ALT-BU-2024-1895-1
Branch c9f2 update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2023-5455
A Cross-site request forgery vulnerability exists in ipa/session/login_password in all supported versions of IPA. This flaw allows an attacker to trick the user into submitting a request that could perform actions as the user, resulting in a loss of confidentiality and system integrity. During community penetration testing it was found that for certain HTTP end-points FreeIPA does not ensure CSRF protection. Due to implementation details one cannot use this flaw for reflection of a cookie representing already logged-in user. An attacker would always have to go through a new authentication attempt.
- RHSA-2024:0137
- RHSA-2024:0137
- RHSA-2024:0138
- RHSA-2024:0138
- RHSA-2024:0139
- RHSA-2024:0139
- RHSA-2024:0140
- RHSA-2024:0140
- RHSA-2024:0141
- RHSA-2024:0141
- RHSA-2024:0142
- RHSA-2024:0142
- RHSA-2024:0143
- RHSA-2024:0143
- RHSA-2024:0144
- RHSA-2024:0144
- RHSA-2024:0145
- RHSA-2024:0145
- RHSA-2024:0252
- RHSA-2024:0252
- https://access.redhat.com/security/cve/CVE-2023-5455
- https://access.redhat.com/security/cve/CVE-2023-5455
- RHBZ#2242828
- RHBZ#2242828
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/U76DAZZVY7V4XQBOOV5ETPTHW3A6MW5O/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UFNUQH7IOHTKCTKQWFHONWGUBOUANL6I/
- https://www.freeipa.org/release-notes/4-10-3.html
- https://www.freeipa.org/release-notes/4-10-3.html
- https://www.freeipa.org/release-notes/4-11-1.html
- https://www.freeipa.org/release-notes/4-11-1.html
- https://www.freeipa.org/release-notes/4-6-10.html
- https://www.freeipa.org/release-notes/4-6-10.html
- https://www.freeipa.org/release-notes/4-9-14.html
- https://www.freeipa.org/release-notes/4-9-14.html
Closed vulnerabilities
Modified: 2024-11-21
CVE-2023-5981
A vulnerability was found that the response times to malformed ciphertexts in RSA-PSK ClientKeyExchange differ from response times of ciphertexts with correct PKCS#1 v1.5 padding.
- http://www.openwall.com/lists/oss-security/2024/01/19/3
- RHSA-2024:0155
- RHSA-2024:0155
- RHSA-2024:0319
- RHSA-2024:0319
- RHSA-2024:0399
- RHSA-2024:0399
- RHSA-2024:0451
- RHSA-2024:0451
- RHSA-2024:0533
- RHSA-2024:0533
- RHSA-2024:1383
- RHSA-2024:1383
- RHSA-2024:2094
- RHSA-2024:2094
- https://access.redhat.com/security/cve/CVE-2023-5981
- https://access.redhat.com/security/cve/CVE-2023-5981
- RHBZ#2248445
- RHBZ#2248445
- https://gnutls.org/security-new.html#GNUTLS-SA-2023-10-23
- https://gnutls.org/security-new.html#GNUTLS-SA-2023-10-23
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZEIOLORQ7N6WRPFXZSYDL2MC4LP7VFV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GNXKVR5YNUEBNHAHM5GSYKBZX4W2HMN2/
Closed vulnerabilities
BDU:2023-06578
Уязвимость компонента fs/ntfs.c загрузчика операционных систем Grub2, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2023-06822
Уязвимость компонента fs/ntfs.c загрузчика операционных систем Grub2, позволяющая нарушителю выполнить произвольный код
BDU:2024-00725
Уязвимость UEFI-загрузчика shim, существующая из-за непринятия мер по нейтрализации специальных элементов, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2023-40546
A flaw was found in Shim when an error happened while creating a new ESL variable. If Shim fails to create the new variable, it tries to print an error message to the user; however, the number of parameters used by the logging function doesn't match the format string used by it, leading to a crash under certain circumstances.
