ALT-BU-2021-4126-1
Branch sisyphus update bulletin.
Closed bugs
Не запускается
Package qt5-webkit updated to version 5.212.0-alt23 for branch sisyphus in task 283022.
Closed bugs
Erroneous use of %remove_optflags
Closed bugs
Изменить зависимость python-module-pychm -> python3-module-pychm
Closed bugs
ansible зависит от /usr/bin/pip
Closed bugs
gtk-doc требует python >= 2.7?
Closed vulnerabilities
BDU:2022-02263
Уязвимость инструмента мониторинга Glances, связанная с неверным ограничением XML-ссылок на внешние объекты, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-23418
The package glances before 3.2.1 are vulnerable to XML External Entity (XXE) Injection via the use of Fault to parse untrusted XML data, which is known to be vulnerable to XML attacks.
- https://github.com/nicolargo/glances/commit/4b87e979afdc06d98ed1b48da31e69eaa3a9fb94
- https://github.com/nicolargo/glances/commit/4b87e979afdc06d98ed1b48da31e69eaa3a9fb94
- https://github.com/nicolargo/glances/commit/85d5a6b4af31fcf785d5a61086cbbd166b40b07a
- https://github.com/nicolargo/glances/commit/85d5a6b4af31fcf785d5a61086cbbd166b40b07a
- https://github.com/nicolargo/glances/commit/9d6051be4a42f692392049fdbfc85d5dfa458b32
- https://github.com/nicolargo/glances/commit/9d6051be4a42f692392049fdbfc85d5dfa458b32
- https://github.com/nicolargo/glances/issues/1025
- https://github.com/nicolargo/glances/issues/1025
- https://snyk.io/vuln/SNYK-PYTHON-GLANCES-1311807
- https://snyk.io/vuln/SNYK-PYTHON-GLANCES-1311807
Closed vulnerabilities
BDU:2022-05943
Уязвимость компонента parse.c библиотеки DNS LDNS, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2017-1000231
A double-free vulnerability in parse.c in ldns 1.7.0 have unspecified impact and attack vectors.
- openSUSE-SU-2020:0438
- openSUSE-SU-2020:0438
- [debian-lts-announce] 20171121 [SECURITY] [DLA 1182-1] ldns security update
- [debian-lts-announce] 20171121 [SECURITY] [DLA 1182-1] ldns security update
- https://www.nlnetlabs.nl/bugs-script/show_bug.cgi?id=1256
- https://www.nlnetlabs.nl/bugs-script/show_bug.cgi?id=1256
Modified: 2024-11-21
CVE-2017-1000232
A double-free vulnerability in str2host.c in ldns 1.7.0 have unspecified impact and attack vectors.
Closed bugs
Вынести модуль dracut network-manager в отдельный пакет
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-37601
muc.lib.lua in Prosody 0.11.0 through 0.11.9 allows remote attackers to obtain sensitive information (list of admins, members, owners, and banned entities of a Multi-User chat room) in some common configurations.
- [oss-security] 20210728 Re: Prosody XMPP server advisory 2021-07-22 (Remote Information Disclosure) (CVE-2021-37601)
- [oss-security] 20210728 Re: Prosody XMPP server advisory 2021-07-22 (Remote Information Disclosure) (CVE-2021-37601)
- FEDORA-2021-fe9513e089
- FEDORA-2021-fe9513e089
- FEDORA-2021-1d574ae400
- FEDORA-2021-1d574ae400
- https://prosody.im/
- https://prosody.im/
- https://prosody.im/security/advisory_20210722/
- https://prosody.im/security/advisory_20210722/
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-32813
Traefik is an HTTP reverse proxy and load balancer. Prior to version 2.4.13, there exists a potential header vulnerability in Traefik's handling of the Connection header. Active exploitation of this issue is unlikely, as it requires that a removed header would lead to a privilege escalation, however, the Traefik team has addressed this issue to prevent any potential abuse. If one has a chain of Traefik middlewares, and one of them sets a request header, then sending a request with a certain Connection header will cause it to be removed before the request is sent. In this case, the backend does not see the request header. A patch is available in version 2.4.13. There are no known workarounds aside from upgrading.
- https://github.com/traefik/traefik/pull/8319/commits/cbaf86a93014a969b8accf39301932c17d0d73f9
- https://github.com/traefik/traefik/pull/8319/commits/cbaf86a93014a969b8accf39301932c17d0d73f9
- https://github.com/traefik/traefik/releases/tag/v2.4.13
- https://github.com/traefik/traefik/releases/tag/v2.4.13
- https://github.com/traefik/traefik/security/advisories/GHSA-m697-4v8f-55qg
- https://github.com/traefik/traefik/security/advisories/GHSA-m697-4v8f-55qg