ALT-BU-2024-2622-2
Branch c10f2 update bulletin.
Package open-vm-tools updated to version 12.3.5-alt1 for branch c10f2 in task 340574.
Closed vulnerabilities
BDU:2023-07234
Уязвимость набора утилит VMware Tools для операционных систем Windows, связанная с недостатками процедуры авторизации, позволяющая нарушителю повысить свои привилегии
BDU:2024-09868
Уязвимость компонента mount.vmhgfs набора модулей для продуктов VMware Open-vm-tools, связанная с неверным определением символических ссылок перед доступом к файлу, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2009-1143
An issue was discovered in open-vm-tools 2009.03.18-154848. Local users can bypass intended access restrictions on mounting shares via a symlink attack that leverages a realpath race condition in mount.vmhgfs (aka hgfsmounter).
Modified: 2024-11-21
CVE-2011-1681
vmware-hgfsmounter in VMware Open Virtual Machine Tools (aka open-vm-tools) 8.4.2-261024 and earlier attempts to append to the /etc/mtab file without first checking whether resource limits would interfere, which allows local users to trigger corruption of this file via a process with a small RLIMIT_FSIZE value, a related issue to CVE-2011-1089.
- [oss-security] 20110304 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE
- [oss-security] 20110303 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE
- [oss-security] 20110304 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE
- [oss-security] 20110303 Suid mount helpers fail to anticipate RLIMIT_FSIZE
- [oss-security] 20110305 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE
- [oss-security] 20110305 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE
- [oss-security] 20110307 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE
- [oss-security] 20110314 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE
- [oss-security] 20110314 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE
- [oss-security] 20110314 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE
- [oss-security] 20110315 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE
- [oss-security] 20110322 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE
- [oss-security] 20110322 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE
- [oss-security] 20110331 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE
- [oss-security] 20110331 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE
- [oss-security] 20110401 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE
- 44904
- https://bugzilla.redhat.com/show_bug.cgi?id=688980
- vmware-vmwarehgfsmounter-sec-bypass(66699)
- openSUSE-SU-2011:0617
- [oss-security] 20110304 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE
- openSUSE-SU-2011:0617
- vmware-vmwarehgfsmounter-sec-bypass(66699)
- https://bugzilla.redhat.com/show_bug.cgi?id=688980
- 44904
- [oss-security] 20110401 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE
- [oss-security] 20110331 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE
- [oss-security] 20110331 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE
- [oss-security] 20110322 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE
- [oss-security] 20110322 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE
- [oss-security] 20110315 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE
- [oss-security] 20110314 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE
- [oss-security] 20110314 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE
- [oss-security] 20110314 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE
- [oss-security] 20110307 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE
- [oss-security] 20110305 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE
- [oss-security] 20110305 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE
- [oss-security] 20110303 Suid mount helpers fail to anticipate RLIMIT_FSIZE
- [oss-security] 20110304 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE
- [oss-security] 20110303 Re: Suid mount helpers fail to anticipate RLIMIT_FSIZE
Modified: 2025-03-06
CVE-2023-34058
VMware Tools contains a SAML token signature bypass vulnerability. A malicious actor that has been granted Guest Operation Privileges https://docs.vmware.com/en/VMware-vSphere/8.0/vsphere-security/GUID-6A952214-0E5E-4CCF-9D2A-90948FF643EC.html in a target virtual machine may be able to elevate their privileges if that target virtual machine has been assigned a more privileged Guest Alias https://vdc-download.vmware.com/vmwb-repository/dcr-public/d1902b0e-d479-46bf-8ac9-cee0e31e8ec0/07ce8dbd-db48-4261-9b8f-c6d3ad8ba472/vim.vm.guest.AliasManager.html .
