ALT-BU-2024-6454-1
Branch p10 update bulletin.
Closed vulnerabilities
BDU:2024-00725
Уязвимость UEFI-загрузчика shim, существующая из-за непринятия мер по нейтрализации специальных элементов, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2023-40546
A flaw was found in Shim when an error happened while creating a new ESL variable. If Shim fails to create the new variable, it tries to print an error message to the user; however, the number of parameters used by the logging function doesn't match the format string used by it, leading to a crash under certain circumstances.
- RHSA-2024:1834
- RHSA-2024:1834
- RHSA-2024:1835
- RHSA-2024:1835
- RHSA-2024:1873
- RHSA-2024:1873
- RHSA-2024:1876
- RHSA-2024:1876
- RHSA-2024:1883
- RHSA-2024:1883
- RHSA-2024:1902
- RHSA-2024:1902
- RHSA-2024:1903
- RHSA-2024:1903
- RHSA-2024:1959
- RHSA-2024:1959
- RHSA-2024:2086
- RHSA-2024:2086
- https://access.redhat.com/security/cve/CVE-2023-40546
- https://access.redhat.com/security/cve/CVE-2023-40546
- RHBZ#2241796
- RHBZ#2241796
- https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html
Modified: 2024-11-21
CVE-2023-40547
A remote code execution vulnerability was found in Shim. The Shim boot support trusts attacker-controlled values when parsing an HTTP response. This flaw allows an attacker to craft a specific malicious HTTP request, leading to a completely controlled out-of-bounds write primitive and complete system compromise. This flaw is only exploitable during the early boot phase, an attacker needs to perform a Man-in-the-Middle or compromise the boot server to be able to exploit this vulnerability successfully.
- http://www.openwall.com/lists/oss-security/2024/01/26/1
- RHSA-2024:1834
- RHSA-2024:1834
- RHSA-2024:1835
- RHSA-2024:1835
- RHSA-2024:1873
- RHSA-2024:1873
- RHSA-2024:1876
- RHSA-2024:1876
- RHSA-2024:1883
- RHSA-2024:1883
- RHSA-2024:1902
- RHSA-2024:1902
- RHSA-2024:1903
- RHSA-2024:1903
- RHSA-2024:1959
- RHSA-2024:1959
- RHSA-2024:2086
- RHSA-2024:2086
- https://access.redhat.com/security/cve/CVE-2023-40547
- https://access.redhat.com/security/cve/CVE-2023-40547
- RHBZ#2234589
- RHBZ#2234589
- https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html
Modified: 2024-11-21
CVE-2023-40548
A buffer overflow was found in Shim in the 32-bit system. The overflow happens due to an addition operation involving a user-controlled value parsed from the PE binary being used by Shim. This value is further used for memory allocation operations, leading to a heap-based buffer overflow. This flaw causes memory corruption and can lead to a crash or data integrity issues during the boot phase.
- RHSA-2024:1834
- RHSA-2024:1834
- RHSA-2024:1835
- RHSA-2024:1835
- RHSA-2024:1873
- RHSA-2024:1873
- RHSA-2024:1876
- RHSA-2024:1876
- RHSA-2024:1883
- RHSA-2024:1883
- RHSA-2024:1902
- RHSA-2024:1902
- RHSA-2024:1903
- RHSA-2024:1903
- RHSA-2024:1959
- RHSA-2024:1959
- RHSA-2024:2086
- RHSA-2024:2086
- https://access.redhat.com/security/cve/CVE-2023-40548
- https://access.redhat.com/security/cve/CVE-2023-40548
- RHBZ#2241782
- RHBZ#2241782
- https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html
Modified: 2024-11-21
CVE-2023-40549
An out-of-bounds read flaw was found in Shim due to the lack of proper boundary verification during the load of a PE binary. This flaw allows an attacker to load a crafted PE binary, triggering the issue and crashing Shim, resulting in a denial of service.
