ALT-BU-2022-6269-1
Branch p10_e2k update bulletin.
Package python-module-anytree updated to version 2.8.0-alt2 for branch p10_e2k.
Closed bugs
Не хватает зависимостей для mlx_fs_dump
Суть проблемы в том, что в части исполняемых файлов указан интерпретатор python3
Package mlnx-tools updated to version 5.1.3-alt3 for branch p10_e2k.
Closed bugs
Суть проблемы в том, что в части исполняемых файлов указан интерпретатор python3
Closed vulnerabilities
BDU:2022-04060
Уязвимость функции parse_command_modifiers текстового редактора Vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2022-04066
Уязвимость функции utfc_ptr2len() текстового редактора Vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2022-04067
Уязвимость функции del_typebuf() текстового редактора Vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2022-04074
Уязвимость функции suggest_trie_walk() текстового редактора Vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2022-04086
Уязвимость функции ex_diffgetput() текстового редактора Vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2022-04088
Уязвимость функции ins_bytes() текстового редактора Vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2022-04316
Уязвимость компонента register.c текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-04691
Уязвимость реализации функции ins_compl_infercase_gettext() текстового редактора Vim, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2022-05632
Уязвимость функции utf_ptr2char текстового редактора Vim, связанная с чтением данных за границами буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2022-06478
Уязвимость функции skipwhite компонента charset.c текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-06479
Уязвимость функции ins_compl_add компонента insexpand.c текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-06481
Уязвимость функции spell_dump_compl компонента spell.c текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-06482
Уязвимость функции ins_compl_add компонента insexpand.c текстового редактора Vim, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-07170
Уязвимость текстового редактора Vim, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2022-2257
Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.
- https://github.com/vim/vim/commit/083692d598139228e101b8c521aaef7bcf256e9a
- https://github.com/vim/vim/commit/083692d598139228e101b8c521aaef7bcf256e9a
- https://huntr.dev/bounties/ca581f80-03ba-472a-b820-78f7fd05fe89
- https://huntr.dev/bounties/ca581f80-03ba-472a-b820-78f7fd05fe89
- FEDORA-2022-9d7a58e376
- FEDORA-2022-9d7a58e376
- FEDORA-2022-b06fbea2c7
- FEDORA-2022-b06fbea2c7
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
Modified: 2024-11-21
CVE-2022-2264
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.
- https://github.com/vim/vim/commit/d25f003342aca9889067f2e839963dfeccf1fe05
- https://github.com/vim/vim/commit/d25f003342aca9889067f2e839963dfeccf1fe05
- https://huntr.dev/bounties/2241c773-02c9-4708-b63e-54aef99afa6c
- https://huntr.dev/bounties/2241c773-02c9-4708-b63e-54aef99afa6c
- FEDORA-2022-9d7a58e376
- FEDORA-2022-9d7a58e376
- FEDORA-2022-b06fbea2c7
- FEDORA-2022-b06fbea2c7
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
Modified: 2024-11-21
CVE-2022-2284
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.
- https://github.com/vim/vim/commit/3d51ce18ab1be4f9f6061568a4e7fabf00b21794
- https://github.com/vim/vim/commit/3d51ce18ab1be4f9f6061568a4e7fabf00b21794
- https://huntr.dev/bounties/571d25ce-8d53-4fa0-b620-27f2a8a14874
- https://huntr.dev/bounties/571d25ce-8d53-4fa0-b620-27f2a8a14874
- FEDORA-2022-9d7a58e376
- FEDORA-2022-9d7a58e376
- FEDORA-2022-b06fbea2c7
- FEDORA-2022-b06fbea2c7
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
Modified: 2024-11-21
CVE-2022-2285
Integer Overflow or Wraparound in GitHub repository vim/vim prior to 9.0.
- https://github.com/vim/vim/commit/27efc62f5d86afcb2ecb7565587fe8dea4b036fe
- https://github.com/vim/vim/commit/27efc62f5d86afcb2ecb7565587fe8dea4b036fe
- https://huntr.dev/bounties/64574b28-1779-458d-a221-06c434042736
- https://huntr.dev/bounties/64574b28-1779-458d-a221-06c434042736
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- FEDORA-2022-9d7a58e376
- FEDORA-2022-9d7a58e376
- FEDORA-2022-b06fbea2c7
- FEDORA-2022-b06fbea2c7
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
Modified: 2024-11-21
CVE-2022-2286
Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.
