ALT-BU-2023-2363-1
Branch sisyphus update bulletin.
Closed bugs
Ошибочная зависимость в спеке на libxml2-python
Closed vulnerabilities
BDU:2023-00580
Уязвимость компонента named сервера DNS BIND, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-04-01
CVE-2022-3094
Sending a flood of dynamic DNS updates may cause `named` to allocate large amounts of memory. This, in turn, may cause `named` to exit due to a lack of free memory. We are not aware of any cases where this has been exploited. Memory is allocated prior to the checking of access permissions (ACLs) and is retained during the processing of a dynamic update from a client whose access credentials are accepted. Memory allocated to clients that are not permitted to send updates is released immediately upon rejection. The scope of this vulnerability is limited therefore to trusted clients who are permitted to make dynamic zone changes. If a dynamic update is REFUSED, memory will be released again very quickly. Therefore it is only likely to be possible to degrade or stop `named` by sending a flood of unaccepted dynamic updates comparable in magnitude to a query flood intended to achieve the same detrimental outcome. BIND 9.11 and earlier branches are also affected, but through exhaustion of internal resources rather than memory constraints. This may reduce performance but should not be a significant problem for most servers. Therefore we don't intend to address this for BIND versions prior to BIND 9.16. This issue affects BIND 9 versions 9.16.0 through 9.16.36, 9.18.0 through 9.18.10, 9.19.0 through 9.19.8, and 9.16.8-S1 through 9.16.36-S1.
Modified: 2025-04-01
CVE-2022-3736
BIND 9 resolver can crash when stale cache and stale answers are enabled, option `stale-answer-client-timeout` is set to a positive integer, and the resolver receives an RRSIG query. This issue affects BIND 9 versions 9.16.12 through 9.16.36, 9.18.0 through 9.18.10, 9.19.0 through 9.19.8, and 9.16.12-S1 through 9.16.36-S1.
Modified: 2025-03-31
CVE-2022-3924
This issue can affect BIND 9 resolvers with `stale-answer-enable yes;` that also make use of the option `stale-answer-client-timeout`, configured with a value greater than zero. If the resolver receives many queries that require recursion, there will be a corresponding increase in the number of clients that are waiting for recursion to complete. If there are sufficient clients already waiting when a new client query is received so that it is necessary to SERVFAIL the longest waiting client (see BIND 9 ARM `recursive-clients` limit and soft quota), then it is possible for a race to occur between providing a stale answer to this older client and sending an early timeout SERVFAIL, which may cause an assertion failure. This issue affects BIND 9 versions 9.16.12 through 9.16.36, 9.18.0 through 9.18.10, 9.19.0 through 9.19.8, and 9.16.12-S1 through 9.16.36-S1.
Closed vulnerabilities
BDU:2023-01071
Уязвимость веб-инструмента представления данных Grafana, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить доступ к сеансу текущего пользователя
BDU:2023-01731
Уязвимость веб-инструмента представления данных Grafana, связанная с недостаточной очисткой пользовательских данныхt, позволяющая нарушителю осуществлять межсайтовые сценарные атаки (XSS)
Modified: 2024-11-21
CVE-2022-23498
Grafana is an open-source platform for monitoring and observability. When datasource query caching is enabled, Grafana caches all headers, including `grafana_session`. As a result, any user that queries a datasource where the caching is enabled can acquire another user’s session. To mitigate the vulnerability you can disable datasource query caching for all datasources. This issue has been patched in versions 9.2.10 and 9.3.4.
Modified: 2024-11-21
CVE-2022-23552
Grafana is an open-source platform for monitoring and observability. Starting with the 8.1 branch and prior to versions 8.5.16, 9.2.10, and 9.3.4, Grafana had a stored XSS vulnerability affecting the core plugin GeoMap. The stored XSS vulnerability was possible because SVG files weren't properly sanitized and allowed arbitrary JavaScript to be executed in the context of the currently authorized user of the Grafana instance. An attacker needs to have the Editor role in order to change a panel to include either an external URL to a SVG-file containing JavaScript, or use the `data:` scheme to load an inline SVG-file containing JavaScript. This means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard. Users may upgrade to version 8.5.16, 9.2.10, or 9.3.4 to receive a fix.
