ALT-BU-2018-3666-3
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2026-02-16
BDU:2019-01250
Уязвимость реализации протокола Netatalk, связанная с записью за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
Modified: 2026-02-13
CVE-2018-1160
Netatalk before 3.1.12 is vulnerable to an out of bounds write in dsi_opensess.c. This is due to lack of bounds checking on attacker controlled data. A remote unauthenticated attacker can leverage this vulnerability to achieve arbitrary code execution.
- http://netatalk.sourceforge.net/3.1/ReleaseNotes3.1.12.html
- http://packetstormsecurity.com/files/152440/QNAP-Netatalk-Authentication-Bypass.html
- http://www.securityfocus.com/bid/106301
- https://attachments.samba.org/attachment.cgi?id=14735
- https://github.com/tenable/poc/tree/master/netatalk/cve_2018_1160/
- https://www.debian.org/security/2018/dsa-4356
- https://www.exploit-db.com/exploits/46034/
- https://www.exploit-db.com/exploits/46048/
- https://www.exploit-db.com/exploits/46675/
- https://www.synology.com/security/advisory/Synology_SA_18_62
- https://www.tenable.com/security/research/tra-2018-48
- http://netatalk.sourceforge.net/3.1/ReleaseNotes3.1.12.html
- http://packetstormsecurity.com/files/152440/QNAP-Netatalk-Authentication-Bypass.html
- http://www.securityfocus.com/bid/106301
- https://attachments.samba.org/attachment.cgi?id=14735
- https://github.com/tenable/poc/tree/master/netatalk/cve_2018_1160/
- https://www.debian.org/security/2018/dsa-4356
- https://www.exploit-db.com/exploits/46034/
- https://www.exploit-db.com/exploits/46048/
- https://www.exploit-db.com/exploits/46675/
- https://www.synology.com/security/advisory/Synology_SA_18_62
- https://www.tenable.com/security/research/tra-2018-48
Package extreme-tuxracer updated to version 0.7.5-alt2 for branch sisyphus in task 218623.
Closed bugs
в пакете отсутствует desktop-файл
Package gnome-software updated to version 3.30.6-alt2 for branch sisyphus in task 218631.
Closed bugs
Отсутствие поддержки packagekit в gnome-software
Package python-module-lxml updated to version 4.2.5-alt1 for branch sisyphus in task 218580.
Closed vulnerabilities
Modified: 2023-11-21
BDU:2019-02732
Уязвимость компонента lxml/html/clean.py модуля lxml.html.clean библиотеки для обработки разметки XML и HTML Lxml, позволяющая нарушителю осуществлять межсайтовые сценарные атаки
Modified: 2025-12-18
CVE-2018-19787
An issue was discovered in lxml before 4.2.5. lxml/html/clean.py in the lxml.html.clean module does not remove javascript: URLs that use escaping, allowing a remote attacker to conduct XSS attacks, as demonstrated by "j a v a s c r i p t:" in Internet Explorer. This is a similar issue to CVE-2014-3146.
- https://github.com/lxml/lxml/commit/6be1d081b49c97cfd7b3fbd934a193b668629109
- https://lists.debian.org/debian-lts-announce/2018/12/msg00001.html
- https://lists.debian.org/debian-lts-announce/2020/11/msg00044.html
- https://usn.ubuntu.com/3841-1/
- https://usn.ubuntu.com/3841-2/
- https://github.com/lxml/lxml/commit/6be1d081b49c97cfd7b3fbd934a193b668629109
- https://lists.debian.org/debian-lts-announce/2018/12/msg00001.html
- https://lists.debian.org/debian-lts-announce/2020/11/msg00044.html
- https://usn.ubuntu.com/3841-1/
- https://usn.ubuntu.com/3841-2/
Modified: 2025-12-20
GHSA-xp26-p53h-6h2p
Improper Neutralization of Input During Web Page Generation in LXML
- https://nvd.nist.gov/vuln/detail/CVE-2018-19787
- https://github.com/lxml/lxml/commit/6be1d081b49c97cfd7b3fbd934a193b668629109
- https://github.com/advisories/GHSA-xp26-p53h-6h2p
- https://github.com/lxml/lxml
- https://github.com/pypa/advisory-database/tree/main/vulns/lxml/PYSEC-2018-12.yaml
- https://lists.debian.org/debian-lts-announce/2018/12/msg00001.html
- https://lists.debian.org/debian-lts-announce/2020/11/msg00044.html
- https://usn.ubuntu.com/3841-1
- https://usn.ubuntu.com/3841-2
