ALT-BU-2023-5048-3
Branch sisyphus update bulletin.
Closed bugs
glibc-core: неполные зависимости -- нерабочий pthread_cancel
Package libcryptopp updated to version 8.8.0-alt1 for branch sisyphus in task 327592.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-43398
Crypto++ (aka Cryptopp) 8.6.0 and earlier contains a timing leakage in MakePublicKey(). There is a clear correlation between execution time and private key length, which may cause disclosure of the length information of the private key. This might allow attackers to conduct timing attacks. NOTE: this report is disputed by the vendor and multiple third parties. The execution-time differences are intentional. A user may make a choice of a longer key as a tradeoff between strength and performance. In making this choice, the amount of information leaked to an adversary is of infinitesimal value
Package kernel-image-centos updated to version 5.14.0.357-alt1.el9 for branch sisyphus in task 327604.
Closed vulnerabilities
BDU:2023-00625
Уязвимость системы управления памятью ядра операционной системы Linux, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2023-03727
Уязвимость функции io_poll_update() в модуле io_uring/io_uring.c ядра операционной системы Linux, позволяющая нарушителю повысить свои привилегии
BDU:2023-04268
Уязвимость функции xfrm_update_ae_params() в модуле net/xfrm/xfrm_user.c подсистемы XFRM ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-04661
Уязвимость функции exfat_get_uniname_from_ext_entry() в модуле fs/exfat/dir.c файловой системе exFAT ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2023-04663
Уязвимость микропрограммного обеспечения процессоров Intel, связанная с утечкой информации из векторных регистров, позволяющая нарушителю получить доступ к защищаемой информации
Modified: 2024-11-21
CVE-2022-40982
Information exposure through microarchitectural state after transient execution in certain vector execution units for some Intel(R) Processors may allow an authenticated user to potentially enable information disclosure via local access.
- http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html
- http://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00828.html
- http://xenbits.xen.org/xsa/advisory-435.html
- https://access.redhat.com/solutions/7027704
- https://access.redhat.com/solutions/7027704
- https://aws.amazon.com/security/security-bulletins/AWS-2023-007/
- https://aws.amazon.com/security/security-bulletins/AWS-2023-007/
- https://downfall.page
- https://downfall.page
- https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html
- https://lists.debian.org/debian-lts-announce/2023/08/msg00013.html
- https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html
- https://lists.debian.org/debian-lts-announce/2023/08/msg00026.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKKYIK2EASDNUV4I7EFJKNBVO3KCKGRR/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/HKREYYTWUY7ZDNIB2N6H5BUJ3LE5VZPE/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OL7WI2TJCWSZIQP2RIOLWHOKLM25M44J/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/T7WO5JM74YJSYAE5RBV4DC6A4YLEKWLF/
- https://security.netapp.com/advisory/ntap-20230811-0001/
- https://security.netapp.com/advisory/ntap-20230811-0001/
- https://www.debian.org/security/2023/dsa-5474
- https://www.debian.org/security/2023/dsa-5474
- https://www.debian.org/security/2023/dsa-5475
- https://www.debian.org/security/2023/dsa-5475
- https://xenbits.xen.org/xsa/advisory-435.html
- https://xenbits.xen.org/xsa/advisory-435.html
Modified: 2025-03-12
CVE-2023-0597
A flaw possibility of memory leak in the Linux kernel cpu_entry_area mapping of X86 CPU data to memory was found in the way user can guess location of exception stack(s) or other important data. A local user could use this flaw to get access to some important data with expected location in memory.
- [oss-security] 20230728 Re: StackRot (CVE-2023-3269): Linux kernel privilege escalation vulnerability
- [oss-security] 20230728 Re: StackRot (CVE-2023-3269): Linux kernel privilege escalation vulnerability
- https://git.kernel.org/linus/97e3d26b5e5f371b3ee223d94dd123e6c442ba80
- https://git.kernel.org/linus/97e3d26b5e5f371b3ee223d94dd123e6c442ba80
- https://www.openwall.com/lists/oss-security/2023/07/28/1
Modified: 2025-02-13
CVE-2023-3389
A use-after-free vulnerability in the Linux Kernel io_uring subsystem can be exploited to achieve local privilege escalation. Racing a io_uring cancel poll request with a linked timeout can cause a UAF in a hrtimer. We recommend upgrading past commit ef7dfac51d8ed961b742218f526bd589f3900a59 (4716c73b188566865bdd79c3a6709696a224ac04 for 5.10 stable and 0e388fce7aec40992eadee654193cad345d62663 for 5.15 stable).
