ALT-BU-2024-14670-1
Branch c9f2 update bulletin.
Closed vulnerabilities
BDU:2024-04479
Уязвимость компонента CDP PDU Packet Handler реализации протокола LLDP под Unix Lldpd, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
Modified: 2024-11-21
CVE-2023-41910
An issue was discovered in lldpd before 1.0.17. By crafting a CDP PDU packet with specific CDP_TLV_ADDRESSES TLVs, a malicious actor can remotely force the lldpd daemon to perform an out-of-bounds read on heap memory. This occurs in cdp_decode in daemon/protocols/cdp.c.
- https://github.com/lldpd/lldpd/commit/a9aeabdf879c25c584852a0bb5523837632f099b
- https://github.com/lldpd/lldpd/commit/a9aeabdf879c25c584852a0bb5523837632f099b
- https://github.com/lldpd/lldpd/releases/tag/1.0.17
- https://github.com/lldpd/lldpd/releases/tag/1.0.17
- [debian-lts-announce] 20230922 [SECURITY] [DLA 3578-1] lldpd security update
- [debian-lts-announce] 20230922 [SECURITY] [DLA 3578-1] lldpd security update
- DSA-5505
- DSA-5505
Closed vulnerabilities
BDU:2022-01068
Уязвимость командной оболочки zsh, связанная с непринятием мер по нейтрализации специальных элементов, позволяющая нарушителю выполнить произвольные команды
Modified: 2024-11-21
CVE-2021-45444
In zsh before 5.8.1, an attacker can achieve code execution if they control a command output inside the prompt, as demonstrated by a %F argument. This occurs because of recursive PROMPT_SUBST expansion.
- 20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina
- 20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- 20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4
- 20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4
- [debian-lts-announce] 20220218 [SECURITY] [DLA 2926-1] zsh security update
- [debian-lts-announce] 20220218 [SECURITY] [DLA 2926-1] zsh security update
- FEDORA-2022-adf0c6d196
- FEDORA-2022-adf0c6d196
- FEDORA-2022-0a06987c3c
- FEDORA-2022-0a06987c3c
- https://support.apple.com/kb/HT213255
- https://support.apple.com/kb/HT213255
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213257
- https://support.apple.com/kb/HT213257
- https://vuln.ryotak.me/advisories/63
- https://vuln.ryotak.me/advisories/63
- DSA-5078
- DSA-5078
- https://zsh.sourceforge.io/releases.html
- https://zsh.sourceforge.io/releases.html
Closed bugs
отвалилось rpmquery --lastchange
Package openvpn-gostcrypto updated to version 2.4.9-alt4 for branch c9f2 in task 360504.
Closed vulnerabilities
BDU:2021-02221
Уязвимость функции отложенной аутентификации deferred_auth программного обеспечения OpenVPN, позволяющая нарушителю вынудить сервер вернуть сообщение PUSH_REPLY c данными о настройках VPN до отправки сообщения AUTH_FAILED
Modified: 2024-11-21
CVE-2020-15078
OpenVPN 2.5.1 and earlier versions allows a remote attackers to bypass authentication and access control channel data on servers configured with deferred authentication, which can be used to potentially trigger further information leaks.
- https://community.openvpn.net/openvpn/wiki/CVE-2020-15078
- https://community.openvpn.net/openvpn/wiki/CVE-2020-15078
- https://community.openvpn.net/openvpn/wiki/SecurityAnnouncements
- https://community.openvpn.net/openvpn/wiki/SecurityAnnouncements
- [debian-lts-announce] 20220503 [SECURITY] [DLA 2992-1] openvpn security update
- [debian-lts-announce] 20220503 [SECURITY] [DLA 2992-1] openvpn security update
- FEDORA-2021-242ef81244
- FEDORA-2021-242ef81244
- FEDORA-2021-d6b9d8497b
- FEDORA-2021-d6b9d8497b
- FEDORA-2021-b805c26afa
- FEDORA-2021-b805c26afa
- GLSA-202105-25
- GLSA-202105-25
- https://usn.ubuntu.com/usn/usn-4933-1
- https://usn.ubuntu.com/usn/usn-4933-1
Closed bugs
openvpn-gostcrypto Не удается установить VPN-соединение