ALT-BU-2022-7477-1
Branch sisyphus_e2k update bulletin.
Package eepm updated to version 3.28.0-alt1 for branch sisyphus_e2k.
Closed bugs
epm play r7office: некорректная иконка приложения
epm play meridius: битые пакеты
Package libtiff updated to version 4.4.0-alt2 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2022-06974
Уязвимость функции TIFFReadRGBATileExt() библиотеи LibTIFF, связанная с целочисленным переполнением, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-01706
Уязвимость функции tiffcrop библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-01707
Уязвимость функции tiffcrop библиотеки LibTIFF, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-01715
Уязвимость функции tiffcrop библиотеки LibTIFF, связанная с отсутствием проверки деления на ноль, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2022-2056
Divide By Zero error in tiffcrop in libtiff 4.4.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f3a5e010.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2056.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2056.json
- https://gitlab.com/libtiff/libtiff/-/issues/415
- https://gitlab.com/libtiff/libtiff/-/issues/415
- https://gitlab.com/libtiff/libtiff/-/merge_requests/346
- https://gitlab.com/libtiff/libtiff/-/merge_requests/346
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- FEDORA-2022-edf7301147
- FEDORA-2022-edf7301147
- FEDORA-2022-b9c2a3a2b7
- FEDORA-2022-b9c2a3a2b7
- https://security.netapp.com/advisory/ntap-20220826-0001/
- https://security.netapp.com/advisory/ntap-20220826-0001/
- DSA-5333
- DSA-5333
Modified: 2024-11-21
CVE-2022-2057
Divide By Zero error in tiffcrop in libtiff 4.4.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f3a5e010.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2057.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2057.json
- https://gitlab.com/libtiff/libtiff/-/issues/427
- https://gitlab.com/libtiff/libtiff/-/issues/427
- https://gitlab.com/libtiff/libtiff/-/merge_requests/346
- https://gitlab.com/libtiff/libtiff/-/merge_requests/346
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- FEDORA-2022-edf7301147
- FEDORA-2022-edf7301147
- FEDORA-2022-b9c2a3a2b7
- FEDORA-2022-b9c2a3a2b7
- https://security.netapp.com/advisory/ntap-20220826-0001/
- https://security.netapp.com/advisory/ntap-20220826-0001/
- DSA-5333
- DSA-5333
Modified: 2024-11-21
CVE-2022-2058
Divide By Zero error in tiffcrop in libtiff 4.4.0 allows attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit f3a5e010.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2058.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-2058.json
- https://gitlab.com/libtiff/libtiff/-/issues/428
- https://gitlab.com/libtiff/libtiff/-/issues/428
- https://gitlab.com/libtiff/libtiff/-/merge_requests/346
- https://gitlab.com/libtiff/libtiff/-/merge_requests/346
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- FEDORA-2022-edf7301147
- FEDORA-2022-edf7301147
- FEDORA-2022-b9c2a3a2b7
- FEDORA-2022-b9c2a3a2b7
- https://security.netapp.com/advisory/ntap-20220826-0001/
- https://security.netapp.com/advisory/ntap-20220826-0001/
- DSA-5333
- DSA-5333
Modified: 2024-11-21
CVE-2022-2519
There is a double free or corruption in rotateImage() at tiffcrop.c:8839 found in libtiff 4.4.0rc1
Modified: 2024-11-21
CVE-2022-2520
A flaw was found in libtiff 4.4.0rc1. There is a sysmalloc assertion fail in rotateImage() at tiffcrop.c:8621 that can cause program crash when reading a crafted input.
Modified: 2024-11-21
CVE-2022-2521
It was found in libtiff 4.4.0rc1 that there is an invalid pointer free operation in TIFFClose() at tif_close.c:131 called by tiffcrop.c:2522 that can cause a program crash and denial of service while processing crafted input.
Modified: 2024-11-21
CVE-2022-34526
A stack overflow was discovered in the _TIFFVGetField function of Tiffsplit v4.4.0. This vulnerability allows attackers to cause a Denial of Service (DoS) via a crafted TIFF file parsed by the "tiffsplit" or "tiffcrop" utilities.
