ALT-BU-2025-3769-1
Branch c9f2 update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-26566
A Denial of Service condition in Motion-Project Motion 3.2 through 4.3.1 allows remote unauthenticated users to cause a webu.c segmentation fault and kill the main process via a crafted HTTP request.
- https://github.com/Motion-Project/motion/issues/1227#issuecomment-715927776
- https://github.com/Motion-Project/motion/issues/1227#issuecomment-715927776
- https://github.com/Motion-Project/motion/releases
- https://github.com/Motion-Project/motion/releases
- https://motion-project.github.io/index.html
- https://motion-project.github.io/index.html
- GLSA-202208-18
- GLSA-202208-18
Closed bugs
/etc/motion/motion.conf в spec-файле без noreplace
Package fluent-bit updated to version 3.2.7-alt1.2 for branch c9f2 in task 376270.
Closed vulnerabilities
BDU:2025-02023
Уязвимость плагина Prometheus Remote Write инструмента для сбора и обработки логов Fluent Bit, связанная с разыменованием нулевого указателя, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-02-19
CVE-2024-50608
An issue was discovered in Fluent Bit 3.1.9. When the Prometheus Remote Write input plugin is running and listening on an IP address and port, one can send a packet with Content-Length: 0 and it crashes the server. Improper handling of the case when Content-Length is 0 allows a user (with access to the endpoint) to perform a remote Denial of service attack. The crash happens because of a NULL pointer dereference when 0 (from the Content-Length) is passed to the function cfl_sds_len, which in turn tries to cast a NULL pointer into struct cfl_sds. This is related to process_payload_metrics_ng() at prom_rw_prot.c.
Modified: 2025-02-19
CVE-2024-50609
An issue was discovered in Fluent Bit 3.1.9. When the OpenTelemetry input plugin is running and listening on an IP address and port, one can send a packet with Content-Length: 0 and it crashes the server. Improper handling of the case when Content-Length is 0 allows a user (with access to the endpoint) to perform a remote Denial of service attack. The crash happens because of a NULL pointer dereference when 0 (from the Content-Length) is passed to the function cfl_sds_len, which in turn tries to cast a NULL pointer into struct cfl_sds. This is related to process_payload_traces_proto_ng() at opentelemetry_prot.c.
Closed bugs
носит с собой копию c-ares