ALT-BU-2023-3611-1
Branch sisyphus_riscv64 update bulletin.
Package boost updated to version 1.80.0-alt2 for branch sisyphus_riscv64.
Closed bugs
boost: поддержка архитектуры LoongArch
boost: упрощение начальной сборки
Package thunderbird updated to version 102.11.0-alt0.1.rv64 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2023-02803
Уязвимость браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, вызванная выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2023-02804
Уязвимость браузеров Firefox и Firefox ESR, связанная с ошибками представления информации пользовательским интерфейсом, позволяющая нарушителю выполнить спуфинговую атаку
BDU:2023-02805
Уязвимость функции FileReader::DoReadData() браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код в целевой системе
BDU:2023-02806
Уязвимость браузеров Firefox и Firefox ESR, связанная с ошибками смешения типов данных, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-02809
Уязвимость браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, связанная с ошибками представления информации пользовательским интерфейсом, позволяющая нарушителю выполнить спуфинговую атаку
BDU:2023-02810
Уязвимость браузеров Firefox и Firefox ESR и почтового клиента Thunderbird, существующая из-за некорректной работы обработчиков ms-cxh и ms-cxh-ful, позволяющая нарушителю вызвать аварийное завершение работы приложения
BDU:2023-02813
Уязвимость драйвера RLBox Expat браузеров Firefox и Firefox ESR, позволяющая нарушителю вызвать аварийное завершение работы приложения
BDU:2023-02814
Уязвимость браузеров Firefox и Firefox ESR, существующая из-за отсутствия задержки всплывающих уведомлений, позволяющая нарушителю получить несанкционированный доступ к определенным функциям браузера
Modified: 2024-11-21
CVE-2023-32205
In multiple cases browser prompts could have been obscured by popups controlled by content. These could have led to potential user confusion and spoofing attacks. This vulnerability affects Firefox < 113, Firefox ESR < 102.11, and Thunderbird < 102.11.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1753339
- https://bugzilla.mozilla.org/show_bug.cgi?id=1753341
- GLSA-202312-03
- GLSA-202401-10
- https://www.mozilla.org/security/advisories/mfsa2023-16/
- https://www.mozilla.org/security/advisories/mfsa2023-17/
- https://www.mozilla.org/security/advisories/mfsa2023-18/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1753339
- https://www.mozilla.org/security/advisories/mfsa2023-18/
- https://www.mozilla.org/security/advisories/mfsa2023-17/
- https://www.mozilla.org/security/advisories/mfsa2023-16/
- GLSA-202401-10
- GLSA-202312-03
- https://bugzilla.mozilla.org/show_bug.cgi?id=1753341
Modified: 2024-11-21
CVE-2023-32206
An out-of-bound read could have led to a crash in the RLBox Expat driver. This vulnerability affects Firefox < 113, Firefox ESR < 102.11, and Thunderbird < 102.11.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1824892
- GLSA-202312-03
- GLSA-202401-10
- https://www.mozilla.org/security/advisories/mfsa2023-16/
- https://www.mozilla.org/security/advisories/mfsa2023-17/
- https://www.mozilla.org/security/advisories/mfsa2023-18/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1824892
- https://www.mozilla.org/security/advisories/mfsa2023-18/
- https://www.mozilla.org/security/advisories/mfsa2023-17/
- https://www.mozilla.org/security/advisories/mfsa2023-16/
- GLSA-202401-10
- GLSA-202312-03
Modified: 2025-01-31
CVE-2023-32207
A missing delay in popup notifications could have made it possible for an attacker to trick a user into granting permissions. This vulnerability affects Firefox < 113, Firefox ESR < 102.11, and Thunderbird < 102.11.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1826116
- https://bugzilla.mozilla.org/show_bug.cgi?id=1826116
- GLSA-202312-03
