https://github.com/nextcloud/server/pull/33031
Modified: 2024-11-21
CVE-2022-39346
Nextcloud server is an open source personal cloud server. Affected versions of nextcloud server did not properly limit user display names which could allow a malicious users to overload the backing database and cause a denial of service. It is recommended that the Nextcloud Server is upgraded to 22.2.10, 23.0.7 or 24.0.3. There are no known workarounds for this issue.
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6w9f-jgjx-4vj6
- https://github.com/nextcloud/security-advisories/security/advisories/GHSA-6w9f-jgjx-4vj6
- https://github.com/nextcloud/server/pull/33052
- https://github.com/nextcloud/server/pull/33052
- https://hackerone.com/reports/1588562
- https://hackerone.com/reports/1588562
- FEDORA-2022-902df3b060
- FEDORA-2022-902df3b060
- FEDORA-2022-98c1d712b5
- FEDORA-2022-98c1d712b5
- FEDORA-2022-49b20342c0
- FEDORA-2022-49b20342c0
Package libmodbus updated to version 3.1.7-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-0367
A heap-based buffer overflow flaw was found in libmodbus in function modbus_reply() in src/modbus.c.
- https://bugzilla.redhat.com/show_bug.cgi?id=2045571
- https://bugzilla.redhat.com/show_bug.cgi?id=2045571
- https://github.com/stephane/libmodbus/commit/b4ef4c17d618eba0adccc4c7d9e9a1ef809fc9b6
- https://github.com/stephane/libmodbus/commit/b4ef4c17d618eba0adccc4c7d9e9a1ef809fc9b6
- https://github.com/stephane/libmodbus/issues/614
- https://github.com/stephane/libmodbus/issues/614
- [debian-lts-announce] 20220904 [SECURITY] [DLA 3098-1] libmodbus security update
- [debian-lts-announce] 20220904 [SECURITY] [DLA 3098-1] libmodbus security update
Package eepm updated to version 3.26.7-alt1 for branch sisyphus_e2k.
Closed bugs
FR : %configure --enable-examples
pycharm не устанавливается
Некорректная установка atom
Некорректная установка skype
Отсутствует возможность установки master-pdf-editor на ALT Server
myoffice некорректно удаляется
Package libbotan updated to version 2.19.1-alt2.1 for branch sisyphus_e2k.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-40529
The ElGamal implementation in Botan through 2.18.1, as used in Thunderbird and other products, allows plaintext recovery because, during interaction between two cryptographic libraries, a certain dangerous combination of the prime defined by the receiver's public key, the generator defined by the receiver's public key, and the sender's ephemeral exponents can lead to a cross-configuration attack against OpenPGP.
- https://eprint.iacr.org/2021/923
- https://eprint.iacr.org/2021/923
- https://github.com/randombit/botan/pull/2790
- https://github.com/randombit/botan/pull/2790
- https://ibm.github.io/system-security-research-updates/2021/07/20/insecurity-elgamal-pt1
- https://ibm.github.io/system-security-research-updates/2021/07/20/insecurity-elgamal-pt1
- https://ibm.github.io/system-security-research-updates/2021/09/06/insecurity-elgamal-pt2
- https://ibm.github.io/system-security-research-updates/2021/09/06/insecurity-elgamal-pt2
- FEDORA-2021-8d51cac49f
- FEDORA-2021-8d51cac49f
- FEDORA-2021-14b0d97496
- FEDORA-2021-14b0d97496
- GLSA-202208-14
- GLSA-202208-14
Package mariadb updated to version 10.6.9-alt1.1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2022-00903
Уязвимость системы управления базами данных MariaDB, связана с переполнением буфера в стеке, позволяющая нарушителю выполнить произвольный код
BDU:2022-01074
Уязвимость компонента SELECT_LEX::nest_level системы управления базами данных MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-01315
Уязвимость функции BN_mod_sqrt() библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-01641
Уязвимость библиотеки zlib, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-01832
Уязвимость компонента InnoDB системы управления базами данных MariaDB и MySQL, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-01851
Уязвимость компонента InnoDB системы управления базами данных MariaDB и MySQL, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02593
Уязвимость компонента decimal_bin_size системы управления базами данных MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02594
Уязвимость компонента sql/sql_class.cc системы управления базами данных MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-02595
Уязвимость компонента Used_tables_and_const_cache::used_tables_and_const_cache_join системы управления базами данных MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-03726
Уязвимость компонента sql/sql_window.cc системы управления базами данных MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-03789
Уязвимость функции xbstream_open системы управления базами данных MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-03790
Уязвимость метода log_statement_ex (plugin/server_audit/server_audit.c) системы управления базами данных MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-03791
Уязвимость метода create_worker_threads системы управления базами данных MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-03792
Уязвимость метода create_worker_threads системы управления базами данных MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-04064
Уязвимость функции Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort системы управления базами данных MariaDB, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность защищаемой информации
BDU:2022-04068
Уязвимость функции Item_args::walk_args системы управления базами данных MariaDB, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность защищаемой информации
BDU:2022-04075
Уязвимость функции prepare_inplace_add_virtual системы управления базами данных MariaDB, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность защищаемой информации
BDU:2022-04076
Уязвимость функции Item_func_in::cleanup/Item::cleanup_processor системы управления базами данных MariaDB, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность защищаемой информации
BDU:2022-04078
Уязвимость компонента sub_select системы управления базами данных MariaDB, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность защищаемой информации
BDU:2022-04079
Уязвимость функции st_select_lex_unit::exclude_level системы управления базами данных MariaDB, позволяющая нарушителю оказать воздействие на доступность защищаемой информации
BDU:2022-04080
Уязвимость функции Item_subselect::init_expr_cache_tracker системы управления базами данных MariaDB, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность защищаемой информации
BDU:2022-04082