- RHSA-2024:1834
- RHSA-2024:1834
- RHSA-2024:1835
- RHSA-2024:1835
- RHSA-2024:1873
- RHSA-2024:1873
- RHSA-2024:1876
- RHSA-2024:1876
- RHSA-2024:1883
- RHSA-2024:1883
- RHSA-2024:1902
- RHSA-2024:1902
- RHSA-2024:1903
- RHSA-2024:1903
- RHSA-2024:1959
- RHSA-2024:1959
- RHSA-2024:2086
- RHSA-2024:2086
- https://access.redhat.com/security/cve/CVE-2023-40549
- https://access.redhat.com/security/cve/CVE-2023-40549
- RHBZ#2241797
- RHBZ#2241797
- https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html
Modified: 2024-11-21
CVE-2023-40550
An out-of-bounds read flaw was found in Shim when it tried to validate the SBAT information. This issue may expose sensitive data during the system's boot phase.
- RHSA-2024:1834
- RHSA-2024:1834
- RHSA-2024:1835
- RHSA-2024:1835
- RHSA-2024:1873
- RHSA-2024:1873
- RHSA-2024:1876
- RHSA-2024:1876
- RHSA-2024:1883
- RHSA-2024:1883
- RHSA-2024:1902
- RHSA-2024:1902
- RHSA-2024:1903
- RHSA-2024:1903
- RHSA-2024:1959
- RHSA-2024:1959
- RHSA-2024:2086
- RHSA-2024:2086
- https://access.redhat.com/security/cve/CVE-2023-40550
- https://access.redhat.com/security/cve/CVE-2023-40550
- RHBZ#2259915
- RHBZ#2259915
- https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html
Modified: 2024-11-21
CVE-2023-40551
A flaw was found in the MZ binary format in Shim. An out-of-bounds read may occur, leading to a crash or possible exposure of sensitive data during the system's boot phase.
- RHSA-2024:1834
- RHSA-2024:1834
- RHSA-2024:1835
- RHSA-2024:1835
- RHSA-2024:1873
- RHSA-2024:1873
- RHSA-2024:1876
- RHSA-2024:1876
- RHSA-2024:1883
- RHSA-2024:1883
- RHSA-2024:1902
- RHSA-2024:1902
- RHSA-2024:1903
- RHSA-2024:1903
- RHSA-2024:1959
- RHSA-2024:1959
- RHSA-2024:2086
- RHSA-2024:2086
- https://access.redhat.com/security/cve/CVE-2023-40551
- https://access.redhat.com/security/cve/CVE-2023-40551
- RHBZ#2259918
- RHBZ#2259918
- https://lists.debian.org/debian-lts-announce/2024/05/msg00009.html
Closed bugs
libowt-tg заменяется на libowt-tg-devel при dist-upgrade
Closed vulnerabilities
BDU:2023-00640
Уязвимость демона pesign подсистемы инициализации и управления службами systemd, позволяющая нарушителю повысить свои привилегии
Modified: 2024-11-21
CVE-2022-1249
A NULL pointer dereference flaw was found in pesign's cms_set_pw_data() function of the cms_common.c file. The function fails to handle the NULL pwdata invocation from daemon.c, which leads to an explicit NULL dereference and crash on all attempts to daemonize pesign.
Modified: 2025-03-26
CVE-2022-3560
A flaw was found in pesign. The pesign package provides a systemd service used to start the pesign daemon. This service unit runs a script to set ACLs for /etc/pki/pesign and /run/pesign directories to grant access privileges to users in the 'pesign' group. However, the script doesn't check for symbolic links. This could allow an attacker to gain access to privileged files and directories via a path traversal attack.
Package myconnector updated to version 2.5.2-alt1 for branch p10 in task 344376.
Closed bugs
Не создаётся киоск в режиме "Запуск выбранного подключения" на Education XFCE
Package kde5-kdialog updated to version 23.08.5-alt2 for branch p10 in task 343002.
Closed bugs
Нельзя сохранить преобразованный из ГОСТ файл
Package kde5-kompare updated to version 23.08.5-alt2 for branch p10 in task 344463.
Closed bugs
kde5-kompare - невозможно найти документацию из меню настроек приложения