ALT-BU-2021-4629-1
Branch sisyphus_riscv64 update bulletin.
Package re2c updated to version 2.1.1-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-21232
re2c before 2.0 has uncontrolled recursion that causes stack consumption in find_fixed_tags.
Package monit updated to version 5.29.0-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2020-01554
Уязвимость утилиты для управления и мониторинга процессов, программ, файлов и каталогов Monit, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2020-01555
Уязвимость реализации метода Util_urlDecode утилиты для управления и мониторинга процессов, программ, файлов и каталогов Monit, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2019-11454
Persistent cross-site scripting (XSS) in http/cervlet.c in Tildeslash Monit before 5.25.3 allows a remote unauthenticated attacker to introduce arbitrary JavaScript via manipulation of an unsanitized user field of the Authorization header for HTTP Basic Authentication, which is mishandled during an _viewlog operation.
- https://bitbucket.org/tildeslash/monit/commits/1a8295eab6815072a18019b668fe084945b751f3
- https://bitbucket.org/tildeslash/monit/commits/1a8295eab6815072a18019b668fe084945b751f3
- https://bitbucket.org/tildeslash/monit/commits/328f60773057641c4b2075fab9820145e95b728c
- https://bitbucket.org/tildeslash/monit/commits/328f60773057641c4b2075fab9820145e95b728c
- https://github.com/dzflack/exploits/blob/master/unix/monit_xss.py
- https://github.com/dzflack/exploits/blob/master/unix/monit_xss.py
- [debian-lts-announce] 20190426 [SECURITY] [DLA 1767-1] monit security update
- [debian-lts-announce] 20190426 [SECURITY] [DLA 1767-1] monit security update
- [debian-lts-announce] 20211227 [SECURITY] [DLA 2855-1] monit security update
- [debian-lts-announce] 20211227 [SECURITY] [DLA 2855-1] monit security update
- FEDORA-2020-f70cd7c24b
- FEDORA-2020-f70cd7c24b
- FEDORA-2020-9c19202d55
- FEDORA-2020-9c19202d55
- USN-3971-1
- USN-3971-1
Modified: 2024-11-21
CVE-2019-11455
A buffer over-read in Util_urlDecode in util.c in Tildeslash Monit before 5.25.3 allows a remote authenticated attacker to retrieve the contents of adjacent memory via manipulation of GET or POST parameters. The attacker can also cause a denial of service (application outage).
- https://bitbucket.org/tildeslash/monit/commits/f12d0cdb42d4e74dffe1525d4062c815c48ac57a
- https://bitbucket.org/tildeslash/monit/commits/f12d0cdb42d4e74dffe1525d4062c815c48ac57a
- https://github.com/dzflack/exploits/blob/master/macos/monit_dos.py
- https://github.com/dzflack/exploits/blob/master/macos/monit_dos.py
- https://github.com/dzflack/exploits/blob/master/unix/monit_buffer_overread.py
- https://github.com/dzflack/exploits/blob/master/unix/monit_buffer_overread.py
- [debian-lts-announce] 20190426 [SECURITY] [DLA 1767-1] monit security update
- [debian-lts-announce] 20190426 [SECURITY] [DLA 1767-1] monit security update
- [debian-lts-announce] 20211227 [SECURITY] [DLA 2855-1] monit security update
- [debian-lts-announce] 20211227 [SECURITY] [DLA 2855-1] monit security update
- FEDORA-2020-f70cd7c24b
- FEDORA-2020-f70cd7c24b
- FEDORA-2020-9c19202d55
- FEDORA-2020-9c19202d55
- USN-3971-1
- USN-3971-1
Package ibus updated to version 1.5.25-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2020-02043
Уязвимость системы ввода для записи нескольких языков в Unix-подобных операционных системах ibus, позволяющая нарушителю получить несанкционированный доступ к информации и нарушить ее целостность
Modified: 2024-11-21
CVE-2019-14822
A flaw was discovered in ibus in versions before 1.5.22 that allows any unprivileged user to monitor and send method calls to the ibus bus of another user due to a misconfiguration in the DBus server setup. A local attacker may use this flaw to intercept all keystrokes of a victim user who is using the graphical interface, change the input method engine, or modify other input related configurations of the victim user.
- https://bugzilla.redhat.com/show_bug.cgi?id=1717958
- https://bugzilla.redhat.com/show_bug.cgi?id=1717958
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14822
- https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2019-14822
- https://usn.ubuntu.com/4134-3/
- https://usn.ubuntu.com/4134-3/
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
Closed bugs
Независимые данные не отделены
Package python3-module-django updated to version 3.2.10-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-44420
In Django 2.2 before 2.2.25, 3.1 before 3.1.14, and 3.2 before 3.2.10, HTTP requests for URLs with trailing newlines could bypass upstream access control based on URL paths.
- https://docs.djangoproject.com/en/3.2/releases/security/
- https://docs.djangoproject.com/en/3.2/releases/security/
- https://groups.google.com/forum/#%21forum/django-announce
- https://groups.google.com/forum/#%21forum/django-announce
- FEDORA-2022-e7fd530688
- FEDORA-2022-e7fd530688
- https://security.netapp.com/advisory/ntap-20211229-0006/
- https://security.netapp.com/advisory/ntap-20211229-0006/
- https://www.djangoproject.com/weblog/2021/dec/07/security-releases/
- https://www.djangoproject.com/weblog/2021/dec/07/security-releases/
- https://www.openwall.com/lists/oss-security/2021/12/07/1
- https://www.openwall.com/lists/oss-security/2021/12/07/1