ALT-BU-2022-6382-12
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-31628
In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the phar uncompressor code would recursively uncompress "quines" gzip files, resulting in an infinite loop.
- https://bugs.php.net/bug.php?id=81726
- https://bugs.php.net/bug.php?id=81726
- [debian-lts-announce] 20221215 [SECURITY] [DLA 3243-1] php7.3 security update
- [debian-lts-announce] 20221215 [SECURITY] [DLA 3243-1] php7.3 security update
- FEDORA-2022-f204e1d0ed
- FEDORA-2022-f204e1d0ed
- FEDORA-2022-afdea1c747
- FEDORA-2022-afdea1c747
- FEDORA-2022-0b77fbd9e7
- FEDORA-2022-0b77fbd9e7
- GLSA-202211-03
- GLSA-202211-03
- https://security.netapp.com/advisory/ntap-20221209-0001/
- https://security.netapp.com/advisory/ntap-20221209-0001/
- DSA-5277
- DSA-5277
Modified: 2024-11-21
CVE-2022-31629
In PHP versions before 7.4.31, 8.0.24 and 8.1.11, the vulnerability enables network and same-site attackers to set a standard insecure cookie in the victim's browser which is treated as a `__Host-` or `__Secure-` cookie by PHP applications.
- [oss-security] 20240412 PHP security releases 8.1.28, 8.2.18, & 8.3.6
- [oss-security] 20240412 PHP security releases 8.1.28, 8.2.18, & 8.3.6
- https://bugs.php.net/bug.php?id=81727
- https://bugs.php.net/bug.php?id=81727
- [debian-lts-announce] 20221215 [SECURITY] [DLA 3243-1] php7.3 security update
- [debian-lts-announce] 20221215 [SECURITY] [DLA 3243-1] php7.3 security update
- FEDORA-2022-f204e1d0ed
- FEDORA-2022-f204e1d0ed
- FEDORA-2024-5e8ae0def0
- FEDORA-2024-5e8ae0def0
- FEDORA-2024-39d50cc975
- FEDORA-2024-39d50cc975
- FEDORA-2022-afdea1c747
- FEDORA-2022-afdea1c747
- FEDORA-2022-0b77fbd9e7
- FEDORA-2022-0b77fbd9e7
- FEDORA-2024-b46619f761
- FEDORA-2024-b46619f761
- GLSA-202211-03
- GLSA-202211-03
- https://security.netapp.com/advisory/ntap-20221209-0001/
- https://security.netapp.com/advisory/ntap-20221209-0001/
- DSA-5277
- DSA-5277
Package u-boot-tools updated to version 2022.10-alt1 for branch sisyphus in task 307855.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-2347
There exists an unchecked length field in UBoot. The U-Boot DFU implementation does not bound the length field in USB DFU download setup packets, and it does not verify that the transfer direction corresponds to the specified command. Consequently, if a physical attacker crafts a USB DFU download setup packet with a `wLength` greater than 4096 bytes, they can write beyond the heap-allocated request buffer.
Package kernel-image-un-def updated to version 5.19.13-alt1 for branch sisyphus in task 307867.
Closed vulnerabilities
BDU:2022-06228
Уязвимость функции roccat_report_event (drivers/hid/hid-roccat.c) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-07356
Уязвимость драйвера drivers/char/pcmcia/synclink_cs.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-07357
Уязвимость драйвера drivers/video/fbdev/smscufx.c ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2022-41848
drivers/char/pcmcia/synclink_cs.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a PCMCIA device while calling ioctl, aka a race condition between mgslpc_ioctl and mgslpc_detach.
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/char/pcmcia/synclink_cs.c
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/log/drivers/char/pcmcia/synclink_cs.c
- https://lore.kernel.org/lkml/20220919040251.GA302541%40ubuntu/T/#rc85e751f467b3e6f9ccef92cfa7fb8a6cc50c270
- https://lore.kernel.org/lkml/20220919040251.GA302541%40ubuntu/T/#rc85e751f467b3e6f9ccef92cfa7fb8a6cc50c270
Modified: 2024-11-21
CVE-2022-41849
drivers/video/fbdev/smscufx.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free if a physically proximate attacker removes a USB device while calling open(), aka a race condition between ufx_ops_open and ufx_usb_disconnect.
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5610bcfe8693c02e2e4c8b31427f1bdbdecc839c
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5610bcfe8693c02e2e4c8b31427f1bdbdecc839c
- [debian-lts-announce] 20221222 [SECURITY] [DLA 3244-1] linux-5.10 security update
- [debian-lts-announce] 20221222 [SECURITY] [DLA 3244-1] linux-5.10 security update
- [debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update
- [debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update
- https://lore.kernel.org/all/20220925133243.GA383897%40ubuntu/T/
- https://lore.kernel.org/all/20220925133243.GA383897%40ubuntu/T/
Modified: 2024-11-21
CVE-2022-41850
roccat_report_event in drivers/hid/hid-roccat.c in the Linux kernel through 5.19.12 has a race condition and resultant use-after-free in certain situations where a report is received while copying a report->value is in progress.
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cacdb14b1c8d3804a3a7d31773bc7569837b71a4
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cacdb14b1c8d3804a3a7d31773bc7569837b71a4
- [debian-lts-announce] 20221222 [SECURITY] [DLA 3244-1] linux-5.10 security update
- [debian-lts-announce] 20221222 [SECURITY] [DLA 3244-1] linux-5.10 security update
- [debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update
- [debian-lts-announce] 20221223 [SECURITY] [DLA 3245-1] linux security update
- https://lore.kernel.org/all/20220904193115.GA28134%40ubuntu/t/#u
- https://lore.kernel.org/all/20220904193115.GA28134%40ubuntu/t/#u
Closed bugs
Модуль amdgpu собран без поддержки видеокарт Southern Islands