- GLSA-202312-03
- GLSA-202401-10
- GLSA-202401-10
- https://www.mozilla.org/security/advisories/mfsa2023-16/
- https://www.mozilla.org/security/advisories/mfsa2023-16/
- https://www.mozilla.org/security/advisories/mfsa2023-17/
- https://www.mozilla.org/security/advisories/mfsa2023-17/
- https://www.mozilla.org/security/advisories/mfsa2023-18/
- https://www.mozilla.org/security/advisories/mfsa2023-18/
Modified: 2024-11-21
CVE-2023-32211
A type checking bug would have led to invalid code being compiled. This vulnerability affects Firefox < 113, Firefox ESR < 102.11, and Thunderbird < 102.11.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1823379
- GLSA-202312-03
- GLSA-202401-10
- https://www.mozilla.org/security/advisories/mfsa2023-16/
- https://www.mozilla.org/security/advisories/mfsa2023-17/
- https://www.mozilla.org/security/advisories/mfsa2023-18/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1823379
- https://www.mozilla.org/security/advisories/mfsa2023-18/
- https://www.mozilla.org/security/advisories/mfsa2023-17/
- https://www.mozilla.org/security/advisories/mfsa2023-16/
- GLSA-202401-10
- GLSA-202312-03
Modified: 2024-11-21
CVE-2023-32212
An attacker could have positioned a datalist
element to obscure the address bar. This vulnerability affects Firefox < 113, Firefox ESR < 102.11, and Thunderbird < 102.11.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1826622
- GLSA-202312-03
- GLSA-202401-10
- https://www.mozilla.org/security/advisories/mfsa2023-16/
- https://www.mozilla.org/security/advisories/mfsa2023-17/
- https://www.mozilla.org/security/advisories/mfsa2023-18/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1826622
- https://www.mozilla.org/security/advisories/mfsa2023-18/
- https://www.mozilla.org/security/advisories/mfsa2023-17/
- https://www.mozilla.org/security/advisories/mfsa2023-16/
- GLSA-202401-10
- GLSA-202312-03
Modified: 2024-11-21
CVE-2023-32213
When reading a file, an uninitialized value could have been used as read limit. This vulnerability affects Firefox < 113, Firefox ESR < 102.11, and Thunderbird < 102.11.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1826666
- GLSA-202312-03
- GLSA-202401-10
- https://www.mozilla.org/security/advisories/mfsa2023-16/
- https://www.mozilla.org/security/advisories/mfsa2023-17/
- https://www.mozilla.org/security/advisories/mfsa2023-18/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1826666
- https://www.mozilla.org/security/advisories/mfsa2023-18/
- https://www.mozilla.org/security/advisories/mfsa2023-17/
- https://www.mozilla.org/security/advisories/mfsa2023-16/
- GLSA-202401-10
- GLSA-202312-03
Modified: 2024-11-21
CVE-2023-32214
Protocol handlers `ms-cxh` and `ms-cxh-full` could have been leveraged to trigger a denial of service. *Note: This attack only affects Windows. Other operating systems are not affected.* This vulnerability affects Firefox < 113, Firefox ESR < 102.11, and Thunderbird < 102.11.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1828716
- https://security.gentoo.org/glsa/202312-03
- https://security.gentoo.org/glsa/202401-10
- https://www.mozilla.org/security/advisories/mfsa2023-16/
- https://www.mozilla.org/security/advisories/mfsa2023-17/
- https://www.mozilla.org/security/advisories/mfsa2023-18/
- https://bugzilla.mozilla.org/show_bug.cgi?id=1828716
- https://www.mozilla.org/security/advisories/mfsa2023-18/
- https://www.mozilla.org/security/advisories/mfsa2023-17/
- https://www.mozilla.org/security/advisories/mfsa2023-16/
- https://security.gentoo.org/glsa/202401-10
- https://security.gentoo.org/glsa/202312-03
Modified: 2024-11-21
CVE-2023-32215
Memory safety bugs present in Firefox 112 and Firefox ESR 102.10. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 113, Firefox ESR < 102.11, and Thunderbird < 102.11.
