ALT-BU-2023-3780-1
Branch sisyphus_riscv64 update bulletin.
Package qemu updated to version 8.0.0-alt0.3.rv64 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2021-03673
Уязвимость функции ati_2d_blt() эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-02140
Уязвимость компонента RDMA эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-3638
An out-of-bounds memory access flaw was found in the ATI VGA device emulation of QEMU. This flaw occurs in the ati_2d_blt() routine while handling MMIO write operations when the guest provides invalid values for the destination display parameters. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service.
- https://bugzilla.redhat.com/show_bug.cgi?id=1979858
- https://bugzilla.redhat.com/show_bug.cgi?id=1979858
- FEDORA-2023-c8a60f6f80
- FEDORA-2023-c8a60f6f80
- FEDORA-2022-22b1f8dae2
- FEDORA-2022-22b1f8dae2
- https://lists.nongnu.org/archive/html/qemu-devel/2021-09/msg01682.html
- https://lists.nongnu.org/archive/html/qemu-devel/2021-09/msg01682.html
- https://security.netapp.com/advisory/ntap-20220407-0003/
- https://security.netapp.com/advisory/ntap-20220407-0003/
- https://ubuntu.com/security/CVE-2021-3638
- https://ubuntu.com/security/CVE-2021-3638
Modified: 2024-11-21
CVE-2022-2962
A DMA reentrancy issue was found in the Tulip device emulation in QEMU. When Tulip reads or writes to the rx/tx descriptor or copies the rx/tx frame, it doesn't check whether the destination address is its own MMIO address. This can cause the device to trigger MMIO handlers multiple times, possibly leading to a stack or heap overflow. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.
Modified: 2024-11-21
CVE-2022-3165
An integer underflow issue was found in the QEMU VNC server while processing ClientCutText messages in the extended format. A malicious client could use this flaw to make QEMU unresponsive by sending a specially crafted payload message, resulting in a denial of service.
- https://gitlab.com/qemu-project/qemu/-/commit/d307040b18
- https://gitlab.com/qemu-project/qemu/-/commit/d307040b18
- FEDORA-2022-8dcdfe7297
- FEDORA-2022-8dcdfe7297
- FEDORA-2022-4387579e67
- FEDORA-2022-4387579e67
- https://security.netapp.com/advisory/ntap-20221223-0006/
- https://security.netapp.com/advisory/ntap-20221223-0006/
Modified: 2024-11-21
CVE-2022-3872
An off-by-one read/write issue was found in the SDHCI device of QEMU. It occurs when reading/writing the Buffer Data Port Register in sdhci_read_dataport and sdhci_write_dataport, respectively, if data_count == block_size. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.
Modified: 2024-11-21
CVE-2022-4144
An out-of-bounds read flaw was found in the QXL display device emulation in QEMU. The qxl_phys2virt() function does not check the size of the structure pointed to by the guest physical address, potentially reading past the end of the bar space into adjacent pages. A malicious guest user could use this flaw to crash the QEMU process on the host causing a denial of service condition.
- https://bugzilla.redhat.com/show_bug.cgi?id=2148506
- https://bugzilla.redhat.com/show_bug.cgi?id=2148506
- FEDORA-2023-c8a60f6f80
- FEDORA-2023-c8a60f6f80
- FEDORA-2022-22b1f8dae2
- FEDORA-2022-22b1f8dae2
- https://lists.nongnu.org/archive/html/qemu-devel/2022-11/msg04143.html
- https://lists.nongnu.org/archive/html/qemu-devel/2022-11/msg04143.html
- https://security.netapp.com/advisory/ntap-20230127-0012/
- https://security.netapp.com/advisory/ntap-20230127-0012/
Modified: 2024-11-21
CVE-2023-1544
A flaw was found in the QEMU implementation of VMWare's paravirtual RDMA device. This flaw allows a crafted guest driver to allocate and initialize a huge number of page tables to be used as a ring of descriptors for CQ and async events, potentially leading to an out-of-bounds read and crash of QEMU.
- https://access.redhat.com/security/cve/CVE-2023-1544
- https://access.redhat.com/security/cve/CVE-2023-1544
- https://bugzilla.redhat.com/show_bug.cgi?id=2180364
- https://bugzilla.redhat.com/show_bug.cgi?id=2180364
- https://lists.nongnu.org/archive/html/qemu-devel/2023-03/msg00206.html
- https://lists.nongnu.org/archive/html/qemu-devel/2023-03/msg00206.html
- https://security.netapp.com/advisory/ntap-20230511-0005/
- https://security.netapp.com/advisory/ntap-20230511-0005/
Package wireshark updated to version 4.0.6-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
Modified: 2025-01-07
CVE-2023-0666
Due to failure in validating the length provided by an attacker-crafted RTPS packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark.
- https://gitlab.com/wireshark/wireshark/-/issues/19085
- https://gitlab.com/wireshark/wireshark/-/issues/19085
- https://security.gentoo.org/glsa/202309-02
- https://security.gentoo.org/glsa/202309-02
- https://takeonme.org/cves/CVE-2023-0666.html
- https://takeonme.org/cves/CVE-2023-0666.html
- https://www.debian.org/security/2023/dsa-5429
- https://www.debian.org/security/2023/dsa-5429
- https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html
- https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html
- https://www.wireshark.org/security/wnpa-sec-2023-18.html
- https://www.wireshark.org/security/wnpa-sec-2023-18.html
Modified: 2025-01-07
CVE-2023-0667
Due to failure in validating the length provided by an attacker-crafted MSMMS packet, Wireshark version 4.0.5 and prior, in an unusual configuration, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark
Modified: 2025-01-07
CVE-2023-0668
Due to failure in validating the length provided by an attacker-crafted IEEE-C37.118 packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark.
