ALT-BU-2022-6971-1
Branch sisyphus_e2k update bulletin.
Package libvncserver updated to version 0.9.13-alt3 for branch sisyphus_e2k.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-29260
libvncclient v0.9.13 was discovered to contain a memory leak via the function rfbClientCleanup().
- https://github.com/LibVNC/libvncserver/commit/bef41f6ec4097a8ee094f90a1b34a708fbd757ec
- https://github.com/LibVNC/libvncserver/commit/bef41f6ec4097a8ee094f90a1b34a708fbd757ec
- [debian-lts-announce] 20220929 [SECURITY] [DLA 3125-1] libvncserver security update
- [debian-lts-announce] 20220929 [SECURITY] [DLA 3125-1] libvncserver security update
Package libarchive updated to version 3.6.1-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2022-01973
Уязвимость реализации функции zipx_lzma_alone_init() библиотеки архивирования libarchive, позволяющая нарушителю раскрыть защищаемую информацию или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2022-26280
Libarchive v3.6.0 was discovered to contain an out-of-bounds read via the component zipx_lzma_alone_init.
Package vim updated to version 9.0.0827-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2022-06663
Уязвимость функции qf_update_buffer (quickfix.c) текстового редактора Vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
Modified: 2024-11-21
CVE-2022-3520
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 9.0.0765.
- https://github.com/vim/vim/commit/36343ae0fb7247e060abfd35fb8e4337b33abb4b
- https://github.com/vim/vim/commit/36343ae0fb7247e060abfd35fb8e4337b33abb4b
- https://huntr.dev/bounties/c1db3b70-f4fe-481f-8a24-0b1449c94246
- https://huntr.dev/bounties/c1db3b70-f4fe-481f-8a24-0b1449c94246
- GLSA-202305-16
- GLSA-202305-16
- https://security.netapp.com/advisory/ntap-20241115-0010/
Modified: 2024-11-21
CVE-2022-3591
Use After Free in GitHub repository vim/vim prior to 9.0.0789.
- https://github.com/vim/vim/commit/8f3c3c6cd044e3b5bf08dbfa3b3f04bb3f711bad
- https://github.com/vim/vim/commit/8f3c3c6cd044e3b5bf08dbfa3b3f04bb3f711bad
- https://huntr.dev/bounties/a5a998c2-4b07-47a7-91be-dbc1886b3921
- https://huntr.dev/bounties/a5a998c2-4b07-47a7-91be-dbc1886b3921
- GLSA-202305-16
- GLSA-202305-16
Modified: 2024-11-21
CVE-2022-3705
A vulnerability was found in vim and classified as problematic. Affected by this issue is the function qf_update_buffer of the file quickfix.c of the component autocmd Handler. The manipulation leads to use after free. The attack may be launched remotely. Upgrading to version 9.0.0805 is able to address this issue. The name of the patch is d0fab10ed2a86698937e3c3fed2f10bd9bb5e731. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-212324.
- 20230123 APPLE-SA-2023-01-23-4 macOS Ventura 13.2
- 20230123 APPLE-SA-2023-01-23-4 macOS Ventura 13.2
- https://github.com/vim/vim/commit/d0fab10ed2a86698937e3c3fed2f10bd9bb5e731
- https://github.com/vim/vim/commit/d0fab10ed2a86698937e3c3fed2f10bd9bb5e731
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- [debian-lts-announce] 20221108 [SECURITY] [DLA 3182-1] vim security update
- FEDORA-2022-06e4f1dd58
- FEDORA-2022-06e4f1dd58
- FEDORA-2022-4bc60c32a2
- FEDORA-2022-4bc60c32a2
- FEDORA-2022-3d354ef0fb
- FEDORA-2022-3d354ef0fb
- GLSA-202305-16
- GLSA-202305-16
- https://security.netapp.com/advisory/ntap-20221223-0004/
- https://security.netapp.com/advisory/ntap-20221223-0004/
- https://support.apple.com/kb/HT213605
- https://support.apple.com/kb/HT213605
- https://vuldb.com/?id.212324
- https://vuldb.com/?id.212324
Modified: 2024-11-21
CVE-2022-4293
Floating Point Comparison with Incorrect Operator in GitHub repository vim/vim prior to 9.0.0804.
- https://github.com/vim/vim/commit/cdef1cefa2a440911c727558562f83ed9b00e16b
- https://github.com/vim/vim/commit/cdef1cefa2a440911c727558562f83ed9b00e16b
- https://huntr.dev/bounties/385a835f-6e33-4d00-acce-ac99f3939143
- https://huntr.dev/bounties/385a835f-6e33-4d00-acce-ac99f3939143
- GLSA-202305-16
- GLSA-202305-16
- https://security.netapp.com/advisory/ntap-20230203-0007/
- https://security.netapp.com/advisory/ntap-20230203-0007/
Package spamassassin updated to version 3.4.6-alt2 for branch sisyphus_e2k.
