ALT-BU-2023-2328-1
Branch sisyphus_riscv64 update bulletin.
Package rust updated to version 1.66.1-alt0.1.rv64 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2023-00687
Уязвимость менеджера пакетов Cargo языка программирования Rust, позволяющая нарушителю оказать воздействие на целостность защищаемой информации
Modified: 2024-11-21
CVE-2022-46176
Cargo is a Rust package manager. The Rust Security Response WG was notified that Cargo did not perform SSH host key verification when cloning indexes and dependencies via SSH. An attacker could exploit this to perform man-in-the-middle (MITM) attacks. This vulnerability has been assigned CVE-2022-46176. All Rust versions containing Cargo before 1.66.1 are vulnerable. Note that even if you don't explicitly use SSH for alternate registry indexes or crate dependencies, you might be affected by this vulnerability if you have configured git to replace HTTPS connections to GitHub with SSH (through git's [`url.
- http://www.openwall.com/lists/oss-security/2023/11/05/6
- http://www.openwall.com/lists/oss-security/2023/11/05/6
- http://www.openwall.com/lists/oss-security/2023/11/06/5
- http://www.openwall.com/lists/oss-security/2023/11/06/5
- https://github.com/rust-lang/cargo/security/advisories/GHSA-r5w3-xm58-jv6j
- https://github.com/rust-lang/cargo/security/advisories/GHSA-r5w3-xm58-jv6j
- https://github.com/rust-lang/wg-security-response/tree/main/patches/CVE-2022-46176
- https://github.com/rust-lang/wg-security-response/tree/main/patches/CVE-2022-46176
Package firefox updated to version 109.0-alt0.1.rv64 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2023-00369
Уязвимость реализации функции ParseFromSafeString() интерфейса DOMParser браузера Mozilla Firefox, позволяющая нарушителю обойти ограничения безопасности
BDU:2023-00538
Уязвимость браузера Mozilla Firefox, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2023-00597
Уязвимость браузера Mozilla Firefox, связанная с ошибками в настройках безопасности, позволяющая нарушителю читать произвольные файлы
BDU:2023-00598
Уязвимость браузеров Mozilla Firefox и Firefox ESR, связанная с копированием буфера без проверки размера входных данных, позволяющая нарушителю выполнить произвольный код
BDU:2023-00602
Уязвимость браузеров Mozilla Firefox и Firefox ESR, связанная с ошибками при интерпретации данных, загруженных несколькими способами, позволяющая нарушителю читать произвольные файлы
BDU:2023-00603
Уязвимость браузера Mozilla Firefox для Android, связанная с ошибками управления состоянием, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2024-11-21
CVE-2023-23597
A compromised web child process could disable web security opening restrictions, leading to a new child process being spawned within the file://
context. Given a reliable exploit primitive, this new process could be exploited again leading to arbitrary file read. This vulnerability affects Firefox < 109.
Modified: 2024-11-21
CVE-2023-23598
Due to the Firefox GTK wrapper code's use of text/plain for drag data and GTK treating all text/plain MIMEs containing file URLs as being dragged a website could arbitrarily read a file via a call to DataTransfer.setData
. This vulnerability affects Firefox < 109, Thunderbird < 102.7, and Firefox ESR < 102.7.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1800425
- https://bugzilla.mozilla.org/show_bug.cgi?id=1800425
- https://www.mozilla.org/security/advisories/mfsa2023-01/
- https://www.mozilla.org/security/advisories/mfsa2023-01/
- https://www.mozilla.org/security/advisories/mfsa2023-02/
- https://www.mozilla.org/security/advisories/mfsa2023-02/
- https://www.mozilla.org/security/advisories/mfsa2023-03/
- https://www.mozilla.org/security/advisories/mfsa2023-03/
Modified: 2024-11-21
CVE-2023-23599
When copying a network request from the developer tools panel as a curl command the output was not being properly sanitized and could allow arbitrary commands to be hidden within. This vulnerability affects Firefox < 109, Thunderbird < 102.7, and Firefox ESR < 102.7.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1777800
- https://bugzilla.mozilla.org/show_bug.cgi?id=1777800
- https://www.mozilla.org/security/advisories/mfsa2023-01/
- https://www.mozilla.org/security/advisories/mfsa2023-01/
- https://www.mozilla.org/security/advisories/mfsa2023-02/
- https://www.mozilla.org/security/advisories/mfsa2023-02/
- https://www.mozilla.org/security/advisories/mfsa2023-03/
- https://www.mozilla.org/security/advisories/mfsa2023-03/
Modified: 2024-11-21
CVE-2023-23600
Per origin notification permissions were being stored in a way that didn't take into account what browsing context the permission was granted in. This lead to the possibility of notifications to be displayed during different browsing sessions.