- https://gitlab.com/libtiff/libtiff/-/issues/433
- https://gitlab.com/libtiff/libtiff/-/issues/433
- https://gitlab.com/libtiff/libtiff/-/issues/486
- https://gitlab.com/libtiff/libtiff/-/issues/486
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- FEDORA-2022-83b9a5bf0f
- FEDORA-2022-83b9a5bf0f
- https://security.netapp.com/advisory/ntap-20220930-0002/
- https://security.netapp.com/advisory/ntap-20220930-0002/
- DSA-5333
- DSA-5333
Modified: 2024-11-21
CVE-2022-3597
LibTIFF 4.4.0 has an out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c:346 when called from extractImageSection, tools/tiffcrop.c:6826, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 236b7191.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3597.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3597.json
- https://gitlab.com/libtiff/libtiff/-/commit/236b7191f04c60d09ee836ae13b50f812c841047
- https://gitlab.com/libtiff/libtiff/-/commit/236b7191f04c60d09ee836ae13b50f812c841047
- https://gitlab.com/libtiff/libtiff/-/issues/413
- https://gitlab.com/libtiff/libtiff/-/issues/413
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- https://security.netapp.com/advisory/ntap-20230110-0001/
- https://security.netapp.com/advisory/ntap-20230110-0001/
- DSA-5333
- DSA-5333
Modified: 2025-03-14
CVE-2022-3598
LibTIFF 4.4.0 has an out-of-bounds write in extractContigSamplesShifted24bits in tools/tiffcrop.c:3604, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit cfbb883b.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3598.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3598.json
- https://gitlab.com/libtiff/libtiff/-/commit/cfbb883bf6ea7bedcb04177cc4e52d304522fdff
- https://gitlab.com/libtiff/libtiff/-/commit/cfbb883bf6ea7bedcb04177cc4e52d304522fdff
- https://gitlab.com/libtiff/libtiff/-/issues/435
- https://gitlab.com/libtiff/libtiff/-/issues/435
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- https://security.netapp.com/advisory/ntap-20230110-0001/
- https://security.netapp.com/advisory/ntap-20230110-0001/
Modified: 2024-11-21
CVE-2022-3599
LibTIFF 4.4.0 has an out-of-bounds read in writeSingleSection in tools/tiffcrop.c:7345, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit e8131125.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3599.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3599.json
- https://gitlab.com/libtiff/libtiff/-/commit/e813112545942107551433d61afd16ac094ff246
- https://gitlab.com/libtiff/libtiff/-/commit/e813112545942107551433d61afd16ac094ff246
- https://gitlab.com/libtiff/libtiff/-/issues/398
- https://gitlab.com/libtiff/libtiff/-/issues/398
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- https://security.netapp.com/advisory/ntap-20230110-0001/
- https://security.netapp.com/advisory/ntap-20230110-0001/
- DSA-5333
- DSA-5333
Modified: 2024-11-21
CVE-2022-3626
LibTIFF 4.4.0 has an out-of-bounds write in _TIFFmemset in libtiff/tif_unix.c:340 when called from processCropSelections, tools/tiffcrop.c:7619, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 236b7191.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3626.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3626.json
- https://gitlab.com/libtiff/libtiff/-/commit/236b7191f04c60d09ee836ae13b50f812c841047
- https://gitlab.com/libtiff/libtiff/-/commit/236b7191f04c60d09ee836ae13b50f812c841047
- https://gitlab.com/libtiff/libtiff/-/issues/426
- https://gitlab.com/libtiff/libtiff/-/issues/426
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- https://security.netapp.com/advisory/ntap-20230110-0001/
- https://security.netapp.com/advisory/ntap-20230110-0001/
Modified: 2024-11-21
CVE-2022-3627
LibTIFF 4.4.0 has an out-of-bounds write in _TIFFmemcpy in libtiff/tif_unix.c:346 when called from extractImageSection, tools/tiffcrop.c:6860, allowing attackers to cause a denial-of-service via a crafted tiff file. For users that compile libtiff from sources, the fix is available with commit 236b7191.