- http://www.openwall.com/lists/oss-security/2023/10/27/1
- http://www.openwall.com/lists/oss-security/2023/10/27/1
- https://lists.debian.org/debian-lts-announce/2023/11/msg00002.html
- https://lists.debian.org/debian-lts-announce/2023/11/msg00002.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G7G77Z76CQPGUF7VHRA6O3UFCMPPR4O2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G7G77Z76CQPGUF7VHRA6O3UFCMPPR4O2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQUOFQL2SNNNMKROQ3TZQY4HEYMNOIBW/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQUOFQL2SNNNMKROQ3TZQY4HEYMNOIBW/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLTKVTRKQW2GD2274H3UOW6XU4E62GSK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLTKVTRKQW2GD2274H3UOW6XU4E62GSK/
- https://www.debian.org/security/2023/dsa-5543
- https://www.debian.org/security/2023/dsa-5543
- https://www.vmware.com/security/advisories/VMSA-2023-0024.html
- https://www.vmware.com/security/advisories/VMSA-2023-0024.html
Modified: 2025-03-06
CVE-2023-34059
open-vm-tools contains a file descriptor hijack vulnerability in the vmware-user-suid-wrapper. A malicious actor with non-root privileges may be able to hijack the /dev/uinput file descriptor allowing them to simulate user inputs.
- http://www.openwall.com/lists/oss-security/2023/10/27/2
- http://www.openwall.com/lists/oss-security/2023/10/27/2
- http://www.openwall.com/lists/oss-security/2023/10/27/3
- http://www.openwall.com/lists/oss-security/2023/10/27/3
- http://www.openwall.com/lists/oss-security/2023/11/26/1
- http://www.openwall.com/lists/oss-security/2023/11/26/1
- http://www.openwall.com/lists/oss-security/2023/11/27/1
- http://www.openwall.com/lists/oss-security/2023/11/27/1
- https://lists.debian.org/debian-lts-announce/2023/11/msg00002.html
- https://lists.debian.org/debian-lts-announce/2023/11/msg00002.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G7G77Z76CQPGUF7VHRA6O3UFCMPPR4O2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/G7G77Z76CQPGUF7VHRA6O3UFCMPPR4O2/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQUOFQL2SNNNMKROQ3TZQY4HEYMNOIBW/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MQUOFQL2SNNNMKROQ3TZQY4HEYMNOIBW/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLTKVTRKQW2GD2274H3UOW6XU4E62GSK/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/WLTKVTRKQW2GD2274H3UOW6XU4E62GSK/
- https://www.debian.org/security/2023/dsa-5543
- https://www.debian.org/security/2023/dsa-5543
- https://www.openwall.com/lists/oss-security/2023/10/27/3
- https://www.vmware.com/security/advisories/VMSA-2023-0024.html
- https://www.vmware.com/security/advisories/VMSA-2023-0024.html
Package python3-module-django updated to version 3.2.23-alt1 for branch c10f2 in task 340579.
Closed vulnerabilities
BDU:2023-08741
Уязвимость программной платформы для веб-приложений Django, связанная c неограниченным распределением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании (DoS)
Modified: 2024-11-21
CVE-2023-46695
An issue was discovered in Django 3.2 before 3.2.23, 4.1 before 4.1.13, and 4.2 before 4.2.7. The NFKC normalization is slow on Windows. As a consequence, django.contrib.auth.forms.UsernameField is subject to a potential DoS (denial of service) attack via certain inputs with a very large number of Unicode characters.
- https://docs.djangoproject.com/en/4.2/releases/security/
- https://docs.djangoproject.com/en/4.2/releases/security/
- https://groups.google.com/forum/#%21forum/django-announce
- https://groups.google.com/forum/#%21forum/django-announce
- https://security.netapp.com/advisory/ntap-20231214-0001/
- https://security.netapp.com/advisory/ntap-20231214-0001/
- https://www.djangoproject.com/weblog/2023/nov/01/security-releases/
- https://www.djangoproject.com/weblog/2023/nov/01/security-releases/
Closed vulnerabilities
BDU:2022-06389
Уязвимость системы межпроцессного взаимодействия D-Bus, связанная с достижимостью утверждения в отладочных сборках, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06391
Уязвимость системы межпроцессного взаимодействия D-Bus, связанная с ошибкой использования памяти после освобождения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06394
Уязвимость системы межпроцессного взаимодействия D-Bus, связанная с граничной ошибкой, вызванной недопустимым массивом элементов фиксированной длины, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2022-42010
An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash when receiving a message with certain invalid type signatures.
