ALT-BU-2024-12377-1
Branch c10f1 update bulletin.
Closed vulnerabilities
BDU:2024-02979
Уязвимость функции uv_getaddrinfo() (src/unix/getaddrinfo.c, src/win/getaddrinfo.c) библиотеки с асинхронным вводом-выводом libuv, позволяющая нарушителю осуществить SSRF-атаку
Modified: 2024-11-21
CVE-2024-24806
libuv is a multi-platform support library with a focus on asynchronous I/O. The `uv_getaddrinfo` function in `src/unix/getaddrinfo.c` (and its windows counterpart `src/win/getaddrinfo.c`), truncates hostnames to 256 characters before calling `getaddrinfo`. This behavior can be exploited to create addresses like `0x00007f000001`, which are considered valid by `getaddrinfo` and could allow an attacker to craft payloads that resolve to unintended IP addresses, bypassing developer checks. The vulnerability arises due to how the `hostname_ascii` variable (with a length of 256 bytes) is handled in `uv_getaddrinfo` and subsequently in `uv__idna_toascii`. When the hostname exceeds 256 characters, it gets truncated without a terminating null byte. As a result attackers may be able to access internal APIs or for websites (similar to MySpace) that allows users to have `username.example.com` pages. Internal services that crawl or cache these user pages can be exposed to SSRF attacks if a malicious user chooses a long vulnerable username. This issue has been addressed in release version 1.48.0. Users are advised to upgrade. There are no known workarounds for this vulnerability.
- http://www.openwall.com/lists/oss-security/2024/02/08/2
- http://www.openwall.com/lists/oss-security/2024/02/08/2
- http://www.openwall.com/lists/oss-security/2024/02/11/1
- http://www.openwall.com/lists/oss-security/2024/02/11/1
- http://www.openwall.com/lists/oss-security/2024/03/11/1
- http://www.openwall.com/lists/oss-security/2024/03/11/1
- https://github.com/libuv/libuv/commit/0f2d7e784a256b54b2385043438848047bc2a629
- https://github.com/libuv/libuv/commit/0f2d7e784a256b54b2385043438848047bc2a629
- https://github.com/libuv/libuv/commit/3530bcc30350d4a6ccf35d2f7b33e23292b9de70
- https://github.com/libuv/libuv/commit/3530bcc30350d4a6ccf35d2f7b33e23292b9de70
- https://github.com/libuv/libuv/commit/c858a147643de38a09dd4164758ae5b685f2b488
- https://github.com/libuv/libuv/commit/c858a147643de38a09dd4164758ae5b685f2b488
- https://github.com/libuv/libuv/commit/e0327e1d508b8207c9150b6e582f0adf26213c39
- https://github.com/libuv/libuv/commit/e0327e1d508b8207c9150b6e582f0adf26213c39
- https://github.com/libuv/libuv/security/advisories/GHSA-f74f-cvh7-c6q6
- https://github.com/libuv/libuv/security/advisories/GHSA-f74f-cvh7-c6q6
- https://gitlab.kitware.com/cmake/cmake/-/issues/26112
- https://gitlab.kitware.com/cmake/cmake/-/issues/26112
- https://lists.debian.org/debian-lts-announce/2024/03/msg00005.html
- https://lists.debian.org/debian-lts-announce/2024/03/msg00005.html
- https://security.netapp.com/advisory/ntap-20240605-0008/
- https://security.netapp.com/advisory/ntap-20240605-0008/
Package python3-module-cvxopt updated to version 1.3.2-alt1 for branch c10f1 in task 356869.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-41500
Incomplete string comparison vulnerability exits in cvxopt.org cvxop <= 1.2.6 in APIs (cvxopt.cholmod.diag, cvxopt.cholmod.getfactor, cvxopt.cholmod.solve, cvxopt.cholmod.spsolve), which allows attackers to conduct Denial of Service attacks by construct fake Capsule objects.
Closed vulnerabilities
BDU:2024-06605
Уязвимость модуля ngx_http_v4_module веб-серверов NGINX Plus и NGINX OSS, связанная с чтением вне границ памяти, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-01-22
CVE-2024-7347
NGINX Open Source and NGINX Plus have a vulnerability in the ngx_http_mp4_module, which might allow an attacker to over-read NGINX worker memory resulting in its termination, using a specially crafted mp4 file. The issue only affects NGINX if it is built with the ngx_http_mp4_module and the mp4 directive is used in the configuration file. Additionally, the attack is possible only if an attacker can trigger the processing of a specially crafted mp4 file with the ngx_http_mp4_module. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.