ALT-BU-2024-2292-1
Branch p10 update bulletin.
Package ghostscript updated to version 10.01.1-alt2 for branch p10 in task 337969.
Closed bugs
Артефакты генерации postscript, отсутствие текста на тестовой странице CUPS
Package openstack-neutron updated to version 22.1.0-alt1.p10 for branch p10 in task 339070.
Closed vulnerabilities
BDU:2021-04649
Уязвимость правил брандмауэра Open vSwitch сетевого сервиса Neutron, связанная с недостаточной проверкой подлинности данных, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-20267
A flaw was found in openstack-neutron's default Open vSwitch firewall rules. By sending carefully crafted packets, anyone in control of a server instance connected to the virtual switch can impersonate the IPv6 addresses of other systems on the network, resulting in denial of service or in some cases possibly interception of traffic intended for other destinations. Only deployments using the Open vSwitch driver are affected. Source: OpenStack project. Versions before openstack-neutron 15.3.3, openstack-neutron 16.3.1 and openstack-neutron 17.1.1 are affected.
Modified: 2024-11-21
CVE-2021-38598
OpenStack Neutron before 16.4.1, 17.x before 17.1.3, and 18.0.0 allows hardware address impersonation when the linuxbridge driver with ebtables-nft is used on a Netfilter-based platform. By sending carefully crafted packets, anyone in control of a server instance connected to the virtual switch can impersonate the hardware addresses of other systems on the network, resulting in denial of service or in some cases possibly interception of traffic intended for other destinations.
Modified: 2024-11-21
CVE-2021-40085
An issue was discovered in OpenStack Neutron before 16.4.1, 17.x before 17.2.1, and 18.x before 18.1.1. Authenticated attackers can reconfigure dnsmasq via a crafted extra_dhcp_opts value.
- [oss-security] 20210831 [OSSA-2021-005] Neutron: Arbitrary dnsmasq reconfiguration via extra_dhcp_opts (CVE-2021-40085)
- [oss-security] 20210831 [OSSA-2021-005] Neutron: Arbitrary dnsmasq reconfiguration via extra_dhcp_opts (CVE-2021-40085)
- https://launchpad.net/bugs/1939733
- https://launchpad.net/bugs/1939733
- [debian-lts-announce] 20211011 [SECURITY] [DLA 2781-1] neutron security update
- [debian-lts-announce] 20211011 [SECURITY] [DLA 2781-1] neutron security update
- [debian-lts-announce] 20220526 [SECURITY] [DLA 3027-1] neutron security update
- [debian-lts-announce] 20220526 [SECURITY] [DLA 3027-1] neutron security update
- https://security.openstack.org/ossa/OSSA-2021-005.html
- https://security.openstack.org/ossa/OSSA-2021-005.html
- DSA-4983
- DSA-4983
Modified: 2024-11-21
CVE-2021-40797
An issue was discovered in the routes middleware in OpenStack Neutron before 16.4.1, 17.x before 17.2.1, and 18.x before 18.1.1. By making API requests involving nonexistent controllers, an authenticated user may cause the API worker to consume increasing amounts of memory, resulting in API performance degradation or denial of service.
- [oss-security] 20210909 [OSSA-2021-006] Neutron: Routes middleware memory leak for nonexistent controllers (CVE-2021-40797)
- [oss-security] 20210909 [OSSA-2021-006] Neutron: Routes middleware memory leak for nonexistent controllers (CVE-2021-40797)
- https://launchpad.net/bugs/1942179
- https://launchpad.net/bugs/1942179
- https://security.openstack.org/ossa/OSSA-2021-006.html
- https://security.openstack.org/ossa/OSSA-2021-006.html
Modified: 2025-03-07
CVE-2022-3277
An uncontrolled resource consumption flaw was found in openstack-neutron. This flaw allows a remote authenticated user to query a list of security groups for an invalid project. This issue creates resources that are unconstrained by the user's quota. If a malicious user were to submit a significant number of requests, this could lead to a denial of service.
Package kde5-zanshin updated to version 23.08.4-alt3 for branch p10 in task 339786.
Closed bugs
Не работает смена языка интерфейса в kde5-zanshin
Package apache2-mod_wsgi updated to version 4.9.4-alt0.p10.1 for branch p10 in task 340165.
