ALT-BU-2024-4417-1
Branch sisyphus_riscv64 update bulletin.
Package matrix-synapse updated to version 1.101.0-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2023-07183
Уязвимость механизма управления доступа Access Control List (ACL) домашнего сервера Synapse, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2023-41335
Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foundation. When users update their passwords, the new credentials may be briefly held in the server database. While this doesn't grant the server any added capabilities—it already learns the users' passwords as part of the authentication process—it does disrupt the expectation that passwords won't be stored in the database. As a result, these passwords could inadvertently be captured in database backups for a longer duration. These temporarily stored passwords are automatically erased after a 48-hour window. This issue has been addressed in version 1.93.0. Users are advised to upgrade. There are no known workarounds for this issue.
- https://github.com/matrix-org/synapse/pull/16272
- https://github.com/matrix-org/synapse/pull/16272
- https://github.com/matrix-org/synapse/security/advisories/GHSA-4f74-84v3-j9q5
- https://github.com/matrix-org/synapse/security/advisories/GHSA-4f74-84v3-j9q5
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AFB2Y3S2VCPCN5P2XCZTG24MBMZ7DM4/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AFB2Y3S2VCPCN5P2XCZTG24MBMZ7DM4/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/65QPC55I4D27HIZP7H2NQ34EOXHPP4AO/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/65QPC55I4D27HIZP7H2NQ34EOXHPP4AO/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6P4QULVUE254WI7XF2LWWOGHCYVFXFY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6P4QULVUE254WI7XF2LWWOGHCYVFXFY/
- https://security.gentoo.org/glsa/202401-12
- https://security.gentoo.org/glsa/202401-12
Modified: 2024-11-21
CVE-2023-42453
Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foundation. Users were able to forge read receipts for any event (if they knew the room ID and event ID). Note that the users were not able to view the events, but simply mark it as read. This could be confusing as clients will show the event as read by the user, even if they are not in the room. This issue has been patched in version 1.93.0. Users are advised to upgrade. There are no known workarounds for this issue.
- https://github.com/matrix-org/synapse/pull/16327
- https://github.com/matrix-org/synapse/pull/16327
- https://github.com/matrix-org/synapse/security/advisories/GHSA-7565-cq32-vx2x
- https://github.com/matrix-org/synapse/security/advisories/GHSA-7565-cq32-vx2x
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AFB2Y3S2VCPCN5P2XCZTG24MBMZ7DM4/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2AFB2Y3S2VCPCN5P2XCZTG24MBMZ7DM4/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/65QPC55I4D27HIZP7H2NQ34EOXHPP4AO/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/65QPC55I4D27HIZP7H2NQ34EOXHPP4AO/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6P4QULVUE254WI7XF2LWWOGHCYVFXFY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6P4QULVUE254WI7XF2LWWOGHCYVFXFY/
- https://security.gentoo.org/glsa/202401-12
- https://security.gentoo.org/glsa/202401-12
Modified: 2025-02-13
CVE-2023-43796
Synapse is an open-source Matrix homeserver Prior to versions 1.95.1 and 1.96.0rc1, cached device information of remote users can be queried from Synapse. This can be used to enumerate the remote users known to a homeserver. System administrators are encouraged to upgrade to Synapse 1.95.1 or 1.96.0rc1 to receive a patch. As a workaround, the `federation_domain_whitelist` can be used to limit federation traffic with a homeserver.
