ALT-BU-2021-4036-1
Branch sisyphus update bulletin.
Package python-module-dbus updated to version 1.2.16-alt2 for branch sisyphus in task 278667.
Closed bugs
python-module-dbus-devel тянет python-module-dbus-gobject
Closed bugs
flashrom FTBFS on aarch64
Closed vulnerabilities
BDU:2022-00715
Уязвимость пакета crypto/tls языка программирования Go, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-34558
The crypto/tls package of Go through 1.16.5 does not properly assert that the type of public key in an X.509 certificate matches the expected type when doing a RSA based key exchange, allowing a malicious TLS server to cause a TLS client to panic.
- https://golang.org/doc/devel/release#go1.16.minor
- https://golang.org/doc/devel/release#go1.16.minor
- https://groups.google.com/g/golang-announce
- https://groups.google.com/g/golang-announce
- https://groups.google.com/g/golang-announce/c/n9FxMelZGAQ
- https://groups.google.com/g/golang-announce/c/n9FxMelZGAQ
- FEDORA-2021-1bfb61f77c
- FEDORA-2021-1bfb61f77c
- FEDORA-2021-07e4d20196
- FEDORA-2021-07e4d20196
- FEDORA-2021-ffa749f7f7
- FEDORA-2021-ffa749f7f7
- FEDORA-2021-25c0011e78
- FEDORA-2021-25c0011e78
- FEDORA-2021-54f88bebd4
- FEDORA-2021-54f88bebd4
- FEDORA-2021-3a55403080
- FEDORA-2021-3a55403080
- FEDORA-2021-6ac9b98f9e
- FEDORA-2021-6ac9b98f9e
- FEDORA-2021-c35235c250
- FEDORA-2021-c35235c250
- FEDORA-2021-47d259d3cf
- FEDORA-2021-47d259d3cf
- GLSA-202208-02
- GLSA-202208-02
- https://security.netapp.com/advisory/ntap-20210813-0005/
- https://security.netapp.com/advisory/ntap-20210813-0005/
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
Closed bugs
Добавьте в пакет перевод jp2a.1
Package python-module-pycparser updated to version 2.20-alt2 for branch sisyphus in task 278697.
Closed bugs
Сломалась сборка python-module-pycparser
Closed bugs
libsratom FTBFS on aarch64 and ppc64le
Closed vulnerabilities
BDU:2021-03914
Уязвимость системы управления Moodle, связанная с непринятием мер по защите SQL запроса, позволяющая нарушителю выполнять произвольный код
BDU:2021-03915
Уязвимость системы управления Moodle, связанная с непринятием мер по защите SQL запроса, позволяющая нарушителю выполнять произвольный код
BDU:2021-03916
Уязвимость системы управления Moodle, связанная с неверным управлением генерацией кода, позволяющая нарушителю выполнить произвольный код
BDU:2021-03917
Уязвимость системы управления Moodle, связанная с неконтролируемой рекурсией, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-03918
Уязвимость системы управления Moodle, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю осуществить SSRF-атаку
BDU:2021-03919
Уязвимость системы управления Moodle, связанная с ошибками разграничения прав пользователей, позволяющая нарушителю обойти функции безопасности
BDU:2021-03920
Уязвимость системы управления Moodle, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю осуществлять межсайтовые сценарные атаки (XSS)
BDU:2021-03921
Уязвимость системы управления Moodle, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю осуществлять межсайтовые сценарные атаки (XSS)
BDU:2021-03923
Уязвимость системы управления Moodle, связанная с ошибками при обработке гипертекстовых ссылок, позволяющая нарушителю обойти функции безопасности
BDU:2021-03924
Уязвимость системы управления Moodle, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю осуществлять межсайтовые сценарные атаки (XSS)
BDU:2021-03925
Уязвимость системы управления Moodle, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить конфиденциальную информацию
BDU:2021-03926
Уязвимость системы управления Moodle, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю получить конфиденциальную информацию
BDU:2022-06406
Уязвимость виртуальной обучающей среды Moodle, существующая из-за непринятия мер по защите структуры веб-страницы, позволяющая нарушителю провести атаку межсайтового скриптинга (XSS)
Modified: 2024-11-21
CVE-2021-36392
In Moodle, an SQL injection risk was identified in the library fetching a user's enrolled courses.
