ALT-BU-2023-6340-1
Branch p9_mipsel update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-36978
QPDF 9.x through 9.1.1 and 10.x through 10.0.4 has a heap-based buffer overflow in Pl_ASCII85Decoder::write (called from Pl_AES_PDF::flush and Pl_AES_PDF::finish) when a certain downstream write fails.
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28262
- https://bugs.chromium.org/p/oss-fuzz/issues/detail?id=28262
- https://github.com/google/oss-fuzz-vulns/blob/main/vulns/qpdf/OSV-2020-2245.yaml
- https://github.com/google/oss-fuzz-vulns/blob/main/vulns/qpdf/OSV-2020-2245.yaml
- https://github.com/qpdf/qpdf/commit/dc92574c10f3e2516ec6445b88c5d584f40df4e5
- https://github.com/qpdf/qpdf/commit/dc92574c10f3e2516ec6445b88c5d584f40df4e5
- https://github.com/qpdf/qpdf/issues/492
- https://github.com/qpdf/qpdf/issues/492
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3548-1] qpdf security update
- [debian-lts-announce] 20230829 [SECURITY] [DLA 3548-1] qpdf security update
- GLSA-202401-20
- GLSA-202401-20
Closed vulnerabilities
BDU:2022-06700
Уязвимость функции очистки объекта XML библиотеки анализа XML-документов libxml2, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06701
Уязвимость функции xmlParseNameComplex() библиотеки анализа XML-документов libxml2, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
Modified: 2025-04-29
CVE-2022-40303
An issue was discovered in libxml2 before 2.10.3. When parsing a multi-gigabyte XML document with the XML_PARSE_HUGE parser option enabled, several integer counters can overflow. This results in an attempt to access an array at a negative 2GB offset, typically leading to a segmentation fault.
- 20221220 APPLE-SA-2022-12-13-2 iOS 15.7.2 and iPadOS 15.7.2
- 20221220 APPLE-SA-2022-12-13-2 iOS 15.7.2 and iPadOS 15.7.2
- 20221220 APPLE-SA-2022-12-13-5 macOS Monterey 12.6.2
- 20221220 APPLE-SA-2022-12-13-5 macOS Monterey 12.6.2
- 20221220 APPLE-SA-2022-12-13-6 macOS Big Sur 11.7.2
- 20221220 APPLE-SA-2022-12-13-6 macOS Big Sur 11.7.2
- 20221220 APPLE-SA-2022-12-13-7 tvOS 16.2
- 20221220 APPLE-SA-2022-12-13-7 tvOS 16.2
- 20221220 APPLE-SA-2022-12-13-8 watchOS 9.2
- 20221220 APPLE-SA-2022-12-13-8 watchOS 9.2
- https://gitlab.gnome.org/GNOME/libxml2/-/commit/c846986356fc149915a74972bf198abc266bc2c0
- https://gitlab.gnome.org/GNOME/libxml2/-/commit/c846986356fc149915a74972bf198abc266bc2c0
- https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.10.3
- https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.10.3
- https://security.netapp.com/advisory/ntap-20221209-0003/
- https://security.netapp.com/advisory/ntap-20221209-0003/
- https://support.apple.com/kb/HT213531
- https://support.apple.com/kb/HT213531
- https://support.apple.com/kb/HT213533
- https://support.apple.com/kb/HT213533
- https://support.apple.com/kb/HT213534
- https://support.apple.com/kb/HT213534
- https://support.apple.com/kb/HT213535
- https://support.apple.com/kb/HT213535
- https://support.apple.com/kb/HT213536
- https://support.apple.com/kb/HT213536
Modified: 2025-04-28
CVE-2022-40304
An issue was discovered in libxml2 before 2.10.3. Certain invalid XML entity definitions can corrupt a hash table key, potentially leading to subsequent logic errors. In one case, a double-free can be provoked.
- 20221220 APPLE-SA-2022-12-13-2 iOS 15.7.2 and iPadOS 15.7.2
- 20221220 APPLE-SA-2022-12-13-5 macOS Monterey 12.6.2
- 20221220 APPLE-SA-2022-12-13-6 macOS Big Sur 11.7.2
- 20221220 APPLE-SA-2022-12-13-7 tvOS 16.2
- 20221220 APPLE-SA-2022-12-13-8 watchOS 9.2
- https://gitlab.gnome.org/GNOME/libxml2/-/commit/1b41ec4e9433b05bb0376be4725804c54ef1d80b
- https://gitlab.gnome.org/GNOME/libxml2/-/tags
- https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.10.3
- https://security.netapp.com/advisory/ntap-20221209-0003/
- https://support.apple.com/kb/HT213531
- https://support.apple.com/kb/HT213533
- https://support.apple.com/kb/HT213534
- https://support.apple.com/kb/HT213535
- https://support.apple.com/kb/HT213536
- 20221220 APPLE-SA-2022-12-13-2 iOS 15.7.2 and iPadOS 15.7.2
- https://support.apple.com/kb/HT213536
- https://support.apple.com/kb/HT213535
- https://support.apple.com/kb/HT213534
- https://support.apple.com/kb/HT213533
- https://support.apple.com/kb/HT213531
- https://security.netapp.com/advisory/ntap-20221209-0003/
- https://gitlab.gnome.org/GNOME/libxml2/-/tags/v2.10.3
- https://gitlab.gnome.org/GNOME/libxml2/-/tags
- https://gitlab.gnome.org/GNOME/libxml2/-/commit/1b41ec4e9433b05bb0376be4725804c54ef1d80b
- 20221220 APPLE-SA-2022-12-13-8 watchOS 9.2
- 20221220 APPLE-SA-2022-12-13-7 tvOS 16.2
- 20221220 APPLE-SA-2022-12-13-6 macOS Big Sur 11.7.2
- 20221220 APPLE-SA-2022-12-13-5 macOS Monterey 12.6.2
Package alterator-auth updated to version 0.44.2-alt0.p9.1 for branch p9_mipsel.
