ALT-BU-2024-16874-1
Branch p11 update bulletin.
Package dconf-editor updated to version 45.0.1-alt2 for branch p11 in task 363895.
Closed bugs
Опечатка в русском переводе слова default
Closed bugs
pitivi: Не взлетает
Package libgst-rtsp-server updated to version 1.24.9-alt1 for branch p11 in task 363895.
Closed vulnerabilities
Modified: 2024-10-23
CVE-2024-44331
Incorrect Access Control in GStreamer RTSP server 1.25.0 in gst-rtsp-server/rtsp-media.c allows remote attackers to cause a denial of service via a series of specially crafted hexstream requests.
Package gnome-control-center updated to version 47.2-alt1.1 for branch p11 in task 363895.
Closed bugs
gnome-control-center: segfault при открытии пункта настроек "Система -> Дата и время"
Closed vulnerabilities
BDU:2024-06447
Уязвимость библиотеки для создания графических пользовательских интерфейсов GTK (GIMP Toolkit), связанная с неверным управлением генерацией кода, позволяющая нарушителю повысить свои привилегии
Modified: 2025-03-14
CVE-2024-6655
A flaw was found in the GTK library. Under certain conditions, it is possible for a library to be injected into a GTK application from the current working directory.
- http://www.openwall.com/lists/oss-security/2024/09/09/1
- RHSA-2024:6963
- RHSA-2024:9184
- https://access.redhat.com/security/cve/CVE-2024-6655
- https://access.redhat.com/security/cve/CVE-2024-6655
- RHBZ#2297098
- RHBZ#2297098
- https://gitlab.gnome.org/GNOME/gtk/-/merge_requests/7361/diffs?commit_id=3bbf0b6176d42836d23c36a6ac410e807ec0a7a7#diff-content-e3fbe6480add9420b69f82374fb26ccac2c015a0
- https://gitlab.gnome.org/GNOME/gtk/-/merge_requests/7361/diffs?commit_id=3bbf0b6176d42836d23c36a6ac410e807ec0a7a7#diff-content-e3fbe6480add9420b69f82374fb26ccac2c015a0
- https://www.openwall.com/lists/oss-security/2024/09/09/1
Closed bugs
Implementation of 'apt-get changelog'
Closed vulnerabilities
BDU:2024-07164
Уязвимость библиотеки libxml2, связанная с неверным ограничением XML-ссылок на внешние объекты, позволяющая нарушителю получить доступ к произвольным файлам на сервере или выполнить сетевое сканирование внутренней и внешней инфраструктуры
Modified: 2025-02-28
CVE-2024-40896
In libxml2 2.11 before 2.11.9, 2.12 before 2.12.9, and 2.13 before 2.13.3, the SAX parser can produce events for external entities even if custom SAX handlers try to override entity content (by setting "checked"). This makes classic XXE attacks possible.
Closed vulnerabilities
BDU:2024-09320
Уязвимость инструмента управления контейнерными образами Buildah, существующая из-за неверного ограничения имени пути к каталогу с ограниченным доступом, позволяющая нарушителю пользователю повысить привилегии в системе
BDU:2024-09457
Уязвимость программного средства управления и запуска OCI-контейнеров Podman, связанная с неправильным ограничением имени пути к ограниченному каталогу, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-09460
Уязвимость программного средства управления и запуска OCI-контейнеров Podman, связанная с неправильной проверкой входных данных, позволяющая нарушителю получить доступ к конфиденциальной информации
BDU:2024-09461
Уязвимость библиотеки containers-common языка программирования Golang, связанная с неправильным разрешением ссылки перед доступом к файлу, позволяющая нарушителю получить доступ к конфиденциальной информации
Modified: 2024-12-11
CVE-2024-9341
A flaw was found in Go. When FIPS mode is enabled on a system, container runtimes may incorrectly handle certain file paths due to improper validation in the containers/common Go library. This flaw allows an attacker to exploit symbolic links and trick the system into mounting sensitive host directories inside a container. This issue also allows attackers to access critical host files, bypassing the intended isolation between containers and the host system.
- RHSA-2024:10147
- RHSA-2024:10818
- RHSA-2024:7925
- RHSA-2024:8039
- RHSA-2024:8112
- RHSA-2024:8238
- RHSA-2024:8263
- RHSA-2024:8428
- RHSA-2024:8690
- RHSA-2024:8694
- RHSA-2024:8846
- RHSA-2024:9454
- RHSA-2024:9459
- https://access.redhat.com/security/cve/CVE-2024-9341
- RHBZ#2315691
- https://github.com/containers/common/blob/384f77532f67afc8a73d8e0c4adb0d195df57714/pkg/subscriptions/subscriptions.go#L169
- https://github.com/containers/common/blob/384f77532f67afc8a73d8e0c4adb0d195df57714/pkg/subscriptions/subscriptions.go#L349
Modified: 2024-12-20
CVE-2024-9407
A vulnerability exists in the bind-propagation option of the Dockerfile RUN --mount instruction. The system does not properly validate the input passed to this option, allowing users to pass arbitrary parameters to the mount instruction. This issue can be exploited to mount sensitive directories from the host into a container during the build process and, in some cases, modify the contents of those mounted files. Even if SELinux is used, this vulnerability can bypass its protection by allowing the source directory to be relabeled to give the container access to host files.
