ALT-BU-2022-4388-2
Branch sisyphus update bulletin.
Package kernel-image-un-def updated to version 5.16.17-alt1 for branch sisyphus in task 297041.
Closed bugs
Добавить поддержку звукового чипа ES8336
Включение параметра CONFIG_BT_HCIBTUSB_MTK
Closed bugs
Удаляет chromium-gost
Closed vulnerabilities
BDU:2022-06088
Уязвимость TPM эмулятора swtpm, связанная с чтением за границами буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2022-23645
swtpm is a libtpms-based TPM emulator with socket, character device, and Linux CUSE interface. Versions prior to 0.5.3, 0.6.2, and 0.7.1 are vulnerable to out-of-bounds read. A specially crafted header of swtpm's state, where the blobheader's hdrsize indicator has an invalid value, may cause an out-of-bounds access when the byte array representing the state of the TPM is accessed. This will likely crash swtpm or prevent it from starting since the state cannot be understood. Users should upgrade to swtpm v0.5.3, v0.6.2, or v0.7.1 to receive a patch. There are currently no known workarounds.
- https://github.com/stefanberger/swtpm/commit/9f740868fc36761de27df3935513bdebf8852d19
- https://github.com/stefanberger/swtpm/commit/9f740868fc36761de27df3935513bdebf8852d19
- https://github.com/stefanberger/swtpm/releases/tag/v0.5.3
- https://github.com/stefanberger/swtpm/releases/tag/v0.5.3
- https://github.com/stefanberger/swtpm/releases/tag/v0.6.2
- https://github.com/stefanberger/swtpm/releases/tag/v0.6.2
- https://github.com/stefanberger/swtpm/releases/tag/v0.7.1
- https://github.com/stefanberger/swtpm/releases/tag/v0.7.1
- https://github.com/stefanberger/swtpm/security/advisories/GHSA-2qgm-8xf4-3hqw
- https://github.com/stefanberger/swtpm/security/advisories/GHSA-2qgm-8xf4-3hqw
- FEDORA-2022-12443a525c
- FEDORA-2022-12443a525c
Package python3-module-zmq updated to version 22.3.0-alt4 for branch sisyphus in task 297111.
Closed bugs
python3-module-zmq-22.3.0-alt3 сломал пересборку примерно десятка пакетов на python3
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-27650
A flaw was found in crun where containers were incorrectly started with non-empty default permissions. A vulnerability was found in Moby (Docker Engine) where containers were started incorrectly with non-empty inheritable Linux process capabilities. This flaw allows an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs.
- https://bugzilla.redhat.com/show_bug.cgi?id=2066845
- https://bugzilla.redhat.com/show_bug.cgi?id=2066845
- https://github.com/containers/crun/commit/1aeeed2e4fdeffb4875c0d0b439915894594c8c6
- https://github.com/containers/crun/commit/1aeeed2e4fdeffb4875c0d0b439915894594c8c6
- https://github.com/containers/crun/security/advisories/GHSA-wr4f-w546-m398
- https://github.com/containers/crun/security/advisories/GHSA-wr4f-w546-m398
- FEDORA-2022-10fd054d40
- FEDORA-2022-10fd054d40