VARIoT IoT vulnerabilities database
| VAR-202202-1220 | CVE-2021-21959 | Sealevel Systems SeaConnect 370W Trust Management Issue Vulnerability |
CVSS V2: 6.8 CVSS V3: 8.1 Severity: HIGH |
A misconfiguration exists in the MQTTS functionality of Sealevel Systems, Inc. SeaConnect 370W v1.3.34. This misconfiguration significantly simplifies a man-in-the-middle attack, which directly leads to control of device functionality. SeaConnect 370W Exists in a certificate validation vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Used to remotely monitor and control the status of the actual I/O process
| VAR-202202-1180 | CVE-2021-21968 | Sealevel Systems, Inc. SeaConnect 370W Input verification vulnerability in |
CVSS V2: 6.8 CVSS V3: 8.3 Severity: HIGH |
A file write vulnerability exists in the OTA update task functionality of Sealevel Systems, Inc. SeaConnect 370W v1.3.34. A specially-crafted MQTT payload can lead to arbitrary file overwrite. An attacker can perform a man-in-the-middle attack to trigger this vulnerability. Sealevel Systems, Inc. SeaConnect 370W There is an input validation vulnerability in.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Used to remotely monitor and control the status of the actual I/O process
| VAR-202202-1200 | CVE-2021-24868 | Document Embedder WordPress Resource disclosure vulnerability in wrong area in plugin |
CVSS V2: 4.0 CVSS V3: 4.3 Severity: MEDIUM |
The Document Embedder WordPress plugin before 1.7.9 contains a AJAX action endpoint, which could allow any authenticated user, such as subscriber to enumerate the title of arbitrary private and draft posts. Document Embedder WordPress The plugin contains a resource disclosure vulnerability in the wrong area.Information may be obtained
| VAR-202202-1182 | CVE-2021-21961 | Sealevel Systems, Inc. SeaConnect 370W Out-of-bounds write vulnerability in |
CVSS V2: 7.5 CVSS V3: 10.0 Severity: CRITICAL |
A stack-based buffer overflow vulnerability exists in the NBNS functionality of Sealevel Systems, Inc. SeaConnect 370W v1.3.34. A specially-crafted network packet can lead to remote code execution. An attacker can send a malicious packet to trigger this vulnerability. Sealevel Systems, Inc. SeaConnect 370W Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Used to remotely monitor and control the status of the actual I/O process
| VAR-202202-1218 | CVE-2021-21971 | Sealevel Systems, Inc. SeaConnect 370W Out-of-bounds write vulnerability in |
CVSS V2: 4.3 CVSS V3: 5.9 Severity: MEDIUM |
An out-of-bounds write vulnerability exists in the URL_decode functionality of Sealevel Systems, Inc. SeaConnect 370W v1.3.34. A specially-crafted MQTT payload can lead to an out-of-bounds write. An attacker can perform a man-in-the-middle attack to trigger this vulnerability. Sealevel Systems, Inc. Used to remotely monitor and control the status of the actual I/O process.
A buffer error vulnerability exists in Sealevel Systems SeaConnect 370W, which is caused by the product's OTA update task function not effectively limiting memory boundaries. An attacker can cause an out-of-bounds write and cause a denial of service through a specially crafted network packet
| VAR-202202-0102 | CVE-2021-41838 | InsydeH2O UEFI software impacted by multiple vulnerabilities in SMM |
CVSS V2: 7.2 CVSS V3: 8.2 Severity: HIGH |
An issue was discovered in SdHostDriver in the kernel 5.0 through 5.5 in Insyde InsydeH2O. There is an SMM callout that allows an attacker to access the System Management Mode and execute arbitrary code. This occurs because of a Numeric Range Comparison Without a Minimum Check. The InsydeH2O Hardware-2-Operating System (H2O) UEFI firmware contains multiple vulnerabilities related to memory management in System Management Mode (SMM).Vulnerability Category Count
SMM Privilege Escalation 10
SMM Memory Corruption 12
DXE Memory Corruption 1CVE-2020-27339 Affected
CVE-2020-5953 Affected
CVE-2021-33625 Affected
CVE-2021-33626 Affected
CVE-2021-33627 Affected
CVE-2021-41837 Affected
CVE-2021-41838 Affected
CVE-2021-41839 Affected
CVE-2021-41840 Affected
CVE-2021-41841 Affected
CVE-2021-42059 Affected
CVE-2021-42060 Not Affected
CVE-2021-42113 Affected
CVE-2021-42554 Affected
CVE-2021-43323 Affected
CVE-2021-43522 Affected
CVE-2021-43615 Not Affected
CVE-2021-45969 Not Affected
CVE-2021-45970 Not Affected
CVE-2021-45971 Not Affected
CVE-2022-24030 Not Affected
CVE-2022-24031 Not Affected
CVE-2022-24069 Not Affected
CVE-2022-28806 Unknown. Insyde InsydeH2O Is vulnerable to a buffer error.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state
| VAR-202202-1186 | CVE-2021-21967 | Sealevel Systems SeaConnect 370W Buffer error vulnerability |
CVSS V2: 7.1 CVSS V3: 5.9 Severity: MEDIUM |
An out-of-bounds write vulnerability exists in the OTA update task functionality of Sealevel Systems, Inc. SeaConnect 370W v1.3.34. A specially-crafted MQTT payload can lead to denial of service. An attacker can perform a man-in-the-middle attack to trigger this vulnerability. Sealevel Systems SeaConnect 370W is an industrial Internet of Things (Iiot) edge device from Sealevel Systems in the United States. Used to remotely monitor and control the status of the actual I/O process. An attacker can cause an out-of-bounds write and cause a denial of service through a specially crafted network packet. The following products and versions are affected: Sealevel Systems SeaConnect 370W v1.3.34
| VAR-202201-0295 | CVE-2021-44142 | Samba vfs_fruit Out-of-bounds read / write vulnerability due to insecure processing of extended file attributes in module |
CVSS V2: 9.0 CVSS V3: 8.8 Severity: CRITICAL |
The Samba vfs_fruit module uses extended file attributes (EA, xattr) to provide "...enhanced compatibility with Apple SMB clients and interoperability with a Netatalk 3 AFP fileserver." Samba versions prior to 4.13.17, 4.14.12 and 4.15.5 with vfs_fruit configured allow out-of-bounds heap read and write via specially crafted extended file attributes. A remote attacker with write access to extended file attributes can execute arbitrary code with the privileges of smbd, typically root. Authentication is not required to exploit this vulnerability.The specific flaw exists within the handling of AppleDouble entries. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer.
CVE-2022-0336
Kees van Vloten reported that Samba AD users with permission to
write to an account can impersonate arbitrary services.
For the oldstable distribution (buster), these problems have been fixed
in version 2:4.9.5+dfsg-5+deb10u3. As per DSA 5015-1, CVE-2022-0336 has
not been addressed for the oldstable distribution (buster).
For the stable distribution (bullseye), these problems have been fixed
in version 2:4.13.13+dfsg-1~deb11u3. Additionally, some followup fixes
for CVE-2020-25717 are included in this update (Cf.
For the detailed security status of samba please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/samba
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----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=UWmB
-----END PGP SIGNATURE-----
.
The specific flaw exists within the parsing of EA metadata when
opening files in smbd.
The problem in vfs_fruit exists in the default configuration of the
fruit VFS module using fruit:metadata=netatalk or fruit:resource=file.
If both options are set to different settings than the default values,
the system is not affected by the security issue.
==================
Patch Availability
==================
Patches addressing both these issues have been posted to:
https://www.samba.org/samba/security/
Additionally, Samba 4.13.17, 4.14.12 and 4.15.5 have been issued as
security releases to correct the defect.
==================
CVSSv3 calculation
==================
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:F/RL:O/RC:C
Base score 9.9.
==========
Workaround
==========
As a workaround remove the "fruit" VFS module from the list of
configured VFS objects in any "vfs objects" line in the Samba
configuration smb.conf.
Note that changing the VFS module settings fruit:metadata or
fruit:resource to use the unaffected setting causes all stored
information to be inaccessible and will make it appear to macOS
clients as if the information is lost.
=======
Credits
=======
Originally reported by Orange Tsai from DEVCORE.
Patches provided by Ralph Böhme of the Samba team.
==========================================================
== Our Code, Our Bugs, Our Responsibility.
== The Samba Team
==========================================================
.
For details on migrating Samba/CTDB configuration files, refer to:
https://access.redhat.com/solutions/4311261
5. =========================================================================
Ubuntu Security Notice USN-5260-3
February 03, 2022
samba vulnerability
=========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 16.04 ESM
- Ubuntu 14.04 ESM
Summary:
Samba could be made to crash when handled certain memory operations. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.
Original advisory details:
Orange Tsai discovered that the Samba vfs_fruit module incorrectly handled
certain memory operations. (CVE-2021-44142)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 16.04 ESM:
samba 2:4.3.11+dfsg-0ubuntu0.16.04.34+esm1
Ubuntu 14.04 ESM:
samba 2:4.3.11+dfsg-0ubuntu0.14.04.20+esm12
This update uses a new upstream release, which includes additional bug
fixes. In general, a standard system update will make all the necessary
changes. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Critical: samba security and bug fix update
Advisory ID: RHSA-2022:0332-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2022:0332
Issue date: 2022-01-31
CVE Names: CVE-2021-44142
====================================================================
1. Summary:
An update for samba is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact
of Critical. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat CodeReady Linux Builder (v. 8) - aarch64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64
Red Hat Enterprise Linux BaseOS (v. 8) - aarch64, noarch, ppc64le, s390x, x86_64
3. Description:
Samba is an open-source implementation of the Server Message Block (SMB)
protocol and the related Common Internet File System (CIFS) protocol, which
allow PC-compatible machines to share files, printers, and various
information.
Security Fix(es):
* samba: Out-of-bounds heap read/write vulnerability in VFS module
vfs_fruit allows code execution (CVE-2021-44142)
For more details about the security issue(s), including the impact, a CVSS
score, acknowledgments, and other related information, refer to the CVE
page(s) listed in the References section.
Bug Fix(es):
* Fix username map script regression introduced with CVE-2020-25717
(BZ#2046174)
* Fix possible segfault when joining the domain (BZ#2046160)
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
After installing this update, the smb service will be restarted
automatically.
5. Bugs fixed (https://bugzilla.redhat.com/):
2046146 - CVE-2021-44142 samba: Out-of-bounds heap read/write vulnerability in VFS module vfs_fruit allows code execution
2046160 - [smb] Segmentation fault when joining the domain [rhel-8.5.0.z]
2046174 - Failed to authenticate users after upgrade samba package to release samba-4.14.5-7x [rhel-8.5.0.z]
6. Package List:
Red Hat Enterprise Linux AppStream (v. 8):
aarch64:
ctdb-debuginfo-4.14.5-9.el8_5.aarch64.rpm
libsmbclient-debuginfo-4.14.5-9.el8_5.aarch64.rpm
libwbclient-debuginfo-4.14.5-9.el8_5.aarch64.rpm
python3-samba-debuginfo-4.14.5-9.el8_5.aarch64.rpm
samba-client-debuginfo-4.14.5-9.el8_5.aarch64.rpm
samba-client-libs-debuginfo-4.14.5-9.el8_5.aarch64.rpm
samba-common-libs-debuginfo-4.14.5-9.el8_5.aarch64.rpm
samba-common-tools-debuginfo-4.14.5-9.el8_5.aarch64.rpm
samba-debuginfo-4.14.5-9.el8_5.aarch64.rpm
samba-debugsource-4.14.5-9.el8_5.aarch64.rpm
samba-krb5-printing-debuginfo-4.14.5-9.el8_5.aarch64.rpm
samba-libs-debuginfo-4.14.5-9.el8_5.aarch64.rpm
samba-test-debuginfo-4.14.5-9.el8_5.aarch64.rpm
samba-test-libs-debuginfo-4.14.5-9.el8_5.aarch64.rpm
samba-vfs-iouring-4.14.5-9.el8_5.aarch64.rpm
samba-vfs-iouring-debuginfo-4.14.5-9.el8_5.aarch64.rpm
samba-winbind-clients-debuginfo-4.14.5-9.el8_5.aarch64.rpm
samba-winbind-debuginfo-4.14.5-9.el8_5.aarch64.rpm
samba-winbind-krb5-locator-debuginfo-4.14.5-9.el8_5.aarch64.rpm
samba-winbind-modules-debuginfo-4.14.5-9.el8_5.aarch64.rpm
ppc64le:
ctdb-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
libsmbclient-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
libwbclient-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
python3-samba-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
samba-client-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
samba-client-libs-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