Уязвимость функции __interceptor_memset (/libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc) системы управления базами данных MariaDB, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность защищаемой информации
BDU:2022-04087
Уязвимость функции Item_field::fix_outer_field системы управления базами данных MariaDB, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность, доступность защищаемой информации
BDU:2022-05553
Уязвимость компонента dict0dict.cc системы управления базами данных MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05677
Уязвимость компонента InnoDB СУБД MariaDB, позволяющая нарушителю нарушить целостность данных, а также вызвать отказ в обслуживании
BDU:2022-05691
Уязвимость компонента sql_lex.cc СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05704
Уязвимость СУБД MariaDB, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05710
Уязвимость компонента ha_maria::extra СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05712
Уязвимость компонента sql_parse.cc СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05752
Уязвимость компонента set_var.cc СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05755
Уязвимость компонентов find_field_in_tables и find_order_in_list СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05757
Уязвимость СУБД MariaDB, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06420
Уязвимость компонента C API системы управления базами данных MySQL Server, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06894
Уязвимость СУБД MariaDB, связанная с использованием памяти после её освобождения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06904
Уязвимость компонента my_strcasecmp_8bit СУБД MariaDB, связанная с использованием памяти после её освобождения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06906
Уязвимость компонента Item_subselect::init_expr_cache_tracker СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06907
Уязвимость компонента sql/item_cmpfunc.cc СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06909
Уязвимость функции Binary_string::free_buffer() компонента /sql/sql_string.h СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06910
Уязвимость функции Binary_string::free_buffer() компонента /sql/sql_string.h СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06913
Уязвимость компонента /row/row0mysql.cc СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06914
Уязвимость функции VDec::VDec компонента /sql/sql_type.cc СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06915
Уязвимость компонента Create_tmp_table::finalize СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06916
Уязвимость компонента Field::set_default СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06919
Уязвимость компонента sql/item_func.cc СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06922
Уязвимость компонента Item_args::walk_arg СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06923
Уязвимость компонента Arg_comparator::compare_real_fixed СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06924
Уязвимость компонента my_decimal::operator СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06927
Уязвимость компонента Item_func_in::cleanup() СУБД MariaDB, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-03-28
CVE-2018-25032
zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.
- 20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina
- 20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- 20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4
- 20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4
- [oss-security] 20220325 Re: zlib memory corruption on deflate (i.e. compress)
- [oss-security] 20220325 Re: zlib memory corruption on deflate (i.e. compress)
- [oss-security] 20220326 Re: zlib memory corruption on deflate (i.e. compress)
- [oss-security] 20220326 Re: zlib memory corruption on deflate (i.e. compress)
- https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf
- https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
- https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
- https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
- https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
- https://github.com/madler/zlib/issues/605
- https://github.com/madler/zlib/issues/605
- [debian-lts-announce] 20220402 [SECURITY] [DLA 2968-1] zlib security update
- [debian-lts-announce] 20220402 [SECURITY] [DLA 2968-1] zlib security update
- [debian-lts-announce] 20220507 [SECURITY] [DLA 2993-1] libz-mingw-w64 security update
- [debian-lts-announce] 20220507 [SECURITY] [DLA 2993-1] libz-mingw-w64 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- FEDORA-2022-b58a85e167
- FEDORA-2022-b58a85e167
- FEDORA-2022-61cf1c64f6
- FEDORA-2022-61cf1c64f6
- FEDORA-2022-3a92250fd5
- FEDORA-2022-3a92250fd5
- FEDORA-2022-413a80a102
- FEDORA-2022-413a80a102
- FEDORA-2022-12b89e2aad
- FEDORA-2022-12b89e2aad
- FEDORA-2022-dbd2935e44
- FEDORA-2022-dbd2935e44
- GLSA-202210-42
- GLSA-202210-42
- https://security.netapp.com/advisory/ntap-20220526-0009/
- https://security.netapp.com/advisory/ntap-20220526-0009/
- https://security.netapp.com/advisory/ntap-20220729-0004/
- https://security.netapp.com/advisory/ntap-20220729-0004/
- https://support.apple.com/kb/HT213255
- https://support.apple.com/kb/HT213255
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213257
- https://support.apple.com/kb/HT213257
- DSA-5111
- DSA-5111
- https://www.openwall.com/lists/oss-security/2022/03/24/1
- https://www.openwall.com/lists/oss-security/2022/03/24/1
- https://www.openwall.com/lists/oss-security/2022/03/28/1
- https://www.openwall.com/lists/oss-security/2022/03/28/1
- https://www.openwall.com/lists/oss-security/2022/03/28/3
- https://www.openwall.com/lists/oss-security/2022/03/28/3
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
Modified: 2024-11-21
CVE-2021-2372
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.34 and prior and 8.0.25 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
- FEDORA-2021-acef1dc8cf
- FEDORA-2021-acef1dc8cf
- FEDORA-2021-dc4299a8d0
- FEDORA-2021-dc4299a8d0
- FEDORA-2021-df40c41094
- FEDORA-2021-df40c41094
- FEDORA-2021-72d5918529
- FEDORA-2021-72d5918529
- https://security.netapp.com/advisory/ntap-20210723-0001/
- https://security.netapp.com/advisory/ntap-20210723-0001/
- https://www.oracle.com/security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpujul2021.html
Modified: 2024-11-21
CVE-2021-2389
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.34 and prior and 8.0.25 and prior. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 5.9 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H).