Closed bugs
Не выводит список namingContexts у ldap
system-auth: не работает настройка ldap "по старинке", только ldap+krb5 через sssd
Полосы прокрутки в окне настроек SSSD
При вводе клиента в домен FreeIPA через альтератор показывается ненужный чекбокс про групповые политики
Указание версии ОС при включении в домен Active Directory
Closed vulnerabilities
BDU:2023-03380
Уязвимость системы работы с заявками и инцидентами GLPI, связанная с неправильной авторизацией, позволяющая нарушителю повышать привилегии внутри приложения
BDU:2023-03381
Уязвимость системы работы с заявками и инцидентами GLPI, связанная с неправильным управлением привилегиями, позволяющая нарушителю повышать привилегии внутри приложения
BDU:2023-03382
Уязвимость системы работы с заявками и инцидентами GLPI, связанная с подделкой запроса на стороне сервера, позволяющая нарушителю выполнять SSRF-атаки
BDU:2023-03385
Уязвимость системы работы с заявками и инцидентами GLPI, связанная с неправильной нейтрализацией ввода во время генерации веб-страницы, позволяющая нарушителю выполнять произвольные SQL-запросы в базе данных.
BDU:2023-03387
Уязвимость системы работы с заявками и инцидентами GLPI, связанная с неправильной нейтрализацией специальных элементов, используемых в команде SQL, позволяющая нарушителю выполнять произвольные SQL-запросы в базе данных
BDU:2023-03388
Уязвимость системы работы с заявками и инцидентами GLPI, связанная с неправильной нейтрализацией входных данных во время генерации веб-страницы, позволяющая нарушителю выполнять атаки с использованием межсайтовых сценариев
BDU:2023-03389
Уязвимость системы работы с заявками и инцидентами GLPI, связанная с неправильной нейтрализацией ввода во время генерации веб-страницы, позволяющая нарушителю выполнять атаки с использованием межсайтовых сценариев
Modified: 2024-11-21
CVE-2022-41941
GLPI is a Free Asset and IT Management Software package. Versions 10.0.0 and above, prior to 10.0.6, are subject to Cross-site Scripting. An administrator may store malicious code in help links. This issue is patched in 10.0.6.
Modified: 2024-11-21
CVE-2023-22722
GLPI is a Free Asset and IT Management Software package. Versions 9.4.0 and above, prior to 10.0.6 are subject to Cross-site Scripting. An attacker can persuade a victim into opening a URL containing a payload exploiting this vulnerability. After exploited, the attacker can make actions as the victim or exfiltrate session cookies. This issue is patched in version 10.0.6.
Modified: 2024-11-21
CVE-2023-22725
GLPI is a Free Asset and IT Management Software package. Versions 0.6.0 and above, prior to 10.0.6 are vulnerable to Cross-site Scripting. This vulnerability allow for an administrator to create a malicious external link. This issue is patched in 10.0.6.
Modified: 2024-11-21
CVE-2023-23610
GLPI is a Free Asset and IT Management Software package. Versions prior to 9.5.12 and 10.0.6 are vulnerable to Improper Privilege Management. Any user having access to the standard interface can export data of almost any GLPI item type, even those on which user is not allowed to access (including assets, tickets, users, ...). This issue is patched in 10.0.6.
Modified: 2024-11-21
CVE-2023-28632
GLPI is a free asset and IT management software package. Starting in version 0.83 and prior to versions 9.5.13 and 10.0.7, an authenticated user can modify emails of any user, and can therefore takeover another user account through the "forgotten password" feature. By modifying emails, the user can also receive sensitive data through GLPI notifications. Versions 9.5.13 and 10.0.7 contain a patch for this issue. As a workaround, account takeover can be prevented by deactivating all notifications related to `Forgotten password?` event. However, it will not prevent unauthorized modification of any user emails.
- https://github.com/glpi-project/glpi/releases/tag/10.0.7
- https://github.com/glpi-project/glpi/releases/tag/9.5.13
- https://github.com/glpi-project/glpi/security/advisories/GHSA-7pwm-pg76-3q9x
- https://github.com/glpi-project/glpi/releases/tag/10.0.7
- https://github.com/glpi-project/glpi/security/advisories/GHSA-7pwm-pg76-3q9x
- https://github.com/glpi-project/glpi/releases/tag/9.5.13
Modified: 2024-11-21
CVE-2023-28633
GLPI is a free asset and IT management software package. Starting in version 0.84 and prior to versions 9.5.13 and 10.0.7, usage of RSS feeds is subject to server-side request forgery (SSRF). In case the remote address is not a valid RSS feed, an RSS autodiscovery feature is triggered. This feature does not check safety or URLs. Versions 9.5.13 and 10.0.7 contain a patch for this issue.
- https://github.com/glpi-project/glpi/commit/e2819da64c9075050805a44c834e1f4dc621a982
- https://github.com/glpi-project/glpi/releases/tag/10.0.7
- https://github.com/glpi-project/glpi/releases/tag/9.5.13
- https://github.com/glpi-project/glpi/security/advisories/GHSA-r57v-j88m-rwwf
- https://github.com/glpi-project/glpi/commit/e2819da64c9075050805a44c834e1f4dc621a982
- https://github.com/glpi-project/glpi/security/advisories/GHSA-r57v-j88m-rwwf
- https://github.com/glpi-project/glpi/releases/tag/9.5.13
- https://github.com/glpi-project/glpi/releases/tag/10.0.7
Modified: 2024-11-21
CVE-2023-28634
GLPI is a free asset and IT management software package. Starting in version 0.83 and prior to versions 9.5.13 and 10.0.7, a user who has the Technician profile could see and generate a Personal token for a Super-Admin. Using such token it is possible to negotiate a GLPI session and hijack the Super-Admin account, resulting in a Privilege Escalation. Versions 9.5.13 and 10.0.7 contain a patch for this issue.
- https://github.com/glpi-project/glpi/releases/tag/10.0.7
- https://github.com/glpi-project/glpi/releases/tag/9.5.13
- https://github.com/glpi-project/glpi/security/advisories/GHSA-4279-rxmh-gf39
- https://github.com/glpi-project/glpi/releases/tag/10.0.7
- https://github.com/glpi-project/glpi/security/advisories/GHSA-4279-rxmh-gf39
- https://github.com/glpi-project/glpi/releases/tag/9.5.13
Modified: 2024-11-21
CVE-2023-28636
GLPI is a free asset and IT management software package. Starting in version 0.60 and prior to versions 9.5.13 and 10.0.7, a vulnerability allows an administrator to create a malicious external link. This issue is fixed in versions 9.5.13 and 10.0.7.
