ALT-BU-2024-8815-1
Branch c10f1 update bulletin.
Package openstack-glance updated to version 26.0.0-alt0.1.c10f2 for branch c10f1 in task 349480.
Closed vulnerabilities
BDU:2023-00689
Уязвимость сервиса блочного хранения данных Openstack Cinder, связанная с использованием файлов и каталогов, доступных внешним сторонам, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2025-03-31
CVE-2022-47951
An issue was discovered in OpenStack Cinder before 19.1.2, 20.x before 20.0.2, and 21.0.0; Glance before 23.0.1, 24.x before 24.1.1, and 25.0.0; and Nova before 24.1.2, 25.x before 25.0.2, and 26.0.0. By supplying a specially created VMDK flat image that references a specific backing file path, an authenticated user may convince systems to return a copy of that file's contents from the server, resulting in unauthorized access to potentially sensitive data.
- https://launchpad.net/bugs/1996188
- https://launchpad.net/bugs/1996188
- [debian-lts-announce] 20230130 [SECURITY] [DLA 3300-1] glance security update
- [debian-lts-announce] 20230130 [SECURITY] [DLA 3300-1] glance security update
- [debian-lts-announce] 20230130 [SECURITY] [DLA 3301-1] cinder security update
- [debian-lts-announce] 20230130 [SECURITY] [DLA 3301-1] cinder security update
- [debian-lts-announce] 20230130 [SECURITY] [DLA 3302-1] nova security update
- [debian-lts-announce] 20230130 [SECURITY] [DLA 3302-1] nova security update
- https://security.openstack.org/ossa/OSSA-2023-002.html
- https://security.openstack.org/ossa/OSSA-2023-002.html
- DSA-5336
- DSA-5336
- DSA-5337
- DSA-5337
- DSA-5338
- DSA-5338
Closed vulnerabilities
BDU:2023-06800
Уязвимость системы обнаружения и предотвращения вторжений Suricata, связанная с неверным ограничением имени пути к каталогу с ограниченным доступом, позволяющая нарушителю записывать произвольные файлы в файловую систему
BDU:2023-06802
Уязвимость системы обнаружения и предотвращения вторжений Suricata, связанная с недостаточной проверкой входных данных, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2023-35852
In Suricata before 6.0.13 (when there is an adversary who controls an external source of rules), a dataset filename, that comes from a rule, may trigger absolute or relative directory traversal, and lead to write access to a local filesystem. This is addressed in 6.0.13 by requiring allow-absolute-filenames and allow-write (in the datasets rules configuration section) if an installation requires traversal/writing in this situation.
- https://github.com/OISF/suricata/commit/735f5aa9ca3b28cfacc7a443f93a44387fbacf17
- https://github.com/OISF/suricata/commit/aee1523b4591430ebed1ded0bb95508e6717a335
- https://github.com/OISF/suricata/compare/suricata-6.0.12...suricata-6.0.13
- https://www.stamus-networks.com/stamus-labs
- https://github.com/OISF/suricata/commit/735f5aa9ca3b28cfacc7a443f93a44387fbacf17
- https://www.stamus-networks.com/stamus-labs
- https://github.com/OISF/suricata/compare/suricata-6.0.12...suricata-6.0.13
- https://github.com/OISF/suricata/commit/aee1523b4591430ebed1ded0bb95508e6717a335
Modified: 2024-12-11
CVE-2023-35853
In Suricata before 6.0.13, an adversary who controls an external source of Lua rules may be able to execute Lua code. This is addressed in 6.0.13 by disabling Lua unless allow-rules is true in the security lua configuration section.
- https://github.com/OISF/suricata/commit/b95bbcc66db526ffcc880eb439dbe8abc87a81da
- https://github.com/OISF/suricata/commit/b95bbcc66db526ffcc880eb439dbe8abc87a81da
- https://github.com/OISF/suricata/compare/suricata-6.0.12...suricata-6.0.13
- https://github.com/OISF/suricata/compare/suricata-6.0.12...suricata-6.0.13
- https://www.stamus-networks.com/stamus-labs
- https://www.stamus-networks.com/stamus-labs