ALT-BU-2023-4835-1
Branch sisyphus_riscv64 update bulletin.
Package hunspell updated to version 1.7.2-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2021-03393
Уязвимость функции SuggestMgr::leftcommonsubstring компонента suggestmgr.cxx программы для проверки правописания Hunspell, связанная с выходом операции за допустимые границы буфера данных, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-16707
Hunspell 1.7.0 has an invalid read operation in SuggestMgr::leftcommonsubstring in suggestmgr.cxx.
Package ntfs-3g updated to version 2022.10.3-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2022-03378
Уязвимость функции ntfs_get_attribute_value файловой системы NTFS для модуля FUSE NTFS-3G, позволяющая нарушителю выполнить произвольный код с повышенными привилегиями
BDU:2022-03700
Уязвимость функции ntfs_names_full_collate файловой системы NTFS для модуля FUSE NTFS-3G, позволяющая нарушителю выполнить произвольный код с повышенными привилегиями
BDU:2022-03701
Уязвимость функции ntfs_mft_rec_alloc файловой системы NTFS для модуля FUSE NTFS-3G, позволяющая нарушителю выполнить произвольный код с повышенными привилегиями
BDU:2022-03707
Уязвимость функции ntfs_check_log_client_array файловой системы NTFS для модуля FUSE NTFS-3G, позволяющая нарушителю выполнить произвольный код с повышенными привилегиями
BDU:2022-03917
Уязвимость функции check_file_record файловой системы NTFS для модуля FUSE NTFS-3G, позволяющая нарушителю выполнить произвольный код с повышенными привилегиями
BDU:2022-03919
Уязвимость функции fuse_kern_mount библиотеки libfuse-lite файловой системы NTFS для модуля FUSE NTFS-3G, позволяющая нарушителю выполнить произвольный код с повышенными привилегиями
BDU:2022-03924
Уязвимость функции fuse_lib_readdir библиотеки libfuse-lite файловой системы NTFS для модуля FUSE NTFS-3G, позволяющая нарушителю выполнить произвольный код с повышенными привилегиями
BDU:2022-03951
Уязвимость дескриптора файлов файловой системы NTFS для модуля FUSE NTFS-3G, позволяющая нарушителю выполнить произвольный код с повышенными привилегиями
BDU:2022-06607
Уязвимость утилиты ntfs-3g набора драйверов NTFS-3G реализации файловой системы NTFS, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2021-46790
ntfsck in NTFS-3G through 2021.8.22 has a heap-based buffer overflow involving buffer+512*3-2. NOTE: the upstream position is that ntfsck is deprecated; however, it is shipped by some Linux distributions.
- [oss-security] 20220526 OPEN SOURCE NTFS-3G SECURITY ADVISORY NTFS3G-SA-2022-0001
- [oss-security] 20220526 OPEN SOURCE NTFS-3G SECURITY ADVISORY NTFS3G-SA-2022-0001
- https://github.com/tuxera/ntfs-3g/issues/16
- https://github.com/tuxera/ntfs-3g/issues/16
- FEDORA-2022-8f775872c9
- FEDORA-2022-8f775872c9
- FEDORA-2022-13bc8c91b0
- FEDORA-2022-13bc8c91b0
- FEDORA-2022-8fa7e5aeaf
- FEDORA-2022-8fa7e5aeaf
- FEDORA-2022-1176b501f0
- FEDORA-2022-1176b501f0
- DSA-5160
- DSA-5160
Modified: 2024-11-21
CVE-2022-30783
An invalid return code in fuse_kern_mount enables intercepting of libfuse-lite protocol traffic between NTFS-3G and the kernel in NTFS-3G through 2021.8.22 when using libfuse-lite.