- https://github.com/glpi-project/glpi/releases/tag/10.0.7
- https://github.com/glpi-project/glpi/releases/tag/9.5.13
- https://github.com/glpi-project/glpi/security/advisories/GHSA-55pm-mc2m-pq46
- https://github.com/glpi-project/glpi/releases/tag/10.0.7
- https://github.com/glpi-project/glpi/security/advisories/GHSA-55pm-mc2m-pq46
- https://github.com/glpi-project/glpi/releases/tag/9.5.13
Modified: 2024-11-21
CVE-2023-28639
GLPI is a free asset and IT management software package. Starting in version 0.85 and prior to versions 9.5.13 and 10.0.7, a malicious link can be crafted by an unauthenticated user. It will be able to exploit a reflected XSS in case any authenticated user opens the crafted link. This issue is fixed in versions 9.5.13 and 10.0.7.
- https://github.com/glpi-project/glpi/releases/tag/10.0.7
- https://github.com/glpi-project/glpi/releases/tag/9.5.13
- https://github.com/glpi-project/glpi/security/advisories/GHSA-r93q-chh5-jgh4
- https://github.com/glpi-project/glpi/releases/tag/10.0.7
- https://github.com/glpi-project/glpi/security/advisories/GHSA-r93q-chh5-jgh4
- https://github.com/glpi-project/glpi/releases/tag/9.5.13
Modified: 2024-11-21
CVE-2023-28838
GLPI is a free asset and IT management software package. Starting in version 0.50 and prior to versions 9.5.13 and 10.0.7, a SQL Injection vulnerability allow users with access rights to statistics or reports to extract all data from database and, in some cases, write a webshell on the server. Versions 9.5.13 and 10.0.7 contain a patch for this issue. As a workaround, remove `Assistance > Statistics` and `Tools > Reports` read rights from every user.
- https://github.com/glpi-project/glpi/releases/tag/10.0.7
- https://github.com/glpi-project/glpi/releases/tag/9.5.13
- https://github.com/glpi-project/glpi/security/advisories/GHSA-2c7r-gf38-358f
- https://github.com/glpi-project/glpi/releases/tag/10.0.7
- https://github.com/glpi-project/glpi/security/advisories/GHSA-2c7r-gf38-358f
- https://github.com/glpi-project/glpi/releases/tag/9.5.13
Modified: 2024-11-21
CVE-2023-28852
GLPI is a free asset and IT management software package. Starting in version 9.5.0 and prior to versions 9.5.13 and 10.0.7, a user with dashboard administration rights may hack the dashboard form to store malicious code that will be executed when other users will use the related dashboard. Versions 9.5.13 and 10.0.7 contain a patch for this issue.
- https://github.com/glpi-project/glpi/releases/tag/10.0.7
- https://github.com/glpi-project/glpi/releases/tag/9.5.13
- https://github.com/glpi-project/glpi/security/advisories/GHSA-65gq-p8hg-7m92
- https://github.com/glpi-project/glpi/releases/tag/10.0.7
- https://github.com/glpi-project/glpi/security/advisories/GHSA-65gq-p8hg-7m92
- https://github.com/glpi-project/glpi/releases/tag/9.5.13
Closed vulnerabilities
BDU:2022-04101
Уязвимость модуля mod_isapi веб-сервера Apache HTTP Server, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-04102
Уязвимость функции ap_rwrite() веб-сервера Apache HTTP Server, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-04106
Уязвимость функции r:wsread() модуля mod_lua веб-сервера Apache HTTP Server, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2022-04115
Уязвимость модуля mod_proxy_ajp веб-сервера Apache HTTP Server, позволяющая нарушителю отправить скрытый HTTP-запрос (атака типа HTTP Request Smuggling)
BDU:2022-04141
Уязвимость модуля mod_proxy веб-сервера Apache HTTP Server, позволяющая нарушителю получить обойти ограничения безопасности
BDU:2022-04145
Уязвимость фильтра содержимого mod_sed веб-сервера Apache HTTP Server, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-04146
Уязвимость функции ap_strcmp_match() веб-сервера Apache HTTP Server, позволяющая нарушителю вызвать отказ в обслуживании или получить несанкционированный доступ к защищаемой информации
BDU:2022-04147
Уязвимость модуля mod_lua веб-сервера Apache HTTP Server, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-00495
Уязвимость модуля mod_proxy_ajp веб-сервера Apache HTTP Server, позволяющая нарушителю отправить скрытый HTTP-запрос (атака типа HTTP Request Smuggling)
BDU:2023-00496
Уязвимость модуля mod_proxy веб-сервера Apache HTTP Server, позволяющая нарушителю выполнять атаки с разделением ответов HTTP
BDU:2023-01105
Уязвимость модуля mod_dav веб-сервера Apache HTTP Server, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-01738
Уязвимость модуля mod_proxy веб-сервера Apache HTTP Server, позволяющая нарушителю отправить скрытый HTTP-запрос (атака типа HTTP Request Smuggling)
BDU:2023-02021
Уязвимость компонента mod_proxy_uwsgi веб-сервера Apache HTTP Server связанная с недостатками обработки HTTP-запросов, позволяющая нарушителю выполнять атаку "контрабанда HTTP-запросов"
Modified: 2025-02-13
CVE-2006-20001
A carefully crafted If: request header can cause a memory read, or write of a single zero byte, in a pool (heap) memory location beyond the header value sent. This could cause the process to crash. This issue affects Apache HTTP Server 2.4.54 and earlier.
Modified: 2025-05-01
CVE-2022-26377
Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.53 and prior versions.
- [oss-security] 20220608 CVE-2022-26377: Apache HTTP Server: mod_proxy_ajp: Possible request smuggling
- [oss-security] 20220608 CVE-2022-26377: Apache HTTP Server: mod_proxy_ajp: Possible request smuggling
- https://httpd.apache.org/security/vulnerabilities_24.html
- https://httpd.apache.org/security/vulnerabilities_24.html
- FEDORA-2022-b54a8dee29
- FEDORA-2022-b54a8dee29
- FEDORA-2022-e620fb15d5
- FEDORA-2022-e620fb15d5
- GLSA-202208-20
- GLSA-202208-20
- https://security.netapp.com/advisory/ntap-20220624-0005/
- https://security.netapp.com/advisory/ntap-20220624-0005/
Modified: 2024-11-21
CVE-2022-28330
Apache HTTP Server 2.4.53 and earlier on Windows may read beyond bounds when configured to process requests with the mod_isapi module.