samba-common-libs-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
samba-common-tools-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
samba-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
samba-debugsource-4.14.5-9.el8_5.ppc64le.rpm
samba-krb5-printing-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
samba-libs-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
samba-test-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
samba-test-libs-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
samba-vfs-iouring-4.14.5-9.el8_5.ppc64le.rpm
samba-vfs-iouring-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
samba-winbind-clients-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
samba-winbind-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
samba-winbind-krb5-locator-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
samba-winbind-modules-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
s390x:
ctdb-debuginfo-4.14.5-9.el8_5.s390x.rpm
libsmbclient-debuginfo-4.14.5-9.el8_5.s390x.rpm
libwbclient-debuginfo-4.14.5-9.el8_5.s390x.rpm
python3-samba-debuginfo-4.14.5-9.el8_5.s390x.rpm
samba-client-debuginfo-4.14.5-9.el8_5.s390x.rpm
samba-client-libs-debuginfo-4.14.5-9.el8_5.s390x.rpm
samba-common-libs-debuginfo-4.14.5-9.el8_5.s390x.rpm
samba-common-tools-debuginfo-4.14.5-9.el8_5.s390x.rpm
samba-debuginfo-4.14.5-9.el8_5.s390x.rpm
samba-debugsource-4.14.5-9.el8_5.s390x.rpm
samba-krb5-printing-debuginfo-4.14.5-9.el8_5.s390x.rpm
samba-libs-debuginfo-4.14.5-9.el8_5.s390x.rpm
samba-test-debuginfo-4.14.5-9.el8_5.s390x.rpm
samba-test-libs-debuginfo-4.14.5-9.el8_5.s390x.rpm
samba-vfs-iouring-4.14.5-9.el8_5.s390x.rpm
samba-vfs-iouring-debuginfo-4.14.5-9.el8_5.s390x.rpm
samba-winbind-clients-debuginfo-4.14.5-9.el8_5.s390x.rpm
samba-winbind-debuginfo-4.14.5-9.el8_5.s390x.rpm
samba-winbind-krb5-locator-debuginfo-4.14.5-9.el8_5.s390x.rpm
samba-winbind-modules-debuginfo-4.14.5-9.el8_5.s390x.rpm
x86_64:
ctdb-debuginfo-4.14.5-9.el8_5.x86_64.rpm
libsmbclient-debuginfo-4.14.5-9.el8_5.x86_64.rpm
libwbclient-debuginfo-4.14.5-9.el8_5.x86_64.rpm
python3-samba-debuginfo-4.14.5-9.el8_5.x86_64.rpm
samba-client-debuginfo-4.14.5-9.el8_5.x86_64.rpm
samba-client-libs-debuginfo-4.14.5-9.el8_5.x86_64.rpm
samba-common-libs-debuginfo-4.14.5-9.el8_5.x86_64.rpm
samba-common-tools-debuginfo-4.14.5-9.el8_5.x86_64.rpm
samba-debuginfo-4.14.5-9.el8_5.x86_64.rpm
samba-debugsource-4.14.5-9.el8_5.x86_64.rpm
samba-krb5-printing-debuginfo-4.14.5-9.el8_5.x86_64.rpm
samba-libs-debuginfo-4.14.5-9.el8_5.x86_64.rpm
samba-test-debuginfo-4.14.5-9.el8_5.x86_64.rpm
samba-test-libs-debuginfo-4.14.5-9.el8_5.x86_64.rpm
samba-vfs-iouring-4.14.5-9.el8_5.x86_64.rpm
samba-vfs-iouring-debuginfo-4.14.5-9.el8_5.x86_64.rpm
samba-winbind-clients-debuginfo-4.14.5-9.el8_5.x86_64.rpm
samba-winbind-debuginfo-4.14.5-9.el8_5.x86_64.rpm
samba-winbind-krb5-locator-debuginfo-4.14.5-9.el8_5.x86_64.rpm
samba-winbind-modules-debuginfo-4.14.5-9.el8_5.x86_64.rpm
samba-winexe-debuginfo-4.14.5-9.el8_5.x86_64.rpm
Red Hat Enterprise Linux BaseOS (v. 8):
Source:
samba-4.14.5-9.el8_5.src.rpm
aarch64:
ctdb-4.14.5-9.el8_5.aarch64.rpm
ctdb-debuginfo-4.14.5-9.el8_5.aarch64.rpm
libsmbclient-4.14.5-9.el8_5.aarch64.rpm
libsmbclient-debuginfo-4.14.5-9.el8_5.aarch64.rpm
libwbclient-4.14.5-9.el8_5.aarch64.rpm
libwbclient-debuginfo-4.14.5-9.el8_5.aarch64.rpm
python3-samba-4.14.5-9.el8_5.aarch64.rpm
python3-samba-debuginfo-4.14.5-9.el8_5.aarch64.rpm
python3-samba-test-4.14.5-9.el8_5.aarch64.rpm
samba-4.14.5-9.el8_5.aarch64.rpm
samba-client-4.14.5-9.el8_5.aarch64.rpm
samba-client-debuginfo-4.14.5-9.el8_5.aarch64.rpm
samba-client-libs-4.14.5-9.el8_5.aarch64.rpm
samba-client-libs-debuginfo-4.14.5-9.el8_5.aarch64.rpm
samba-common-libs-4.14.5-9.el8_5.aarch64.rpm
samba-common-libs-debuginfo-4.14.5-9.el8_5.aarch64.rpm
samba-common-tools-4.14.5-9.el8_5.aarch64.rpm
samba-common-tools-debuginfo-4.14.5-9.el8_5.aarch64.rpm
samba-debuginfo-4.14.5-9.el8_5.aarch64.rpm
samba-debugsource-4.14.5-9.el8_5.aarch64.rpm
samba-krb5-printing-4.14.5-9.el8_5.aarch64.rpm
samba-krb5-printing-debuginfo-4.14.5-9.el8_5.aarch64.rpm
samba-libs-4.14.5-9.el8_5.aarch64.rpm
samba-libs-debuginfo-4.14.5-9.el8_5.aarch64.rpm
samba-test-4.14.5-9.el8_5.aarch64.rpm
samba-test-debuginfo-4.14.5-9.el8_5.aarch64.rpm
samba-test-libs-4.14.5-9.el8_5.aarch64.rpm
samba-test-libs-debuginfo-4.14.5-9.el8_5.aarch64.rpm
samba-vfs-iouring-debuginfo-4.14.5-9.el8_5.aarch64.rpm
samba-winbind-4.14.5-9.el8_5.aarch64.rpm
samba-winbind-clients-4.14.5-9.el8_5.aarch64.rpm
samba-winbind-clients-debuginfo-4.14.5-9.el8_5.aarch64.rpm
samba-winbind-debuginfo-4.14.5-9.el8_5.aarch64.rpm
samba-winbind-krb5-locator-4.14.5-9.el8_5.aarch64.rpm
samba-winbind-krb5-locator-debuginfo-4.14.5-9.el8_5.aarch64.rpm
samba-winbind-modules-4.14.5-9.el8_5.aarch64.rpm
samba-winbind-modules-debuginfo-4.14.5-9.el8_5.aarch64.rpm
noarch:
samba-common-4.14.5-9.el8_5.noarch.rpm
samba-pidl-4.14.5-9.el8_5.noarch.rpm
ppc64le:
ctdb-4.14.5-9.el8_5.ppc64le.rpm
ctdb-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
libsmbclient-4.14.5-9.el8_5.ppc64le.rpm
libsmbclient-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
libwbclient-4.14.5-9.el8_5.ppc64le.rpm
libwbclient-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
python3-samba-4.14.5-9.el8_5.ppc64le.rpm
python3-samba-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
python3-samba-test-4.14.5-9.el8_5.ppc64le.rpm
samba-4.14.5-9.el8_5.ppc64le.rpm
samba-client-4.14.5-9.el8_5.ppc64le.rpm
samba-client-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
samba-client-libs-4.14.5-9.el8_5.ppc64le.rpm
samba-client-libs-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
samba-common-libs-4.14.5-9.el8_5.ppc64le.rpm
samba-common-libs-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
samba-common-tools-4.14.5-9.el8_5.ppc64le.rpm
samba-common-tools-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
samba-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
samba-debugsource-4.14.5-9.el8_5.ppc64le.rpm
samba-krb5-printing-4.14.5-9.el8_5.ppc64le.rpm
samba-krb5-printing-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
samba-libs-4.14.5-9.el8_5.ppc64le.rpm
samba-libs-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
samba-test-4.14.5-9.el8_5.ppc64le.rpm
samba-test-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
samba-test-libs-4.14.5-9.el8_5.ppc64le.rpm
samba-test-libs-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
samba-vfs-iouring-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
samba-winbind-4.14.5-9.el8_5.ppc64le.rpm
samba-winbind-clients-4.14.5-9.el8_5.ppc64le.rpm
samba-winbind-clients-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
samba-winbind-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
samba-winbind-krb5-locator-4.14.5-9.el8_5.ppc64le.rpm
samba-winbind-krb5-locator-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
samba-winbind-modules-4.14.5-9.el8_5.ppc64le.rpm
samba-winbind-modules-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
s390x:
ctdb-4.14.5-9.el8_5.s390x.rpm
ctdb-debuginfo-4.14.5-9.el8_5.s390x.rpm
libsmbclient-4.14.5-9.el8_5.s390x.rpm
libsmbclient-debuginfo-4.14.5-9.el8_5.s390x.rpm
libwbclient-4.14.5-9.el8_5.s390x.rpm
libwbclient-debuginfo-4.14.5-9.el8_5.s390x.rpm
python3-samba-4.14.5-9.el8_5.s390x.rpm
python3-samba-debuginfo-4.14.5-9.el8_5.s390x.rpm
python3-samba-test-4.14.5-9.el8_5.s390x.rpm
samba-4.14.5-9.el8_5.s390x.rpm
samba-client-4.14.5-9.el8_5.s390x.rpm
samba-client-debuginfo-4.14.5-9.el8_5.s390x.rpm
samba-client-libs-4.14.5-9.el8_5.s390x.rpm
samba-client-libs-debuginfo-4.14.5-9.el8_5.s390x.rpm
samba-common-libs-4.14.5-9.el8_5.s390x.rpm
samba-common-libs-debuginfo-4.14.5-9.el8_5.s390x.rpm
samba-common-tools-4.14.5-9.el8_5.s390x.rpm
samba-common-tools-debuginfo-4.14.5-9.el8_5.s390x.rpm
samba-debuginfo-4.14.5-9.el8_5.s390x.rpm
samba-debugsource-4.14.5-9.el8_5.s390x.rpm
samba-krb5-printing-4.14.5-9.el8_5.s390x.rpm
samba-krb5-printing-debuginfo-4.14.5-9.el8_5.s390x.rpm
samba-libs-4.14.5-9.el8_5.s390x.rpm
samba-libs-debuginfo-4.14.5-9.el8_5.s390x.rpm
samba-test-4.14.5-9.el8_5.s390x.rpm
samba-test-debuginfo-4.14.5-9.el8_5.s390x.rpm
samba-test-libs-4.14.5-9.el8_5.s390x.rpm
samba-test-libs-debuginfo-4.14.5-9.el8_5.s390x.rpm
samba-vfs-iouring-debuginfo-4.14.5-9.el8_5.s390x.rpm
samba-winbind-4.14.5-9.el8_5.s390x.rpm
samba-winbind-clients-4.14.5-9.el8_5.s390x.rpm
samba-winbind-clients-debuginfo-4.14.5-9.el8_5.s390x.rpm
samba-winbind-debuginfo-4.14.5-9.el8_5.s390x.rpm
samba-winbind-krb5-locator-4.14.5-9.el8_5.s390x.rpm
samba-winbind-krb5-locator-debuginfo-4.14.5-9.el8_5.s390x.rpm
samba-winbind-modules-4.14.5-9.el8_5.s390x.rpm
samba-winbind-modules-debuginfo-4.14.5-9.el8_5.s390x.rpm
x86_64:
ctdb-4.14.5-9.el8_5.x86_64.rpm
ctdb-debuginfo-4.14.5-9.el8_5.i686.rpm
ctdb-debuginfo-4.14.5-9.el8_5.x86_64.rpm
libsmbclient-4.14.5-9.el8_5.i686.rpm
libsmbclient-4.14.5-9.el8_5.x86_64.rpm
libsmbclient-debuginfo-4.14.5-9.el8_5.i686.rpm
libsmbclient-debuginfo-4.14.5-9.el8_5.x86_64.rpm
libwbclient-4.14.5-9.el8_5.i686.rpm
libwbclient-4.14.5-9.el8_5.x86_64.rpm
libwbclient-debuginfo-4.14.5-9.el8_5.i686.rpm
libwbclient-debuginfo-4.14.5-9.el8_5.x86_64.rpm
python3-samba-4.14.5-9.el8_5.i686.rpm
python3-samba-4.14.5-9.el8_5.x86_64.rpm
python3-samba-debuginfo-4.14.5-9.el8_5.i686.rpm
python3-samba-debuginfo-4.14.5-9.el8_5.x86_64.rpm
python3-samba-test-4.14.5-9.el8_5.x86_64.rpm
samba-4.14.5-9.el8_5.x86_64.rpm
samba-client-4.14.5-9.el8_5.x86_64.rpm
samba-client-debuginfo-4.14.5-9.el8_5.i686.rpm
samba-client-debuginfo-4.14.5-9.el8_5.x86_64.rpm
samba-client-libs-4.14.5-9.el8_5.i686.rpm
samba-client-libs-4.14.5-9.el8_5.x86_64.rpm
samba-client-libs-debuginfo-4.14.5-9.el8_5.i686.rpm
samba-client-libs-debuginfo-4.14.5-9.el8_5.x86_64.rpm
samba-common-libs-4.14.5-9.el8_5.x86_64.rpm
samba-common-libs-debuginfo-4.14.5-9.el8_5.i686.rpm
samba-common-libs-debuginfo-4.14.5-9.el8_5.x86_64.rpm
samba-common-tools-4.14.5-9.el8_5.x86_64.rpm
samba-common-tools-debuginfo-4.14.5-9.el8_5.i686.rpm
samba-common-tools-debuginfo-4.14.5-9.el8_5.x86_64.rpm
samba-debuginfo-4.14.5-9.el8_5.i686.rpm
samba-debuginfo-4.14.5-9.el8_5.x86_64.rpm
samba-debugsource-4.14.5-9.el8_5.i686.rpm
samba-debugsource-4.14.5-9.el8_5.x86_64.rpm
samba-krb5-printing-4.14.5-9.el8_5.x86_64.rpm
samba-krb5-printing-debuginfo-4.14.5-9.el8_5.i686.rpm
samba-krb5-printing-debuginfo-4.14.5-9.el8_5.x86_64.rpm
samba-libs-4.14.5-9.el8_5.i686.rpm
samba-libs-4.14.5-9.el8_5.x86_64.rpm
samba-libs-debuginfo-4.14.5-9.el8_5.i686.rpm
samba-libs-debuginfo-4.14.5-9.el8_5.x86_64.rpm
samba-test-4.14.5-9.el8_5.x86_64.rpm
samba-test-debuginfo-4.14.5-9.el8_5.i686.rpm
samba-test-debuginfo-4.14.5-9.el8_5.x86_64.rpm
samba-test-libs-4.14.5-9.el8_5.x86_64.rpm
samba-test-libs-debuginfo-4.14.5-9.el8_5.i686.rpm
samba-test-libs-debuginfo-4.14.5-9.el8_5.x86_64.rpm
samba-vfs-iouring-debuginfo-4.14.5-9.el8_5.x86_64.rpm
samba-winbind-4.14.5-9.el8_5.x86_64.rpm
samba-winbind-clients-4.14.5-9.el8_5.x86_64.rpm
samba-winbind-clients-debuginfo-4.14.5-9.el8_5.i686.rpm
samba-winbind-clients-debuginfo-4.14.5-9.el8_5.x86_64.rpm
samba-winbind-debuginfo-4.14.5-9.el8_5.i686.rpm
samba-winbind-debuginfo-4.14.5-9.el8_5.x86_64.rpm
samba-winbind-krb5-locator-4.14.5-9.el8_5.x86_64.rpm
samba-winbind-krb5-locator-debuginfo-4.14.5-9.el8_5.i686.rpm
samba-winbind-krb5-locator-debuginfo-4.14.5-9.el8_5.x86_64.rpm
samba-winbind-modules-4.14.5-9.el8_5.i686.rpm
samba-winbind-modules-4.14.5-9.el8_5.x86_64.rpm
samba-winbind-modules-debuginfo-4.14.5-9.el8_5.i686.rpm
samba-winbind-modules-debuginfo-4.14.5-9.el8_5.x86_64.rpm
samba-winexe-4.14.5-9.el8_5.x86_64.rpm
samba-winexe-debuginfo-4.14.5-9.el8_5.x86_64.rpm
Red Hat CodeReady Linux Builder (v. 8):
aarch64:
ctdb-debuginfo-4.14.5-9.el8_5.aarch64.rpm
libsmbclient-debuginfo-4.14.5-9.el8_5.aarch64.rpm
libsmbclient-devel-4.14.5-9.el8_5.aarch64.rpm
libwbclient-debuginfo-4.14.5-9.el8_5.aarch64.rpm
libwbclient-devel-4.14.5-9.el8_5.aarch64.rpm
python3-samba-debuginfo-4.14.5-9.el8_5.aarch64.rpm
samba-client-debuginfo-4.14.5-9.el8_5.aarch64.rpm
samba-client-libs-debuginfo-4.14.5-9.el8_5.aarch64.rpm
samba-common-libs-debuginfo-4.14.5-9.el8_5.aarch64.rpm
samba-common-tools-debuginfo-4.14.5-9.el8_5.aarch64.rpm
samba-debuginfo-4.14.5-9.el8_5.aarch64.rpm
samba-debugsource-4.14.5-9.el8_5.aarch64.rpm
samba-devel-4.14.5-9.el8_5.aarch64.rpm
samba-krb5-printing-debuginfo-4.14.5-9.el8_5.aarch64.rpm
samba-libs-debuginfo-4.14.5-9.el8_5.aarch64.rpm
samba-test-debuginfo-4.14.5-9.el8_5.aarch64.rpm
samba-test-libs-debuginfo-4.14.5-9.el8_5.aarch64.rpm
samba-vfs-iouring-debuginfo-4.14.5-9.el8_5.aarch64.rpm
samba-winbind-clients-debuginfo-4.14.5-9.el8_5.aarch64.rpm
samba-winbind-debuginfo-4.14.5-9.el8_5.aarch64.rpm
samba-winbind-krb5-locator-debuginfo-4.14.5-9.el8_5.aarch64.rpm
samba-winbind-modules-debuginfo-4.14.5-9.el8_5.aarch64.rpm
ppc64le:
ctdb-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
libsmbclient-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