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3627.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3627.json
- https://gitlab.com/libtiff/libtiff/-/commit/236b7191f04c60d09ee836ae13b50f812c841047
- https://gitlab.com/libtiff/libtiff/-/commit/236b7191f04c60d09ee836ae13b50f812c841047
- https://gitlab.com/libtiff/libtiff/-/issues/411
- https://gitlab.com/libtiff/libtiff/-/issues/411
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- https://security.netapp.com/advisory/ntap-20230110-0001/
- https://security.netapp.com/advisory/ntap-20230110-0001/
- DSA-5333
- DSA-5333
Modified: 2024-11-21
CVE-2022-3970
A vulnerability was found in LibTIFF. It has been classified as critical. This affects the function TIFFReadRGBATileExt of the file libtiff/tif_getimage.c. The manipulation leads to integer overflow. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. The name of the patch is 227500897dfb07fb7d27f7aa570050e62617e3be. It is recommended to apply a patch to fix this issue. The identifier VDB-213549 was assigned to this vulnerability.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=53137
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=53137
- https://gitlab.com/libtiff/libtiff/-/commit/227500897dfb07fb7d27f7aa570050e62617e3be
- https://gitlab.com/libtiff/libtiff/-/commit/227500897dfb07fb7d27f7aa570050e62617e3be
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- [debian-lts-announce] 20230120 [SECURITY] [DLA 3278-1] tiff security update
- https://oss-fuzz.com/download?testcase_id=5738253143900160
- https://oss-fuzz.com/download?testcase_id=5738253143900160
- https://security.netapp.com/advisory/ntap-20221215-0009/
- https://security.netapp.com/advisory/ntap-20221215-0009/
- https://support.apple.com/kb/HT213841
- https://support.apple.com/kb/HT213841
- https://support.apple.com/kb/HT213843
- https://support.apple.com/kb/HT213843
- https://vuldb.com/?id.213549
- https://vuldb.com/?id.213549
Closed bugs
Уязвимости в libtiff
Package mediawiki updated to version 1.39.0-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2022-03040
Уязвимость утилиты командной строки cURL, связанная с недостаточной защитой регистрационных данных, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Modified: 2024-11-21
CVE-2022-27776
A insufficiently protected credentials vulnerability in fixed in curl 7.83.0 might leak authentication or cookie header data on HTTP redirects to the same host but another port number.
- https://hackerone.com/reports/1547048
- https://hackerone.com/reports/1547048
- [debian-lts-announce] 20220828 [SECURITY] [DLA 3085-1] curl security update
- [debian-lts-announce] 20220828 [SECURITY] [DLA 3085-1] curl security update
- FEDORA-2022-f83aec6d57
- FEDORA-2022-f83aec6d57
- FEDORA-2022-bca2c95559
- FEDORA-2022-bca2c95559
- GLSA-202212-01
- GLSA-202212-01
- https://security.netapp.com/advisory/ntap-20220609-0008/
- https://security.netapp.com/advisory/ntap-20220609-0008/
- DSA-5197
- DSA-5197
Modified: 2024-11-21
CVE-2022-28323
An issue was discovered in MediaWiki through 1.37.2. The SecurePoll extension allows a leak because sorting by timestamp is supported,
- https://gerrit.wikimedia.org/r/q/93758c4c13b972d240a6313e0472df1667118893
- https://gerrit.wikimedia.org/r/q/93758c4c13b972d240a6313e0472df1667118893
- https://gerrit.wikimedia.org/r/q/I9d3b9a942ea71d777ec32121fa36262f549d283d
- https://gerrit.wikimedia.org/r/q/I9d3b9a942ea71d777ec32121fa36262f549d283d
- https://phabricator.wikimedia.org/T298434
- https://phabricator.wikimedia.org/T298434
Modified: 2024-11-21
CVE-2022-29903
The Private Domains extension for MediaWiki through 1.37.2 (before 1ad65d4c1c199b375ea80988d99ab51ae068f766) allows CSRF for editing pages that store the extension's configuration. The attacker must trigger a POST request to Special:PrivateDomains.
Modified: 2024-11-21
CVE-2022-29904
The SemanticDrilldown extension for MediaWiki through 1.37.2 (before e688bdba6434591b5dff689a45e4d53459954773) allows SQL injection with certain '-' and '_' constraints.
Modified: 2024-11-21
CVE-2022-29905
The FanBoxes extension for MediaWiki through 1.37.2 (before 027ffb0b9d6fe0d823810cf03f5b562a212162d4) allows Special:UserBoxes CSRF.
Modified: 2024-11-21
CVE-2022-29906
The admin API module in the QuizGame extension for MediaWiki through 1.37.2 (before 665e33a68f6fa1167df99c0aa18ed0157cdf9f66) omits a check for the quizadmin user.
Modified: 2024-11-21
CVE-2022-29907
The Nimbus skin for MediaWiki through 1.37.2 (before 6f9c8fb868345701d9544a54d9752515aace39df) allows XSS in Advertise link messages.
Modified: 2024-11-21
CVE-2022-34750
An issue was discovered in MediaWiki through 1.38.1. The lemma length of a Wikibase lexeme is currently capped at a thousand characters. Unfortunately, this length is not validated, allowing much larger lexemes to be created, which introduces various denial-of-service attack vectors within the Wikibase and WikibaseLexeme extensions. This is related to Special:NewLexeme and Special:NewProperty.