- FEDORA-2021-acef1dc8cf
- FEDORA-2021-acef1dc8cf
- FEDORA-2021-72d5918529
- FEDORA-2021-72d5918529
- https://security.netapp.com/advisory/ntap-20210723-0001/
- https://security.netapp.com/advisory/ntap-20210723-0001/
- https://www.oracle.com/security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpujul2021.html
- https://www.zerodayinitiative.com/advisories/ZDI-21-880/
- https://www.zerodayinitiative.com/advisories/ZDI-21-880/
Modified: 2024-11-21
CVE-2021-35604
Vulnerability in the MySQL Server product of Oracle MySQL (component: InnoDB). Supported versions that are affected are 5.7.35 and prior and 8.0.26 and prior. Easily exploitable vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server as well as unauthorized update, insert or delete access to some of MySQL Server accessible data. CVSS 3.1 Base Score 5.5 (Integrity and Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H).
- FEDORA-2021-acef1dc8cf
- FEDORA-2021-acef1dc8cf
- FEDORA-2021-70dd0b9f5d
- FEDORA-2021-70dd0b9f5d
- FEDORA-2021-f74148c6d4
- FEDORA-2021-f74148c6d4
- FEDORA-2021-72d5918529
- FEDORA-2021-72d5918529
- FEDORA-2021-46dc82116b
- FEDORA-2021-46dc82116b
- https://security.netapp.com/advisory/ntap-20211022-0003/
- https://security.netapp.com/advisory/ntap-20211022-0003/
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
Modified: 2024-11-21
CVE-2021-46658
save_window_function_values in MariaDB before 10.6.3 allows an application crash because of incorrect handling of with_window_func=true for a subquery.
Modified: 2024-11-21
CVE-2021-46659
MariaDB before 10.7.2 allows an application crash because it does not recognize that SELECT_LEX::nest_level is local to each VIEW.
- https://jira.mariadb.org/browse/MDEV-25631
- https://jira.mariadb.org/browse/MDEV-25631
- FEDORA-2022-03350936ee
- FEDORA-2022-03350936ee
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-263f7cc483
- FEDORA-2022-263f7cc483
- https://mariadb.com/kb/en/security/
- https://mariadb.com/kb/en/security/
- https://security.netapp.com/advisory/ntap-20220311-0003/
- https://security.netapp.com/advisory/ntap-20220311-0003/
Modified: 2024-11-21
CVE-2021-46661
MariaDB through 10.5.9 allows an application crash in find_field_in_tables and find_order_in_list via an unused common table expression (CTE).
- https://jira.mariadb.org/browse/MDEV-25766
- https://jira.mariadb.org/browse/MDEV-25766
- FEDORA-2022-03350936ee
- FEDORA-2022-03350936ee
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-263f7cc483
- FEDORA-2022-263f7cc483
- https://mariadb.com/kb/en/security/
- https://mariadb.com/kb/en/security/
- https://security.netapp.com/advisory/ntap-20220221-0002/
- https://security.netapp.com/advisory/ntap-20220221-0002/
Modified: 2024-11-21
CVE-2021-46662
MariaDB through 10.5.9 allows a set_var.cc application crash via certain uses of an UPDATE statement in conjunction with a nested subquery.
Modified: 2024-11-21
CVE-2021-46663
MariaDB through 10.5.13 allows a ha_maria::extra application crash via certain SELECT statements.
- https://jira.mariadb.org/browse/MDEV-26351
- https://jira.mariadb.org/browse/MDEV-26351
- FEDORA-2022-03350936ee
- FEDORA-2022-03350936ee
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-263f7cc483
- FEDORA-2022-263f7cc483
- https://mariadb.com/kb/en/security/
- https://mariadb.com/kb/en/security/
- https://security.netapp.com/advisory/ntap-20220221-0002/
- https://security.netapp.com/advisory/ntap-20220221-0002/
Modified: 2024-11-21
CVE-2021-46664
MariaDB through 10.5.9 allows an application crash in sub_select_postjoin_aggr for a NULL value of aggr.
- https://jira.mariadb.org/browse/MDEV-25761
- https://jira.mariadb.org/browse/MDEV-25761
- FEDORA-2022-03350936ee
- FEDORA-2022-03350936ee
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-263f7cc483
- FEDORA-2022-263f7cc483
- https://mariadb.com/kb/en/security/
- https://mariadb.com/kb/en/security/
- https://security.netapp.com/advisory/ntap-20220221-0002/
- https://security.netapp.com/advisory/ntap-20220221-0002/
Modified: 2024-11-21
CVE-2021-46665
MariaDB through 10.5.9 allows a sql_parse.cc application crash because of incorrect used_tables expectations.
- https://jira.mariadb.org/browse/MDEV-25636
- https://jira.mariadb.org/browse/MDEV-25636
- FEDORA-2022-03350936ee
- FEDORA-2022-03350936ee
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-263f7cc483
- FEDORA-2022-263f7cc483
- https://mariadb.com/kb/en/security/
- https://mariadb.com/kb/en/security/
- https://security.netapp.com/advisory/ntap-20220221-0002/
- https://security.netapp.com/advisory/ntap-20220221-0002/
Modified: 2024-11-21
CVE-2021-46667
MariaDB before 10.6.5 has a sql_lex.cc integer overflow, leading to an application crash.
- https://jira.mariadb.org/browse/MDEV-26350
- https://jira.mariadb.org/browse/MDEV-26350
- FEDORA-2022-03350936ee
- FEDORA-2022-03350936ee
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-263f7cc483
- FEDORA-2022-263f7cc483
- https://mariadb.com/kb/en/security/
- https://mariadb.com/kb/en/security/
- https://security.netapp.com/advisory/ntap-20220221-0002/
- https://security.netapp.com/advisory/ntap-20220221-0002/
Modified: 2024-11-21
CVE-2021-46668
MariaDB through 10.5.9 allows an application crash via certain long SELECT DISTINCT statements that improperly interact with storage-engine resource limitations for temporary data structures.