libsmbclient-devel-4.14.5-9.el8_5.ppc64le.rpm
libwbclient-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
libwbclient-devel-4.14.5-9.el8_5.ppc64le.rpm
python3-samba-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
samba-client-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
samba-client-libs-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
samba-common-libs-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
samba-common-tools-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
samba-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
samba-debugsource-4.14.5-9.el8_5.ppc64le.rpm
samba-devel-4.14.5-9.el8_5.ppc64le.rpm
samba-krb5-printing-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
samba-libs-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
samba-test-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
samba-test-libs-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
samba-vfs-iouring-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
samba-winbind-clients-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
samba-winbind-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
samba-winbind-krb5-locator-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
samba-winbind-modules-debuginfo-4.14.5-9.el8_5.ppc64le.rpm
s390x:
ctdb-debuginfo-4.14.5-9.el8_5.s390x.rpm
libsmbclient-debuginfo-4.14.5-9.el8_5.s390x.rpm
libsmbclient-devel-4.14.5-9.el8_5.s390x.rpm
libwbclient-debuginfo-4.14.5-9.el8_5.s390x.rpm
libwbclient-devel-4.14.5-9.el8_5.s390x.rpm
python3-samba-debuginfo-4.14.5-9.el8_5.s390x.rpm
samba-client-debuginfo-4.14.5-9.el8_5.s390x.rpm
samba-client-libs-debuginfo-4.14.5-9.el8_5.s390x.rpm
samba-common-libs-debuginfo-4.14.5-9.el8_5.s390x.rpm
samba-common-tools-debuginfo-4.14.5-9.el8_5.s390x.rpm
samba-debuginfo-4.14.5-9.el8_5.s390x.rpm
samba-debugsource-4.14.5-9.el8_5.s390x.rpm
samba-devel-4.14.5-9.el8_5.s390x.rpm
samba-krb5-printing-debuginfo-4.14.5-9.el8_5.s390x.rpm
samba-libs-debuginfo-4.14.5-9.el8_5.s390x.rpm
samba-test-debuginfo-4.14.5-9.el8_5.s390x.rpm
samba-test-libs-debuginfo-4.14.5-9.el8_5.s390x.rpm
samba-vfs-iouring-debuginfo-4.14.5-9.el8_5.s390x.rpm
samba-winbind-clients-debuginfo-4.14.5-9.el8_5.s390x.rpm
samba-winbind-debuginfo-4.14.5-9.el8_5.s390x.rpm
samba-winbind-krb5-locator-debuginfo-4.14.5-9.el8_5.s390x.rpm
samba-winbind-modules-debuginfo-4.14.5-9.el8_5.s390x.rpm
x86_64:
ctdb-debuginfo-4.14.5-9.el8_5.i686.rpm
ctdb-debuginfo-4.14.5-9.el8_5.x86_64.rpm
libsmbclient-debuginfo-4.14.5-9.el8_5.i686.rpm
libsmbclient-debuginfo-4.14.5-9.el8_5.x86_64.rpm
libsmbclient-devel-4.14.5-9.el8_5.i686.rpm
libsmbclient-devel-4.14.5-9.el8_5.x86_64.rpm
libwbclient-debuginfo-4.14.5-9.el8_5.i686.rpm
libwbclient-debuginfo-4.14.5-9.el8_5.x86_64.rpm
libwbclient-devel-4.14.5-9.el8_5.i686.rpm
libwbclient-devel-4.14.5-9.el8_5.x86_64.rpm
python3-samba-debuginfo-4.14.5-9.el8_5.i686.rpm
python3-samba-debuginfo-4.14.5-9.el8_5.x86_64.rpm
samba-client-debuginfo-4.14.5-9.el8_5.i686.rpm
samba-client-debuginfo-4.14.5-9.el8_5.x86_64.rpm
samba-client-libs-debuginfo-4.14.5-9.el8_5.i686.rpm
samba-client-libs-debuginfo-4.14.5-9.el8_5.x86_64.rpm
samba-common-libs-debuginfo-4.14.5-9.el8_5.i686.rpm
samba-common-libs-debuginfo-4.14.5-9.el8_5.x86_64.rpm
samba-common-tools-debuginfo-4.14.5-9.el8_5.i686.rpm
samba-common-tools-debuginfo-4.14.5-9.el8_5.x86_64.rpm
samba-debuginfo-4.14.5-9.el8_5.i686.rpm
samba-debuginfo-4.14.5-9.el8_5.x86_64.rpm
samba-debugsource-4.14.5-9.el8_5.i686.rpm
samba-debugsource-4.14.5-9.el8_5.x86_64.rpm
samba-devel-4.14.5-9.el8_5.i686.rpm
samba-devel-4.14.5-9.el8_5.x86_64.rpm
samba-krb5-printing-debuginfo-4.14.5-9.el8_5.i686.rpm
samba-krb5-printing-debuginfo-4.14.5-9.el8_5.x86_64.rpm
samba-libs-debuginfo-4.14.5-9.el8_5.i686.rpm
samba-libs-debuginfo-4.14.5-9.el8_5.x86_64.rpm
samba-test-debuginfo-4.14.5-9.el8_5.i686.rpm
samba-test-debuginfo-4.14.5-9.el8_5.x86_64.rpm
samba-test-libs-debuginfo-4.14.5-9.el8_5.i686.rpm
samba-test-libs-debuginfo-4.14.5-9.el8_5.x86_64.rpm
samba-vfs-iouring-debuginfo-4.14.5-9.el8_5.x86_64.rpm
samba-winbind-clients-debuginfo-4.14.5-9.el8_5.i686.rpm
samba-winbind-clients-debuginfo-4.14.5-9.el8_5.x86_64.rpm
samba-winbind-debuginfo-4.14.5-9.el8_5.i686.rpm
samba-winbind-debuginfo-4.14.5-9.el8_5.x86_64.rpm
samba-winbind-krb5-locator-debuginfo-4.14.5-9.el8_5.i686.rpm
samba-winbind-krb5-locator-debuginfo-4.14.5-9.el8_5.x86_64.rpm
samba-winbind-modules-debuginfo-4.14.5-9.el8_5.i686.rpm
samba-winbind-modules-debuginfo-4.14.5-9.el8_5.x86_64.rpm
samba-winexe-debuginfo-4.14.5-9.el8_5.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2021-44142
https://access.redhat.com/security/updates/classification/#critical
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2022 Red Hat, Inc.
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1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U8ni
-----END PGP SIGNATURE-----
--
RHSA-announce mailing list
RHSA-announce@redhat.com
https://listman.redhat.com/mailman/listinfo/rhsa-announce
| VAR-202201-0428 | CVE-2022-23097 | Connman Out-of-bounds read vulnerability in |
CVSS V2: 6.4 CVSS V3: 9.1 Severity: CRITICAL |
An issue was discovered in the DNS proxy in Connman through 1.40. forward_dns_reply mishandles a strnlen call, leading to an out-of-bounds read. Connman Exists in an out-of-bounds read vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state. Connman is a connection manager. A security vulnerability exists in Connman's DNS proxy due to forward_dns_reply mishandling strnlen calls, resulting in an out-of-bounds read. No detailed vulnerability details were provided at this time.
For the stable distribution (bullseye), these problems have been fixed in
version 1.36-2.2+deb11u1.
We recommend that you upgrade your connman packages.
For the detailed security status of connman please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/connman
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----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=qzlf
-----END PGP SIGNATURE-----
. ==========================================================================
Ubuntu Security Notice USN-6236-1
July 19, 2023
connman vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 23.04
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)
Summary:
Several security issues were fixed in ConnMan.
Software Description:
- connman: Intel Connection Manager daemon
Details:
It was discovered that ConnMan could be made to write out of bounds. A
remote attacker could possibly use this issue to cause ConnMan to crash,
resulting in a denial of service, or possibly execute arbitrary code. This
issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS.
(CVE-2021-26675, CVE-2021-33833)
It was discovered that ConnMan could be made to leak sensitive information
via the gdhcp component. A remote attacker could possibly use this issue
to obtain information for further exploitation. This issue only affected
Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS. (CVE-2021-26676)
It was discovered that ConnMan could be made to read out of bounds. A
remote attacker could possibly use this issue to case ConnMan to crash,
resulting in a denial of service. This issue only affected Ubuntu 16.04
LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS.
(CVE-2022-23096, CVE-2022-23097)
It was discovered that ConnMan could be made to run into an infinite loop.
A remote attacker could possibly use this issue to cause ConnMan to
consume resources and to stop operating, resulting in a denial of service.
This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04
LTS, and Ubuntu 22.04 LTS. (CVE-2022-23098)
It was discovered that ConnMan could be made to write out of bounds via
the gweb component. A remote attacker could possibly use this issue to
cause ConnMan to crash, resulting in a denial of service, or possibly
execute arbitrary code. This issue only affected Ubuntu 16.04 LTS, Ubuntu
18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-32292)
It was discovered that ConnMan did not properly manage memory under
certain circumstances. A remote attacker could possibly use this issue to
cause ConnMan to crash, resulting in a denial of service, or possibly
execute arbitrary code. This issue only affected Ubuntu 16.04 LTS, Ubuntu
18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-32293)
It was discovered that ConnMan could be made to write out of bounds via
the gdhcp component. A remote attacker could possibly use this issue to
cause ConnMan to crash, resulting in a denial of service, or possibly
execute arbitrary code. (CVE-2023-28488)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 23.04:
connman 1.41-2ubuntu0.23.04.1
Ubuntu 22.04 LTS:
connman 1.36-2.3ubuntu0.1
Ubuntu 20.04 LTS:
connman 1.36-2ubuntu0.1
Ubuntu 18.04 LTS (Available with Ubuntu Pro):
connman 1.35-6ubuntu0.1~esm1
Ubuntu 16.04 LTS (Available with Ubuntu Pro):
connman 1.21-1.2+deb8u1ubuntu0.1~esm1
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6236-1
CVE-2021-26675, CVE-2021-26676, CVE-2021-33833, CVE-2022-23096,
CVE-2022-23097, CVE-2022-23098, CVE-2022-32292, CVE-2022-32293,
CVE-2023-28488
Package Information:
https://launchpad.net/ubuntu/+source/connman/1.41-2ubuntu0.23.04.1
https://launchpad.net/ubuntu/+source/connman/1.36-2.3ubuntu0.1
https://launchpad.net/ubuntu/+source/connman/1.36-2ubuntu0.1
. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 202310-21
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: High
Title: ConnMan: Multiple Vulnerabilities
Date: October 31, 2023
Bugs: #832028, #863425
ID: 202310-21
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
=======
Multiple vulnerabilities have been discovered in ConnMan, the worst of
which can lead to remote code execution.
Background
=========
ConnMan provides a daemon for managing Internet connections.
Affected packages
================
Package Vulnerable Unaffected
---------------- ------------------ -------------------
net-misc/connman < 1.42_pre20220801 >= 1.42_pre20220801
Description
==========
Multiple vulnerabilities have been discovered in ConnMan. Please review
the CVE identifiers referenced below for details.
Impact
=====
Please review the referenced CVE identifiers for details.
Workaround
=========
There is no known workaround at this time.
Resolution
=========
All ConnMan users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/connman-1.42_pre20220801"
References
=========
[ 1 ] CVE-2022-23096
https://nvd.nist.gov/vuln/detail/CVE-2022-23096
[ 2 ] CVE-2022-23097
https://nvd.nist.gov/vuln/detail/CVE-2022-23097
[ 3 ] CVE-2022-23098
https://nvd.nist.gov/vuln/detail/CVE-2022-23098
[ 4 ] CVE-2022-32292
https://nvd.nist.gov/vuln/detail/CVE-2022-32292
[ 5 ] CVE-2022-32293
https://nvd.nist.gov/vuln/detail/CVE-2022-32293
Availability
===========
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202310-21
Concerns?
========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
======
Copyright 2023 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
| VAR-202201-0522 | CVE-2022-23098 | Connman Infinite loop vulnerability in |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation has an infinite loop if no data is received. Connman Exists in an infinite loop vulnerability.Service operation interruption (DoS) It may be in a state.
For the stable distribution (bullseye), these problems have been fixed in
version 1.36-2.2+deb11u1.
We recommend that you upgrade your connman packages.
For the detailed security status of connman please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/connman
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----
iQKTBAEBCgB9FiEERkRAmAjBceBVMd3uBUy48xNDz0QFAmMl6e9fFIAAAAAALgAo
aXNzdWVyLWZwckBub3RhdGlvbnMub3BlbnBncC5maWZ0aGhvcnNlbWFuLm5ldDQ2
NDQ0MDk4MDhDMTcxRTA1NTMxRERFRTA1NENCOEYzMTM0M0NGNDQACgkQBUy48xND
z0TRZA//QR46xvu66PMnDmLubjco12vyMnfonbCrOI+ZrgQl1OHtIB1/i1/sX/e6
YJfjJpMjIM+9tbGP6wUSPYli4ZjW7fYGipaXJYFYH/Mxq8zleLO7YeO5RGtl7isi
trvOcJ0N8Og+KQZHymgxI9zSiAA1cA7VjWtdZjj7izt7fm2VN/xO7Yksecm053tF
hBBffflPnOXL/BA75kQ6zK+l4GJKCoqE67zWqirpoFOIzbvQsOInfkG4WBh3fxee
dzSjLJ5UjmEkiJC9la9y6TnO64b1nvNkp1akGbqVHmxQrrxcS5QoWvAa4K3mNVI8
l7+lTLxqsodLv6io71pI6UQbvLiyeOBKBycGxbFvnX38GiuO2qjNGrrKUfi77Lj3
23zwbKPiOl3bcBoH6/zhJmJsCR6rREN0uhULnEDMiiEQNVqbTw2RekFSNnSiprhC
CvUhaioqcNQ0Km7Uhd23kIdpBcM5lZh3hwSXWuGxpEXyyBAzorn+1rh5l/Zu0x8I
OpAbtgG4EaiB4crHBnDE8Tc2ZW/VmilnJF/syrVxL8zx78ZulK+fNmTwNWTV+wRz
A5xHsvmR1D0FpBr2uKQ0bq6uDWxajd5kNOmboNnha3UL+EftjgIEW3f3Y4fgHeWx
1io1lrYjacfCEm3uf+NnAjACpwnQzWh41EIJpIDBhI09KB+LDeQ=
=qzlf
-----END PGP SIGNATURE-----
. ==========================================================================
Ubuntu Security Notice USN-6236-1
July 19, 2023
connman vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 23.04
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS (Available with Ubuntu Pro)
- Ubuntu 16.04 LTS (Available with Ubuntu Pro)
Summary:
Several security issues were fixed in ConnMan.
