ALT-BU-2023-3066-1
Branch p10 update bulletin.
Package libmemcached updated to version 1.1.4-alt1 for branch p10 in task 317669.
Closed vulnerabilities
BDU:2023-01570
Уязвимость сервиса кэширования данных memcached библиотеки libmemcached-awesome, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Modified: 2024-11-21
CVE-2023-27478
libmemcached-awesome is an open source C/C++ client library and tools for the memcached server. `libmemcached` could return data for a previously requested key, if that previous request timed out due to a low `POLL_TIMEOUT`. This issue has been addressed in version 1.1.4. Users are advised to upgrade. There are several ways to workaround or lower the probability of this bug affecting a given deployment. 1: use a reasonably high `POLL_TIMEOUT` setting, like the default. 2: use separate libmemcached connections for unrelated data. 3: do not re-use libmemcached connections in an unknown state.
- https://github.com/awesomized/libmemcached/commit/48dcc61a
- https://github.com/awesomized/libmemcached/commit/48dcc61a
- https://github.com/awesomized/libmemcached/releases/tag/1.1.4
- https://github.com/awesomized/libmemcached/releases/tag/1.1.4
- https://github.com/awesomized/libmemcached/security/advisories/GHSA-wwmh-39wj-fx59
- https://github.com/awesomized/libmemcached/security/advisories/GHSA-wwmh-39wj-fx59
- https://github.com/php-memcached-dev/php-memcached/issues/531
- https://github.com/php-memcached-dev/php-memcached/issues/531
Closed vulnerabilities
BDU:2022-04053
Уязвимость компонента join.c изолированной программной среды Firejail, позволяющая нарушителю повысить свои привилегии
Modified: 2024-11-21
CVE-2022-31214
A Privilege Context Switching issue was discovered in join.c in Firejail 0.9.68. By crafting a bogus Firejail container that is accepted by the Firejail setuid-root program as a join target, a local attacker can enter an environment in which the Linux user namespace is still the initial user namespace, the NO_NEW_PRIVS prctl is not activated, and the entered mount namespace is under the attacker's control. In this way, the filesystem layout can be adjusted to gain root privileges through execution of available setuid-root binaries such as su or sudo.
- https://firejail.wordpress.com/download-2/release-notes/
- https://firejail.wordpress.com/download-2/release-notes/
- [debian-lts-announce] 20220629 [SECURITY] [DLA 3061-1] firejail security update
- [debian-lts-announce] 20220629 [SECURITY] [DLA 3061-1] firejail security update
- FEDORA-2022-827d9ce8ac
- FEDORA-2022-827d9ce8ac
- FEDORA-2022-e8e9b50a33
- FEDORA-2022-e8e9b50a33
- FEDORA-2022-7ecd36b131
- FEDORA-2022-7ecd36b131
- GLSA-202305-19
- GLSA-202305-19
- DSA-5167
- DSA-5167
- https://www.openwall.com/lists/oss-security/2022/06/08/10
- https://www.openwall.com/lists/oss-security/2022/06/08/10
Package branding-alt-education updated to version 10.1-alt8 for branch p10 in task 317292.
Closed bugs
На панели xfce присутствует значок запуска Chromium, отсутствующего в p10/branch/i586