ALT-BU-2023-4198-1
Branch sisyphus_mipsel update bulletin.
Package desktop-file-utils updated to version 0.26-alt4 for branch sisyphus_mipsel.
Closed bugs
update-desktop-database.filetrigger не учитывает $XDG_DATA_DIRS
Package libssh updated to version 0.10.5-alt1 for branch sisyphus_mipsel.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2023-1667
A NULL pointer dereference was found In libssh during re-keying with algorithm guessing. This issue may allow an authenticated client to cause a denial of service.
- http://www.libssh.org/security/advisories/CVE-2023-1667.txt
- http://www.libssh.org/security/advisories/CVE-2023-1667.txt
- https://access.redhat.com/security/cve/CVE-2023-1667
- https://access.redhat.com/security/cve/CVE-2023-1667
- https://bugzilla.redhat.com/show_bug.cgi?id=2182199
- https://bugzilla.redhat.com/show_bug.cgi?id=2182199
- [debian-lts-announce] 20230529 [SECURITY] [DLA 3437-1] libssh security update
- [debian-lts-announce] 20230529 [SECURITY] [DLA 3437-1] libssh security update
- FEDORA-2023-5fa5ca2043
- FEDORA-2023-5fa5ca2043
- GLSA-202312-05
- GLSA-202312-05
Modified: 2024-11-21
CVE-2023-2283
A vulnerability was found in libssh, where the authentication check of the connecting client can be bypassed in the`pki_verify_data_signature` function in memory allocation problems. This issue may happen if there is insufficient memory or the memory usage is limited. The problem is caused by the return value `rc,` which is initialized to SSH_ERROR and later rewritten to save the return value of the function call `pki_key_check_hash_compatible.` The value of the variable is not changed between this point and the cryptographic verification. Therefore any error between them calls `goto error` returning SSH_OK.
- http://packetstormsecurity.com/files/172861/libssh-0.9.6-0.10.4-pki_verify_data_signature-Authorization-Bypass.html
- https://access.redhat.com/security/cve/CVE-2023-2283
- https://bugzilla.redhat.com/show_bug.cgi?id=2189736
- FEDORA-2023-5fa5ca2043
- GLSA-202312-05
- https://security.netapp.com/advisory/ntap-20240201-0005/
- https://www.libssh.org/security/advisories/CVE-2023-2283.txt
- http://packetstormsecurity.com/files/172861/libssh-0.9.6-0.10.4-pki_verify_data_signature-Authorization-Bypass.html
- https://www.libssh.org/security/advisories/CVE-2023-2283.txt
- https://security.netapp.com/advisory/ntap-20240201-0005/
- GLSA-202312-05
- FEDORA-2023-5fa5ca2043
- https://bugzilla.redhat.com/show_bug.cgi?id=2189736
- https://access.redhat.com/security/cve/CVE-2023-2283
Package dbus updated to version 1.14.8-alt1 for branch sisyphus_mipsel.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2023-34969
D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.
- https://gitlab.freedesktop.org/dbus/dbus/-/issues/457
- [debian-lts-announce] 20231023 [SECURITY] [DLA 3628-1] dbus security update
- FEDORA-2023-d22162d9ba
- https://security.netapp.com/advisory/ntap-20231208-0007/
- https://gitlab.freedesktop.org/dbus/dbus/-/issues/457
- https://security.netapp.com/advisory/ntap-20231208-0007/
- FEDORA-2023-d22162d9ba
- [debian-lts-announce] 20231023 [SECURITY] [DLA 3628-1] dbus security update
Closed bugs
CVE-2023-34969