ALT-BU-2022-4047-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2014-8242
librsync before 1.0.0 uses a truncated MD4 checksum to match blocks, which makes it easier for remote attackers to modify transmitted data via a birthday attack.
- FEDORA-2015-2923
- FEDORA-2015-2923
- FEDORA-2015-3366
- FEDORA-2015-3366
- FEDORA-2015-3497
- FEDORA-2015-3497
- openSUSE-SU-2015:1752
- openSUSE-SU-2015:1752
- [oss-security] 20140728 rsync vulnerable to collisions
- [oss-security] 20140728 rsync vulnerable to collisions
- [oss-security] 20140805 [CVE Requests] rsync and librsync collisions
- [oss-security] 20140805 [CVE Requests] rsync and librsync collisions
- [oss-security] 20141012 Re: [CVE Requests] rsync and librsync collisions
- [oss-security] 20141012 Re: [CVE Requests] rsync and librsync collisions
- https://bugzilla.redhat.com/show_bug.cgi?id=1126712
- https://bugzilla.redhat.com/show_bug.cgi?id=1126712
- https://github.com/librsync/librsync/issues/5
- https://github.com/librsync/librsync/issues/5
- https://github.com/librsync/librsync/releases/tag/v1.0.0
- https://github.com/librsync/librsync/releases/tag/v1.0.0
- GLSA-201605-04
- GLSA-201605-04
- https://www.miknet.net/security/optimizing-birthday-attack/
- https://www.miknet.net/security/optimizing-birthday-attack/
Closed bugs
Просьба обновить librsync до последней версии
Package mkvtoolnix updated to version 65.0.0-alt2 for branch sisyphus in task 295470.
Closed bugs
mkvtoolnix-gui doesn't contain/detect mkvmerge and can't work without it
Package make-initrd updated to version 2.25.0-alt2 for branch sisyphus in task 295478.
Closed bugs
Падает на процессоре Intel 12-го поколения
Package plasma5-workspace updated to version 5.23.5-alt4 for branch sisyphus in task 295476.
Closed bugs
Не запускаются приложения из "Последние приложения"
Package kf5-kguiaddons updated to version 5.90.0-alt2 for branch sisyphus in task 295486.
Closed bugs
Не отрабатывает последняя клавиша вида CTRL + E, F в хоткеях из "Комбинации клавиш" для виджетов
Package kernel-image-centos updated to version 5.14.0.61-alt1.el9 for branch sisyphus in task 295488.
Closed vulnerabilities
BDU:2022-02367
Уязвимость ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии
BDU:2022-03402
Уязвимость функции sock_getsockopt() ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05010
Уязвимость подсистемы eBPF ядра операционной системы Linux, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2024-11-21
CVE-2021-4197
An unprivileged write to the file handler flaw in the Linux kernel's control groups and namespaces subsystem was found in the way users have access to some less privileged process that are controlled by cgroups and have higher privileged parent process. It is actually both for cgroup2 and cgroup1 versions of control groups. A local user could use this flaw to crash the system or escalate their privileges on the system.
- https://bugzilla.redhat.com/show_bug.cgi?id=2035652
- https://bugzilla.redhat.com/show_bug.cgi?id=2035652
- https://lore.kernel.org/lkml/20211209214707.805617-1-tj%40kernel.org/T/
- https://lore.kernel.org/lkml/20211209214707.805617-1-tj%40kernel.org/T/
- https://security.netapp.com/advisory/ntap-20220602-0006/
- https://security.netapp.com/advisory/ntap-20220602-0006/
- DSA-5127
- DSA-5127
- DSA-5173
- DSA-5173
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
Modified: 2024-11-21
CVE-2021-4203
A use-after-free read flaw was found in sock_getsockopt() in net/core/sock.c due to SO_PEERCRED and SO_PEERGROUPS race with listen() (and connect()) in the Linux kernel. In this flaw, an attacker with a user privileges may crash the system or leak internal kernel information.
- https://bugs.chromium.org/p/project-zero/issues/detail?id=2230&can=7&q=modified-after%3Atoday-30&sort=-modified&colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve&cells=tiles&redir=1
- https://bugs.chromium.org/p/project-zero/issues/detail?id=2230&can=7&q=modified-after%3Atoday-30&sort=-modified&colspec=ID%20Type%20Status%20Priority%20Milestone%20Owner%20Summary%20Modified%20Cve&cells=tiles&redir=1
- https://bugzilla.redhat.com/show_bug.cgi?id=2036934
- https://bugzilla.redhat.com/show_bug.cgi?id=2036934
- https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814
- https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net.git/commit/?id=35306eb23814
- https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet%40gmail.com/T/
- https://lore.kernel.org/netdev/20210929225750.2548112-1-eric.dumazet%40gmail.com/T/
- https://security.netapp.com/advisory/ntap-20221111-0003/
- https://security.netapp.com/advisory/ntap-20221111-0003/
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
Modified: 2024-11-21
CVE-2022-0264
A vulnerability was found in the Linux kernel's eBPF verifier when handling internal data structures. Internal memory locations could be returned to userspace. A local attacker with the permissions to insert eBPF code to the kernel can use this to leak internal kernel memory details defeating some of the exploit mitigations in place for the kernel. This flaws affects kernel versions < v5.16-rc6
Package plasma5-desktop updated to version 5.23.5-alt5 for branch sisyphus in task 295483.
