ALT-BU-2023-8013-2
Branch p10 update bulletin.
Closed bugs
/usr/libexec/podman/catatonit: no such file or directory
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-27651
A flaw was found in buildah where containers were incorrectly started with non-empty default permissions. A bug was found in Moby (Docker Engine) where containers were incorrectly started with non-empty inheritable Linux process capabilities, enabling an attacker with access to programs with inheritable file capabilities to elevate those capabilities to the permitted set when execve(2) runs. This has the potential to impact confidentiality and integrity.
- https://bugzilla.redhat.com/show_bug.cgi?id=2066840
- https://github.com/containers/buildah/commit/e7e55c988c05dd74005184ceb64f097a0cfe645b
- https://github.com/containers/buildah/security/advisories/GHSA-c3g4-w6cv-6v7h
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/25YI27MENCEPZTTGRVU6BQD5V53FNI52/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2VWH6X6HOFPO6HTESF42HIJZEPXSWVIO/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7NETC7I6RTMMBRJJQVJOJUPDK4W4PQSJ/
- https://bugzilla.redhat.com/show_bug.cgi?id=2066840
- https://github.com/containers/buildah/commit/e7e55c988c05dd74005184ceb64f097a0cfe645b
- https://github.com/containers/buildah/security/advisories/GHSA-c3g4-w6cv-6v7h
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/25YI27MENCEPZTTGRVU6BQD5V53FNI52/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/2VWH6X6HOFPO6HTESF42HIJZEPXSWVIO/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/7NETC7I6RTMMBRJJQVJOJUPDK4W4PQSJ/
Modified: 2024-11-21
CVE-2022-2990
An incorrect handling of the supplementary groups in the Buildah container engine might lead to the sensitive information disclosure or possible data modification if an attacker has direct access to the affected container where supplementary groups are used to set access permissions and is able to execute a binary code in that container.
- https://bugzilla.redhat.com/show_bug.cgi?id=2121453
- https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/
- https://bugzilla.redhat.com/show_bug.cgi?id=2121453
- https://www.benthamsgaze.org/2022/08/22/vulnerability-in-linux-containers-investigation-and-mitigation/
Package kernel-image-std-def updated to version 5.10.203-alt1 for branch p10 in task 336106.
Closed vulnerabilities
BDU:2024-06906
Уязвимость компонента drm/amdgpu ядра операционной системы Linux, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-06908
Уязвимость функций fc_lport_ptp_setup() fc_lport_ptp_setup(), fc_rport_create(), fc_rport_create(), fc_rport_create() ядра операционной системы Linux, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-06910
Уязвимость компонента drm/amd/display ядра операционной системы Linux, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-06978
Уязвимость функции компонента ALSA ядра операционной системы Linux, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-06986
Уязвимость ядра операционной системы Linux, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2023-52753
In the Linux kernel, the following vulnerability has been resolved: drm/amd/display: Avoid NULL dereference of timing generator [Why & How] Check whether assigned timing generator is NULL or not before accessing its funcs to prevent NULL dereference.
- https://git.kernel.org/stable/c/09909f515032fa80b921fd3118efe66b185d10fd
- https://git.kernel.org/stable/c/4e497f1acd99075b13605b2e7fa0cba721a2cfd9
- https://git.kernel.org/stable/c/6d8653b1a7a8dc938b566ae8c4f373b36e792c68
- https://git.kernel.org/stable/c/79b6a90f4f2433312154cd68452b0ba501fa74db
- https://git.kernel.org/stable/c/8a06894666e0b462c9316b26ab615cefdd0d676c
- https://git.kernel.org/stable/c/b1904ed480cee3f9f4036ea0e36d139cb5fee2d6
- https://git.kernel.org/stable/c/df8bc953eed72371e43ca407bd063507f760cf89
- https://git.kernel.org/stable/c/eac3e4760aa12159f7f5475d55a67b7933abc195
- https://git.kernel.org/stable/c/09909f515032fa80b921fd3118efe66b185d10fd
- https://git.kernel.org/stable/c/4e497f1acd99075b13605b2e7fa0cba721a2cfd9
- https://git.kernel.org/stable/c/6d8653b1a7a8dc938b566ae8c4f373b36e792c68
- https://git.kernel.org/stable/c/79b6a90f4f2433312154cd68452b0ba501fa74db
- https://git.kernel.org/stable/c/8a06894666e0b462c9316b26ab615cefdd0d676c
- https://git.kernel.org/stable/c/b1904ed480cee3f9f4036ea0e36d139cb5fee2d6
- https://git.kernel.org/stable/c/df8bc953eed72371e43ca407bd063507f760cf89
- https://git.kernel.org/stable/c/eac3e4760aa12159f7f5475d55a67b7933abc195
Modified: 2024-11-21
CVE-2023-52806
In the Linux kernel, the following vulnerability has been resolved: ALSA: hda: Fix possible null-ptr-deref when assigning a stream While AudioDSP drivers assign streams exclusively of HOST or LINK type, nothing blocks a user to attempt to assign a COUPLED stream. As supplied substream instance may be a stub, what is the case when code-loading, such scenario ends with null-ptr-deref.