- [oss-security] 20220607 UNPAR-2022-0 Multiple Vulnerabilities in ntfs-3g NTFS Mount Tool
- [oss-security] 20220607 UNPAR-2022-0 Multiple Vulnerabilities in ntfs-3g NTFS Mount Tool
- https://github.com/tuxera/ntfs-3g/releases
- https://github.com/tuxera/ntfs-3g/releases
- https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-6mv4-4v73-xw58
- https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-6mv4-4v73-xw58
- [debian-lts-announce] 20220621 [SECURITY] [DLA 3055-1] ntfs-3g security update
- [debian-lts-announce] 20220621 [SECURITY] [DLA 3055-1] ntfs-3g security update
- FEDORA-2022-8f775872c9
- FEDORA-2022-8f775872c9
- FEDORA-2022-13bc8c91b0
- FEDORA-2022-13bc8c91b0
- FEDORA-2022-8fa7e5aeaf
- FEDORA-2022-8fa7e5aeaf
- FEDORA-2022-1176b501f0
- FEDORA-2022-1176b501f0
- GLSA-202301-01
- GLSA-202301-01
- DSA-5160
- DSA-5160
Modified: 2024-11-21
CVE-2022-30784
A crafted NTFS image can cause heap exhaustion in ntfs_get_attribute_value in NTFS-3G through 2021.8.22.
- https://github.com/tuxera/ntfs-3g/releases
- https://github.com/tuxera/ntfs-3g/releases
- https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-xchm-ph5h-hw4x
- https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-xchm-ph5h-hw4x
- [debian-lts-announce] 20220621 [SECURITY] [DLA 3055-1] ntfs-3g security update
- [debian-lts-announce] 20220621 [SECURITY] [DLA 3055-1] ntfs-3g security update
- FEDORA-2022-8f775872c9
- FEDORA-2022-8f775872c9
- FEDORA-2022-13bc8c91b0
- FEDORA-2022-13bc8c91b0
- FEDORA-2022-8fa7e5aeaf
- FEDORA-2022-8fa7e5aeaf
- FEDORA-2022-1176b501f0
- FEDORA-2022-1176b501f0
- GLSA-202301-01
- GLSA-202301-01
- DSA-5160
- DSA-5160
Modified: 2024-11-21
CVE-2022-30785
A file handle created in fuse_lib_opendir, and later used in fuse_lib_readdir, enables arbitrary memory read and write operations in NTFS-3G through 2021.8.22 when using libfuse-lite.
- [oss-security] 20220607 UNPAR-2022-0 Multiple Vulnerabilities in ntfs-3g NTFS Mount Tool
- [oss-security] 20220607 UNPAR-2022-0 Multiple Vulnerabilities in ntfs-3g NTFS Mount Tool
- https://github.com/tuxera/ntfs-3g/releases
- https://github.com/tuxera/ntfs-3g/releases
- https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-6mv4-4v73-xw58
- https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-6mv4-4v73-xw58
- [debian-lts-announce] 20220621 [SECURITY] [DLA 3055-1] ntfs-3g security update
- [debian-lts-announce] 20220621 [SECURITY] [DLA 3055-1] ntfs-3g security update
- FEDORA-2022-8f775872c9
- FEDORA-2022-8f775872c9
- FEDORA-2022-13bc8c91b0
- FEDORA-2022-13bc8c91b0
- FEDORA-2022-8fa7e5aeaf
- FEDORA-2022-8fa7e5aeaf
- FEDORA-2022-1176b501f0
- FEDORA-2022-1176b501f0
- GLSA-202301-01
- GLSA-202301-01
- DSA-5160
- DSA-5160
Modified: 2024-11-21
CVE-2022-30786
A crafted NTFS image can cause a heap-based buffer overflow in ntfs_names_full_collate in NTFS-3G through 2021.8.22.
- https://github.com/tuxera/ntfs-3g/releases
- https://github.com/tuxera/ntfs-3g/releases
- https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-xchm-ph5h-hw4x
- https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-xchm-ph5h-hw4x
- [debian-lts-announce] 20220621 [SECURITY] [DLA 3055-1] ntfs-3g security update
- [debian-lts-announce] 20220621 [SECURITY] [DLA 3055-1] ntfs-3g security update
- FEDORA-2022-8f775872c9
- FEDORA-2022-8f775872c9
- FEDORA-2022-13bc8c91b0
- FEDORA-2022-13bc8c91b0
- FEDORA-2022-8fa7e5aeaf
- FEDORA-2022-8fa7e5aeaf
- FEDORA-2022-1176b501f0
- FEDORA-2022-1176b501f0
- GLSA-202301-01
- GLSA-202301-01
- DSA-5160
- DSA-5160
Modified: 2024-11-21
CVE-2022-30787
An integer underflow in fuse_lib_readdir enables arbitrary memory read operations in NTFS-3G through 2021.8.22 when using libfuse-lite.
