ALT-BU-2024-15376-1
Branch p10 update bulletin.
Package glpi-agent updated to version 1.11-alt1 for branch p10 in task 360511.
Closed bugs
glpi-agent ошибка Can't load XML::LibXML
Package xorg-server updated to version 1.20.14-alt14 for branch p10 in task 361143.
Closed vulnerabilities
BDU:2024-09084
Уязвимость функции _XkbSetCompatMap реализации сервера X Window System X.Org Server, позволяющая нарушителю повысить свои привилегии
Modified: 2024-11-21
CVE-2024-9632
A flaw was found in the X.org server. Due to improperly tracked allocation size in _XkbSetCompatMap, a local attacker may be able to trigger a buffer overflow condition via a specially crafted payload, leading to denial of service or local privilege escalation in distributions where the X.org server is run with root privileges.
- http://seclists.org/fulldisclosure/2024/Oct/20
- http://www.openwall.com/lists/oss-security/2024/10/29/2
- RHSA-2024:10090
- RHSA-2024:8798
- RHSA-2024:9540
- RHSA-2024:9579
- RHSA-2024:9601
- RHSA-2024:9690
- RHSA-2024:9816
- RHSA-2024:9818
- RHSA-2024:9819
- RHSA-2024:9820
- RHSA-2024:9901
- https://access.redhat.com/security/cve/CVE-2024-9632
- RHBZ#2317233
- https://lists.debian.org/debian-lts-announce/2024/10/msg00031.html
Package xorg-xwayland updated to version 23.1.1-alt6 for branch p10 in task 361143.
Closed vulnerabilities
BDU:2024-09084
Уязвимость функции _XkbSetCompatMap реализации сервера X Window System X.Org Server, позволяющая нарушителю повысить свои привилегии
Modified: 2024-11-21
CVE-2024-9632
A flaw was found in the X.org server. Due to improperly tracked allocation size in _XkbSetCompatMap, a local attacker may be able to trigger a buffer overflow condition via a specially crafted payload, leading to denial of service or local privilege escalation in distributions where the X.org server is run with root privileges.
- http://seclists.org/fulldisclosure/2024/Oct/20
- http://www.openwall.com/lists/oss-security/2024/10/29/2
- RHSA-2024:10090
- RHSA-2024:8798
- RHSA-2024:9540
- RHSA-2024:9579
- RHSA-2024:9601
- RHSA-2024:9690
- RHSA-2024:9816
- RHSA-2024:9818
- RHSA-2024:9819
- RHSA-2024:9820
- RHSA-2024:9901
- https://access.redhat.com/security/cve/CVE-2024-9632
- RHBZ#2317233
- https://lists.debian.org/debian-lts-announce/2024/10/msg00031.html
Closed vulnerabilities
BDU:2024-00458
Уязвимость функции Ip6ProcessRedirect (NetworkPkg/Ip6Dxe/Ip6Nd.c) библиотеки Tianocore edk2, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным
BDU:2024-00459
Уязвимость функции Dhcp6HandleAdvertiseMsg (NetworkPkg/Dhcp6Dxe/Dhcp6Io.c) библиотеки Tianocore edk2, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2024-00460
Уязвимость функции Dhcp6SendRequestMsg (NetworkPkg/Dhcp6Dxe/Dhcp6Io.c) библиотеки Tianocore edk2, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2024-00626
Уязвимость функции NetRandomInitSeed() библиотеки Tianocore edk2, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации или вызвать отказ в обслуживании
BDU:2024-00627
Уязвимость функции Ip6IsOptionValid() библиотеки Tianocore edk2, позволяющая нарушителю оказать воздействие на доступность защищаемой информации или вызвать отказ в обслуживании
BDU:2024-00646
Уязвимость компонента IPv6 Options Header Handler библиотеки Tianocore EDK2, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-00657
Уязвимость компонента DHCPv6 Proxy Advertise Message Handler библиотеки Tianocore EDK2, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность данных
BDU:2024-00658
Уязвимость компонента TCP Initial Sequence Number Handler библиотеки Tianocore EDK2, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным
BDU:2024-00659
Уязвимость компонента DHCPv6 Advertise Message Handler библиотеки Tianocore EDK2, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность данных
BDU:2024-01537
Уязвимость функции tcg2measurepeimage() библиотеки Tianocore EDK2 , вызванная переполнением буфера, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2024-01538
Уязвимость функции tcg2measuregpttable() библиотеки Tianocore EDK2 , вызванная переполнением буфера, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2024-01539
Уязвимость функции createhob() библиотеки Tianocore EDK2 , вызванная переполнением буфера, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2024-05539
Уязвимость реализации механизма SEV-SNP и SEV-ES ядра операционных систем Linux, позволяющая нарушителю оказать воздействие на конфиденциальность и целостность защищаемой информации
Modified: 2025-02-13
CVE-2022-36763
EDK2 is susceptible to a vulnerability in the Tcg2MeasureGptTable() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.
