ALT-BU-2024-4710-1
Branch sisyphus_e2k update bulletin.
Package vnstat updated to version 2.12-alt1 for branch sisyphus_e2k.
Closed bugs
Ошибки при установке пакета vnstat-server
Package libfcgi updated to version 2.4.2-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2012-6687
FastCGI (aka fcgi and libfcgi) 2.4.0 allows remote attackers to cause a denial of service (segmentation fault and crash) via a large number of connections.
- http://advisories.mageia.org/MGASA-2015-0184.html
- http://advisories.mageia.org/MGASA-2015-0184.html
- [oss-security] 20150206 CVE request for denial-of-service vulnerability in fcgi
- [oss-security] 20150206 CVE request for denial-of-service vulnerability in fcgi
- [oss-security] 20150207 Re: CVE request for denial-of-service vulnerability in fcgi
- [oss-security] 20150207 Re: CVE request for denial-of-service vulnerability in fcgi
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681591
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=681591
- https://bugs.launchpad.net/ubuntu/+source/libfcgi/+bug/933417
- https://bugs.launchpad.net/ubuntu/+source/libfcgi/+bug/933417
- https://bugzilla.redhat.com/show_bug.cgi?id=1189958
- https://bugzilla.redhat.com/show_bug.cgi?id=1189958
- libfcgi-connections-dos(100696)
- libfcgi-connections-dos(100696)
Package curl updated to version 8.7.1-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2024-2004
When a protocol selection parameter option disables all protocols without adding any then the default set of protocols would remain in the allowed set due to an error in the logic for removing protocols. The below command would perform a request to curl.se with a plaintext protocol which has been explicitly disabled. curl --proto -all,-http http://curl.se The flaw is only present if the set of selected protocols disables the entire set of available protocols, in itself a command with no practical use and therefore unlikely to be encountered in real situations. The curl security team has thus assessed this to be low severity bug.
- http://seclists.org/fulldisclosure/2024/Jul/18
- http://seclists.org/fulldisclosure/2024/Jul/18
- http://seclists.org/fulldisclosure/2024/Jul/19
- http://seclists.org/fulldisclosure/2024/Jul/19
- http://seclists.org/fulldisclosure/2024/Jul/20
- http://seclists.org/fulldisclosure/2024/Jul/20
- http://www.openwall.com/lists/oss-security/2024/03/27/1
- http://www.openwall.com/lists/oss-security/2024/03/27/1
- www
- www
- json
- json
- issue
- issue
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D44YLAUFJU6BZ4XFG2FYV7SBKXB5IZ6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D44YLAUFJU6BZ4XFG2FYV7SBKXB5IZ6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMD6UYKCCRCYETWQZUJ65ZRFULT6SHLI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMD6UYKCCRCYETWQZUJ65ZRFULT6SHLI/
- https://security.netapp.com/advisory/ntap-20240524-0006/
- https://security.netapp.com/advisory/ntap-20240524-0006/
- https://support.apple.com/kb/HT214118
- https://support.apple.com/kb/HT214118
- https://support.apple.com/kb/HT214119
- https://support.apple.com/kb/HT214119
- https://support.apple.com/kb/HT214120
- https://support.apple.com/kb/HT214120
Modified: 2024-11-21
CVE-2024-2398
When an application tells libcurl it wants to allow HTTP/2 server push, and the amount of received headers for the push surpasses the maximum allowed limit (1000), libcurl aborts the server push. When aborting, libcurl inadvertently does not free all the previously allocated headers and instead leaks the memory. Further, this error condition fails silently and is therefore not easily detected by an application.
- http://seclists.org/fulldisclosure/2024/Jul/18
- http://seclists.org/fulldisclosure/2024/Jul/18
- http://seclists.org/fulldisclosure/2024/Jul/19
- http://seclists.org/fulldisclosure/2024/Jul/19
- http://seclists.org/fulldisclosure/2024/Jul/20
- http://seclists.org/fulldisclosure/2024/Jul/20
- http://www.openwall.com/lists/oss-security/2024/03/27/3
- http://www.openwall.com/lists/oss-security/2024/03/27/3
- www
- www
- json
- json
- issue
- issue
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D44YLAUFJU6BZ4XFG2FYV7SBKXB5IZ6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2D44YLAUFJU6BZ4XFG2FYV7SBKXB5IZ6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMD6UYKCCRCYETWQZUJ65ZRFULT6SHLI/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GMD6UYKCCRCYETWQZUJ65ZRFULT6SHLI/
- https://security.netapp.com/advisory/ntap-20240503-0009/
- https://security.netapp.com/advisory/ntap-20240503-0009/
- https://support.apple.com/kb/HT214118
- https://support.apple.com/kb/HT214118
- https://support.apple.com/kb/HT214119
- https://support.apple.com/kb/HT214119
- https://support.apple.com/kb/HT214120
- https://support.apple.com/kb/HT214120
Package gnutls30 updated to version 3.8.4-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
Modified: 2024-11-22
CVE-2024-28834
A flaw was found in GnuTLS. The Minerva attack is a cryptographic vulnerability that exploits deterministic behavior in systems like GnuTLS, leading to side-channel leaks. In specific scenarios, such as when using the GNUTLS_PRIVKEY_FLAG_REPRODUCIBLE flag, it can result in a noticeable step in nonce size from 513 to 512 bits, exposing a potential timing side-channel.
