ALT-BU-2022-3738-1
Branch p10_e2k update bulletin.
Package phoronix-test-suite updated to version 10.8.0-alt1 for branch p10_e2k.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-0157
phoronix-test-suite is vulnerable to Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
- https://github.com/phoronix-test-suite/phoronix-test-suite/commit/56fd0a3b69fb33c1c90a6017ed735889aaa59486
- https://github.com/phoronix-test-suite/phoronix-test-suite/commit/56fd0a3b69fb33c1c90a6017ed735889aaa59486
- https://huntr.dev/bounties/2c0fe81b-0977-4e1e-b5d8-7646c9a7ebbd
- https://huntr.dev/bounties/2c0fe81b-0977-4e1e-b5d8-7646c9a7ebbd
- FEDORA-2022-8f968eea82
- FEDORA-2022-8f968eea82
- FEDORA-2022-43f11039b2
- FEDORA-2022-43f11039b2
Modified: 2024-11-21
CVE-2022-0196
phoronix-test-suite is vulnerable to Cross-Site Request Forgery (CSRF)
- https://github.com/phoronix-test-suite/phoronix-test-suite/commit/4f18296a1862fe54a4c58701a1f5ec6bd62a4d94
- https://github.com/phoronix-test-suite/phoronix-test-suite/commit/4f18296a1862fe54a4c58701a1f5ec6bd62a4d94
- https://huntr.dev/bounties/3675eec7-bbce-4dfd-a2d3-d6862dce9ea6
- https://huntr.dev/bounties/3675eec7-bbce-4dfd-a2d3-d6862dce9ea6
- FEDORA-2022-8f968eea82
- FEDORA-2022-8f968eea82
- FEDORA-2022-43f11039b2
- FEDORA-2022-43f11039b2
Modified: 2024-11-21
CVE-2022-0197
phoronix-test-suite is vulnerable to Cross-Site Request Forgery (CSRF)
- https://github.com/phoronix-test-suite/phoronix-test-suite/commit/4f18296a1862fe54a4c58701a1f5ec6bd62a4d94
- https://github.com/phoronix-test-suite/phoronix-test-suite/commit/4f18296a1862fe54a4c58701a1f5ec6bd62a4d94
- https://huntr.dev/bounties/5abb7915-32f4-4fb1-afa7-bb6d8c4c5ad2
- https://huntr.dev/bounties/5abb7915-32f4-4fb1-afa7-bb6d8c4c5ad2
- FEDORA-2022-8f968eea82
- FEDORA-2022-8f968eea82
- FEDORA-2022-43f11039b2
- FEDORA-2022-43f11039b2
Closed vulnerabilities
BDU:2022-00235
Уязвимость файлового менеджера Midnight Commander, связанная с недостатками процедуры аутентификации, позволяющая нарушителю оказать воздействие на целостность данных
Modified: 2024-11-21
CVE-2021-36370
An issue was discovered in Midnight Commander through 4.8.26. When establishing an SFTP connection, the fingerprint of the server is neither checked nor displayed. As a result, a user connects to the server without the ability to verify its authenticity.
- https://docs.ssh-mitm.at/CVE-2021-36370.html
- https://docs.ssh-mitm.at/CVE-2021-36370.html
- https://github.com/MidnightCommander/mc/blob/5c1d3c55dd15356ec7d079084d904b7b0fd58d3e/src/vfs/sftpfs/connection.c#L484
- https://github.com/MidnightCommander/mc/blob/5c1d3c55dd15356ec7d079084d904b7b0fd58d3e/src/vfs/sftpfs/connection.c#L484
- https://github.com/MidnightCommander/mc/blob/master/src/vfs/sftpfs/connection.c
- https://github.com/MidnightCommander/mc/blob/master/src/vfs/sftpfs/connection.c
- https://mail.gnome.org/archives/mc-devel/2021-August/msg00008.html
- https://mail.gnome.org/archives/mc-devel/2021-August/msg00008.html
- https://midnight-commander.org/
- https://midnight-commander.org/
- https://sourceforge.net/projects/mcwin32/files/
- https://sourceforge.net/projects/mcwin32/files/
Package perl-Gear-Remotes updated to version 0.030-alt1 for branch p10_e2k.
Closed bugs
Undefined subroutine &RPM::Devscripts::Versort::myvercmp