ALT-BU-2024-10826-1
Branch c10f2 update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2024-4467
A flaw was found in the QEMU disk image utility (qemu-img) 'info' command. A specially crafted image file containing a `json:{}` value describing block devices in QMP could cause the qemu-img process on the host to consume large amounts of memory or CPU time, leading to denial of service or read/write to an existing external file.
- http://www.openwall.com/lists/oss-security/2024/07/23/2
- RHSA-2024:4276
- RHSA-2024:4276
- RHSA-2024:4277
- RHSA-2024:4277
- RHSA-2024:4278
- RHSA-2024:4278
- RHSA-2024:4372
- RHSA-2024:4372
- RHSA-2024:4373
- RHSA-2024:4373
- RHSA-2024:4374
- RHSA-2024:4374
- RHSA-2024:4420
- RHSA-2024:4420
- RHSA-2024:4724
- RHSA-2024:4724
- RHSA-2024:4727
- RHSA-2024:4727
- https://access.redhat.com/security/cve/CVE-2024-4467
- https://access.redhat.com/security/cve/CVE-2024-4467
- RHBZ#2278875
- RHBZ#2278875
- https://security.netapp.com/advisory/ntap-20240822-0005/
Closed bugs
/lib/udev/rules.d/90-qemu-guest-agent.rules содержит синтаксические ошибки
Package mediawiki-extensions-Collection updated to version 1.40-alt1.d3c0c1b for branch c10f2 in task 353479.
Closed bugs
Собрать с php8
Closed vulnerabilities
BDU:2024-04823
Уязвимость функции BN_bin2bn (etc/uams/uams_dhx_pam.c) реализации протокола Apple Filing Protocol Netatalk, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2022-22995
The combination of primitives offered by SMB and AFP in their default configuration allows the arbitrary writing of files. By exploiting these combination of primitives, an attacker can execute arbitrary code.
- [debian-lts-announce] 20240104 [SECURITY] [DLA 3706-1] netatalk security update
- [debian-lts-announce] 20240104 [SECURITY] [DLA 3706-1] netatalk security update
- FEDORA-2023-39f0ec3879
- FEDORA-2023-39f0ec3879
- FEDORA-2023-ef901c862c
- FEDORA-2023-ef901c862c
- FEDORA-2023-cec97f7b5d
- FEDORA-2023-cec97f7b5d
- GLSA-202311-02
- GLSA-202311-02
- https://www.westerndigital.com/support/product-security/wdc-22005-netatalk-security-vulnerabilities
- https://www.westerndigital.com/support/product-security/wdc-22005-netatalk-security-vulnerabilities
Modified: 2024-11-21
CVE-2024-38439
Netatalk before 3.2.1 has an off-by-one error and resultant heap-based buffer overflow because of setting ibuf[PASSWDLEN] to '\0' in FPLoginExt in login in etc/uams/uams_pam.c. 2.4.1 and 3.1.19 are also fixed versions.
- https://github.com/Netatalk/netatalk/blob/90d91a9ac9a7d6132ab7620d31c8c23400949206/etc/uams/uams_pam.c#L316
- https://github.com/Netatalk/netatalk/issues/1096
- https://github.com/Netatalk/netatalk/security/advisories/GHSA-8r68-857c-4rqc
- https://netatalk.io/security/CVE-2024-38439
- https://github.com/Netatalk/netatalk/blob/90d91a9ac9a7d6132ab7620d31c8c23400949206/etc/uams/uams_pam.c#L316
- https://netatalk.io/security/CVE-2024-38439
- https://github.com/Netatalk/netatalk/security/advisories/GHSA-8r68-857c-4rqc
- https://github.com/Netatalk/netatalk/issues/1096
Modified: 2025-05-01
CVE-2024-38440
Netatalk before 3.2.1 has an off-by-one error, and resultant heap-based buffer overflow and segmentation violation, because of incorrectly using FPLoginExt in BN_bin2bn in etc/uams/uams_dhx_pam.c. The original issue 1097 report stated: 'The latest version of Netatalk (v3.2.0) contains a security vulnerability. This vulnerability arises due to a lack of validation for the length field after parsing user-provided data, leading to an out-of-bounds heap write of one byte (\0). Under specific configurations, this can result in reading metadata of the next heap block, potentially causing a Denial of Service (DoS) under certain heap layouts or with ASAN enabled. ... The vulnerability is located in the FPLoginExt operation of Netatalk, in the BN_bin2bn function found in /etc/uams/uams_dhx_pam.c ... if (!(bn = BN_bin2bn((unsigned char *)ibuf, KEYSIZE, NULL))) ... threads ... [#0] Id 1, Name: "afpd", stopped 0x7ffff4304e58 in ?? (), reason: SIGSEGV ... [#0] 0x7ffff4304e58 mov BYTE PTR [r14+0x8], 0x0 ... mov rdx, QWORD PTR [rsp+0x18] ... afp_login_ext(obj=
- https://github.com/Netatalk/netatalk/blob/90d91a9ac9a7d6132ab7620d31c8c23400949206/etc/uams/uams_dhx_pam.c#L199-L200
- https://github.com/Netatalk/netatalk/issues/1097
- https://github.com/Netatalk/netatalk/security/advisories/GHSA-mxx4-9fhm-r3w5
- https://netatalk.io/security/CVE-2024-38440
- https://github.com/Netatalk/netatalk/blob/90d91a9ac9a7d6132ab7620d31c8c23400949206/etc/uams/uams_dhx_pam.c#L199-L200
- https://netatalk.io/security/CVE-2024-38440
- https://github.com/Netatalk/netatalk/security/advisories/GHSA-mxx4-9fhm-r3w5
- https://github.com/Netatalk/netatalk/issues/1097
Modified: 2025-05-01
CVE-2024-38441
Netatalk before 3.2.1 has an off-by-one error and resultant heap-based buffer overflow because of setting ibuf[len] to '\0' in FPMapName in afp_mapname in etc/afpd/directory.c. 2.4.1 and 3.1.19 are also fixed versions.
- https://github.com/Netatalk/netatalk/blob/90d91a9ac9a7d6132ab7620d31c8c23400949206/etc/afpd/directory.c#L2333
- https://github.com/Netatalk/netatalk/issues/1098
- https://github.com/Netatalk/netatalk/security/advisories/GHSA-mj6v-cr68-mj9q
- https://netatalk.io/security/CVE-2024-38441
- https://github.com/Netatalk/netatalk/blob/90d91a9ac9a7d6132ab7620d31c8c23400949206/etc/afpd/directory.c#L2333
- https://netatalk.io/security/CVE-2024-38441
- https://github.com/Netatalk/netatalk/security/advisories/GHSA-mj6v-cr68-mj9q
- https://github.com/Netatalk/netatalk/issues/1098
Closed bugs
отсутствует зависимость на zabbix-phpfrontend-engine