ALT-BU-2022-6099-1
Branch p10_e2k update bulletin.
Package propagator updated to version 20220418-alt1 for branch p10_e2k.
Closed bugs
propagator: не работает автоматическая загрузка по сети при наличии >= 2 интерфейсов
propagator: занудный ramdisk_size
udev: тупит при загрузке (init == propagator)
propagator: загрузка по http с нераспакованной ISO
propagator: load_ramdisk_fd: sloppy error handling
propagator: загрузка по http не всегда срабатывает
Package pcmanfm-qt updated to version 1.1.0-alt2 for branch p10_e2k.
Closed bugs
Не работает переход по ссылке из справки pcmanfm-qt
Closed vulnerabilities
BDU:2022-00710
Уязвимость функции mbedtls_ssl_set_session() реализация протоколов TLS и SSL Mbed TLS, связанная с ошибкой повторного освобождения памяти, позволяющая нарушителю выполнить произвольный код
BDU:2022-01625
Уязвимость функции mbedtls_pkcs12_derivation реализации протоколов TLS и SSL программного обеспечения Mbed TLS, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-43666
A Denial of Service vulnerability exists in mbed TLS 3.0.0 and earlier in the mbedtls_pkcs12_derivation function when an input password's length is 0.
Modified: 2024-11-21
CVE-2021-44732
Mbed TLS before 3.0.1 has a double free in certain out-of-memory conditions, as demonstrated by an mbedtls_ssl_set_session() failure.
- https://bugs.gentoo.org/829660
- https://bugs.gentoo.org/829660
- https://github.com/ARMmbed/mbedtls/releases
- https://github.com/ARMmbed/mbedtls/releases
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.12
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.12
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.28.0
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.28.0
- https://github.com/ARMmbed/mbedtls/releases/tag/v3.1.0
- https://github.com/ARMmbed/mbedtls/releases/tag/v3.1.0
- [debian-lts-announce] 20221225 [SECURITY] [DLA 3249-1] mbedtls security update
- [debian-lts-announce] 20221225 [SECURITY] [DLA 3249-1] mbedtls security update
- https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2021-12
- https://tls.mbed.org/tech-updates/security-advisories/mbedtls-security-advisory-2021-12
Modified: 2024-11-21
CVE-2021-45450
In Mbed TLS before 2.28.0 and 3.x before 3.1.0, psa_cipher_generate_iv and psa_cipher_encrypt allow policy bypass or oracle-based decryption when the output buffer is at memory locations accessible to an untrusted application.
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.28.0
- https://github.com/ARMmbed/mbedtls/releases/tag/v2.28.0
- https://github.com/ARMmbed/mbedtls/releases/tag/v3.1.0
- https://github.com/ARMmbed/mbedtls/releases/tag/v3.1.0
- FEDORA-2022-1dd9dc5140
- FEDORA-2022-1dd9dc5140
- FEDORA-2022-ff582c5b0d
- FEDORA-2022-ff582c5b0d
- GLSA-202301-08
- GLSA-202301-08
Modified: 2024-11-21
CVE-2021-45451
In Mbed TLS before 3.1.0, psa_aead_generate_nonce allows policy bypass or oracle-based decryption when the output buffer is at memory locations accessible to an untrusted application.
Modified: 2024-11-21
CVE-2022-35409
An issue was discovered in Mbed TLS before 2.28.1 and 3.x before 3.2.0. In some configurations, an unauthenticated attacker can send an invalid ClientHello message to a DTLS server that causes a heap-based buffer over-read of up to 255 bytes. This can cause a server crash or possibly information disclosure based on error responses. Affected configurations have MBEDTLS_SSL_DTLS_CLIENT_PORT_REUSE enabled and MBEDTLS_SSL_IN_CONTENT_LEN less than a threshold that depends on the configuration: 258 bytes if using mbedtls_ssl_cookie_check, and possibly up to 571 bytes with a custom cookie check function.