Software Description:
- connman: Intel Connection Manager daemon
Details:
It was discovered that ConnMan could be made to write out of bounds. A
remote attacker could possibly use this issue to cause ConnMan to crash,
resulting in a denial of service, or possibly execute arbitrary code. This
issue only affected Ubuntu 18.04 LTS and Ubuntu 20.04 LTS.
(CVE-2021-26675, CVE-2021-33833)
It was discovered that ConnMan could be made to leak sensitive information
via the gdhcp component. A remote attacker could possibly use this issue
to obtain information for further exploitation. This issue only affected
Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, and Ubuntu 20.04 LTS. (CVE-2021-26676)
It was discovered that ConnMan could be made to read out of bounds. A
remote attacker could possibly use this issue to case ConnMan to crash,
resulting in a denial of service. This issue only affected Ubuntu 16.04
LTS, Ubuntu 18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS.
(CVE-2022-23096, CVE-2022-23097)
It was discovered that ConnMan could be made to run into an infinite loop.
A remote attacker could possibly use this issue to cause ConnMan to
consume resources and to stop operating, resulting in a denial of service.
This issue only affected Ubuntu 16.04 LTS, Ubuntu 18.04 LTS, Ubuntu 20.04
LTS, and Ubuntu 22.04 LTS. (CVE-2022-23098)
It was discovered that ConnMan could be made to write out of bounds via
the gweb component. A remote attacker could possibly use this issue to
cause ConnMan to crash, resulting in a denial of service, or possibly
execute arbitrary code. This issue only affected Ubuntu 16.04 LTS, Ubuntu
18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-32292)
It was discovered that ConnMan did not properly manage memory under
certain circumstances. A remote attacker could possibly use this issue to
cause ConnMan to crash, resulting in a denial of service, or possibly
execute arbitrary code. This issue only affected Ubuntu 16.04 LTS, Ubuntu
18.04 LTS, Ubuntu 20.04 LTS, and Ubuntu 22.04 LTS. (CVE-2022-32293)
It was discovered that ConnMan could be made to write out of bounds via
the gdhcp component. A remote attacker could possibly use this issue to
cause ConnMan to crash, resulting in a denial of service, or possibly
execute arbitrary code. (CVE-2023-28488)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 23.04:
connman 1.41-2ubuntu0.23.04.1
Ubuntu 22.04 LTS:
connman 1.36-2.3ubuntu0.1
Ubuntu 20.04 LTS:
connman 1.36-2ubuntu0.1
Ubuntu 18.04 LTS (Available with Ubuntu Pro):
connman 1.35-6ubuntu0.1~esm1
Ubuntu 16.04 LTS (Available with Ubuntu Pro):
connman 1.21-1.2+deb8u1ubuntu0.1~esm1
In general, a standard system update will make all the necessary changes.
References:
https://ubuntu.com/security/notices/USN-6236-1
CVE-2021-26675, CVE-2021-26676, CVE-2021-33833, CVE-2022-23096,
CVE-2022-23097, CVE-2022-23098, CVE-2022-32292, CVE-2022-32293,
CVE-2023-28488
Package Information:
https://launchpad.net/ubuntu/+source/connman/1.41-2ubuntu0.23.04.1
https://launchpad.net/ubuntu/+source/connman/1.36-2.3ubuntu0.1
https://launchpad.net/ubuntu/+source/connman/1.36-2ubuntu0.1
. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 202310-21
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: High
Title: ConnMan: Multiple Vulnerabilities
Date: October 31, 2023
Bugs: #832028, #863425
ID: 202310-21
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
=======
Multiple vulnerabilities have been discovered in ConnMan, the worst of
which can lead to remote code execution.
Background
=========
ConnMan provides a daemon for managing Internet connections.
Affected packages
================
Package Vulnerable Unaffected
---------------- ------------------ -------------------
net-misc/connman < 1.42_pre20220801 >= 1.42_pre20220801
Description
==========
Multiple vulnerabilities have been discovered in ConnMan. Please review
the CVE identifiers referenced below for details.
Impact
=====
Please review the referenced CVE identifiers for details.
Workaround
=========
There is no known workaround at this time.
Resolution
=========
All ConnMan users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/connman-1.42_pre20220801"
References
=========
[ 1 ] CVE-2022-23096
https://nvd.nist.gov/vuln/detail/CVE-2022-23096
[ 2 ] CVE-2022-23097
https://nvd.nist.gov/vuln/detail/CVE-2022-23097
[ 3 ] CVE-2022-23098
https://nvd.nist.gov/vuln/detail/CVE-2022-23098
[ 4 ] CVE-2022-32292
https://nvd.nist.gov/vuln/detail/CVE-2022-32292
[ 5 ] CVE-2022-32293
https://nvd.nist.gov/vuln/detail/CVE-2022-32293
Availability
===========
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202310-21
Concerns?
========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
======
Copyright 2023 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
| VAR-202201-1080 | CVE-2021-4160 | OpenSSL Input validation error vulnerability |
CVSS V2: 4.3 CVSS V3: 5.9 Severity: MEDIUM |
There is a carry propagation bug in the MIPS32 and MIPS64 squaring procedure. Many EC algorithms are affected, including some of the TLS 1.3 default curves. Impact was not analyzed in detail, because the pre-requisites for attack are considered unlikely and include reusing private keys. Analysis suggests that attacks against RSA and DSA as a result of this defect would be very difficult to perform and are not believed likely. Attacks against DH are considered just feasible (although very difficult) because most of the work necessary to deduce information about a private key may be performed offline. The amount of resources required for such an attack would be significant. However, for an attack on TLS to be meaningful, the server would have to share the DH private key among multiple clients, which is no longer an option since CVE-2016-0701. This issue affects OpenSSL versions 1.0.2, 1.1.1 and 3.0.0. It was addressed in the releases of 1.1.1m and 3.0.1 on the 15th of December 2021. For the 1.0.2 release it is addressed in git commit 6fc1aaaf3 that is available to premium support customers only. It will be made available in 1.0.2zc when it is released. The issue only affects OpenSSL on MIPS platforms. Fixed in OpenSSL 3.0.1 (Affected 3.0.0). Fixed in OpenSSL 1.1.1m (Affected 1.1.1-1.1.1l). Fixed in OpenSSL 1.0.2zc-dev (Affected 1.0.2-1.0.2zb). - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 202210-02
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: Normal
Title: OpenSSL: Multiple Vulnerabilities
Date: October 16, 2022
Bugs: #741570, #809980, #832339, #835343, #842489, #856592
ID: 202210-02
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
========
Multiple vulnerabilities have been discovered in OpenSSL, the worst of
which could result in denial of service.
Background
==========
OpenSSL is an Open Source toolkit implementing the Secure Sockets Layer
(SSL v2/v3) and Transport Layer Security (TLS v1) as well as a general
purpose cryptography library.
Affected packages
=================
-------------------------------------------------------------------
Package / Vulnerable / Unaffected
-------------------------------------------------------------------
1 dev-libs/openssl < 1.1.1q >= 1.1.1q
Description
===========
Multiple vulnerabilities have been discovered in OpenSSL. Please review
the CVE identifiers referenced below for details.
Impact
======
Please review the referenced CVE identifiers for details.
Workaround
==========
There is no known workaround at this time.
Resolution
==========
All OpenSSL users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=dev-libs/openssl-1.1.1q"
References
==========
[ 1 ] CVE-2020-1968
https://nvd.nist.gov/vuln/detail/CVE-2020-1968
[ 2 ] CVE-2021-3711
https://nvd.nist.gov/vuln/detail/CVE-2021-3711
[ 3 ] CVE-2021-3712
https://nvd.nist.gov/vuln/detail/CVE-2021-3712
[ 4 ] CVE-2021-4160
https://nvd.nist.gov/vuln/detail/CVE-2021-4160
[ 5 ] CVE-2022-0778
https://nvd.nist.gov/vuln/detail/CVE-2022-0778
[ 6 ] CVE-2022-1292
https://nvd.nist.gov/vuln/detail/CVE-2022-1292
[ 7 ] CVE-2022-1473
https://nvd.nist.gov/vuln/detail/CVE-2022-1473
[ 8 ] CVE-2022-2097
https://nvd.nist.gov/vuln/detail/CVE-2022-2097
Availability
============
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202210-02
Concerns?
=========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
=======
Copyright 2022 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512
- -------------------------------------------------------------------------
Debian Security Advisory DSA-5103-1 security@debian.org
https://www.debian.org/security/ Salvatore Bonaccorso
March 15, 2022 https://www.debian.org/security/faq
- -------------------------------------------------------------------------
Package : openssl
CVE ID : CVE-2021-4160 CVE-2022-0778
Debian Bug : 989604
Tavis Ormandy discovered that the BN_mod_sqrt() function of OpenSSL
could be tricked into an infinite loop. This could result in denial of
service via malformed certificates.
For the oldstable distribution (buster), this problem has been fixed
in version 1.1.1d-0+deb10u8.
For the stable distribution (bullseye), this problem has been fixed in
version 1.1.1k-1+deb11u2.
For the detailed security status of openssl please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/openssl
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----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=SB84
-----END PGP SIGNATURE-----
. If that applies then:
OpenSSL 1.0.2 users should apply git commit 6fc1aaaf3 (premium support
customers only)
OpenSSL 1.1.1 users should upgrade to 1.1.1m
OpenSSL 3.0.0 users should upgrade to 3.0.1
This issue was found on the 10th of December 2021 and subsequently fixed
by Bernd Edlinger.
Note
====
OpenSSL 1.0.2 is out of support and no longer receiving public updates.
References
==========
URL for this Security Advisory:
https://www.openssl.org/news/secadv/20220128.txt
Note: the online version of the advisory may be updated with additional details
over time.
For details of OpenSSL severity classifications please see:
https://www.openssl.org/policies/secpolicy.html
| VAR-202201-0369 | CVE-2022-0392 | vim Out-of-bounds write vulnerability in |
CVSS V2: 6.8 CVSS V3: 7.8 Severity: HIGH |
Heap-based Buffer Overflow in GitHub repository vim prior to 8.2. vim Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. Vim is an editor based on the UNIX platform. Summary:
The Migration Toolkit for Containers (MTC) 1.5.4 is now available. Description:
The Migration Toolkit for Containers (MTC) enables you to migrate
Kubernetes resources, persistent volume data, and internal container images
between OpenShift Container Platform clusters, using the MTC web console or
the Kubernetes API.
