ALT-BU-2023-5187-1
Branch sisyphus_mipsel update bulletin.
Package node-eslint updated to version 8.47.0-alt1 for branch sisyphus_mipsel.
Closed bugs
eslint: too old
Package setup updated to version 2.2.18-alt1 for branch sisyphus_mipsel.
Closed bugs
protocols содержит недостоверные данные по протоколам 50 и 51.
posix_openpt непривилегированным пользователем
Package systemd updated to version 253.8-alt0.1.port for branch sisyphus_mipsel.
Closed vulnerabilities
Modified: 2025-05-05
CVE-2022-4415
A vulnerability was found in systemd. This security flaw can cause a local information leak due to systemd-coredump not respecting the fs.suid_dumpable kernel setting.
- https://github.com/systemd/systemd/commit/b7641425659243c09473cd8fb3aef2c0d4a3eb9c
- https://github.com/systemd/systemd/commit/b7641425659243c09473cd8fb3aef2c0d4a3eb9c
- https://security.netapp.com/advisory/ntap-20230216-0010/
- https://www.openwall.com/lists/oss-security/2022/12/21/3
- https://www.openwall.com/lists/oss-security/2022/12/21/3
Modified: 2025-04-25
CVE-2022-45873
systemd 250 and 251 allows local users to achieve a systemd-coredump deadlock by triggering a crash that has a long backtrace. This occurs in parse_elf_object in shared/elf-util.c. The exploitation methodology is to crash a binary calling the same function recursively, and put it in a deeply nested directory to make its backtrace large enough to cause the deadlock. This must be done 16 times when MaxConnections=16 is set for the systemd/units/systemd-coredump.socket file.
- https://github.com/systemd/systemd/commit/076b807be472630692c5348c60d0c2b7b28ad437
- https://github.com/systemd/systemd/commit/076b807be472630692c5348c60d0c2b7b28ad437
- https://github.com/systemd/systemd/pull/24853#issuecomment-1326561497
- https://github.com/systemd/systemd/pull/24853#issuecomment-1326561497
- https://github.com/systemd/systemd/pull/25055#issuecomment-1313733553
- https://github.com/systemd/systemd/pull/25055#issuecomment-1313733553
- FEDORA-2022-ef4f57b072
- FEDORA-2022-ef4f57b072