- https://jira.mariadb.org/browse/MDEV-25787
- https://jira.mariadb.org/browse/MDEV-25787
- FEDORA-2022-03350936ee
- FEDORA-2022-03350936ee
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-263f7cc483
- FEDORA-2022-263f7cc483
- https://mariadb.com/kb/en/security/
- https://mariadb.com/kb/en/security/
- https://security.netapp.com/advisory/ntap-20220221-0002/
- https://security.netapp.com/advisory/ntap-20220221-0002/
Modified: 2024-11-21
CVE-2021-46669
MariaDB through 10.5.9 allows attackers to trigger a convert_const_to_int use-after-free when the BIGINT data type is used.
- https://jira.mariadb.org/browse/MDEV-25638
- https://jira.mariadb.org/browse/MDEV-25638
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- FEDORA-2022-25dcba7104
- FEDORA-2022-25dcba7104
- FEDORA-2022-e6dc7ed871
- FEDORA-2022-e6dc7ed871
- https://mariadb.com/kb/en/security/
- https://mariadb.com/kb/en/security/
- https://security.netapp.com/advisory/ntap-20220221-0002/
- https://security.netapp.com/advisory/ntap-20220221-0002/
Modified: 2024-11-21
CVE-2022-0778
The BN_mod_sqrt() function, which computes a modular square root, contains a bug that can cause it to loop forever for non-prime moduli. Internally this function is used when parsing certificates that contain elliptic curve public keys in compressed form or explicit elliptic curve parameters with a base point encoded in compressed form. It is possible to trigger the infinite loop by crafting a certificate that has invalid explicit curve parameters. Since certificate parsing happens prior to verification of the certificate signature, any process that parses an externally supplied certificate may thus be subject to a denial of service attack. The infinite loop can also be reached when parsing crafted private keys as they can contain explicit elliptic curve parameters. Thus vulnerable situations include: - TLS clients consuming server certificates - TLS servers consuming client certificates - Hosting providers taking certificates or private keys from customers - Certificate authorities parsing certification requests from subscribers - Anything else which parses ASN.1 elliptic curve parameters Also any other applications that use the BN_mod_sqrt() where the attacker can control the parameter values are vulnerable to this DoS issue. In the OpenSSL 1.0.2 version the public key is not parsed during initial parsing of the certificate which makes it slightly harder to trigger the infinite loop. However any operation which requires the public key from the certificate will trigger the infinite loop. In particular the attacker can use a self-signed certificate to trigger the loop during verification of the certificate signature. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0. It was addressed in the releases of 1.1.1n and 3.0.2 on the 15th March 2022. Fixed in OpenSSL 3.0.2 (Affected 3.0.0,3.0.1). Fixed in OpenSSL 1.1.1n (Affected 1.1.1-1.1.1m). Fixed in OpenSSL 1.0.2zd (Affected 1.0.2-1.0.2zc).
- http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html
- http://packetstormsecurity.com/files/167344/OpenSSL-1.0.2-1.1.1-3.0-BN_mod_sqrt-Infinite-Loop.html
- 20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina
- 20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- 20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4
- 20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4
- https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-712929.pdf
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=3118eb64934499d93db3230748a452351d1d9a65
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=380085481c64de749a6dd25cdf0bcf4360b30f83
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246
- https://git.openssl.org/gitweb/?p=openssl.git%3Ba=commitdiff%3Bh=a466912611aa6cbdf550cd10601390e587451246
- [debian-lts-announce] 20220317 [SECURITY] [DLA 2952-1] openssl security update
- [debian-lts-announce] 20220317 [SECURITY] [DLA 2952-1] openssl security update
- [debian-lts-announce] 20220317 [SECURITY] [DLA 2953-1] openssl1.0 security update
- [debian-lts-announce] 20220317 [SECURITY] [DLA 2953-1] openssl1.0 security update
- FEDORA-2022-9e88b5d8d7
- FEDORA-2022-9e88b5d8d7
- FEDORA-2022-a5f51502f0
- FEDORA-2022-a5f51502f0
- FEDORA-2022-8bb51f6901
- FEDORA-2022-8bb51f6901
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
- https://psirt.global.sonicwall.com/vuln-detail/SNWLID-2022-0002
- GLSA-202210-02
- GLSA-202210-02
- https://security.netapp.com/advisory/ntap-20220321-0002/
- https://security.netapp.com/advisory/ntap-20220321-0002/
- https://security.netapp.com/advisory/ntap-20220429-0005/
- https://security.netapp.com/advisory/ntap-20220429-0005/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://security.netapp.com/advisory/ntap-20240621-0006/
- https://support.apple.com/kb/HT213255
- https://support.apple.com/kb/HT213255
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213257
- https://support.apple.com/kb/HT213257
- DSA-5103
- DSA-5103
- https://www.openssl.org/news/secadv/20220315.txt
- https://www.openssl.org/news/secadv/20220315.txt
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.tenable.com/security/tns-2022-06
- https://www.tenable.com/security/tns-2022-06
- https://www.tenable.com/security/tns-2022-07
- https://www.tenable.com/security/tns-2022-07
- https://www.tenable.com/security/tns-2022-08
- https://www.tenable.com/security/tns-2022-08
- https://www.tenable.com/security/tns-2022-09
- https://www.tenable.com/security/tns-2022-09
Modified: 2024-11-21
CVE-2022-21595
Vulnerability in the MySQL Server product of Oracle MySQL (component: C API). Supported versions that are affected are 5.7.36 and prior and 8.0.27 and prior. Difficult to exploit vulnerability allows high privileged attacker with network access via multiple protocols to compromise MySQL Server. Successful attacks of this vulnerability can result in unauthorized ability to cause a hang or frequently repeatable crash (complete DOS) of MySQL Server. CVSS 3.1 Base Score 4.4 (Availability impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:N/A:H).