- https://gitlab.freedesktop.org/dbus/dbus/-/issues/418
- https://gitlab.freedesktop.org/dbus/dbus/-/issues/418
- FEDORA-2022-7a963a79d1
- FEDORA-2022-7a963a79d1
- FEDORA-2022-b0c2f2ab74
- FEDORA-2022-b0c2f2ab74
- FEDORA-2022-076544c8aa
- FEDORA-2022-076544c8aa
- GLSA-202305-08
- GLSA-202305-08
- https://www.openwall.com/lists/oss-security/2022/10/06/1
- https://www.openwall.com/lists/oss-security/2022/10/06/1
Modified: 2024-11-21
CVE-2022-42011
An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash when receiving a message where an array length is inconsistent with the size of the element type.
- https://gitlab.freedesktop.org/dbus/dbus/-/issues/413
- https://gitlab.freedesktop.org/dbus/dbus/-/issues/413
- FEDORA-2022-7a963a79d1
- FEDORA-2022-7a963a79d1
- FEDORA-2022-b0c2f2ab74
- FEDORA-2022-b0c2f2ab74
- FEDORA-2022-076544c8aa
- FEDORA-2022-076544c8aa
- GLSA-202305-08
- GLSA-202305-08
- https://www.openwall.com/lists/oss-security/2022/10/06/1
- https://www.openwall.com/lists/oss-security/2022/10/06/1
Modified: 2024-11-21
CVE-2022-42012
An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash by sending a message with attached file descriptors in an unexpected format.
- https://gitlab.freedesktop.org/dbus/dbus/-/issues/417
- https://gitlab.freedesktop.org/dbus/dbus/-/issues/417
- FEDORA-2022-7a963a79d1
- FEDORA-2022-7a963a79d1
- FEDORA-2022-b0c2f2ab74
- FEDORA-2022-b0c2f2ab74
- FEDORA-2022-076544c8aa
- FEDORA-2022-076544c8aa
- GLSA-202305-08
- GLSA-202305-08
- https://www.openwall.com/lists/oss-security/2022/10/06/1
- https://www.openwall.com/lists/oss-security/2022/10/06/1
Modified: 2024-11-21
CVE-2023-34969
D-Bus before 1.15.6 sometimes allows unprivileged users to crash dbus-daemon. If a privileged user with control over the dbus-daemon is using the org.freedesktop.DBus.Monitoring interface to monitor message bus traffic, then an unprivileged user with the ability to connect to the same dbus-daemon can cause a dbus-daemon crash under some circumstances via an unreplyable message. When done on the well-known system bus, this is a denial-of-service vulnerability. The fixed versions are 1.12.28, 1.14.8, and 1.15.6.
- https://gitlab.freedesktop.org/dbus/dbus/-/issues/457
- [debian-lts-announce] 20231023 [SECURITY] [DLA 3628-1] dbus security update
- FEDORA-2023-d22162d9ba
- https://security.netapp.com/advisory/ntap-20231208-0007/
- https://gitlab.freedesktop.org/dbus/dbus/-/issues/457
- https://security.netapp.com/advisory/ntap-20231208-0007/
- FEDORA-2023-d22162d9ba
- [debian-lts-announce] 20231023 [SECURITY] [DLA 3628-1] dbus security update
Closed bugs
зависимость на /proc
CVE-2023-34969
Package rabbitmq-c updated to version 0.13.0-alt2 for branch c10f2 in task 340768.
Closed vulnerabilities
Modified: 2025-03-30
CVE-2023-35789
An issue was discovered in the C AMQP client library (aka rabbitmq-c) through 0.13.0 for RabbitMQ. Credentials can only be entered on the command line (e.g., for amqp-publish or amqp-consume) and are thus visible to local attackers by listing a process and its arguments.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2023-50387
Certain DNSSEC aspects of the DNS protocol (in RFC 4033, 4034, 4035, 6840, and related RFCs) allow remote attackers to cause a denial of service (CPU consumption) via one or more DNSSEC responses, aka the "KeyTrap" issue. One of the concerns is that, when there is a zone with many DNSKEY and RRSIG records, the protocol specification implies that an algorithm must evaluate all combinations of DNSKEY and RRSIG records.