Security Fix(es):
* golang: net/http/httputil: panic due to racy read of persistConn after
handler panic (CVE-2021-36221)
For more details about the security issue(s), including the impact, a CVSS
score, and other related information, refer to the CVE page(s) listed in
the References section. Bugs fixed (https://bugzilla.redhat.com/):
1995656 - CVE-2021-36221 golang: net/http/httputil: panic due to racy read of persistConn after handler panic
5. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
====================================================================
Red Hat Security Advisory
Synopsis: Moderate: vim security update
Advisory ID: RHSA-2022:0894-01
Product: Red Hat Enterprise Linux
Advisory URL: https://access.redhat.com/errata/RHSA-2022:0894
Issue date: 2022-03-15
CVE Names: CVE-2022-0261 CVE-2022-0318 CVE-2022-0359
CVE-2022-0361 CVE-2022-0392 CVE-2022-0413
====================================================================
1. Summary:
An update for vim is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AppStream (v. 8) - aarch64, noarch, ppc64le, s390x, x86_64
Red Hat Enterprise Linux BaseOS (v. 8) - aarch64, ppc64le, s390x, x86_64
3. Description:
Vim (Vi IMproved) is an updated and improved version of the vi editor.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
5. Package List:
Red Hat Enterprise Linux AppStream (v. 8):
aarch64:
vim-X11-8.0.1763-16.el8_5.12.aarch64.rpm
vim-X11-debuginfo-8.0.1763-16.el8_5.12.aarch64.rpm
vim-common-8.0.1763-16.el8_5.12.aarch64.rpm
vim-common-debuginfo-8.0.1763-16.el8_5.12.aarch64.rpm
vim-debuginfo-8.0.1763-16.el8_5.12.aarch64.rpm
vim-debugsource-8.0.1763-16.el8_5.12.aarch64.rpm
vim-enhanced-8.0.1763-16.el8_5.12.aarch64.rpm
vim-enhanced-debuginfo-8.0.1763-16.el8_5.12.aarch64.rpm
vim-minimal-debuginfo-8.0.1763-16.el8_5.12.aarch64.rpm
noarch:
vim-filesystem-8.0.1763-16.el8_5.12.noarch.rpm
ppc64le:
vim-X11-8.0.1763-16.el8_5.12.ppc64le.rpm
vim-X11-debuginfo-8.0.1763-16.el8_5.12.ppc64le.rpm
vim-common-8.0.1763-16.el8_5.12.ppc64le.rpm
vim-common-debuginfo-8.0.1763-16.el8_5.12.ppc64le.rpm
vim-debuginfo-8.0.1763-16.el8_5.12.ppc64le.rpm
vim-debugsource-8.0.1763-16.el8_5.12.ppc64le.rpm
vim-enhanced-8.0.1763-16.el8_5.12.ppc64le.rpm
vim-enhanced-debuginfo-8.0.1763-16.el8_5.12.ppc64le.rpm
vim-minimal-debuginfo-8.0.1763-16.el8_5.12.ppc64le.rpm
s390x:
vim-X11-8.0.1763-16.el8_5.12.s390x.rpm
vim-X11-debuginfo-8.0.1763-16.el8_5.12.s390x.rpm
vim-common-8.0.1763-16.el8_5.12.s390x.rpm
vim-common-debuginfo-8.0.1763-16.el8_5.12.s390x.rpm
vim-debuginfo-8.0.1763-16.el8_5.12.s390x.rpm
vim-debugsource-8.0.1763-16.el8_5.12.s390x.rpm
vim-enhanced-8.0.1763-16.el8_5.12.s390x.rpm
vim-enhanced-debuginfo-8.0.1763-16.el8_5.12.s390x.rpm
vim-minimal-debuginfo-8.0.1763-16.el8_5.12.s390x.rpm
x86_64:
vim-X11-8.0.1763-16.el8_5.12.x86_64.rpm
vim-X11-debuginfo-8.0.1763-16.el8_5.12.x86_64.rpm
vim-common-8.0.1763-16.el8_5.12.x86_64.rpm
vim-common-debuginfo-8.0.1763-16.el8_5.12.x86_64.rpm
vim-debuginfo-8.0.1763-16.el8_5.12.x86_64.rpm
vim-debugsource-8.0.1763-16.el8_5.12.x86_64.rpm
vim-enhanced-8.0.1763-16.el8_5.12.x86_64.rpm
vim-enhanced-debuginfo-8.0.1763-16.el8_5.12.x86_64.rpm
vim-minimal-debuginfo-8.0.1763-16.el8_5.12.x86_64.rpm
Red Hat Enterprise Linux BaseOS (v. 8):
Source:
vim-8.0.1763-16.el8_5.12.src.rpm
aarch64:
vim-X11-debuginfo-8.0.1763-16.el8_5.12.aarch64.rpm
vim-common-debuginfo-8.0.1763-16.el8_5.12.aarch64.rpm
vim-debuginfo-8.0.1763-16.el8_5.12.aarch64.rpm
vim-debugsource-8.0.1763-16.el8_5.12.aarch64.rpm
vim-enhanced-debuginfo-8.0.1763-16.el8_5.12.aarch64.rpm
vim-minimal-8.0.1763-16.el8_5.12.aarch64.rpm
vim-minimal-debuginfo-8.0.1763-16.el8_5.12.aarch64.rpm
ppc64le:
vim-X11-debuginfo-8.0.1763-16.el8_5.12.ppc64le.rpm
vim-common-debuginfo-8.0.1763-16.el8_5.12.ppc64le.rpm
vim-debuginfo-8.0.1763-16.el8_5.12.ppc64le.rpm
vim-debugsource-8.0.1763-16.el8_5.12.ppc64le.rpm
vim-enhanced-debuginfo-8.0.1763-16.el8_5.12.ppc64le.rpm
vim-minimal-8.0.1763-16.el8_5.12.ppc64le.rpm
vim-minimal-debuginfo-8.0.1763-16.el8_5.12.ppc64le.rpm
s390x:
vim-X11-debuginfo-8.0.1763-16.el8_5.12.s390x.rpm
vim-common-debuginfo-8.0.1763-16.el8_5.12.s390x.rpm
vim-debuginfo-8.0.1763-16.el8_5.12.s390x.rpm
vim-debugsource-8.0.1763-16.el8_5.12.s390x.rpm
vim-enhanced-debuginfo-8.0.1763-16.el8_5.12.s390x.rpm
vim-minimal-8.0.1763-16.el8_5.12.s390x.rpm
vim-minimal-debuginfo-8.0.1763-16.el8_5.12.s390x.rpm
x86_64:
vim-X11-debuginfo-8.0.1763-16.el8_5.12.x86_64.rpm
vim-common-debuginfo-8.0.1763-16.el8_5.12.x86_64.rpm
vim-debuginfo-8.0.1763-16.el8_5.12.x86_64.rpm
vim-debugsource-8.0.1763-16.el8_5.12.x86_64.rpm
vim-enhanced-debuginfo-8.0.1763-16.el8_5.12.x86_64.rpm
vim-minimal-8.0.1763-16.el8_5.12.x86_64.rpm
vim-minimal-debuginfo-8.0.1763-16.el8_5.12.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2022-0261
https://access.redhat.com/security/cve/CVE-2022-0318
https://access.redhat.com/security/cve/CVE-2022-0359
https://access.redhat.com/security/cve/CVE-2022-0361
https://access.redhat.com/security/cve/CVE-2022-0392
https://access.redhat.com/security/cve/CVE-2022-0413
https://access.redhat.com/security/updates/classification/#moderate
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2022 Red Hat, Inc. Description:
Red Hat Openshift GitOps is a declarative way to implement continuous
deployment for cloud native applications. Bugs fixed (https://bugzilla.redhat.com/):
2062751 - CVE-2022-24730 argocd: path traversal and improper access control allows leaking out-of-bound files
2062755 - CVE-2022-24731 argocd: path traversal allows leaking out-of-bound files
2064682 - CVE-2022-1025 Openshift-Gitops: Improper access control allows admin privilege escalation
5. Summary:
Red Hat Advanced Cluster Management for Kubernetes 2.3.8 General
Availability release images, which provide security and container updates. Description:
Red Hat Advanced Cluster Management for Kubernetes 2.3.8 images
Red Hat Advanced Cluster Management for Kubernetes provides the
capabilities to address common challenges that administrators and site
reliability engineers face as they work across a range of public and
private cloud environments. Clusters and applications are all visible and
managed from a single console—with security policy built in.
This advisory contains the container images for Red Hat Advanced Cluster
Management for Kubernetes, which fix several bugs. See the following
Release Notes documentation, which will be updated shortly for this
release, for additional details about this release:
https://access.redhat.com/documentation/en-us/red_hat_advanced_cluster_management_for_kubernetes/2.3/html/release_notes/
Security updates:
* nanoid: Information disclosure via valueOf() function (CVE-2021-23566)
* nodejs-shelljs: improper privilege management (CVE-2022-0144)
* follow-redirects: Exposure of Private Personal Information to an
Unauthorized Actor (CVE-2022-0155)
* node-fetch: exposure of sensitive information to an unauthorized actor
(CVE-2022-0235)
* follow-redirects: Exposure of Sensitive Information via Authorization
Header leak (CVE-2022-0536)
Bug fix:
* RHACM 2.3.8 images (Bugzilla #2062316)
3. Bugs fixed (https://bugzilla.redhat.com/):
2043535 - CVE-2022-0144 nodejs-shelljs: improper privilege management
2044556 - CVE-2022-0155 follow-redirects: Exposure of Private Personal Information to an Unauthorized Actor
2044591 - CVE-2022-0235 node-fetch: exposure of sensitive information to an unauthorized actor
2050853 - CVE-2021-23566 nanoid: Information disclosure via valueOf() function
2053259 - CVE-2022-0536 follow-redirects: Exposure of Sensitive Information via Authorization Header leak
2062316 - RHACM 2.3.8 images
5. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
APPLE-SA-2022-10-24-2 macOS Ventura 13
macOS Ventura 13 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/HT213488.
Accelerate Framework
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: Processing a maliciously crafted image may lead to arbitrary
code execution
Description: A memory consumption issue was addressed with improved
memory handling.
CVE-2022-42795: ryuzaki
Apple Neural Engine
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: An app may be able to leak sensitive kernel state
Description: The issue was addressed with improved memory handling.
CVE-2022-32858: Mohamed Ghannam (@_simo36)
Apple Neural Engine
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: An app may be able to execute arbitrary code with kernel
privileges
Description: The issue was addressed with improved memory handling.
CVE-2022-32898: Mohamed Ghannam (@_simo36)
CVE-2022-32899: Mohamed Ghannam (@_simo36)
AppleAVD
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: An app may be able to cause a denial-of-service
Description: A memory corruption issue was addressed with improved
state management.
CVE-2022-32827: Antonio Zekic (@antoniozekic), Natalie Silvanovich of
Google Project Zero, an anonymous researcher
AppleMobileFileIntegrity
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: An app may be able to access user-sensitive data
Description: An issue in code signature validation was addressed with
improved checks.
CVE-2022-42789: Koh M. Nakagawa of FFRI Security, Inc.
AppleMobileFileIntegrity
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: An app may be able to modify protected parts of the file
system
Description: This issue was addressed by removing additional
entitlements.
CVE-2022-42825: Mickey Jin (@patch1t)
ATS
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: An app may be able to bypass Privacy preferences
Description: A logic issue was addressed with improved state
management.
CVE-2022-32902: Mickey Jin (@patch1t)
ATS
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: An app may be able to access user-sensitive data
Description: An access issue was addressed with additional sandbox
restrictions.
CVE-2022-32904: Mickey Jin (@patch1t)
ATS
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: A sandboxed process may be able to circumvent sandbox
restrictions
Description: A logic issue was addressed with improved checks.
CVE-2022-32890: Mickey Jin (@patch1t)
Audio
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: An app may be able to gain elevated privileges
Description: This issue was addressed by removing the vulnerable
code.
CVE-2022-42796: an anonymous researcher
AVEVideoEncoder
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: An app may be able to execute arbitrary code with kernel
privileges
Description: The issue was addressed with improved bounds checks.
CVE-2022-32940: ABC Research s.r.o.
Calendar
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: An app may be able to read sensitive location information
Description: An access issue was addressed with improved access
restrictions.
CVE-2022-42819: an anonymous researcher
CFNetwork
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: Processing a maliciously crafted certificate may lead to
arbitrary code execution
Description: A certificate validation issue existed in the handling
of WKWebView. This issue was addressed with improved validation.
CVE-2022-42813: Jonathan Zhang of Open Computing Facility
(ocf.berkeley.edu)
ColorSync
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: Processing a maliciously crafted image may lead to arbitrary
code execution
Description: A memory corruption issue existed in the processing of
ICC profiles. This issue was addressed with improved input
validation.
CVE-2022-26730: David Hoyt of Hoyt LLC
Crash Reporter
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: A user with physical access to an iOS device may be able to
read past diagnostic logs
Description: This issue was addressed with improved data protection.
CVE-2022-32867: Kshitij Kumar and Jai Musunuri of Crowdstrike
curl
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: Multiple issues in curl
Description: Multiple issues were addressed by updating to curl
version 7.84.0.
CVE-2022-32205
CVE-2022-32206
CVE-2022-32207
CVE-2022-32208
Directory Utility
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: An app may be able to access user-sensitive data
Description: A logic issue was addressed with improved checks.
CVE-2022-42814: Sergii Kryvoblotskyi of MacPaw Inc.
DriverKit
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: An app may be able to execute arbitrary code with kernel
privileges
Description: The issue was addressed with improved memory handling.
CVE-2022-32865: Linus Henze of Pinauten GmbH (pinauten.de)
DriverKit
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: An app may be able to execute arbitrary code with kernel
privileges
Description: A type confusion issue was addressed with improved
checks.
CVE-2022-32915: Tommy Muir (@Muirey03)
Exchange
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: A user in a privileged network position may be able to
intercept mail credentials
Description: A logic issue was addressed with improved restrictions.
CVE-2022-32928: an anonymous researcher
Find My
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: A malicious application may be able to read sensitive
location information
Description: A permissions issue existed. This issue was addressed
with improved permission validation.
CVE-2022-42788: Csaba Fitzl (@theevilbit) of Offensive Security,
Wojciech Reguła of SecuRing (wojciechregula.blog)
Finder
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: Processing a maliciously crafted DMG file may lead to
arbitrary code execution with system privileges
Description: This issue was addressed with improved validation of
symlinks.
CVE-2022-32905: Ron Masas (breakpoint.sh) of BreakPoint Technologies
LTD
GPU Drivers
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: An app may be able to execute arbitrary code with kernel
privileges
Description: The issue was addressed with improved memory handling.
CVE-2022-32947: Asahi Lina (@LinaAsahi)
Grapher
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: Processing a maliciously crafted gcx file may lead to
unexpected app termination or arbitrary code execution
Description: The issue was addressed with improved memory handling.
CVE-2022-42809: Yutao Wang (@Jack) and Yu Zhou (@yuzhou6666)
Image Processing
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: A sandboxed app may be able to determine which app is
currently using the camera
Description: The issue was addressed with additional restrictions on
the observability of app states.
CVE-2022-32913: Yiğit Can YILMAZ (@yilmazcanyigit)
ImageIO
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: Processing an image may lead to a denial-of-service
Description: A denial-of-service issue was addressed with improved
validation.
CVE-2022-1622
Intel Graphics Driver
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: An app may be able to disclose kernel memory
Description: An out-of-bounds read was addressed with improved input
validation.
CVE-2022-32936: Antonio Zekic (@antoniozekic)
IOHIDFamily
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: An app may cause unexpected app termination or arbitrary code
execution
Description: A memory corruption issue was addressed with improved
state management.
CVE-2022-42820: Peter Pan ZhenPeng of STAR Labs
IOKit
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: An app may be able to execute arbitrary code with kernel
privileges
Description: A race condition was addressed with improved locking.
CVE-2022-42806: Tingting Yin of Tsinghua University
Kernel
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: An app may be able to disclose kernel memory
Description: The issue was addressed with improved memory handling.
CVE-2022-32864: Linus Henze of Pinauten GmbH (pinauten.de)
Kernel
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: An app may be able to execute arbitrary code with kernel
privileges
Description: The issue was addressed with improved memory handling.
CVE-2022-32866: Linus Henze of Pinauten GmbH (pinauten.de)
CVE-2022-32911: Zweig of Kunlun Lab
CVE-2022-32924: Ian Beer of Google Project Zero
Kernel
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: An app may be able to execute arbitrary code with kernel
privileges
Description: A use after free issue was addressed with improved
memory management.
CVE-2022-32914: Zweig of Kunlun Lab
Kernel
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: A remote user may be able to cause kernel code execution
Description: An out-of-bounds write issue was addressed with improved
bounds checking.
CVE-2022-42808: Zweig of Kunlun Lab
Mail
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: An app may be able to access user-sensitive data
Description: This issue was addressed with improved data protection.
CVE-2022-42815: Csaba Fitzl (@theevilbit) of Offensive Security
Maps
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: An app may be able to read sensitive location information
Description: A logic issue was addressed with improved restrictions.
CVE-2022-32883: Ron Masas of breakpointhq.com
MediaLibrary
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: A user may be able to elevate privileges
Description: A memory corruption issue was addressed with improved
input validation.
CVE-2022-32908: an anonymous researcher
ncurses
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: A user may be able to cause unexpected app termination or
arbitrary code execution
Description: A buffer overflow was addressed with improved bounds
checking.
CVE-2021-39537
ncurses
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: Processing a maliciously crafted file may lead to a denial-
of-service or potentially disclose memory contents
Description: A denial-of-service issue was addressed with improved
validation.
CVE-2022-29458
Notes
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: A user in a privileged network position may be able to track
user activity
Description: This issue was addressed with improved data protection.
CVE-2022-42818: Gustav Hansen from WithSecure
Notifications
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: A user with physical access to a device may be able to access
contacts from the lock screen
Description: A logic issue was addressed with improved state
management.
CVE-2022-32879: Ubeydullah Sümer
PackageKit
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: An app may be able to modify protected parts of the file
system
Description: A race condition was addressed with improved state
handling.
CVE-2022-32895: Mickey Jin (@patch1t) of Trend Micro, Mickey Jin
(@patch1t)
Photos
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: An app may be able to bypass Privacy preferences
Description: This issue was addressed with improved data protection.
