ALT-BU-2023-7527-2
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2024-10-08
BDU:2023-07419
Уязвимость пакета программ сетевого взаимодействия Samba, связанная с переполнением буфера в динамической памяти, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2023-5568
A heap-based Buffer Overflow flaw was discovered in Samba. It could allow a remote, authenticated attacker to exploit this vulnerability to cause a denial of service.
- https://access.redhat.com/security/cve/CVE-2023-5568
- https://bugzilla.redhat.com/show_bug.cgi?id=2245174
- https://bugzilla.samba.org/show_bug.cgi?id=15491
- https://www.samba.org/samba/history/samba-4.19.2.html
- https://access.redhat.com/security/cve/CVE-2023-5568
- https://bugzilla.redhat.com/show_bug.cgi?id=2245174
- https://bugzilla.samba.org/show_bug.cgi?id=15491
- https://security.netapp.com/advisory/ntap-20231124-0007/
- https://www.samba.org/samba/history/samba-4.19.2.html
Closed bugs
Создание и переименование объекта групповой политики. Возможно ввести пустое имя
Переименование группы. Имя группы (до Windows 2000) автоматически не заполняется при вводе имени
Неправильная иконка компьютера при отключении/включении
Closed vulnerabilities
Modified: 2024-04-17
BDU:2023-06834
Уязвимость диссектора RTPS анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-04-03
BDU:2023-08203
Уязвимость парсера файлов NetScreen анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2026-04-09
BDU:2023-08355
Уязвимость SSH-диссектора анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-06-06
BDU:2024-01586
Уязвимость функции dissect_bgp_open() анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-06-06
BDU:2024-01599
Уязвимость компонента pan/addr_resolv.c программы для анализа трафика Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-06-06
BDU:2024-01613
Уязвимость функции format_fractional_part_nsecs анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2023-5371
RTPS dissector memory leak in Wireshark 4.0.0 to 4.0.8 and 3.6.0 to 3.6.16 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/wireshark/wireshark/-/issues/19322
- https://www.wireshark.org/security/wnpa-sec-2023-27.html
- https://gitlab.com/wireshark/wireshark/-/issues/19322
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/34DBP5P2RHQ7XUABPANYYMOGV5KS6VEP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MADSCHKZSCKQ5NLIX3UMOIJD2JZ65L4V/
- https://security.gentoo.org/glsa/202402-09
- https://www.wireshark.org/security/wnpa-sec-2023-27.html
Modified: 2024-11-21
CVE-2023-6174
SSH dissector crash in Wireshark 4.0.0 to 4.0.10 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/wireshark/wireshark/-/issues/19369
- https://www.wireshark.org/security/wnpa-sec-2023-28.html
- https://gitlab.com/wireshark/wireshark/-/issues/19369
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/34DBP5P2RHQ7XUABPANYYMOGV5KS6VEP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MADSCHKZSCKQ5NLIX3UMOIJD2JZ65L4V/
- https://security.gentoo.org/glsa/202402-09
- https://www.debian.org/security/2023/dsa-5559
- https://www.wireshark.org/security/wnpa-sec-2023-28.html
Modified: 2025-11-04
CVE-2023-6175
NetScreen file parser crash in Wireshark 4.0.0 to 4.0.10 and 3.6.0 to 3.6.18 allows denial of service via crafted capture file
- https://gitlab.com/wireshark/wireshark/-/issues/19404
- https://www.wireshark.org/security/wnpa-sec-2023-29.html
- https://gitlab.com/wireshark/wireshark/-/issues/19404
- https://lists.debian.org/debian-lts-announce/2024/02/msg00016.html
- https://lists.debian.org/debian-lts-announce/2024/09/msg00049.html
- https://www.wireshark.org/security/wnpa-sec-2023-29.html
Modified: 2025-11-04
CVE-2024-24476
A buffer overflow in Wireshark before 4.2.0 allows a remote attacker to cause a denial of service via the pan/addr_resolv.c, and ws_manuf_lookup_str(), size components. NOTE: this is disputed by the vendor because neither release 4.2.0 nor any other release was affected.
