ALT-BU-2022-6877-1
Branch sisyphus_riscv64 update bulletin.
Package spamassassin updated to version 3.4.6-alt2 for branch sisyphus_riscv64.
Closed bugs
build with openssl instead of libressl
Package gem-unicorn updated to version 6.1.0-alt2 for branch sisyphus_riscv64.
Closed bugs
undefined symbol: Init_unicorn_http
Package ruby updated to version 3.1.2-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2022-03067
Уязвимость методов алгоритма преобразования строки в число с плавающей запятой Kernel#Float и String#to_f интерпретатора языка программирования Ruby, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-03068
Уязвимость реализации класса Regexp интерпретатора языка программирования Ruby, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2022-28738
A double free was found in the Regexp compiler in Ruby 3.x before 3.0.4 and 3.1.x before 3.1.2. If a victim attempts to create a Regexp from untrusted user input, an attacker may be able to write to unexpected memory locations.
- https://hackerone.com/reports/1220911
- https://hackerone.com/reports/1220911
- GLSA-202401-27
- GLSA-202401-27
- https://security.netapp.com/advisory/ntap-20220624-0002/
- https://security.netapp.com/advisory/ntap-20220624-0002/
- https://security-tracker.debian.org/tracker/CVE-2022-28738
- https://security-tracker.debian.org/tracker/CVE-2022-28738
- https://www.ruby-lang.org/en/news/2022/04/12/double-free-in-regexp-compilation-cve-2022-28738/
- https://www.ruby-lang.org/en/news/2022/04/12/double-free-in-regexp-compilation-cve-2022-28738/
Modified: 2024-11-21
CVE-2022-28739
There is a buffer over-read in Ruby before 2.6.10, 2.7.x before 2.7.6, 3.x before 3.0.4, and 3.1.x before 3.1.2. It occurs in String-to-Float conversion, including Kernel#Float and String#to_f.
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-24-3 macOS Monterey 12.6.1
- 20221030 APPLE-SA-2022-10-24-3 macOS Monterey 12.6.1
- 20221030 APPLE-SA-2022-10-24-4 macOS Big Sur 11.7.1
- 20221030 APPLE-SA-2022-10-24-4 macOS Big Sur 11.7.1
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-6 Additional information for APPLE-SA-2022-10-24-3 macOS Monterey 12.6.1
- 20221030 APPLE-SA-2022-10-27-6 Additional information for APPLE-SA-2022-10-24-3 macOS Monterey 12.6.1
- https://hackerone.com/reports/1248108
- https://hackerone.com/reports/1248108
- https://lists.debian.org/debian-lts-announce/2023/06/msg00012.html
- https://lists.debian.org/debian-lts-announce/2023/06/msg00012.html
- https://security.gentoo.org/glsa/202401-27
- https://security.gentoo.org/glsa/202401-27
- https://security.netapp.com/advisory/ntap-20220624-0002/
- https://security.netapp.com/advisory/ntap-20220624-0002/
- https://security-tracker.debian.org/tracker/CVE-2022-28739
- https://security-tracker.debian.org/tracker/CVE-2022-28739
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213493
- https://support.apple.com/kb/HT213493
- https://support.apple.com/kb/HT213494
- https://support.apple.com/kb/HT213494
- https://www.ruby-lang.org/en/news/2022/04/12/buffer-overrun-in-string-to-float-cve-2022-28739/
- https://www.ruby-lang.org/en/news/2022/04/12/buffer-overrun-in-string-to-float-cve-2022-28739/
Closed bugs
Gem::LoadError: You have already activated bundler 2.2.19, but your Gemfile requires bundler 2.1.4.
Package vim updated to version 9.0.0827-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2022-06663
Уязвимость функции qf_update_buffer (quickfix.c) текстового редактора Vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
Modified: 2024-11-21
CVE-2022-3520
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0765.
