ALT-BU-2021-3959-1
Branch c9f2 update bulletin.
Closed bugs
У systemd бывают униты не только .service
Closed vulnerabilities
BDU:2020-02039
Уязвимость системы инициализации Linux systemd, связанная с обращением к памяти после ее освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-00092
Уязвимость подсистемы инициализации и управления службами Linux systemd, связанная с недостатком механизма проверки вводимых данных, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-21029
systemd 239 through 245 accepts any certificate signed by a trusted certificate authority for DNS Over TLS. Server Name Indication (SNI) is not sent, and there is no hostname validation with the GnuTLS backend. NOTE: This has been disputed by the developer as not a vulnerability since hostname validation does not have anything to do with this issue (i.e. there is no hostname to be sent)
- https://blog.cloudflare.com/dns-encryption-explained/
- https://blog.cloudflare.com/dns-encryption-explained/
- https://github.com/systemd/systemd/blob/v239/man/resolved.conf.xml#L199-L207
- https://github.com/systemd/systemd/blob/v239/man/resolved.conf.xml#L199-L207
- https://github.com/systemd/systemd/blob/v243/man/resolved.conf.xml#L196-L207
- https://github.com/systemd/systemd/blob/v243/man/resolved.conf.xml#L196-L207
- https://github.com/systemd/systemd/blob/v243/src/resolve/resolved-dnstls-gnutls.c#L62-L63
- https://github.com/systemd/systemd/blob/v243/src/resolve/resolved-dnstls-gnutls.c#L62-L63
- https://github.com/systemd/systemd/issues/9397
- https://github.com/systemd/systemd/issues/9397
- https://github.com/systemd/systemd/pull/13870
- https://github.com/systemd/systemd/pull/13870
- FEDORA-2019-4c3ce3aa5c
- FEDORA-2019-4c3ce3aa5c
- https://security.netapp.com/advisory/ntap-20191122-0002/
- https://security.netapp.com/advisory/ntap-20191122-0002/
- https://tools.ietf.org/html/rfc7858#section-4.1
- https://tools.ietf.org/html/rfc7858#section-4.1
Modified: 2024-11-21
CVE-2020-13776
systemd through v245 mishandles numerical usernames such as ones composed of decimal digits or 0x followed by hex digits, as demonstrated by use of root privileges when privileges of the 0x0 user account were intended. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000082.
Modified: 2024-11-21
CVE-2020-1712
A heap use-after-free vulnerability was found in systemd before version v245-rc1, where asynchronous Polkit queries are performed while handling dbus messages. A local unprivileged attacker can abuse this flaw to crash systemd services or potentially execute code and elevate their privileges, by sending specially crafted dbus messages.
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1712
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2020-1712
- https://github.com/systemd/systemd/commit/1068447e6954dc6ce52f099ed174c442cb89ed54
- https://github.com/systemd/systemd/commit/1068447e6954dc6ce52f099ed174c442cb89ed54
- https://github.com/systemd/systemd/commit/637486261528e8aa3da9f26a4487dc254f4b7abb
- https://github.com/systemd/systemd/commit/637486261528e8aa3da9f26a4487dc254f4b7abb
- https://github.com/systemd/systemd/commit/bc130b6858327b382b07b3985cf48e2aa9016b2d
- https://github.com/systemd/systemd/commit/bc130b6858327b382b07b3985cf48e2aa9016b2d
- https://github.com/systemd/systemd/commit/ea0d0ede03c6f18dbc5036c5e9cccf97e415ccc2
- https://github.com/systemd/systemd/commit/ea0d0ede03c6f18dbc5036c5e9cccf97e415ccc2
- [debian-lts-announce] 20220630 [SECURITY] [DLA 3063-1] systemd security update
- [debian-lts-announce] 20220630 [SECURITY] [DLA 3063-1] systemd security update
- https://www.openwall.com/lists/oss-security/2020/02/05/1
- https://www.openwall.com/lists/oss-security/2020/02/05/1
Package xorg-server updated to version 1.20.8-alt8 for branch c9f2 in task 271013.
Closed vulnerabilities
BDU:2021-01784
Уязвимость компонента XkbSetDeviceInfo пакета xorg-x11-server, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2021-03541
Уязвимость функции XkbSetMap реализации сервера X Window System X.Org Server, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-03760
Уязвимость X.org сервера, связанная с целочисленной потерей значимости, позволяющая нарушителю получить доступ к конфиденциальной информации или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-14360
A flaw was found in the X.Org Server before version 1.20.10. An out-of-bounds access in the XkbSetMap function may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Modified: 2024-11-21
CVE-2020-25712
A flaw was found in xorg-x11-server before 1.20.10. A heap-buffer overflow in XkbSetDeviceInfo may lead to a privilege escalation vulnerability. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
Modified: 2024-11-21
CVE-2021-3472
A flaw was found in xorg-x11-server in versions before 1.20.11. An integer underflow can occur in xserver which can lead to a local privilege escalation. The highest threat from this vulnerability is to data confidentiality and integrity as well as system availability.
- [oss-security] 20210413 X.Org server security advisory: April 13, 2021
- [oss-security] 20210413 X.Org server security advisory: April 13, 2021
- https://bugzilla.redhat.com/show_bug.cgi?id=1944167
- https://bugzilla.redhat.com/show_bug.cgi?id=1944167
- https://gitlab.freedesktop.org/xorg/xserver/-/commit/7aaf54a1884f71dc363f0b884e57bcb67407a6cd
- https://gitlab.freedesktop.org/xorg/xserver/-/commit/7aaf54a1884f71dc363f0b884e57bcb67407a6cd
- [debian-lts-announce] 20210415 [SECURITY] [DLA 2627-1] xorg-server security update
- [debian-lts-announce] 20210415 [SECURITY] [DLA 2627-1] xorg-server security update
- FEDORA-2021-112d542766
- FEDORA-2021-112d542766
- FEDORA-2021-139f3fc21c
- FEDORA-2021-139f3fc21c
- FEDORA-2021-f7b4c97879
- FEDORA-2021-f7b4c97879
- FEDORA-2021-0e2981e013
- FEDORA-2021-0e2981e013
- https://lists.x.org/archives/xorg-announce/2021-April/003080.html
- https://lists.x.org/archives/xorg-announce/2021-April/003080.html
- https://lists.x.org/archives/xorg-announce/2021-April/003080.html
- https://lists.x.org/archives/xorg-announce/2021-April/003080.html
- https://seclists.org/oss-sec/2021/q2/20
- https://seclists.org/oss-sec/2021/q2/20
- GLSA-202104-02
- GLSA-202104-02
- DSA-4893
- DSA-4893
- https://www.tenable.com/plugins/nessus/148701
- https://www.tenable.com/plugins/nessus/148701
- https://www.zerodayinitiative.com/advisories/ZDI-21-463/
- https://www.zerodayinitiative.com/advisories/ZDI-21-463/
Closed bugs
С Mesa-21.0.0 сломан запуск многих игр под wine