- https://git.kernel.org/stable/c/2527775616f3638f4fd54649eba8c7b84d5e4250
- https://git.kernel.org/stable/c/25354bae4fc310c3928e8a42fda2d486f67745d7
- https://git.kernel.org/stable/c/43b91df291c8802268ab3cfd8fccfdf135800ed4
- https://git.kernel.org/stable/c/4a320da7f7cbdab2098b103c47f45d5061f42edd
- https://git.kernel.org/stable/c/631a96e9eb4228ff75fce7e72d133ca81194797e
- https://git.kernel.org/stable/c/758c7733cb821041f5fd403b7b97c0b95d319323
- https://git.kernel.org/stable/c/7de25112de8222fd20564769e6c99dc9f9738a0b
- https://git.kernel.org/stable/c/f93dc90c2e8ed664985e366aa6459ac83cdab236
- https://git.kernel.org/stable/c/fe7c1a0c2b25c82807cb46fc3aadbf2664a682b0
- https://git.kernel.org/stable/c/2527775616f3638f4fd54649eba8c7b84d5e4250
- https://git.kernel.org/stable/c/25354bae4fc310c3928e8a42fda2d486f67745d7
- https://git.kernel.org/stable/c/43b91df291c8802268ab3cfd8fccfdf135800ed4
- https://git.kernel.org/stable/c/4a320da7f7cbdab2098b103c47f45d5061f42edd
- https://git.kernel.org/stable/c/631a96e9eb4228ff75fce7e72d133ca81194797e
- https://git.kernel.org/stable/c/758c7733cb821041f5fd403b7b97c0b95d319323
- https://git.kernel.org/stable/c/7de25112de8222fd20564769e6c99dc9f9738a0b
- https://git.kernel.org/stable/c/f93dc90c2e8ed664985e366aa6459ac83cdab236
- https://git.kernel.org/stable/c/fe7c1a0c2b25c82807cb46fc3aadbf2664a682b0
Modified: 2024-11-21
CVE-2023-52809
In the Linux kernel, the following vulnerability has been resolved: scsi: libfc: Fix potential NULL pointer dereference in fc_lport_ptp_setup() fc_lport_ptp_setup() did not check the return value of fc_rport_create() which can return NULL and would cause a NULL pointer dereference. Address this issue by checking return value of fc_rport_create() and log error message on fc_rport_create() failed.