CVE-2022-32918: an anonymous researcher, Jugal Goradia of Aastha
Technologies, Srijan Shivam Mishra of The Hack Report, Evan Ricafort
(evanricafort.com) of Invalid Web Security, Amod Raghunath Patwardhan
of Pune, India, Ashwani Rajput of Nagarro Software Pvt. Ltd
ppp
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: An app with root privileges may be able to execute arbitrary
code with kernel privileges
Description: A use after free issue was addressed with improved
memory management.
CVE-2022-42829: an anonymous researcher
ppp
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: An app with root privileges may be able to execute arbitrary
code with kernel privileges
Description: The issue was addressed with improved memory handling.
CVE-2022-42830: an anonymous researcher
ppp
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: An app with root privileges may be able to execute arbitrary
code with kernel privileges
Description: A race condition was addressed with improved locking.
CVE-2022-42831: an anonymous researcher
CVE-2022-42832: an anonymous researcher
Ruby
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: A remote user may be able to cause unexpected app termination
or arbitrary code execution
Description: A memory corruption issue was addressed by updating Ruby
to version 2.6.10.
CVE-2022-28739
Sandbox
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: An app may be able to modify protected parts of the file
system
Description: A logic issue was addressed with improved restrictions.
CVE-2022-32881: Csaba Fitzl (@theevilbit) of Offensive Security
Sandbox
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: An app with root privileges may be able to access private
information
Description: This issue was addressed with improved data protection.
CVE-2022-32862: an anonymous researcher
Sandbox
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: An app may be able to access user-sensitive data
Description: An access issue was addressed with additional sandbox
restrictions.
CVE-2022-42811: Justin Bui (@slyd0g) of Snowflake
Security
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: An app may be able to bypass code signing checks
Description: An issue in code signature validation was addressed with
improved checks.
CVE-2022-42793: Linus Henze of Pinauten GmbH (pinauten.de)
Shortcuts
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: A shortcut may be able to check the existence of an arbitrary
path on the file system
Description: A parsing issue in the handling of directory paths was
addressed with improved path validation.
CVE-2022-32938: Cristian Dinca of Tudor Vianu National High School of
Computer Science of. Romania
Sidecar
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: A user may be able to view restricted content from the lock
screen
Description: A logic issue was addressed with improved state
management.
CVE-2022-42790: Om kothawade of Zaprico Digital
Siri
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: A user with physical access to a device may be able to use
Siri to obtain some call history information
Description: A logic issue was addressed with improved state
management.
CVE-2022-32870: Andrew Goldberg of The McCombs School of Business,
The University of Texas at Austin (linkedin.com/in/andrew-goldberg-/)
SMB
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: A remote user may be able to cause kernel code execution
Description: The issue was addressed with improved memory handling.
CVE-2022-32934: Felix Poulin-Belanger
Software Update
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: An app may be able to execute arbitrary code with kernel
privileges
Description: A race condition was addressed with improved state
handling.
CVE-2022-42791: Mickey Jin (@patch1t) of Trend Micro
SQLite
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: A remote user may be able to cause a denial-of-service
Description: This issue was addressed with improved checks.
CVE-2021-36690
Vim
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: Multiple issues in Vim
Description: Multiple issues were addressed by updating Vim.
CVE-2022-0261
CVE-2022-0318
CVE-2022-0319
CVE-2022-0351
CVE-2022-0359
CVE-2022-0361
CVE-2022-0368
CVE-2022-0392
CVE-2022-0554
CVE-2022-0572
CVE-2022-0629
CVE-2022-0685
CVE-2022-0696
CVE-2022-0714
CVE-2022-0729
CVE-2022-0943
CVE-2022-1381
CVE-2022-1420
CVE-2022-1725
CVE-2022-1616
CVE-2022-1619
CVE-2022-1620
CVE-2022-1621
CVE-2022-1629
CVE-2022-1674
CVE-2022-1733
CVE-2022-1735
CVE-2022-1769
CVE-2022-1927
CVE-2022-1942
CVE-2022-1968
CVE-2022-1851
CVE-2022-1897
CVE-2022-1898
CVE-2022-1720
CVE-2022-2000
CVE-2022-2042
CVE-2022-2124
CVE-2022-2125
CVE-2022-2126
Weather
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: An app may be able to read sensitive location information
Description: A logic issue was addressed with improved state
management.
CVE-2022-32875: an anonymous researcher
WebKit
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution
Description: A buffer overflow issue was addressed with improved
memory handling.
WebKit Bugzilla: 241969
CVE-2022-32886: P1umer (@p1umer), afang (@afang5472), xmzyshypnc
(@xmzyshypnc1)
WebKit
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution
Description: An out-of-bounds write issue was addressed with improved
bounds checking.
WebKit Bugzilla: 242047
CVE-2022-32888: P1umer (@p1umer)
WebKit
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution
Description: An out-of-bounds read was addressed with improved bounds
checking.
WebKit Bugzilla: 242762
CVE-2022-32912: Jeonghoon Shin (@singi21a) at Theori working with
Trend Micro Zero Day Initiative
WebKit
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: Visiting a malicious website may lead to user interface
spoofing
Description: The issue was addressed with improved UI handling.
WebKit Bugzilla: 243693
CVE-2022-42799: Jihwan Kim (@gPayl0ad), Dohyun Lee (@l33d0hyun)
WebKit
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution
Description: A type confusion issue was addressed with improved
memory handling.
WebKit Bugzilla: 244622
CVE-2022-42823: Dohyun Lee (@l33d0hyun) of SSD Labs
WebKit
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: Processing maliciously crafted web content may disclose
sensitive user information
Description: A logic issue was addressed with improved state
management.
WebKit Bugzilla: 245058
CVE-2022-42824: Abdulrahman Alqabandi of Microsoft Browser
Vulnerability Research, Ryan Shin of IAAI SecLab at Korea University,
Dohyun Lee (@l33d0hyun) of DNSLab at Korea University
WebKit PDF
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution
Description: A use after free issue was addressed with improved
memory management.
WebKit Bugzilla: 242781
CVE-2022-32922: Yonghwi Jin (@jinmo123) at Theori working with Trend
Micro Zero Day Initiative
WebKit Sandboxing
Available for: Mac Studio (2022), Mac Pro (2019 and later), MacBook
Air (2018 and later), MacBook Pro (2017 and later), Mac mini (2018
and later), iMac (2017 and later), MacBook (2017), and iMac Pro
(2017)
Impact: A sandboxed process may be able to circumvent sandbox
restrictions
Description: An access issue was addressed with improvements to the
sandbox.
WebKit Bugzilla: 243181
CVE-2022-32892: @18楼梦想改造家 and @jq0904 of DBAppSecurity's WeBin lab
Additional recognition
Airport
We would like to acknowledge Joseph Salazar Acuña and Renato Llamoca
of Intrado-Life & Safety/Globant for their assistance.
AppleCredentialManager
We would like to acknowledge @jonathandata1 for their assistance.
FaceTime
We would like to acknowledge an anonymous researcher for their
assistance.
FileVault
We would like to acknowledge Timothy Perfitt of Twocanoes Software
for their assistance.
Find My
We would like to acknowledge an anonymous researcher for their
assistance.
Identity Services
We would like to acknowledge Joshua Jones for their assistance.
IOAcceleratorFamily
We would like to acknowledge Antonio Zekic (@antoniozekic) for their
assistance.
Kernel
We would like to acknowledge Peter Nguyen of STAR Labs, Tim Michaud
(@TimGMichaud) of Moveworks.ai, Tingting Yin of Tsinghua University,
and Min Zheng of Ant Group, Tommy Muir (@Muirey03), an anonymous
researcher for their assistance.
Mail
We would like to acknowledge an anonymous researcher for their
assistance.
Mail Drafts
We would like to acknowledge an anonymous researcher for their
assistance.
Networking
We would like to acknowledge Tim Michaud (@TimGMichaud) of Zoom Video
Communications for their assistance.
Photo Booth
We would like to acknowledge Prashanth Kannan of Dremio for their
assistance.
Quick Look
We would like to acknowledge Hilary “It’s off by a Pixel” Street for
their assistance.
Sandbox
We would like to acknowledge Csaba Fitzl (@theevilbit) of Offensive
Security for their assistance.
smbx
We would like to acknowledge HD Moore of runZero Asset Inventory for
their assistance.
System
We would like to acknowledge Mickey Jin (@patch1t) of Trend Micro for
their assistance.
System Settings
We would like to acknowledge Bjorn Hellenbrand for their assistance.
UIKit
We would like to acknowledge Aleczander Ewing for their assistance.
WebKit
We would like to acknowledge Maddie Stone of Google Project Zero,
Narendra Bhati (@imnarendrabhati) of Suma Soft Pvt. Ltd., an
anonymous researcher for their assistance.
WebRTC
We would like to acknowledge an anonymous researcher for their
assistance.
macOS Ventura 13 may be obtained from the Mac App Store or Apple's
Software Downloads web site: https://support.apple.com/downloads/
All information is also posted on the Apple Security Updates
web site: https://support.apple.com/en-us/HT201222.
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----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=lEWC
-----END PGP SIGNATURE——
. ==========================================================================
Ubuntu Security Notice USN-5801-1
January 12, 2023
vim vulnerabilities
==========================================================================
A security issue affects these releases of Ubuntu and its derivatives:
- Ubuntu 22.04 LTS
- Ubuntu 20.04 LTS
- Ubuntu 18.04 LTS
Summary:
Several security issues were fixed in Vim. An attacker could possibly use this to crash Vim,
access or modify memory, or execute arbitrary commands. This issue
affected only Ubuntu 20.04 and 22.04 (CVE-2022-0392)
It was discovered that Vim makes illegal memory calls when making
certain retab calls. An attacker could possibly use this to crash Vim,
access or modify memory, or execute arbitrary commands. (CVE-2022-0417)
Update instructions:
The problem can be corrected by updating your system to the following
package versions:
Ubuntu 22.04 LTS:
vim 2:8.2.3995-1ubuntu2.3
vim-athena 2:8.2.3995-1ubuntu2.3
vim-gtk 2:8.2.3995-1ubuntu2.3
vim-gtk3 2:8.2.3995-1ubuntu2.3
vim-nox 2:8.2.3995-1ubuntu2.3
vim-tiny 2:8.2.3995-1ubuntu2.3
xxd 2:8.2.3995-1ubuntu2.3
Ubuntu 20.04 LTS:
vim 2:8.1.2269-1ubuntu5.11
vim-athena 2:8.1.2269-1ubuntu5.11
vim-gtk 2:8.1.2269-1ubuntu5.11
vim-gtk3 2:8.1.2269-1ubuntu5.11
vim-nox 2:8.1.2269-1ubuntu5.11
vim-tiny 2:8.1.2269-1ubuntu5.11
xxd 2:8.1.2269-1ubuntu5.11
Ubuntu 18.04 LTS:
vim 2:8.0.1453-1ubuntu1.10
vim-athena 2:8.0.1453-1ubuntu1.10
vim-gnome 2:8.0.1453-1ubuntu1.10
vim-gtk 2:8.0.1453-1ubuntu1.10
vim-gtk3 2:8.0.1453-1ubuntu1.10
vim-nox 2:8.0.1453-1ubuntu1.10
vim-tiny 2:8.0.1453-1ubuntu1.10
xxd 2:8.0.1453-1ubuntu1.10
In general, a standard system update will make all the necessary changes.
CVE-2022-32913: Yiğit Can YILMAZ (@yilmazcanyigit)
Entry added October 27, 2022
iMovie
Available for: macOS Monterey
Impact: A user may be able to view sensitive user information
Description: This issue was addressed by enabling hardened runtime. Apple is aware of a report that this issue may
have been actively exploited
| VAR-202201-0402 | CVE-2022-23096 | Connman Out-of-bounds read vulnerability in |
CVSS V2: 6.4 CVSS V3: 9.1 Severity: CRITICAL |
An issue was discovered in the DNS proxy in Connman through 1.40. The TCP server reply implementation lacks a check for the presence of sufficient Header Data, leading to an out-of-bounds read. Connman Exists in an out-of-bounds read vulnerability.Information is obtained and service operation is interrupted (DoS) It may be in a state.
For the stable distribution (bullseye), these problems have been fixed in
version 1.36-2.2+deb11u1.
We recommend that you upgrade your connman packages.
For the detailed security status of connman please refer to its security
tracker page at:
https://security-tracker.debian.org/tracker/connman
Further information about Debian Security Advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://www.debian.org/security/
Mailing list: debian-security-announce@lists.debian.org
-----BEGIN PGP SIGNATURE-----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=qzlf
-----END PGP SIGNATURE-----
. - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory GLSA 202310-21
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
https://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Severity: High
Title: ConnMan: Multiple Vulnerabilities
Date: October 31, 2023
Bugs: #832028, #863425
ID: 202310-21
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Synopsis
=======
Multiple vulnerabilities have been discovered in ConnMan, the worst of
which can lead to remote code execution.
Background
=========
ConnMan provides a daemon for managing Internet connections.
Affected packages
================
Package Vulnerable Unaffected
---------------- ------------------ -------------------
net-misc/connman < 1.42_pre20220801 >= 1.42_pre20220801
Description
==========
Multiple vulnerabilities have been discovered in ConnMan. Please review
the CVE identifiers referenced below for details.
Impact
=====
Please review the referenced CVE identifiers for details.
Workaround
=========
There is no known workaround at this time.
Resolution
=========
All ConnMan users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose ">=net-misc/connman-1.42_pre20220801"
References
=========
[ 1 ] CVE-2022-23096
https://nvd.nist.gov/vuln/detail/CVE-2022-23096
[ 2 ] CVE-2022-23097
https://nvd.nist.gov/vuln/detail/CVE-2022-23097
[ 3 ] CVE-2022-23098
https://nvd.nist.gov/vuln/detail/CVE-2022-23098
[ 4 ] CVE-2022-32292
https://nvd.nist.gov/vuln/detail/CVE-2022-32292
[ 5 ] CVE-2022-32293
https://nvd.nist.gov/vuln/detail/CVE-2022-32293
Availability
===========
This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:
https://security.gentoo.org/glsa/202310-21
Concerns?
========
Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users' machines is of utmost
importance to us. Any security concerns should be addressed to
security@gentoo.org or alternatively, you may file a bug at
https://bugs.gentoo.org.
License
======
Copyright 2023 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).