- [oss-security] 20220608 CVE-2022-28330: Apache HTTP Server: read beyond bounds in mod_isapi
- [oss-security] 20220608 CVE-2022-28330: Apache HTTP Server: read beyond bounds in mod_isapi
- https://httpd.apache.org/security/vulnerabilities_24.html
- https://httpd.apache.org/security/vulnerabilities_24.html
- https://security.netapp.com/advisory/ntap-20220624-0005/
- https://security.netapp.com/advisory/ntap-20220624-0005/
Modified: 2024-11-21
CVE-2022-28614
The ap_rwrite() function in Apache HTTP Server 2.4.53 and earlier may read unintended memory if an attacker can cause the server to reflect very large input using ap_rwrite() or ap_rputs(), such as with mod_luas r:puts() function. Modules compiled and distributed separately from Apache HTTP Server that use the 'ap_rputs' function and may pass it a very large (INT_MAX or larger) string must be compiled against current headers to resolve the issue.
- [oss-security] 20220608 CVE-2022-28614: Apache HTTP Server: read beyond bounds via ap_rwrite()
- [oss-security] 20220608 CVE-2022-28614: Apache HTTP Server: read beyond bounds via ap_rwrite()
- https://httpd.apache.org/security/vulnerabilities_24.html
- https://httpd.apache.org/security/vulnerabilities_24.html
- FEDORA-2022-b54a8dee29
- FEDORA-2022-b54a8dee29
- FEDORA-2022-e620fb15d5
- FEDORA-2022-e620fb15d5
- GLSA-202208-20
- GLSA-202208-20
- https://security.netapp.com/advisory/ntap-20220624-0005/
- https://security.netapp.com/advisory/ntap-20220624-0005/
Modified: 2025-05-01
CVE-2022-28615
Apache HTTP Server 2.4.53 and earlier may crash or disclose information due to a read beyond bounds in ap_strcmp_match() when provided with an extremely large input buffer. While no code distributed with the server can be coerced into such a call, third-party modules or lua scripts that use ap_strcmp_match() may hypothetically be affected.
- [oss-security] 20220608 CVE-2022-28615: Apache HTTP Server: Read beyond bounds in ap_strcmp_match()
- [oss-security] 20220608 CVE-2022-28615: Apache HTTP Server: Read beyond bounds in ap_strcmp_match()
- https://httpd.apache.org/security/vulnerabilities_24.html
- https://httpd.apache.org/security/vulnerabilities_24.html
- FEDORA-2022-b54a8dee29
- FEDORA-2022-b54a8dee29
- FEDORA-2022-e620fb15d5
- FEDORA-2022-e620fb15d5
- GLSA-202208-20
- GLSA-202208-20
- https://security.netapp.com/advisory/ntap-20220624-0005/
- https://security.netapp.com/advisory/ntap-20220624-0005/
Modified: 2024-11-21
CVE-2022-29404
In Apache HTTP Server 2.4.53 and earlier, a malicious request to a lua script that calls r:parsebody(0) may cause a denial of service due to no default limit on possible input size.
- [oss-security] 20220608 CVE-2022-29404: Apache HTTP Server: Denial of service in mod_lua r:parsebody
- [oss-security] 20220608 CVE-2022-29404: Apache HTTP Server: Denial of service in mod_lua r:parsebody
- https://httpd.apache.org/security/vulnerabilities_24.html
- https://httpd.apache.org/security/vulnerabilities_24.html
- FEDORA-2022-b54a8dee29
- FEDORA-2022-b54a8dee29
- FEDORA-2022-e620fb15d5
- FEDORA-2022-e620fb15d5
- GLSA-202208-20
- GLSA-202208-20
- https://security.netapp.com/advisory/ntap-20220624-0005/
- https://security.netapp.com/advisory/ntap-20220624-0005/
Modified: 2024-11-21
CVE-2022-30522
If Apache HTTP Server 2.4.53 is configured to do transformations with mod_sed in contexts where the input to mod_sed may be very large, mod_sed may make excessively large memory allocations and trigger an abort.
- [oss-security] 20220608 CVE-2022-30522: Apache HTTP Server: mod_sed denial of service
- [oss-security] 20220608 CVE-2022-30522: Apache HTTP Server: mod_sed denial of service
- https://httpd.apache.org/security/vulnerabilities_24.html
- https://httpd.apache.org/security/vulnerabilities_24.html
- FEDORA-2022-b54a8dee29
- FEDORA-2022-b54a8dee29
- FEDORA-2022-e620fb15d5
- FEDORA-2022-e620fb15d5
- GLSA-202208-20
- GLSA-202208-20
- https://security.netapp.com/advisory/ntap-20220624-0005/
- https://security.netapp.com/advisory/ntap-20220624-0005/
Modified: 2025-05-01
CVE-2022-30556
Apache HTTP Server 2.4.53 and earlier may return lengths to applications calling r:wsread() that point past the end of the storage allocated for the buffer.
- [oss-security] 20220608 CVE-2022-30556: Apache HTTP Server: Information Disclosure in mod_lua with websockets
- [oss-security] 20220608 CVE-2022-30556: Apache HTTP Server: Information Disclosure in mod_lua with websockets
- https://httpd.apache.org/security/vulnerabilities_24.html
- https://httpd.apache.org/security/vulnerabilities_24.html
- FEDORA-2022-b54a8dee29
- FEDORA-2022-b54a8dee29
- FEDORA-2022-e620fb15d5
- FEDORA-2022-e620fb15d5
- GLSA-202208-20
- GLSA-202208-20
- https://security.netapp.com/advisory/ntap-20220624-0005/
- https://security.netapp.com/advisory/ntap-20220624-0005/
Modified: 2025-05-01
CVE-2022-31813
Apache HTTP Server 2.4.53 and earlier may not send the X-Forwarded-* headers to the origin server based on client side Connection header hop-by-hop mechanism. This may be used to bypass IP based authentication on the origin server/application.