Modified: 2025-04-11
CVE-2024-9675
A vulnerability was found in Buildah. Cache mounts do not properly validate that user-specified paths for the cache are within our cache directory, allowing a `RUN` instruction in a Container file to mount an arbitrary directory from the host (read/write) into the container as long as those files can be accessed by the user running Buildah.
- RHSA-2024:8563
- RHSA-2024:8675
- RHSA-2024:8679
- RHSA-2024:8686
- RHSA-2024:8690
- RHSA-2024:8700
- RHSA-2024:8703
- RHSA-2024:8707
- RHSA-2024:8708
- RHSA-2024:8709
- RHSA-2024:8846
- RHSA-2024:8984
- RHSA-2024:8994
- RHSA-2024:9051
- RHSA-2024:9454
- RHSA-2024:9459
- RHSA-2025:2445
- RHSA-2025:2449
- RHSA-2025:2454
- RHSA-2025:2701
- RHSA-2025:2710
- RHSA-2025:3301
- RHSA-2025:3573
- https://access.redhat.com/security/cve/CVE-2024-9675
- RHBZ#2317458
Modified: 2025-04-03
CVE-2024-9676
A vulnerability was found in Podman, Buildah, and CRI-O. A symlink traversal vulnerability in the containers/storage library can cause Podman, Buildah, and CRI-O to hang and result in a denial of service via OOM kill when running a malicious image using an automatically assigned user namespace (`--userns=auto` in Podman and Buildah). The containers/storage library will read /etc/passwd inside the container, but does not properly validate if that file is a symlink, which can be used to cause the library to read an arbitrary file on the host.
- RHSA-2024:10289
- RHSA-2024:8418
- RHSA-2024:8428
- RHSA-2024:8437
- RHSA-2024:8686
- RHSA-2024:8690
- RHSA-2024:8694
- RHSA-2024:8700
- RHSA-2024:8984
- RHSA-2024:9051
- RHSA-2024:9454
- RHSA-2024:9459
- RHSA-2024:9926
- RHSA-2025:0876
- RHSA-2025:2454
- RHSA-2025:2710
- RHSA-2025:3301
- https://access.redhat.com/security/cve/CVE-2024-9676
- RHBZ#2317467
- https://github.com/advisories/GHSA-wq2p-5pc6-wpgf
Closed vulnerabilities
BDU:2024-09320
Уязвимость инструмента управления контейнерными образами Buildah, существующая из-за неверного ограничения имени пути к каталогу с ограниченным доступом, позволяющая нарушителю пользователю повысить привилегии в системе
BDU:2024-09460
Уязвимость программного средства управления и запуска OCI-контейнеров Podman, связанная с неправильной проверкой входных данных, позволяющая нарушителю получить доступ к конфиденциальной информации
BDU:2024-09461
Уязвимость библиотеки containers-common языка программирования Golang, связанная с неправильным разрешением ссылки перед доступом к файлу, позволяющая нарушителю получить доступ к конфиденциальной информации
Modified: 2024-12-11
CVE-2024-9341
A flaw was found in Go. When FIPS mode is enabled on a system, container runtimes may incorrectly handle certain file paths due to improper validation in the containers/common Go library. This flaw allows an attacker to exploit symbolic links and trick the system into mounting sensitive host directories inside a container. This issue also allows attackers to access critical host files, bypassing the intended isolation between containers and the host system.
- RHSA-2024:10147
- RHSA-2024:10818
- RHSA-2024:7925
- RHSA-2024:8039
- RHSA-2024:8112
- RHSA-2024:8238
- RHSA-2024:8263
- RHSA-2024:8428
- RHSA-2024:8690
- RHSA-2024:8694
- RHSA-2024:8846
- RHSA-2024:9454
- RHSA-2024:9459
- https://access.redhat.com/security/cve/CVE-2024-9341
- RHBZ#2315691
- https://github.com/containers/common/blob/384f77532f67afc8a73d8e0c4adb0d195df57714/pkg/subscriptions/subscriptions.go#L169
- https://github.com/containers/common/blob/384f77532f67afc8a73d8e0c4adb0d195df57714/pkg/subscriptions/subscriptions.go#L349
Modified: 2024-12-20
CVE-2024-9407
A vulnerability exists in the bind-propagation option of the Dockerfile RUN --mount instruction. The system does not properly validate the input passed to this option, allowing users to pass arbitrary parameters to the mount instruction. This issue can be exploited to mount sensitive directories from the host into a container during the build process and, in some cases, modify the contents of those mounted files. Even if SELinux is used, this vulnerability can bypass its protection by allowing the source directory to be relabeled to give the container access to host files.