Closed vulnerabilities
BDU:2022-05209
Уязвимость модуля mod_wsgi веб-сервера Apache, связанная с ошибками при обработке заголовока X-Client-IP, позволяющая нарушителю получить несанкционированный доступ к сетевым службам
Modified: 2024-11-21
CVE-2022-2255
A vulnerability was found in mod_wsgi. The X-Client-IP header is not removed from a request from an untrusted proxy, allowing an attacker to pass the X-Client-IP header to the target WSGI application because the condition to remove it is missing.
- https://github.com/GrahamDumpleton/mod_wsgi/blob/4.9.2/src/server/mod_wsgi.c#L13940-L13941
- https://github.com/GrahamDumpleton/mod_wsgi/blob/4.9.2/src/server/mod_wsgi.c#L13940-L13941
- https://github.com/GrahamDumpleton/mod_wsgi/blob/4.9.2/src/server/mod_wsgi.c#L14046-L14082
- https://github.com/GrahamDumpleton/mod_wsgi/blob/4.9.2/src/server/mod_wsgi.c#L14046-L14082
- [debian-lts-announce] 20220915 [SECURITY] [DLA 3111-1] mod-wsgi security update
- [debian-lts-announce] 20220915 [SECURITY] [DLA 3111-1] mod-wsgi security update
- https://modwsgi.readthedocs.io/en/latest/release-notes/version-4.9.3.html
- https://modwsgi.readthedocs.io/en/latest/release-notes/version-4.9.3.html
Closed bugs
Удалить модуль Info-zip из-за проблем с кодировками
Closed vulnerabilities
BDU:2023-05649
Уязвимость программного средства реализации сетевой маршрутизации на Unix-подобных системах FRRouting, сетевой операционной системы Picos, операционной системы PAN-OS, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-08243
Уязвимость программного средства реализации сетевой маршрутизации на Unix-подобных системах FRRouting, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-08631
Уязвимость программного средства реализации сетевой маршрутизации на Unix-подобных системах FRRouting, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2023-38802
FRRouting FRR 7.5.1 through 9.0 and Pica8 PICOS 4.3.3.2 allow a remote attacker to cause a denial of service via a crafted BGP update with a corrupted attribute 23 (Tunnel Encapsulation).
- https://blog.benjojo.co.uk/post/bgp-path-attributes-grave-error-handling
- https://blog.benjojo.co.uk/post/bgp-path-attributes-grave-error-handling
- [debian-lts-announce] 20230919 [SECURITY] [DLA 3573-1] frr security update
- [debian-lts-announce] 20230919 [SECURITY] [DLA 3573-1] frr security update
- FEDORA-2023-ce436d56f8
- FEDORA-2023-ce436d56f8
- FEDORA-2023-514db5339e
- FEDORA-2023-514db5339e
- FEDORA-2023-61abba57d8
- FEDORA-2023-61abba57d8
- https://news.ycombinator.com/item?id=37305800
- https://news.ycombinator.com/item?id=37305800
- DSA-5495
- DSA-5495
Modified: 2024-11-21
CVE-2023-41358
An issue was discovered in FRRouting FRR through 9.0. bgpd/bgp_packet.c processes NLRIs if the attribute length is zero.
- https://github.com/FRRouting/frr/pull/14260
- https://github.com/FRRouting/frr/pull/14260
- [debian-lts-announce] 20230919 [SECURITY] [DLA 3573-1] frr security update
- [debian-lts-announce] 20230919 [SECURITY] [DLA 3573-1] frr security update
- FEDORA-2023-ce436d56f8
- FEDORA-2023-ce436d56f8
- FEDORA-2023-514db5339e
- FEDORA-2023-514db5339e
- FEDORA-2023-61abba57d8
- FEDORA-2023-61abba57d8
- DSA-5495
- DSA-5495
Modified: 2024-11-21
CVE-2023-41359
An issue was discovered in FRRouting FRR through 9.0. There is an out-of-bounds read in bgp_attr_aigp_valid in bgpd/bgp_attr.c because there is no check for the availability of two bytes during AIGP validation.
Modified: 2024-11-21
CVE-2023-41360
An issue was discovered in FRRouting FRR through 9.0. bgpd/bgp_packet.c can read the initial byte of the ORF header in an ahead-of-stream situation.
