ALT-BU-2023-8297-1
Branch p10 update bulletin.
Closed bugs
Не доступно аппаратное 3d ускорение для актуальных видеокарт AMD (RDN3, RX 7000)
Package xorg-server updated to version 1.20.14-alt10 for branch p10 in task 336398.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2023-6377
A flaw was found in xorg-server. Querying or changing XKB button actions such as moving from a touchpad to a mouse can result in out-of-bounds memory reads and writes. This may allow local privilege escalation or possible remote code execution in cases where X11 forwarding is involved.
- http://www.openwall.com/lists/oss-security/2023/12/13/1
- RHSA-2023:7886
- RHSA-2023:7886
- RHSA-2024:0006
- RHSA-2024:0006
- RHSA-2024:0009
- RHSA-2024:0009
- RHSA-2024:0010
- RHSA-2024:0010
- RHSA-2024:0014
- RHSA-2024:0014
- RHSA-2024:0015
- RHSA-2024:0015
- RHSA-2024:0016
- RHSA-2024:0016
- RHSA-2024:0017
- RHSA-2024:0017
- RHSA-2024:0018
- RHSA-2024:0018
- RHSA-2024:0020
- RHSA-2024:0020
- RHSA-2024:2169
- RHSA-2024:2169
- RHSA-2024:2170
- RHSA-2024:2170
- RHSA-2024:2995
- RHSA-2024:2995
- RHSA-2024:2996
- RHSA-2024:2996
- https://access.redhat.com/security/cve/CVE-2023-6377
- https://access.redhat.com/security/cve/CVE-2023-6377
- RHBZ#2253291
- RHBZ#2253291
- https://gitlab.freedesktop.org/xorg/xserver/-/commit/0c1a93d319558fe3ab2d94f51d174b4f93810afd
- https://gitlab.freedesktop.org/xorg/xserver/-/commit/0c1a93d319558fe3ab2d94f51d174b4f93810afd
- https://lists.debian.org/debian-lts-announce/2023/12/msg00008.html
- https://lists.debian.org/debian-lts-announce/2023/12/msg00013.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6R63Z6GIWM3YUNZRCGFODUXLW3GY2HD6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7PP47YXKM5ETLCYEF6473R3VFCJ6QT2S/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IFHV5KCQ2SVOD4QMCPZ5HC6YL44L7YJD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LJDFWDB7EQVZA45XDP7L5WRSRWS6RVRR/
- https://lists.x.org/archives/xorg-announce/2023-December/003435.html
- https://lists.x.org/archives/xorg-announce/2023-December/003435.html
- https://security.gentoo.org/glsa/202401-30
- https://security.netapp.com/advisory/ntap-20240125-0003/
- https://www.debian.org/security/2023/dsa-5576
Modified: 2024-11-21
CVE-2023-6478
A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow which may lead to a disclosure of sensitive information.
- http://www.openwall.com/lists/oss-security/2023/12/13/1
- RHSA-2023:7886
- RHSA-2023:7886
- RHSA-2024:0006
- RHSA-2024:0006
- RHSA-2024:0009
- RHSA-2024:0009
- RHSA-2024:0010
- RHSA-2024:0010
- RHSA-2024:0014
- RHSA-2024:0014
- RHSA-2024:0015
- RHSA-2024:0015
- RHSA-2024:0016
- RHSA-2024:0016
- RHSA-2024:0017
- RHSA-2024:0017
- RHSA-2024:0018
- RHSA-2024:0018
- RHSA-2024:0020
- RHSA-2024:0020
- RHSA-2024:2169
- RHSA-2024:2169
- RHSA-2024:2170
- RHSA-2024:2170
- RHSA-2024:2995
- RHSA-2024:2995
- RHSA-2024:2996
- RHSA-2024:2996
- https://access.redhat.com/security/cve/CVE-2023-6478
- https://access.redhat.com/security/cve/CVE-2023-6478
- RHBZ#2253298
- RHBZ#2253298
- https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632
- https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632
- https://lists.debian.org/debian-lts-announce/2023/12/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6R63Z6GIWM3YUNZRCGFODUXLW3GY2HD6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7PP47YXKM5ETLCYEF6473R3VFCJ6QT2S/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IFHV5KCQ2SVOD4QMCPZ5HC6YL44L7YJD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LJDFWDB7EQVZA45XDP7L5WRSRWS6RVRR/
- https://lists.x.org/archives/xorg-announce/2023-December/003435.html
- https://lists.x.org/archives/xorg-announce/2023-December/003435.html
- https://security.gentoo.org/glsa/202401-30
- https://security.netapp.com/advisory/ntap-20240125-0003/
- https://www.debian.org/security/2023/dsa-5576
Package xorg-xwayland updated to version 23.1.1-alt3 for branch p10 in task 336398.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2023-6377
A flaw was found in xorg-server. Querying or changing XKB button actions such as moving from a touchpad to a mouse can result in out-of-bounds memory reads and writes. This may allow local privilege escalation or possible remote code execution in cases where X11 forwarding is involved.