- http://www.openwall.com/lists/oss-security/2024/03/22/1
- http://www.openwall.com/lists/oss-security/2024/03/22/2
- RHSA-2024:1784
- RHSA-2024:1784
- RHSA-2024:1879
- RHSA-2024:1879
- RHSA-2024:1997
- RHSA-2024:1997
- RHSA-2024:2044
- RHSA-2024:2044
- RHSA-2024:2570
- RHSA-2024:2570
- RHSA-2024:2889
- RHSA-2024:2889
- https://access.redhat.com/security/cve/CVE-2024-28834
- https://access.redhat.com/security/cve/CVE-2024-28834
- RHBZ#2269228
- RHBZ#2269228
- https://lists.gnupg.org/pipermail/gnutls-help/2024-March/004845.html
- https://lists.gnupg.org/pipermail/gnutls-help/2024-March/004845.html
- https://minerva.crocs.fi.muni.cz/
- https://minerva.crocs.fi.muni.cz/
- https://people.redhat.com/~hkario/marvin/
- https://security.netapp.com/advisory/ntap-20240524-0004/
Modified: 2024-11-22
CVE-2024-28835
A flaw has been discovered in GnuTLS where an application crash can be induced when attempting to verify a specially crafted .pem bundle using the "certtool --verify-chain" command.
- http://www.openwall.com/lists/oss-security/2024/03/22/1
- http://www.openwall.com/lists/oss-security/2024/03/22/2
- RHSA-2024:1879
- RHSA-2024:1879
- RHSA-2024:2570
- RHSA-2024:2570
- RHSA-2024:2889
- RHSA-2024:2889
- https://access.redhat.com/security/cve/CVE-2024-28835
- https://access.redhat.com/security/cve/CVE-2024-28835
- RHBZ#2269084
- RHBZ#2269084
- https://lists.gnupg.org/pipermail/gnutls-help/2024-March/004845.html
- https://lists.gnupg.org/pipermail/gnutls-help/2024-March/004845.html
- https://security.netapp.com/advisory/ntap-20241122-0009/
Package openvpn updated to version 2.6.10-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2023-7235
The OpenVPN GUI installer before version 2.6.9 did not set the proper access control restrictions to the installation directory of OpenVPN binaries when using a non-standard installation path, which allows an attacker to replace binaries to run arbitrary executables.
Modified: 2024-11-21
CVE-2024-24974
The interactive service in OpenVPN 2.6.9 and earlier allows the OpenVPN service pipe to be accessed remotely, which allows a remote attacker to interact with the privileged OpenVPN interactive service.
- https://community.openvpn.net/openvpn/wiki/CVE-2024-24974
- https://community.openvpn.net/openvpn/wiki/CVE-2024-24974
- https://openvpn.net/security-advisory/ovpnx-vulnerability-cve-2024-27903-cve-2024-27459-cve-2024-24974/
- https://openvpn.net/security-advisory/ovpnx-vulnerability-cve-2024-27903-cve-2024-27459-cve-2024-24974/
- https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07534.html
- https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07534.html
Modified: 2024-11-21
CVE-2024-27459
The interactive service in OpenVPN 2.6.9 and earlier allows an attacker to send data causing a stack overflow which can be used to execute arbitrary code with more privileges.
- https://community.openvpn.net/openvpn/wiki/CVE-2024-27459
- https://community.openvpn.net/openvpn/wiki/CVE-2024-27459
- https://openvpn.net/security-advisory/ovpnx-vulnerability-cve-2024-27903-cve-2024-27459-cve-2024-24974/
- https://openvpn.net/security-advisory/ovpnx-vulnerability-cve-2024-27903-cve-2024-27459-cve-2024-24974/
- https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07534.html
- https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07534.html
Modified: 2024-11-21
CVE-2024-27903
OpenVPN plug-ins on Windows with OpenVPN 2.6.9 and earlier could be loaded from any directory, which allows an attacker to load an arbitrary plug-in which can be used to interact with the privileged OpenVPN interactive service.
- https://community.openvpn.net/openvpn/wiki/CVE-2024-27903
- https://community.openvpn.net/openvpn/wiki/CVE-2024-27903
- https://openvpn.net/security-advisory/ovpnx-vulnerability-cve-2024-27903-cve-2024-27459-cve-2024-24974/
- https://openvpn.net/security-advisory/ovpnx-vulnerability-cve-2024-27903-cve-2024-27459-cve-2024-24974/
- https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07534.html
- https://www.mail-archive.com/openvpn-users@lists.sourceforge.net/msg07534.html