- [oss-security] 20240216 Re: Unbound: disclosure of CVE-2023-50387 and CVE-2023-50868 DNSSEC validation vulnerabilities
- [oss-security] 20240216 Re: Unbound: disclosure of CVE-2023-50387 and CVE-2023-50868 DNSSEC validation vulnerabilities
- [oss-security] 20240216 Re: Unbound: disclosure of CVE-2023-50387 and CVE-2023-50868 DNSSEC validation vulnerabilities
- [oss-security] 20240216 Re: Unbound: disclosure of CVE-2023-50387 and CVE-2023-50868 DNSSEC validation vulnerabilities
- https://access.redhat.com/security/cve/CVE-2023-50387
- https://access.redhat.com/security/cve/CVE-2023-50387
- https://bugzilla.suse.com/show_bug.cgi?id=1219823
- https://bugzilla.suse.com/show_bug.cgi?id=1219823
- https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html
- https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html
- https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1
- https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1
- https://kb.isc.org/docs/cve-2023-50387
- https://kb.isc.org/docs/cve-2023-50387
- [debian-lts-announce] 20240221 [SECURITY] [DLA 3736-1] unbound security update
- [debian-lts-announce] 20240221 [SECURITY] [DLA 3736-1] unbound security update
- [debian-lts-announce] 20240517 [SECURITY] [DLA 3816-1] bind9 security update
- [debian-lts-announce] 20240517 [SECURITY] [DLA 3816-1] bind9 security update
- FEDORA-2024-c967c7d287
- FEDORA-2024-c967c7d287
- FEDORA-2024-e24211eff0
- FEDORA-2024-e24211eff0
- FEDORA-2024-c36c448396
- FEDORA-2024-c36c448396
- FEDORA-2024-e00eceb11c
- FEDORA-2024-e00eceb11c
- FEDORA-2024-21310568fa
- FEDORA-2024-21310568fa
- FEDORA-2024-499b9be35f
- FEDORA-2024-499b9be35f
- FEDORA-2024-2e26eccfcb
- FEDORA-2024-2e26eccfcb
- FEDORA-2024-b0f9656a76
- FEDORA-2024-b0f9656a76
- FEDORA-2024-4e36df9dfd
- FEDORA-2024-4e36df9dfd
- FEDORA-2024-fae88b73eb
- FEDORA-2024-fae88b73eb
- https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html
- https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-50387
- https://msrc.microsoft.com/update-guide/vulnerability/CVE-2023-50387
- https://news.ycombinator.com/item?id=39367411
- https://news.ycombinator.com/item?id=39367411
- https://news.ycombinator.com/item?id=39372384
- https://news.ycombinator.com/item?id=39372384
- https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/
- https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/
- https://security.netapp.com/advisory/ntap-20240307-0007/
- https://security.netapp.com/advisory/ntap-20240307-0007/
- https://www.athene-center.de/aktuelles/key-trap
- https://www.athene-center.de/aktuelles/key-trap
- https://www.athene-center.de/fileadmin/content/PDF/Technical_Report_KeyTrap.pdf
- https://www.athene-center.de/fileadmin/content/PDF/Technical_Report_KeyTrap.pdf
- https://www.isc.org/blogs/2024-bind-security-release/
- https://www.isc.org/blogs/2024-bind-security-release/
- https://www.securityweek.com/keytrap-dns-attack-could-disable-large-parts-of-internet-researchers/
- https://www.securityweek.com/keytrap-dns-attack-could-disable-large-parts-of-internet-researchers/
- https://www.theregister.com/2024/02/13/dnssec_vulnerability_internet/
- https://www.theregister.com/2024/02/13/dnssec_vulnerability_internet/
Modified: 2024-11-21
CVE-2023-50868
The Closest Encloser Proof aspect of the DNS protocol (in RFC 5155 when RFC 9276 guidance is skipped) allows remote attackers to cause a denial of service (CPU consumption for SHA-1 computations) via DNSSEC responses in a random subdomain attack, aka the "NSEC3" issue. The RFC 5155 specification implies that an algorithm must perform thousands of iterations of a hash function in certain situations.
