Mageia 2022-0422: nodejs security update
DNS rebinding in --inspect via invalid octal IP address (CVE-2022-43548) In addition, 14.21.0 has provided the following changes: deps update corepack to 0.14.2 (Node.js GitHub Bot) #44775 src
DNS rebinding in --inspect via invalid octal IP address (CVE-2022-43548) In addition, 14.21.0 has provided the following changes: deps update corepack to 0.14.2 (Node.js GitHub Bot) #44775 src
The updated packages fix a security vulnerability and other issues. References: - https://bugs.mageia.org/show_bug.cgi?id=31076 - https://webkitgtk.org/security/WSA-2022-0010.html
Affected is the function QuickTimeVideo::userDataDecoder of the file quicktimevideo.cpp of the component QuickTime Video Handler. The manipulation leads to integer overflow. It is possible to launch the attack remotely. (CVE-2022-3756)
The chromium-browser-stable package has been updated to the new 107 branch with the 107.0.5304.87 version, fixing many bugs and 15 vulnerabilities, together with 107.0.5304.68. Some of the security fixes are:
An internal reference count is held on the buffer pool, incremented every time a new buffer is created from the pool. The reference count is maintained as an int; on LP64 systems this can cause the reference count to overflow if the client creates a large number of wl_shm buffer objects, or if it can coerce the server to create a large number of external
An out-of-bounds read vulnerability was discovered in the PCRE2 library in the compile_xclass_matchingpath() function of the pcre2_jit_compile.c file. This involves a unicode property matching issue in JIT-compiled regular expressions. The issue occurs because the character was not fully read in case-less matching within JIT. (CVE-2022-1586)
This update provides ffmpeg version 4.3.5, which fixes several security vulnerabilities and other bugs which were corrected upstream. References: - https://bugs.mageia.org/show_bug.cgi?id=31067
An unauthenticated remote host could send an invalid ClientHello message in which the declared length of the cookie extends past the end of the message. A DTLS server with MBEDTLS_SSL_DTLS_CLIENT_PORT_REUSE enabled would read past the end of the message up to the declared length of the cookie. This could cause a buffer overread of up to 255 bytes on the heap in vulnerable DTLS
GNU Libtasn1 before 4.19.0 has an ETYPE_OK off-by-one array size check that affects asn1_encode_simple_der. (CVE-2021-46848) References: - https://bugs.mageia.org/show_bug.cgi?id=31039
A flaw was found In 389-ds-base. When the Content Synchronization plugin is enabled, an authenticated user can reach a NULL pointer dereference using a specially crafted query. This flaw allows an authenticated ttacker to cause a denial of service. This CVE is assigned against an incomplete fix of CVE-2021-3514. (CVE-2022-2850)
Integer overflows with XML_PARSE_HUGE. (CVE-2022-40303) Dict corruption caused by entity reference cycles. (CVE-2022-40304) References: - https://bugs.mageia.org/show_bug.cgi?id=31020
The updated packages add one additional fix for security vulnerabilities. See references for details. References: - https://bugs.mageia.org/show_bug.cgi?id=31018
There is a double free or corruption in rotateImage() at tiffcrop.c:8839 found in libtiff 4.4.0rc1. (CVE-2022-2519) A flaw was found in libtiff 4.4.0rc1. There is a sysmalloc assertion fail in rotateImage() at tiffcrop.c:8621 that can cause program crash when
In libexpat through 2.4.9, there is a use-after free caused by overeager destruction of a shared DTD in XML_ExternalEntityParserCreate in out-of-memory situations. (CVE-2022-43680) References:
NTFS-3G could be made to crash or run programs as an administrator if it mounted a specially crafted disk. (CVE-2022-40284) References: - https://bugs.mageia.org/show_bug.cgi?id=31056
Directory traversal vulnerability in wkhtmltopdf through 0.12.5 allows remote attackers to read local files and disclose sensitive information via a crafted html file running with the default configurations. (CVE-2020-21365)
GD - Fixed bug #81739: OOB read due to insufficient input validation in imageloadfont(). Hash - Fixed bug #81738: buffer overflow in hash_update() on long parameter. Session - Fixed bug GH-9583 (session_create_id() fails with user defined
When doing HTTP(S) transfers, libcurl might erroneously use the read callback (CURLOPT_READFUNCTION) to ask for data to send, even when the CURLOPT_POSTFIELDS option has been set, if the same handle previously was used to issue a PUT request which used that callback. (CVE-2022-32221)
Integer Overflow in LibKSBA. (CVE-2022-3515) References: - https://bugs.mageia.org/show_bug.cgi?id=30975 - https://www.gnupg.org/blog/20221017-pepe-left-the-ksba.html
It was discovered that nbd prior to 3.24 contained an integer overflow with a resultant heap-based buffer overflow. A value of 0xffffffff in the name length field will cause a zero-sized buffer to be allocated for the name resulting in a write to a dangling pointer (CVE-2022-26495).