ALT-BU-2025-6008-1
Branch p11 update bulletin.
Package kubernetes1.30 updated to version 1.30.10-alt1 for branch p11 in task 378611.
Closed vulnerabilities
BDU:2025-00672
Уязвимость утилиты kubelet программного средства управления кластерами виртуальных машин Kubernetes для операционных систем Windows, позволяющая нарушителю выполнить произвольные команды
CVE-2024-9042
This CVE affects only Windows worker nodes. Your worker node is vulnerable to this issue if it is running one of the affected versions listed below.
Modified: 2025-02-13
CVE-2025-0426
A security issue was discovered in Kubernetes where a large number of container checkpoint requests made to the unauthenticated kubelet read-only HTTP endpoint may cause a Node Denial of Service by filling the Node's disk.
Package kubernetes1.31 updated to version 1.31.6-alt1 for branch p11 in task 378611.
Closed vulnerabilities
BDU:2025-00672
Уязвимость утилиты kubelet программного средства управления кластерами виртуальных машин Kubernetes для операционных систем Windows, позволяющая нарушителю выполнить произвольные команды
CVE-2024-9042
This CVE affects only Windows worker nodes. Your worker node is vulnerable to this issue if it is running one of the affected versions listed below.
Modified: 2025-02-13
CVE-2025-0426
A security issue was discovered in Kubernetes where a large number of container checkpoint requests made to the unauthenticated kubelet read-only HTTP endpoint may cause a Node Denial of Service by filling the Node's disk.
Package kubernetes1.29 updated to version 1.29.14-alt1 for branch p11 in task 378611.
Closed vulnerabilities
BDU:2025-00672
Уязвимость утилиты kubelet программного средства управления кластерами виртуальных машин Kubernetes для операционных систем Windows, позволяющая нарушителю выполнить произвольные команды
CVE-2024-9042
This CVE affects only Windows worker nodes. Your worker node is vulnerable to this issue if it is running one of the affected versions listed below.
Modified: 2025-02-13
CVE-2025-0426
A security issue was discovered in Kubernetes where a large number of container checkpoint requests made to the unauthenticated kubelet read-only HTTP endpoint may cause a Node Denial of Service by filling the Node's disk.
Closed bugs
Отсутствуют драйвера баз данных
Closed bugs
Невозможно установить audit на систему без systemd
Closed bugs
Нарушение унаследования прав на сетевых ресурсах при использовании опции cifsacl
"[Errno 2] No such file or directory: '/etc/auto.master.gpupdate.d'" при выполнении gpupdate после настройки LAPS
Closed vulnerabilities
Modified: 2025-04-02
CVE-2024-36465
A low privilege (regular) Zabbix user with API access can use SQL injection vulnerability in include/classes/api/CApiService.php to execute arbitrary SQL commands via the groupBy parameter.
Modified: 2025-04-02
CVE-2024-36469
Execution time for an unsuccessful login differs when using a non-existing username compared to using an existing one.
Modified: 2025-04-02
CVE-2024-42325
Zabbix API user.get returns all users that share common group with the calling user. This includes media and other information, such as login attempts, etc.
Modified: 2025-04-02
CVE-2024-45699
The endpoint /zabbix.php?action=export.valuemaps suffers from a Cross-Site Scripting vulnerability via the backurl parameter. This is caused by the reflection of user-supplied data without appropriate HTML escaping or output encoding. As a result, a JavaScript payload may be injected into the above endpoint causing it to be executed within the context of the victim's browser.
Modified: 2025-04-02
CVE-2024-45700
Zabbix server is vulnerable to a DoS vulnerability due to uncontrolled resource exhaustion. An attacker can send specially crafted requests to the server, which will cause the server to allocate an excessive amount of memory and perform CPU-intensive decompression operations, ultimately leading to a service crash.