ALT-BU-2020-4029-1
Branch sisyphus update bulletin.
Closed bugs
openshot: собрать без blender на 32-битных платформах
Package alterator-datetime updated to version 4.6.0-alt2 for branch sisyphus in task 257884.
Closed bugs
4.6.0-alt1 вытягивает alterator-browser-qt5
Package alterator-net-domain updated to version 0.7.1-alt1 for branch sisyphus in task 257881.
Closed bugs
Имя домена должно содержать точку, но в документации указано, что точка не обязательна.
Closed vulnerabilities
BDU:2022-01462
Уязвимость библиотеки Polkit, связанная с неконтролируемым расодом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-4115
There is a flaw in polkit which can allow an unprivileged user to cause polkit to crash, due to process file descriptor exhaustion. The highest threat from this vulnerability is to availability. NOTE: Polkit process outage duration is tied to the failing process being reaped and a new one being spawned
- http://packetstormsecurity.com/files/172849/polkit-File-Descriptor-Exhaustion.html
- http://packetstormsecurity.com/files/172849/polkit-File-Descriptor-Exhaustion.html
- https://access.redhat.com/security/cve/cve-2021-4115
- https://access.redhat.com/security/cve/cve-2021-4115
- https://gitlab.com/redhat/centos-stream/rpms/polkit/-/merge_requests/6/diffs?commit_id=bf900df04dc390d389e59aa10942b0f2b15c531e
- https://gitlab.com/redhat/centos-stream/rpms/polkit/-/merge_requests/6/diffs?commit_id=bf900df04dc390d389e59aa10942b0f2b15c531e
- https://gitlab.freedesktop.org/polkit/polkit/-/issues/141
- https://gitlab.freedesktop.org/polkit/polkit/-/issues/141
- FEDORA-2022-5e6d5fe680
- FEDORA-2022-5e6d5fe680
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
Closed bugs
Не работают функции верстака Plot
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-24553
Go before 1.14.8 and 1.15.x before 1.15.1 allows XSS because text/html is the default for CGI/FCGI handlers that lack a Content-Type header.
- openSUSE-SU-2020:1584
- openSUSE-SU-2020:1584
- openSUSE-SU-2020:1587
- openSUSE-SU-2020:1587
- http://packetstormsecurity.com/files/159049/Go-CGI-FastCGI-Transport-Cross-Site-Scripting.html
- http://packetstormsecurity.com/files/159049/Go-CGI-FastCGI-Transport-Cross-Site-Scripting.html
- http://seclists.org/fulldisclosure/2020/Sep/5
- http://seclists.org/fulldisclosure/2020/Sep/5
- 20200902 [RT-SA-2020-004] Inconsistent Behavior of Go's CGI and FastCGI Transport May Lead to Cross-Site Scripting
- 20200902 [RT-SA-2020-004] Inconsistent Behavior of Go's CGI and FastCGI Transport May Lead to Cross-Site Scripting
- https://groups.google.com/forum/#%21topic/golang-announce/8wqlSbkLdPs
- https://groups.google.com/forum/#%21topic/golang-announce/8wqlSbkLdPs
- FEDORA-2020-741cfa13d0
- FEDORA-2020-741cfa13d0
- https://security.netapp.com/advisory/ntap-20200924-0003/
- https://security.netapp.com/advisory/ntap-20200924-0003/
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.oracle.com/security-alerts/cpuApr2021.html
- https://www.redteam-pentesting.de/advisories/rt-sa-2020-004
- https://www.redteam-pentesting.de/advisories/rt-sa-2020-004
Modified: 2024-11-21
CVE-2020-29510
The encoding/xml package in Go versions 1.15 and earlier does not correctly preserve the semantics of directives during tokenization round-trips, which allows an attacker to craft inputs that behave in conflicting ways during different stages of processing in affected downstream applications.
- https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-directives.md
- https://github.com/mattermost/xml-roundtrip-validator/blob/master/advisories/unstable-directives.md
- https://security.netapp.com/advisory/ntap-20210129-0006/
- https://security.netapp.com/advisory/ntap-20210129-0006/
Closed bugs
Failed to open '/var/log/garbd/garbd.log' for appending