- [oss-security] 20220608 CVE-2022-31813: Apache HTTP Server: mod_proxy X-Forwarded-For dropped by hop-by-hop mechanism
- [oss-security] 20220608 CVE-2022-31813: Apache HTTP Server: mod_proxy X-Forwarded-For dropped by hop-by-hop mechanism
- https://httpd.apache.org/security/vulnerabilities_24.html
- https://httpd.apache.org/security/vulnerabilities_24.html
- FEDORA-2022-b54a8dee29
- FEDORA-2022-b54a8dee29
- FEDORA-2022-e620fb15d5
- FEDORA-2022-e620fb15d5
- GLSA-202208-20
- GLSA-202208-20
- https://security.netapp.com/advisory/ntap-20220624-0005/
- https://security.netapp.com/advisory/ntap-20220624-0005/
Modified: 2025-04-04
CVE-2022-36760
Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling') vulnerability in mod_proxy_ajp of Apache HTTP Server allows an attacker to smuggle requests to the AJP server it forwards requests to. This issue affects Apache HTTP Server Apache HTTP Server 2.4 version 2.4.54 and prior versions.
Modified: 2025-04-04
CVE-2022-37436
Prior to Apache HTTP Server 2.4.55, a malicious backend can cause the response headers to be truncated early, resulting in some headers being incorporated into the response body. If the later headers have any security purpose, they will not be interpreted by the client.
Modified: 2025-02-13
CVE-2023-25690
Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack. Configurations are affected when mod_proxy is enabled along with some form of RewriteRule or ProxyPassMatch in which a non-specific pattern matches some portion of the user-supplied request-target (URL) data and is then re-inserted into the proxied request-target using variable substitution. For example, something like: RewriteEngine on RewriteRule "^/here/(.*)" "http://example.com:8080/elsewhere?$1"; [P] ProxyPassReverse /here/ http://example.com:8080/ Request splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.
- http://packetstormsecurity.com/files/176334/Apache-2.4.55-mod_proxy-HTTP-Request-Smuggling.html
- http://packetstormsecurity.com/files/176334/Apache-2.4.55-mod_proxy-HTTP-Request-Smuggling.html
- https://httpd.apache.org/security/vulnerabilities_24.html
- https://httpd.apache.org/security/vulnerabilities_24.html
- https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html
- https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html
- https://security.gentoo.org/glsa/202309-01
- https://security.gentoo.org/glsa/202309-01
Modified: 2025-05-01
CVE-2023-27522
HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55. Special characters in the origin response header can truncate/split the response forwarded to the client.
- https://httpd.apache.org/security/vulnerabilities_24.html
- https://httpd.apache.org/security/vulnerabilities_24.html
- https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html
- https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html
- https://security.gentoo.org/glsa/202309-01
- https://security.gentoo.org/glsa/202309-01
Closed bugs
Отключённый a2dismod модуль отключается даже после a2enmod
Заменить /var/lock на /run/lock в tmpfiles.conf
Package cups-filters updated to version 1.28.8-alt2 for branch p9_mipsel.
Closed vulnerabilities
BDU:2023-02781
Уязвимость компонента beh (Backend Error Handler) пакета для печати cups-filters, позволяющая нарушителю выполнить произвольные команды на сервере печати
Modified: 2024-11-21
CVE-2023-24805
cups-filters contains backends, filters, and other software required to get the cups printing service working on operating systems other than macos. If you use the Backend Error Handler (beh) to create an accessible network printer, this security vulnerability can cause remote code execution. `beh.c` contains the line `retval = system(cmdline) >> 8;` which calls the `system` command with the operand `cmdline`. `cmdline` contains multiple user controlled, unsanitized values. As a result an attacker with network access to the hosted print server can exploit this vulnerability to inject system commands which are executed in the context of the running server. This issue has been addressed in commit `8f2740357` and is expected to be bundled in the next release. Users are advised to upgrade when possible and to restrict access to network printers in the meantime.
- https://github.com/OpenPrinting/cups-filters/commit/8f274035756c04efeb77eb654e9d4c4447287d65
- https://github.com/OpenPrinting/cups-filters/commit/8f274035756c04efeb77eb654e9d4c4447287d65
- https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-gpxc-v2m8-fr3x
- https://github.com/OpenPrinting/cups-filters/security/advisories/GHSA-gpxc-v2m8-fr3x
- https://lists.debian.org/debian-lts-announce/2023/05/msg00021.html
- https://lists.debian.org/debian-lts-announce/2023/05/msg00021.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KL2SJMZQ5T5JIH3PMQ2CGCY5TUUE255Y/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KL2SJMZQ5T5JIH3PMQ2CGCY5TUUE255Y/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YNCGL2ZTAS2GFF23QFT55UFWIDMI4ZJK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/YNCGL2ZTAS2GFF23QFT55UFWIDMI4ZJK/
- https://security.gentoo.org/glsa/202401-06
- https://security.gentoo.org/glsa/202401-06
- https://www.debian.org/security/2023/dsa-5407
- https://www.debian.org/security/2023/dsa-5407
Package alterator-l10n updated to version 2.9.122-alt0.p9.1 for branch p9_mipsel.
Closed bugs
Обновить перевод alterator
Неккоректное название кнопки "Загрузить..."