Modified: 2024-11-21
CVE-2021-36393
In Moodle, an SQL injection risk was identified in the library fetching a user's recent courses.
Modified: 2025-03-06
CVE-2021-36394
In Moodle, a remote code execution risk was identified in the Shibboleth authentication plugin.
Modified: 2025-03-07
CVE-2021-36395
In Moodle, the file repository's URL parsing required additional recursion handling to mitigate the risk of recursion denial of service.
Modified: 2025-03-05
CVE-2021-36396
In Moodle, insufficient redirect handling made it possible to blindly bypass cURL blocked hosts/allowed ports restrictions, resulting in a blind SSRF risk.
Modified: 2025-03-07
CVE-2021-36397
In Moodle, insufficient capability checks meant message deletions were not limited to the current user.
Modified: 2025-03-07
CVE-2021-36398
In moodle, ID numbers displayed in the web service token list required additional sanitizing to prevent a stored XSS risk.
Modified: 2025-03-07
CVE-2021-36399
In Moodle, ID numbers displayed in the quiz override screens required additional sanitizing to prevent a stored XSS risk.
Modified: 2025-03-07
CVE-2021-36400
In Moodle, insufficient capability checks made it possible to remove other users' calendar URL subscriptions.
Modified: 2025-03-07
CVE-2021-36401
In Moodle, ID numbers exported in HTML data formats required additional sanitizing to prevent a local stored XSS risk.
Modified: 2025-03-07
CVE-2021-36402
In Moodle, Users' names required additional sanitizing in the account confirmation email, to prevent a self-registration phishing risk.
Modified: 2025-03-07
CVE-2021-36403
In Moodle, in some circumstances, email notifications of messages could have the link back to the original message hidden by HTML, which may pose a phishing risk.
Modified: 2024-11-21
CVE-2021-36568
In certain Moodle products after creating a course, it is possible to add in a arbitrary "Topic" a resource, in this case a "Database" with the type "Text" where its values "Field name" and "Field description" are vulnerable to Cross Site Scripting Stored(XSS). This affects Moodle 3.11 and Moodle 3.10.4 and Moodle 3.9.7.
- https://blog.hackingforce.com.br/en/cve-2021-36568/
- https://blog.hackingforce.com.br/en/cve-2021-36568/
- https://drive.google.com/drive/folders/1_fO4BKpmD3avGYHSzvIXWs5owqVYgB1s?usp=sharing
- https://drive.google.com/drive/folders/1_fO4BKpmD3avGYHSzvIXWs5owqVYgB1s?usp=sharing
- FEDORA-2022-50c091d963
- FEDORA-2022-50c091d963
- FEDORA-2022-1c77803b43
- FEDORA-2022-1c77803b43
Package packageinstall updated to version 1.3-alt1 for branch sisyphus in task 278749.
Closed bugs
Неправильная обработка вывода apt-get
Closed bugs
dev86 FTBFS on many architrctures
Package python3-module-cheroot updated to version 8.5.2-alt1 for branch sisyphus in task 278757.
Closed bugs
python3-module-cheroot FTBFS on aarch64, armh, and ppc64le
Package firefox-ublock_origin updated to version 1.36.2-alt1 for branch sisyphus in task 278688.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-36773
uBlock Origin before 1.36.2 and nMatrix before 4.4.9 support an arbitrary depth of parameter nesting for strict blocking, which allows crafted web sites to cause a denial of service (unbounded recursion that can trigger memory consumption and a loss of all blocking functionality).
- https://github.com/vtriolet/writings/blob/main/posts/2021/ublock_origin_and_umatrix_denial_of_service.adoc
- https://github.com/vtriolet/writings/blob/main/posts/2021/ublock_origin_and_umatrix_denial_of_service.adoc
- [debian-lts-announce] 20220629 [SECURITY] [DLA 3062-1] ublock-origin security update
- [debian-lts-announce] 20220629 [SECURITY] [DLA 3062-1] ublock-origin security update
- https://news.ycombinator.com/item?id=27833752
- https://news.ycombinator.com/item?id=27833752
Package irda-utils updated to version 0.9.18-alt3.qa2 for branch sisyphus in task 278764.