- https://github.com/vim/vim/commit/f12129f1714f7d2301935bb21d896609bdac221c
- https://github.com/vim/vim/commit/f12129f1714f7d2301935bb21d896609bdac221c
- https://huntr.dev/bounties/fe7681fb-2318-436b-8e65-daf66cd597d8
- https://huntr.dev/bounties/fe7681fb-2318-436b-8e65-daf66cd597d8
- FEDORA-2022-9d7a58e376
- FEDORA-2022-9d7a58e376
- FEDORA-2022-b06fbea2c7
- FEDORA-2022-b06fbea2c7
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
Modified: 2024-11-21
CVE-2022-2287
Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.
- https://github.com/vim/vim/commit/5e59ea54c0c37c2f84770f068d95280069828774
- https://github.com/vim/vim/commit/5e59ea54c0c37c2f84770f068d95280069828774
- https://huntr.dev/bounties/654aa069-3a9d-45d3-9a52-c1cf3490c284
- https://huntr.dev/bounties/654aa069-3a9d-45d3-9a52-c1cf3490c284
- FEDORA-2022-9d7a58e376
- FEDORA-2022-9d7a58e376
- FEDORA-2022-b06fbea2c7
- FEDORA-2022-b06fbea2c7
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
Modified: 2024-11-21
CVE-2022-2288
Out-of-bounds Write in GitHub repository vim/vim prior to 9.0.
- https://github.com/vim/vim/commit/c6fdb15d423df22e1776844811d082322475e48a
- https://github.com/vim/vim/commit/c6fdb15d423df22e1776844811d082322475e48a
- https://huntr.dev/bounties/a71bdcb7-4e9b-4650-ab6a-fe8e3e9852ad
- https://huntr.dev/bounties/a71bdcb7-4e9b-4650-ab6a-fe8e3e9852ad
- FEDORA-2022-9d7a58e376
- FEDORA-2022-9d7a58e376
- FEDORA-2022-b06fbea2c7
- FEDORA-2022-b06fbea2c7
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
Modified: 2024-11-21
CVE-2022-2289
Use After Free in GitHub repository vim/vim prior to 9.0.
- https://github.com/vim/vim/commit/c5274dd12224421f2430b30c53b881b9403d649e
- https://github.com/vim/vim/commit/c5274dd12224421f2430b30c53b881b9403d649e
- https://huntr.dev/bounties/7447d2ea-db5b-4883-adf4-1eaf7deace64
- https://huntr.dev/bounties/7447d2ea-db5b-4883-adf4-1eaf7deace64
- FEDORA-2022-9d7a58e376
- FEDORA-2022-9d7a58e376
- FEDORA-2022-b06fbea2c7
- FEDORA-2022-b06fbea2c7
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
Modified: 2024-11-21
CVE-2022-2304
Stack-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.
- https://github.com/vim/vim/commit/54e5fed6d27b747ff152cdb6edfb72ff60e70939
- https://github.com/vim/vim/commit/54e5fed6d27b747ff152cdb6edfb72ff60e70939
- https://huntr.dev/bounties/eb7402f3-025a-402f-97a7-c38700d9548a
- https://huntr.dev/bounties/eb7402f3-025a-402f-97a7-c38700d9548a
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- FEDORA-2022-9d7a58e376
- FEDORA-2022-9d7a58e376
- FEDORA-2022-b06fbea2c7
- FEDORA-2022-b06fbea2c7
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
Modified: 2024-11-21
CVE-2022-2343
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0044.
- https://github.com/vim/vim/commit/caea66442d86e7bbba3bf3dc202c3c0d549b9853
- https://github.com/vim/vim/commit/caea66442d86e7bbba3bf3dc202c3c0d549b9853
- https://huntr.dev/bounties/2ecb4345-2fc7-4e7f-adb0-83a20bb458f5
- https://huntr.dev/bounties/2ecb4345-2fc7-4e7f-adb0-83a20bb458f5
- FEDORA-2022-9d7a58e376
- FEDORA-2022-9d7a58e376
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
Modified: 2024-11-21
CVE-2022-2344
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0045.