- https://git.kernel.org/stable/c/442fd24d7b6b29e4a9cd9225afba4142d5f522ba
- https://git.kernel.org/stable/c/4df105f0ce9f6f30cda4e99f577150d23f0c9c5f
- https://git.kernel.org/stable/c/56d78b5495ebecbb9395101f3be177cd0a52450b
- https://git.kernel.org/stable/c/6b9ecf4e1032e645873933e5b43cbb84cac19106
- https://git.kernel.org/stable/c/77072ec41d6ab3718c3fc639bc149b8037caedfa
- https://git.kernel.org/stable/c/930f0aaba4820d6362de4e6ed569eaf444f1ea4e
- https://git.kernel.org/stable/c/b549acf999824d4f751ca57965700372f2f3ad00
- https://git.kernel.org/stable/c/bb83f79f90e92f46466adcfd4fd264a7ae0f0f01
- https://git.kernel.org/stable/c/f6fe7261b92b21109678747f36df9fdab1e30c34
- https://git.kernel.org/stable/c/442fd24d7b6b29e4a9cd9225afba4142d5f522ba
- https://git.kernel.org/stable/c/4df105f0ce9f6f30cda4e99f577150d23f0c9c5f
- https://git.kernel.org/stable/c/56d78b5495ebecbb9395101f3be177cd0a52450b
- https://git.kernel.org/stable/c/6b9ecf4e1032e645873933e5b43cbb84cac19106
- https://git.kernel.org/stable/c/77072ec41d6ab3718c3fc639bc149b8037caedfa
- https://git.kernel.org/stable/c/930f0aaba4820d6362de4e6ed569eaf444f1ea4e
- https://git.kernel.org/stable/c/b549acf999824d4f751ca57965700372f2f3ad00
- https://git.kernel.org/stable/c/bb83f79f90e92f46466adcfd4fd264a7ae0f0f01
- https://git.kernel.org/stable/c/f6fe7261b92b21109678747f36df9fdab1e30c34
Modified: 2025-09-16
CVE-2023-52814
In the Linux kernel, the following vulnerability has been resolved: drm/amdgpu: Fix potential null pointer derefernce The amdgpu_ras_get_context may return NULL if device not support ras feature, so add check before using.
- https://git.kernel.org/stable/c/80285ae1ec8717b597b20de38866c29d84d321a1
- https://git.kernel.org/stable/c/9b70fc7d70e8ef7c4a65034c9487f58609e708a1
- https://git.kernel.org/stable/c/b0702ee4d811708251cdf54d4a1d3e888d365111
- https://git.kernel.org/stable/c/b93a25de28af153312f0fc979b0663fc4bd3442b
- https://git.kernel.org/stable/c/c11cf5e117f50f5a767054600885acd981449afe
- https://git.kernel.org/stable/c/da46e63482fdc5e35c008865c22ac64027f6f0c2
- https://git.kernel.org/stable/c/80285ae1ec8717b597b20de38866c29d84d321a1
- https://git.kernel.org/stable/c/9b70fc7d70e8ef7c4a65034c9487f58609e708a1
- https://git.kernel.org/stable/c/b0702ee4d811708251cdf54d4a1d3e888d365111
- https://git.kernel.org/stable/c/b93a25de28af153312f0fc979b0663fc4bd3442b
- https://git.kernel.org/stable/c/c11cf5e117f50f5a767054600885acd981449afe
- https://git.kernel.org/stable/c/da46e63482fdc5e35c008865c22ac64027f6f0c2
Modified: 2025-09-16
CVE-2023-52817
In the Linux kernel, the following vulnerability has been resolved:
drm/amdgpu: Fix a null pointer access when the smc_rreg pointer is NULL
In certain types of chips, such as VEGA20, reading the amdgpu_regs_smc file could result in an abnormal null pointer access when the smc_rreg pointer is NULL. Below are the steps to reproduce this issue and the corresponding exception log:
1. Navigate to the directory: /sys/kernel/debug/dri/0
2. Execute command: cat amdgpu_regs_smc
3. Exception Log::
[4005007.702554] BUG: kernel NULL pointer dereference, address: 0000000000000000
[4005007.702562] #PF: supervisor instruction fetch in kernel mode
[4005007.702567] #PF: error_code(0x0010) - not-present page
[4005007.702570] PGD 0 P4D 0
[4005007.702576] Oops: 0010 [#1] SMP NOPTI
[4005007.702581] CPU: 4 PID: 62563 Comm: cat Tainted: G OE 5.15.0-43-generic #46-Ubunt u
[4005007.702590] RIP: 0010:0x0
[4005007.702598] Code: Unable to access opcode bytes at RIP 0xffffffffffffffd6.