Modified: 2024-11-21
CVE-2022-24048
MariaDB CONNECT Storage Engine Stack-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length stack-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16191.
- FEDORA-2022-03350936ee
- FEDORA-2022-03350936ee
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-263f7cc483
- FEDORA-2022-263f7cc483
- https://mariadb.com/kb/en/security/
- https://mariadb.com/kb/en/security/
- https://security.netapp.com/advisory/ntap-20220318-0004/
- https://security.netapp.com/advisory/ntap-20220318-0004/
- https://www.zerodayinitiative.com/advisories/ZDI-22-363/
- https://www.zerodayinitiative.com/advisories/ZDI-22-363/
Modified: 2024-11-21
CVE-2022-24050
MariaDB CONNECT Storage Engine Use-After-Free Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of validating the existence of an object prior to performing operations on the object. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16207.
- FEDORA-2022-03350936ee
- FEDORA-2022-03350936ee
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-263f7cc483
- FEDORA-2022-263f7cc483
- https://mariadb.com/kb/en/security/
- https://mariadb.com/kb/en/security/
- https://security.netapp.com/advisory/ntap-20220318-0004/
- https://security.netapp.com/advisory/ntap-20220318-0004/
- https://www.zerodayinitiative.com/advisories/ZDI-22-364/
- https://www.zerodayinitiative.com/advisories/ZDI-22-364/
Modified: 2024-11-21
CVE-2022-24051
MariaDB CONNECT Storage Engine Format String Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of a user-supplied string before using it as a format specifier. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16193.
- FEDORA-2022-03350936ee
- FEDORA-2022-03350936ee
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-263f7cc483
- FEDORA-2022-263f7cc483
- https://mariadb.com/kb/en/security/
- https://mariadb.com/kb/en/security/
- https://security.netapp.com/advisory/ntap-20220318-0004/
- https://security.netapp.com/advisory/ntap-20220318-0004/
- https://www.zerodayinitiative.com/advisories/ZDI-22-318/
- https://www.zerodayinitiative.com/advisories/ZDI-22-318/
Modified: 2024-11-21
CVE-2022-24052
MariaDB CONNECT Storage Engine Heap-based Buffer Overflow Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of MariaDB. Authentication is required to exploit this vulnerability. The specific flaw exists within the processing of SQL queries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of the service account. Was ZDI-CAN-16190.
- FEDORA-2022-03350936ee
- FEDORA-2022-03350936ee
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-5cfe372ab7
- FEDORA-2022-263f7cc483
- FEDORA-2022-263f7cc483
- https://mariadb.com/kb/en/security/
- https://mariadb.com/kb/en/security/
- https://security.netapp.com/advisory/ntap-20220318-0004/
- https://security.netapp.com/advisory/ntap-20220318-0004/
- https://www.zerodayinitiative.com/advisories/ZDI-22-367/
- https://www.zerodayinitiative.com/advisories/ZDI-22-367/
Modified: 2024-11-21
CVE-2022-27376
MariaDB Server v10.6.5 and below was discovered to contain an use-after-free in the component Item_args::walk_arg, which is exploited via specially crafted SQL statements.
- https://jira.mariadb.org/browse/MDEV-26354
- https://jira.mariadb.org/browse/MDEV-26354
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220519-0007/
- https://security.netapp.com/advisory/ntap-20220519-0007/
Modified: 2024-11-21
CVE-2022-27377
MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component Item_func_in::cleanup(), which is exploited via specially crafted SQL statements.
- https://jira.mariadb.org/browse/MDEV-26281
- https://jira.mariadb.org/browse/MDEV-26281
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220526-0007/
- https://security.netapp.com/advisory/ntap-20220526-0007/
Modified: 2024-11-21
CVE-2022-27378
An issue in the component Create_tmp_table::finalize of MariaDB Server v10.7 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.
- https://jira.mariadb.org/browse/MDEV-26423
- https://jira.mariadb.org/browse/MDEV-26423
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220526-0004/
- https://security.netapp.com/advisory/ntap-20220526-0004/
Modified: 2024-11-21
CVE-2022-27379
An issue in the component Arg_comparator::compare_real_fixed of MariaDB Server v10.6.2 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.
- https://jira.mariadb.org/browse/MDEV-26353
- https://jira.mariadb.org/browse/MDEV-26353
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220526-0005/
- https://security.netapp.com/advisory/ntap-20220526-0005/
Modified: 2024-11-21
CVE-2022-27380
An issue in the component my_decimal::operator= of MariaDB Server v10.6.3 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.
- https://jira.mariadb.org/browse/MDEV-26280
- https://jira.mariadb.org/browse/MDEV-26280
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220526-0007/
- https://security.netapp.com/advisory/ntap-20220526-0007/
Modified: 2024-11-21
CVE-2022-27381
An issue in the component Field::set_default of MariaDB Server v10.6 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.
- https://jira.mariadb.org/browse/MDEV-26061
- https://jira.mariadb.org/browse/MDEV-26061
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220519-0006/
- https://security.netapp.com/advisory/ntap-20220519-0006/
Modified: 2024-11-21
CVE-2022-27382
MariaDB Server v10.7 and below was discovered to contain a segmentation fault via the component Item_field::used_tables/update_depend_map_for_order.
Modified: 2024-11-21
CVE-2022-27383
MariaDB Server v10.6 and below was discovered to contain an use-after-free in the component my_strcasecmp_8bit, which is exploited via specially crafted SQL statements.
- https://jira.mariadb.org/browse/MDEV-26323
- https://jira.mariadb.org/browse/MDEV-26323
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220519-0006/
- https://security.netapp.com/advisory/ntap-20220519-0006/
Modified: 2024-11-21
CVE-2022-27384
An issue in the component Item_subselect::init_expr_cache_tracker of MariaDB Server v10.6 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.