- https://github.com/vim/vim/commit/baefde14550231f6468ac2ed2ed495bc381c0c92
- https://github.com/vim/vim/commit/baefde14550231f6468ac2ed2ed495bc381c0c92
- https://huntr.dev/bounties/4a095ed9-3125-464a-b656-c31b437e1996
- https://huntr.dev/bounties/4a095ed9-3125-464a-b656-c31b437e1996
- FEDORA-2022-9d7a58e376
- FEDORA-2022-9d7a58e376
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
Modified: 2024-11-21
CVE-2022-2345
Use After Free in GitHub repository vim/vim prior to 9.0.0046.
- https://github.com/vim/vim/commit/32acf1f1a72ebb9d8942b9c9d80023bf1bb668ea
- https://github.com/vim/vim/commit/32acf1f1a72ebb9d8942b9c9d80023bf1bb668ea
- https://huntr.dev/bounties/1eed7009-db6d-487b-bc41-8f2fd260483f
- https://huntr.dev/bounties/1eed7009-db6d-487b-bc41-8f2fd260483f
- FEDORA-2022-9d7a58e376
- FEDORA-2022-9d7a58e376
- GLSA-202208-32
- GLSA-202208-32
- GLSA-202305-16
- GLSA-202305-16
Modified: 2024-11-21
CVE-2022-2522
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0061.
- https://github.com/vim/vim/commit/5fa9f23a63651a8abdb074b4fc2ec9b1adc6b089
- https://github.com/vim/vim/commit/5fa9f23a63651a8abdb074b4fc2ec9b1adc6b089
- https://github.com/vim/vim/commit/b9e717367c395490149495cf375911b5d9de889e
- https://github.com/vim/vim/commit/b9e717367c395490149495cf375911b5d9de889e
- https://huntr.dev/bounties/3a2d83af-9542-4d93-8784-98b115135a22
- https://huntr.dev/bounties/3a2d83af-9542-4d93-8784-98b115135a22
- https://huntr.dev/bounties/3a2d83af-9542-4d93-8784-98b115135a22/
- https://huntr.dev/bounties/3a2d83af-9542-4d93-8784-98b115135a22/
- GLSA-202305-16
- GLSA-202305-16
Modified: 2024-11-21
CVE-2022-2571
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0101.
Modified: 2024-11-21
CVE-2022-2580
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0102.
Modified: 2024-11-21
CVE-2022-2581
Out-of-bounds Read in GitHub repository vim/vim prior to 9.0.0104.
Modified: 2024-11-21
CVE-2022-2598
Out-of-bounds Write to API in GitHub repository vim/vim prior to 9.0.0100.
- https://github.com/vim/vim/commit/4e677b9c40ccbc5f090971b31dc2fe07bf05541d
- https://github.com/vim/vim/commit/4e677b9c40ccbc5f090971b31dc2fe07bf05541d
- https://huntr.dev/bounties/2f08363a-47a2-422d-a7de-ce96a89ad08e
- https://huntr.dev/bounties/2f08363a-47a2-422d-a7de-ce96a89ad08e
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
Closed bugs
Взаимоблокировка (?) resolvconf и dnsmasq-helper при подключении/отключении интерфейса через NetworkManager
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-31143
GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. It was found that in affected versions there is an exposure of private information defined in setup of GLPI (like smtp or cas hosts). Note that passwords are not exposed. Users are advised to upgrade to version 10.0.3. There are no known workarounds for this issue.
- https://github.com/glpi-project/glpi/commit/e66a0dfe697cbd4b3ec22736a8f8fd025a28f978
- https://github.com/glpi-project/glpi/commit/e66a0dfe697cbd4b3ec22736a8f8fd025a28f978
- https://github.com/glpi-project/glpi/security/advisories/GHSA-6mmq-x3j2-677j
- https://github.com/glpi-project/glpi/security/advisories/GHSA-6mmq-x3j2-677j
Modified: 2025-03-12
CVE-2022-35914
/vendor/htmlawed/htmlawed/htmLawedTest.php in the htmlawed module for GLPI through 10.0.2 allows PHP code injection.
