ALT-BU-2023-3540-1
Branch p10 update bulletin.
Package modsecurity updated to version 3.0.8-alt1 for branch p10 in task 319406.
Closed vulnerabilities
BDU:2022-00191
Уязвимость модуля Apache для усиления безопасности веб-приложений modsecurity-apache, связанная с ошибками при обработке JSON-объектов, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-42717
ModSecurity 3.x through 3.0.5 mishandles excessively nested JSON objects. Crafted JSON objects with nesting tens-of-thousands deep could result in the web server being unable to service legitimate requests. Even a moderately large (e.g., 300KB) HTTP request can occupy one of the limited NGINX worker processes for minutes and consume almost all of the available CPU on the machine. Modsecurity 2 is similarly vulnerable: the affected versions include 2.8.0 through 2.9.4.
- [debian-lts-announce] 20220528 [SECURITY] [DLA 3031-1] modsecurity-apache security update
- [debian-lts-announce] 20220528 [SECURITY] [DLA 3031-1] modsecurity-apache security update
- DSA-5023
- DSA-5023
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/modsecurity-dos-vulnerability-in-json-parsing-cve-2021-42717/
- https://www.trustwave.com/en-us/resources/blogs/spiderlabs-blog/modsecurity-dos-vulnerability-in-json-parsing-cve-2021-42717/
Modified: 2025-04-03
CVE-2022-48279
In ModSecurity before 2.9.6 and 3.x before 3.0.8, HTTP multipart requests were incorrectly parsed and could bypass the Web Application Firewall. NOTE: this is related to CVE-2022-39956 but can be considered independent changes to the ModSecurity (C language) codebase.
- https://coreruleset.org/20220919/crs-version-3-3-3-and-3-2-2-covering-several-cves/
- https://coreruleset.org/20220919/crs-version-3-3-3-and-3-2-2-covering-several-cves/
- https://github.com/SpiderLabs/ModSecurity/pull/2795
- https://github.com/SpiderLabs/ModSecurity/pull/2795
- https://github.com/SpiderLabs/ModSecurity/pull/2797
- https://github.com/SpiderLabs/ModSecurity/pull/2797
- https://github.com/SpiderLabs/ModSecurity/releases/tag/v2.9.6
- https://github.com/SpiderLabs/ModSecurity/releases/tag/v2.9.6
- https://github.com/SpiderLabs/ModSecurity/releases/tag/v3.0.8
- https://github.com/SpiderLabs/ModSecurity/releases/tag/v3.0.8
- [debian-lts-announce] 20230126 [SECURITY] [DLA 3283-1] modsecurity-apache security update
- [debian-lts-announce] 20230126 [SECURITY] [DLA 3283-1] modsecurity-apache security update
- FEDORA-2023-09f0496e60
- FEDORA-2023-09f0496e60
- FEDORA-2023-bc61f7a145
- FEDORA-2023-bc61f7a145
- FEDORA-2023-8aa264d5c5
- FEDORA-2023-8aa264d5c5
Closed vulnerabilities
BDU:2022-05391
Уязвимость драйвера mlx5 набора библиотек и драйверов для быстрой обработки пакетов dpdk, позволяющая науршителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2022-2132
A permissive list of allowed inputs flaw was found in DPDK. This issue allows a remote attacker to cause a denial of service triggered by sending a crafted Vhost header to DPDK.
- https://bugs.dpdk.org/show_bug.cgi?id=1031
- https://bugs.dpdk.org/show_bug.cgi?id=1031
- https://bugzilla.redhat.com/show_bug.cgi?id=2099475
- https://bugzilla.redhat.com/show_bug.cgi?id=2099475
- [debian-lts-announce] 20220902 [SECURITY] [DLA 3092-1] dpdk security update
- [debian-lts-announce] 20220902 [SECURITY] [DLA 3092-1] dpdk security update
Modified: 2024-11-21
CVE-2022-28199
NVIDIA’s distribution of the Data Plane Development Kit (MLNX_DPDK) contains a vulnerability in the network stack, where error recovery is not handled properly, which can allow a remote attacker to cause denial of service and some impact to data integrity and confidentiality.
- [oss-security] 20220906 Re: CVE-2022-28199: DPDK mlx5 driver error recovery handling vulnerability
- [oss-security] 20220906 Re: CVE-2022-28199: DPDK mlx5 driver error recovery handling vulnerability
- https://nvidia.custhelp.com/app/answers/detail/a_id/5389
- https://nvidia.custhelp.com/app/answers/detail/a_id/5389
- 20220907 Vulnerability in NVIDIA Data Plane Development Kit Affecting Cisco Products: August 2022
- 20220907 Vulnerability in NVIDIA Data Plane Development Kit Affecting Cisco Products: August 2022
Package openvswitch updated to version 2.17.6-alt1 for branch p10 in task 319867.
