ALT-BU-2023-3937-1
Branch sisyphus update bulletin.
Closed bugs
GRUB_VMLINUZ_SYMLINKS default==yes
Package cinnamon-menus updated to version 5.8.0-alt1 for branch sisyphus in task 323483.
Closed bugs
В описании пакета cinnamon-menus указано, что его не должно быть в репозитории
Closed vulnerabilities
BDU:2023-03436
Уязвимость сервера DNS BIND, связанная с переполнением буфера в стеке при работе BIND в качестве «резолвера», позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2023-2828
Every `named` instance configured to run as a recursive resolver maintains a cache database holding the responses to the queries it has recently sent to authoritative servers. The size limit for that cache database can be configured using the `max-cache-size` statement in the configuration file; it defaults to 90% of the total amount of memory available on the host. When the size of the cache reaches 7/8 of the configured limit, a cache-cleaning algorithm starts to remove expired and/or least-recently used RRsets from the cache, to keep memory use below the configured limit. It has been discovered that the effectiveness of the cache-cleaning algorithm used in `named` can be severely diminished by querying the resolver for specific RRsets in a certain order, effectively allowing the configured `max-cache-size` limit to be significantly exceeded. This issue affects BIND 9 versions 9.11.0 through 9.16.41, 9.18.0 through 9.18.15, 9.19.0 through 9.19.13, 9.11.3-S1 through 9.16.41-S1, and 9.18.11-S1 through 9.18.15-S1.
- http://www.openwall.com/lists/oss-security/2023/06/21/6
- https://kb.isc.org/docs/cve-2023-2828
- https://lists.debian.org/debian-lts-announce/2023/07/msg00021.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SEFCEVCTYEMKTWA7V7EYPI5YQQ4JWDLI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3K6AJK7RRSR53HRF5GGKPA6PDUDWOD2/
- https://security.netapp.com/advisory/ntap-20230703-0010/
- https://www.debian.org/security/2023/dsa-5439
- http://www.openwall.com/lists/oss-security/2023/06/21/6
- https://kb.isc.org/docs/cve-2023-2828
- https://lists.debian.org/debian-lts-announce/2023/07/msg00021.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SEFCEVCTYEMKTWA7V7EYPI5YQQ4JWDLI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3K6AJK7RRSR53HRF5GGKPA6PDUDWOD2/
- https://security.netapp.com/advisory/ntap-20230703-0010/
- https://www.debian.org/security/2023/dsa-5439
Modified: 2024-11-21
CVE-2023-2911
If the `recursive-clients` quota is reached on a BIND 9 resolver configured with both `stale-answer-enable yes;` and `stale-answer-client-timeout 0;`, a sequence of serve-stale-related lookups could cause `named` to loop and terminate unexpectedly due to a stack overflow. This issue affects BIND 9 versions 9.16.33 through 9.16.41, 9.18.7 through 9.18.15, 9.16.33-S1 through 9.16.41-S1, and 9.18.11-S1 through 9.18.15-S1.
- http://www.openwall.com/lists/oss-security/2023/06/21/6
- https://kb.isc.org/docs/cve-2023-2911
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SEFCEVCTYEMKTWA7V7EYPI5YQQ4JWDLI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3K6AJK7RRSR53HRF5GGKPA6PDUDWOD2/
- https://security.netapp.com/advisory/ntap-20230703-0010/
- https://www.debian.org/security/2023/dsa-5439
- http://www.openwall.com/lists/oss-security/2023/06/21/6
- https://kb.isc.org/docs/cve-2023-2911
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SEFCEVCTYEMKTWA7V7EYPI5YQQ4JWDLI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U3K6AJK7RRSR53HRF5GGKPA6PDUDWOD2/
- https://security.netapp.com/advisory/ntap-20230703-0010/
- https://www.debian.org/security/2023/dsa-5439
Package LibreOffice updated to version 7.5.4.2-alt1 for branch sisyphus in task 322651.
Closed vulnerabilities
BDU:2023-02967
Уязвимость модуля Spreadsheet пакета офисных программ LibreOffice, позволяющая нарушителю выполнить произвольный код
BDU:2023-02968
Уязвимость компонента Floating Frames пакета офисных программ LibreOffice, позволяющая нарушителю выполнить спуфинговую атаку
Modified: 2025-04-23
CVE-2023-0950
Improper Validation of Array Index vulnerability in the spreadsheet component of The Document Foundation LibreOffice allows an attacker to craft a spreadsheet document that will cause an array index underflow when loaded. In the affected versions of LibreOffice certain malformed spreadsheet formulas, such as AGGREGATE, could be created with less parameters passed to the formula interpreter than it expected, leading to an array index underflow, in which case there is a risk that arbitrary code could be executed. This issue affects: The Document Foundation LibreOffice 7.4 versions prior to 7.4.6; 7.5 versions prior to 7.5.1.
- https://lists.debian.org/debian-lts-announce/2023/08/msg00014.html
- https://security.gentoo.org/glsa/202311-15
- https://www.debian.org/security/2023/dsa-5415
- https://www.libreoffice.org/about-us/security/advisories/CVE-2023-0950
- https://lists.debian.org/debian-lts-announce/2023/08/msg00014.html
- https://security.gentoo.org/glsa/202311-15
- https://www.debian.org/security/2023/dsa-5415
- https://www.libreoffice.org/about-us/security/advisories/CVE-2023-0950
Modified: 2024-11-21
CVE-2023-2255
Improper access control in editor components of The Document Foundation LibreOffice allowed an attacker to craft a document that would cause external links to be loaded without prompt. In the affected versions of LibreOffice documents that used "floating frames" linked to external files, would load the contents of those frames without prompting the user for permission to do so. This was inconsistent with the treatment of other linked content in LibreOffice. This issue affects: The Document Foundation LibreOffice 7.4 versions prior to 7.4.7; 7.5 versions prior to 7.5.3.
- https://lists.debian.org/debian-lts-announce/2023/08/msg00014.html
- https://security.gentoo.org/glsa/202311-15
- https://www.debian.org/security/2023/dsa-5415
- https://www.libreoffice.org/about-us/security/advisories/CVE-2023-2255
- https://lists.debian.org/debian-lts-announce/2023/08/msg00014.html
- https://security.gentoo.org/glsa/202311-15
- https://www.debian.org/security/2023/dsa-5415
- https://www.libreoffice.org/about-us/security/advisories/CVE-2023-2255
