ALT-BU-2025-5975-1
Branch p10_e2k update bulletin.
Closed vulnerabilities
BDU:2025-01433
Уязвимость текстового редактора vim, связанная с переполнением буфера в динамической памяти, позволяющая нарушителю выполнить произвольный код
Modified: 2025-03-14
CVE-2025-22134
When switching to other buffers using the :all command and visual mode still being active, this may cause a heap-buffer overflow, because Vim does not properly end visual mode and therefore may try to access beyond the end of a line in a buffer. In Patch 9.1.1003 Vim will correctly reset the visual mode before opening other windows and buffers and therefore fix this bug. In addition it does verify that it won't try to access a position if the position is greater than the corresponding buffer line. Impact is medium since the user must have switched on visual mode when executing the :all ex command. The Vim project would like to thank github user gandalf4a for reporting this issue. The issue has been fixed as of Vim patch v9.1.1003
Closed bugs
Непрописанный файловый конфликт с пакетом vim-plugin-nim
Closed vulnerabilities
BDU:2025-00856
Уязвимость функций ss_net_snmp_disk_io() и ss_net_snmp_disk_bytes() программного средства мониторинга сети Cacti, позволяющая нарушителю выполнить произвольный код
BDU:2025-00969
Уязвимость функции build_rule_item_filter() сценария api_automation.php программного средства мониторинга сети Cacti, позволяющая нарушителю выполнить произвольный код
BDU:2025-00974
Уязвимость функции создания графа или шаблона графа программного средства мониторинга сети Cacti, позволяющая нарушителю выполнить произвольный код
BDU:2025-00976
Уязвимость функции get_discovery_results() программного средства мониторинга сети Cacti, позволяющая нарушителю выполнить произвольный код
BDU:2025-00977
Уязвимость сценария host_templates.php программного средства мониторинга сети Cacti, позволяющая нарушителю выполнить произвольный код
BDU:2025-01037
Уязвимость веб-интерфейса программного средства мониторинга сети Cacti, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2025-02172
Уязвимость функции шаблона в host_templates.php программного средства мониторинга сети Cacti, позволяющая нарушителю получить доступ к конфиденциальным данным
Modified: 2025-03-04
CVE-2024-45598
Cacti is an open source performance and fault management framework. Prior to 1.2.29, an administrator can change the `Poller Standard Error Log Path` parameter in either Installation Step 5 or in Configuration->Settings->Paths tab to a local file inside the server. Then simply going to Logs tab and selecting the name of the local file will show its content on the web UI. This vulnerability is fixed in 1.2.29.
Modified: 2025-03-04
CVE-2024-54145
Cacti is an open source performance and fault management framework. Cacti has a SQL injection vulnerability in the get_discovery_results function of automation_devices.php using the network parameter. This vulnerability is fixed in 1.2.29.
Modified: 2025-03-04
CVE-2024-54146
Cacti is an open source performance and fault management framework. Cacti has a SQL injection vulnerability in the template function of host_templates.php using the graph_template parameter. This vulnerability is fixed in 1.2.29.
Modified: 2025-03-04
CVE-2025-22604
Cacti is an open source performance and fault management framework. Due to a flaw in multi-line SNMP result parser, authenticated users can inject malformed OIDs in the response. When processed by ss_net_snmp_disk_io() or ss_net_snmp_disk_bytes(), a part of each OID will be used as a key in an array that is used as part of a system command, causing a command execution vulnerability. This vulnerability is fixed in 1.2.29.
Modified: 2025-04-18
CVE-2025-24367
Cacti is an open source performance and fault management framework. An authenticated Cacti user can abuse graph creation and graph template functionality to create arbitrary PHP scripts in the web root of the application, leading to remote code execution on the server. This vulnerability is fixed in 1.2.29.