Closed vulnerabilities
BDU:2023-00290
Уязвимость программного многоуровневого коммутатора Open vSwitch, связанная с потерей значимости целого числа, позволяющая нарушителю выполнить произвольный код в целевой системе
BDU:2023-00291
Уязвимость программного многоуровневого коммутатора Open vSwitch, связанная с потерей значимости целого числа, позволяющая нарушителю выполнить произвольный код в целевой системе
Modified: 2024-11-21
CVE-2019-25076
The TSS (Tuple Space Search) algorithm in Open vSwitch 2.x through 2.17.2 and 3.0.0 allows remote attackers to cause a denial of service (delays of legitimate traffic) via crafted packet data that requires excessive evaluation time within the packet classification algorithm for the MegaFlow cache, aka a Tuple Space Explosion (TSE) attack.
- https://arxiv.org/abs/2011.09107
- https://arxiv.org/abs/2011.09107
- https://dl.acm.org/citation.cfm?doid=3359989.3365431
- https://dl.acm.org/citation.cfm?doid=3359989.3365431
- https://sites.google.com/view/tuple-space-explosion
- https://sites.google.com/view/tuple-space-explosion
- https://www.youtube.com/watch?v=5cHpzVK0D28
- https://www.youtube.com/watch?v=5cHpzVK0D28
- https://www.youtube.com/watch?v=DSC3m-Bww64
- https://www.youtube.com/watch?v=DSC3m-Bww64
Modified: 2024-11-21
CVE-2021-3905
A memory leak was found in Open vSwitch (OVS) during userspace IP fragmentation processing. An attacker could use this flaw to potentially exhaust available memory by keeping sending packet fragments.
- https://access.redhat.com/security/cve/CVE-2021-3905
- https://access.redhat.com/security/cve/CVE-2021-3905
- https://bugzilla.redhat.com/show_bug.cgi?id=2019692
- https://bugzilla.redhat.com/show_bug.cgi?id=2019692
- https://github.com/openvswitch/ovs/commit/803ed12e31b0377c37d7aa8c94b3b92f2081e349
- https://github.com/openvswitch/ovs/commit/803ed12e31b0377c37d7aa8c94b3b92f2081e349
- https://github.com/openvswitch/ovs-issues/issues/226
- https://github.com/openvswitch/ovs-issues/issues/226
- GLSA-202311-16
- GLSA-202311-16
- https://ubuntu.com/security/CVE-2021-3905
- https://ubuntu.com/security/CVE-2021-3905
Modified: 2024-11-21
CVE-2022-4337
An out-of-bounds read in Organization Specific TLV was found in various versions of OpenvSwitch.
- https://github.com/openvswitch/ovs/pull/405
- https://github.com/openvswitch/ovs/pull/405
- https://mail.openvswitch.org/pipermail/ovs-dev/2022-December/400596.html
- https://mail.openvswitch.org/pipermail/ovs-dev/2022-December/400596.html
- GLSA-202311-16
- GLSA-202311-16
- DSA-5319
- DSA-5319
- https://www.openwall.com/lists/oss-security/2022/12/21/4
- https://www.openwall.com/lists/oss-security/2022/12/21/4
Modified: 2024-11-21
CVE-2022-4338
An integer underflow in Organization Specific TLV was found in various versions of OpenvSwitch.
- https://github.com/openvswitch/ovs/pull/405
- https://github.com/openvswitch/ovs/pull/405
- https://mail.openvswitch.org/pipermail/ovs-dev/2022-December/400596.html
- https://mail.openvswitch.org/pipermail/ovs-dev/2022-December/400596.html
- GLSA-202311-16
- GLSA-202311-16
- DSA-5319
- DSA-5319
- https://www.openwall.com/lists/oss-security/2022/12/21/4
- https://www.openwall.com/lists/oss-security/2022/12/21/4
Modified: 2025-04-23
CVE-2023-1668
A flaw was found in openvswitch (OVS). When processing an IP packet with protocol 0, OVS will install the datapath flow without the action modifying the IP header. This issue results (for both kernel and userspace datapath) in installing a datapath flow matching all IP protocols (nw_proto is wildcarded) for this flow, but with an incorrect action, possibly causing incorrect handling of other IP packets with a != 0 IP protocol that matches this dp flow.
- https://bugzilla.redhat.com/show_bug.cgi?id=2137666
- https://bugzilla.redhat.com/show_bug.cgi?id=2137666
- [debian-lts-announce] 20230501 [SECURITY] [DLA 3410-1] openvswitch security update
- [debian-lts-announce] 20230501 [SECURITY] [DLA 3410-1] openvswitch security update
- FEDORA-2023-7da03dc2ae
- FEDORA-2023-7da03dc2ae
- GLSA-202311-16
- GLSA-202311-16
- DSA-5387
- DSA-5387
- https://www.openwall.com/lists/oss-security/2023/04/06/1
- https://www.openwall.com/lists/oss-security/2023/04/06/1
Package plasma5-discover updated to version 5.27.4-alt5 for branch p10 in task 317393.
Closed bugs
Перестал обновлять