- https://github.com/matrix-org/synapse/commit/daec55e1fe120c564240c5386e77941372bf458f
- https://github.com/matrix-org/synapse/commit/daec55e1fe120c564240c5386e77941372bf458f
- https://github.com/matrix-org/synapse/security/advisories/GHSA-mp92-3jfm-3575
- https://github.com/matrix-org/synapse/security/advisories/GHSA-mp92-3jfm-3575
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2IDEEZMFJBDLTFHQUTZRJJNCOZGQ2ZVS/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2IDEEZMFJBDLTFHQUTZRJJNCOZGQ2ZVS/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VH3RNC5ZPQZ4OKPSL4E6BBJSZOQLGDEY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VH3RNC5ZPQZ4OKPSL4E6BBJSZOQLGDEY/
- https://security.gentoo.org/glsa/202401-12
- https://security.gentoo.org/glsa/202401-12
Modified: 2024-11-21
CVE-2023-45129
Synapse is an open-source Matrix homeserver written and maintained by the Matrix.org Foundation. Prior to version 1.94.0, a malicious server ACL event can impact performance temporarily or permanently leading to a persistent denial of service. Homeservers running on a closed federation (which presumably do not need to use server ACLs) are not affected. Server administrators are advised to upgrade to Synapse 1.94.0 or later. As a workaround, rooms with malicious server ACL events can be purged and blocked using the admin API.
- https://github.com/matrix-org/synapse/pull/16360
- https://github.com/matrix-org/synapse/pull/16360
- https://github.com/matrix-org/synapse/security/advisories/GHSA-5chr-wjw5-3gq4
- https://github.com/matrix-org/synapse/security/advisories/GHSA-5chr-wjw5-3gq4
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KEVRB4MG5UXQ5RLZHSUJXM5GWEBYYS5B/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KEVRB4MG5UXQ5RLZHSUJXM5GWEBYYS5B/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6P4QULVUE254WI7XF2LWWOGHCYVFXFY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/N6P4QULVUE254WI7XF2LWWOGHCYVFXFY/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WRO4MPQ6HOXIUZM6RJP6VTCTMV7RD2T3/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WRO4MPQ6HOXIUZM6RJP6VTCTMV7RD2T3/
- https://matrix-org.github.io/synapse/latest/admin_api/rooms.html#version-2-new-version
- https://matrix-org.github.io/synapse/latest/admin_api/rooms.html#version-2-new-version
- https://security.gentoo.org/glsa/202401-12
- https://security.gentoo.org/glsa/202401-12
Package libvirt updated to version 9.8.0-alt5 for branch sisyphus_riscv64.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2024-2494
A flaw was found in the RPC library APIs of libvirt. The RPC server deserialization code allocates memory for arrays before the non-negative length check is performed by the C API entry points. Passing a negative length to the g_new0 function results in a crash due to the negative length being treated as a huge positive number. This flaw allows a local, unprivileged user to perform a denial of service attack by causing the libvirt daemon to crash.
- RHSA-2024:2560
- RHSA-2024:2560
- RHSA-2024:3253
- RHSA-2024:3253
- https://access.redhat.com/security/cve/CVE-2024-2494
- https://access.redhat.com/security/cve/CVE-2024-2494
- RHBZ#2270115
- RHBZ#2270115
- https://lists.debian.org/debian-lts-announce/2024/04/msg00000.html
- https://lists.libvirt.org/archives/list/devel@lists.libvirt.org/thread/BKRQXPLPC6B7FLHJXSBQYW7HNDEBW6RJ/
- https://lists.libvirt.org/archives/list/devel@lists.libvirt.org/thread/BKRQXPLPC6B7FLHJXSBQYW7HNDEBW6RJ/
- https://security.netapp.com/advisory/ntap-20240517-0009/
Package cameractrls updated to version 0.5.15-alt2 for branch sisyphus_riscv64.
Closed bugs
Cameractrls не запускается.
Package podman updated to version 5.0.0-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2024-02163
Уязвимость программного средства управления и запуска OCI-контейнеров Podman, связанная с ошибками при управлении привилегиями, позволяющая нарушителю повысить свои привилегии
Modified: 2024-11-26
CVE-2024-1753
A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.
