ALT-BU-2024-10832-1
Branch p11 update bulletin.
Closed vulnerabilities
BDU:2024-00308
Уязвимость функции qemu_clipboard_request() встроенного сервера VNC эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2023-6683
A flaw was found in the QEMU built-in VNC server while processing ClientCutText messages. The qemu_clipboard_request() function can be reached before vnc_server_cut_text_caps() was called and had the chance to initialize the clipboard peer, leading to a NULL pointer dereference. This could allow a malicious authenticated VNC client to crash QEMU and trigger a denial of service.
Modified: 2024-11-21
CVE-2024-4467
A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file.
- http://www.openwall.com/lists/oss-security/2024/07/23/2
- RHSA-2024:4276
- RHSA-2024:4276
- RHSA-2024:4277
- RHSA-2024:4277
- RHSA-2024:4278
- RHSA-2024:4278
- RHSA-2024:4372
- RHSA-2024:4372
- RHSA-2024:4373
- RHSA-2024:4373
- RHSA-2024:4374
- RHSA-2024:4374
- RHSA-2024:4420
- RHSA-2024:4420
- RHSA-2024:4724
- RHSA-2024:4724
- RHSA-2024:4727
- RHSA-2024:4727
- https://access.redhat.com/security/cve/CVE-2024-4467
- https://access.redhat.com/security/cve/CVE-2024-4467
- RHBZ#2278875
- RHBZ#2278875
- https://security.netapp.com/advisory/ntap-20240822-0005/
Closed bugs
/lib/udev/rules.d/90-qemu-guest-agent.rules содержит синтаксические ошибки
Closed bugs
net usershare add: malformed acl (missing ‘:’) при изменении существующих свойств
Package arm-none-eabi-gcc updated to version 13.2.1-alt2 for branch p11 in task 353411.
Closed bugs
В пакете arm-none-eabi-gcc-c++ отсутствует libstdc++_nano
Closed vulnerabilities
BDU:2024-05923
Уязвимость функции GTime2str парсера ASN1 Parser библиотеки libcurl, позволяющая нарушителю вызвать октаз в обслуживании
Modified: 2024-11-21
CVE-2024-7264
libcurl's ASN1 parser code has the `GTime2str()` function, used for parsing an ASN.1 Generalized Time field. If given an syntactically incorrect field, the parser might end up using -1 for the length of the *time fraction*, leading to a `strlen()` getting performed on a pointer to a heap buffer area that is not (purposely) null terminated. This flaw most likely leads to a crash, but can also lead to heap contents getting returned to the application when [CURLINFO_CERTINFO](https://curl.se/libcurl/c/CURLINFO_CERTINFO.html) is used.
Package alt-csp-cryptopro updated to version 0.3.0-alt4 for branch p11 in task 351462.
Closed bugs
Задана неверная маска или ключ при подписании группы файлов с помощью alt-csp-cryptopro
Недоступны функции "Создать имя" и "Подписать и сжать" при подписи одного файла