ALT-BU-2024-1198-2
Branch sisyphus update bulletin.
Package 389-ds-base updated to version 2.4.4-alt1 for branch sisyphus in task 337421.
Closed vulnerabilities
BDU:2023-04786
Уязвимость плагина Content Synchronization сервера службы каталогов 389 Directory Server, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2022-2850
A flaw was found In 389-ds-base. When the Content Synchronization plugin is enabled, an authenticated user can reach a NULL pointer dereference using a specially crafted query. This flaw allows an authenticated attacker to cause a denial of service. This CVE is assigned against an incomplete fix of CVE-2021-3514.
- https://access.redhat.com/security/cve/CVE-2022-2850
- https://access.redhat.com/security/cve/CVE-2022-2850
- https://bugzilla.redhat.com/show_bug.cgi?id=2118691
- https://bugzilla.redhat.com/show_bug.cgi?id=2118691
- https://lists.debian.org/debian-lts-announce/2023/04/msg00026.html
- https://lists.debian.org/debian-lts-announce/2023/04/msg00026.html
Package admx-basealt updated to version 0.1.13.5-alt1 for branch sisyphus in task 338270.
Closed bugs
Скорректировать опции в политике Обратный поиск DNS для запросов OpenLDAP
(FR) Поправить англицизм в Разрешения PackageKit: экшена → действия
Опечатка в описании политики "Настройка механизма копирования файлов"
Стилистически неверное описание пункта списка (Только root может запускать -> Только root) для политики Разрешения для /usr/sbin/pppd
Поправить описание политики: /usr/bin/postqueue -> /usr/sbin/postqueue
Опечатка и несогласованное предложение в описании политики
Package freeswitch updated to version 1.10.11-alt1 for branch sisyphus in task 338263.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2023-51443
FreeSWITCH is a Software Defined Telecom Stack enabling the digital transformation from proprietary telecom switches to a software implementation that runs on any commodity hardware. Prior to version 1.10.11, when handling DTLS-SRTP for media setup, FreeSWITCH is susceptible to Denial of Service due to a race condition in the hello handshake phase of the DTLS protocol. This attack can be done continuously, thus denying new DTLS-SRTP encrypted calls during the attack. If an attacker manages to send a ClientHello DTLS message with an invalid CipherSuite (such as `TLS_NULL_WITH_NULL_NULL`) to the port on the FreeSWITCH server that is expecting packets from the caller, a DTLS error is generated. This results in the media session being torn down, which is followed by teardown at signaling (SIP) level too. Abuse of this vulnerability may lead to a massive Denial of Service on vulnerable FreeSWITCH servers for calls that rely on DTLS-SRTP. To address this vulnerability, upgrade FreeSWITCH to 1.10.11 which includes the security fix. The solution implemented is to drop all packets from addresses that have not been validated by an ICE check.
- http://packetstormsecurity.com/files/176393/FreeSWITCH-Denial-Of-Service.html
- http://packetstormsecurity.com/files/176393/FreeSWITCH-Denial-Of-Service.html
- https://github.com/signalwire/freeswitch/commit/86cbda90b84ba186e508fbc7bfae469270a97d11
- https://github.com/signalwire/freeswitch/commit/86cbda90b84ba186e508fbc7bfae469270a97d11
- https://github.com/signalwire/freeswitch/security/advisories/GHSA-39gv-hq72-j6m6
- https://github.com/signalwire/freeswitch/security/advisories/GHSA-39gv-hq72-j6m6
Closed bugs
При первом запуске admc сообщение: Тема, указанная в настройках, не найдена
Closed bugs
vrcompositor: error while loading shared libraries: libopenxr_loader.so: cannot open shared object file: No such file or directory
При запуске VR: SteamVR setup is incomplete
Closed vulnerabilities
BDU:2023-08243
Уязвимость программного средства реализации сетевой маршрутизации на Unix-подобных системах FRRouting, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-08631
Уязвимость программного средства реализации сетевой маршрутизации на Unix-подобных системах FRRouting, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2023-46752
An issue was discovered in FRRouting FRR through 9.0.1. It mishandles malformed MP_REACH_NLRI data, leading to a crash.
- https://github.com/FRRouting/frr/pull/14645/commits/b08afc81c60607a4f736f418f2e3eb06087f1a35
- https://github.com/FRRouting/frr/pull/14645/commits/b08afc81c60607a4f736f418f2e3eb06087f1a35
- [debian-lts-announce] 20240428 [SECURITY] [DLA 3797-1] frr security update
- [debian-lts-announce] 20240428 [SECURITY] [DLA 3797-1] frr security update
Modified: 2024-11-21
CVE-2023-46753
An issue was discovered in FRRouting FRR through 9.0.1. A crash can occur for a crafted BGP UPDATE message without mandatory attributes, e.g., one with only an unknown transit attribute.
- https://github.com/FRRouting/frr/pull/14645/commits/d8482bf011cb2b173e85b65b4bf3d5061250cdb9
- https://github.com/FRRouting/frr/pull/14645/commits/d8482bf011cb2b173e85b65b4bf3d5061250cdb9
- [debian-lts-announce] 20240428 [SECURITY] [DLA 3797-1] frr security update
- [debian-lts-announce] 20240428 [SECURITY] [DLA 3797-1] frr security update
Modified: 2024-11-21
CVE-2023-47234
An issue was discovered in FRRouting FRR through 9.0.1. A crash can occur when processing a crafted BGP UPDATE message with a MP_UNREACH_NLRI attribute and additional NLRI data (that lacks mandatory path attributes).
