ALT-BU-2024-9241-1
Branch c10f2 update bulletin.
Closed vulnerabilities
BDU:2024-03304
Уязвимость эмулятора аппаратного обеспечения QEMU, связанная с ошибкой повторного освобождения памяти, позволяющая нарушителю выполнить произвольный код
BDU:2024-03819
Уязвимость функции sdhci_write_dataport эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2024-3446
A double free vulnerability was found in QEMU virtio devices (virtio-gpu, virtio-serial-bus, virtio-crypto), where the mem_reentrancy_guard flag insufficiently protects against DMA reentrancy issues. This issue could allow a malicious privileged guest user to crash the QEMU process on the host, resulting in a denial of service or allow arbitrary code execution within the context of the QEMU process on the host.
Modified: 2024-11-15
CVE-2024-3447
A heap-based buffer overflow was found in the SDHCI device emulation of QEMU. The bug is triggered when both `s->data_count` and the size of `s->fifo_buffer` are set to 0x200, leading to an out-of-bound access. A malicious guest could use this flaw to crash the QEMU process on the host, resulting in a denial of service condition.
Modified: 2024-11-21
CVE-2024-3567
A flaw was found in QEMU. An assertion failure was present in the update_sctp_checksum() function in hw/net/net_tx_pkt.c when trying to calculate the checksum of a short-sized fragmented packet. This flaw allows a malicious guest to crash QEMU and cause a denial of service condition.
Closed vulnerabilities
Modified: 2024-11-24
CVE-2024-2698
A vulnerability was found in FreeIPA in how the initial implementation of MS-SFU by MIT Kerberos was missing a condition for granting the "forwardable" flag on S4U2Self tickets. Fixing this mistake required adding a special case for the check_allowed_to_delegate() function: If the target service argument is NULL, then it means the KDC is probing for general constrained delegation rules and not checking a specific S4U2Proxy request. In FreeIPA 4.11.0, the behavior of ipadb_match_acl() was modified to match the changes from upstream MIT Kerberos 1.20. However, a mistake resulting in this mechanism applies in cases where the target service argument is set AND where it is unset. This results in S4U2Proxy requests being accepted regardless of whether or not there is a matching service delegation rule.
- RHSA-2024:3754
- RHSA-2024:3754
- RHSA-2024:3755
- RHSA-2024:3755
- RHSA-2024:3757
- RHSA-2024:3757
- RHSA-2024:3759
- RHSA-2024:3759
- https://access.redhat.com/security/cve/CVE-2024-2698
- https://access.redhat.com/security/cve/CVE-2024-2698
- RHBZ#2270353
- RHBZ#2270353
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WT3JL7JQDIAFKKEFARWYES7GZNWGQNCI/
- https://www.freeipa.org/release-notes/4-12-1.html
- https://www.freeipa.org/release-notes/4-12-1.html
Modified: 2024-11-21
CVE-2024-3183
A vulnerability was found in FreeIPA in a way when a Kerberos TGS-REQ is encrypted using the client’s session key. This key is different for each new session, which protects it from brute force attacks. However, the ticket it contains is encrypted using the target principal key directly. For user principals, this key is a hash of a public per-principal randomly-generated salt and the user’s password. If a principal is compromised it means the attacker would be able to retrieve tickets encrypted to any principal, all of them being encrypted by their own key directly. By taking these tickets and salts offline, the attacker could run brute force attacks to find character strings able to decrypt tickets when combined to a principal salt (i.e. find the principal’s password).
- RHSA-2024:3754
- RHSA-2024:3754
- RHSA-2024:3755
- RHSA-2024:3755
- RHSA-2024:3756
- RHSA-2024:3756
- RHSA-2024:3757
- RHSA-2024:3757
- RHSA-2024:3758
- RHSA-2024:3758
- RHSA-2024:3759
- RHSA-2024:3759
- RHSA-2024:3760
- RHSA-2024:3760
- RHSA-2024:3761
- RHSA-2024:3761
- RHSA-2024:3775
- RHSA-2024:3775
- https://access.redhat.com/security/cve/CVE-2024-3183
- https://access.redhat.com/security/cve/CVE-2024-3183
- RHBZ#2270685
- RHBZ#2270685
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WT3JL7JQDIAFKKEFARWYES7GZNWGQNCI/
- https://www.freeipa.org/release-notes/4-12-1.html
- https://www.freeipa.org/release-notes/4-12-1.html