- RHSA-2024:1834
- RHSA-2024:1834
- RHSA-2024:1835
- RHSA-2024:1835
- RHSA-2024:1873
- RHSA-2024:1873
- RHSA-2024:1876
- RHSA-2024:1876
- RHSA-2024:1883
- RHSA-2024:1883
- RHSA-2024:1902
- RHSA-2024:1902
- RHSA-2024:1903
- RHSA-2024:1903
- RHSA-2024:1959
- RHSA-2024:1959
- RHSA-2024:2086
- RHSA-2024:2086
- https://access.redhat.com/security/cve/CVE-2023-40546
- https://access.redhat.com/security/cve/CVE-2023-40546
- RHBZ#2241796
- RHBZ#2241796
- https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html
Modified: 2024-11-21
CVE-2023-40547
A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully.
- http://www.openwall.com/lists/oss-security/2024/01/26/1
- RHSA-2024:1834
- RHSA-2024:1834
- RHSA-2024:1835
- RHSA-2024:1835
- RHSA-2024:1873
- RHSA-2024:1873
- RHSA-2024:1876
- RHSA-2024:1876
- RHSA-2024:1883
- RHSA-2024:1883
- RHSA-2024:1902
- RHSA-2024:1902
- RHSA-2024:1903
- RHSA-2024:1903
- RHSA-2024:1959
- RHSA-2024:1959
- RHSA-2024:2086
- RHSA-2024:2086
- https://access.redhat.com/security/cve/CVE-2023-40547
- https://access.redhat.com/security/cve/CVE-2023-40547
- RHBZ#2234589
- RHBZ#2234589
- https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html
Modified: 2024-11-21
CVE-2023-40548
A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase.
- RHSA-2024:1834
- RHSA-2024:1834
- RHSA-2024:1835
- RHSA-2024:1835
- RHSA-2024:1873
- RHSA-2024:1873
- RHSA-2024:1876
- RHSA-2024:1876
- RHSA-2024:1883
- RHSA-2024:1883
- RHSA-2024:1902
- RHSA-2024:1902
- RHSA-2024:1903
- RHSA-2024:1903
- RHSA-2024:1959
- RHSA-2024:1959
- RHSA-2024:2086
- RHSA-2024:2086
- https://access.redhat.com/security/cve/CVE-2023-40548
- https://access.redhat.com/security/cve/CVE-2023-40548
- RHBZ#2241782
- RHBZ#2241782
- https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html
Modified: 2024-11-21
CVE-2023-40549
An out-of-bounds read flaw was found in Shim due to the lack of proper boundary verification during the load of a PE binary. This flaw allows an attacker to load a crafted PE binary, triggering the issue and crashing Shim, resulting in a denial of service.
- RHSA-2024:1834
- RHSA-2024:1834
- RHSA-2024:1835
- RHSA-2024:1835
- RHSA-2024:1873
- RHSA-2024:1873
- RHSA-2024:1876
- RHSA-2024:1876
- RHSA-2024:1883
- RHSA-2024:1883
- RHSA-2024:1902
- RHSA-2024:1902
- RHSA-2024:1903
- RHSA-2024:1903
- RHSA-2024:1959
- RHSA-2024:1959
- RHSA-2024:2086
- RHSA-2024:2086
- https://access.redhat.com/security/cve/CVE-2023-40549
- https://access.redhat.com/security/cve/CVE-2023-40549
- RHBZ#2241797
- RHBZ#2241797
- https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html
Modified: 2024-11-21
CVE-2023-40550
An out-of-bounds read flaw was found in Shim when it tried to validate the SBAT information. This issue may expose sensitive data during the system's boot phase.
- RHSA-2024:1834
- RHSA-2024:1834
- RHSA-2024:1835
- RHSA-2024:1835
- RHSA-2024:1873
- RHSA-2024:1873
- RHSA-2024:1876
- RHSA-2024:1876
- RHSA-2024:1883
- RHSA-2024:1883
- RHSA-2024:1902
- RHSA-2024:1902
- RHSA-2024:1903
- RHSA-2024:1903
- RHSA-2024:1959
- RHSA-2024:1959
- RHSA-2024:2086
- RHSA-2024:2086
- https://access.redhat.com/security/cve/CVE-2023-40550
- https://access.redhat.com/security/cve/CVE-2023-40550
- RHBZ#2259915
- RHBZ#2259915
- https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html
Modified: 2024-11-21
CVE-2023-40551
A flaw was found in the MZ binary format in Shim. An out-of-bounds read may occur, leading to a crash or possible exposure of sensitive data during the system's boot phase.