*This bug only affects Firefox for Android. Other operating systems are unaffected.*. This vulnerability affects Firefox < 109.
Modified: 2024-11-21
CVE-2023-23601
Navigations were being allowed when dragging a URL from a cross-origin iframe into the same tab which could lead to website spoofing attacks. This vulnerability affects Firefox < 109, Thunderbird < 102.7, and Firefox ESR < 102.7.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1794268
- https://bugzilla.mozilla.org/show_bug.cgi?id=1794268
- https://www.mozilla.org/security/advisories/mfsa2023-01/
- https://www.mozilla.org/security/advisories/mfsa2023-01/
- https://www.mozilla.org/security/advisories/mfsa2023-02/
- https://www.mozilla.org/security/advisories/mfsa2023-02/
- https://www.mozilla.org/security/advisories/mfsa2023-03/
- https://www.mozilla.org/security/advisories/mfsa2023-03/
Modified: 2025-01-10
CVE-2023-23602
A mishandled security check when creating a WebSocket in a WebWorker caused the Content Security Policy connect-src header to be ignored. This could lead to connections to restricted origins from inside WebWorkers. This vulnerability affects Firefox < 109, Thunderbird < 102.7, and Firefox ESR < 102.7.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1800890
- https://bugzilla.mozilla.org/show_bug.cgi?id=1800890
- https://bugzilla.mozilla.org/show_bug.cgi?id=1800890
- https://www.mozilla.org/security/advisories/mfsa2023-01/
- https://www.mozilla.org/security/advisories/mfsa2023-01/
- https://www.mozilla.org/security/advisories/mfsa2023-02/
- https://www.mozilla.org/security/advisories/mfsa2023-02/
- https://www.mozilla.org/security/advisories/mfsa2023-03/
- https://www.mozilla.org/security/advisories/mfsa2023-03/
Modified: 2025-01-10
CVE-2023-23603
Regular expressions used to filter out forbidden properties and values from style directives in calls to console.log
weren't accounting for external URLs. Data could then be potentially exfiltrated from the browser. This vulnerability affects Firefox < 109, Thunderbird < 102.7, and Firefox ESR < 102.7.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1800832
- https://bugzilla.mozilla.org/show_bug.cgi?id=1800832
- https://www.mozilla.org/security/advisories/mfsa2023-01/
- https://www.mozilla.org/security/advisories/mfsa2023-01/
- https://www.mozilla.org/security/advisories/mfsa2023-02/
- https://www.mozilla.org/security/advisories/mfsa2023-02/
- https://www.mozilla.org/security/advisories/mfsa2023-03/
- https://www.mozilla.org/security/advisories/mfsa2023-03/
Modified: 2025-01-10
CVE-2023-23604
A duplicate SystemPrincipal
object could be created when parsing a non-system html document via DOMParser::ParseFromSafeString
. This could have lead to bypassing web security checks. This vulnerability affects Firefox < 109.
Modified: 2025-01-10
CVE-2023-23605
Memory safety bugs present in Firefox 108 and Firefox ESR 102.6. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 109, Thunderbird < 102.7, and Firefox ESR < 102.7.
