ALT-BU-2024-4651-1
Branch c10f2 update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2024-2494
A flaw was found in the RPC library APIs of libvirt. The RPC server deserialization code allocates memory for arrays before the non-negative length check is performed by the C API entry points. Passing a negative length to the g_new0 function results in a crash due to the negative length being treated as a huge positive number. This flaw allows a local, unprivileged user to perform a denial of service attack by causing the libvirt daemon to crash.
- RHSA-2024:2560
- RHSA-2024:2560
- RHSA-2024:3253
- RHSA-2024:3253
- https://access.redhat.com/security/cve/CVE-2024-2494
- https://access.redhat.com/security/cve/CVE-2024-2494
- RHBZ#2270115
- RHBZ#2270115
- https://lists.debian.org/debian-lts-announce/2024/04/msg00000.html
- https://lists.libvirt.org/archives/list/devel@lists.libvirt.org/thread/BKRQXPLPC6B7FLHJXSBQYW7HNDEBW6RJ/
- https://lists.libvirt.org/archives/list/devel@lists.libvirt.org/thread/BKRQXPLPC6B7FLHJXSBQYW7HNDEBW6RJ/
- https://security.netapp.com/advisory/ntap-20240517-0009/
Closed vulnerabilities
Modified: 2024-11-21
CVE-2023-4399
Grafana is an open-source platform for monitoring and observability. In Grafana Enterprise, Request security is a deny list that allows admins to configure Grafana in a way so that the instance doesn’t call specific hosts. However, the restriction can be bypassed used punycode encoding of the characters in the request address.
Modified: 2024-11-21
CVE-2023-4822
Grafana is an open-source platform for monitoring and observability. The vulnerability impacts Grafana instances with several organizations, and allows a user with Organization Admin permissions in one organization to change the permissions associated with Organization Viewer, Organization Editor and Organization Admin roles in all organizations. It also allows an Organization Admin to assign or revoke any permissions that they have to any user globally. This means that any Organization Admin can elevate their own permissions in any organization that they are already a member of, or elevate or restrict the permissions of any other user. The vulnerability does not allow a user to become a member of an organization that they are not already a member of, or to add any other users to an organization that the current user is not a member of.
Package rpm-build-vm updated to version 1.65-alt3 for branch c10f2 in task 343045.
Closed bugs
"expected to fail" tests fail on unsupported architecture
Package openssl-gost-engine updated to version 1.1.0.3.0.255.ge3af41d.p1-alt5 for branch c10f2 in task 343045.
Closed bugs
control openssl-gost disabled не удаляет пустую строку в конфиге