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1540883%2C1751943%2C1814856%2C1820210%2C1821480%2C1827019%2C1827024%2C1827144%2C1827359%2C1830186
- GLSA-202312-03
- GLSA-202401-10
- https://www.mozilla.org/security/advisories/mfsa2023-16/
- https://www.mozilla.org/security/advisories/mfsa2023-17/
- https://www.mozilla.org/security/advisories/mfsa2023-18/
- https://bugzilla.mozilla.org/buglist.cgi?bug_id=1540883%2C1751943%2C1814856%2C1820210%2C1821480%2C1827019%2C1827024%2C1827144%2C1827359%2C1830186
- https://www.mozilla.org/security/advisories/mfsa2023-18/
- https://www.mozilla.org/security/advisories/mfsa2023-17/
- https://www.mozilla.org/security/advisories/mfsa2023-16/
- GLSA-202401-10
- GLSA-202312-03
Package curl updated to version 8.1.0-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2023-02895
Уязвимость библиотеки libcurl, связанная с ошибками при отправке HTTP-запросов POST и PUT с использованием одного и того же дескриптора, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Modified: 2025-01-15
CVE-2023-28319
A use after free vulnerability exists in curl
- 20230725 APPLE-SA-2023-07-24-4 macOS Ventura 13.5
- 20230725 APPLE-SA-2023-07-24-4 macOS Ventura 13.5
- 20230725 APPLE-SA-2023-07-24-5 macOS Monterey 12.6.8
- 20230725 APPLE-SA-2023-07-24-5 macOS Monterey 12.6.8
- 20230725 APPLE-SA-2023-07-24-6 macOS Big Sur 11.7.9
- 20230725 APPLE-SA-2023-07-24-6 macOS Big Sur 11.7.9
- https://hackerone.com/reports/1913733
- https://hackerone.com/reports/1913733
- GLSA-202310-12
- GLSA-202310-12
- https://security.netapp.com/advisory/ntap-20230609-0009/
- https://security.netapp.com/advisory/ntap-20230609-0009/
- https://support.apple.com/kb/HT213843
- https://support.apple.com/kb/HT213843
- https://support.apple.com/kb/HT213844
- https://support.apple.com/kb/HT213844
- https://support.apple.com/kb/HT213845
- https://support.apple.com/kb/HT213845
Modified: 2025-01-15
CVE-2023-28320
A denial of service vulnerability exists in curl
- 20230725 APPLE-SA-2023-07-24-4 macOS Ventura 13.5
- 20230725 APPLE-SA-2023-07-24-4 macOS Ventura 13.5
- 20230725 APPLE-SA-2023-07-24-5 macOS Monterey 12.6.8
- 20230725 APPLE-SA-2023-07-24-5 macOS Monterey 12.6.8
- 20230725 APPLE-SA-2023-07-24-6 macOS Big Sur 11.7.9
- 20230725 APPLE-SA-2023-07-24-6 macOS Big Sur 11.7.9
- https://hackerone.com/reports/1929597
- https://hackerone.com/reports/1929597
- GLSA-202310-12
- GLSA-202310-12
- https://security.netapp.com/advisory/ntap-20230609-0009/
- https://security.netapp.com/advisory/ntap-20230609-0009/
- https://support.apple.com/kb/HT213843
- https://support.apple.com/kb/HT213843
- https://support.apple.com/kb/HT213844
- https://support.apple.com/kb/HT213844
- https://support.apple.com/kb/HT213845
- https://support.apple.com/kb/HT213845
Modified: 2025-01-15
CVE-2023-28321
An improper certificate validation vulnerability exists in curl
- 20230725 APPLE-SA-2023-07-24-4 macOS Ventura 13.5
- 20230725 APPLE-SA-2023-07-24-4 macOS Ventura 13.5
- 20230725 APPLE-SA-2023-07-24-5 macOS Monterey 12.6.8
- 20230725 APPLE-SA-2023-07-24-5 macOS Monterey 12.6.8
- 20230725 APPLE-SA-2023-07-24-6 macOS Big Sur 11.7.9
- 20230725 APPLE-SA-2023-07-24-6 macOS Big Sur 11.7.9
- https://hackerone.com/reports/1950627
- https://hackerone.com/reports/1950627
- [debian-lts-announce] 20231011 [SECURITY] [DLA 3613-1] curl security update
- [debian-lts-announce] 20231011 [SECURITY] [DLA 3613-1] curl security update
- FEDORA-2023-37eac50e9b