- https://github.com/Mbed-TLS/mbedtls/releases
- https://github.com/Mbed-TLS/mbedtls/releases
- [debian-lts-announce] 20221225 [SECURITY] [DLA 3249-1] mbedtls security update
- [debian-lts-announce] 20221225 [SECURITY] [DLA 3249-1] mbedtls security update
- https://mbed-tls.readthedocs.io/en/latest/security-advisories/advisories/mbedtls-security-advisory-2022-07.html
- https://mbed-tls.readthedocs.io/en/latest/security-advisories/advisories/mbedtls-security-advisory-2022-07.html
Closed bugs
Проблема запуска после обновления на версию 6.0.7
Package cifs-utils updated to version 6.15-alt1 for branch p10_e2k.
Closed vulnerabilities
BDU:2022-04321
Уязвимость пакета утилит для монтирования сетевых файловых систем CIFS cifs-utils операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2022-04338
Уязвимость компонента mount.cifs.c пакета утилит для монтирования сетевых файловых систем CIFS cifs-utils операционной системы Linux, позволяющая нарушителю повысить свои привилегии
Modified: 2024-11-21
CVE-2022-27239
In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.
- http://wiki.robotz.com/index.php/Linux_CIFS_Utils_and_Samba
- http://wiki.robotz.com/index.php/Linux_CIFS_Utils_and_Samba
- https://bugzilla.samba.org/show_bug.cgi?id=15025
- https://bugzilla.samba.org/show_bug.cgi?id=15025
- https://bugzilla.suse.com/show_bug.cgi?id=1197216
- https://bugzilla.suse.com/show_bug.cgi?id=1197216
- https://github.com/piastry/cifs-utils/pull/7
- https://github.com/piastry/cifs-utils/pull/7
- https://github.com/piastry/cifs-utils/pull/7/commits/955fb147e97a6a74e1aaa65766de91e2c1479765
- https://github.com/piastry/cifs-utils/pull/7/commits/955fb147e97a6a74e1aaa65766de91e2c1479765
- [debian-lts-announce] 20220516 [SECURITY] [DLA 3009-1] cifs-utils security update
- [debian-lts-announce] 20220516 [SECURITY] [DLA 3009-1] cifs-utils security update
- FEDORA-2022-34de4f833d
- FEDORA-2022-34de4f833d
- FEDORA-2022-7fda04ab5a
- FEDORA-2022-7fda04ab5a
- FEDORA-2022-eb2d3ca94d
- FEDORA-2022-eb2d3ca94d
- GLSA-202311-05
- GLSA-202311-05
- DSA-5157
- DSA-5157
Modified: 2024-11-21
CVE-2022-29869
cifs-utils through 6.14, with verbose logging, can cause an information leak when a file contains = (equal sign) characters but is not a valid credentials file.
- https://github.com/piastry/cifs-utils/commit/8acc963a2e7e9d63fe1f2e7f73f5a03f83d9c379
- https://github.com/piastry/cifs-utils/commit/8acc963a2e7e9d63fe1f2e7f73f5a03f83d9c379
- https://github.com/piastry/cifs-utils/pull/7
- https://github.com/piastry/cifs-utils/pull/7
- [debian-lts-announce] 20220516 [SECURITY] [DLA 3009-1] cifs-utils security update
- [debian-lts-announce] 20220516 [SECURITY] [DLA 3009-1] cifs-utils security update
- FEDORA-2022-34de4f833d
- FEDORA-2022-34de4f833d
- FEDORA-2022-7fda04ab5a
- FEDORA-2022-7fda04ab5a
- FEDORA-2022-eb2d3ca94d
- FEDORA-2022-eb2d3ca94d
- GLSA-202311-05
- GLSA-202311-05
- DSA-5157
- DSA-5157
Package make-initrd updated to version 2.27.1-alt1.E2K.1 for branch p10_e2k.
Closed bugs
make-initrd failure with custom kernel
Не работает пропись в /etc/luks.keys файла с паролем от LUKS раздела.
Добавить в luks поддержку /etc/crypttab
Package papirus-icon-theme updated to version 20220808-alt1 for branch p10_e2k.
Closed bugs
Некорректный цвет значков