ALT-BU-2025-6008-2
Branch p11 update bulletin.
Package kubernetes1.30 updated to version 1.30.10-alt1 for branch p11 in task 378611.
Closed vulnerabilities
Modified: 2025-06-09
BDU:2025-00672
Уязвимость утилиты kubelet программного средства управления кластерами виртуальных машин Kubernetes для операционных систем Windows, позволяющая нарушителю выполнить произвольные команды
Modified: 2025-06-20
BDU:2025-06596
Уязвимость утилиты kubelet программного средства управления кластерами виртуальных машин Kubernetes, позволяющая нарушителю вызвать отказ в облуживании
Modified: 2026-04-15
CVE-2024-9042
This CVE affects only Windows worker nodes. Your worker node is vulnerable to this issue if it is running one of the affected versions listed below.
Modified: 2026-04-15
CVE-2025-0426
A security issue was discovered in Kubernetes where a large number of container checkpoint requests made to the unauthenticated kubelet read-only HTTP endpoint may cause a Node Denial of Service by filling the Node's disk.
Modified: 2025-12-20
GHSA-jgfp-53c3-624w
Node Denial of Service via kubelet Checkpoint API
- https://nvd.nist.gov/vuln/detail/CVE-2025-0426
- https://github.com/kubernetes/kubernetes/issues/130016
- https://github.com/advisories/GHSA-jgfp-53c3-624w
- https://github.com/kubernetes/kubernetes
- https://groups.google.com/g/kubernetes-security-announce/c/KiODfu8i6w8
- http://www.openwall.com/lists/oss-security/2025/02/13/1
Modified: 2025-03-14
GHSA-vv39-3w5q-974q
Kubernetes allows Command Injection affecting Windows nodes via nodes/*/logs/query API
- https://nvd.nist.gov/vuln/detail/CVE-2024-9042
- https://github.com/kubernetes/kubernetes/issues/129654
- https://github.com/kubernetes/kubernetes/commit/45f4ccc2153bbb782253704cbe24c05e22b5d60c
- https://github.com/kubernetes/kubernetes/commit/5fe148234f8ab1184f26069c4f7bef6c37efe347
- https://github.com/kubernetes/kubernetes/commit/75c83a6871dc030675288c6d63c275a43c2f0d55
- https://github.com/kubernetes/kubernetes/commit/fb0187c2bf7061258bb89891edb1237261eb7abc
- https://github.com/kubernetes/kubernetes
- https://groups.google.com/g/kubernetes-security-announce/c/9C3vn6aCSVg
- http://www.openwall.com/lists/oss-security/2025/01/16/1
Package kubernetes1.31 updated to version 1.31.6-alt1 for branch p11 in task 378611.
Closed vulnerabilities
Modified: 2025-06-09
BDU:2025-00672
Уязвимость утилиты kubelet программного средства управления кластерами виртуальных машин Kubernetes для операционных систем Windows, позволяющая нарушителю выполнить произвольные команды
Modified: 2025-06-20
BDU:2025-06596
Уязвимость утилиты kubelet программного средства управления кластерами виртуальных машин Kubernetes, позволяющая нарушителю вызвать отказ в облуживании
Modified: 2026-04-15
CVE-2024-9042
This CVE affects only Windows worker nodes. Your worker node is vulnerable to this issue if it is running one of the affected versions listed below.
Modified: 2026-04-15
CVE-2025-0426
A security issue was discovered in Kubernetes where a large number of container checkpoint requests made to the unauthenticated kubelet read-only HTTP endpoint may cause a Node Denial of Service by filling the Node's disk.
Modified: 2025-12-20
GHSA-jgfp-53c3-624w
Node Denial of Service via kubelet Checkpoint API
- https://nvd.nist.gov/vuln/detail/CVE-2025-0426
- https://github.com/kubernetes/kubernetes/issues/130016
- https://github.com/advisories/GHSA-jgfp-53c3-624w
- https://github.com/kubernetes/kubernetes
- https://groups.google.com/g/kubernetes-security-announce/c/KiODfu8i6w8
- http://www.openwall.com/lists/oss-security/2025/02/13/1
Modified: 2025-03-14
GHSA-vv39-3w5q-974q
Kubernetes allows Command Injection affecting Windows nodes via nodes/*/logs/query API
- https://nvd.nist.gov/vuln/detail/CVE-2024-9042
- https://github.com/kubernetes/kubernetes/issues/129654
- https://github.com/kubernetes/kubernetes/commit/45f4ccc2153bbb782253704cbe24c05e22b5d60c
- https://github.com/kubernetes/kubernetes/commit/5fe148234f8ab1184f26069c4f7bef6c37efe347
- https://github.com/kubernetes/kubernetes/commit/75c83a6871dc030675288c6d63c275a43c2f0d55
- https://github.com/kubernetes/kubernetes/commit/fb0187c2bf7061258bb89891edb1237261eb7abc
- https://github.com/kubernetes/kubernetes
- https://groups.google.com/g/kubernetes-security-announce/c/9C3vn6aCSVg
- http://www.openwall.com/lists/oss-security/2025/01/16/1
Package kubernetes1.29 updated to version 1.29.14-alt1 for branch p11 in task 378611.