- https://github.com/vim/vim/commit/36343ae0fb7247e060abfd35fb8e4337b33abb4b
- https://github.com/vim/vim/commit/36343ae0fb7247e060abfd35fb8e4337b33abb4b
- https://huntr.dev/bounties/c1db3b70-f4fe-481f-8a24-0b1449c94246
- https://huntr.dev/bounties/c1db3b70-f4fe-481f-8a24-0b1449c94246
- GLSA-202305-16
- GLSA-202305-16
- https://security.netapp.com/advisory/ntap-20241115-0010/
Modified: 2024-11-21
CVE-2022-3591
Use After Free in GitHub repository vim/vim prior to 9.0.0789.
- https://github.com/vim/vim/commit/8f3c3c6cd044e3b5bf08dbfa3b3f04bb3f711bad
- https://github.com/vim/vim/commit/8f3c3c6cd044e3b5bf08dbfa3b3f04bb3f711bad
- https://huntr.dev/bounties/a5a998c2-4b07-47a7-91be-dbc1886b3921
- https://huntr.dev/bounties/a5a998c2-4b07-47a7-91be-dbc1886b3921
- GLSA-202305-16
- GLSA-202305-16
Modified: 2024-11-21
CVE-2022-3705
A vulnerability was found in vim and classified as problematic. Affected by this issue is the function qf_update_buffer of the file quickfix.c of the component autocmd Handler. The manipulation leads to use after free. The attack may be launched remotely. Upgrading to version 9.0.0805 is able to address this issue. The name of the patch is d0fab10ed2a86698937e3c3fed2f10bd9bb5e731. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-212324.
- 20230123 APPLE-SA-2023-01-23-4 macOS Ventura 13.2
- 20230123 APPLE-SA-2023-01-23-4 macOS Ventura 13.2
- https://github.com/vim/vim/commit/d0fab10ed2a86698937e3c3fed2f10bd9bb5e731
- https://github.com/vim/vim/commit/d0fab10ed2a86698937e3c3fed2f10bd9bb5e731
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- FEDORA-2022-06e4f1dd58
- FEDORA-2022-06e4f1dd58
- FEDORA-2022-4bc60c32a2
- FEDORA-2022-4bc60c32a2
- FEDORA-2022-3d354ef0fb
- FEDORA-2022-3d354ef0fb
- GLSA-202305-16
- GLSA-202305-16
- https://security.netapp.com/advisory/ntap-20221223-0004/
- https://security.netapp.com/advisory/ntap-20221223-0004/
- https://support.apple.com/kb/HT213605
- https://support.apple.com/kb/HT213605
- https://vuldb.com/?id.212324
- https://vuldb.com/?id.212324
Modified: 2024-11-21
CVE-2022-4293
Floating Point Comparison with Incorrect Operator in GitHub repository vim/vim prior to 9.0.0804.
- https://github.com/vim/vim/commit/cdef1cefa2a440911c727558562f83ed9b00e16b
- https://github.com/vim/vim/commit/cdef1cefa2a440911c727558562f83ed9b00e16b
- https://huntr.dev/bounties/385a835f-6e33-4d00-acce-ac99f3939143
- https://huntr.dev/bounties/385a835f-6e33-4d00-acce-ac99f3939143
- GLSA-202305-16
- GLSA-202305-16
- https://security.netapp.com/advisory/ntap-20230203-0007/
- https://security.netapp.com/advisory/ntap-20230203-0007/
Package perl-DBI updated to version 1.643-alt3 for branch sisyphus_riscv64.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2014-10401
An issue was discovered in the DBI module before 1.632 for Perl. DBD::File drivers can open files from folders other than those specifically passed via the f_dir attribute.
- https://github.com/perl5-dbi/dbi/commit/caedc0d7d602f5b2ae5efc1b00f39efeafb7b05a
- https://github.com/perl5-dbi/dbi/commit/caedc0d7d602f5b2ae5efc1b00f39efeafb7b05a
- https://metacpan.org/pod/distribution/DBI/Changes#Changes-in-DBI-1.632-9th-Nov-2014
- https://metacpan.org/pod/distribution/DBI/Changes#Changes-in-DBI-1.632-9th-Nov-2014
- https://rt.cpan.org/Public/Bug/Display.html?id=99508
- https://rt.cpan.org/Public/Bug/Display.html?id=99508
- USN-4509-1
- USN-4509-1