- https://github.com/tianocore/edk2/security/advisories/GHSA-xvv8-66cq-prwr
- https://github.com/tianocore/edk2/security/advisories/GHSA-xvv8-66cq-prwr
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/
Modified: 2025-02-13
CVE-2022-36764
EDK2 is susceptible to a vulnerability in the Tcg2MeasurePeImage() function, allowing a user to trigger a heap buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.
- https://github.com/tianocore/edk2/security/advisories/GHSA-4hcq-p8q8-hj8j
- https://github.com/tianocore/edk2/security/advisories/GHSA-4hcq-p8q8-hj8j
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/
Modified: 2025-02-13
CVE-2022-36765
EDK2 is susceptible to a vulnerability in the CreateHob() function, allowing a user to trigger a integer overflow to buffer overflow via a local network. Successful exploitation of this vulnerability may result in a compromise of confidentiality, integrity, and/or availability.
- https://github.com/tianocore/edk2/security/advisories/GHSA-ch4w-v7m3-g8wx
- https://github.com/tianocore/edk2/security/advisories/GHSA-ch4w-v7m3-g8wx
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/
Modified: 2024-11-21
CVE-2023-45229
EDK2's Network Package is susceptible to an out-of-bounds read vulnerability when processing the IA_NA or IA_TA option in a DHCPv6 Advertise message. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality.
- http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html
- http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html
- http://www.openwall.com/lists/oss-security/2024/01/16/2
- http://www.openwall.com/lists/oss-security/2024/01/16/2
- https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h
- https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h
- https://security.netapp.com/advisory/ntap-20240307-0011/
- https://security.netapp.com/advisory/ntap-20240307-0011/
Modified: 2025-02-13
CVE-2023-45230
EDK2's Network Package is susceptible to a buffer overflow vulnerability via a long server ID option in DHCPv6 client. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.
- http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html
- http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html
- http://www.openwall.com/lists/oss-security/2024/01/16/2
- http://www.openwall.com/lists/oss-security/2024/01/16/2
- https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h
- https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/
- https://security.netapp.com/advisory/ntap-20240307-0011/
- https://security.netapp.com/advisory/ntap-20240307-0011/
Modified: 2024-11-21
CVE-2023-45231
EDK2's Network Package is susceptible to an out-of-bounds read vulnerability when processing Neighbor Discovery Redirect message. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality.
- http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html
- http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html
- http://www.openwall.com/lists/oss-security/2024/01/16/2
- http://www.openwall.com/lists/oss-security/2024/01/16/2
- https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h
- https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/
- https://security.netapp.com/advisory/ntap-20240307-0011/
- https://security.netapp.com/advisory/ntap-20240307-0011/
Modified: 2025-02-13
CVE-2023-45232
EDK2's Network Package is susceptible to an infinite loop vulnerability when parsing unknown options in the Destination Options header of IPv6. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Availability.
