ALT-BU-2022-3970-2
Branch sisyphus update bulletin.
Closed bugs
libapt кэширует информацию о подключенных репозиториях без API для её удаления или обновления
Closed bugs
Невозможность зайти в smb шары с $ (скрытые шары)
Package python3-module-Pillow updated to version 9.0.1-alt1 for branch sisyphus in task 295017.
Closed vulnerabilities
BDU:2022-00581
Уязвимость функции path_getbbox (path.c) библиотеки изображений Python Pillow, связанная с неверным ограничением пути к каталогу, позволяющая нарушителю получить доступ к произвольным файлам в системе
BDU:2022-00582
Уязвимость функции path_getbbox (path.c) библиотеки изображений Python Pillow, связанная с чтением за границами буфера, позволяющая нарушителю получить доступ к конфиденциальной информации
BDU:2022-00583
Уязвимость компонента PIL.ImageMath.eval библиотеки изображений Python Pillow, связанная с использованием опасных методов или функций, позволяющая нарушителю выполнить произвольный код
BDU:2023-01714
Уязвимость библиотеки для работы с растровой графикой Pillow, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю нарушить целостность данных, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2022-22815
path_getbbox in path.c in Pillow before 9.0.0 improperly initializes ImagePath.Path.
- https://github.com/python-pillow/Pillow/blob/c5d9223a8b5e9295d15b5a9b1ef1dae44c8499f3/src/path.c#L331
- https://github.com/python-pillow/Pillow/blob/c5d9223a8b5e9295d15b5a9b1ef1dae44c8499f3/src/path.c#L331
- [debian-lts-announce] 20220123 [SECURITY] [DLA 2893-1] pillow security update
- [debian-lts-announce] 20220123 [SECURITY] [DLA 2893-1] pillow security update
- https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#fixed-imagepath-path-array-handling
- https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#fixed-imagepath-path-array-handling
- GLSA-202211-10
- GLSA-202211-10
- DSA-5053
- DSA-5053
Modified: 2024-11-21
CVE-2022-22816
path_getbbox in path.c in Pillow before 9.0.0 has a buffer over-read during initialization of ImagePath.Path.
- https://github.com/python-pillow/Pillow/blob/c5d9223a8b5e9295d15b5a9b1ef1dae44c8499f3/src/path.c#L331
- https://github.com/python-pillow/Pillow/blob/c5d9223a8b5e9295d15b5a9b1ef1dae44c8499f3/src/path.c#L331
- [debian-lts-announce] 20220123 [SECURITY] [DLA 2893-1] pillow security update
- [debian-lts-announce] 20220123 [SECURITY] [DLA 2893-1] pillow security update
- https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#fixed-imagepath-path-array-handling
- https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#fixed-imagepath-path-array-handling
- GLSA-202211-10
- GLSA-202211-10
- DSA-5053
- DSA-5053
Modified: 2024-11-21
CVE-2022-22817
PIL.ImageMath.eval in Pillow before 9.0.0 allows evaluation of arbitrary expressions, such as ones that use the Python exec method. A lambda expression could also be used.
- [debian-lts-announce] 20220123 [SECURITY] [DLA 2893-1] pillow security update
- [debian-lts-announce] 20220123 [SECURITY] [DLA 2893-1] pillow security update
- [debian-lts-announce] 20240322 [SECURITY] [DLA 3768-1] pillow security update
- [debian-lts-announce] 20240322 [SECURITY] [DLA 3768-1] pillow security update
- https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#restrict-builtins-available-to-imagemath-eval
- https://pillow.readthedocs.io/en/stable/releasenotes/9.0.0.html#restrict-builtins-available-to-imagemath-eval
- https://pillow.readthedocs.io/en/stable/releasenotes/9.0.1.html#security
- https://pillow.readthedocs.io/en/stable/releasenotes/9.0.1.html#security
- GLSA-202211-10
- GLSA-202211-10
- DSA-5053
- DSA-5053
Modified: 2024-11-21
CVE-2022-24303
Pillow before 9.0.1 allows attackers to delete files because spaces in temporary pathnames are mishandled.
- https://github.com/python-pillow/Pillow/pull/3450
- https://github.com/python-pillow/Pillow/pull/3450
- FEDORA-2022-ee15b98ea1
- FEDORA-2022-ee15b98ea1
- FEDORA-2022-64332f2a7c
- FEDORA-2022-64332f2a7c
- https://pillow.readthedocs.io/en/stable/releasenotes/9.0.1.html#security
- https://pillow.readthedocs.io/en/stable/releasenotes/9.0.1.html#security
- GLSA-202211-10
- GLSA-202211-10
Closed bugs
libvpx6: крайне медленное декодирование
Closed vulnerabilities
BDU:2022-05973
Уязвимость программы для пула соединения в PostgreSQL PgBouncer, связанная с непринятием мер по защите структуры SQL-запроса, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-3935
When PgBouncer is configured to use "cert" authentication, a man-in-the-middle attacker can inject arbitrary SQL queries when a connection is first established, despite the use of TLS certificate verification and encryption. This flaw affects PgBouncer versions prior to 1.16.1.
- http://www.pgbouncer.org/changelog.html#pgbouncer-116x
- http://www.pgbouncer.org/changelog.html#pgbouncer-116x
- https://bugzilla.redhat.com/show_bug.cgi?id=2021251
- https://bugzilla.redhat.com/show_bug.cgi?id=2021251
- [debian-lts-announce] 20220214 [SECURITY] [DLA 2922-1] pgbouncer security update
- [debian-lts-announce] 20220214 [SECURITY] [DLA 2922-1] pgbouncer security update
- FEDORA-2021-761cda0b77
- FEDORA-2021-761cda0b77
Package python3-module-aiohttp updated to version 3.8.1-alt1 for branch sisyphus in task 295017.
Closed vulnerabilities
BDU:2024-02174
Уязвимость HTTP-клиента aiohttp, связанная с недостатками обработки заголовков Content-Length (CL) и Transfer-Encoding (TE), позволяющая нарушителю отправить скрытый HTTP-запрос (атака типа HTTP Request Smuggling)
Modified: 2024-11-21
CVE-2023-47641
aiohttp is an asynchronous HTTP client/server framework for asyncio and Python. Affected versions of aiohttp have a security vulnerability regarding the inconsistent interpretation of the http protocol. HTTP/1.1 is a persistent protocol, if both Content-Length(CL) and Transfer-Encoding(TE) header values are present it can lead to incorrect interpretation of two entities that parse the HTTP and we can poison other sockets with this incorrect interpretation. A possible Proof-of-Concept (POC) would be a configuration with a reverse proxy(frontend) that accepts both CL and TE headers and aiohttp as backend. As aiohttp parses anything with chunked, we can pass a chunked123 as TE, the frontend entity will ignore this header and will parse Content-Length. The impact of this vulnerability is that it is possible to bypass any proxy rule, poisoning sockets to other users like passing Authentication Headers, also if it is present an Open Redirect an attacker could combine it to redirect random users to another website and log the request. This vulnerability has been addressed in release 3.8.0 of aiohttp. Users are advised to upgrade. There are no known workarounds for this vulnerability.
- https://github.com/aio-libs/aiohttp/commit/f016f0680e4ace6742b03a70cb0382ce86abe371
- https://github.com/aio-libs/aiohttp/commit/f016f0680e4ace6742b03a70cb0382ce86abe371
- https://github.com/aio-libs/aiohttp/security/advisories/GHSA-xx9p-xxvh-7g8j
- https://github.com/aio-libs/aiohttp/security/advisories/GHSA-xx9p-xxvh-7g8j