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1764921%2C1802690%2C1806974
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1764921%2C1802690%2C1806974
- https://www.mozilla.org/security/advisories/mfsa2023-01/
- https://www.mozilla.org/security/advisories/mfsa2023-01/
- https://www.mozilla.org/security/advisories/mfsa2023-02/
- https://www.mozilla.org/security/advisories/mfsa2023-02/
- https://www.mozilla.org/security/advisories/mfsa2023-03/
- https://www.mozilla.org/security/advisories/mfsa2023-03/
Modified: 2025-01-10
CVE-2023-23606
Memory safety bugs present in Firefox 108. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 109.
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1764974%2C1798591%2C1799201%2C1800446%2C1801248%2C1802100%2C1803393%2C1804626%2C1804971%2C1807004
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1764974%2C1798591%2C1799201%2C1800446%2C1801248%2C1802100%2C1803393%2C1804626%2C1804971%2C1807004
- https://www.mozilla.org/security/advisories/mfsa2023-01/
- https://www.mozilla.org/security/advisories/mfsa2023-01/
Package sudo updated to version 1.9.12p2-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2023-00210
Уязвимость функции sudoedit программы системного администрирования Sudo, позволяющая нарушителю повысить свои привилегии
Modified: 2025-04-04
CVE-2023-22809
In Sudo before 1.9.12p2, the sudoedit (aka -e) feature mishandles extra arguments passed in the user-provided environment variables (SUDO_EDITOR, VISUAL, and EDITOR), allowing a local attacker to append arbitrary entries to the list of files to process. This can lead to privilege escalation. Affected versions are 1.8.0 through 1.9.12.p1. The problem exists because a user-specified editor may contain a "--" argument that defeats a protection mechanism, e.g., an EDITOR='vim -- /path/to/extra/file' value.
- http://packetstormsecurity.com/files/171644/sudo-1.9.12p1-Privilege-Escalation.html
- http://packetstormsecurity.com/files/171644/sudo-1.9.12p1-Privilege-Escalation.html
- http://packetstormsecurity.com/files/172509/Sudoedit-Extra-Arguments-Privilege-Escalation.html
- http://packetstormsecurity.com/files/172509/Sudoedit-Extra-Arguments-Privilege-Escalation.html
- http://packetstormsecurity.com/files/174234/Cisco-ThousandEyes-Enterprise-Agent-Virtual-Appliance-Arbitrary-File-Modification.html
- http://packetstormsecurity.com/files/174234/Cisco-ThousandEyes-Enterprise-Agent-Virtual-Appliance-Arbitrary-File-Modification.html
- 20230817 KL-001-2023-003: Cisco ThousandEyes Enterprise Agent Virtual Appliance Arbitrary File Modification via sudoedit
- 20230817 KL-001-2023-003: Cisco ThousandEyes Enterprise Agent Virtual Appliance Arbitrary File Modification via sudoedit
- [oss-security] 20230119 CVE-2023-22809: Sudoedit can edit arbitrary files
- [oss-security] 20230119 CVE-2023-22809: Sudoedit can edit arbitrary files
- [debian-lts-announce] 20230118 [SECURITY] [DLA 3272-1] sudo security update
- [debian-lts-announce] 20230118 [SECURITY] [DLA 3272-1] sudo security update
- FEDORA-2023-9078f609e6
- FEDORA-2023-9078f609e6
- FEDORA-2023-298c136eee
- FEDORA-2023-298c136eee
- GLSA-202305-12
- GLSA-202305-12
- https://security.netapp.com/advisory/ntap-20230127-0015/
- https://security.netapp.com/advisory/ntap-20230127-0015/
- https://support.apple.com/kb/HT213758
- https://support.apple.com/kb/HT213758
- DSA-5321
