ALT-BU-2024-15456-1
Branch sisyphus_e2k update bulletin.
Package freeipa updated to version 4.11.2-alt3 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2024-06544
Уязвимость централизованной системы по управлению идентификацией пользователей FreeIPA, связанная с недостаточным вычислением хэша пароля, позволяющая нарушителю повысить свои привилегии
Modified: 2024-11-24
CVE-2024-2698
A vulnerability was found in FreeIPA in how the initial implementation of MS-SFU by MIT Kerberos was missing a condition for granting the "forwardable" flag on S4U2Self tickets. Fixing this mistake required adding a special case for the check_allowed_to_delegate() function: If the target service argument is NULL, then it means the KDC is probing for general constrained delegation rules and not checking a specific S4U2Proxy request. In FreeIPA 4.11.0, the behavior of ipadb_match_acl() was modified to match the changes from upstream MIT Kerberos 1.20. However, a mistake resulting in this mechanism applies in cases where the target service argument is set AND where it is unset. This results in S4U2Proxy requests being accepted regardless of whether or not there is a matching service delegation rule.
- RHSA-2024:3754
- RHSA-2024:3754
- RHSA-2024:3755
- RHSA-2024:3755
- RHSA-2024:3757
- RHSA-2024:3757
- RHSA-2024:3759
- RHSA-2024:3759
- https://access.redhat.com/security/cve/CVE-2024-2698
- https://access.redhat.com/security/cve/CVE-2024-2698
- RHBZ#2270353
- RHBZ#2270353
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WT3JL7JQDIAFKKEFARWYES7GZNWGQNCI/
- https://www.freeipa.org/release-notes/4-12-1.html
- https://www.freeipa.org/release-notes/4-12-1.html
Modified: 2024-11-21
CVE-2024-3183
A vulnerability was found in FreeIPA in a way when a Kerberos TGS-REQ is encrypted using the client’s session key. This key is different for each new session, which protects it from brute force attacks. However, the ticket it contains is encrypted using the target principal key directly. For user principals, this key is a hash of a public per-principal randomly-generated salt and the user’s password. If a principal is compromised it means the attacker would be able to retrieve tickets encrypted to any principal, all of them being encrypted by their own key directly. By taking these tickets and salts offline, the attacker could run brute force attacks to find character strings able to decrypt tickets when combined to a principal salt (i.e. find the principal’s password).
- RHSA-2024:3754
- RHSA-2024:3754
- RHSA-2024:3755
- RHSA-2024:3755
- RHSA-2024:3756
- RHSA-2024:3756
- RHSA-2024:3757
- RHSA-2024:3757
- RHSA-2024:3758
- RHSA-2024:3758
- RHSA-2024:3759
- RHSA-2024:3759
- RHSA-2024:3760
- RHSA-2024:3760
- RHSA-2024:3761
- RHSA-2024:3761
- RHSA-2024:3775
- RHSA-2024:3775
- https://access.redhat.com/security/cve/CVE-2024-3183
- https://access.redhat.com/security/cve/CVE-2024-3183
- RHBZ#2270685
- RHBZ#2270685
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WT3JL7JQDIAFKKEFARWYES7GZNWGQNCI/
- https://www.freeipa.org/release-notes/4-12-1.html
- https://www.freeipa.org/release-notes/4-12-1.html
Closed bugs
Ошибка установки сервера FreeIPA
Package obs-studio updated to version 30.2.3-alt1.1 for branch sisyphus_e2k.
Closed bugs
Ошибка подключения к серверам при настройки трансляции для telegram
Package epsonscan2 updated to version 6.7.66.0-alt1 for branch sisyphus_e2k.
Closed bugs
обновить epsonscan2 до версии 6.7.63.0
Package libnss-role updated to version 0.5.6-alt4 for branch sisyphus_e2k.
Closed bugs
Накрывается медным тазом при обновлении p10 --> p11
Package python3-module-networkx updated to version 3.3-alt3 for branch sisyphus_e2k.
Closed bugs
Для пакета точно нужны python3-module-networkx-drawing ?
Package appstream-data-generator updated to version 20241002-alt1 for branch sisyphus_e2k.