- RHSA-2024:2049
- RHSA-2024:2055
- RHSA-2024:2064
- RHSA-2024:2066
- RHSA-2024:2077
- RHSA-2024:2084
- RHSA-2024:2089
- RHSA-2024:2090
- RHSA-2024:2097
- RHSA-2024:2098
- RHSA-2024:2548
- RHSA-2024:2645
- RHSA-2024:2669
- RHSA-2024:2672
- RHSA-2024:2784
- RHSA-2024:2877
- RHSA-2024:3254
- https://access.redhat.com/security/cve/CVE-2024-1753
- RHBZ#2265513
- https://github.com/containers/buildah/security/advisories/GHSA-pmf3-c36m-g5cf
- https://github.com/containers/podman/security/advisories/GHSA-874v-pj72-92f3
- https://pkg.go.dev/vuln/GO-2024-2658
- RHSA-2024:2049
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FCRZVUDOFM5CPREQKBEU2VK2QK62PSBP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOYMVMQ7RWMDTSKQTBO734BE3WQPI2AJ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZVBSVZGVABPYIHK5HZM472NPGWMI7WXH/
- https://github.com/containers/podman/security/advisories/GHSA-874v-pj72-92f3
- https://github.com/containers/buildah/security/advisories/GHSA-pmf3-c36m-g5cf
- RHBZ#2265513
- https://access.redhat.com/security/cve/CVE-2024-1753
- RHSA-2024:3254
- RHSA-2024:2877
- RHSA-2024:2784
- RHSA-2024:2672
- RHSA-2024:2669
- RHSA-2024:2645
- RHSA-2024:2548
- RHSA-2024:2098
- RHSA-2024:2097
- RHSA-2024:2090
- RHSA-2024:2089
- RHSA-2024:2084
- RHSA-2024:2077
- RHSA-2024:2066
- RHSA-2024:2064
- RHSA-2024:2055
Package buildah updated to version 1.35.1-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2024-02163
Уязвимость программного средства управления и запуска OCI-контейнеров Podman, связанная с ошибками при управлении привилегиями, позволяющая нарушителю повысить свои привилегии
Modified: 2024-11-26
CVE-2024-1753
A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.
- RHSA-2024:2049
- RHSA-2024:2055
- RHSA-2024:2064
- RHSA-2024:2066
- RHSA-2024:2077
- RHSA-2024:2084
- RHSA-2024:2089
- RHSA-2024:2090
- RHSA-2024:2097
- RHSA-2024:2098
- RHSA-2024:2548
- RHSA-2024:2645
- RHSA-2024:2669
- RHSA-2024:2672
- RHSA-2024:2784
- RHSA-2024:2877
- RHSA-2024:3254
- https://access.redhat.com/security/cve/CVE-2024-1753
- RHBZ#2265513
- https://github.com/containers/buildah/security/advisories/GHSA-pmf3-c36m-g5cf
- https://github.com/containers/podman/security/advisories/GHSA-874v-pj72-92f3
- https://pkg.go.dev/vuln/GO-2024-2658
- RHSA-2024:2049
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FCRZVUDOFM5CPREQKBEU2VK2QK62PSBP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOYMVMQ7RWMDTSKQTBO734BE3WQPI2AJ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZVBSVZGVABPYIHK5HZM472NPGWMI7WXH/
- https://github.com/containers/podman/security/advisories/GHSA-874v-pj72-92f3
- https://github.com/containers/buildah/security/advisories/GHSA-pmf3-c36m-g5cf
- RHBZ#2265513
- https://access.redhat.com/security/cve/CVE-2024-1753
- RHSA-2024:3254
- RHSA-2024:2877
- RHSA-2024:2784
- RHSA-2024:2672
- RHSA-2024:2669
- RHSA-2024:2645
- RHSA-2024:2548
- RHSA-2024:2098
- RHSA-2024:2097
- RHSA-2024:2090
- RHSA-2024:2089
- RHSA-2024:2084
- RHSA-2024:2077
- RHSA-2024:2066
- RHSA-2024:2064
- RHSA-2024:2055