Closed bugs
Исчезают все значки с рабочего стола после удаления комнаты
Closed vulnerabilities
BDU:2022-00946
Уязвимость компонента GPU браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2022-00947
Уязвимость набора библиотек времени выполнения Mojo браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2022-00955
Уязвимость компонента Gamepad API браузера Google Chrome, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации
BDU:2022-00966
Уязвимость компонента Tab Groups браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2022-00967
Уязвимость компонента File Manager браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2022-00968
Уязвимость компонента Webstore API браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2022-00969
Уязвимость библиотеки ANGLE браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2022-0603
Use after free in File Manager in Google Chrome on Chrome OS prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Modified: 2024-11-21
CVE-2022-0604
Heap buffer overflow in Tab Groups in Google Chrome prior to 98.0.4758.102 allowed an attacker who convinced a user to install a malicious extension and engage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.
Modified: 2024-11-21
CVE-2022-0605
Use after free in Webstore API in Google Chrome prior to 98.0.4758.102 allowed an attacker who convinced a user to install a malicious extension and convinced a user to enage in specific user interaction to potentially exploit heap corruption via a crafted HTML page.
Modified: 2024-11-21
CVE-2022-0606
Use after free in ANGLE in Google Chrome prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Modified: 2024-11-21
CVE-2022-0607
Use after free in GPU in Google Chrome prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Modified: 2024-11-21
CVE-2022-0608
Integer overflow in Mojo in Google Chrome prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Modified: 2025-02-05
CVE-2022-0609
Use after free in Animation in Google Chrome prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Modified: 2024-11-21
CVE-2022-0610
Inappropriate implementation in Gamepad API in Google Chrome prior to 98.0.4758.102 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page.
Closed bugs
Запрос на обновление до версии 98.0.4758.102 в связи c несколькими CVE
Closed vulnerabilities
BDU:2019-00952
Уязвимость библиотеки libzmq системы обмена сообщениями ZeroMQ, позволяющая нарушителю выполнить произвольный код
BDU:2019-03566
Уязвимость библиотеки libzmq библиотеки асинхронных сообщений ZeroMQ, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю оказать воздействие на целостность данных, получить несанкционированный доступ к защищаемой информации, а также вызвать отказ в обслуживании
BDU:2019-03576
Уязвимость библиотеки libzmq библиотеки асинхронных сообщений ZeroMQ, позволяющая нарушителю оказать воздействие на целостность данных, получить несанкционированный доступ к защищаемой информации, а также вызвать отказ в обслуживании
BDU:2021-03549
Уязвимость множества компонентов системы обмена сообщениями ZeroMQ, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03710
Уязвимость библиотеки для обмена сообщениями ZeroMQ, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03711
Уязвимость библиотеки для обмена сообщениями ZeroMQ, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-13132
In ZeroMQ libzmq before 4.0.9, 4.1.x before 4.1.7, and 4.2.x before 4.3.2, a remote, unauthenticated client connecting to a libzmq application, running with a socket listening with CURVE encryption/authentication enabled, may cause a stack overflow and overwrite the stack with arbitrary data, due to a buffer overflow in the library. Users running public servers with the above configuration are highly encouraged to upgrade as soon as possible, as there are no known mitigations.
- openSUSE-SU-2019:1767
- openSUSE-SU-2019:1767
- [oss-security] 20190708 CVE-2019-13132: zeromq/libzmq: denial of service via stack overflow with arbitrary data
- [oss-security] 20190708 CVE-2019-13132: zeromq/libzmq: denial of service via stack overflow with arbitrary data
- 109284
- 109284
- https://fangpenlin.com/posts/2024/04/07/how-i-discovered-a-9-point-8-critical-security-vulnerability-in-zeromq-with-mostly-pure-luck/
- https://fangpenlin.com/posts/2024/04/07/how-i-discovered-a-9-point-8-critical-security-vulnerability-in-zeromq-with-mostly-pure-luck/
- https://github.com/zeromq/libzmq/issues/3558
- https://github.com/zeromq/libzmq/issues/3558
- https://github.com/zeromq/libzmq/releases
- https://github.com/zeromq/libzmq/releases
- [debian-lts-announce] 20190708 [SECURITY] [DLA 1849-1] zeromq3 security update
- [debian-lts-announce] 20190708 [SECURITY] [DLA 1849-1] zeromq3 security update
- FEDORA-2019-d20ce4d5a1
- FEDORA-2019-d20ce4d5a1
- FEDORA-2019-4d8f9a9235
- FEDORA-2019-4d8f9a9235
- FEDORA-2019-8916b4e890
- FEDORA-2019-8916b4e890
- https://news.ycombinator.com/item?id=39970716
- https://news.ycombinator.com/item?id=39970716
- 20190709 [SECURITY] [DSA 4477-1] zeromq3 security update
- 20190709 [SECURITY] [DSA 4477-1] zeromq3 security update
- GLSA-201908-17
- GLSA-201908-17
- USN-4050-1
- USN-4050-1
- DSA-4477
- DSA-4477
Modified: 2024-11-21
CVE-2019-6250
A pointer overflow, with code execution, was discovered in ZeroMQ libzmq (aka 0MQ) 4.2.x and 4.3.x before 4.3.1. A v2_decoder.cpp zmq::v2_decoder_t::size_ready integer overflow allows an authenticated attacker to overwrite an arbitrary amount of bytes beyond the bounds of a buffer, which can be leveraged to run arbitrary code on the target system. The memory layout allows the attacker to inject OS commands into a data structure located immediately after the problematic buffer (i.e., it is not necessary to use a typical buffer-overflow exploitation technique that changes the flow of control).