- DSA-5321
- https://www.sudo.ws/security/advisories/sudoedit_any/
- https://www.sudo.ws/security/advisories/sudoedit_any/
- https://www.synacktiv.com/sites/default/files/2023-01/sudo-CVE-2023-22809.pdf
- https://www.synacktiv.com/sites/default/files/2023-01/sudo-CVE-2023-22809.pdf
Closed bugs
уязвимость (CVE-2023-22809)
Package frr updated to version 8.4.2-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2023-02322
Уязвимость компонента BGP OPEN Message Handler программного средства реализации сетевой маршрутизации на Unix-подобных системах FRRouting связана с выходом операции за границами буфера в памяти. Эксплуатация уязвимости может позволить нарушителю, действующему удалённо, вызвать отказ в обслуживании
BDU:2023-02672
Уязвимость функции bgp_open_option_parse() демона bgpd программного средства реализации сетевой маршрутизации на Unix-подобных системах FRRouting, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-02673
Уязвимость демона bgpd программного средства реализации сетевой маршрутизации на Unix-подобных системах FRRouting, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2022-37032
An out-of-bounds read in the BGP daemon of FRRouting FRR before 8.4 may lead to a segmentation fault and denial of service. This occurs in bgp_capability_msg_parse in bgpd/bgp_packet.c.
- https://bugzilla.suse.com/show_bug.cgi?id=1202023
- https://github.com/FRRouting/frr/commit/6d58272b4cf96f0daa846210dd2104877900f921
- https://github.com/FRRouting/frr/commit/ff6db1027f8f36df657ff2e5ea167773752537ed
- [debian-lts-announce] 20221128 [SECURITY] [DLA 3211-1] frr security update
- DSA-5362
- https://bugzilla.suse.com/show_bug.cgi?id=1202023
- DSA-5362
- [debian-lts-announce] 20221128 [SECURITY] [DLA 3211-1] frr security update
- https://github.com/FRRouting/frr/commit/ff6db1027f8f36df657ff2e5ea167773752537ed
- https://github.com/FRRouting/frr/commit/6d58272b4cf96f0daa846210dd2104877900f921
Modified: 2025-01-30
CVE-2022-40302
An issue was discovered in bgpd in FRRouting (FRR) through 8.4. By crafting a BGP OPEN message with an option of type 0xff (Extended Length from RFC 9072), attackers may cause a denial of service (assertion failure and daemon restart, or out-of-bounds read). This is possible because of inconsistent boundary checks that do not account for reading 3 bytes (instead of 2) in this 0xff case.
Modified: 2024-11-21
CVE-2022-40318
An issue was discovered in bgpd in FRRouting (FRR) through 8.4. By crafting a BGP OPEN message with an option of type 0xff (Extended Length from RFC 9072), attackers may cause a denial of service (assertion failure and daemon restart, or out-of-bounds read). This is possible because of inconsistent boundary checks that do not account for reading 3 bytes (instead of 2) in this 0xff case. NOTE: this behavior occurs in bgp_open_option_parse in the bgp_open.c file, a different location (with a different attack vector) relative to CVE-2022-40302.
Modified: 2024-11-21
CVE-2022-43681
An out-of-bounds read exists in the BGP daemon of FRRouting FRR through 8.4. When sending a malformed BGP OPEN message that ends with the option length octet (or the option length word, in case of an extended OPEN message), the FRR code reads of out of the bounds of the packet, throwing a SIGABRT signal and exiting. This results in a bgpd daemon restart, causing a Denial-of-Service condition.