- https://gerrit.wikimedia.org/r/q/I8171bfef73e525d73efa60b407ce147130ea4742
- https://gerrit.wikimedia.org/r/q/I8171bfef73e525d73efa60b407ce147130ea4742
- https://gerrit.wikimedia.org/r/q/Id89a9b08e40f075d2d422cafd03668dff3ce7fc9
- https://gerrit.wikimedia.org/r/q/Id89a9b08e40f075d2d422cafd03668dff3ce7fc9
- https://phabricator.wikimedia.org/T308659
- https://phabricator.wikimedia.org/T308659
Modified: 2024-11-21
CVE-2022-34911
An issue was discovered in MediaWiki before 1.35.7, 1.36.x and 1.37.x before 1.37.3, and 1.38.x before 1.38.1. XSS can occur in configurations that allow a JavaScript payload in a username. After account creation, when it sets the page title to "Welcome" followed by the username, the username is not escaped: SpecialCreateAccount::successfulAction() calls ::showSuccessPage() with a message as second parameter, and OutputPage::setPageTitle() uses text().
- [debian-lts-announce] 20220922 [SECURITY] [DLA 3117-1] mediawiki security update
- [debian-lts-announce] 20220922 [SECURITY] [DLA 3117-1] mediawiki security update
- FEDORA-2022-f83aec6d57
- FEDORA-2022-f83aec6d57
- FEDORA-2022-bca2c95559
- FEDORA-2022-bca2c95559
- https://phabricator.wikimedia.org/T308471
- https://phabricator.wikimedia.org/T308471
- GLSA-202305-24
- GLSA-202305-24
- DSA-5246
- DSA-5246
Modified: 2024-11-21
CVE-2022-34912
An issue was discovered in MediaWiki before 1.37.3 and 1.38.x before 1.38.1. The contributions-title, used on Special:Contributions, is used as page title without escaping. Hence, in a non-default configuration where a username contains HTML entities, it won't be escaped.
- [debian-lts-announce] 20220922 [SECURITY] [DLA 3117-1] mediawiki security update
- [debian-lts-announce] 20220922 [SECURITY] [DLA 3117-1] mediawiki security update
- FEDORA-2022-f83aec6d57
- FEDORA-2022-f83aec6d57
- FEDORA-2022-bca2c95559
- FEDORA-2022-bca2c95559
- https://phabricator.wikimedia.org/T308473
- https://phabricator.wikimedia.org/T308473
- GLSA-202305-24
- GLSA-202305-24
- DSA-5246
- DSA-5246
Modified: 2024-11-21
CVE-2022-39194
An issue was discovered in the MediaWiki through 1.38.2. The community configuration pages for the GrowthExperiments extension could cause a site to become unavailable due to insufficient validation when certain actions (including page moves) were performed.
Modified: 2024-11-21
CVE-2022-41765
An issue was discovered in MediaWiki before 1.35.8, 1.36.x and 1.37.x before 1.37.5, and 1.38.x before 1.38.3. HTMLUserTextField exposes the existence of hidden users.
Modified: 2024-11-21
CVE-2022-41766
An issue was discovered in MediaWiki before 1.35.8, 1.36.x and 1.37.x before 1.37.5, and 1.38.x before 1.38.3. Upon an action=rollback operation, the alreadyrolled message can leak a user name (when the user has been revision deleted/suppressed).
Modified: 2024-11-21
CVE-2022-41767
An issue was discovered in MediaWiki before 1.35.8, 1.36.x and 1.37.x before 1.37.5, and 1.38.x before 1.38.3. When changes made by an IP address are reassigned to a user (using reassignEdits.php), the changes will still be attributed to the IP address on Special:Contributions when doing a range lookup.
Package kdiskmark updated to version 3.1.2-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-40673
KDiskMark before 3.1.0 lacks authorization checking for D-Bus methods such as Helper::flushPageCache.
- [oss-security] 20220914 insufficiently protected D-Bus interface in KDiskMark 3.0.0 (CVE-2022-40673)
- [oss-security] 20220914 insufficiently protected D-Bus interface in KDiskMark 3.0.0 (CVE-2022-40673)
- https://github.com/JonMagon/KDiskMark/commit/3c90083a4f5ba3f240a797e509d818221542bbdc
- https://github.com/JonMagon/KDiskMark/commit/3c90083a4f5ba3f240a797e509d818221542bbdc
- https://github.com/JonMagon/KDiskMark/compare/3.0.0...3.1.0
- https://github.com/JonMagon/KDiskMark/compare/3.0.0...3.1.0
- https://github.com/JonMagon/KDiskMark/releases/tag/3.1.0
- https://github.com/JonMagon/KDiskMark/releases/tag/3.1.0
- FEDORA-2022-97149edce1
- FEDORA-2022-97149edce1