- https://jira.mariadb.org/browse/MDEV-26047
- https://jira.mariadb.org/browse/MDEV-26047
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220519-0006/
- https://security.netapp.com/advisory/ntap-20220519-0006/
Modified: 2024-11-21
CVE-2022-27385
An issue in the component Used_tables_and_const_cache::used_tables_and_const_cache_join of MariaDB Server v10.7 and below was discovered to allow attackers to cause a Denial of Service (DoS) via specially crafted SQL statements.
Modified: 2024-11-21
CVE-2022-27386
MariaDB Server v10.7 and below was discovered to contain a segmentation fault via the component sql/sql_class.cc.
- https://jira.mariadb.org/browse/MDEV-26406
- https://jira.mariadb.org/browse/MDEV-26406
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220526-0004/
- https://security.netapp.com/advisory/ntap-20220526-0004/
Modified: 2024-11-21
CVE-2022-27387
MariaDB Server v10.7 and below was discovered to contain a global buffer overflow in the component decimal_bin_size, which is exploited via specially crafted SQL statements.
- https://jira.mariadb.org/browse/MDEV-26422
- https://jira.mariadb.org/browse/MDEV-26422
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220526-0004/
- https://security.netapp.com/advisory/ntap-20220526-0004/
Modified: 2024-11-21
CVE-2022-27444
MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_subselect.cc.
Modified: 2024-11-21
CVE-2022-27445
MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/sql_window.cc.
- https://jira.mariadb.org/browse/MDEV-28081
- https://jira.mariadb.org/browse/MDEV-28081
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220526-0006/
- https://security.netapp.com/advisory/ntap-20220526-0006/
Modified: 2024-11-21
CVE-2022-27446
MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_cmpfunc.h.
Modified: 2024-11-21
CVE-2022-27447
MariaDB Server v10.9 and below was discovered to contain a use-after-free via the component Binary_string::free_buffer() at /sql/sql_string.h.
- https://jira.mariadb.org/browse/MDEV-28099
- https://jira.mariadb.org/browse/MDEV-28099
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220526-0006/
- https://security.netapp.com/advisory/ntap-20220526-0006/
Modified: 2024-11-21
CVE-2022-27448
There is an Assertion failure in MariaDB Server v10.9 and below via 'node->pcur->rel_pos == BTR_PCUR_ON' at /row/row0mysql.cc.
- https://jira.mariadb.org/browse/MDEV-28095
- https://jira.mariadb.org/browse/MDEV-28095
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220526-0006/
- https://security.netapp.com/advisory/ntap-20220526-0006/
Modified: 2024-11-21
CVE-2022-27449
MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_func.cc:148.
- https://jira.mariadb.org/browse/MDEV-28089
- https://jira.mariadb.org/browse/MDEV-28089
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220526-0006/
- https://security.netapp.com/advisory/ntap-20220526-0006/
Modified: 2024-11-21
CVE-2022-27451
MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/field_conv.cc.
Modified: 2024-11-21
CVE-2022-27452
MariaDB Server v10.9 and below was discovered to contain a segmentation fault via the component sql/item_cmpfunc.cc.
- https://jira.mariadb.org/browse/MDEV-28090
- https://jira.mariadb.org/browse/MDEV-28090
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220526-0006/
- https://security.netapp.com/advisory/ntap-20220526-0006/
Modified: 2024-11-21
CVE-2022-27455
MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component my_wildcmp_8bit_impl at /strings/ctype-simple.c.
Modified: 2024-11-21
CVE-2022-27456
MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component VDec::VDec at /sql/sql_type.cc.
- https://jira.mariadb.org/browse/MDEV-28093
- https://jira.mariadb.org/browse/MDEV-28093
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220526-0007/
- https://security.netapp.com/advisory/ntap-20220526-0007/
Modified: 2024-11-21
CVE-2022-27457
MariaDB Server v10.6.3 and below was discovered to contain an use-after-free in the component my_mb_wc_latin1 at /strings/ctype-latin1.c.
Modified: 2024-05-02
CVE-2022-27458
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: CVE-2022-27447. Reason: This candidate is a reservation duplicate of CVE-2022-27447. Notes: All CVE users should reference CVE-2022-27447 instead of this candidate.
Modified: 2024-11-21
CVE-2022-31621
MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_xbstream.cc, when an error occurs (stream_ctxt->dest_file == NULL) while executing the method xbstream_open, the held lock is not released correctly, which allows local users to trigger a denial of service due to the deadlock. Note: The vendor argues this is just an improper locking bug and not a vulnerability with adverse effects.
- https://github.com/MariaDB/server/commit/b1351c15946349f9daa7e5297fb2ac6f3139e4a8
- https://github.com/MariaDB/server/commit/b1351c15946349f9daa7e5297fb2ac6f3139e4a8
- https://jira.mariadb.org/browse/MDEV-26561
- https://jira.mariadb.org/browse/MDEV-26561
- https://jira.mariadb.org/browse/MDEV-26574
- https://jira.mariadb.org/browse/MDEV-26574
- https://jira.mariadb.org/browse/MDEV-26574?filter=-2
- https://jira.mariadb.org/browse/MDEV-26574?filter=-2
- https://security.netapp.com/advisory/ntap-20220707-0006/
- https://security.netapp.com/advisory/ntap-20220707-0006/
Modified: 2024-11-21
CVE-2022-31622
MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_compress.cc, when an error occurs (pthread_create returns a nonzero value) while executing the method create_worker_threads, the held lock is not released correctly, which allows local users to trigger a denial of service due to the deadlock. Note: The vendor argues this is just an improper locking bug and not a vulnerability with adverse effects.
