ALT-BU-2021-4663-1
Branch sisyphus_e2k update bulletin.
Package common-licenses updated to version 1.13-alt1 for branch sisyphus_e2k.
Closed bugs
Formatting of the MPL 2.0 license text is differ than official one
Package composer updated to version 2.1.6-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2021-05213
Уязвимость компонента HgDriver менеджера зависимостей для PHP Composer, связанная с внедрением или модификацией аргумента, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-29472
Composer is a dependency manager for PHP. URLs for Mercurial repositories in the root composer.json and package source download URLs are not sanitized correctly. Specifically crafted URL values allow code to be executed in the HgDriver if hg/Mercurial is installed on the system. The impact to Composer users directly is limited as the composer.json file is typically under their own control and source download URLs can only be supplied by third party Composer repositories they explicitly trust to download and execute source code from, e.g. Composer plugins. The main impact is to services passing user input to Composer, including Packagist.org and Private Packagist. This allowed users to trigger remote code execution. The vulnerability has been patched on Packagist.org and Private Packagist within 12h of receiving the initial vulnerability report and based on a review of logs, to the best of our knowledge, was not abused by anyone. Other services/tools using VcsRepository/VcsDriver or derivatives may also be vulnerable and should upgrade their composer/composer dependency immediately. Versions 1.10.22 and 2.0.13 include patches for this issue.
- https://blog.sonarsource.com/php-supply-chain-attack-on-composer/
- https://getcomposer.org/
- https://github.com/composer/composer/security/advisories/GHSA-h5h8-pc6h-jvvx
- https://lists.debian.org/debian-lts-announce/2021/05/msg00009.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FAQUAMGO4Q4BLNZ2OH4CXQD7UK4IO2GE/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KN3DMFH42BJW45VT6FYF2RXKC26D6VC2/
- https://www.debian.org/security/2021/dsa-4907
- https://blog.sonarsource.com/php-supply-chain-attack-on-composer/
- https://getcomposer.org/
- https://github.com/composer/composer/security/advisories/GHSA-h5h8-pc6h-jvvx
- https://lists.debian.org/debian-lts-announce/2021/05/msg00009.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/FAQUAMGO4Q4BLNZ2OH4CXQD7UK4IO2GE/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/KN3DMFH42BJW45VT6FYF2RXKC26D6VC2/
- https://www.debian.org/security/2021/dsa-4907
Package ebtables updated to version 2.0.11-alt2 for branch sisyphus_e2k.
Closed bugs
Неправильный путь к ebtables в ebtables-save
Package fetchmail updated to version 6.4.23-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2021-03928
Уязвимость утилиты приема и пересылки почты fetchmail, связанная с некорректной инициализацией ресурса, позволяющая нарушителю получить доступ к конфиденциальной информации
Modified: 2024-11-21
CVE-2021-36386
report_vbuild in report.c in Fetchmail before 6.4.20 sometimes omits initialization of the vsnprintf va_list argument, which might allow mail servers to cause a denial of service or possibly have unspecified other impact via long error messages. NOTE: it is unclear whether use of Fetchmail on any realistic platform results in an impact beyond an inconvenience to the client user.
- http://www.openwall.com/lists/oss-security/2021/07/28/5
- http://www.openwall.com/lists/oss-security/2021/08/09/1
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AGYO5AHSXTCKA4NQC2Z4H3XMMYNAGC77/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OIXKO6QW3AUHGJVWKJXBCOVBYJUJRBFC/
- https://security.gentoo.org/glsa/202209-14
- https://www.fetchmail.info/fetchmail-SA-2021-01.txt
- https://www.fetchmail.info/security.html
- http://www.openwall.com/lists/oss-security/2021/07/28/5
- http://www.openwall.com/lists/oss-security/2021/08/09/1
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/AGYO5AHSXTCKA4NQC2Z4H3XMMYNAGC77/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/OIXKO6QW3AUHGJVWKJXBCOVBYJUJRBFC/
- https://security.gentoo.org/glsa/202209-14
- https://www.fetchmail.info/fetchmail-SA-2021-01.txt
- https://www.fetchmail.info/security.html
Modified: 2024-11-21
CVE-2021-39272
Fetchmail before 6.4.22 fails to enforce STARTTLS session encryption in some circumstances, such as a certain situation with IMAP and PREAUTH.
