ALT-BU-2017-3528-3
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2025-04-20
CVE-2016-10253
An issue was discovered in Erlang/OTP 18.x. Erlang's generation of compiled regular expressions is vulnerable to a heap overflow. Regular expressions using a malformed extpattern can indirectly specify an offset that is used as an array index. This ordinal permits arbitrary regions within the erts_alloc arena to be both read and written to.
Package rabbitmq-server updated to version 3.6.14-alt4 for branch sisyphus in task 191930.
Closed vulnerabilities
Modified: 2025-04-12
CVE-2016-9877
An issue was discovered in Pivotal RabbitMQ 3.x before 3.5.8 and 3.6.x before 3.6.6 and RabbitMQ for PCF 1.5.x before 1.5.20, 1.6.x before 1.6.12, and 1.7.x before 1.7.7. MQTT (MQ Telemetry Transport) connection authentication with a username/password pair succeeds if an existing username is provided but the password is omitted from the connection request. Connections that use TLS with a client-provided certificate are not affected.
- http://www.debian.org/security/2017/dsa-3761
- http://www.securityfocus.com/bid/95065
- https://pivotal.io/security/cve-2016-9877
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03880en_us
- http://www.debian.org/security/2017/dsa-3761
- http://www.securityfocus.com/bid/95065
- https://pivotal.io/security/cve-2016-9877
- https://support.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbst03880en_us
Package make-initrd updated to version 2.0.6-alt1 for branch sisyphus in task 195601.
Closed bugs
Не запрашивает пароль для раздела
Package python-module-notebook updated to version 5.2.2-alt1 for branch sisyphus in task 195577.
Closed vulnerabilities
Modified: 2025-04-12
CVE-2015-6938
Cross-site scripting (XSS) vulnerability in the file browser in notebook/notebookapp.py in IPython Notebook before 3.2.2 and Jupyter Notebook 4.0.x before 4.0.5 allows remote attackers to inject arbitrary web script or HTML via a folder name. NOTE: this was originally reported as a cross-site request forgery (CSRF) vulnerability, but this may be inaccurate.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/166460.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/166471.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167670.html
- http://lists.opensuse.org/opensuse-updates/2015-10/msg00016.html
- http://seclists.org/oss-sec/2015/q3/474
- http://seclists.org/oss-sec/2015/q3/544
- https://bugzilla.redhat.com/show_bug.cgi?id=1259405
- https://github.com/ipython/ipython/commit/3ab41641cf6fce3860c73d5cf4645aa12e1e5892
- https://github.com/jupyter/notebook/commit/35f32dd2da804d108a3a3585b69ec3295b2677ed
- https://github.com/jupyter/notebook/commit/dd9876381f0ef09873d8c5f6f2063269172331e3
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/166460.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/166471.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167670.html
- http://lists.opensuse.org/opensuse-updates/2015-10/msg00016.html
- http://seclists.org/oss-sec/2015/q3/474
- http://seclists.org/oss-sec/2015/q3/544
- https://bugzilla.redhat.com/show_bug.cgi?id=1259405
- https://github.com/ipython/ipython/commit/3ab41641cf6fce3860c73d5cf4645aa12e1e5892
- https://github.com/jupyter/notebook/commit/35f32dd2da804d108a3a3585b69ec3295b2677ed
- https://github.com/jupyter/notebook/commit/dd9876381f0ef09873d8c5f6f2063269172331e3
Modified: 2025-04-12
CVE-2015-7337
The editor in IPython Notebook before 3.2.2 and Jupyter Notebook 4.0.x before 4.0.5 allows remote attackers to execute arbitrary JavaScript code via a crafted file, which triggers a redirect to files/, related to MIME types.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167670.html
- http://seclists.org/oss-sec/2015/q3/558
- http://seclists.org/oss-sec/2015/q3/634
- https://bugzilla.redhat.com/show_bug.cgi?id=1264067
- https://github.com/ipython/ipython/commit/0a8096adf165e2465550bd5893d7e352544e5967
- https://github.com/jupyter/notebook/commit/9e63dd89b603dfbe3a7e774d8a962ee0fa30c0b5
- https://security.gentoo.org/glsa/201512-02
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167670.html
- http://seclists.org/oss-sec/2015/q3/558
- http://seclists.org/oss-sec/2015/q3/634
- https://bugzilla.redhat.com/show_bug.cgi?id=1264067
- https://github.com/ipython/ipython/commit/0a8096adf165e2465550bd5893d7e352544e5967
- https://github.com/jupyter/notebook/commit/9e63dd89b603dfbe3a7e774d8a962ee0fa30c0b5
- https://security.gentoo.org/glsa/201512-02
Modified: 2024-09-23
GHSA-4vwq-x64q-j4cj
Improper Neutralization of Input During Web Page Generation in Jupyter Notebook
- https://nvd.nist.gov/vuln/detail/CVE-2015-6938
- https://github.com/ipython/ipython/commit/3ab41641cf6fce3860c73d5cf4645aa12e1e5892
- https://github.com/jupyter/notebook/commit/35f32dd2da804d108a3a3585b69ec3295b2677ed
- https://github.com/jupyter/notebook/commit/dd9876381f0ef09873d8c5f6f2063269172331e3
- https://bugzilla.redhat.com/show_bug.cgi?id=1259405
- https://github.com/advisories/GHSA-4vwq-x64q-j4cj
- https://github.com/pypa/advisory-database/tree/main/vulns/ipython/PYSEC-2015-24.yaml
- https://github.com/pypa/advisory-database/tree/main/vulns/notebook/PYSEC-2015-26.yaml
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/166460.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/166471.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167670.html
- http://lists.opensuse.org/opensuse-updates/2015-10/msg00016.html
- http://seclists.org/oss-sec/2015/q3/474
- http://seclists.org/oss-sec/2015/q3/544
Modified: 2024-09-21
GHSA-92mr-v722-f48m
Improper Input Validation in Jupyter Notebook
- https://nvd.nist.gov/vuln/detail/CVE-2015-7337
- https://github.com/ipython/ipython/commit/0a8096adf165e2465550bd5893d7e352544e5967
- https://github.com/jupyter/notebook/commit/9e63dd89b603dfbe3a7e774d8a962ee0fa30c0b5
- https://bugzilla.redhat.com/show_bug.cgi?id=1264067
- https://github.com/advisories/GHSA-92mr-v722-f48m
- https://github.com/pypa/advisory-database/tree/main/vulns/ipython/PYSEC-2015-25.yaml
- https://github.com/pypa/advisory-database/tree/main/vulns/notebook/PYSEC-2015-27.yaml
- https://security.gentoo.org/glsa/201512-02
- http://lists.fedoraproject.org/pipermail/package-announce/2015-September/167670.html
- http://seclists.org/oss-sec/2015/q3/558
- http://seclists.org/oss-sec/2015/q3/634