- https://github.com/FRRouting/frr/pull/14716/commits/c37119df45bbf4ef713bc10475af2ee06e12f3bf
- https://github.com/FRRouting/frr/pull/14716/commits/c37119df45bbf4ef713bc10475af2ee06e12f3bf
- [debian-lts-announce] 20240428 [SECURITY] [DLA 3797-1] frr security update
- [debian-lts-announce] 20240428 [SECURITY] [DLA 3797-1] frr security update
Modified: 2024-11-21
CVE-2023-47235
An issue was discovered in FRRouting FRR through 9.0.1. A crash can occur when a malformed BGP UPDATE message with an EOR is processed, because the presence of EOR does not lead to a treat-as-withdraw outcome.
- https://github.com/FRRouting/frr/pull/14716/commits/6814f2e0138a6ea5e1f83bdd9085d9a77999900b
- https://github.com/FRRouting/frr/pull/14716/commits/6814f2e0138a6ea5e1f83bdd9085d9a77999900b
- [debian-lts-announce] 20240428 [SECURITY] [DLA 3797-1] frr security update
- [debian-lts-announce] 20240428 [SECURITY] [DLA 3797-1] frr security update
Package xorg-xwayland updated to version 23.2.4-alt1 for branch sisyphus in task 338286.
Closed vulnerabilities
BDU:2024-00405
Уязвимость функций DeviceFocusEvent и XIQueryPointer реализации сервера X Window System X.Org Server, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2024-00638
Уязвимость компонента GLX PBuffer Handler реализации сервера X Window System X.Org Server, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-00639
Уязвимость компонента Privates Handler реализации сервера X Window System X.Org Server, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2023-6816
A flaw was found in X.Org server. Both DeviceFocusEvent and the XIQueryPointer reply contain a bit for each logical button currently down. Buttons can be arbitrarily mapped to any value up to 255, but the X.Org Server was only allocating space for the device's particular number of buttons, leading to a heap overflow if a bigger value was used.
- http://www.openwall.com/lists/oss-security/2024/01/18/1
- RHSA-2024:0320
- RHSA-2024:0320
- RHSA-2024:0557
- RHSA-2024:0557
- RHSA-2024:0558
- RHSA-2024:0558
- RHSA-2024:0597
- RHSA-2024:0597
- RHSA-2024:0607
- RHSA-2024:0607
- RHSA-2024:0614
- RHSA-2024:0614
- RHSA-2024:0617
- RHSA-2024:0617
- RHSA-2024:0621
- RHSA-2024:0621
- RHSA-2024:0626
- RHSA-2024:0626
- RHSA-2024:0629
- RHSA-2024:0629
- RHSA-2024:2169
- RHSA-2024:2169
- RHSA-2024:2170
- RHSA-2024:2170
- RHSA-2024:2996
- RHSA-2024:2996
- https://access.redhat.com/security/cve/CVE-2023-6816
- https://access.redhat.com/security/cve/CVE-2023-6816
- RHBZ#2257691
- RHBZ#2257691
- https://lists.debian.org/debian-lts-announce/2024/01/msg00016.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5J4H7CH565ALSZZYKOJFYDA5KFLG6NUK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EJBMCWQ54R6ZL3MYU2D2JBW6JMZL7BQW/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/
- https://security.gentoo.org/glsa/202401-30
- https://security.netapp.com/advisory/ntap-20240307-0006/
Modified: 2024-11-21
CVE-2024-0408
A flaw was found in the X.Org server. The GLX PBuffer code does not call the XACE hook when creating the buffer, leaving it unlabeled. When the client issues another request to access that resource (as with a GetGeometry) or when it creates another resource that needs to access that buffer, such as a GC, the XSELINUX code will try to use an object that was never labeled and crash because the SID is NULL.
- RHSA-2024:0320
- RHSA-2024:0320
- RHSA-2024:2169
- RHSA-2024:2169
- RHSA-2024:2170
- RHSA-2024:2170
- RHSA-2024:2995
- RHSA-2024:2995
- RHSA-2024:2996
- RHSA-2024:2996
- https://access.redhat.com/security/cve/CVE-2024-0408
- https://access.redhat.com/security/cve/CVE-2024-0408
- RHBZ#2257689
- RHBZ#2257689
- https://lists.debian.org/debian-lts-announce/2024/01/msg00016.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5J4H7CH565ALSZZYKOJFYDA5KFLG6NUK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EJBMCWQ54R6ZL3MYU2D2JBW6JMZL7BQW/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/
- https://security.gentoo.org/glsa/202401-30
- https://security.netapp.com/advisory/ntap-20240307-0006/
Modified: 2024-11-21
CVE-2024-0409
A flaw was found in the X.Org server. The cursor code in both Xephyr and Xwayland uses the wrong type of private at creation. It uses the cursor bits type with the cursor as private, and when initiating the cursor, that overwrites the XSELINUX context.
- RHSA-2024:0320
- RHSA-2024:0320
- RHSA-2024:2169
- RHSA-2024:2169
- RHSA-2024:2170
- RHSA-2024:2170
- RHSA-2024:2995
- RHSA-2024:2995
- RHSA-2024:2996
- RHSA-2024:2996
- https://access.redhat.com/security/cve/CVE-2024-0409
- https://access.redhat.com/security/cve/CVE-2024-0409
- RHBZ#2257690
- RHBZ#2257690
- https://lists.debian.org/debian-lts-announce/2024/01/msg00016.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/5J4H7CH565ALSZZYKOJFYDA5KFLG6NUK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/EJBMCWQ54R6ZL3MYU2D2JBW6JMZL7BQW/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/IZ75X54CN4IFYMIV7OK3JVZ57FHQIGIC/
- https://security.gentoo.org/glsa/202401-30
- https://security.netapp.com/advisory/ntap-20240307-0006/