Closed bugs
Не исключаются языки в appstream-data-appdata-converter
Не исключаются языки в appstream-data-generator
Package wireshark updated to version 4.4.1-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2024-09109
Уязвимость диссекторов AppleTalk Dissector/RELOAD Framing Dissector анализатора трафика компьютерных сетей Wireshark, позволяющая нарушителю вызывать отказ в обслуживании
Modified: 2024-11-25
CVE-2024-9781
AppleTalk and RELOAD Framing dissector crash in Wireshark 4.4.0 and 4.2.0 to 4.2.7 allows denial of service via packet injection or crafted capture file
Package gsasl updated to version 2.2.1-alt2 for branch sisyphus_e2k.
Closed bugs
libgsasl: libgsasl.so.18.0.0 from libgsasl18-2.2.1-alt1.x86_64 conflicts with libgsasl-2.2.0
Package rsyslog updated to version 8.2408.0-alt2 for branch sisyphus_e2k.
Closed bugs
Не стартует автоматически с systemd
Package lightdm-gtk-greeter updated to version 2.0.7-alt11 for branch sisyphus_e2k.
Closed bugs
Сообщение о смене пароля показывается на очень короткий промежуток времени
Package cacti updated to version 1.2.28-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2024-07867
Уязвимость программного средства мониторинга сети Cacti, связанная с неверным управлением генерацией кода, позволяющая нарушителю выполнить произвольный код
BDU:2024-08721
Уязвимость сценария links.php программного средства мониторинга сети Cacti, позволяющая нарушителю проводить межсайтовые сценарные атаки
BDU:2024-08740
Уязвимость сценария links.php программного средства мониторинга сети Cacti, позволяющая нарушителю проводить межсайтовые сценарные атаки
BDU:2024-09250
Уязвимость сценария links.php программного средства мониторинга сети Cacti, позволяющая нарушителю проводить межсайтовый скриптинг
Modified: 2024-10-17
CVE-2024-43362
Cacti is an open source performance and fault management framework. The `fileurl` parameter is not properly sanitized when saving external links in `links.php` . Morever, the said fileurl is placed in some html code which is passed to the `print` function in `link.php` and `index.php`, finally leading to stored XSS. Users with the privilege to create external links can manipulate the `fileurl` parameter in the http post request while creating external links to perform stored XSS attacks. The vulnerability known as XSS (Cross-Site Scripting) occurs when an application allows untrusted user input to be displayed on a web page without proper validation or escaping. This issue has been addressed in release version 1.2.28. All users are advised to upgrade. There are no known workarounds for this issue.
Modified: 2024-10-17
CVE-2024-43363
Cacti is an open source performance and fault management framework. An admin user can create a device with a malicious hostname containing php code and repeat the installation process (completing only step 5 of the installation process is enough, no need to complete the steps before or after it) to use a php file as the cacti log file. After having the malicious hostname end up in the logs (log poisoning), one can simply go to the log file url to execute commands to achieve RCE. This issue has been addressed in version 1.2.28 and all users are advised to upgrade. There are no known workarounds for this vulnerability.
Modified: 2024-10-17
CVE-2024-43364
Cacti is an open source performance and fault management framework. The `title` parameter is not properly sanitized when saving external links in links.php . Morever, the said title parameter is stored in the database and reflected back to user in index.php, finally leading to stored XSS. Users with the privilege to create external links can manipulate the `title` parameter in the http post request while creating external links to perform stored XSS attacks. The vulnerability known as XSS (Cross-Site Scripting) occurs when an application allows untrusted user input to be displayed on a web page without proper validation or escaping. This issue has been addressed in release version 1.2.28. All users are advised to upgrade. There are no known workarounds for this vulnerability.
Modified: 2024-10-16
CVE-2024-43365
Cacti is an open source performance and fault management framework. The`consolenewsection` parameter is not properly sanitized when saving external links in links.php . Morever, the said consolenewsection parameter is stored in the database and reflected back to user in `index.php`, finally leading to stored XSS. Users with the privilege to create external links can manipulate the “consolenewsection” parameter in the http post request while creating external links to perform stored XSS attacks. The vulnerability known as XSS (Cross-Site Scripting) occurs when an application allows untrusted user input to be displayed on a web page without proper validation or escaping. This issue has been addressed in release version 1.2.28. All users are advised to upgrade. There are no known workarounds for this vulnerability.