- RHSA-2024:1834
- RHSA-2024:1834
- RHSA-2024:1835
- RHSA-2024:1835
- RHSA-2024:1873
- RHSA-2024:1873
- RHSA-2024:1876
- RHSA-2024:1876
- RHSA-2024:1883
- RHSA-2024:1883
- RHSA-2024:1902
- RHSA-2024:1902
- RHSA-2024:1903
- RHSA-2024:1903
- RHSA-2024:1959
- RHSA-2024:1959
- RHSA-2024:2086
- RHSA-2024:2086
- https://access.redhat.com/security/cve/CVE-2023-40551
- https://access.redhat.com/security/cve/CVE-2023-40551
- RHBZ#2259918
- RHBZ#2259918
- https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html
Modified: 2024-11-21
CVE-2023-4692
An out-of-bounds write flaw was found in grub2's NTFS filesystem driver. This issue may allow an attacker to present a specially crafted NTFS filesystem image, leading to grub's heap metadata corruption. In some circumstances, the attack may also corrupt the UEFI firmware heap metadata. As a result, arbitrary code execution and secure boot protection bypass may be achieved.
- RHSA-2024:2456
- RHSA-2024:2456
- RHSA-2024:3184
- RHSA-2024:3184
- https://access.redhat.com/security/cve/CVE-2023-4692
- https://access.redhat.com/security/cve/CVE-2023-4692
- RHBZ#2236613
- RHBZ#2236613
- https://dfir.ru/2023/10/03/cve-2023-4692-cve-2023-4693-vulnerabilities-in-the-grub-boot-manager/
- https://dfir.ru/2023/10/03/cve-2023-4692-cve-2023-4693-vulnerabilities-in-the-grub-boot-manager/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUU42E7CPYLATXOYVYNW6YTXXULAOV6L/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIRJ5UZRXX2KLR4IKBJEQUNGOCXMMDLY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PERFILCHFEUGG3OAMC6W55P6DDIBZK4Q/
- https://lists.gnu.org/archive/html/grub-devel/2023-10/msg00028.html
- https://lists.gnu.org/archive/html/grub-devel/2023-10/msg00028.html
- https://seclists.org/oss-sec/2023/q4/37
- https://seclists.org/oss-sec/2023/q4/37
- https://security.gentoo.org/glsa/202311-14
- https://security.netapp.com/advisory/ntap-20231208-0002/
Modified: 2024-11-21
CVE-2023-4693
An out-of-bounds read flaw was found on grub2's NTFS filesystem driver. This issue may allow a physically present attacker to present a specially crafted NTFS file system image to read arbitrary memory locations. A successful attack allows sensitive data cached in memory or EFI variable values to be leaked, presenting a high Confidentiality risk.
- RHSA-2024:2456
- RHSA-2024:2456
- RHSA-2024:3184
- RHSA-2024:3184
- https://access.redhat.com/security/cve/CVE-2023-4693
- https://access.redhat.com/security/cve/CVE-2023-4693
- RHBZ#2238343
- RHBZ#2238343
- https://dfir.ru/2023/10/03/cve-2023-4692-cve-2023-4693-vulnerabilities-in-the-grub-boot-manager/
- https://dfir.ru/2023/10/03/cve-2023-4692-cve-2023-4693-vulnerabilities-in-the-grub-boot-manager/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FUU42E7CPYLATXOYVYNW6YTXXULAOV6L/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OIRJ5UZRXX2KLR4IKBJEQUNGOCXMMDLY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/PERFILCHFEUGG3OAMC6W55P6DDIBZK4Q/
- https://lists.gnu.org/archive/html/grub-devel/2023-10/msg00028.html
- https://lists.gnu.org/archive/html/grub-devel/2023-10/msg00028.html
- https://seclists.org/oss-sec/2023/q4/37
- https://seclists.org/oss-sec/2023/q4/37
- https://security.gentoo.org/glsa/202311-14
- https://security.netapp.com/advisory/ntap-20231208-0002/