- https://gist.github.com/1047524396/369ba0ccffe255cf8142208b6142be2b
- https://github.com/wireshark/wireshark/commit/108217f4bb1afb8b25fc705c2722b3e328b1ad78
- https://gitlab.com/wireshark/wireshark/-/issues/19344
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZT2BX7UARZVVWKITSZMHW7BHXGIKRSR2/
- https://gist.github.com/1047524396/369ba0ccffe255cf8142208b6142be2b
- https://github.com/wireshark/wireshark/commit/108217f4bb1afb8b25fc705c2722b3e328b1ad78
- https://gitlab.com/wireshark/wireshark/-/issues/19344
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZT2BX7UARZVVWKITSZMHW7BHXGIKRSR2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZT2BX7UARZVVWKITSZMHW7BHXGIKRSR2/
Modified: 2025-04-14
CVE-2024-24478
An issue in Wireshark before 4.2.0 allows a remote attacker to cause a denial of service via the packet-bgp.c, dissect_bgp_open(tvbuff_t*tvb, proto_tree*tree, packet_info*pinfo), optlen components. NOTE: this is disputed by the vendor because neither release 4.2.0 nor any other release was affected.
- https://gist.github.com/1047524396/e82c55147cd3cb62ef20cbdb0ec83694
- https://github.com/wireshark/wireshark/commit/80a4dc55f4d2fa33c2b36a99406500726d3faaef
- https://gitlab.com/wireshark/wireshark/-/issues/19347
- https://gist.github.com/1047524396/e82c55147cd3cb62ef20cbdb0ec83694
- https://github.com/wireshark/wireshark/commit/80a4dc55f4d2fa33c2b36a99406500726d3faaef
- https://gitlab.com/wireshark/wireshark/-/issues/19347
Modified: 2025-11-04
CVE-2024-24479
A Buffer Overflow in Wireshark before 4.2.0 allows a remote attacker to cause a denial of service via the wsutil/to_str.c, and format_fractional_part_nsecs components. NOTE: this is disputed by the vendor because neither release 4.2.0 nor any other release was affected.
- https://gist.github.com/1047524396/c50ad17e9a1a18990043a7cd27814c78
- https://github.com/wireshark/wireshark/commit/c3720cff158c265dec2a0c6104b1d65954ae6bfd
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZT2BX7UARZVVWKITSZMHW7BHXGIKRSR2/
- https://gist.github.com/1047524396/c50ad17e9a1a18990043a7cd27814c78
- https://github.com/wireshark/wireshark/commit/c3720cff158c265dec2a0c6104b1d65954ae6bfd
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZT2BX7UARZVVWKITSZMHW7BHXGIKRSR2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZT2BX7UARZVVWKITSZMHW7BHXGIKRSR2/
Package rabbitmq-c updated to version 0.13.0-alt2 for branch sisyphus in task 334972.
Closed vulnerabilities
Modified: 2026-03-04
BDU:2024-06934
Уязвимость брокера сообщений RabbitMQ, связанная с недостаточной защитой регистрационных данных, позволяющая нарушителю получить доступ к конфиденциальным данным
Modified: 2025-03-30
CVE-2023-35789
An issue was discovered in the C AMQP client library (aka rabbitmq-c) through 0.13.0 for RabbitMQ. Credentials can only be entered on the command line (e.g., for amqp-publish or amqp-consume) and are thus visible to local attackers by listing a process and its arguments.
Closed bugs
Сборка без distutils
Closed bugs
Сломалась сборка
Package alterator-auth updated to version 0.44.7-alt1 for branch sisyphus in task 334973.
Closed bugs
Отсутствует открывающая кавычка для createcomputer в описании справки (раздел AD)
Closed vulnerabilities
Modified: 2025-03-19
BDU:2024-01500
Уязвимость библиотеки безопасности транспортного уровня GnuTLS, связанная с раскрытием информации через несоответствие, позволяющая нарушителю получить доступ к конфиденциальным данным
Modified: 2026-03-25
CVE-2023-5981
A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.