- [oss-security] 20220607 UNPAR-2022-0 Multiple Vulnerabilities in ntfs-3g NTFS Mount Tool
- [oss-security] 20220607 UNPAR-2022-0 Multiple Vulnerabilities in ntfs-3g NTFS Mount Tool
- https://github.com/tuxera/ntfs-3g/releases
- https://github.com/tuxera/ntfs-3g/releases
- https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-6mv4-4v73-xw58
- https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-6mv4-4v73-xw58
- [debian-lts-announce] 20220621 [SECURITY] [DLA 3055-1] ntfs-3g security update
- [debian-lts-announce] 20220621 [SECURITY] [DLA 3055-1] ntfs-3g security update
- FEDORA-2022-8f775872c9
- FEDORA-2022-8f775872c9
- FEDORA-2022-13bc8c91b0
- FEDORA-2022-13bc8c91b0
- FEDORA-2022-8fa7e5aeaf
- FEDORA-2022-8fa7e5aeaf
- FEDORA-2022-1176b501f0
- FEDORA-2022-1176b501f0
- GLSA-202301-01
- GLSA-202301-01
- DSA-5160
- DSA-5160
Modified: 2024-11-21
CVE-2022-30788
A crafted NTFS image can cause a heap-based buffer overflow in ntfs_mft_rec_alloc in NTFS-3G through 2021.8.22.
- https://github.com/tuxera/ntfs-3g/releases
- https://github.com/tuxera/ntfs-3g/releases
- https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-xchm-ph5h-hw4x
- https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-xchm-ph5h-hw4x
- [debian-lts-announce] 20220621 [SECURITY] [DLA 3055-1] ntfs-3g security update
- [debian-lts-announce] 20220621 [SECURITY] [DLA 3055-1] ntfs-3g security update
- FEDORA-2022-8f775872c9
- FEDORA-2022-8f775872c9
- FEDORA-2022-13bc8c91b0
- FEDORA-2022-13bc8c91b0
- FEDORA-2022-8fa7e5aeaf
- FEDORA-2022-8fa7e5aeaf
- FEDORA-2022-1176b501f0
- FEDORA-2022-1176b501f0
- GLSA-202301-01
- GLSA-202301-01
- DSA-5160
- DSA-5160
Modified: 2024-11-21
CVE-2022-30789
A crafted NTFS image can cause a heap-based buffer overflow in ntfs_check_log_client_array in NTFS-3G through 2021.8.22.
- https://github.com/tuxera/ntfs-3g/releases
- https://github.com/tuxera/ntfs-3g/releases
- https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-xchm-ph5h-hw4x
- https://github.com/tuxera/ntfs-3g/security/advisories/GHSA-xchm-ph5h-hw4x
- [debian-lts-announce] 20220621 [SECURITY] [DLA 3055-1] ntfs-3g security update
- [debian-lts-announce] 20220621 [SECURITY] [DLA 3055-1] ntfs-3g security update
- FEDORA-2022-8f775872c9
- FEDORA-2022-8f775872c9
- FEDORA-2022-13bc8c91b0
- FEDORA-2022-13bc8c91b0
- FEDORA-2022-8fa7e5aeaf
- FEDORA-2022-8fa7e5aeaf
- FEDORA-2022-1176b501f0
- FEDORA-2022-1176b501f0
- GLSA-202301-01
- GLSA-202301-01
- DSA-5160
- DSA-5160
Modified: 2024-11-21
CVE-2022-40284
A buffer overflow was discovered in NTFS-3G before 2022.10.3. Crafted metadata in an NTFS image can cause code execution. A local attacker can exploit this if the ntfs-3g binary is setuid root. A physically proximate attacker can exploit this if NTFS-3G software is configured to execute upon attachment of an external storage device.
- http://www.openwall.com/lists/oss-security/2022/10/31/2
- http://www.openwall.com/lists/oss-security/2022/10/31/2
- https://github.com/tuxera/ntfs-3g/releases
- https://github.com/tuxera/ntfs-3g/releases
- [debian-lts-announce] 20221121 [SECURITY] [DLA 3201-1] ntfs-3g security update
- [debian-lts-announce] 20221121 [SECURITY] [DLA 3201-1] ntfs-3g security update
- FEDORA-2022-14f11bfc73
- FEDORA-2022-14f11bfc73
- FEDORA-2022-4915124227
- FEDORA-2022-4915124227
- FEDORA-2022-243616c548
- FEDORA-2022-243616c548
- GLSA-202301-01
- GLSA-202301-01
Package qemu updated to version 8.0.3-alt0.1.rv64 for branch sisyphus_riscv64.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2023-0330
A vulnerability in the lsi53c895a device affects the latest version of qemu. A DMA-MMIO reentrancy problem may lead to memory corruption bugs like stack overflow or use-after-free.