- https://github.com/FRRouting/frr/pull/14245
- https://github.com/FRRouting/frr/pull/14245
- [debian-lts-announce] 20230919 [SECURITY] [DLA 3573-1] frr security update
- [debian-lts-announce] 20230919 [SECURITY] [DLA 3573-1] frr security update
- FEDORA-2023-ce436d56f8
- FEDORA-2023-ce436d56f8
- FEDORA-2023-514db5339e
- FEDORA-2023-514db5339e
- FEDORA-2023-61abba57d8
- FEDORA-2023-61abba57d8
Modified: 2024-11-21
CVE-2023-41361
An issue was discovered in FRRouting FRR 9.0. bgpd/bgp_open.c does not check for an overly large length of the rcv software version.
Modified: 2024-11-21
CVE-2023-41909
An issue was discovered in FRRouting FRR through 9.0. bgp_nlri_parse_flowspec in bgpd/bgp_flowspec.c processes malformed requests with no attributes, leading to a NULL pointer dereference.
- https://github.com/FRRouting/frr/pull/13222/commits/cfd04dcb3e689754a72507d086ba3b9709fc5ed8
- https://github.com/FRRouting/frr/pull/13222/commits/cfd04dcb3e689754a72507d086ba3b9709fc5ed8
- [debian-lts-announce] 20230919 [SECURITY] [DLA 3573-1] frr security update
- [debian-lts-announce] 20230919 [SECURITY] [DLA 3573-1] frr security update
- FEDORA-2023-ce436d56f8
- FEDORA-2023-ce436d56f8
- FEDORA-2023-514db5339e
- FEDORA-2023-514db5339e
- FEDORA-2023-61abba57d8
- FEDORA-2023-61abba57d8
Modified: 2024-11-21
CVE-2023-46752
An issue was discovered in FRRouting FRR through 9.0.1. It mishandles malformed MP_REACH_NLRI data, leading to a crash.
- https://github.com/FRRouting/frr/pull/14645/commits/b08afc81c60607a4f736f418f2e3eb06087f1a35
- https://github.com/FRRouting/frr/pull/14645/commits/b08afc81c60607a4f736f418f2e3eb06087f1a35
- [debian-lts-announce] 20240428 [SECURITY] [DLA 3797-1] frr security update
- [debian-lts-announce] 20240428 [SECURITY] [DLA 3797-1] frr security update
Modified: 2024-11-21
CVE-2023-46753
An issue was discovered in FRRouting FRR through 9.0.1. A crash can occur for a crafted BGP UPDATE message without mandatory attributes, e.g., one with only an unknown transit attribute.
- https://github.com/FRRouting/frr/pull/14645/commits/d8482bf011cb2b173e85b65b4bf3d5061250cdb9
- https://github.com/FRRouting/frr/pull/14645/commits/d8482bf011cb2b173e85b65b4bf3d5061250cdb9
- [debian-lts-announce] 20240428 [SECURITY] [DLA 3797-1] frr security update
- [debian-lts-announce] 20240428 [SECURITY] [DLA 3797-1] frr security update
Modified: 2024-11-21
CVE-2023-47234
An issue was discovered in FRRouting FRR through 9.0.1. A crash can occur when processing a crafted BGP UPDATE message with a MP_UNREACH_NLRI attribute and additional NLRI data (that lacks mandatory path attributes).
- https://github.com/FRRouting/frr/pull/14716/commits/c37119df45bbf4ef713bc10475af2ee06e12f3bf
- https://github.com/FRRouting/frr/pull/14716/commits/c37119df45bbf4ef713bc10475af2ee06e12f3bf
- [debian-lts-announce] 20240428 [SECURITY] [DLA 3797-1] frr security update
- [debian-lts-announce] 20240428 [SECURITY] [DLA 3797-1] frr security update
Modified: 2024-11-21
CVE-2023-47235
An issue was discovered in FRRouting FRR through 9.0.1. A crash can occur when a malformed BGP UPDATE message with an EOR is processed, because the presence of EOR does not lead to a treat-as-withdraw outcome.
- https://github.com/FRRouting/frr/pull/14716/commits/6814f2e0138a6ea5e1f83bdd9085d9a77999900b
- https://github.com/FRRouting/frr/pull/14716/commits/6814f2e0138a6ea5e1f83bdd9085d9a77999900b
- [debian-lts-announce] 20240428 [SECURITY] [DLA 3797-1] frr security update
- [debian-lts-announce] 20240428 [SECURITY] [DLA 3797-1] frr security update