[4005007.702600] RSP: 0018:ffffa82b46d27da0 EFLAGS: 00010206
[4005007.702605] RAX: 0000000000000000 RBX: 0000000000000000 RCX: ffffa82b46d27e68
[4005007.702609] RDX: 0000000000000001 RSI: 0000000000000000 RDI: ffff9940656e0000
[4005007.702612] RBP: ffffa82b46d27dd8 R08: 0000000000000000 R09: ffff994060c07980
[4005007.702615] R10: 0000000000020000 R11: 0000000000000000 R12: 00007f5e06753000
[4005007.702618] R13: ffff9940656e0000 R14: ffffa82b46d27e68 R15: 00007f5e06753000
[4005007.702622] FS: 00007f5e0755b740(0000) GS:ffff99479d300000(0000) knlGS:0000000000000000
[4005007.702626] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033
[4005007.702629] CR2: ffffffffffffffd6 CR3: 00000003253fc000 CR4: 00000000003506e0
[4005007.702633] Call Trace:
[4005007.702636]
- https://git.kernel.org/stable/c/174f62a0aa15c211e60208b41ee9e7cdfb73d455
- https://git.kernel.org/stable/c/437e0fa907ba39b4d7eda863c03ea9cf48bd93a9
- https://git.kernel.org/stable/c/5104fdf50d326db2c1a994f8b35dcd46e63ae4ad
- https://git.kernel.org/stable/c/6c1b3d89a2dda79881726bb6e37af19c0936d736
- https://git.kernel.org/stable/c/820daf9ffe2b0afb804567b10983fb38bc5ae288
- https://git.kernel.org/stable/c/ba3c0796d292de84f2932cc5bbb0f771fc720996
- https://git.kernel.org/stable/c/bf2d51eedf03bd61e3556e35d74d49e2e6112398
- https://git.kernel.org/stable/c/f475d5502f33a6c5b149b0afe96316ad1962a64a
- https://git.kernel.org/stable/c/174f62a0aa15c211e60208b41ee9e7cdfb73d455
- https://git.kernel.org/stable/c/437e0fa907ba39b4d7eda863c03ea9cf48bd93a9
- https://git.kernel.org/stable/c/5104fdf50d326db2c1a994f8b35dcd46e63ae4ad
- https://git.kernel.org/stable/c/6c1b3d89a2dda79881726bb6e37af19c0936d736
- https://git.kernel.org/stable/c/820daf9ffe2b0afb804567b10983fb38bc5ae288
- https://git.kernel.org/stable/c/ba3c0796d292de84f2932cc5bbb0f771fc720996
- https://git.kernel.org/stable/c/bf2d51eedf03bd61e3556e35d74d49e2e6112398
- https://git.kernel.org/stable/c/f475d5502f33a6c5b149b0afe96316ad1962a64a
Modified: 2024-11-21
CVE-2023-52821
In the Linux kernel, the following vulnerability has been resolved: drm/panel: fix a possible null pointer dereference In versatile_panel_get_modes(), the return value of drm_mode_duplicate() is assigned to mode, which will lead to a NULL pointer dereference on failure of drm_mode_duplicate(). Add a check to avoid npd.
- https://git.kernel.org/stable/c/2381f6b628b3214f07375e0adf5ce17093c31190
- https://git.kernel.org/stable/c/4fa930ba046d20fc1899770396ee11e905fa96e4
- https://git.kernel.org/stable/c/79813cd59398015867d51e6d7dcc14d287d4c402
- https://git.kernel.org/stable/c/8a9dd36fcb4f3906982b82593393578db4479992
- https://git.kernel.org/stable/c/924e5814d1f84e6fa5cb19c6eceb69f066225229
- https://git.kernel.org/stable/c/c7dc0aca5962fb37dbea9769dd26ec37813faae1
- https://git.kernel.org/stable/c/2381f6b628b3214f07375e0adf5ce17093c31190
- https://git.kernel.org/stable/c/4fa930ba046d20fc1899770396ee11e905fa96e4
- https://git.kernel.org/stable/c/79813cd59398015867d51e6d7dcc14d287d4c402
- https://git.kernel.org/stable/c/8a9dd36fcb4f3906982b82593393578db4479992
- https://git.kernel.org/stable/c/924e5814d1f84e6fa5cb19c6eceb69f066225229
- https://git.kernel.org/stable/c/c7dc0aca5962fb37dbea9769dd26ec37813faae1
Closed bugs
Не правильно определяются кнопки ctrl, win, alt для клавиатур redragon asura
Package kf5-kcalcore updated to version 5.112.0-alt2 for branch p10 in task 336271.
Closed bugs
korganizer зависает при переключении вида на "События"