Modified: 2025-04-11
CVE-2024-9675
A vulnerability was found in Buildah. Cache mounts do not properly validate that user-specified paths for the cache are within our cache directory, allowing a `RUN` instruction in a Container file to mount an arbitrary directory from the host (read/write) into the container as long as those files can be accessed by the user running Buildah.
- RHSA-2024:8563
- RHSA-2024:8675
- RHSA-2024:8679
- RHSA-2024:8686
- RHSA-2024:8690
- RHSA-2024:8700
- RHSA-2024:8703
- RHSA-2024:8707
- RHSA-2024:8708
- RHSA-2024:8709
- RHSA-2024:8846
- RHSA-2024:8984
- RHSA-2024:8994
- RHSA-2024:9051
- RHSA-2024:9454
- RHSA-2024:9459
- RHSA-2025:2445
- RHSA-2025:2449
- RHSA-2025:2454
- RHSA-2025:2701
- RHSA-2025:2710
- RHSA-2025:3301
- RHSA-2025:3573
- https://access.redhat.com/security/cve/CVE-2024-9675
- RHBZ#2317458
Closed bugs
the search box is not available in w3m
the search box at the wiki is not available in w3m
Пустой экран справки
Closed bugs
ERROR:target/arm/internals.h:923:regime_is_user: code should not be reached
Package dotnet-runtime-9.0 updated to version 9.0.0.rel-alt1 for branch p11 in task 364453.
Closed vulnerabilities
Modified: 2024-11-19
CVE-2024-43498
.NET and Visual Studio Remote Code Execution Vulnerability
Modified: 2024-11-19
CVE-2024-43499
.NET and Visual Studio Denial of Service Vulnerability
Package ca-certificates-nuget.org updated to version 0.2-alt1 for branch p11 in task 364461.
Closed bugs
.NET 8: Не устанавливаются пакеты из NuGet в связи с отсутствием доверия к 2 корневым сертификатам
Package cloud-init updated to version 24.2-alt2 for branch p11 in task 364478.
Closed bugs
Bug in downstream altlinux
Closed vulnerabilities
BDU:2024-06172
Уязвимость сервера хранения объектов MinIO, связанная с раскрытием конфиденциальной информации неавторизованному лицу, позволяющая нарушителю раскрыть конфиденциальную информацию
Modified: 2024-11-21
CVE-2024-36107
MinIO is a High Performance Object Storage released under GNU Affero General Public License v3.0. `If-Modified-Since` and `If-Unmodified-Since` headers when used with anonymous requests by sending a random object name requests can be used to determine if an object exists or not on the server on a specific bucket and also gain access to some amount of information such as `Last-Modified (of the latest version)`, `Etag (of the latest version)`, `x-amz-version-id (of the latest version)`, `Expires (metadata value of the latest version)`, `Cache-Control (metadata value of the latest version)`. This conditional check was being honored before validating if the anonymous access is indeed allowed on the metadata of an object. This issue has been addressed in commit `e0fe7cc3917`. Users must upgrade to RELEASE.2024-05-27T19-17-46Z for the fix. There are no known workarounds for this issue.
- https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/If-Modified-Since
- https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/If-Modified-Since
- https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/If-Unmodified-Since
- https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/If-Unmodified-Since
- https://github.com/minio/minio/commit/e0fe7cc391724fc5baa85b45508f425020fe4272
- https://github.com/minio/minio/commit/e0fe7cc391724fc5baa85b45508f425020fe4272
- https://github.com/minio/minio/pull/19810
- https://github.com/minio/minio/pull/19810
- https://github.com/minio/minio/security/advisories/GHSA-95fr-cm4m-q5p9
- https://github.com/minio/minio/security/advisories/GHSA-95fr-cm4m-q5p9
Closed vulnerabilities
BDU:2024-07792
Уязвимость системы управления базами данных (СУБД) Redis, связанная с переполнением буфера в стеке, позволяющая нарушителю выполнить произвольный код
BDU:2024-09249
Уязвимость системы управления базами данных Redis, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-10-10
CVE-2024-31227
Redis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. The problem exists in Redis 7 prior to versions 7.2.6 and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Modified: 2024-10-10
CVE-2024-31228
Redis is an open source, in-memory database that persists on disk. Authenticated users can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as `KEYS`, `SCAN`, `PSUBSCRIBE`, `FUNCTION LIST`, `COMMAND LIST` and ACL definitions. Matching of extremely long patterns may result in unbounded recursion, leading to stack overflow and process crash. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Modified: 2024-10-10
CVE-2024-31449
Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.