- https://github.com/grafana/grafana/commit/1c8a50b36973bd59a1cc5f34c30de8a9a6a431f0
- https://github.com/grafana/grafana/commit/1c8a50b36973bd59a1cc5f34c30de8a9a6a431f0
- https://github.com/grafana/grafana/commit/8b574e22b53aa4c5a35032a58844fd4aaaa12f5f
- https://github.com/grafana/grafana/commit/8b574e22b53aa4c5a35032a58844fd4aaaa12f5f
- https://github.com/grafana/grafana/commit/c022534e3848a5d45c0b3face23b43aa44e4400a
- https://github.com/grafana/grafana/commit/c022534e3848a5d45c0b3face23b43aa44e4400a
- https://github.com/grafana/grafana/pull/62143
- https://github.com/grafana/grafana/pull/62143
- https://github.com/grafana/grafana/security/advisories/GHSA-8xmm-x63g-f6xv
- https://github.com/grafana/grafana/security/advisories/GHSA-8xmm-x63g-f6xv
- https://security.netapp.com/advisory/ntap-20230302-0008/
Modified: 2024-11-21
CVE-2023-22462
Grafana is an open-source platform for monitoring and observability. On 2023-01-01 during an internal audit of Grafana, a member of the security team found a stored XSS vulnerability affecting the core plugin "Text". The stored XSS vulnerability requires several user interactions in order to be fully exploited. The vulnerability was possible due to React's render cycle that will pass though the unsanitized HTML code, but in the next cycle the HTML is cleaned up and saved in Grafana's database. An attacker needs to have the Editor role in order to change a Text panel to include JavaScript. Another user needs to edit the same Text panel, and click on "Markdown" or "HTML" for the code to be executed. This means that vertical privilege escalation is possible, where a user with Editor role can change to a known password for a user having Admin role if the user with Admin role executes malicious JavaScript viewing a dashboard. This issue has been patched in versions 9.2.10 and 9.3.4.
- https://github.com/grafana/grafana/commit/db83d5f398caffe35c5846cfa7727d1a2a414165
- https://github.com/grafana/grafana/commit/db83d5f398caffe35c5846cfa7727d1a2a414165
- https://github.com/grafana/grafana/security/advisories/GHSA-7rqg-hjwc-6mjf
- https://github.com/grafana/grafana/security/advisories/GHSA-7rqg-hjwc-6mjf
- https://grafana.com/blog/2023/02/28/grafana-security-release-new-versions-with-security-fixes-for-cve-2023-0594-cve-2023-0507-and-cve-2023-22462/
- https://grafana.com/blog/2023/02/28/grafana-security-release-new-versions-with-security-fixes-for-cve-2023-0594-cve-2023-0507-and-cve-2023-22462/
- https://security.netapp.com/advisory/ntap-20230413-0004/
- https://security.netapp.com/advisory/ntap-20230413-0004/
Package docs-alt-server-v updated to version 10.1-alt5 for branch sisyphus in task 314208.
Closed bugs
Лишняя запятая в аннотации к главе 37
Ожидающее изменение темно-оранжевое, а не красное в разделе 40.3.1. Изменение настроек в веб-интерфейсе
Тире вместо дефиса в команде в разделе 40.3.2. Настройка ресурсов в командной строке
Неверная формулировка в скобках для вкладки DNS в разделе 40.1. Создание контейнера в графическом интерфейсе
Улучшить описание команды увеличения размера диска в разделе 40.3.2. Настройка ресурсов в командной строке
Улучшить описание MAC-адресов в разделе 40.1. Создание контейнера в графическом интерфейсе
NFC → NFS в разделе 37.3.4. NFS
Добавить Disk Action в описание изменения диска в разделы 39.5.3, 39.5.4
Добавить Volume Action в описание изменения корневого диска в раздел 40.3.1. Изменение настроек в веб-интерфейсе
Лишняя запятая в разделе 60.1. Конфигурирование сетевых интерфейсов для поля Имя компьютера
Неверное сочетание "добавлен / сгенерирован" в разделе 26.5. Ключи для доступа по SSH
Closed vulnerabilities
Modified: 2025-02-11
CVE-2023-25950
HTTP request/response smuggling vulnerability in HAProxy version 2.7.0, and 2.6.1 to 2.6.7 allows a remote attacker to alter a legitimate user's request. As a result, the attacker may obtain sensitive information or cause a denial-of-service (DoS) condition.
- https://git.haproxy.org/?p=haproxy-2.7.git%3Ba=commit%3Bh=3ca4223c5e1f18a19dc93b0b09ffdbd295554d46
- https://git.haproxy.org/?p=haproxy-2.7.git%3Ba=commit%3Bh=3ca4223c5e1f18a19dc93b0b09ffdbd295554d46
- https://jvn.jp/en/jp/JVN38170084/
- https://jvn.jp/en/jp/JVN38170084/
- https://www.haproxy.org/
- https://www.haproxy.org/
Closed bugs
сервис haproxy не запускается