Closed bugs
irda-utils fails to rebuild properly
Package mate-file-manager-dropbox updated to version 1.24.0-alt2 for branch sisyphus in task 278767.
Closed bugs
Прошу починить сборку
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-37155
wolfSSL 4.6.x through 4.7.x before 4.8.0 does not produce a failure outcome when the serial number in an OCSP request differs from the serial number in the OCSP response.
Package docbook-to-man updated to version 2.0.0-alt1.qa2 for branch sisyphus in task 278770.
Closed bugs
docbook-to-man FTBFS on all architectures
Package python3-module-django updated to version 2.2.24-alt1 for branch sisyphus in task 278798.
Closed vulnerabilities
BDU:2021-05162
Уязвимость функций URLValidator, validate_ipv4_address, validate_ipv46_address программной платформы для веб-приложений Django, связанная с недостаточной проверкой поступающих запросов, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2021-05215
Уязвимость компонентов MultiPartParser, UploadedFile, FieldFile программной платформы для веб-приложений Django, связанная с отсутствием ограничений на загрузку файлов, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2021-05245
Уязвимость функции TemplateDetailView компонента django/contrib/admindocs программной платформы для веб-приложений Django, связанная с недостатками ограничения имени пути к каталогу, позволяющая нарушителю получить доступ к конфиденциальным данным
BDU:2021-05276
Уязвимость компонента MultiPartParser программной платформы для веб-приложений Django, связанная с недостатками ограничения имени пути к каталогу, позволяющая нарушителю получить доступ к конфиденциальным данным
Modified: 2024-11-21
CVE-2021-28658
In Django 2.2 before 2.2.20, 3.0 before 3.0.14, and 3.1 before 3.1.8, MultiPartParser allowed directory traversal via uploaded files with suitably crafted file names. Built-in upload handlers were not affected by this vulnerability.
- https://docs.djangoproject.com/en/3.1/releases/security/
- https://docs.djangoproject.com/en/3.1/releases/security/
- https://groups.google.com/g/django-announce/c/ePr5j-ngdPU
- https://groups.google.com/g/django-announce/c/ePr5j-ngdPU
- [debian-lts-announce] 20210409 [SECURITY] [DLA 2622-1] python-django security update
- [debian-lts-announce] 20210409 [SECURITY] [DLA 2622-1] python-django security update
- FEDORA-2021-01044b8a59
- FEDORA-2021-01044b8a59
- https://security.netapp.com/advisory/ntap-20210528-0001/
- https://security.netapp.com/advisory/ntap-20210528-0001/
- https://www.djangoproject.com/weblog/2021/apr/06/security-releases/
- https://www.djangoproject.com/weblog/2021/apr/06/security-releases/
Modified: 2024-11-21
CVE-2021-31542
In Django 2.2 before 2.2.21, 3.1 before 3.1.9, and 3.2 before 3.2.1, MultiPartParser, UploadedFile, and FieldFile allowed directory traversal via uploaded files with suitably crafted file names.
- http://www.openwall.com/lists/oss-security/2021/05/04/3
- http://www.openwall.com/lists/oss-security/2021/05/04/3
- https://docs.djangoproject.com/en/3.2/releases/security/
- https://docs.djangoproject.com/en/3.2/releases/security/
- https://github.com/django/django/commit/04ac1624bdc2fa737188401757cf95ced122d26d
- https://github.com/django/django/commit/04ac1624bdc2fa737188401757cf95ced122d26d
- https://github.com/django/django/commit/25d84d64122c15050a0ee739e859f22ddab5ac48
- https://github.com/django/django/commit/25d84d64122c15050a0ee739e859f22ddab5ac48
- https://github.com/django/django/commit/c98f446c188596d4ba6de71d1b77b4a6c5c2a007
- https://github.com/django/django/commit/c98f446c188596d4ba6de71d1b77b4a6c5c2a007
- https://groups.google.com/forum/#%21forum/django-announce
- https://groups.google.com/forum/#%21forum/django-announce
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2651-1] python-django security update
- [debian-lts-announce] 20210506 [SECURITY] [DLA 2651-1] python-django security update
- FEDORA-2022-e7fd530688
- FEDORA-2022-e7fd530688
- FEDORA-2021-01044b8a59
- FEDORA-2021-01044b8a59
- https://security.netapp.com/advisory/ntap-20210618-0001/
- https://security.netapp.com/advisory/ntap-20210618-0001/
- https://www.djangoproject.com/weblog/2021/may/04/security-releases/
- https://www.djangoproject.com/weblog/2021/may/04/security-releases/
Modified: 2024-11-21
CVE-2021-32052
In Django 2.2 before 2.2.22, 3.1 before 3.1.10, and 3.2 before 3.2.2 (with Python 3.9.5+), URLValidator does not prohibit newlines and tabs (unless the URLField form field is used). If an application uses values with newlines in an HTTP response, header injection can occur. Django itself is unaffected because HttpResponse prohibits newlines in HTTP headers.