- https://github.com/MariaDB/server/commit/e1eb39a446c30b8459c39fd7f2ee1c55a36e97d2
- https://github.com/MariaDB/server/commit/e1eb39a446c30b8459c39fd7f2ee1c55a36e97d2
- https://jira.mariadb.org/browse/MDEV-26561
- https://jira.mariadb.org/browse/MDEV-26561
- https://jira.mariadb.org/browse/MDEV-26561?filter=-2
- https://jira.mariadb.org/browse/MDEV-26561?filter=-2
- https://jira.mariadb.org/browse/MDEV-26574
- https://jira.mariadb.org/browse/MDEV-26574
- https://security.netapp.com/advisory/ntap-20220707-0006/
- https://security.netapp.com/advisory/ntap-20220707-0006/
Modified: 2024-11-21
CVE-2022-31623
MariaDB Server before 10.7 is vulnerable to Denial of Service. In extra/mariabackup/ds_compress.cc, when an error occurs (i.e., going to the err label) while executing the method create_worker_threads, the held lock thd->ctrl_mutex is not released correctly, which allows local users to trigger a denial of service due to the deadlock. Note: The vendor argues this is just an improper locking bug and not a vulnerability with adverse effects.
- https://github.com/MariaDB/server/commit/7c30bc38a588b22b01f11130cfe99e7f36accf94
- https://github.com/MariaDB/server/commit/7c30bc38a588b22b01f11130cfe99e7f36accf94
- https://github.com/MariaDB/server/pull/1938
- https://github.com/MariaDB/server/pull/1938
- https://jira.mariadb.org/browse/MDEV-26561
- https://jira.mariadb.org/browse/MDEV-26561
- https://jira.mariadb.org/browse/MDEV-26574
- https://jira.mariadb.org/browse/MDEV-26574
- https://security.netapp.com/advisory/ntap-20220707-0006/
- https://security.netapp.com/advisory/ntap-20220707-0006/
Modified: 2024-11-21
CVE-2022-31624
MariaDB Server before 10.7 is vulnerable to Denial of Service. While executing the plugin/server_audit/server_audit.c method log_statement_ex, the held lock lock_bigbuffer is not released correctly, which allows local users to trigger a denial of service due to the deadlock.
- https://github.com/MariaDB/server/commit/d627d00b13ab2f2c0954ea7b77202470cb102944
- https://github.com/MariaDB/server/commit/d627d00b13ab2f2c0954ea7b77202470cb102944
- https://jira.mariadb.org/browse/MDEV-26556?filter=-2
- https://jira.mariadb.org/browse/MDEV-26556?filter=-2
- https://security.netapp.com/advisory/ntap-20220707-0006/
- https://security.netapp.com/advisory/ntap-20220707-0006/
Modified: 2024-11-21
CVE-2022-32081
MariaDB v10.4 to v10.7 was discovered to contain an use-after-poison in prepare_inplace_add_virtual at /storage/innobase/handler/handler0alter.cc.
- https://jira.mariadb.org/browse/MDEV-26420
- https://jira.mariadb.org/browse/MDEV-26420
- FEDORA-2022-e0e9a43546
- FEDORA-2022-e0e9a43546
- FEDORA-2022-333df1c4aa
- FEDORA-2022-333df1c4aa
- FEDORA-2022-cf88f807f9
- FEDORA-2022-cf88f807f9
- https://security.netapp.com/advisory/ntap-20220818-0005/
- https://security.netapp.com/advisory/ntap-20220818-0005/
Modified: 2024-11-21
CVE-2022-32082
MariaDB v10.5 to v10.7 was discovered to contain an assertion failure at table->get_ref_count() == 0 in dict0dict.cc.
- https://jira.mariadb.org/browse/MDEV-26433
- https://jira.mariadb.org/browse/MDEV-26433
- FEDORA-2022-e0e9a43546
- FEDORA-2022-e0e9a43546
- FEDORA-2022-333df1c4aa
- FEDORA-2022-333df1c4aa
- FEDORA-2022-cf88f807f9
- FEDORA-2022-cf88f807f9
- https://security.netapp.com/advisory/ntap-20220818-0005/
- https://security.netapp.com/advisory/ntap-20220818-0005/
Modified: 2024-11-21
CVE-2022-32083
MariaDB v10.2 to v10.6.1 was discovered to contain a segmentation fault via the component Item_subselect::init_expr_cache_tracker.
- https://jira.mariadb.org/browse/MDEV-26047
- https://jira.mariadb.org/browse/MDEV-26047
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220826-0006/
- https://security.netapp.com/advisory/ntap-20220826-0006/
Modified: 2024-11-21
CVE-2022-32084
MariaDB v10.2 to v10.7 was discovered to contain a segmentation fault via the component sub_select.
- https://jira.mariadb.org/browse/MDEV-26427
- https://jira.mariadb.org/browse/MDEV-26427
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- FEDORA-2022-e0e9a43546
- FEDORA-2022-e0e9a43546
- FEDORA-2022-333df1c4aa
- FEDORA-2022-333df1c4aa
- FEDORA-2022-cf88f807f9
- FEDORA-2022-cf88f807f9
- https://security.netapp.com/advisory/ntap-20220818-0005/
- https://security.netapp.com/advisory/ntap-20220818-0005/
Modified: 2024-11-21
CVE-2022-32085
MariaDB v10.2 to v10.7 was discovered to contain a segmentation fault via the component Item_func_in::cleanup/Item::cleanup_processor.
- https://jira.mariadb.org/browse/MDEV-26407
- https://jira.mariadb.org/browse/MDEV-26407
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220818-0005/
- https://security.netapp.com/advisory/ntap-20220818-0005/
Modified: 2024-11-21
CVE-2022-32086
MariaDB v10.4 to v10.8 was discovered to contain a segmentation fault via the component Item_field::fix_outer_field.