- FEDORA-2023-37eac50e9b
- FEDORA-2023-8ed627bb04
- FEDORA-2023-8ed627bb04
- GLSA-202310-12
- GLSA-202310-12
- https://security.netapp.com/advisory/ntap-20230609-0009/
- https://security.netapp.com/advisory/ntap-20230609-0009/
- https://support.apple.com/kb/HT213843
- https://support.apple.com/kb/HT213843
- https://support.apple.com/kb/HT213844
- https://support.apple.com/kb/HT213844
- https://support.apple.com/kb/HT213845
- https://support.apple.com/kb/HT213845
Modified: 2024-11-21
CVE-2023-28322
An information disclosure vulnerability exists in curl
- 20230725 APPLE-SA-2023-07-24-4 macOS Ventura 13.5
- 20230725 APPLE-SA-2023-07-24-5 macOS Monterey 12.6.8
- 20230725 APPLE-SA-2023-07-24-6 macOS Big Sur 11.7.9
- https://hackerone.com/reports/1954658
- [debian-lts-announce] 20231222 [SECURITY] [DLA 3692-1] curl security update
- FEDORA-2023-37eac50e9b
- FEDORA-2023-8ed627bb04
- GLSA-202310-12
- https://security.netapp.com/advisory/ntap-20230609-0009/
- https://support.apple.com/kb/HT213843
- https://support.apple.com/kb/HT213844
- https://support.apple.com/kb/HT213845
- 20230725 APPLE-SA-2023-07-24-4 macOS Ventura 13.5
- https://support.apple.com/kb/HT213845
- https://support.apple.com/kb/HT213844
- https://support.apple.com/kb/HT213843
- https://security.netapp.com/advisory/ntap-20230609-0009/
- GLSA-202310-12
- FEDORA-2023-8ed627bb04
- FEDORA-2023-37eac50e9b
- [debian-lts-announce] 20231222 [SECURITY] [DLA 3692-1] curl security update
- https://hackerone.com/reports/1954658
- 20230725 APPLE-SA-2023-07-24-6 macOS Big Sur 11.7.9
- 20230725 APPLE-SA-2023-07-24-5 macOS Monterey 12.6.8
Package shadow updated to version 4.13-alt5 for branch sisyphus_riscv64.
Closed vulnerabilities
Modified: 2025-02-07
CVE-2023-29383
In Shadow 4.13, it is possible to inject control characters into fields provided to the SUID program chfn (change finger). Although it is not possible to exploit this directly (e.g., adding a new user fails because \n is in the block list), it is possible to misrepresent the /etc/passwd file when viewed. Use of \r manipulations and Unicode characters to work around blocking of the : character make it possible to give the impression that a new user has been added. In other words, an adversary may be able to convince a system administrator to take the system offline (an indirect, social-engineered denial of service) by demonstrating that "cat /etc/passwd" shows a rogue user account.
- https://github.com/shadow-maint/shadow/commit/e5905c4b84d4fb90aefcd96ee618411ebfac663d
- https://github.com/shadow-maint/shadow/commit/e5905c4b84d4fb90aefcd96ee618411ebfac663d
- https://github.com/shadow-maint/shadow/pull/687
- https://github.com/shadow-maint/shadow/pull/687
- https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2023-29383-abusing-linux-chfn-to-misrepresent-etc-passwd/
- https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/cve-2023-29383-abusing-linux-chfn-to-misrepresent-etc-passwd/
- https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=31797
- https://www.trustwave.com/en-us/resources/security-resources/security-advisories/?fid=31797
Package kernelshark updated to version 2.2.0-alt4 for branch sisyphus_riscv64.
Closed bugs
Некорректное отображение графика
Ошибка при запуске из каталога с пробелом в названии
Package gpui updated to version 0.2.25-alt1 for branch sisyphus_riscv64.
Closed bugs
Ошибка сегментирования при локальном изменении политик