- http://packetstormsecurity.com/files/169501/GLPI-10.0.2-Command-Injection.html
- http://packetstormsecurity.com/files/169501/GLPI-10.0.2-Command-Injection.html
- http://www.bioinformatics.org/phplabware/sourceer/sourceer.php?&Sfs=htmLawedTest.php&Sl=.%2Finternal_utilities%2FhtmLawed
- http://www.bioinformatics.org/phplabware/sourceer/sourceer.php?&Sfs=htmLawedTest.php&Sl=.%2Finternal_utilities%2FhtmLawed
- https://github.com/glpi-project/glpi/releases
- https://github.com/glpi-project/glpi/releases
- https://github.com/Orange-Cyberdefense/CVE-repository/
- https://github.com/Orange-Cyberdefense/CVE-repository/blob/master/PoCs/POC_2022-35914.sh
- https://glpi-project.org/fr/glpi-10-0-3-disponible/
- https://glpi-project.org/fr/glpi-10-0-3-disponible/
- https://mayfly277.github.io/posts/GLPI-htmlawed-CVE-2022-35914/
Modified: 2024-11-21
CVE-2022-35945
GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. Information associated to registration key are not properly escaped in registration key configuration page. They can be used to steal a GLPI administrator cookie. Users are advised to upgrade to 10.0.3. There are no known workarounds for this issue. ### Workarounds Do not use a registration key created by an untrusted person.
- https://github.com/glpi-project/glpi/commit/2b8f9aa54ae4a4ec07bde0c8db739a292b8ec09a
- https://github.com/glpi-project/glpi/commit/2b8f9aa54ae4a4ec07bde0c8db739a292b8ec09a
- https://github.com/glpi-project/glpi/security/advisories/GHSA-jrgw-cx24-56x5
- https://github.com/glpi-project/glpi/security/advisories/GHSA-jrgw-cx24-56x5
Modified: 2024-11-21
CVE-2022-35946
GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. In affected versions request input is not properly validated in the plugin controller and can be used to access low-level API of Plugin class. An attacker can, for instance, alter database data. Attacker must have "General setup" update rights to be able to perform this attack. Users are advised to upgrade to version 10.0.3. Users unable to upgrade should remove the `front/plugin.form.php` script.
- https://github.com/glpi-project/glpi/commit/f542ec8378afbd8038aeca5975b15eca3f0574c8
- https://github.com/glpi-project/glpi/commit/f542ec8378afbd8038aeca5975b15eca3f0574c8
- https://github.com/glpi-project/glpi/security/advisories/GHSA-92q5-pfr8-r9r2
- https://github.com/glpi-project/glpi/security/advisories/GHSA-92q5-pfr8-r9r2
Modified: 2024-11-21
CVE-2022-35947
GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. Affected versions have been found to be vulnerable to a SQL injection attack which an attacker could leverage to simulate an arbitrary user login. Users are advised to upgrade to version 10.0.3. Users unable to upgrade should disable the `Enable login with external token` API configuration.
- https://github.com/glpi-project/glpi/commit/564309d2c1180d5ba1615f4bbaf6623df81b4962
- https://github.com/glpi-project/glpi/commit/564309d2c1180d5ba1615f4bbaf6623df81b4962
- https://github.com/glpi-project/glpi/security/advisories/GHSA-7p3q-cffg-c8xh
- https://github.com/glpi-project/glpi/security/advisories/GHSA-7p3q-cffg-c8xh
Modified: 2024-11-21
CVE-2022-36112
GLPI stands for Gestionnaire Libre de Parc Informatique and is a Free Asset and IT Management Software package, that provides ITIL Service Desk features, licenses tracking and software auditing. Usage of RSS feeds or extenal calendar in planning is subject to SSRF exploit. Server-side requests can be used to scan server port or services opened on GLPI server or its private network. Queries responses are not exposed to end-user (blind SSRF). Users are advised to upgrade to version 10.0.3 to resolve this issue. There are no known workarounds.
- https://github.com/glpi-project/glpi/commit/ad66d69049ae02bead8ed0f4ee654a458643244e
- https://github.com/glpi-project/glpi/commit/ad66d69049ae02bead8ed0f4ee654a458643244e
- https://github.com/glpi-project/glpi/security/advisories/GHSA-rqgx-gqhp-x8vv
- https://github.com/glpi-project/glpi/security/advisories/GHSA-rqgx-gqhp-x8vv