Closed bugs
build with openssl instead of libressl
Package nginx updated to version 1.22.1-alt2 for branch sisyphus_e2k.
Closed bugs
/etc/nginx/mime.types does not correctly specify application/wasm
Package LibreSSL updated to version 3.6.1-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
Modified: 2025-02-10
CVE-2022-48437
An issue was discovered in x509/x509_verify.c in LibreSSL before 3.6.1, and in OpenBSD before 7.2 errata 001. x509_verify_ctx_add_chain does not store errors that occur during leaf certificate verification, and therefore an incorrect error is returned. This behavior occurs when there is an installed verification callback that instructs the verifier to continue upon detecting an invalid certificate.
- https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.6.1-relnotes.txt
- https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.6.1-relnotes.txt
- https://ftp.openbsd.org/pub/OpenBSD/patches/7.2/common/001_x509.patch.sig
- https://ftp.openbsd.org/pub/OpenBSD/patches/7.2/common/001_x509.patch.sig
- https://github.com/openbsd/src/commit/4f94258c65a918ee3d8670e93916d15bf879e6ec
- https://github.com/openbsd/src/commit/4f94258c65a918ee3d8670e93916d15bf879e6ec
Package sudo updated to version 1.9.12p1-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2022-06664
Уязвимость реализации функции crypt() программы системного администрирования Sudo, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2022-43995
Sudo 1.8.0 through 1.9.12, with the crypt() password backend, contains a plugins/sudoers/auth/passwd.c array-out-of-bounds error that can result in a heap-based buffer over-read. This can be triggered by arbitrary local users with access to Sudo by entering a password of seven characters or fewer. The impact could vary depending on the system libraries, compiler, and processor architecture.
- https://bugzilla.redhat.com/show_bug.cgi?id=2139911
- https://bugzilla.redhat.com/show_bug.cgi?id=2139911
- https://github.com/sudo-project/sudo/commit/bd209b9f16fcd1270c13db27ae3329c677d48050
- https://github.com/sudo-project/sudo/commit/bd209b9f16fcd1270c13db27ae3329c677d48050
- https://news.ycombinator.com/item?id=33465707
- https://news.ycombinator.com/item?id=33465707
- GLSA-202211-08
- GLSA-202211-08
- https://www.sudo.ws/security/advisories/
- https://www.sudo.ws/security/advisories/
Package samba updated to version 4.16.6-alt2 for branch sisyphus_e2k.
Closed bugs
Missing dependency for include
Package freerdp updated to version 2.8.1-alt1.1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2022-04713
Уязвимость реализации протокола NTLM RDP-клиента FreeRDP, позволяющая нарушителю раскрыть защищаемую информацию
BDU:2022-06360
Уязвимость RDP-клиента FreeRDP, связанная с использованием неинициализированного ресурса, позволяющая нарушителю получить доступ на чтение, изменение или удаление данных
BDU:2022-06362
Уязвимость RDP-клиента FreeRDP, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю получить доступ на чтение, изменение или удаление аудио/видео данных
BDU:2022-06851
Уязвимость RDP-сервера FreeRDP, связанная с недостатками процедуры аутентификации, позволяющая нарушителю обойти процесс аутентификации
Modified: 2024-11-21
CVE-2022-24882
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP). In versions prior to 2.7.0, NT LAN Manager (NTLM) authentication does not properly abort when someone provides and empty password value. This issue affects FreeRDP based RDP Server implementations. RDP clients are not affected. The vulnerability is patched in FreeRDP 2.7.0. There are currently no known workarounds.
- https://github.com/FreeRDP/FreeRDP/pull/7750
- https://github.com/FreeRDP/FreeRDP/pull/7750
- https://github.com/FreeRDP/FreeRDP/releases/tag/2.7.0
- https://github.com/FreeRDP/FreeRDP/releases/tag/2.7.0
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-6x5p-gp49-3jhh
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-6x5p-gp49-3jhh
- https://gitlab.gnome.org/GNOME/gnome-remote-desktop/-/issues/95
- https://gitlab.gnome.org/GNOME/gnome-remote-desktop/-/issues/95
- FEDORA-2022-dc48a89918
- FEDORA-2022-dc48a89918
- FEDORA-2022-a3e03a200b
- FEDORA-2022-a3e03a200b
- FEDORA-2022-b0a47f8060
- FEDORA-2022-b0a47f8060
- GLSA-202210-24
- GLSA-202210-24
Modified: 2024-11-21
CVE-2022-24883
FreeRDP is a free implementation of the Remote Desktop Protocol (RDP). Prior to version 2.7.0, server side authentication against a `SAM` file might be successful for invalid credentials if the server has configured an invalid `SAM` file path. FreeRDP based clients are not affected. RDP server implementations using FreeRDP to authenticate against a `SAM` file are affected. Version 2.7.0 contains a fix for this issue. As a workaround, use custom authentication via `HashCallback` and/or ensure the `SAM` database path configured is valid and the application has file handles left.