- http://www.openwall.com/lists/oss-security/2021/05/06/1
- http://www.openwall.com/lists/oss-security/2021/05/06/1
- https://docs.djangoproject.com/en/3.2/releases/security/
- https://docs.djangoproject.com/en/3.2/releases/security/
- https://groups.google.com/forum/#%21forum/django-announce
- https://groups.google.com/forum/#%21forum/django-announce
- FEDORA-2021-01044b8a59
- FEDORA-2021-01044b8a59
- https://security.netapp.com/advisory/ntap-20210611-0002/
- https://security.netapp.com/advisory/ntap-20210611-0002/
- https://www.djangoproject.com/weblog/2021/may/06/security-releases/
- https://www.djangoproject.com/weblog/2021/may/06/security-releases/
Modified: 2024-11-21
CVE-2021-33203
Django before 2.2.24, 3.x before 3.1.12, and 3.2.x before 3.2.4 has a potential directory traversal via django.contrib.admindocs. Staff members could use the TemplateDetailView view to check the existence of arbitrary files. Additionally, if (and only if) the default admindocs templates have been customized by application developers to also show file contents, then not only the existence but also the file contents would have been exposed. In other words, there is directory traversal outside of the template root directories.
- https://docs.djangoproject.com/en/3.2/releases/security/
- https://docs.djangoproject.com/en/3.2/releases/security/
- https://groups.google.com/forum/#%21forum/django-announce
- https://groups.google.com/forum/#%21forum/django-announce
- FEDORA-2022-e7fd530688
- FEDORA-2022-e7fd530688
- https://security.netapp.com/advisory/ntap-20210727-0004/
- https://security.netapp.com/advisory/ntap-20210727-0004/
- https://www.djangoproject.com/weblog/2021/jun/02/security-releases/
- https://www.djangoproject.com/weblog/2021/jun/02/security-releases/
Modified: 2024-11-21
CVE-2021-33571
In Django 2.2 before 2.2.24, 3.x before 3.1.12, and 3.2 before 3.2.4, URLValidator, validate_ipv4_address, and validate_ipv46_address do not prohibit leading zero characters in octal literals. This may allow a bypass of access control that is based on IP addresses. (validate_ipv4_address and validate_ipv46_address are unaffected with Python 3.9.5+..) .
- https://docs.djangoproject.com/en/3.2/releases/security/
- https://docs.djangoproject.com/en/3.2/releases/security/
- https://github.com/django/django/commit/203d4ab9ebcd72fc4d6eb7398e66ed9e474e118e
- https://github.com/django/django/commit/203d4ab9ebcd72fc4d6eb7398e66ed9e474e118e
- https://github.com/django/django/commit/9f75e2e562fa0c0482f3dde6fc7399a9070b4a3d
- https://github.com/django/django/commit/9f75e2e562fa0c0482f3dde6fc7399a9070b4a3d
- https://github.com/django/django/commit/f27c38ab5d90f68c9dd60cabef248a570c0be8fc
- https://github.com/django/django/commit/f27c38ab5d90f68c9dd60cabef248a570c0be8fc
- https://groups.google.com/g/django-announce/c/sPyjSKMi8Eo
- https://groups.google.com/g/django-announce/c/sPyjSKMi8Eo
- FEDORA-2022-e7fd530688
- FEDORA-2022-e7fd530688
- https://security.netapp.com/advisory/ntap-20210727-0004/
- https://security.netapp.com/advisory/ntap-20210727-0004/
- https://www.djangoproject.com/weblog/2021/jun/02/security-releases/
- https://www.djangoproject.com/weblog/2021/jun/02/security-releases/