Category Archives: Advisories

nginx-mainline-3520221019155610.f27b74a8

Read Time:1 Minute, 0 Second

FEDORA-MODULAR-2022-2454736cf7

Packages in this update:

nginx-mainline-3520221019155610.f27b74a8

Update description:

Security: processing of a specially crafted mp4 file by the ngx_http_mp4_module might cause a worker process crash, worker process memory disclosure, or might have potential other impact (CVE-2022-41741, CVE-2022-41742).

Feature: the “$proxy_protocol_tlv_…” variables.

Feature: TLS session tickets encryption keys are now automatically rotated when using shared memory in the “ssl_session_cache” directive.

Change: the logging level of the “bad record type” SSL errors has been lowered from “crit” to “info”. Thanks to Murilo Andrade.

Change: now when using shared memory in the “ssl_session_cache” directive the “could not allocate new session” errors are logged at the “warn” level instead of “alert” and not more often than once per second.

Bugfix: nginx/Windows could not be built with OpenSSL 3.0.x.

Bugfix: in logging of the PROXY protocol errors. Thanks to Sergey Brester.

Workaround: shared memory from the “ssl_session_cache” directive was spent on sessions using TLS session tickets when using TLSv1.3 with OpenSSL.

Workaround: timeout specified with the “ssl_session_timeout” directive did not work when using TLSv1.3 with OpenSSL or BoringSSL.

Read More

nginx-mainline-3620221019155610.5e5ad4a0

Read Time:1 Minute, 0 Second

FEDORA-MODULAR-2022-d2cc9c919c

Packages in this update:

nginx-mainline-3620221019155610.5e5ad4a0

Update description:

Security: processing of a specially crafted mp4 file by the ngx_http_mp4_module might cause a worker process crash, worker process memory disclosure, or might have potential other impact (CVE-2022-41741, CVE-2022-41742).

Feature: the “$proxy_protocol_tlv_…” variables.

Feature: TLS session tickets encryption keys are now automatically rotated when using shared memory in the “ssl_session_cache” directive.

Change: the logging level of the “bad record type” SSL errors has been lowered from “crit” to “info”. Thanks to Murilo Andrade.

Change: now when using shared memory in the “ssl_session_cache” directive the “could not allocate new session” errors are logged at the “warn” level instead of “alert” and not more often than once per second.

Bugfix: nginx/Windows could not be built with OpenSSL 3.0.x.

Bugfix: in logging of the PROXY protocol errors. Thanks to Sergey Brester.

Workaround: shared memory from the “ssl_session_cache” directive was spent on sessions using TLS session tickets when using TLSv1.3 with OpenSSL.

Workaround: timeout specified with the “ssl_session_timeout” directive did not work when using TLSv1.3 with OpenSSL or BoringSSL.

Read More

nginx-1.22.1-1.fc35

Read Time:15 Second

FEDORA-2022-97de53f202

Packages in this update:

nginx-1.22.1-1.fc35

Update description:

Security: processing of a specially crafted mp4 file by the
ngx_http_mp4_module might cause a worker process crash, worker
process memory disclosure, or might have potential other impact
(CVE-2022-41741, CVE-2022-41742).

Read More

nginx-1.22.1-1.fc37

Read Time:15 Second

FEDORA-2022-12721789aa

Packages in this update:

nginx-1.22.1-1.fc37

Update description:

Security: processing of a specially crafted mp4 file by the
ngx_http_mp4_module might cause a worker process crash, worker
process memory disclosure, or might have potential other impact
(CVE-2022-41741, CVE-2022-41742).

Read More

nginx-1.22.1-1.fc36

Read Time:15 Second

FEDORA-2022-b0f5bc2175

Packages in this update:

nginx-1.22.1-1.fc36

Update description:

Security: processing of a specially crafted mp4 file by the
ngx_http_mp4_module might cause a worker process crash, worker
process memory disclosure, or might have potential other impact
(CVE-2022-41741, CVE-2022-41742).

Read More

vim-9.0.803-1.fc37

Read Time:15 Second

FEDORA-2022-839fd408a5

Packages in this update:

vim-9.0.803-1.fc37

Update description:

patchlevel 803

The newest upstream commit

Security fixes for CVE-2022-3256, CVE-2022-3324, CVE-2022-3352, CVE-2022-3235, CVE-2022-3234, CVE-2022-3296, CVE-2022-3297, CVE-2022-3278.

Read More

USN-5694-1: LibreOffice vulnerabilities

Read Time:1 Minute, 6 Second

It was discovered that LibreOffice incorrectly handled links using the
Office URI Schemes. If a user were tricked into opening a specially
crafted document, a remote attacker could use this issue to execute
arbitrary scripts. (CVE-2022-3140)

Thomas Florian discovered that LibreOffice incorrectly handled crashes when
an encrypted document is open. If the document is recovered upon restarting
LibreOffice, subsequent saves of the document were unencrypted. This issue
only affected Ubuntu 18.04 LTS. (CVE-2020-12801)

Jens Müller discovered that LibreOffice incorrectly handled certain
documents containing forms. If a user were tricked into opening a specially
crafted document, a remote attacker could overwrite arbitrary files when
the form was submitted. This issue only affected Ubuntu 18.04 LTS.
(CVE-2020-12803)

It was discovered that LibreOffice incorrectly validated macro signatures.
If a user were tricked into opening a specially crafted document, a remote
attacker could possibly use this issue to execute arbitrary macros. This
issue only affected Ubuntu 18.04 LTS. (CVE-2022-26305)

It was discovered that Libreoffice incorrectly handled encrypting the
master key provided by the user for storing passwords for web connections.
A local attacker could possibly use this issue to obtain access to
passwords stored in the user’s configuration data. This issue only affected
Ubuntu 18.04 LTS. (CVE-2022-26306, CVE-2022-26307)

Read More