Package wireshark updated to version 4.0.3-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
Modified: 2025-04-01
CVE-2023-0411
Excessive loops in multiple dissectors in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0411.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0411.json
- https://gitlab.com/wireshark/wireshark/-/issues/18711
- https://gitlab.com/wireshark/wireshark/-/issues/18711
- https://gitlab.com/wireshark/wireshark/-/issues/18720
- https://gitlab.com/wireshark/wireshark/-/issues/18720
- https://gitlab.com/wireshark/wireshark/-/issues/18737
- https://gitlab.com/wireshark/wireshark/-/issues/18737
- [debian-lts-announce] 20230208 [SECURITY] [DLA 3313-1] wireshark security update
- [debian-lts-announce] 20230208 [SECURITY] [DLA 3313-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2023-06.html
- https://www.wireshark.org/security/wnpa-sec-2023-06.html
Modified: 2025-04-02
CVE-2023-0412
TIPC dissector crash in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0412.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0412.json
- https://gitlab.com/wireshark/wireshark/-/issues/18770
- https://gitlab.com/wireshark/wireshark/-/issues/18770
- [debian-lts-announce] 20230208 [SECURITY] [DLA 3313-1] wireshark security update
- [debian-lts-announce] 20230208 [SECURITY] [DLA 3313-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2023-07.html
- https://www.wireshark.org/security/wnpa-sec-2023-07.html
Modified: 2025-04-02
CVE-2023-0413
Dissection engine bug in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0413.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0413.json
- https://gitlab.com/wireshark/wireshark/-/issues/18766
- https://gitlab.com/wireshark/wireshark/-/issues/18766
- [debian-lts-announce] 20230208 [SECURITY] [DLA 3313-1] wireshark security update
- [debian-lts-announce] 20230208 [SECURITY] [DLA 3313-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2023-03.html
- https://www.wireshark.org/security/wnpa-sec-2023-03.html
Modified: 2025-04-02
CVE-2023-0414
Crash in the EAP dissector in Wireshark 4.0.0 to 4.0.2 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0414.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0414.json
- https://gitlab.com/wireshark/wireshark/-/issues/18622
- https://gitlab.com/wireshark/wireshark/-/issues/18622
- https://www.wireshark.org/security/wnpa-sec-2023-01.html
- https://www.wireshark.org/security/wnpa-sec-2023-01.html
Modified: 2025-04-02
CVE-2023-0415
iSCSI dissector crash in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0415.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0415.json
- https://gitlab.com/wireshark/wireshark/-/issues/18796
- https://gitlab.com/wireshark/wireshark/-/issues/18796
- [debian-lts-announce] 20230208 [SECURITY] [DLA 3313-1] wireshark security update
- [debian-lts-announce] 20230208 [SECURITY] [DLA 3313-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2023-05.html
- https://www.wireshark.org/security/wnpa-sec-2023-05.html
Modified: 2025-04-01
CVE-2023-0416
GNW dissector crash in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0416.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0416.json
- https://gitlab.com/wireshark/wireshark/-/issues/18779
- https://gitlab.com/wireshark/wireshark/-/issues/18779
- https://www.wireshark.org/security/wnpa-sec-2023-04.html
- https://www.wireshark.org/security/wnpa-sec-2023-04.html
Modified: 2025-03-31
CVE-2023-0417
Memory leak in the NFS dissector in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0417.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0417.json
- https://gitlab.com/wireshark/wireshark/-/issues/18628
- https://gitlab.com/wireshark/wireshark/-/issues/18628
- [debian-lts-announce] 20230208 [SECURITY] [DLA 3313-1] wireshark security update
- [debian-lts-announce] 20230208 [SECURITY] [DLA 3313-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2023-02.html
- https://www.wireshark.org/security/wnpa-sec-2023-02.html
Package NetworkManager-pptp updated to version 1.2.10-alt2 for branch sisyphus_riscv64.
Closed bugs
NetworkManager неактивное поле ввода пароля при создании PPTP-соединения
Package python3-module-jsonschema updated to version 4.17.3-alt2 for branch sisyphus_riscv64.
Closed bugs
unpackaged `core` files
Package local-policy updated to version 0.6.0-alt1.0.rv64 for branch sisyphus_riscv64.
Closed bugs
local-policy requires xmlbeans-scripts