- http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html
- http://packetstormsecurity.com/files/174577/Kernel-Live-Patch-Security-Notice-LSN-0097-1.html
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.10.y&id=4716c73b188566865bdd79c3a6709696a224ac04
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.10.y&id=4716c73b188566865bdd79c3a6709696a224ac04
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.15.y&id=0e388fce7aec40992eadee654193cad345d62663
- https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=linux-5.15.y&id=0e388fce7aec40992eadee654193cad345d62663
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef7dfac51d8ed961b742218f526bd589f3900a59
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=ef7dfac51d8ed961b742218f526bd589f3900a59
- https://kernel.dance/0e388fce7aec40992eadee654193cad345d62663
- https://kernel.dance/0e388fce7aec40992eadee654193cad345d62663
- https://kernel.dance/4716c73b188566865bdd79c3a6709696a224ac04
- https://kernel.dance/4716c73b188566865bdd79c3a6709696a224ac04
- https://kernel.dance/ef7dfac51d8ed961b742218f526bd589f3900a59
- https://kernel.dance/ef7dfac51d8ed961b742218f526bd589f3900a59
- https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
- https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
- https://security.netapp.com/advisory/ntap-20230731-0001/
- https://security.netapp.com/advisory/ntap-20230731-0001/
- https://www.debian.org/security/2023/dsa-5480
- https://www.debian.org/security/2023/dsa-5480
Modified: 2024-11-21
CVE-2023-3772
A flaw was found in the Linux kernel’s IP framework for transforming packets (XFRM subsystem). This issue may allow a malicious user with CAP_NET_ADMIN privileges to directly dereference a NULL pointer in xfrm_update_ae_params(), leading to a possible kernel crash and denial of service.
- http://www.openwall.com/lists/oss-security/2023/08/10/1
- http://www.openwall.com/lists/oss-security/2023/08/10/3
- RHSA-2023:6583
- RHSA-2023:6583
- RHSA-2023:6901
- RHSA-2023:6901
- RHSA-2023:7077
- RHSA-2023:7077
- RHSA-2024:0412
- RHSA-2024:0412
- RHSA-2024:0575
- RHSA-2024:0575
- https://access.redhat.com/security/cve/CVE-2023-3772
- https://access.redhat.com/security/cve/CVE-2023-3772
- RHBZ#2218943
- RHBZ#2218943
- https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
- https://lists.debian.org/debian-lts-announce/2024/01/msg00004.html
- https://www.debian.org/security/2023/dsa-5492
Modified: 2024-11-21
CVE-2023-4273
A flaw was found in the exFAT driver of the Linux kernel. The vulnerability exists in the implementation of the file name reconstruction function, which is responsible for reading file name entries from a directory index and merging file name parts belonging to one file into a single long file name. Since the file name characters are copied into a stack variable, a local privileged attacker could use this flaw to overflow the kernel stack.
- RHSA-2023:6583
- RHSA-2023:6583
- https://access.redhat.com/security/cve/CVE-2023-4273
- https://access.redhat.com/security/cve/CVE-2023-4273
- RHBZ#2221609
- RHBZ#2221609
- https://dfir.ru/2023/08/23/cve-2023-4273-a-vulnerability-in-the-linux-exfat-driver/
- https://dfir.ru/2023/08/23/cve-2023-4273-a-vulnerability-in-the-linux-exfat-driver/
- https://lists.debian.org/debian-lts-announce/2023/10/msg00027.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/344H6HO6SSC4KT7PDFXSDIXKMKHISSGF/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/3TYLSJ2SAI7RF56ZLQ5CQWCJLVJSD73Q/
- https://security.netapp.com/advisory/ntap-20231027-0002/
- https://www.debian.org/security/2023/dsa-5480
- https://www.debian.org/security/2023/dsa-5492
Closed bugs
gdm-data depends on xterm
Исключить из списка выбора сессий в GDM сессию default
Closed vulnerabilities
BDU:2024-02513
Уязвимость компонента Setting Handler менеджера паролей KeePassXC, позволяющая нарушителю обойти существующие ограничения безопасности
Modified: 2024-12-11
CVE-2023-35866
In KeePassXC through 2.7.5, a local attacker can make changes to the Database security settings, including master password and second-factor authentication, within an authenticated KeePassXC Database session, without the need to authenticate these changes by entering the password and/or second-factor authentication to confirm changes. NOTE: the vendor's position is "asking the user for their password prior to making any changes to the database settings adds no additional protection against a local attacker."
- https://github.com/keepassxreboot/keepassxc/issues/9339
- https://github.com/keepassxreboot/keepassxc/issues/9339
- https://github.com/keepassxreboot/keepassxc/issues/9339#issuecomment-1598219482
- https://github.com/keepassxreboot/keepassxc/issues/9339#issuecomment-1598219482
- https://github.com/keepassxreboot/keepassxc/issues/9391
- https://github.com/keepassxreboot/keepassxc/issues/9391
- https://keepassxc.org/docs/#faq-yubikey-2fa
- https://keepassxc.org/docs/#faq-yubikey-2fa
- https://medium.com/%40cybercitizen.tech/keepassxc-vulnerability-cve-2023-35866-dc7d447c4903
- https://medium.com/%40cybercitizen.tech/keepassxc-vulnerability-cve-2023-35866-dc7d447c4903
Closed vulnerabilities
BDU:2023-05674
Уязвимость текстового редактора vim, связанная с ошибкой деления на ноль, позволяющая нарушителю выполнить произвольный код
Modified: 2025-02-13
CVE-2023-3896
Divide By Zero in vim/vim from 9.0.1367-1 to 9.0.1367-3