Closed bugs
Не отображает sender в суммарной таблице при проверке трафика с UDP на i586
Closed vulnerabilities
BDU:2023-03347
Уязвимость диссектора RPCoRDMA анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-03609
Уязвимость диссектора LISP анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05022
Уязвимость компонента CP2179 анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05695
Уязвимость анализатора трафика компьютерных сетей Wireshark , связанная с несогласованным управлением памятью, , позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05711
Уязвимость анализатора трафика компьютерных сетей Wireshark, связанная с выполнением цикла с недоступным условием выхода, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-05712
Уязвимость анализатора трафика компьютерных сетей Wireshark , связанная с ошибкой освобождения памяти, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2022-3190
Infinite loop in the F5 Ethernet Trailer protocol dissector in Wireshark 3.6.0 to 3.6.7 and 3.4.0 to 3.4.15 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3190.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3190.json
- https://gitlab.com/wireshark/wireshark/-/issues/18307
- https://gitlab.com/wireshark/wireshark/-/issues/18307
- FEDORA-2022-9d4aa8a486
- FEDORA-2022-9d4aa8a486
- FEDORA-2022-1f2fbb087e
- FEDORA-2022-1f2fbb087e
- https://www.wireshark.org/security/wnpa-sec-2022-06.html
- https://www.wireshark.org/security/wnpa-sec-2022-06.html
Modified: 2025-05-09
CVE-2022-3725
Crash in the OPUS protocol dissector in Wireshark 3.6.0 to 3.6.8 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3725.json
- https://gitlab.com/wireshark/wireshark/-/issues/18378
- FEDORA-2022-cf9ae8e4ff
- GLSA-202309-02
- https://www.wireshark.org/security/wnpa-sec-2022-07.html
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-3725.json
- https://www.wireshark.org/security/wnpa-sec-2022-07.html
- GLSA-202309-02
- FEDORA-2022-cf9ae8e4ff
- https://gitlab.com/wireshark/wireshark/-/issues/18378
Modified: 2025-04-08
CVE-2022-4344
Memory exhaustion in the Kafka protocol dissector in Wireshark 4.0.0 to 4.0.1 and 3.6.0 to 3.6.9 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4344.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4344.json
- FEDORA-2023-9ddb9b9757
- FEDORA-2023-9ddb9b9757
- FEDORA-2023-f9e2ad8b73
- FEDORA-2023-f9e2ad8b73
- https://www.wireshark.org/security/wnpa-sec-2022-10.html
- https://www.wireshark.org/security/wnpa-sec-2022-10.html
Modified: 2025-04-08
CVE-2022-4345
Infinite loops in the BPv6, OpenFlow, and Kafka protocol dissectors in Wireshark 4.0.0 to 4.0.1 and 3.6.0 to 3.6.9 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4345.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2022/CVE-2022-4345.json
- [debian-lts-announce] 20230208 [SECURITY] [DLA 3313-1] wireshark security update
- [debian-lts-announce] 20230208 [SECURITY] [DLA 3313-1] wireshark security update
- FEDORA-2023-9ddb9b9757
- FEDORA-2023-9ddb9b9757
- FEDORA-2023-f9e2ad8b73
- FEDORA-2023-f9e2ad8b73
- https://www.wireshark.org/security/wnpa-sec-2022-09.html
- https://www.wireshark.org/security/wnpa-sec-2022-09.html
Modified: 2025-04-01
CVE-2023-0411
Excessive loops in multiple dissectors in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0411.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0411.json
- https://gitlab.com/wireshark/wireshark/-/issues/18711
- https://gitlab.com/wireshark/wireshark/-/issues/18711
- https://gitlab.com/wireshark/wireshark/-/issues/18720
- https://gitlab.com/wireshark/wireshark/-/issues/18720
- https://gitlab.com/wireshark/wireshark/-/issues/18737
- https://gitlab.com/wireshark/wireshark/-/issues/18737
- [debian-lts-announce] 20230208 [SECURITY] [DLA 3313-1] wireshark security update
- [debian-lts-announce] 20230208 [SECURITY] [DLA 3313-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2023-06.html
- https://www.wireshark.org/security/wnpa-sec-2023-06.html
Modified: 2025-04-02
CVE-2023-0412
TIPC dissector crash in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0412.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0412.json
- https://gitlab.com/wireshark/wireshark/-/issues/18770
- https://gitlab.com/wireshark/wireshark/-/issues/18770
- [debian-lts-announce] 20230208 [SECURITY] [DLA 3313-1] wireshark security update
- [debian-lts-announce] 20230208 [SECURITY] [DLA 3313-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2023-07.html
- https://www.wireshark.org/security/wnpa-sec-2023-07.html
Modified: 2025-04-02
CVE-2023-0413
Dissection engine bug in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0413.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0413.json
- https://gitlab.com/wireshark/wireshark/-/issues/18766
- https://gitlab.com/wireshark/wireshark/-/issues/18766
- [debian-lts-announce] 20230208 [SECURITY] [DLA 3313-1] wireshark security update
- [debian-lts-announce] 20230208 [SECURITY] [DLA 3313-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2023-03.html
- https://www.wireshark.org/security/wnpa-sec-2023-03.html
Modified: 2025-04-02
CVE-2023-0415
iSCSI dissector crash in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0415.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0415.json
- https://gitlab.com/wireshark/wireshark/-/issues/18796
- https://gitlab.com/wireshark/wireshark/-/issues/18796
- [debian-lts-announce] 20230208 [SECURITY] [DLA 3313-1] wireshark security update
- [debian-lts-announce] 20230208 [SECURITY] [DLA 3313-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2023-05.html
- https://www.wireshark.org/security/wnpa-sec-2023-05.html
Modified: 2025-04-01
CVE-2023-0416
GNW dissector crash in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0416.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0416.json
- https://gitlab.com/wireshark/wireshark/-/issues/18779
- https://gitlab.com/wireshark/wireshark/-/issues/18779
- https://www.wireshark.org/security/wnpa-sec-2023-04.html
- https://www.wireshark.org/security/wnpa-sec-2023-04.html
Modified: 2025-03-31
CVE-2023-0417
Memory leak in the NFS dissector in Wireshark 4.0.0 to 4.0.2 and 3.6.0 to 3.6.10 and allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0417.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-0417.json
- https://gitlab.com/wireshark/wireshark/-/issues/18628
- https://gitlab.com/wireshark/wireshark/-/issues/18628
- [debian-lts-announce] 20230208 [SECURITY] [DLA 3313-1] wireshark security update
- [debian-lts-announce] 20230208 [SECURITY] [DLA 3313-1] wireshark security update
- https://www.wireshark.org/security/wnpa-sec-2023-02.html
- https://www.wireshark.org/security/wnpa-sec-2023-02.html
Modified: 2025-01-07
CVE-2023-0666
Due to failure in validating the length provided by an attacker-crafted RTPS packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark.
