[Security] Mitigation & Patch
Maybe we could stick this one ?
|
libexpat: before 2.4.5
CVE-2022-25236 lib: Protect against insertion of namesep characters into namespace URIs https://github.com/libexpat/libexpat/pull/561 CVE-2022-25235 lib: Protect against malformed encoding (e.g. malformed UTF-8) https://github.com/libexpat/libexpat/pull/562 |
Vim: before 8.2.4397
"Crash when using many composing characters in error message" https://nvd.nist.gov/vuln/detail/CVE-2022-0629 severity: 8.4 Patch: https://github.com/vim/vim/commit/34...2729db278163fc Or upgrade to the latest version |
Quote:
CVE-2022-25313 Prevent stack exhaustion in build_model https://github.com/libexpat/libexpat/pull/558 CVE-2022-25314 Prevent integer overflow in copyString https://github.com/libexpat/libexpat/pull/560 CVE-2022-25315 Prevent integer overflow in storeRawNames https://github.com/libexpat/libexpat/pull/559 |
vim : Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4440
CVE-2022-0729 https://nvd.nist.gov/vuln/detail/CVE-2022-0729 patch 8.2.4440: crash with specific regexp pattern and string https://github.com/vim/vim/commit/64...af09974604ff30 |
Quote:
|
Quote:
|
gettext : patch
from archlinux: Code:
This uses an internal version of libcroco, which has known security issues. build option: Code:
--without-included-gettext |
"Dirty Pipe" kernel vulnerability - CVE-2022-0847
Details: https://dirtypipe.cm4all.com/ Summary: "a vulnerability in the Linux kernel since 5.8 which allows overwriting data in arbitrary read-only files. This leads to privilege escalation because unprivileged processes can inject code into root processes." Fixed in kernels 5.16.11, 5.15.25 and 5.10.102. |
Quote:
https://arstechnica.com/information-...lity-in-years/ |
polkit 0.120
There is a flaw in polkit which can allow an unprivileged user to cause polkit to crash, due to process file descriptor exhaustion. CVE 2021-4115: https://github.com/advisories/GHSA-vvr6-r92h-x7jw Patch: https://gitlab.com/redhat/centos-str...42b0f2b15c531e EDIT: already reported by @gmgf in "request for current" |
Anyone else think this thread should be made "sticky"?
:) |
Not so sure. Average users depend on Pat's reactivity and for more advanced or concerned users, there're mailing lists and so on...
|
Quote:
|
Sorry for my bad english : Pat's speed to update.
I can't fix that myself, I rely on his fix. |
Quote:
The main goal, here, is to post what people found elsewhere (nist.gov, gentoo, arch, ...) and give visibility for everyone, Mr. Volkerding icluded This may or may not be useful, but it has the merit to exist. If you look at the changelog, there are many patches that have been applied thanks to user reports. |
Yes indeed. I just believe our BDFL does not rely on sticky posts and subscribe to the most relevent threads.
I like the less for the number of sticky posts and subscribe to (too) much more threads. |
Quote:
|
zlib 1.2.11
zlib 1.2.11 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches. CVE: https://nvd.nist.gov/vuln/detail/CVE-2018-25032 Patch: https://github.com/madler/zlib/commi...7c615f8020c531 |
For Slackware 15.0
CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-0995 https://git.kernel.org/pub/scm/linux...9921b3cba63fbb Fixed for kernel >= 5.15.29 https://git.kernel.org/pub/scm/linux...h=linux-5.15.y |
libarchive 3.6.0
CVE: https://nvd.nist.gov/vuln/detail/CVE-2022-26280 Patch: https://github.com/libarchive/libarc...8f94fce37d6aff |
Quote:
|
Vim 8.2.x
Use after free in utf_ptr2char in GitHub repository vim/vim prior to 8.2.4646 CVE-2022-1154: https://nvd.nist.gov/vuln/detail/CVE-2022-1154 EDIT: + heap buffer overflow in get_one_sourceline in GitHub repository vim/vim prior to 8.2. CVE-2022-1160: https://nvd.nist.gov/vuln/detail/CVE-2022-1160 Update: Latest version 8.2.46494650 |
Well it certainly seems that someone is finding this thread useful:
Code:
patches/packages/zlib-1.2.12-x86_64-1_slack15.0.txz: Upgraded. I think it's a valuable thread and agree that it ought to be pinned. Thanks to you marav. |
It's indeed a very valuable thread ! Do not misread me : I do not think it's useful to have it sticky. I believe our BDFL will/have subscribe/d.
