ALT-BU-2023-8151-1
Branch p10 update bulletin.
Closed bugs
сломалось предложение полезного имени хоста
Closed vulnerabilities
BDU:2023-07117
Уязвимость утилиты сбора информации запущенных процессов ps набора утилит командной строки procps-ng, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2023-4016
Under some circumstances, this weakness allows a user who has access to run the “ps” utility on a machine, the ability to write almost unlimited amounts of unfiltered data into the process heap.
- https://gitlab.com/procps-ng/procps
- https://gitlab.com/procps-ng/procps
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SUETRRT24OFGPYK6ACPM5VUGHNKH5CQ5/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SUETRRT24OFGPYK6ACPM5VUGHNKH5CQ5/
Package strongswan updated to version 5.9.13-alt1 for branch p10 in task 336469.
Closed vulnerabilities
BDU:2023-08128
Уязвимость VPN-пакета на базе протокола IPSec strongSwan, вызванная ошибкой в процессе charon-tkm, позволяющая нарушителю выполнить произвольный код
Modified: 2025-01-17
CVE-2023-41913
strongSwan before 5.9.12 has a buffer overflow and possible unauthenticated remote code execution via a DH public value that exceeds the internal buffer in charon-tkm's DH proxy. The earliest affected version is 5.3.0. An attack can occur via a crafted IKE_SA_INIT message.
- https://github.com/strongswan/strongswan/releases
- https://github.com/strongswan/strongswan/releases
- FEDORA-2024-6712c699fc
- FEDORA-2024-6712c699fc
- https://security.netapp.com/advisory/ntap-20250117-0003/
- https://www.strongswan.org/blog/2023/11/20/strongswan-vulnerability-%28cve-2023-41913%29.html
- https://www.strongswan.org/blog/2023/11/20/strongswan-vulnerability-%28cve-2023-41913%29.html
Closed vulnerabilities
Modified: 2024-11-21
CVE-2023-43813
GLPI is a free asset and IT management software package. Starting in version 10.0.0 and prior to version 10.0.11, the saved search feature can be used to perform a SQL injection. Version 10.0.11 contains a patch for the issue.
- https://github.com/glpi-project/glpi/commit/4bd7f02d940953b9cbc9d285f7544bb0e490e75e
- https://github.com/glpi-project/glpi/commit/4bd7f02d940953b9cbc9d285f7544bb0e490e75e
- https://github.com/glpi-project/glpi/releases/tag/10.0.11
- https://github.com/glpi-project/glpi/releases/tag/10.0.11
- https://github.com/glpi-project/glpi/security/advisories/GHSA-94c3-fw5r-3362
- https://github.com/glpi-project/glpi/security/advisories/GHSA-94c3-fw5r-3362
Modified: 2024-11-21
CVE-2023-46726
GLPI is a free asset and IT management software package. Starting in version 10.0.0 and prior to version 10.0.11, on PHP 7.4 only, the LDAP server configuration form can be used to execute arbitrary code previously uploaded as a GLPI document. Version 10.0.11 contains a patch for the issue.
- https://github.com/glpi-project/glpi/commit/42ba2b031bec0b3889317db25f3adf9080fc11b2
- https://github.com/glpi-project/glpi/commit/42ba2b031bec0b3889317db25f3adf9080fc11b2
- https://github.com/glpi-project/glpi/releases/tag/10.0.11
- https://github.com/glpi-project/glpi/releases/tag/10.0.11
- https://github.com/glpi-project/glpi/security/advisories/GHSA-qc92-gxc6-5f95
- https://github.com/glpi-project/glpi/security/advisories/GHSA-qc92-gxc6-5f95
Modified: 2024-11-21
CVE-2023-46727
GLPI is a free asset and IT management software package. Starting in version 10.0.0 and prior to version 10.0.11, GLPI inventory endpoint can be used to drive a SQL injection attack. Version 10.0.11 contains a patch for the issue. As a workaround, disable native inventory.
- https://github.com/glpi-project/glpi/commit/ee2d674481ebef177037e8e14d35c9455b5cfd46
- https://github.com/glpi-project/glpi/commit/ee2d674481ebef177037e8e14d35c9455b5cfd46
- https://github.com/glpi-project/glpi/releases/tag/10.0.11
- https://github.com/glpi-project/glpi/releases/tag/10.0.11
- https://github.com/glpi-project/glpi/security/advisories/GHSA-v799-2mp3-wgfr
- https://github.com/glpi-project/glpi/security/advisories/GHSA-v799-2mp3-wgfr