- https://access.redhat.com/errata/RHSA-2024:0155
- https://access.redhat.com/errata/RHSA-2024:0319
- https://access.redhat.com/errata/RHSA-2024:0399
- https://access.redhat.com/errata/RHSA-2024:0451
- https://access.redhat.com/errata/RHSA-2024:0533
- https://access.redhat.com/errata/RHSA-2024:1383
- https://access.redhat.com/errata/RHSA-2024:2094
- https://access.redhat.com/security/cve/CVE-2023-5981
- https://bugzilla.redhat.com/show_bug.cgi?id=2248445
- https://gnutls.org/security-new.html#GNUTLS-SA-2023-10-23
- http://www.openwall.com/lists/oss-security/2024/01/19/3
- https://access.redhat.com/errata/RHSA-2024:0155
- https://access.redhat.com/errata/RHSA-2024:0319
- https://access.redhat.com/errata/RHSA-2024:0399
- https://access.redhat.com/errata/RHSA-2024:0451
- https://access.redhat.com/errata/RHSA-2024:0533
- https://access.redhat.com/errata/RHSA-2024:1383
- https://access.redhat.com/errata/RHSA-2024:2094
- https://access.redhat.com/security/cve/CVE-2023-5981
- https://bugzilla.redhat.com/show_bug.cgi?id=2248445
- https://gnutls.org/security-new.html#GNUTLS-SA-2023-10-23
- https://lists.debian.org/debian-lts-announce/2023/11/msg00016.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZEIOLORQ7N6WRPFXZSYDL2MC4LP7VFV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/
Closed bugs
CVE-2023-5981 для закрытия необходимо обновление до версии 3.8.2
Package LibreOffice updated to version 7.6.3.1-alt1 for branch sisyphus in task 334099.
Closed vulnerabilities
Modified: 2024-11-11
BDU:2023-08957
Уязвимость модуля Gstreamer пакета офисных программ LibreOffice, позволяющая нарушителю запускать произвольные плагины Gstreamer
Modified: 2025-02-13
CVE-2023-6185
Improper Input Validation vulnerability in GStreamer integration of The Document Foundation LibreOffice allows an attacker to execute arbitrary GStreamer plugins. In affected versions the filename of the embedded video is not sufficiently escaped when passed to GStreamer enabling an attacker to run arbitrary gstreamer plugins depending on what plugins are installed on the target system.
- https://lists.debian.org/debian-lts-announce/2023/12/msg00026.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB7UB6CTWQUDOE657OVVRSDYUY3IPBJG/
- https://www.debian.org/security/2023/dsa-5574
- https://www.libreoffice.org/about-us/security/advisories/cve-2023-6185
- https://lists.debian.org/debian-lts-announce/2023/12/msg00026.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QB7UB6CTWQUDOE657OVVRSDYUY3IPBJG/
- https://www.debian.org/security/2023/dsa-5574
- https://www.libreoffice.org/about-us/security/advisories/cve-2023-6185
Closed vulnerabilities
BDU:2025-03802
Уязвимость сервера системы управления базами данных MongoDB, связанная с отсутствием процедуры авторизации, позволяющая нарушителю оказать воздействие на конфиденциальность и доступность защищаемой информации
Modified: 2024-11-21
CVE-2024-6375
A command for refining a collection shard key is missing an authorization check. This may cause the command to run directly on a shard, leading to either degradation of query performance, or to revealing chunk boundaries through timing side channels. This affects MongoDB Server v5.0 versions, prior to 5.0.22, MongoDB Server v6.0 versions, prior to 6.0.11 and MongoDB Server v7.0 versions prior to 7.0.3.
Package strongswan updated to version 5.9.12-alt1 for branch sisyphus in task 334929.
Closed vulnerabilities
Modified: 2024-11-11
BDU:2023-08128
Уязвимость VPN-пакета на базе протокола IPSec strongSwan, вызванная ошибкой в процессе charon-tkm, позволяющая нарушителю выполнить произвольный код
Modified: 2025-12-18
CVE-2023-41913
strongSwan before 5.9.12 has a buffer overflow and possible unauthenticated remote code execution via a DH public value that exceeds the internal buffer in charon-tkm's DH proxy. The earliest affected version is 5.3.0. An attack can occur via a crafted IKE_SA_INIT message.
- https://github.com/strongswan/strongswan/releases
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPJZPYHBCRXUQGGKQE6TYH4J4RIJH6HO/
- https://www.strongswan.org/blog/2023/11/20/strongswan-vulnerability-%28cve-2023-41913%29.html
- https://github.com/strongswan/strongswan/releases
- https://lists.debian.org/debian-lts-announce/2023/11/msg00018.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/YPJZPYHBCRXUQGGKQE6TYH4J4RIJH6HO/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YPJZPYHBCRXUQGGKQE6TYH4J4RIJH6HO/
- https://security.netapp.com/advisory/ntap-20250117-0003/
- https://www.strongswan.org/blog/2023/11/20/strongswan-vulnerability-%28cve-2023-41913%29.html