The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.
https://creativecommons.org/licenses/by-sa/2.5
| VAR-202201-1106 | CVE-2021-44971 | AC15V1.0 and AC5V1.0 Improper Comparison Vulnerability in Firmware |
CVSS V2: 7.5 CVSS V3: 9.8 Severity: CRITICAL |
Multiple Tenda devices are affected by authentication bypass, such as AC15V1.0 Firmware V15.03.05.20_multi?AC5V1.0 Firmware V15.03.06.48_multi and so on. an attacker can obtain sensitive information, and even combine it with authenticated command injection to implement RCE. AC15V1.0 and AC5V1.0 An improper comparison vulnerability exists in firmware.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state. The Tenda AC15 is a wireless router from the Chinese company Tenda
| VAR-202201-0424 | CVE-2022-22589 | plural Apple Product input verification vulnerabilities |
CVSS V2: 4.3 CVSS V3: 6.1 Severity: MEDIUM |
A validation issue was addressed with improved input sanitization. This issue is fixed in iOS 15.3 and iPadOS 15.3, watchOS 8.4, tvOS 15.3, Safari 15.3, macOS Monterey 12.2. Processing a maliciously crafted mail message may lead to running arbitrary javascript. plural Apple The product contains an input validation vulnerability.Information may be obtained and information may be tampered with. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
macOS Big Sur 11.6.6 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/HT213256.
apache
Available for: macOS Big Sur
Impact: Multiple issues in apache
Description: Multiple issues were addressed by updating apache to
version 2.4.53.
CVE-2021-44224
CVE-2021-44790
CVE-2022-22719
CVE-2022-22720
CVE-2022-22721
AppKit
Available for: macOS Big Sur
Impact: A malicious application may be able to gain root privileges
Description: A logic issue was addressed with improved validation.
CVE-2022-22665: Lockheed Martin Red Team
AppleAVD
Available for: macOS Big Sur
Impact: An application may be able to execute arbitrary code with
kernel privileges. Apple is aware of a report that this issue may
have been actively exploited.
CVE-2022-22675: an anonymous researcher
AppleGraphicsControl
Available for: macOS Big Sur
Impact: Processing a maliciously crafted image may lead to arbitrary
code execution
Description: A memory corruption issue was addressed with improved
input validation.
CVE-2022-26751: Michael DePlante (@izobashi) of Trend Micro Zero Day
Initiative
AppleScript
Available for: macOS Big Sur
Impact: Processing a maliciously crafted AppleScript binary may
result in unexpected application termination or disclosure of process
memory
Description: An out-of-bounds read issue was addressed with improved
bounds checking.
CVE-2022-26698: Qi Sun of Trend Micro
AppleScript
Available for: macOS Big Sur
Impact: Processing a maliciously crafted AppleScript binary may
result in unexpected application termination or disclosure of process
memory
Description: An out-of-bounds read issue was addressed with improved
input validation.
CVE-2022-26697: Qi Sun and Robert Ai of Trend Micro
CoreTypes
Available for: macOS Big Sur
Impact: A malicious application may bypass Gatekeeper checks
Description: This issue was addressed with improved checks to prevent
unauthorized actions.
CVE-2022-22663: Arsenii Kostromin (0x3c3e)
CVMS
Available for: macOS Big Sur
Impact: A malicious application may be able to gain root privileges
Description: A memory initialization issue was addressed.
CVE-2022-26721: Yonghwi Jin (@jinmo123) of Theori
CVE-2022-26722: Yonghwi Jin (@jinmo123) of Theori
DriverKit
Available for: macOS Big Sur
Impact: A malicious application may be able to execute arbitrary code
with system privileges
Description: An out-of-bounds access issue was addressed with
improved bounds checking.
CVE-2022-26763: Linus Henze of Pinauten GmbH (pinauten.de)
Graphics Drivers
Available for: macOS Big Sur
Impact: A local user may be able to read kernel memory
Description: An out-of-bounds read issue existed that led to the
disclosure of kernel memory.
CVE-2022-22674: an anonymous researcher
Intel Graphics Driver
Available for: macOS Big Sur
Impact: A malicious application may be able to execute arbitrary code
with kernel privileges
Description: An out-of-bounds write issue was addressed with improved
bounds checking.
CVE-2022-26720: Liu Long of Ant Security Light-Year Lab
Intel Graphics Driver
Available for: macOS Big Sur
Impact: A malicious application may be able to execute arbitrary code
with kernel privileges
Description: An out-of-bounds read issue was addressed with improved
input validation.
CVE-2022-26770: Liu Long of Ant Security Light-Year Lab
Intel Graphics Driver
Available for: macOS Big Sur
Impact: An application may be able to execute arbitrary code with
kernel privileges
Description: An out-of-bounds write issue was addressed with improved
input validation.
CVE-2022-26756: Jack Dates of RET2 Systems, Inc
Intel Graphics Driver
Available for: macOS Big Sur
Impact: A malicious application may be able to execute arbitrary code
with kernel privileges
Description: A memory corruption issue was addressed with improved
input validation.
CVE-2022-26769: Antonio Zekic (@antoniozekic)
Intel Graphics Driver
Available for: macOS Big Sur
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution
Description: An out-of-bounds write issue was addressed with improved
input validation.
CVE-2022-26748: Jeonghoon Shin of Theori working with Trend Micro
Zero Day Initiative
IOMobileFrameBuffer
Available for: macOS Big Sur
Impact: An application may be able to execute arbitrary code with
kernel privileges
Description: A memory corruption issue was addressed with improved
state management.
CVE-2022-26768: an anonymous researcher
Kernel
Available for: macOS Big Sur
Impact: An application may be able to execute arbitrary code with
kernel privileges
Description: A memory corruption issue was addressed with improved
validation.
CVE-2022-26714: Peter Nguyễn Vũ Hoàng (@peternguyen14) of STAR Labs
(@starlabs_sg)
Kernel
Available for: macOS Big Sur
Impact: An application may be able to execute arbitrary code with
kernel privileges
Description: A use after free issue was addressed with improved
memory management.
CVE-2022-26757: Ned Williamson of Google Project Zero
LaunchServices
Available for: macOS Big Sur
Impact: A malicious application may be able to bypass Privacy
preferences
Description: The issue was addressed with additional permissions
checks.
CVE-2022-26767: Wojciech Reguła (@_r3ggi) of SecuRing
LaunchServices
Available for: macOS Big Sur
Impact: A sandboxed process may be able to circumvent sandbox
restrictions
Description: An access issue was addressed with additional sandbox
restrictions on third-party applications.
CVE-2022-26706: Arsenii Kostromin (0x3c3e)
libresolv
Available for: macOS Big Sur
Impact: An attacker may be able to cause unexpected application
termination or arbitrary code execution
Description: This issue was addressed with improved checks.
CVE-2022-26776: Zubair Ashraf of Crowdstrike, Max Shavrick (@_mxms)
of the Google Security Team
LibreSSL
Available for: macOS Big Sur
Impact: Processing a maliciously crafted certificate may lead to a
denial of service
Description: A denial of service issue was addressed with improved
input validation.
CVE-2022-0778
libxml2
Available for: macOS Big Sur
Impact: A remote attacker may be able to cause unexpected application
termination or arbitrary code execution
Description: A use after free issue was addressed with improved
memory management.
CVE-2022-23308
OpenSSL
Available for: macOS Big Sur
Impact: Processing a maliciously crafted certificate may lead to a
denial of service
Description: This issue was addressed with improved checks.
CVE-2022-0778
PackageKit
Available for: macOS Big Sur
Impact: A malicious application may be able to modify protected parts
of the file system
Description: This issue was addressed by removing the vulnerable
code.
CVE-2022-26712: Mickey Jin (@patch1t)
Printing
Available for: macOS Big Sur
Impact: A malicious application may be able to bypass Privacy
preferences
Description: This issue was addressed by removing the vulnerable
code.
CVE-2022-26746: @gorelics
Security
Available for: macOS Big Sur
Impact: A malicious app may be able to bypass signature validation
Description: A certificate parsing issue was addressed with improved
checks.
CVE-2022-26766: Linus Henze of Pinauten GmbH (pinauten.de)
SMB
Available for: macOS Big Sur
Impact: An application may be able to gain elevated privileges
Description: An out-of-bounds read issue was addressed with improved
input validation.
CVE-2022-26718: Peter Nguyễn Vũ Hoàng of STAR Labs
SMB
Available for: macOS Big Sur
Impact: Mounting a maliciously crafted Samba network share may lead
to arbitrary code execution
Description: A memory corruption issue was addressed with improved
input validation.
CVE-2022-26723: Felix Poulin-Belanger
SMB
Available for: macOS Big Sur
Impact: An application may be able to gain elevated privileges
Description: An out-of-bounds write issue was addressed with improved
bounds checking.
CVE-2022-26715: Peter Nguyễn Vũ Hoàng of STAR Labs
SoftwareUpdate
Available for: macOS Big Sur
Impact: A malicious application may be able to access restricted
files
Description: This issue was addressed with improved entitlements.
CVE-2022-26728: Mickey Jin (@patch1t)
TCC
Available for: macOS Big Sur
Impact: An app may be able to capture a user's screen
Description: This issue was addressed with improved checks.
CVE-2022-26726: an anonymous researcher
Tcl
Available for: macOS Big Sur
Impact: A malicious application may be able to break out of its
sandbox
Description: This issue was addressed with improved environment
sanitization.
CVE-2022-26755: Arsenii Kostromin (0x3c3e)
Vim
Available for: macOS Big Sur
Impact: Multiple issues in Vim
Description: Multiple issues were addressed by updating Vim.
CVE-2022-22589: Heige of KnownSec 404 Team (knownsec.com) and Bo Qu
of Palo Alto Networks (paloaltonetworks.com)
Wi-Fi
Available for: macOS Big Sur
Impact: A malicious application may disclose restricted memory
Description: A memory corruption issue was addressed with improved
validation.
CVE-2022-26745: an anonymous researcher
Wi-Fi
Available for: macOS Big Sur
Impact: An application may be able to execute arbitrary code with
kernel privileges
Description: A memory corruption issue was addressed with improved
memory handling.
CVE-2022-26761: Wang Yu of Cyberserval
zip
Available for: macOS Big Sur
Impact: Processing a maliciously crafted file may lead to a denial of
service
Description: A denial of service issue was addressed with improved
state handling.
CVE-2022-0530
zlib
Available for: macOS Big Sur
Impact: An attacker may be able to cause unexpected application
termination or arbitrary code execution
Description: A memory corruption issue was addressed with improved
input validation.
CVE-2018-25032: Tavis Ormandy
zsh
Available for: macOS Big Sur
Impact: A remote attacker may be able to cause arbitrary code
execution
Description: This issue was addressed by updating to zsh version
5.8.1.
CVE-2021-45444
Additional recognition
Bluetooth
We would like to acknowledge Jann Horn of Project Zero for their
assistance.
macOS Big Sur 11.6.6 may be obtained from the Mac App Store or
Apple's Software Downloads web site:
https://support.apple.com/downloads/
All information is also posted on the Apple Security Updates
web site: https://support.apple.com/en-us/HT201222.
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----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=rtPl
-----END PGP SIGNATURE-----
. Summary:
An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 8.
Red Hat Product Security has rated this update as having a security impact
of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which
gives a detailed severity rating, is available for each vulnerability from
the CVE link(s) in the References section.
2. Relevant releases/architectures:
Red Hat Enterprise Linux AppStream (v. 8) - aarch64, ppc64le, s390x, x86_64
3. Description:
WebKitGTK is the port of the portable web rendering engine WebKit to the
GTK platform.
The following packages have been upgraded to a later upstream version:
webkit2gtk3 (2.34.6).
Additional Changes:
For detailed information on changes in this release, see the Red Hat
Enterprise Linux 8.6 Release Notes linked from the References section.
4. Solution:
For details on how to apply this update, which includes the changes
described in this advisory, refer to:
https://access.redhat.com/articles/11258
5. Package List:
Red Hat Enterprise Linux AppStream (v. 8):
Source:
webkit2gtk3-2.34.6-1.el8.src.rpm
aarch64:
webkit2gtk3-2.34.6-1.el8.aarch64.rpm
webkit2gtk3-debuginfo-2.34.6-1.el8.aarch64.rpm
webkit2gtk3-debugsource-2.34.6-1.el8.aarch64.rpm
webkit2gtk3-devel-2.34.6-1.el8.aarch64.rpm
webkit2gtk3-devel-debuginfo-2.34.6-1.el8.aarch64.rpm
webkit2gtk3-jsc-2.34.6-1.el8.aarch64.rpm
webkit2gtk3-jsc-debuginfo-2.34.6-1.el8.aarch64.rpm
webkit2gtk3-jsc-devel-2.34.6-1.el8.aarch64.rpm
webkit2gtk3-jsc-devel-debuginfo-2.34.6-1.el8.aarch64.rpm
ppc64le:
webkit2gtk3-2.34.6-1.el8.ppc64le.rpm
webkit2gtk3-debuginfo-2.34.6-1.el8.ppc64le.rpm
webkit2gtk3-debugsource-2.34.6-1.el8.ppc64le.rpm
webkit2gtk3-devel-2.34.6-1.el8.ppc64le.rpm
webkit2gtk3-devel-debuginfo-2.34.6-1.el8.ppc64le.rpm
webkit2gtk3-jsc-2.34.6-1.el8.ppc64le.rpm
webkit2gtk3-jsc-debuginfo-2.34.6-1.el8.ppc64le.rpm
webkit2gtk3-jsc-devel-2.34.6-1.el8.ppc64le.rpm
webkit2gtk3-jsc-devel-debuginfo-2.34.6-1.el8.ppc64le.rpm
s390x:
webkit2gtk3-2.34.6-1.el8.s390x.rpm
webkit2gtk3-debuginfo-2.34.6-1.el8.s390x.rpm
webkit2gtk3-debugsource-2.34.6-1.el8.s390x.rpm
webkit2gtk3-devel-2.34.6-1.el8.s390x.rpm
webkit2gtk3-devel-debuginfo-2.34.6-1.el8.s390x.rpm
webkit2gtk3-jsc-2.34.6-1.el8.s390x.rpm
webkit2gtk3-jsc-debuginfo-2.34.6-1.el8.s390x.rpm
webkit2gtk3-jsc-devel-2.34.6-1.el8.s390x.rpm
webkit2gtk3-jsc-devel-debuginfo-2.34.6-1.el8.s390x.rpm
x86_64:
webkit2gtk3-2.34.6-1.el8.i686.rpm
webkit2gtk3-2.34.6-1.el8.x86_64.rpm
webkit2gtk3-debuginfo-2.34.6-1.el8.i686.rpm
webkit2gtk3-debuginfo-2.34.6-1.el8.x86_64.rpm
webkit2gtk3-debugsource-2.34.6-1.el8.i686.rpm
webkit2gtk3-debugsource-2.34.6-1.el8.x86_64.rpm
webkit2gtk3-devel-2.34.6-1.el8.i686.rpm
webkit2gtk3-devel-2.34.6-1.el8.x86_64.rpm
webkit2gtk3-devel-debuginfo-2.34.6-1.el8.i686.rpm
webkit2gtk3-devel-debuginfo-2.34.6-1.el8.x86_64.rpm
webkit2gtk3-jsc-2.34.6-1.el8.i686.rpm
webkit2gtk3-jsc-2.34.6-1.el8.x86_64.rpm
webkit2gtk3-jsc-debuginfo-2.34.6-1.el8.i686.rpm
webkit2gtk3-jsc-debuginfo-2.34.6-1.el8.x86_64.rpm
webkit2gtk3-jsc-devel-2.34.6-1.el8.i686.rpm
webkit2gtk3-jsc-devel-2.34.6-1.el8.x86_64.rpm
webkit2gtk3-jsc-devel-debuginfo-2.34.6-1.el8.i686.rpm
webkit2gtk3-jsc-devel-debuginfo-2.34.6-1.el8.x86_64.rpm
These packages are GPG signed by Red Hat for security. Our key and
details on how to verify the signature are available from
https://access.redhat.com/security/team/key/
7. References:
https://access.redhat.com/security/cve/CVE-2021-30809
https://access.redhat.com/security/cve/CVE-2021-30818
https://access.redhat.com/security/cve/CVE-2021-30823
https://access.redhat.com/security/cve/CVE-2021-30836
https://access.redhat.com/security/cve/CVE-2021-30846
https://access.redhat.com/security/cve/CVE-2021-30848
https://access.redhat.com/security/cve/CVE-2021-30849
https://access.redhat.com/security/cve/CVE-2021-30851
https://access.redhat.com/security/cve/CVE-2021-30884
https://access.redhat.com/security/cve/CVE-2021-30887
https://access.redhat.com/security/cve/CVE-2021-30888
https://access.redhat.com/security/cve/CVE-2021-30889
https://access.redhat.com/security/cve/CVE-2021-30890
https://access.redhat.com/security/cve/CVE-2021-30897
https://access.redhat.com/security/cve/CVE-2021-30934
https://access.redhat.com/security/cve/CVE-2021-30936
https://access.redhat.com/security/cve/CVE-2021-30951
https://access.redhat.com/security/cve/CVE-2021-30952
https://access.redhat.com/security/cve/CVE-2021-30953
https://access.redhat.com/security/cve/CVE-2021-30954
https://access.redhat.com/security/cve/CVE-2021-30984
https://access.redhat.com/security/cve/CVE-2021-45481
https://access.redhat.com/security/cve/CVE-2021-45482
https://access.redhat.com/security/cve/CVE-2021-45483
https://access.redhat.com/security/cve/CVE-2022-22589
https://access.redhat.com/security/cve/CVE-2022-22590
https://access.redhat.com/security/cve/CVE-2022-22592
https://access.redhat.com/security/cve/CVE-2022-22594
https://access.redhat.com/security/cve/CVE-2022-22620
https://access.redhat.com/security/cve/CVE-2022-22637
https://access.redhat.com/security/updates/classification/#moderate
https://access.redhat.com/documentation/en-us/red_hat_enterprise_linux/8/html/8.6_release_notes/
8. Contact:
The Red Hat security contact is <secalert@redhat.com>. More contact
details at https://access.redhat.com/security/team/contact/
Copyright 2022 Red Hat, Inc.
