ALT-BU-2022-7533-1
Branch sisyphus_riscv64 update bulletin.
Package libetpan updated to version 1.9.4-alt3 for branch sisyphus_riscv64.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-4121
In libetpan a null pointer dereference in mailimap_mailbox_data_status_free in low-level/imap/mailimap_types.c was found that could lead to a remote denial of service or other potential consequences.
Package python3-module-jose updated to version 3.3.0-alt2 for branch sisyphus_riscv64.
Closed bugs
Собрать без python3-module-pytest-runner
Package dbus updated to version 1.14.4-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2022-06389
Уязвимость системы межпроцессного взаимодействия D-Bus, связанная с достижимостью утверждения в отладочных сборках, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06391
Уязвимость системы межпроцессного взаимодействия D-Bus, связанная с ошибкой использования памяти после освобождения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06394
Уязвимость системы межпроцессного взаимодействия D-Bus, связанная с граничной ошибкой, вызванной недопустимым массивом элементов фиксированной длины, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2022-42010
An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash when receiving a message with certain invalid type signatures.
- https://gitlab.freedesktop.org/dbus/dbus/-/issues/418
- https://gitlab.freedesktop.org/dbus/dbus/-/issues/418
- FEDORA-2022-7a963a79d1
- FEDORA-2022-7a963a79d1
- FEDORA-2022-b0c2f2ab74
- FEDORA-2022-b0c2f2ab74
- FEDORA-2022-076544c8aa
- FEDORA-2022-076544c8aa
- GLSA-202305-08
- GLSA-202305-08
- https://www.openwall.com/lists/oss-security/2022/10/06/1
- https://www.openwall.com/lists/oss-security/2022/10/06/1
Modified: 2024-11-21
CVE-2022-42011
An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash when receiving a message where an array length is inconsistent with the size of the element type.
- https://gitlab.freedesktop.org/dbus/dbus/-/issues/413
- https://gitlab.freedesktop.org/dbus/dbus/-/issues/413
- FEDORA-2022-7a963a79d1
- FEDORA-2022-7a963a79d1
- FEDORA-2022-b0c2f2ab74
- FEDORA-2022-b0c2f2ab74
- FEDORA-2022-076544c8aa
- FEDORA-2022-076544c8aa
- GLSA-202305-08
- GLSA-202305-08
- https://www.openwall.com/lists/oss-security/2022/10/06/1
- https://www.openwall.com/lists/oss-security/2022/10/06/1
Modified: 2024-11-21
CVE-2022-42012
An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash by sending a message with attached file descriptors in an unexpected format.
- https://gitlab.freedesktop.org/dbus/dbus/-/issues/417
- https://gitlab.freedesktop.org/dbus/dbus/-/issues/417
- FEDORA-2022-7a963a79d1
- FEDORA-2022-7a963a79d1
- FEDORA-2022-b0c2f2ab74
- FEDORA-2022-b0c2f2ab74
- FEDORA-2022-076544c8aa
- FEDORA-2022-076544c8aa
- GLSA-202305-08
- GLSA-202305-08
- https://www.openwall.com/lists/oss-security/2022/10/06/1
- https://www.openwall.com/lists/oss-security/2022/10/06/1
Package sane updated to version 1.1.1-alt1 for branch sisyphus_riscv64.
Closed bugs
1.1.1
Package rpm-build-tex updated to version 0.4.5-alt1 for branch sisyphus_riscv64.
Closed bugs
Optimize /usr/lib/rpm/tex.req.files
Package containerd updated to version 1.6.13-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2022-07471
Уязвимость среды выполнения контейнеров containerd, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю выполнить атаку типа «отказ в обслуживании» (DoS)
Modified: 2024-11-21
CVE-2022-23471
containerd is an open source container runtime. A bug was found in containerd's CRI implementation where a user can exhaust memory on the host. In the CRI stream server, a goroutine is launched to handle terminal resize events if a TTY is requested. If the user's process fails to launch due to, for example, a faulty command, the goroutine will be stuck waiting to send without a receiver, resulting in a memory leak. Kubernetes and crictl can both be configured to use containerd's CRI implementation and the stream server is used for handling container IO. This bug has been fixed in containerd 1.6.12 and 1.5.16. Users should update to these versions to resolve the issue. Users unable to upgrade should ensure that only trusted images and commands are used and that only trusted users have permissions to execute commands in running containers.
- https://github.com/containerd/containerd/commit/a05d175400b1145e5e6a735a6710579d181e7fb0
- https://github.com/containerd/containerd/commit/a05d175400b1145e5e6a735a6710579d181e7fb0
- https://github.com/containerd/containerd/security/advisories/GHSA-2qjp-425j-52j9
- https://github.com/containerd/containerd/security/advisories/GHSA-2qjp-425j-52j9
- https://security.gentoo.org/glsa/202401-31
- https://security.gentoo.org/glsa/202401-31
Package curl updated to version 7.87.0-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2023-02157
Уязвимость механизма HSTS (HTTP Strict Transport Security) утилиты командной строки cURL, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Modified: 2024-11-21
CVE-2022-43551
A vulnerability exists in curl <7.87.0 HSTS check that could be bypassed to trick it to keep using HTTP. Using its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. However, the HSTS mechanism could be bypassed if the host name in the given URL first uses IDN characters that get replaced to ASCII counterparts as part of the IDN conversion. Like using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop (U+002E) `.`. Then in a subsequent request, it does not detect the HSTS state and makes a clear text transfer. Because it would store the info IDN encoded but look for it IDN decoded.
- https://hackerone.com/reports/1755083
- https://hackerone.com/reports/1755083
- FEDORA-2022-d7ee33d4ad
- FEDORA-2022-d7ee33d4ad
- https://security.gentoo.org/glsa/202310-12
- https://security.gentoo.org/glsa/202310-12
- https://security.netapp.com/advisory/ntap-20230427-0007/
- https://security.netapp.com/advisory/ntap-20230427-0007/
Modified: 2024-11-21
CVE-2022-43552
A use after free vulnerability exists in curl <7.87.0. Curl can be asked to *tunnel* virtually all protocols it supports through an HTTP proxy. HTTP proxies can (and often do) deny such tunnel operations. When getting denied to tunnel the specific protocols SMB or TELNET, curl would use a heap-allocated struct after it had been freed, in its transfer shutdown code path.
- 20230327 APPLE-SA-2023-03-27-3 macOS Ventura 13.3
- 20230327 APPLE-SA-2023-03-27-3 macOS Ventura 13.3
- https://hackerone.com/reports/1764858
- https://hackerone.com/reports/1764858
- GLSA-202310-12
- GLSA-202310-12
- https://security.netapp.com/advisory/ntap-20230214-0002/
- https://security.netapp.com/advisory/ntap-20230214-0002/
- https://support.apple.com/kb/HT213670
- https://support.apple.com/kb/HT213670
Package eepm updated to version 3.28.1-alt1 for branch sisyphus_riscv64.
Closed bugs
Просьба добавить в epm или репозиторий программу iptvnator.