Modified: 2024-11-21
CVE-2020-15166
In ZeroMQ before version 4.3.3, there is a denial-of-service vulnerability. Users with TCP transport public endpoints, even with CURVE/ZAP enabled, are impacted. If a raw TCP socket is opened and connected to an endpoint that is fully configured with CURVE/ZAP, legitimate clients will not be able to exchange any message. Handshakes complete successfully, and messages are delivered to the library, but the server application never receives them. This is patched in version 4.3.3.
- https://github.com/zeromq/libzmq/pull/3913
- https://github.com/zeromq/libzmq/pull/3913
- https://github.com/zeromq/libzmq/pull/3973
- https://github.com/zeromq/libzmq/pull/3973
- https://github.com/zeromq/libzmq/security/advisories/GHSA-25wp-cf8g-938m
- https://github.com/zeromq/libzmq/security/advisories/GHSA-25wp-cf8g-938m
- [debian-lts-announce] 20201110 [SECURITY] [DLA 2443-1] zeromq3 security update
- [debian-lts-announce] 20201110 [SECURITY] [DLA 2443-1] zeromq3 security update
- FEDORA-2020-08402f4071
- FEDORA-2020-08402f4071
- FEDORA-2020-5460fcf6bd
- FEDORA-2020-5460fcf6bd
- GLSA-202009-12
- GLSA-202009-12
Modified: 2024-11-21
CVE-2021-20234
An uncontrolled resource consumption (memory leak) flaw was found in the ZeroMQ client in versions before 4.3.3 in src/pipe.cpp. This issue causes a client that connects to multiple malicious or compromised servers to crash. The highest threat from this vulnerability is to system availability.
Modified: 2024-11-21
CVE-2021-20235
There's a flaw in the zeromq server in versions before 4.3.3 in src/decoder_allocators.hpp. The decoder static allocator could have its sized changed, but the buffer would remain the same as it is a static buffer. A remote, unauthenticated attacker who sends a crafted request to the zeromq server could trigger a buffer overflow WRITE of arbitrary data if CURVE/ZAP authentication is not enabled. The greatest impact of this flaw is to application availability, data integrity, and confidentiality.
Modified: 2024-11-21
CVE-2021-20236
A flaw was found in the ZeroMQ server in versions before 4.3.3. This flaw allows a malicious client to cause a stack buffer overflow on the server by sending crafted topic subscription requests and then unsubscribing. The highest threat from this vulnerability is to confidentiality, integrity, as well as system availability.
Modified: 2024-11-21
CVE-2021-20237
An uncontrolled resource consumption (memory leak) flaw was found in ZeroMQ's src/xpub.cpp in versions before 4.3.3. This flaw allows a remote unauthenticated attacker to send crafted PUB messages that consume excessive memory if the CURVE/ZAP authentication is disabled on the server, causing a denial of service. The highest threat from this vulnerability is to system availability.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-24687
HashiCorp Consul and Consul Enterprise 1.9.0 through 1.9.14, 1.10.7, and 1.11.2 clusters with at least one Ingress Gateway allow a user with service:write to register a specifically-defined service that can cause Consul servers to panic. Fixed in 1.9.15, 1.10.8, and 1.11.3.
- https://discuss.hashicorp.com
- https://discuss.hashicorp.com
- https://discuss.hashicorp.com/t/hcsec-2022-05-consul-ingress-gateway-panic-can-shutdown-servers/
- https://discuss.hashicorp.com/t/hcsec-2022-05-consul-ingress-gateway-panic-can-shutdown-servers/
- GLSA-202208-09
- GLSA-202208-09
- https://security.netapp.com/advisory/ntap-20220331-0006/
- https://security.netapp.com/advisory/ntap-20220331-0006/