ALT-BU-2022-7055-1
Branch p10_e2k update bulletin.
Closed vulnerabilities
BDU:2022-03770
Уязвимость функции compile_xclass_matchingpath() библиотеки PCRE2, позволяющая нарушителю вызвать отказ в обслуживании или раскрыть защищаемую информацию
BDU:2023-02635
Уязвимость функции pcre2_jit_compile.c библиотеки регулярных выражений PCRE2, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
Modified: 2025-03-25
CVE-2022-1586
An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT.
- https://bugzilla.redhat.com/show_bug.cgi?id=2077976
- https://bugzilla.redhat.com/show_bug.cgi?id=2077976%2C
- https://bugzilla.redhat.com/show_bug.cgi?id=2077976%2C
- https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a
- https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a%2C
- https://github.com/PCRE2Project/pcre2/commit/50a51cb7e67268e6ad417eb07c9de9bfea5cc55a%2C
- https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
- https://github.com/PCRE2Project/pcre2/commit/d4fa336fbcc388f89095b184ba6d99422cfc676c
- [debian-lts-announce] 20230316 [SECURITY] [DLA 3363-1] pcre2 security update
- [debian-lts-announce] 20230316 [SECURITY] [DLA 3363-1] pcre2 security update
- FEDORA-2022-9c9691d058
- FEDORA-2022-9c9691d058
- FEDORA-2022-19f4c34184
- FEDORA-2022-19f4c34184
- FEDORA-2022-a3edad0ab6
- FEDORA-2022-a3edad0ab6
- FEDORA-2022-e56085ba31
- FEDORA-2022-e56085ba31
- https://security.netapp.com/advisory/ntap-20221028-0009/
- https://security.netapp.com/advisory/ntap-20221028-0009/
Modified: 2024-11-21
CVE-2022-1587
An out-of-bounds read vulnerability was discovered in the PCRE2 library in the get_recurse_data_length() function of the pcre2_jit_compile.c file. This issue affects recursions in JIT-compiled regular expressions caused by duplicate data transfers.
- https://bugzilla.redhat.com/show_bug.cgi?id=2077983%2C
- https://bugzilla.redhat.com/show_bug.cgi?id=2077983%2C
- https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
- https://github.com/PCRE2Project/pcre2/commit/03654e751e7f0700693526b67dfcadda6b42c9d0
- [debian-lts-announce] 20230316 [SECURITY] [DLA 3363-1] pcre2 security update
- [debian-lts-announce] 20230316 [SECURITY] [DLA 3363-1] pcre2 security update
- FEDORA-2022-9c9691d058
- FEDORA-2022-9c9691d058
- FEDORA-2022-19f4c34184
- FEDORA-2022-19f4c34184
- FEDORA-2022-a3edad0ab6
- FEDORA-2022-a3edad0ab6
- FEDORA-2022-e56085ba31
- FEDORA-2022-e56085ba31
- https://security.netapp.com/advisory/ntap-20221028-0009/
- https://security.netapp.com/advisory/ntap-20221028-0009/
Package util-linux updated to version 2.38.1-alt1 for branch p10_e2k.
Closed vulnerabilities
BDU:2021-03990
Уязвимость пакета служебных утилит командной строки util-linux, позволяющая нарушителю выполнить произвольный код в целевой системе
BDU:2022-00589
Уязвимость стандартного пакета служебных утилит командной строки util-linux, связанная с некорректными разрешениями и привилегиями доступа, позволяющая нарушителю обойти введенные ограничения безопасности
Modified: 2024-11-21
CVE-2021-37600
An integer overflow in util-linux through 2.37.1 can potentially cause a buffer overflow if an attacker were able to use system resources in a way that leads to a large number in the /proc/sysvipc/sem file. NOTE: this is unexploitable in GNU C Library environments, and possibly in all realistic environments.
- https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
- https://github.com/karelzak/util-linux/commit/1c9143d0c1f979c3daf10e1c37b5b1e916c22a1c
- https://github.com/karelzak/util-linux/issues/1395
- https://github.com/karelzak/util-linux/issues/1395
- [debian-lts-announce] 20240407 [SECURITY] [DLA 3782-1] util-linux security update
- [debian-lts-announce] 20240407 [SECURITY] [DLA 3782-1] util-linux security update
- GLSA-202401-08
- GLSA-202401-08
- https://security.netapp.com/advisory/ntap-20210902-0002/
- https://security.netapp.com/advisory/ntap-20210902-0002/
Modified: 2024-11-21
CVE-2021-3995
A logic error was found in the libmount library of util-linux in the function that allows an unprivileged user to unmount a FUSE filesystem. This flaw allows an unprivileged local attacker to unmount FUSE filesystems that belong to certain other users who have a UID that is a prefix of the UID of the attacker in its string form. An attacker may use this flaw to cause a denial of service to applications that use the affected filesystems.