- https://gitlab.com/wireshark/wireshark/-/issues/19087
- https://gitlab.com/wireshark/wireshark/-/issues/19087
- https://security.gentoo.org/glsa/202309-02
- https://security.gentoo.org/glsa/202309-02
- https://takeonme.org/cves/CVE-2023-0668.html
- https://takeonme.org/cves/CVE-2023-0668.html
- https://www.debian.org/security/2023/dsa-5429
- https://www.debian.org/security/2023/dsa-5429
- https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html
- https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html
- https://www.wireshark.org/security/wnpa-sec-2023-19.html
- https://www.wireshark.org/security/wnpa-sec-2023-19.html
Modified: 2025-01-15
CVE-2023-2854
BLF file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2854.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2854.json
- https://gitlab.com/wireshark/wireshark/-/issues/19084
- https://gitlab.com/wireshark/wireshark/-/issues/19084
- GLSA-202309-02
- GLSA-202309-02
- DSA-5429
- DSA-5429
- https://www.wireshark.org/security/wnpa-sec-2023-17.html
- https://www.wireshark.org/security/wnpa-sec-2023-17.html
Modified: 2025-01-15
CVE-2023-2855
Candump log parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2855.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2855.json
- https://gitlab.com/wireshark/wireshark/-/issues/19062
- https://gitlab.com/wireshark/wireshark/-/issues/19062
- GLSA-202309-02
- GLSA-202309-02
- DSA-5429
- DSA-5429
- https://www.wireshark.org/security/wnpa-sec-2023-12.html
- https://www.wireshark.org/security/wnpa-sec-2023-12.html
Modified: 2025-01-15
CVE-2023-2856
VMS TCPIPtrace file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2856.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2856.json
- https://gitlab.com/wireshark/wireshark/-/issues/19083
- https://gitlab.com/wireshark/wireshark/-/issues/19083
- [debian-lts-announce] 20230603 [SECURITY] [DLA 3443-1] wireshark security update
- [debian-lts-announce] 20230603 [SECURITY] [DLA 3443-1] wireshark security update
- GLSA-202309-02
- GLSA-202309-02
- DSA-5429
- DSA-5429
- https://www.wireshark.org/security/wnpa-sec-2023-16.html
- https://www.wireshark.org/security/wnpa-sec-2023-16.html
Modified: 2025-01-15
CVE-2023-2857
BLF file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2857.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2857.json
- https://gitlab.com/wireshark/wireshark/-/issues/19063
- https://gitlab.com/wireshark/wireshark/-/issues/19063
- GLSA-202309-02
- GLSA-202309-02
- DSA-5429
- DSA-5429
- https://www.wireshark.org/security/wnpa-sec-2023-13.html
- https://www.wireshark.org/security/wnpa-sec-2023-13.html
Modified: 2025-01-15
CVE-2023-2858
NetScaler file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2858.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2858.json
- https://gitlab.com/wireshark/wireshark/-/issues/19081
- https://gitlab.com/wireshark/wireshark/-/issues/19081
- [debian-lts-announce] 20230603 [SECURITY] [DLA 3443-1] wireshark security update
- [debian-lts-announce] 20230603 [SECURITY] [DLA 3443-1] wireshark security update
- GLSA-202309-02
- GLSA-202309-02
- DSA-5429
- DSA-5429
- https://www.wireshark.org/security/wnpa-sec-2023-15.html
- https://www.wireshark.org/security/wnpa-sec-2023-15.html
Modified: 2025-01-16
CVE-2023-2879
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2879.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2879.json
- https://gitlab.com/wireshark/wireshark/-/issues/19068
- https://gitlab.com/wireshark/wireshark/-/issues/19068
- [debian-lts-announce] 20230603 [SECURITY] [DLA 3443-1] wireshark security update
- [debian-lts-announce] 20230603 [SECURITY] [DLA 3443-1] wireshark security update
- GLSA-202309-02
- GLSA-202309-02
- DSA-5429
- DSA-5429
- https://www.wireshark.org/security/wnpa-sec-2023-14.html
- https://www.wireshark.org/security/wnpa-sec-2023-14.html
Modified: 2025-01-13
CVE-2023-2952
XRA dissector infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2952.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2952.json
- https://gitlab.com/wireshark/wireshark/-/issues/19100
- https://gitlab.com/wireshark/wireshark/-/issues/19100
- [debian-lts-announce] 20230603 [SECURITY] [DLA 3443-1] wireshark security update
- [debian-lts-announce] 20230603 [SECURITY] [DLA 3443-1] wireshark security update
- GLSA-202309-02
- GLSA-202309-02
- DSA-5429
- DSA-5429
- https://www.wireshark.org/security/wnpa-sec-2023-20.html
- https://www.wireshark.org/security/wnpa-sec-2023-20.html
Package phosh updated to version 0.28.0-alt1.1 for branch sisyphus_riscv64.
Closed bugs
Не работает разблокровка экрана