- https://access.redhat.com/security/cve/CVE-2023-0330
- https://access.redhat.com/security/cve/CVE-2023-0330
- RHBZ#2160151
- RHBZ#2160151
- [debian-lts-announce] 20231005 [SECURITY] [DLA 3604-1] qemu security update
- [debian-lts-announce] 20231005 [SECURITY] [DLA 3604-1] qemu security update
- https://lists.nongnu.org/archive/html/qemu-devel/2023-01/msg03411.html
- https://lists.nongnu.org/archive/html/qemu-devel/2023-01/msg03411.html
Modified: 2024-11-21
CVE-2023-2861
A flaw was found in the 9p passthrough filesystem (9pfs) implementation in QEMU. The 9pfs server did not prohibit opening special files on the host side, potentially allowing a malicious client to escape from the exported 9p tree by creating and opening a device file in the shared folder.
- https://access.redhat.com/security/cve/CVE-2023-2861
- RHBZ#2219266
- https://lists.debian.org/debian-lts-announce/2024/03/msg00012.html
- https://security.netapp.com/advisory/ntap-20240125-0005/
- https://security.netapp.com/advisory/ntap-20240229-0002/
- https://access.redhat.com/security/cve/CVE-2023-2861
- https://security.netapp.com/advisory/ntap-20240229-0002/
- https://security.netapp.com/advisory/ntap-20240125-0005/
- https://lists.debian.org/debian-lts-announce/2024/03/msg00012.html
- RHBZ#2219266
Modified: 2024-11-21
CVE-2023-3301
A flaw was found in QEMU. The async nature of hot-unplug enables a race scenario where the net device backend is cleared before the virtio-net pci frontend has been unplugged. A malicious guest could use this time window to trigger an assertion and cause a denial of service.
Package deepin-default-settings updated to version 2023.08.07-alt1 for branch sisyphus_riscv64.
Closed bugs
deepin-default-settings ломает работу xdg-user-dirs
Package rust updated to version 1.71.1-alt0.1.rv64 for branch sisyphus_riscv64.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2023-38497
Cargo downloads the Rust project’s dependencies and compiles the project. Cargo prior to version 0.72.2, bundled with Rust prior to version 1.71.1, did not respect the umask when extracting crate archives on UNIX-like systems. If the user downloaded a crate containing files writeable by any local user, another local user could exploit this to change the source code compiled and executed by the current user. To prevent existing cached extractions from being exploitable, the Cargo binary version 0.72.2 included in Rust 1.71.1 or later will purge caches generated by older Cargo versions automatically. As a workaround, configure one's system to prevent other local users from accessing the Cargo directory, usually located in `~/.cargo`.
- https://en.wikipedia.org/wiki/Umask
- https://en.wikipedia.org/wiki/Umask
- https://github.com/rust-lang/cargo/commit/d78bbf4bde3c6b95caca7512f537c6f9721426ff
- https://github.com/rust-lang/cargo/commit/d78bbf4bde3c6b95caca7512f537c6f9721426ff
- https://github.com/rust-lang/cargo/pull/12443
- https://github.com/rust-lang/cargo/pull/12443
- https://github.com/rust-lang/cargo/security/advisories/GHSA-j3xp-wfr4-hx87
- https://github.com/rust-lang/cargo/security/advisories/GHSA-j3xp-wfr4-hx87
- https://github.com/rust-lang/wg-security-response/tree/main/patches/CVE-2023-38497
- https://github.com/rust-lang/wg-security-response/tree/main/patches/CVE-2023-38497
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGKE6PGM4HIQUHPJRBQAHMELINSGN4H4/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QGKE6PGM4HIQUHPJRBQAHMELINSGN4H4/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMEXGUGPW5OBSQA6URTBNDSU3RAEFOZ4/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QMEXGUGPW5OBSQA6URTBNDSU3RAEFOZ4/
- https://www.rust-lang.org/policies/security
- https://www.rust-lang.org/policies/security