ALT-BU-2025-13046-1
Branch c10f2 update bulletin.
Closed vulnerabilities
Modified: 2025-10-09
CVE-2025-7493
A privilege escalation flaw from host to domain administrator was found in FreeIPA. This vulnerability is similar to CVE-2025-4404, where it fails to validate the uniqueness of the krbCanonicalName. While the previously released version added validations for the admin@REALM credential, FreeIPA still does not validate the root@REALM canonical name, which can also be used as the realm administrator's name. This flaw allows an attacker to perform administrative tasks over the REALM, leading to access to sensitive data and sensitive data exfiltration.
- https://access.redhat.com/errata/RHSA-2025:17084
- https://access.redhat.com/errata/RHSA-2025:17085
- https://access.redhat.com/errata/RHSA-2025:17086
- https://access.redhat.com/errata/RHSA-2025:17087
- https://access.redhat.com/errata/RHSA-2025:17088
- https://access.redhat.com/errata/RHSA-2025:17129
- https://access.redhat.com/errata/RHSA-2025:17645
- https://access.redhat.com/errata/RHSA-2025:17646
- https://access.redhat.com/errata/RHSA-2025:17647
- https://access.redhat.com/errata/RHSA-2025:17648
- https://access.redhat.com/errata/RHSA-2025:17649
- https://access.redhat.com/security/cve/CVE-2025-7493
- https://bugzilla.redhat.com/show_bug.cgi?id=2389448
Package 389-ds-base updated to version 2.4.6-alt2 for branch c10f2 in task 396577.
Closed vulnerabilities
Modified: 2025-10-09
CVE-2025-7493
A privilege escalation flaw from host to domain administrator was found in FreeIPA. This vulnerability is similar to CVE-2025-4404, where it fails to validate the uniqueness of the krbCanonicalName. While the previously released version added validations for the admin@REALM credential, FreeIPA still does not validate the root@REALM canonical name, which can also be used as the realm administrator's name. This flaw allows an attacker to perform administrative tasks over the REALM, leading to access to sensitive data and sensitive data exfiltration.
- https://access.redhat.com/errata/RHSA-2025:17084
- https://access.redhat.com/errata/RHSA-2025:17085
- https://access.redhat.com/errata/RHSA-2025:17086
- https://access.redhat.com/errata/RHSA-2025:17087
- https://access.redhat.com/errata/RHSA-2025:17088
- https://access.redhat.com/errata/RHSA-2025:17129
- https://access.redhat.com/errata/RHSA-2025:17645
- https://access.redhat.com/errata/RHSA-2025:17646
- https://access.redhat.com/errata/RHSA-2025:17647
- https://access.redhat.com/errata/RHSA-2025:17648
- https://access.redhat.com/errata/RHSA-2025:17649
- https://access.redhat.com/security/cve/CVE-2025-7493
- https://bugzilla.redhat.com/show_bug.cgi?id=2389448
Closed vulnerabilities
BDU:2025-10924
Уязвимость функции elf_gc_sweep() компонента ld программного средства разработки GNU Binutils, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-10925
Уязвимость функции debug_type_samep() компонента objdump программного средства разработки GNU Binutils, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-10-03
CVE-2025-5244
A vulnerability was found in GNU Binutils up to 2.44. It has been rated as critical. Affected by this issue is the function elf_gc_sweep of the file bfd/elflink.c of the component ld. The manipulation leads to memory corruption. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 2.45 is able to address this issue. It is recommended to upgrade the affected component.
- https://sourceware.org/bugzilla/attachment.cgi?id=16010
- https://sourceware.org/bugzilla/show_bug.cgi?id=32858
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=d1458933830456e54223d9fc61f0d9b3a19256f5
- https://vuldb.com/?ctiid.310346
- https://vuldb.com/?id.310346
- https://vuldb.com/?submit.584634
- https://www.gnu.org/
Modified: 2025-10-03
CVE-2025-5245
A vulnerability classified as critical has been found in GNU Binutils up to 2.44. This affects the function debug_type_samep of the file /binutils/debug.c of the component objdump. The manipulation leads to memory corruption. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue.
- https://sourceware.org/bugzilla/attachment.cgi?id=16004
- https://sourceware.org/bugzilla/show_bug.cgi?id=32829
- https://sourceware.org/git/gitweb.cgi?p=binutils-gdb.git;h=6c3458a8b7ee7d39f070c7b2350851cb2110c65a
- https://vuldb.com/?ctiid.310347
- https://vuldb.com/?id.310347
- https://vuldb.com/?submit.584635
- https://www.gnu.org/
Closed vulnerabilities
BDU:2025-08956
Уязвимость функции ClassUtils.getClass() библиотеки Apache Commons Lang для языка программирования Java, позволяющая нарушителю вызывать отказ в обслуживании
Modified: 2025-07-28
CVE-2025-48924
Uncontrolled Recursion vulnerability in Apache Commons Lang. This issue affects Apache Commons Lang: Starting with commons-lang:commons-lang 2.0 to 2.6, and, from org.apache.commons:commons-lang3 3.0 before 3.18.0. The methods ClassUtils.getClass(...) can throw StackOverflowError on very long inputs. Because an Error is usually not handled by applications and libraries, a StackOverflowError could cause an application to stop. Users are recommended to upgrade to version 3.18.0, which fixes the issue.
Modified: 2025-08-06
CVE-2025-7962
In Jakarta Mail 2.0.2 it is possible to preform a SMTP Injection by utilizing the \r and \n UTF-8 characters to separate different messages.