- https://github.com/FreeRDP/FreeRDP/commit/4661492e5a617199457c8074bad22f766a116cdc
- https://github.com/FreeRDP/FreeRDP/commit/4661492e5a617199457c8074bad22f766a116cdc
- https://github.com/FreeRDP/FreeRDP/commit/6f473b273a4b6f0cb6aca32b95e22fd0de88e144
- https://github.com/FreeRDP/FreeRDP/commit/6f473b273a4b6f0cb6aca32b95e22fd0de88e144
- https://github.com/FreeRDP/FreeRDP/releases/tag/2.7.0
- https://github.com/FreeRDP/FreeRDP/releases/tag/2.7.0
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-qxm3-v2r6-vmwf
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-qxm3-v2r6-vmwf
- [debian-lts-announce] 20231117 [SECURITY] [DLA 3654-1] freerdp2 security update
- [debian-lts-announce] 20231117 [SECURITY] [DLA 3654-1] freerdp2 security update
- FEDORA-2022-dc48a89918
- FEDORA-2022-dc48a89918
- FEDORA-2022-a3e03a200b
- FEDORA-2022-a3e03a200b
- FEDORA-2022-b0a47f8060
- FEDORA-2022-b0a47f8060
- GLSA-202210-24
- GLSA-202210-24
Modified: 2024-11-21
CVE-2022-39282
FreeRDP is a free remote desktop protocol library and clients. FreeRDP based clients on unix systems using `/parallel` command line switch might read uninitialized data and send it to the server the client is currently connected to. FreeRDP based server implementations are not affected. Please upgrade to 2.8.1 where this issue is patched. If unable to upgrade, do not use parallel port redirection (`/parallel` command line switch) as a workaround.
- https://github.com/FreeRDP/FreeRDP/releases/tag/2.8.1
- https://github.com/FreeRDP/FreeRDP/releases/tag/2.8.1
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-c45q-wcpg-mxjq
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-c45q-wcpg-mxjq
- [debian-lts-announce] 20231117 [SECURITY] [DLA 3654-1] freerdp2 security update
- [debian-lts-announce] 20231117 [SECURITY] [DLA 3654-1] freerdp2 security update
- FEDORA-2022-e733724edb
- FEDORA-2022-e733724edb
- FEDORA-2022-d6310a1308
- FEDORA-2022-d6310a1308
- FEDORA-2022-fd6e43dec8
- FEDORA-2022-fd6e43dec8
- GLSA-202210-24
- GLSA-202210-24
Modified: 2024-11-21
CVE-2022-39283
FreeRDP is a free remote desktop protocol library and clients. All FreeRDP based clients when using the `/video` command line switch might read uninitialized data, decode it as audio/video and display the result. FreeRDP based server implementations are not affected. This issue has been patched in version 2.8.1. If you cannot upgrade do not use the `/video` switch.
- https://github.com/FreeRDP/FreeRDP/releases/tag/2.8.1
- https://github.com/FreeRDP/FreeRDP/releases/tag/2.8.1
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-6cf9-3328-qrvh
- https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-6cf9-3328-qrvh
- [debian-lts-announce] 20231117 [SECURITY] [DLA 3654-1] freerdp2 security update
- [debian-lts-announce] 20231117 [SECURITY] [DLA 3654-1] freerdp2 security update
- FEDORA-2022-e733724edb
- FEDORA-2022-e733724edb
- FEDORA-2022-d6310a1308
- FEDORA-2022-d6310a1308
- FEDORA-2022-fd6e43dec8
- FEDORA-2022-fd6e43dec8
- GLSA-202210-24
- GLSA-202210-24
Package python3-module-Pillow updated to version 9.3.0-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2023-02448
Уязвимость библиотеки для работы с изображениями Pillow, связанная с неконтролируемым потреблением ресурсов, позволяющая нарушителю выполнить атаку типа «отказ в обслуживании»
Modified: 2024-11-21
CVE-2022-45199
Pillow before 9.3.0 allows denial of service via SAMPLESPERPIXEL.
- https://bugs.gentoo.org/878769
- https://bugs.gentoo.org/878769
- https://github.com/python-pillow/Pillow/commit/2444cddab2f83f28687c7c20871574acbb6dbcf3
- https://github.com/python-pillow/Pillow/commit/2444cddab2f83f28687c7c20871574acbb6dbcf3
- https://github.com/python-pillow/Pillow/pull/6700
- https://github.com/python-pillow/Pillow/pull/6700
- https://github.com/python-pillow/Pillow/releases/tag/9.3.0
- https://github.com/python-pillow/Pillow/releases/tag/9.3.0
- GLSA-202211-10
- GLSA-202211-10