- http://www.openwall.com/lists/oss-security/2023/12/13/1
- RHSA-2023:7886
- RHSA-2023:7886
- RHSA-2024:0006
- RHSA-2024:0006
- RHSA-2024:0009
- RHSA-2024:0009
- RHSA-2024:0010
- RHSA-2024:0010
- RHSA-2024:0014
- RHSA-2024:0014
- RHSA-2024:0015
- RHSA-2024:0015
- RHSA-2024:0016
- RHSA-2024:0016
- RHSA-2024:0017
- RHSA-2024:0017
- RHSA-2024:0018
- RHSA-2024:0018
- RHSA-2024:0020
- RHSA-2024:0020
- RHSA-2024:2169
- RHSA-2024:2169
- RHSA-2024:2170
- RHSA-2024:2170
- RHSA-2024:2995
- RHSA-2024:2995
- RHSA-2024:2996
- RHSA-2024:2996
- https://access.redhat.com/security/cve/CVE-2023-6377
- https://access.redhat.com/security/cve/CVE-2023-6377
- RHBZ#2253291
- RHBZ#2253291
- https://gitlab.freedesktop.org/xorg/xserver/-/commit/0c1a93d319558fe3ab2d94f51d174b4f93810afd
- https://gitlab.freedesktop.org/xorg/xserver/-/commit/0c1a93d319558fe3ab2d94f51d174b4f93810afd
- https://lists.debian.org/debian-lts-announce/2023/12/msg00008.html
- https://lists.debian.org/debian-lts-announce/2023/12/msg00013.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6R63Z6GIWM3YUNZRCGFODUXLW3GY2HD6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7PP47YXKM5ETLCYEF6473R3VFCJ6QT2S/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IFHV5KCQ2SVOD4QMCPZ5HC6YL44L7YJD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LJDFWDB7EQVZA45XDP7L5WRSRWS6RVRR/
- https://lists.x.org/archives/xorg-announce/2023-December/003435.html
- https://lists.x.org/archives/xorg-announce/2023-December/003435.html
- https://security.gentoo.org/glsa/202401-30
- https://security.netapp.com/advisory/ntap-20240125-0003/
- https://www.debian.org/security/2023/dsa-5576
Modified: 2024-11-21
CVE-2023-6478
A flaw was found in xorg-server. A specially crafted request to RRChangeProviderProperty or RRChangeOutputProperty can trigger an integer overflow which may lead to a disclosure of sensitive information.
- http://www.openwall.com/lists/oss-security/2023/12/13/1
- RHSA-2023:7886
- RHSA-2023:7886
- RHSA-2024:0006
- RHSA-2024:0006
- RHSA-2024:0009
- RHSA-2024:0009
- RHSA-2024:0010
- RHSA-2024:0010
- RHSA-2024:0014
- RHSA-2024:0014
- RHSA-2024:0015
- RHSA-2024:0015
- RHSA-2024:0016
- RHSA-2024:0016
- RHSA-2024:0017
- RHSA-2024:0017
- RHSA-2024:0018
- RHSA-2024:0018
- RHSA-2024:0020
- RHSA-2024:0020
- RHSA-2024:2169
- RHSA-2024:2169
- RHSA-2024:2170
- RHSA-2024:2170
- RHSA-2024:2995
- RHSA-2024:2995
- RHSA-2024:2996
- RHSA-2024:2996
- https://access.redhat.com/security/cve/CVE-2023-6478
- https://access.redhat.com/security/cve/CVE-2023-6478
- RHBZ#2253298
- RHBZ#2253298
- https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632
- https://gitlab.freedesktop.org/xorg/xserver/-/commit/14f480010a93ff962fef66a16412fafff81ad632
- https://lists.debian.org/debian-lts-announce/2023/12/msg00008.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6R63Z6GIWM3YUNZRCGFODUXLW3GY2HD6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7PP47YXKM5ETLCYEF6473R3VFCJ6QT2S/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IFHV5KCQ2SVOD4QMCPZ5HC6YL44L7YJD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LJDFWDB7EQVZA45XDP7L5WRSRWS6RVRR/
- https://lists.x.org/archives/xorg-announce/2023-December/003435.html
- https://lists.x.org/archives/xorg-announce/2023-December/003435.html
- https://security.gentoo.org/glsa/202401-30
- https://security.netapp.com/advisory/ntap-20240125-0003/
- https://www.debian.org/security/2023/dsa-5576
Package kernel-image-rt updated to version 5.10.204-alt1.rt100 for branch p10 in task 337056.
Closed vulnerabilities
BDU:2023-08958
Уязвимость функции nft_pipapo_walk() в модуле net/netfilter/nft_set_pipapo.c подсистемы Netfilter ядра операционной системы Linux, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации и повысить свои привилегии в системе
Modified: 2025-02-13
CVE-2023-6817
A use-after-free vulnerability in the Linux kernel's netfilter: nf_tables component can be exploited to achieve local privilege escalation. The function nft_pipapo_walk did not skip inactive elements during set walk which could lead double deactivations of PIPAPO (Pile Packet Policies) elements, leading to use-after-free. We recommend upgrading past commit 317eb9685095678f2c9f5a8189de698c5354316a.
- http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html
- http://packetstormsecurity.com/files/177029/Kernel-Live-Patch-Security-Notice-LSN-0100-1.html
- http://www.openwall.com/lists/oss-security/2023/12/22/13
- http://www.openwall.com/lists/oss-security/2023/12/22/13
- http://www.openwall.com/lists/oss-security/2023/12/22/6
- http://www.openwall.com/lists/oss-security/2023/12/22/6
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=317eb9685095678f2c9f5a8189de698c5354316a
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=317eb9685095678f2c9f5a8189de698c5354316a
- https://kernel.dance/317eb9685095678f2c9f5a8189de698c5354316a
- https://kernel.dance/317eb9685095678f2c9f5a8189de698c5354316a
- https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html
- https://lists.debian.org/debian-lts-announce/2024/01/msg00005.html