Modified: 2024-11-21
CVE-2022-32087
MariaDB v10.2 to v10.7 was discovered to contain a segmentation fault via the component Item_args::walk_args.
- https://jira.mariadb.org/browse/MDEV-26437
- https://jira.mariadb.org/browse/MDEV-26437
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220818-0005/
- https://security.netapp.com/advisory/ntap-20220818-0005/
Modified: 2024-11-21
CVE-2022-32088
MariaDB v10.2 to v10.7 was discovered to contain a segmentation fault via the component Exec_time_tracker::get_loops/Filesort_tracker::report_use/filesort.
- https://jira.mariadb.org/browse/MDEV-26419
- https://jira.mariadb.org/browse/MDEV-26419
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- https://security.netapp.com/advisory/ntap-20220818-0005/
- https://security.netapp.com/advisory/ntap-20220818-0005/
Modified: 2024-11-21
CVE-2022-32089
MariaDB v10.5 to v10.7 was discovered to contain a segmentation fault via the component st_select_lex_unit::exclude_level.
- https://jira.mariadb.org/browse/MDEV-26410
- https://jira.mariadb.org/browse/MDEV-26410
- FEDORA-2022-e0e9a43546
- FEDORA-2022-e0e9a43546
- FEDORA-2022-333df1c4aa
- FEDORA-2022-333df1c4aa
- FEDORA-2022-cf88f807f9
- FEDORA-2022-cf88f807f9
- https://security.netapp.com/advisory/ntap-20220818-0005/
- https://security.netapp.com/advisory/ntap-20220818-0005/
Modified: 2024-11-21
CVE-2022-32091
MariaDB v10.7 was discovered to contain an use-after-poison in in __interceptor_memset at /libsanitizer/sanitizer_common/sanitizer_common_interceptors.inc.
- https://jira.mariadb.org/browse/MDEV-26431
- https://jira.mariadb.org/browse/MDEV-26431
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- FEDORA-2022-e0e9a43546
- FEDORA-2022-e0e9a43546
- FEDORA-2022-333df1c4aa
- FEDORA-2022-333df1c4aa
- FEDORA-2022-cf88f807f9
- FEDORA-2022-cf88f807f9
- https://security.netapp.com/advisory/ntap-20220818-0005/
- https://security.netapp.com/advisory/ntap-20220818-0005/
Modified: 2024-11-21
CVE-2022-38791
In MariaDB before 10.9.2, compress_write in extra/mariabackup/ds_compress.cc does not release data_mutex upon a stream write failure, which allows local users to trigger a deadlock.
- https://jira.mariadb.org/browse/MDEV-28719
- https://jira.mariadb.org/browse/MDEV-28719
- FEDORA-2022-e0e9a43546
- FEDORA-2022-e0e9a43546
- FEDORA-2022-333df1c4aa
- FEDORA-2022-333df1c4aa
- FEDORA-2022-cf88f807f9
- FEDORA-2022-cf88f807f9
- https://security.netapp.com/advisory/ntap-20221104-0008/
- https://security.netapp.com/advisory/ntap-20221104-0008/
Closed bugs
mysql.lib: CopyLibs: invalid or missing DESTDIR specified
без пакета mariadb-pam пакет mariadb-server нерабочий
Зависит от libmariadb-devel
Package wolfssl updated to version 5.5.0-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-38152
An issue was discovered in wolfSSL before 5.5.0. When a TLS 1.3 client connects to a wolfSSL server and SSL_clear is called on its session, the server crashes with a segmentation fault. This occurs in the second session, which is created through TLS session resumption and reuses the initial struct WOLFSSL. If the server reuses the previous session structure (struct WOLFSSL) by calling wolfSSL_clear(WOLFSSL* ssl) on it, the next received Client Hello (that resumes the previous session) crashes the server. Note that this bug is only triggered when resuming sessions using TLS session resumption. Only servers that use wolfSSL_clear instead of the recommended SSL_free; SSL_new sequence are affected. Furthermore, wolfSSL_clear is part of wolfSSL's compatibility layer and is not enabled by default. It is not part of wolfSSL's native API.
- http://packetstormsecurity.com/files/170604/wolfSSL-Session-Resumption-Denial-Of-Service.html
- 20230119 wolfSSL before 5.5.0: Denial-of-service with session resumption
- https://blog.trailofbits.com/2023/01/12/wolfssl-vulnerabilities-tlspuffin-fuzzing-ssh/
- https://github.com/tlspuffin/tlspuffin
- https://github.com/wolfSSL/wolfssl/pull/5468
- https://github.com/wolfSSL/wolfssl/releases
- https://www.wolfssl.com/docs/security-vulnerabilities/
- http://packetstormsecurity.com/files/170604/wolfSSL-Session-Resumption-Denial-Of-Service.html
- https://www.wolfssl.com/docs/security-vulnerabilities/
- https://github.com/wolfSSL/wolfssl/releases
- https://github.com/wolfSSL/wolfssl/pull/5468
- https://github.com/tlspuffin/tlspuffin
- https://blog.trailofbits.com/2023/01/12/wolfssl-vulnerabilities-tlspuffin-fuzzing-ssh/
- 20230119 wolfSSL before 5.5.0: Denial-of-service with session resumption
Modified: 2024-11-21
CVE-2022-42961
An issue was discovered in wolfSSL before 5.5.0. A fault injection attack on RAM via Rowhammer leads to ECDSA key disclosure. Users performing signing operations with private ECC keys, such as in server-side TLS connections, might leak faulty ECC signatures. These signatures can be processed via an advanced technique for ECDSA key recovery. (In 5.5.0 and later, WOLFSSL_CHECK_SIG_FAULTS can be used to address the vulnerability.)