- https://gitlab.com/wireshark/wireshark/-/issues/19085
- https://gitlab.com/wireshark/wireshark/-/issues/19085
- https://security.gentoo.org/glsa/202309-02
- https://security.gentoo.org/glsa/202309-02
- https://takeonme.org/cves/CVE-2023-0666.html
- https://takeonme.org/cves/CVE-2023-0666.html
- https://www.debian.org/security/2023/dsa-5429
- https://www.debian.org/security/2023/dsa-5429
- https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html
- https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html
- https://www.wireshark.org/security/wnpa-sec-2023-18.html
- https://www.wireshark.org/security/wnpa-sec-2023-18.html
Modified: 2025-01-07
CVE-2023-0667
Due to failure in validating the length provided by an attacker-crafted MSMMS packet, Wireshark version 4.0.5 and prior, in an unusual configuration, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark
Modified: 2025-01-07
CVE-2023-0668
Due to failure in validating the length provided by an attacker-crafted IEEE-C37.118 packet, Wireshark version 4.0.5 and prior, by default, is susceptible to a heap-based buffer overflow, and possibly code execution in the context of the process running Wireshark.
- https://gitlab.com/wireshark/wireshark/-/issues/19087
- https://gitlab.com/wireshark/wireshark/-/issues/19087
- https://security.gentoo.org/glsa/202309-02
- https://security.gentoo.org/glsa/202309-02
- https://takeonme.org/cves/CVE-2023-0668.html
- https://takeonme.org/cves/CVE-2023-0668.html
- https://www.debian.org/security/2023/dsa-5429
- https://www.debian.org/security/2023/dsa-5429
- https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html
- https://www.wireshark.org/docs/relnotes/wireshark-4.0.6.html
- https://www.wireshark.org/security/wnpa-sec-2023-19.html
- https://www.wireshark.org/security/wnpa-sec-2023-19.html
Modified: 2025-03-06
CVE-2023-1161
ISO 15765 and ISO 10681 dissector crash in Wireshark 4.0.0 to 4.0.3 and 3.6.0 to 3.6.11 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1161.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1161.json
- https://gitlab.com/wireshark/wireshark/-/issues/18839
- https://gitlab.com/wireshark/wireshark/-/issues/18839
- [debian-lts-announce] 20230429 [SECURITY] [DLA 3402-1] wireshark security update
- [debian-lts-announce] 20230429 [SECURITY] [DLA 3402-1] wireshark security update
- GLSA-202309-02
- GLSA-202309-02
- DSA-5429
- DSA-5429
- https://www.wireshark.org/security/wnpa-sec-2023-08.html
- https://www.wireshark.org/security/wnpa-sec-2023-08.html
Modified: 2025-02-07
CVE-2023-1992
RPCoRDMA dissector crash in Wireshark 4.0.0 to 4.0.4 and 3.6.0 to 3.6.12 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1992.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1992.json
- https://gitlab.com/wireshark/wireshark/-/issues/18852
- https://gitlab.com/wireshark/wireshark/-/issues/18852
- [debian-lts-announce] 20230429 [SECURITY] [DLA 3402-1] wireshark security update
- [debian-lts-announce] 20230429 [SECURITY] [DLA 3402-1] wireshark security update
- FEDORA-2023-f70fbf64cb
- FEDORA-2023-f70fbf64cb
- FEDORA-2023-7af3ad9ffe
- FEDORA-2023-7af3ad9ffe
- FEDORA-2023-203eff67e0
- FEDORA-2023-203eff67e0
- GLSA-202309-02
- GLSA-202309-02
- DSA-5429
- DSA-5429
- https://www.wireshark.org/security/wnpa-sec-2023-09.html
- https://www.wireshark.org/security/wnpa-sec-2023-09.html
Modified: 2025-02-07
CVE-2023-1993
LISP dissector large loop in Wireshark 4.0.0 to 4.0.4 and 3.6.0 to 3.6.12 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1993.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1993.json
- https://gitlab.com/wireshark/wireshark/-/issues/18900
- https://gitlab.com/wireshark/wireshark/-/issues/18900
- [debian-lts-announce] 20230429 [SECURITY] [DLA 3402-1] wireshark security update
- [debian-lts-announce] 20230429 [SECURITY] [DLA 3402-1] wireshark security update
- FEDORA-2023-f70fbf64cb
- FEDORA-2023-f70fbf64cb
- FEDORA-2023-7af3ad9ffe
- FEDORA-2023-7af3ad9ffe
- FEDORA-2023-203eff67e0
- FEDORA-2023-203eff67e0
- GLSA-202309-02
- GLSA-202309-02
- DSA-5429
- DSA-5429
- https://www.wireshark.org/security/wnpa-sec-2023-10.html
- https://www.wireshark.org/security/wnpa-sec-2023-10.html
Modified: 2025-02-07
CVE-2023-1994
GQUIC dissector crash in Wireshark 4.0.0 to 4.0.4 and 3.6.0 to 3.6.12 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1994.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-1994.json
- https://gitlab.com/wireshark/wireshark/-/issues/18947
- https://gitlab.com/wireshark/wireshark/-/issues/18947
- [debian-lts-announce] 20230429 [SECURITY] [DLA 3402-1] wireshark security update
- [debian-lts-announce] 20230429 [SECURITY] [DLA 3402-1] wireshark security update
- FEDORA-2023-f70fbf64cb
- FEDORA-2023-f70fbf64cb
- FEDORA-2023-7af3ad9ffe
- FEDORA-2023-7af3ad9ffe
- FEDORA-2023-203eff67e0
- FEDORA-2023-203eff67e0
- GLSA-202309-02
- GLSA-202309-02
- DSA-5429
- DSA-5429
- https://www.wireshark.org/security/wnpa-sec-2023-11.html
- https://www.wireshark.org/security/wnpa-sec-2023-11.html
Modified: 2025-01-15
CVE-2023-2854
BLF file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2854.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2854.json
- https://gitlab.com/wireshark/wireshark/-/issues/19084
- https://gitlab.com/wireshark/wireshark/-/issues/19084
- GLSA-202309-02
- GLSA-202309-02
- DSA-5429
- DSA-5429
- https://www.wireshark.org/security/wnpa-sec-2023-17.html
- https://www.wireshark.org/security/wnpa-sec-2023-17.html
Modified: 2025-01-15
CVE-2023-2855
Candump log parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2855.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2855.json
- https://gitlab.com/wireshark/wireshark/-/issues/19062
- https://gitlab.com/wireshark/wireshark/-/issues/19062
