ALT-BU-2021-4351-3
Branch p10 update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-40330
git_connect_git in connect.c in Git before 2.30.1 allows a repository path to contain a newline character, which may result in unexpected cross-protocol requests, as demonstrated by the git://localhost:1234/%0d%0a%0d%0aGET%20/%20HTTP/1.1 substring.
- https://github.com/git/git/commit/a02ea577174ab8ed18f847cf1693f213e0b9c473
- https://github.com/git/git/compare/v2.30.0...v2.30.1
- https://lists.debian.org/debian-lts-announce/2022/10/msg00014.html
- https://github.com/git/git/commit/a02ea577174ab8ed18f847cf1693f213e0b9c473
- https://github.com/git/git/compare/v2.30.0...v2.30.1
- https://lists.debian.org/debian-lts-announce/2022/10/msg00014.html
Closed bugs
fvwm: add /usr/share/xsessions/ desktop (WM 2.0 policy)
Closed vulnerabilities
BDU:2023-01664
Уязвимость языка программирования Erlang, связанная с ошибками процедуры подтверждения подлинности сертификата, позволяющая нарушителю получить доступ к конфиденциальным данным
Modified: 2024-11-21
CVE-2016-1000107
inets in Erlang possibly 22.1 and earlier follows RFC 3875 section 4.1.18 and therefore does not protect applications from the presence of untrusted client data in the HTTP_PROXY environment variable, which might allow remote attackers to redirect an application's outbound HTTP traffic to an arbitrary proxy server via a crafted Proxy header in an HTTP request, aka an "httpoxy" issue.
- http://www.openwall.com/lists/oss-security/2016/07/18/6
- https://bugs.erlang.org/browse/ERL-198
- https://httpoxy.org/
- https://security-tracker.debian.org/tracker/CVE-2016-1000107
- http://www.openwall.com/lists/oss-security/2016/07/18/6
- https://bugs.erlang.org/browse/ERL-198
- https://httpoxy.org/
- https://security-tracker.debian.org/tracker/CVE-2016-1000107
Modified: 2024-11-21
CVE-2020-35733
An issue was discovered in Erlang/OTP before 23.2.2. The ssl application 10.2 accepts and trusts an invalid X.509 certificate chain to a trusted root Certification Authority.
- https://erlang.org/pipermail/erlang-questions/2021-January/100357.html
- https://github.com/erlang/otp/releases
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4CXZWUOZELT7A5ZN6DJRQHX7L35V4PW/
- https://www.erlang.org/downloads
- https://www.erlang.org/news
- https://erlang.org/pipermail/erlang-questions/2021-January/100357.html
- https://github.com/erlang/otp/releases
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E4CXZWUOZELT7A5ZN6DJRQHX7L35V4PW/
- https://www.erlang.org/downloads
- https://www.erlang.org/news
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-13802
Rebar3 versions 3.0.0-beta.3 to 3.13.2 are vulnerable to OS command injection via URL parameter of dependency specification.
- http://packetstormsecurity.com/files/159027/Rebar3-3.13.2-Command-Injection.html
- https://github.com/vulnbe/poc-rebar3.git
- https://vuln.be/post/rebar3-command-injection/
- http://packetstormsecurity.com/files/159027/Rebar3-3.13.2-Command-Injection.html
- https://github.com/vulnbe/poc-rebar3.git
- https://vuln.be/post/rebar3-command-injection/
Package java-11-openjdk updated to version 11.0.13.8-alt2_1jpp11 for branch p10 in task 289257.
Closed bugs
%post scriptlet failed при установке пакета i586-java-11-openjdk-headless