- [oss-security] 20240216 Re: Unbound: disclosure of CVE-2023-50387 and CVE-2023-50868 DNSSEC validation vulnerabilities
- [oss-security] 20240216 Re: Unbound: disclosure of CVE-2023-50387 and CVE-2023-50868 DNSSEC validation vulnerabilities
- [oss-security] 20240216 Re: Unbound: disclosure of CVE-2023-50387 and CVE-2023-50868 DNSSEC validation vulnerabilities
- [oss-security] 20240216 Re: Unbound: disclosure of CVE-2023-50387 and CVE-2023-50868 DNSSEC validation vulnerabilities
- https://access.redhat.com/security/cve/CVE-2023-50868
- https://access.redhat.com/security/cve/CVE-2023-50868
- https://bugzilla.suse.com/show_bug.cgi?id=1219826
- https://bugzilla.suse.com/show_bug.cgi?id=1219826
- https://datatracker.ietf.org/doc/html/rfc5155
- https://datatracker.ietf.org/doc/html/rfc5155
- https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html
- https://docs.powerdns.com/recursor/security-advisories/powerdns-advisory-2024-01.html
- https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1
- https://gitlab.nic.cz/knot/knot-resolver/-/releases/v5.7.1
- https://kb.isc.org/docs/cve-2023-50868
- https://kb.isc.org/docs/cve-2023-50868
- [debian-lts-announce] 20240221 [SECURITY] [DLA 3736-1] unbound security update
- [debian-lts-announce] 20240221 [SECURITY] [DLA 3736-1] unbound security update
- [debian-lts-announce] 20240517 [SECURITY] [DLA 3816-1] bind9 security update
- [debian-lts-announce] 20240517 [SECURITY] [DLA 3816-1] bind9 security update
- FEDORA-2024-c967c7d287
- FEDORA-2024-c967c7d287
- FEDORA-2024-e24211eff0
- FEDORA-2024-e24211eff0
- FEDORA-2024-c36c448396
- FEDORA-2024-c36c448396
- FEDORA-2024-e00eceb11c
- FEDORA-2024-e00eceb11c
- FEDORA-2024-21310568fa
- FEDORA-2024-21310568fa
- FEDORA-2024-499b9be35f
- FEDORA-2024-499b9be35f
- FEDORA-2024-2e26eccfcb
- FEDORA-2024-2e26eccfcb
- FEDORA-2024-b0f9656a76
- FEDORA-2024-b0f9656a76
- FEDORA-2024-4e36df9dfd
- FEDORA-2024-4e36df9dfd
- FEDORA-2024-fae88b73eb
- FEDORA-2024-fae88b73eb
- https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html
- https://lists.thekelleys.org.uk/pipermail/dnsmasq-discuss/2024q1/017430.html
- https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/
- https://nlnetlabs.nl/news/2024/Feb/13/unbound-1.19.1-released/
- https://security.netapp.com/advisory/ntap-20240307-0008/
- https://security.netapp.com/advisory/ntap-20240307-0008/
- https://www.isc.org/blogs/2024-bind-security-release/
- https://www.isc.org/blogs/2024-bind-security-release/
Closed bugs
Просьба обновить до версии 1.19.1.
Closed bugs
Из пакета пропал скрипт run.go, необходимый для запуска тестов
Closed vulnerabilities
BDU:2024-00480
Уязвимость функции sessionReadRecord файла ext/session/sqlite3session.c системы управления базами данных SQLite, позволяющая нарушителю оказать влияние на конфиденциальность, целостность и доступность
Modified: 2024-11-21
CVE-2023-7104
A vulnerability was found in SQLite SQLite3 up to 3.43.0 and classified as critical. This issue affects the function sessionReadRecord of the file ext/session/sqlite3session.c of the component make alltest Handler. The manipulation leads to heap-based buffer overflow. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-248999.
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/AYONA2XSNFMXLAW4IHLFI5UVV3QRNG5K/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/D6C2HN4T2S6GYNTAUXLH45LQZHK7QPHP/
- https://security.netapp.com/advisory/ntap-20240112-0008/
- https://security.netapp.com/advisory/ntap-20240112-0008/
- https://sqlite.org/forum/forumpost/5bcbf4571c
- https://sqlite.org/forum/forumpost/5bcbf4571c
- https://sqlite.org/src/info/0e4e7a05c4204b47
- https://sqlite.org/src/info/0e4e7a05c4204b47
- https://vuldb.com/?ctiid.248999
- https://vuldb.com/?ctiid.248999
- https://vuldb.com/?id.248999
- https://vuldb.com/?id.248999