- http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html
- http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html
- http://www.openwall.com/lists/oss-security/2024/01/16/2
- http://www.openwall.com/lists/oss-security/2024/01/16/2
- https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h
- https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/
- https://security.netapp.com/advisory/ntap-20240307-0011/
- https://security.netapp.com/advisory/ntap-20240307-0011/
Modified: 2025-02-13
CVE-2023-45233
EDK2's Network Package is susceptible to an infinite lop vulnerability when parsing a PadN option in the Destination Options header of IPv6. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Availability.
- http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html
- http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html
- http://www.openwall.com/lists/oss-security/2024/01/16/2
- http://www.openwall.com/lists/oss-security/2024/01/16/2
- https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h
- https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/
- https://security.netapp.com/advisory/ntap-20240307-0011/
- https://security.netapp.com/advisory/ntap-20240307-0011/
Modified: 2025-02-13
CVE-2023-45234
EDK2's Network Package is susceptible to a buffer overflow vulnerability when processing DNS Servers option from a DHCPv6 Advertise message. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.
- http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html
- http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html
- http://www.openwall.com/lists/oss-security/2024/01/16/2
- http://www.openwall.com/lists/oss-security/2024/01/16/2
- https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h
- https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/
- https://security.netapp.com/advisory/ntap-20240307-0011/
- https://security.netapp.com/advisory/ntap-20240307-0011/
Modified: 2025-02-13
CVE-2023-45235
EDK2's Network Package is susceptible to a buffer overflow vulnerability when handling Server ID option from a DHCPv6 proxy Advertise message. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality, Integrity and/or Availability.
- http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html
- http://packetstormsecurity.com/files/176574/PixieFail-Proof-Of-Concepts.html
- http://www.openwall.com/lists/oss-security/2024/01/16/2
- http://www.openwall.com/lists/oss-security/2024/01/16/2
- https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h
- https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SJ42V7O7F4OU6R7QSQQECLB6LDHKZIMQ/
- https://security.netapp.com/advisory/ntap-20240307-0011/
- https://security.netapp.com/advisory/ntap-20240307-0011/
Modified: 2025-02-13
CVE-2023-45236
EDK2's Network Package is susceptible to a predictable TCP Initial Sequence Number. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality.
- http://www.openwall.com/lists/oss-security/2024/01/16/2
- http://www.openwall.com/lists/oss-security/2024/01/16/2
- https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h
- https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h
- https://security.netapp.com/advisory/ntap-20240307-0011/
- https://security.netapp.com/advisory/ntap-20240307-0011/
Modified: 2025-02-13
CVE-2023-45237
EDK2's Network Package is susceptible to a predictable TCP Initial Sequence Number. This vulnerability can be exploited by an attacker to gain unauthorized access and potentially lead to a loss of Confidentiality.
- http://www.openwall.com/lists/oss-security/2024/01/16/2
- http://www.openwall.com/lists/oss-security/2024/01/16/2
- https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h
- https://github.com/tianocore/edk2/security/advisories/GHSA-hc6x-cw6p-gj7h
- https://security.netapp.com/advisory/ntap-20240307-0011/
- https://security.netapp.com/advisory/ntap-20240307-0011/
Modified: 2025-03-27
CVE-2024-25742
In the Linux kernel before 6.9, an untrusted hypervisor can inject virtual interrupt 29 (#VC) at any point in time and can trigger its handler. This affects AMD SEV-SNP and AMD SEV-ES.
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.9
- https://cdn.kernel.org/pub/linux/kernel/v6.x/ChangeLog-6.9
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e3ef461af35a8c74f2f4ce6616491ddb355a208f
- https://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=e3ef461af35a8c74f2f4ce6616491ddb355a208f
- https://github.com/torvalds/linux/commit/e3ef461af35a8c74f2f4ce6616491ddb355a208f
- https://github.com/torvalds/linux/commit/e3ef461af35a8c74f2f4ce6616491ddb355a208f
- https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3008.html
- https://www.amd.com/en/resources/product-security/bulletin/amd-sb-3008.html
Closed bugs
Can't locate config.ph