ALT-BU-2024-1204-1
Branch sisyphus_riscv64 update bulletin.
Package freeswitch updated to version 1.10.11-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2023-51443
FreeSWITCH is a Software Defined Telecom Stack enabling the digital transformation from proprietary telecom switches to a software implementation that runs on any commodity hardware. Prior to version 1.10.11, when handling DTLS-SRTP for media setup, FreeSWITCH is susceptible to Denial of Service due to a race condition in the hello handshake phase of the DTLS protocol. This attack can be done continuously, thus denying new DTLS-SRTP encrypted calls during the attack. If an attacker manages to send a ClientHello DTLS message with an invalid CipherSuite (such as `TLS_NULL_WITH_NULL_NULL`) to the port on the FreeSWITCH server that is expecting packets from the caller, a DTLS error is generated. This results in the media session being torn down, which is followed by teardown at signaling (SIP) level too. Abuse of this vulnerability may lead to a massive Denial of Service on vulnerable FreeSWITCH servers for calls that rely on DTLS-SRTP. To address this vulnerability, upgrade FreeSWITCH to 1.10.11 which includes the security fix. The solution implemented is to drop all packets from addresses that have not been validated by an ICE check.
- http://packetstormsecurity.com/files/176393/FreeSWITCH-Denial-Of-Service.html
- http://packetstormsecurity.com/files/176393/FreeSWITCH-Denial-Of-Service.html
- https://github.com/signalwire/freeswitch/commit/86cbda90b84ba186e508fbc7bfae469270a97d11
- https://github.com/signalwire/freeswitch/commit/86cbda90b84ba186e508fbc7bfae469270a97d11
- https://github.com/signalwire/freeswitch/security/advisories/GHSA-39gv-hq72-j6m6
- https://github.com/signalwire/freeswitch/security/advisories/GHSA-39gv-hq72-j6m6
Package frr updated to version 9.0.2-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2023-08243
Уязвимость программного средства реализации сетевой маршрутизации на Unix-подобных системах FRRouting, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-08631
Уязвимость программного средства реализации сетевой маршрутизации на Unix-подобных системах FRRouting, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2023-46752
An issue was discovered in FRRouting FRR through 9.0.1. It mishandles malformed MP_REACH_NLRI data, leading to a crash.
- https://github.com/FRRouting/frr/pull/14645/commits/b08afc81c60607a4f736f418f2e3eb06087f1a35
- https://github.com/FRRouting/frr/pull/14645/commits/b08afc81c60607a4f736f418f2e3eb06087f1a35
- [debian-lts-announce] 20240428 [SECURITY] [DLA 3797-1] frr security update
- [debian-lts-announce] 20240428 [SECURITY] [DLA 3797-1] frr security update
Modified: 2024-11-21
CVE-2023-46753
An issue was discovered in FRRouting FRR through 9.0.1. A crash can occur for a crafted BGP UPDATE message without mandatory attributes, e.g., one with only an unknown transit attribute.
- https://github.com/FRRouting/frr/pull/14645/commits/d8482bf011cb2b173e85b65b4bf3d5061250cdb9
- https://github.com/FRRouting/frr/pull/14645/commits/d8482bf011cb2b173e85b65b4bf3d5061250cdb9
- [debian-lts-announce] 20240428 [SECURITY] [DLA 3797-1] frr security update
- [debian-lts-announce] 20240428 [SECURITY] [DLA 3797-1] frr security update
Modified: 2024-11-21
CVE-2023-47234
An issue was discovered in FRRouting FRR through 9.0.1. A crash can occur when processing a crafted BGP UPDATE message with a MP_UNREACH_NLRI attribute and additional NLRI data (that lacks mandatory path attributes).
- https://github.com/FRRouting/frr/pull/14716/commits/c37119df45bbf4ef713bc10475af2ee06e12f3bf
- https://github.com/FRRouting/frr/pull/14716/commits/c37119df45bbf4ef713bc10475af2ee06e12f3bf
- [debian-lts-announce] 20240428 [SECURITY] [DLA 3797-1] frr security update
- [debian-lts-announce] 20240428 [SECURITY] [DLA 3797-1] frr security update
Modified: 2024-11-21
CVE-2023-47235
An issue was discovered in FRRouting FRR through 9.0.1. A crash can occur when a malformed BGP UPDATE message with an EOR is processed, because the presence of EOR does not lead to a treat-as-withdraw outcome.
- https://github.com/FRRouting/frr/pull/14716/commits/6814f2e0138a6ea5e1f83bdd9085d9a77999900b
- https://github.com/FRRouting/frr/pull/14716/commits/6814f2e0138a6ea5e1f83bdd9085d9a77999900b
- [debian-lts-announce] 20240428 [SECURITY] [DLA 3797-1] frr security update
- [debian-lts-announce] 20240428 [SECURITY] [DLA 3797-1] frr security update
Package 389-ds-base updated to version 2.4.4-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2023-04786
Уязвимость плагина Content Synchronization сервера службы каталогов 389 Directory Server, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2022-2850
A flaw was found In 389-ds-base. When the Content Synchronization plugin is enabled, an authenticated user can reach a NULL pointer dereference using a specially crafted query. This flaw allows an authenticated attacker to cause a denial of service. This CVE is assigned against an incomplete fix of CVE-2021-3514.
- https://access.redhat.com/security/cve/CVE-2022-2850
- https://access.redhat.com/security/cve/CVE-2022-2850
- https://bugzilla.redhat.com/show_bug.cgi?id=2118691
- https://bugzilla.redhat.com/show_bug.cgi?id=2118691
- https://lists.debian.org/debian-lts-announce/2023/04/msg00026.html
- https://lists.debian.org/debian-lts-announce/2023/04/msg00026.html
Package admx-basealt updated to version 0.1.13.5-alt1 for branch sisyphus_riscv64.
Closed bugs
Скорректировать опции в политике Обратный поиск DNS для запросов OpenLDAP
(FR) Поправить англицизм в Разрешения PackageKit: экшена → действия
Опечатка в описании политики "Настройка механизма копирования файлов"
Стилистически неверное описание пункта списка (Только root может запускать -> Только root) для политики Разрешения для /usr/sbin/pppd
Поправить описание политики: /usr/bin/postqueue -> /usr/sbin/postqueue
Опечатка и несогласованное предложение в описании политики
Package admc updated to version 0.15.2-alt1 for branch sisyphus_riscv64.
Closed bugs
При первом запуске admc сообщение: Тема, указанная в настройках, не найдена