Modified: 2025-04-18
CVE-2025-24368
Cacti is an open source performance and fault management framework. Some of the data stored in automation_tree_rules.php is not thoroughly checked and is used to concatenate the SQL statement in build_rule_item_filter() function from lib/api_automation.php, resulting in SQL injection. This vulnerability is fixed in 1.2.29.
CVE-2025-26520
Cacti through 1.2.29 allows SQL injection in the template function in host_templates.php via the graph_template parameter. NOTE: this issue exists because of an incomplete fix for CVE-2024-54146.
Closed vulnerabilities
BDU:2020-01329
Уязвимость утилиты архивирования Сpio, связанная с ошибками при проверке заголовка TAR-файла, позволяющая нарушителю повысить свои привилегии
BDU:2021-05090
Уязвимость компонента dstring.c пакета cpio операционной системы Debian GNU/Linux, позволяющая нарушителю выполнить произвольный код через созданный файл
BDU:2024-06679
Уязвимость двоичного архиватора cpio, связанная с неправильным ограничением имени пути к ограниченному каталогу, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-14866
In all versions of cpio before 2.13 does not properly validate input files when generating TAR archives. When cpio is used to create TAR archives from paths an attacker can write to, the resulting archive may contain files with permissions the attacker did not have or in paths he did not have access to. Extracting those archives from a high-privilege user without carefully reviewing them may lead to the compromise of the system.
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14866
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14866
- https://lists.debian.org/debian-lts-announce/2023/06/msg00007.html
- https://lists.debian.org/debian-lts-announce/2023/06/msg00007.html
- https://lists.gnu.org/archive/html/bug-cpio/2019-08/msg00003.html
- https://lists.gnu.org/archive/html/bug-cpio/2019-08/msg00003.html
- https://lists.gnu.org/archive/html/bug-cpio/2019-11/msg00000.html
- https://lists.gnu.org/archive/html/bug-cpio/2019-11/msg00000.html
Modified: 2024-11-21
CVE-2021-38185
GNU cpio through 2.13 allows attackers to execute arbitrary code via a crafted pattern file, because of a dstring.c ds_fgetstr integer overflow that triggers an out-of-bounds heap write. NOTE: it is unclear whether there are common cases where the pattern file, associated with the -E option, is untrusted data.
- https://git.savannah.gnu.org/cgit/cpio.git/commit/?id=dd96882877721703e19272fe25034560b794061b
- https://git.savannah.gnu.org/cgit/cpio.git/commit/?id=dd96882877721703e19272fe25034560b794061b
- https://github.com/fangqyi/cpiopwn
- https://github.com/fangqyi/cpiopwn
- [debian-lts-announce] 20230604 [SECURITY] [DLA 3445-1] cpio security update
- [debian-lts-announce] 20230604 [SECURITY] [DLA 3445-1] cpio security update
- https://lists.gnu.org/archive/html/bug-cpio/2021-08/msg00000.html
- https://lists.gnu.org/archive/html/bug-cpio/2021-08/msg00000.html
- https://lists.gnu.org/archive/html/bug-cpio/2021-08/msg00002.html
- https://lists.gnu.org/archive/html/bug-cpio/2021-08/msg00002.html
Modified: 2025-05-08
CVE-2023-7207
Debian's cpio contains a path traversal vulnerability. This issue was introduced by reverting CVE-2015-1197 patches which had caused a regression in --no-absolute-filenames. Upstream has since provided a proper fix to --no-absolute-filenames.
- http://www.openwall.com/lists/oss-security/2024/01/05/1
- http://www.openwall.com/lists/oss-security/2024/01/05/1
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059163
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1059163
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7207
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-7207
- https://git.savannah.gnu.org/cgit/cpio.git/commit/?id=376d663340a9dc91c91a5849e5713f07571c1628
- https://git.savannah.gnu.org/cgit/cpio.git/commit/?id=376d663340a9dc91c91a5849e5713f07571c1628
- https://www.openwall.com/lists/oss-security/2023/12/21/8
- https://www.openwall.com/lists/oss-security/2023/12/21/8