- http://packetstormsecurity.com/files/170176/snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html
- http://packetstormsecurity.com/files/170176/snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html
- 20221208 Race condition in snap-confine's must_mkdir_and_open_with_perms() (CVE-2022-3328)
- 20221208 Race condition in snap-confine's must_mkdir_and_open_with_perms() (CVE-2022-3328)
- [oss-security] 20221130 Race condition in snap-confine's must_mkdir_and_open_with_perms() (CVE-2022-3328)
- [oss-security] 20221130 Race condition in snap-confine's must_mkdir_and_open_with_perms() (CVE-2022-3328)
- https://bugzilla.redhat.com/show_bug.cgi?id=2024631https://access.redhat.com/security/cve/CVE-2021-3995
- https://bugzilla.redhat.com/show_bug.cgi?id=2024631https://access.redhat.com/security/cve/CVE-2021-3995
- https://github.com/util-linux/util-linux/commit/57202f5713afa2af20ffbb6ab5331481d0396f8d
- https://github.com/util-linux/util-linux/commit/57202f5713afa2af20ffbb6ab5331481d0396f8d
- https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
- https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
- GLSA-202401-08
- GLSA-202401-08
- https://security.netapp.com/advisory/ntap-20221209-0002/
- https://security.netapp.com/advisory/ntap-20221209-0002/
- https://www.openwall.com/lists/oss-security/2022/01/24/2
- https://www.openwall.com/lists/oss-security/2022/01/24/2
Modified: 2024-11-21
CVE-2021-3996
A logic error was found in the libmount library of util-linux in the function that allows an unprivileged user to unmount a FUSE filesystem. This flaw allows a local user on a vulnerable system to unmount other users' filesystems that are either world-writable themselves (like /tmp) or mounted in a world-writable directory. An attacker may use this flaw to cause a denial of service to applications that use the affected filesystems.
- http://packetstormsecurity.com/files/170176/snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html
- http://packetstormsecurity.com/files/170176/snap-confine-must_mkdir_and_open_with_perms-Race-Condition.html
- 20221208 Race condition in snap-confine's must_mkdir_and_open_with_perms() (CVE-2022-3328)
- 20221208 Race condition in snap-confine's must_mkdir_and_open_with_perms() (CVE-2022-3328)
- [oss-security] 20221130 Race condition in snap-confine's must_mkdir_and_open_with_perms() (CVE-2022-3328)
- [oss-security] 20221130 Race condition in snap-confine's must_mkdir_and_open_with_perms() (CVE-2022-3328)
- https://access.redhat.com/security/cve/CVE-2021-3996
- https://access.redhat.com/security/cve/CVE-2021-3996
- https://bugzilla.redhat.com/show_bug.cgi?id=2024628
- https://bugzilla.redhat.com/show_bug.cgi?id=2024628
- https://github.com/util-linux/util-linux/commit/166e87368ae88bf31112a30e078cceae637f4cdb
- https://github.com/util-linux/util-linux/commit/166e87368ae88bf31112a30e078cceae637f4cdb
- https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
- https://mirrors.edge.kernel.org/pub/linux/utils/util-linux/v2.37/v2.37.3-ReleaseNotes
- GLSA-202401-08
- GLSA-202401-08
- https://security.netapp.com/advisory/ntap-20221209-0002/
- https://security.netapp.com/advisory/ntap-20221209-0002/
- https://www.openwall.com/lists/oss-security/2022/01/24/2
- https://www.openwall.com/lists/oss-security/2022/01/24/2
Modified: 2024-11-21
CVE-2022-0563
A flaw was found in the util-linux chfn and chsh utilities when compiled with Readline support. The Readline library uses an "INPUTRC" environment variable to get a path to the library config file. When the library cannot parse the specified file, it prints an error message containing data from the file. This flaw allows an unprivileged user to read root-owned files, potentially leading to privilege escalation. This flaw affects util-linux versions prior to 2.37.4.
- https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u
- https://lore.kernel.org/util-linux/20220214110609.msiwlm457ngoic6w%40ws.net.home/T/#u
- GLSA-202401-08
- GLSA-202401-08
- https://security.netapp.com/advisory/ntap-20220331-0002/
- https://security.netapp.com/advisory/ntap-20220331-0002/
Modified: 2024-11-21
CVE-2023-0563
A vulnerability classified as problematic has been found in PHPGurukul Bank Locker Management System 1.0. This affects an unknown part of the file add-locker-form.php of the component Assign Locker. The manipulation of the argument ahname leads to cross site scripting. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The identifier VDB-219717 was assigned to this vulnerability.
- https://github.com/ctflearner/Vulnerability/blob/main/Bank_Locker_Management_System/BLMS_XSS_IN_ADMIN_BROWSER.md
- https://github.com/ctflearner/Vulnerability/blob/main/Bank_Locker_Management_System/BLMS_XSS_IN_ADMIN_BROWSER.md
- https://vuldb.com/?ctiid.219717
- https://vuldb.com/?ctiid.219717
- https://vuldb.com/?id.219717
- https://vuldb.com/?id.219717
Closed bugs
losetup cannot use hashalot package and therefore should not require it