Closed vulnerabilities
Modified: 2025-06-09
BDU:2025-00672
Уязвимость утилиты kubelet программного средства управления кластерами виртуальных машин Kubernetes для операционных систем Windows, позволяющая нарушителю выполнить произвольные команды
Modified: 2025-06-20
BDU:2025-06596
Уязвимость утилиты kubelet программного средства управления кластерами виртуальных машин Kubernetes, позволяющая нарушителю вызвать отказ в облуживании
Modified: 2026-04-15
CVE-2024-9042
This CVE affects only Windows worker nodes. Your worker node is vulnerable to this issue if it is running one of the affected versions listed below.
Modified: 2026-04-15
CVE-2025-0426
A security issue was discovered in Kubernetes where a large number of container checkpoint requests made to the unauthenticated kubelet read-only HTTP endpoint may cause a Node Denial of Service by filling the Node's disk.
Modified: 2025-12-20
GHSA-jgfp-53c3-624w
Node Denial of Service via kubelet Checkpoint API
- https://nvd.nist.gov/vuln/detail/CVE-2025-0426
- https://github.com/kubernetes/kubernetes/issues/130016
- https://github.com/advisories/GHSA-jgfp-53c3-624w
- https://github.com/kubernetes/kubernetes
- https://groups.google.com/g/kubernetes-security-announce/c/KiODfu8i6w8
- http://www.openwall.com/lists/oss-security/2025/02/13/1
Modified: 2025-03-14
GHSA-vv39-3w5q-974q
Kubernetes allows Command Injection affecting Windows nodes via nodes/*/logs/query API
- https://nvd.nist.gov/vuln/detail/CVE-2024-9042
- https://github.com/kubernetes/kubernetes/issues/129654
- https://github.com/kubernetes/kubernetes/commit/45f4ccc2153bbb782253704cbe24c05e22b5d60c
- https://github.com/kubernetes/kubernetes/commit/5fe148234f8ab1184f26069c4f7bef6c37efe347
- https://github.com/kubernetes/kubernetes/commit/75c83a6871dc030675288c6d63c275a43c2f0d55
- https://github.com/kubernetes/kubernetes/commit/fb0187c2bf7061258bb89891edb1237261eb7abc
- https://github.com/kubernetes/kubernetes
- https://groups.google.com/g/kubernetes-security-announce/c/9C3vn6aCSVg
- http://www.openwall.com/lists/oss-security/2025/01/16/1
Closed bugs
Отсутствуют драйвера баз данных
Closed bugs
Невозможно установить audit на систему без systemd
Closed bugs
Нарушение унаследования прав на сетевых ресурсах при использовании опции cifsacl
"[Errno 2] No such file or directory: '/etc/auto.master.gpupdate.d'" при выполнении gpupdate после настройки LAPS
Closed vulnerabilities
Modified: 2026-02-16
BDU:2025-05632
Уязвимость сервера универсальной системы мониторинга Zabbix, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-12-26
BDU:2025-05633
Уязвимость компонента API универсальной системы мониторинга Zabbix, позволяющая нарушителю выполнить произвольные команды
Modified: 2026-02-16
BDU:2025-05634
Уязвимость веб-интейрфеса универсальной системы мониторинга Zabbix, позволяющая нарушителю провести атаку межсайтового скриптинга
Modified: 2026-02-16
BDU:2025-05635
Уязвимость компонента API универсальной системы мониторинга Zabbix, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2026-02-16
BDU:2025-07164
Уязвимость сервера универсальной системы мониторинга Zabbix, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Modified: 2025-10-08
CVE-2024-36465
A low privilege (regular) Zabbix user with API access can use SQL injection vulnerability in include/classes/api/CApiService.php to execute arbitrary SQL commands via the groupBy parameter.
Modified: 2025-11-03
CVE-2024-36469
Execution time for an unsuccessful login differs when using a non-existing username compared to using an existing one.
Modified: 2025-11-03
CVE-2024-42325
Zabbix API user.get returns all users that share common group with the calling user. This includes media and other information, such as login attempts, etc.
Modified: 2025-11-03
CVE-2024-45699
The endpoint /zabbix.php?action=export.valuemaps suffers from a Cross-Site Scripting vulnerability via the backurl parameter. This is caused by the reflection of user-supplied data without appropriate HTML escaping or output encoding. As a result, a JavaScript payload may be injected into the above endpoint causing it to be executed within the context of the victim's browser.
Modified: 2025-11-03
CVE-2024-45700
Zabbix server is vulnerable to a DoS vulnerability due to uncontrolled resource exhaustion. An attacker can send specially crafted requests to the server, which will cause the server to allocate an excessive amount of memory and perform CPU-intensive decompression operations, ultimately leading to a service crash.