For the stable distribution (bullseye), these problems have been fixed in
version 2.34.6-1~deb11u1.
We recommend that you upgrade your wpewebkit packages.
Installation note:
Instructions on how to update your Apple Watch software are
available at https://support.apple.com/kb/HT204641
To check the version on your Apple Watch, open the Apple Watch app
on your iPhone and select "My Watch > General > About".
Alternatively, on your watch, select "My Watch > General > About"
| VAR-202201-0440 | CVE-2022-22585 | plural Apple Product Link Interpretation Vulnerability |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
An issue existed within the path validation logic for symlinks. This issue was addressed with improved path sanitization. This issue is fixed in iOS 15.3 and iPadOS 15.3, watchOS 8.4, tvOS 15.3, macOS Monterey 12.2, macOS Big Sur 11.6.3. An application may be able to access a user's files. plural Apple The product contains a link interpretation vulnerability.Information may be obtained.
Alternatively, on your watch, select "My Watch > General > About".
CVE-2022-22591: Antonio Zekic (@antoniozekic) of Diverto
IOMobileFrameBuffer
Available for: macOS Monterey
Impact: A malicious application may be able to execute arbitrary code
with kernel privileges.
PackageKit
We would like to acknowledge Mickey Jin (@patch1t), Mickey Jin
(@patch1t) of Trend Micro for their assistance. -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
APPLE-SA-2022-01-26-1 iOS 15.3 and iPadOS 15.3
iOS 15.3 and iPadOS 15.3 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/HT213053.
ColorSync
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: Processing a maliciously crafted file may lead to arbitrary
code execution
Description: A memory corruption issue was addressed with improved
validation.
CVE-2022-22584: Mickey Jin (@patch1t) of Trend Micro
Crash Reporter
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: A malicious application may be able to gain root privileges
Description: A logic issue was addressed with improved validation.
CVE-2022-22578: an anonymous researcher
iCloud
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: An application may be able to access a user's files
Description: An issue existed within the path validation logic for
symlinks.
CVE-2022-22585: Zhipeng Huo (@R3dF09) of Tencent Security Xuanwu Lab
(https://xlab.tencent.com)
IOMobileFrameBuffer
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: A malicious application may be able to execute arbitrary code
with kernel privileges. Apple is aware of a report that this issue
may have been actively exploited.
CVE-2022-22587: an anonymous researcher, Meysam Firouzi (@R00tkitSMM)
of MBition - Mercedes-Benz Innovation Lab, Siddharth Aeri
(@b1n4r1b01)
Kernel
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: A malicious application may be able to execute arbitrary code
with kernel privileges
Description: A buffer overflow issue was addressed with improved
memory handling.
CVE-2022-22593: Peter Nguyễn Vũ Hoàng of STAR Labs
Model I/O
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: Processing a maliciously crafted STL file may lead to
unexpected application termination or arbitrary code execution
Description: An information disclosure issue was addressed with
improved state management.
CVE-2022-22579: Mickey Jin (@patch1t) of Trend Micro
WebKit
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: Processing a maliciously crafted mail message may lead to
running arbitrary javascript
Description: A validation issue was addressed with improved input
sanitization.
CVE-2022-22589: Heige of KnownSec 404 Team (knownsec.com) and Bo Qu
of Palo Alto Networks (paloaltonetworks.com)
WebKit
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution
Description: A use after free issue was addressed with improved
memory management.
CVE-2022-22590: Toan Pham from Team Orca of Sea Security
(security.sea.com)
WebKit
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: Processing maliciously crafted web content may prevent
Content Security Policy from being enforced
Description: A logic issue was addressed with improved state
management.
CVE-2022-22592: Prakash (@1lastBr3ath)
WebKit Storage
Available for: iPhone 6s and later, iPad Pro (all models), iPad Air 2
and later, iPad 5th generation and later, iPad mini 4 and later, and
iPod touch (7th generation)
Impact: A website may be able to track sensitive user information
Description: A cross-origin issue in the IndexDB API was addressed
with improved input validation.
CVE-2022-22594: Martin Bajanik of FingerprintJS
Additional recognition
WebKit
We would like to acknowledge Prakash (@1lastBr3ath) for their
assistance.
Installation note:
This update is available through iTunes and Software Update on your
iOS device, and will not appear in your computer's Software Update
application, or in the Apple Downloads site. Make sure you have an
Internet connection and have installed the latest version of iTunes
from https://www.apple.com/itunes/
iTunes and Software Update on the device will automatically check
Apple's update server on its weekly schedule. When an update is
detected, it is downloaded and the option to be installed is
presented to the user when the iOS device is docked. We recommend
applying the update immediately if possible. Selecting Don't Install
will present the option the next time you connect your iOS device.
The automatic update process may take up to a week depending on the
day that iTunes or the device checks for updates. You may manually
obtain the update via the Check for Updates button within iTunes, or
the Software Update on your device.
To check that the iPhone, iPod touch, or iPad has been updated:
* Navigate to Settings
* Select General
* Select About
* The version after applying this update will be “15.3"
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----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=JRMz
-----END PGP SIGNATURE-----
| VAR-202201-0798 | CVE-2021-44366 | Reolink Rlc-410W Denial of Service Vulnerability (CNVD-2022-37378) |
CVSS V2: 5.0 CVSS V3: 7.5 Severity: HIGH |
Multiple denial of service vulnerabilities exist in the cgiserver.cgi JSON command parser functionality of Reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. An attacker can send an HTTP request to trigger this vulnerability. Reolink Rlc-410W is a Wifi security camera from China Reolink company
| VAR-202201-0847 | CVE-2021-44384 | reolink RLC-410W Input verification vulnerability in |
CVSS V2: 6.8 CVSS V3: 7.7 Severity: HIGH |
A denial of service vulnerability exists in the cgiserver.cgi JSON command parser functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. SetPtzTattern param is not object. An attacker can send an HTTP request to trigger this vulnerability. reolink RLC-410W There is an input validation vulnerability in.Service operation interruption (DoS) It may be in a state. Reolink Rlc-410W is a Wifi security camera from China Reolink company
| VAR-202201-0457 | CVE-2022-22591 | macOS Monterey Out-of-bounds write vulnerability in |
CVSS V2: 9.3 CVSS V3: 7.8 Severity: HIGH |
A memory corruption issue was addressed with improved memory handling. This issue is fixed in macOS Monterey 12.2. A malicious application may be able to execute arbitrary code with kernel privileges. macOS Monterey Exists in an out-of-bounds write vulnerability.Information is obtained, information is tampered with, and service operation is interrupted. (DoS) It may be in a state.
Information about the security content is also available at
https://support.apple.com/HT213054.
CVE-2022-22586: an anonymous researcher
ColorSync
Available for: macOS Monterey
Impact: Processing a maliciously crafted file may lead to arbitrary
code execution
Description: A memory corruption issue was addressed with improved
validation.
CVE-2022-22584: Mickey Jin (@patch1t) of Trend Micro
Crash Reporter
Available for: macOS Monterey
Impact: A malicious application may be able to gain root privileges
Description: A logic issue was addressed with improved validation.
CVE-2022-22578: an anonymous researcher
iCloud
Available for: macOS Monterey
Impact: An application may be able to access a user's files
Description: An issue existed within the path validation logic for
symlinks.
CVE-2022-22585: Zhipeng Huo (@R3dF09) of Tencent Security Xuanwu Lab
(https://xlab.tencent.com)
Intel Graphics Driver
Available for: macOS Monterey
Impact: A malicious application may be able to execute arbitrary code
with kernel privileges
Description: A memory corruption issue was addressed with improved
memory handling. Apple is aware of a report that this issue
may have been actively exploited.
CVE-2022-22593: Peter Nguyễn Vũ Hoàng of STAR Labs
Model I/O
Available for: macOS Monterey
Impact: Processing a maliciously crafted STL file may lead to
unexpected application termination or arbitrary code execution
Description: An information disclosure issue was addressed with
improved state management.
CVE-2022-22579: Mickey Jin (@patch1t) of Trend Micro
PackageKit
Available for: macOS Monterey
Impact: An application may be able to access restricted files
Description: A permissions issue was addressed with improved
validation.
CVE-2022-22583: an anonymous researcher, Mickey Jin (@patch1t), Ron
Hass (@ronhass7) of Perception Point
WebKit
Available for: macOS Monterey
Impact: Processing a maliciously crafted mail message may lead to
running arbitrary javascript
Description: A validation issue was addressed with improved input
sanitization.
CVE-2022-22589: Heige of KnownSec 404 Team (knownsec.com) and Bo Qu
of Palo Alto Networks (paloaltonetworks.com)
WebKit
Available for: macOS Monterey
Impact: Processing maliciously crafted web content may lead to
arbitrary code execution
Description: A use after free issue was addressed with improved
memory management.
CVE-2022-22590: Toan Pham from Team Orca of Sea Security
(security.sea.com)
WebKit
Available for: macOS Monterey
Impact: Processing maliciously crafted web content may prevent
Content Security Policy from being enforced
Description: A logic issue was addressed with improved state
management.
CVE-2022-22592: Prakash (@1lastBr3ath)
WebKit Storage
Available for: macOS Monterey
Impact: A website may be able to track sensitive user information
Description: A cross-origin issue in the IndexDB API was addressed
with improved input validation.
CVE-2022-22594: Martin Bajanik of FingerprintJS
Additional recognition
Kernel
We would like to acknowledge Tao Huang for their assistance.
Metal
We would like to acknowledge Tao Huang for their assistance.
PackageKit
We would like to acknowledge Mickey Jin (@patch1t), Mickey Jin
(@patch1t) of Trend Micro for their assistance.
WebKit
We would like to acknowledge Prakash (@1lastBr3ath) for their
assistance.
Installation note:
This update may be obtained from the Mac App Store
Information will also be posted to the Apple Security Updates
web site: https://support.apple.com/kb/HT201222
This message is signed with Apple's Product Security PGP key,
and details are available at:
https://www.apple.com/support/security/pgp/
-----BEGIN PGP SIGNATURE-----
iQIzBAEBCAAdFiEEePiLW1MrMjw19XzoeC9qKD1prhgFAmHx0zEACgkQeC9qKD1p
rhhFUw/+K0ImMkw8zCjqdJza05Y6mlSa2wAdoVQK4pywYylcWMzemOi9GStr1Tgq
CmA7KFo2hPp/9kh6+SURi91WwUKdNHsDfasjNDqTTOJalQFuKB0erZgEpcprBnHE
lzT2heSJDl58sMSn0hLlGIhLfc+4Ld29FKc3lmtBPGeKY3vUViHLN0s3sZj07twx
Ew7yYkDBkz/e2kGRDByWzmvsSQt+w7HMK+pN1m5CBTZdP8KAHVtbuv8BPtMHKwNJ
1Kzo6nW4MJ9Eds63Lz4A37nqTNxmvsbf4zDSppwAp8NalEHqg5My7PzmK97eh6ap
jS4P4LqdRigTvRMq3eDVh/4Lie+/39nXwdQI6czETvTYzi+iA6k3q1Lsf2eIYzCf
0y4YTKEwIze05Q45YqbbnRDfVGOKtfZOcFVYsMxYBHBMp6LDcLJ9i0+AORX2igoA
dODLICbrHzexa682FDE2RGtgQOtS5k4LJLUggvSeOW/tXN+MovfVTjCIzJSKYltP
eQm8gq3EajaRk4JQcYkxklalyOHVZpkg3+u6Az+xIY5nVVijkuGDqqiCoh62zmsE
kSXZrfuJTIYWbIzpR23xVMyxWBcN4AXDE3xLeZajm0yGnAxpd8CGwb4FhgipcDVE
wwazu76IYBPpP40AyBALO10aXhYjrI+Bj6zI+Ug3msXLhkeICtI=
=WEmw
-----END PGP SIGNATURE-----
| VAR-202201-0807 | CVE-2021-44404 | reolink RLC-410W Input verification vulnerability in |
CVSS V2: 6.8 CVSS V3: 7.7 Severity: HIGH |
A denial of service vulnerability exists in the cgiserver.cgi JSON command parser functionality of reolink RLC-410W v3.0.0.136_20121102. A specially-crafted HTTP request can lead to a reboot. GetZoomFocus param is not object. An attacker can send an HTTP request to trigger this vulnerability. reolink RLC-410W There is an input validation vulnerability in.Service operation interruption (DoS) It may be in a state. Reolink Rlc-410W is a Wifi security camera from China Reolink company