|
libtiff 4.3.0
Code:
A vulnerability classified as problematic was found in LibTIFF 4.3.0. Affected by this vulnerability is the https://nvd.nist.gov/vuln/detail/CVE-2022-1210 No patch yet |
xz 5.2.5
xzgrep: Fix escaping of malicious filenames (ZDI-CAN-16587). Code:
Malicious filenames can make xzgrep to write to arbitrary files https://tukaani.org/xz/xzgrep-ZDI-CAN-16587.patch |
libimobiledevice-glue
Fix a memory leak https://github.com/libimobiledevice/...e-glue/pull/21 Commit: https://github.com/libimobiledevice/...6298a5d689c4fa |
Git 2.35.2
https://www.phoronix.com/scan.php?pa...CVE-2022-24765 Technically this doesn't really affect non-windows systems, but worth mentioning. |
Quote:
|
Quote:
Code:
If you can’t upgrade immediately, the most effective ways to reduce your risk are the following: |
CVE-2022-29458
https://nvd.nist.gov/vuln/detail/CVE-2022-29458 Code:
ncurses 6.3 before patch 20220416 has an out-of-bounds read and segmentation https://invisible-island.net/archive...20416.patch.gz |
Freetype 2.12.0
Code:
src/cff/cffgload.c (cff_slot_load) [FT_CONFIG_OPTION_SVG]:Fix segfault. Patch: https://gitweb.gentoo.org/repo/gento...ault_fix.patch |
Even though this is not technically a security fix, it is worth mentioning the new 5.15.35 kernel has a backported patch that improves performance for alder lake processors. There will probably be a kernel security upgrade in the future so this is not that important but still I thought I would post about it.
https://www.phoronix.com/scan.php?pa...1535-adl&num=1 |
CVE-2022-1420
Code:
Use of Out-of-range Pointer Offset in GitHub repository vim/vim prior to 8.2.4774. |
CVE-2022-0742
Linux Kernel up to 5.15.27/5.16.13/5.17-rc7 ICMPv6 Packet igmp6_event_query/igmp6_event_report resource consumption https://vuldb.com/?id.195443 |
CVE-2022-29869
https://nvd.nist.gov/vuln/detail/CVE-2022-29869 Code:
cifs-utils through 6.14, with verbose logging, can cause an information leak when a file https://github.com/piastry/cifs-util...f5a03f83d9c379 |
CVE-2022-1616
https://nvd.nist.gov/vuln/detail/CVE-2022-1616 Code:
Use after free in append_command in GitHub repository vim/vim prior to 8.2. patch 8.2.4895: buffer overflow with invalid command with composing chars https://github.com/vim/vim/commit/d8...1c9f0cab68cc6c |
CVE-2022-30775
Code:
xpdf 4.04 allocates excessive memory when presented with crafted input. This can be triggered |
CVE-2022-1733
https://nvd.nist.gov/vuln/detail/CVE-2022-1733 Code:
Heap-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. https://github.com/vim/vim/commit/60...a61cacf220f813 CVE-2022-1769 https://nvd.nist.gov/vuln/detail/CVE-2022-1769 Code:
Buffer Over-read in GitHub repository vim/vim prior to 8.2. https://github.com/vim/vim/commit/47...bb1aad51f8d0b4 |
CVE-2022-30067
https://nvd.nist.gov/vuln/detail/CVE-2022-30067 Code:
GIMP 2.10.30 and 2.99.10 are vulnerable to Buffer Overflow. Code:
Jacob Boerema @Wormnest · 2 weeks ago https://gitlab.gnome.org/GNOME/gimp/...d38a99d71214b6 |
CVE-2022-1771
https://nvd.nist.gov/vuln/detail/CVE-2022-1771 Code:
Stack-based Buffer Overflow in GitHub repository vim/vim prior to 8.2. https://github.com/vim/vim/commit/51...a59880d1ee37a8 |
icu4c 71.1
CVE-2022-1638 patch from Gentoo: Code:
Fix int32 overflow in FormattedStringBuilder |
CVE-2022-1785
https://nvd.nist.gov/vuln/detail/CVE-2022-1785 patch 8.2.4977: memory access error when substitute expression changes window https://github.com/vim/vim/commit/e2...cba8b1dba18839 |
CVE-2019-16707
https://nvd.nist.gov/vuln/detail/CVE-2019-16707 Code:
Hunspell 1.7.0 has an invalid read operation in SuggestMgr::leftcommonsubstring in suggestmgr.cxx. https://gitweb.gentoo.org/repo/gento...19-16707.patch |
CVE-2018-5786
https://nvd.nist.gov/vuln/detail/CVE-2018-5786 Code:
In Long Range Zip (aka lrzip) 0.631, there is an infinite loop and application hang Patch: https://github.com/ckolivas/lrzip/co...41ed95fb.patch |
gnutls 3.7.5
https://gitlab.com/gnutls/gnutls/-/issues/1367 Code:
Fix out-of-bounds memcpy in gnutls_realloc_zero() https://gitlab.com/gnutls/gnutls/-/m...sts/1592.patch |
seamonkey-2.53.12
https://wiki.linuxfromscratch.org/blfs/ticket/16567 to fix CVE-2022-1802 and CVE-2022-1529: Code:
Submitted By: Douglas R. Reno <renodr at linuxfromscratch dot org> |
I started a new github project to take into account what marav mainly discovered:
Follow link: https://github.com/nobodino/slackware-secutity-patches |
CVE-2022-32278
Code:
XFCE 4.16 allows attackers to execute arbitrary code because xdg-open can execute a .desktop Patch: https://gitlab.xfce.org/xfce/exo/-/c...460d4ef796de9f |
All times are GMT -5. The time now is 10:26 AM. |