- GLSA-202309-02
- GLSA-202309-02
- DSA-5429
- DSA-5429
- https://www.wireshark.org/security/wnpa-sec-2023-12.html
- https://www.wireshark.org/security/wnpa-sec-2023-12.html
Modified: 2025-01-15
CVE-2023-2856
VMS TCPIPtrace file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2856.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2856.json
- https://gitlab.com/wireshark/wireshark/-/issues/19083
- https://gitlab.com/wireshark/wireshark/-/issues/19083
- [debian-lts-announce] 20230603 [SECURITY] [DLA 3443-1] wireshark security update
- [debian-lts-announce] 20230603 [SECURITY] [DLA 3443-1] wireshark security update
- GLSA-202309-02
- GLSA-202309-02
- DSA-5429
- DSA-5429
- https://www.wireshark.org/security/wnpa-sec-2023-16.html
- https://www.wireshark.org/security/wnpa-sec-2023-16.html
Modified: 2025-01-15
CVE-2023-2857
BLF file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2857.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2857.json
- https://gitlab.com/wireshark/wireshark/-/issues/19063
- https://gitlab.com/wireshark/wireshark/-/issues/19063
- GLSA-202309-02
- GLSA-202309-02
- DSA-5429
- DSA-5429
- https://www.wireshark.org/security/wnpa-sec-2023-13.html
- https://www.wireshark.org/security/wnpa-sec-2023-13.html
Modified: 2025-01-15
CVE-2023-2858
NetScaler file parser crash in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2858.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2858.json
- https://gitlab.com/wireshark/wireshark/-/issues/19081
- https://gitlab.com/wireshark/wireshark/-/issues/19081
- [debian-lts-announce] 20230603 [SECURITY] [DLA 3443-1] wireshark security update
- [debian-lts-announce] 20230603 [SECURITY] [DLA 3443-1] wireshark security update
- GLSA-202309-02
- GLSA-202309-02
- DSA-5429
- DSA-5429
- https://www.wireshark.org/security/wnpa-sec-2023-15.html
- https://www.wireshark.org/security/wnpa-sec-2023-15.html
Modified: 2025-01-16
CVE-2023-2879
GDSDB infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2879.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2879.json
- https://gitlab.com/wireshark/wireshark/-/issues/19068
- https://gitlab.com/wireshark/wireshark/-/issues/19068
- [debian-lts-announce] 20230603 [SECURITY] [DLA 3443-1] wireshark security update
- [debian-lts-announce] 20230603 [SECURITY] [DLA 3443-1] wireshark security update
- GLSA-202309-02
- GLSA-202309-02
- DSA-5429
- DSA-5429
- https://www.wireshark.org/security/wnpa-sec-2023-14.html
- https://www.wireshark.org/security/wnpa-sec-2023-14.html
Modified: 2025-02-13
CVE-2023-2906
Due to a failure in validating the length provided by an attacker-crafted CP2179 packet, Wireshark versions 2.0.0 through 4.0.7 is susceptible to a divide by zero allowing for a denial of service attack.
- https://gitlab.com/wireshark/wireshark/-/issues/19229
- https://gitlab.com/wireshark/wireshark/-/issues/19229
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6HCUPLDY7HLPO46PHMGIJSUBJFTT237C/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6HCUPLDY7HLPO46PHMGIJSUBJFTT237C/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4AVRUYSHDNEAJILVSGY5W6MPOMG2YRF/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4AVRUYSHDNEAJILVSGY5W6MPOMG2YRF/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TRKHFQPWFU7F3OXTL6IEIQSJG6FVXZTZ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TRKHFQPWFU7F3OXTL6IEIQSJG6FVXZTZ/
- https://takeonme.org/cves/CVE-2023-2906.html
- https://takeonme.org/cves/CVE-2023-2906.html
Modified: 2025-01-13
CVE-2023-2952
XRA dissector infinite loop in Wireshark 4.0.0 to 4.0.5 and 3.6.0 to 3.6.13 allows denial of service via packet injection or crafted capture file
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2952.json
- https://gitlab.com/gitlab-org/cves/-/blob/master/2023/CVE-2023-2952.json
- https://gitlab.com/wireshark/wireshark/-/issues/19100
- https://gitlab.com/wireshark/wireshark/-/issues/19100
- [debian-lts-announce] 20230603 [SECURITY] [DLA 3443-1] wireshark security update
- [debian-lts-announce] 20230603 [SECURITY] [DLA 3443-1] wireshark security update
- GLSA-202309-02
- GLSA-202309-02
- DSA-5429
- DSA-5429
- https://www.wireshark.org/security/wnpa-sec-2023-20.html
- https://www.wireshark.org/security/wnpa-sec-2023-20.html
Modified: 2024-11-21
CVE-2023-3648
Kafka dissector crash in Wireshark 4.0.0 to 4.0.6 and 3.6.0 to 3.6.14 allows denial of service via packet injection or crafted capture file
Modified: 2024-11-21
CVE-2023-4511
BT SDP dissector infinite loop in Wireshark 4.0.0 to 4.0.7 and 3.6.0 to 3.6.15 allows denial of service via packet injection or crafted capture file
- GitLab Issue #19258
- GitLab Issue #19258
- https://lists.debian.org/debian-lts-announce/2024/02/msg00016.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6HCUPLDY7HLPO46PHMGIJSUBJFTT237C/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4AVRUYSHDNEAJILVSGY5W6MPOMG2YRF/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TRKHFQPWFU7F3OXTL6IEIQSJG6FVXZTZ/
- https://www.wireshark.org/security/wnpa-sec-2023-24.html
- https://www.wireshark.org/security/wnpa-sec-2023-24.html
Modified: 2024-11-21
CVE-2023-4513
BT SDP dissector memory leak in Wireshark 4.0.0 to 4.0.7 and 3.6.0 to 3.6.15 allows denial of service via packet injection or crafted capture file
- GitLab Issue #19259
- GitLab Issue #19259
- https://lists.debian.org/debian-lts-announce/2024/02/msg00016.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6HCUPLDY7HLPO46PHMGIJSUBJFTT237C/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/L4AVRUYSHDNEAJILVSGY5W6MPOMG2YRF/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/TRKHFQPWFU7F3OXTL6IEIQSJG6FVXZTZ/
- https://www.wireshark.org/security/wnpa-sec-2023-25.html
- https://www.wireshark.org/security/wnpa-sec-2023-25.html