ALT-BU-2024-4007-2
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2025-10-29
BDU:2024-03243
Уязвимость драйвера AuthentIC набора программных инструментов и библиотек для работы со смарт-картами OpenSC, позволяющая нарушителю позволить скомпрометировать операции по управлению картами
Modified: 2025-11-19
BDU:2025-07729
Уязвимость библиотеки работы со смарт-картами OpenSC, связанная с раскрытием информации через несоответствие, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-11-03
CVE-2023-5992
A vulnerability was found in OpenSC where PKCS#1 encryption padding removal is not implemented as side-channel resistant. This issue may result in the potential leak of private data.
- https://access.redhat.com/errata/RHSA-2024:0966
- https://access.redhat.com/errata/RHSA-2024:0967
- https://access.redhat.com/security/cve/CVE-2023-5992
- https://bugzilla.redhat.com/show_bug.cgi?id=2248685
- https://github.com/OpenSC/OpenSC/wiki/CVE-2023-5992
- https://www.usenix.org/system/files/usenixsecurity24-shagam.pdf
- https://access.redhat.com/errata/RHSA-2024:0966
- https://access.redhat.com/errata/RHSA-2024:0967
- https://access.redhat.com/security/cve/CVE-2023-5992
- https://bugzilla.redhat.com/show_bug.cgi?id=2248685
- https://github.com/OpenSC/OpenSC/wiki/CVE-2023-5992
- https://lists.debian.org/debian-lts-announce/2024/12/msg00026.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OWIZ5ZLO5ECYPLSTESCF7I7PQO5X6ZSU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RJI2FWLY24EOPALQ43YPQEZMEP3APPPI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UECKC7X4IM4YZQ5KRQMNBNKNOXLZC7RZ/
Modified: 2025-11-03
CVE-2024-1454
The use-after-free vulnerability was found in the AuthentIC driver in OpenSC packages, occuring in the card enrolment process using pkcs15-init when a user or administrator enrols or modifies cards. An attacker must have physical access to the computer system and requires a crafted USB device or smart card to present the system with specially crafted responses to the APDUs, which are considered high complexity and low severity. This manipulation can allow for compromised card management operations during enrolment.
- https://access.redhat.com/security/cve/CVE-2024-1454
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=64898
- https://bugzilla.redhat.com/show_bug.cgi?id=2263929
- https://github.com/OpenSC/OpenSC/commit/5835f0d4f6c033bd58806d33fa546908d39825c9
- https://access.redhat.com/security/cve/CVE-2024-1454
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=64898
- https://bugzilla.redhat.com/show_bug.cgi?id=2263929
- https://github.com/OpenSC/OpenSC/commit/5835f0d4f6c033bd58806d33fa546908d39825c9
- https://lists.debian.org/debian-lts-announce/2024/12/msg00026.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/OWIZ5ZLO5ECYPLSTESCF7I7PQO5X6ZSU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/RJI2FWLY24EOPALQ43YPQEZMEP3APPPI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/UECKC7X4IM4YZQ5KRQMNBNKNOXLZC7RZ/
Package plasma5-workspace updated to version 5.27.11-alt2 for branch sisyphus in task 342630.
Closed bugs
Настроить рабочий стол и обои -> появляется вопрос "В текущем модуле имеются несохраненные изменения. Применить их?" при отсутствии изменений
Package plasma5-bluedevil updated to version 5.27.11-alt2 for branch sisyphus in task 342687.
Closed bugs
Некорректная работа Bluetooth мыши Acer OMR050
Closed vulnerabilities
Modified: 2025-10-14
BDU:2024-05040
Уязвимость приложения для визуализации графов Graphviz, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
Modified: 2025-11-04
CVE-2023-46045
Graphviz 2.36.0 through 9.x before 10.0.1 has an out-of-bounds read via a crafted config6a file. NOTE: exploitability may be uncommon because this file is typically owned by root.
- http://seclists.org/fulldisclosure/2024/Feb/24
- https://gitlab.com/graphviz/graphviz/-/issues/2441
- https://seclists.org/fulldisclosure/2024/Feb/24
- https://seclists.org/fulldisclosure/2024/Jan/73
- https://www.openwall.com/lists/oss-security/2024/02/01/2
- http://packetstormsecurity.com/files/176816/graphviz-2.43.0-Buffer-Overflow-Code-Execution.html
- http://seclists.org/fulldisclosure/2024/Feb/24
- http://seclists.org/fulldisclosure/2024/Jan/62
- http://seclists.org/fulldisclosure/2024/Jan/73
- https://gitlab.com/graphviz/graphviz/-/issues/2441
- https://seclists.org/fulldisclosure/2024/Feb/24
- https://seclists.org/fulldisclosure/2024/Jan/73
- https://www.openwall.com/lists/oss-security/2024/02/01/2