- http://www.openwall.com/lists/oss-security/2021/08/27/3
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XJ6XLEJCEZCAM5LGGD6XBCC522QLG4/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VXMKSEHAQSEDCWZMAOJEGX3P3JW6QY6H/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZYCYLL73NP7ALJWSDICIVSA47ZIXWSSA/
- https://nostarttls.secvuln.info/
- https://security.gentoo.org/glsa/202209-14
- https://www.fetchmail.info/security.html
- http://www.openwall.com/lists/oss-security/2021/08/27/3
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/L3XJ6XLEJCEZCAM5LGGD6XBCC522QLG4/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/VXMKSEHAQSEDCWZMAOJEGX3P3JW6QY6H/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZYCYLL73NP7ALJWSDICIVSA47ZIXWSSA/
- https://nostarttls.secvuln.info/
- https://security.gentoo.org/glsa/202209-14
- https://www.fetchmail.info/security.html
Package elinks updated to version 0.14.3-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2012-6709
ELinks 0.12 and Twibright Links 2.3 have Missing SSL Certificate Validation.
Package expat updated to version 2.4.1-alt2 for branch sisyphus_e2k.
Closed vulnerabilities
Modified: 2025-04-11
CVE-2013-0340
expat 2.1.0 and earlier does not properly handle entities expansion unless an application developer uses the XML_SetEntityDeclHandler function, which allows remote attackers to cause a denial of service (resource consumption), send HTTP requests to intranet servers, or read arbitrary files via a crafted XML document, aka an XML External Entity (XXE) issue. NOTE: it could be argued that because expat already provides the ability to disable external entity expansion, the responsibility for resolving this issue lies with application developers; according to this argument, this entry should be REJECTed, and each affected application would need its own CVE.
- http://openwall.com/lists/oss-security/2013/02/22/3
- http://seclists.org/fulldisclosure/2021/Oct/61
- http://seclists.org/fulldisclosure/2021/Oct/62
- http://seclists.org/fulldisclosure/2021/Oct/63
- http://seclists.org/fulldisclosure/2021/Sep/33
- http://seclists.org/fulldisclosure/2021/Sep/34
- http://seclists.org/fulldisclosure/2021/Sep/35
- http://seclists.org/fulldisclosure/2021/Sep/38
- http://seclists.org/fulldisclosure/2021/Sep/39
- http://seclists.org/fulldisclosure/2021/Sep/40
- http://securitytracker.com/id?1028213
- http://www.openwall.com/lists/oss-security/2013/04/12/6
- http://www.openwall.com/lists/oss-security/2021/10/07/4
- http://www.osvdb.org/90634
- http://www.securityfocus.com/bid/58233
- https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d%40%3Cannounce.apache.org%3E
- https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702%40%3Cusers.openoffice.apache.org%3E
- https://security.gentoo.org/glsa/201701-21
- https://support.apple.com/kb/HT212804
- https://support.apple.com/kb/HT212805
- https://support.apple.com/kb/HT212807
- https://support.apple.com/kb/HT212814
- https://support.apple.com/kb/HT212815
- https://support.apple.com/kb/HT212819
- http://openwall.com/lists/oss-security/2013/02/22/3
- http://seclists.org/fulldisclosure/2021/Oct/61
- http://seclists.org/fulldisclosure/2021/Oct/62
- http://seclists.org/fulldisclosure/2021/Oct/63
- http://seclists.org/fulldisclosure/2021/Sep/33
- http://seclists.org/fulldisclosure/2021/Sep/34
- http://seclists.org/fulldisclosure/2021/Sep/35
- http://seclists.org/fulldisclosure/2021/Sep/38
- http://seclists.org/fulldisclosure/2021/Sep/39
- http://seclists.org/fulldisclosure/2021/Sep/40
- http://securitytracker.com/id?1028213
- http://www.openwall.com/lists/oss-security/2013/04/12/6
- http://www.openwall.com/lists/oss-security/2021/10/07/4
- http://www.osvdb.org/90634
- http://www.securityfocus.com/bid/58233
- https://lists.apache.org/thread.html/r41eca5f4f09e74436cbb05dec450fc2bef37b5d3e966aa7cc5fada6d%40%3Cannounce.apache.org%3E
- https://lists.apache.org/thread.html/rfb2c193360436e230b85547e85a41bea0916916f96c501f5b6fc4702%40%3Cusers.openoffice.apache.org%3E
- https://security.gentoo.org/glsa/201701-21
- https://support.apple.com/kb/HT212804
- https://support.apple.com/kb/HT212805
- https://support.apple.com/kb/HT212807
- https://support.apple.com/kb/HT212814
- https://support.apple.com/kb/HT212815
- https://support.apple.com/kb/HT212819
Closed bugs
libexpat-devel: упакованы битые конфиги для cmake