ALT-BU-2022-4491-1
Branch sisyphus_mipsel update bulletin.
Package python3-module-celery updated to version 5.2.3-alt1 for branch sisyphus_mipsel.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-23727
This affects the package celery before 5.2.2. It by default trusts the messages and metadata stored in backends (result stores). When reading task metadata from the backend, the data is deserialized. Given that an attacker can gain access to, or somehow manipulate the metadata within a celery backend, they could trigger a stored command injection vulnerability and potentially gain further access to the system.
Package fonts-otf-philosopher updated to version 1.000-alt3 for branch sisyphus_mipsel.
Closed bugs
fonts-otf-philosopher: устаревшие макросы %post(un)_fonts.
Package python3-module-mechanize updated to version 0.4.7-alt1 for branch sisyphus_mipsel.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-32837
mechanize, a library for automatically interacting with HTTP web servers, contains a regular expression that is vulnerable to regular expression denial of service (ReDoS) prior to version 0.4.6. If a web server responds in a malicious way, then mechanize could crash. Version 0.4.6 has a patch for the issue.
- https://github.com/python-mechanize/mechanize/blob/3acb1836f3fd8edc5a758a417dd46b53832ae3b5/mechanize/_urllib2_fork.py#L878-L879
- https://github.com/python-mechanize/mechanize/blob/3acb1836f3fd8edc5a758a417dd46b53832ae3b5/mechanize/_urllib2_fork.py#L878-L879
- https://github.com/python-mechanize/mechanize/commit/dd05334448e9f39814bab044d2eaa5ef69b410d6
- https://github.com/python-mechanize/mechanize/commit/dd05334448e9f39814bab044d2eaa5ef69b410d6
- https://github.com/python-mechanize/mechanize/releases/tag/v0.4.6
- https://github.com/python-mechanize/mechanize/releases/tag/v0.4.6
- [debian-lts-announce] 20230620 [SECURITY] [DLA 3460-1] python-mechanize security update
- [debian-lts-announce] 20230620 [SECURITY] [DLA 3460-1] python-mechanize security update
- https://securitylab.github.com/advisories/GHSL-2021-108-python-mechanize-mechanize/
- https://securitylab.github.com/advisories/GHSL-2021-108-python-mechanize-mechanize/
Package libfreetype updated to version 2.12.0-alt1 for branch sisyphus_mipsel.
Closed vulnerabilities
BDU:2022-06905
Уязвимость функции FT_Request_Size библиотеки FreeType, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06908
Уязвимость функции sfnt_init_face библиотеки FreeType, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-06917
Уязвимость функции FNT_Size_Request библиотеки FreeType, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2022-27404
FreeType commit 1e2eb65048f75c64b68708efed6ce904c31f3b2f was discovered to contain a heap buffer overflow via the function sfnt_init_face.
- https://gitlab.freedesktop.org/freetype/freetype/-/issues/1138
- https://gitlab.freedesktop.org/freetype/freetype/-/issues/1138
- FEDORA-2022-7ece4f6d74
- FEDORA-2022-7ece4f6d74
- FEDORA-2022-2dd60f1f00
- FEDORA-2022-2dd60f1f00
- FEDORA-2022-80e1724780
- FEDORA-2022-80e1724780
- FEDORA-2022-0985b0cb9f
- FEDORA-2022-0985b0cb9f
- FEDORA-2022-5e45671294
- FEDORA-2022-5e45671294
- GLSA-202402-06
- GLSA-202402-06
Modified: 2024-11-21
CVE-2022-27405
FreeType commit 53dfdcd8198d2b3201a23c4bad9190519ba918db was discovered to contain a segmentation violation via the function FNT_Size_Request.
- http://freetype.com
- http://freetype.com
- https://gitlab.freedesktop.org/freetype/freetype/-/issues/1139
- https://gitlab.freedesktop.org/freetype/freetype/-/issues/1139
- FEDORA-2022-7ece4f6d74
- FEDORA-2022-7ece4f6d74
- FEDORA-2022-2dd60f1f00
- FEDORA-2022-2dd60f1f00
- FEDORA-2022-80e1724780
- FEDORA-2022-80e1724780
- FEDORA-2022-0985b0cb9f
- FEDORA-2022-0985b0cb9f
- FEDORA-2022-5e45671294
- FEDORA-2022-5e45671294
- GLSA-202402-06
- GLSA-202402-06
Modified: 2024-11-21
CVE-2022-27406
FreeType commit 22a0cccb4d9d002f33c1ba7a4b36812c7d4f46b5 was discovered to contain a segmentation violation via the function FT_Request_Size.
- http://freetype.com
- http://freetype.com
- https://gitlab.freedesktop.org/freetype/freetype/-/issues/1140
- https://gitlab.freedesktop.org/freetype/freetype/-/issues/1140
- FEDORA-2022-7ece4f6d74
- FEDORA-2022-7ece4f6d74
- FEDORA-2022-2dd60f1f00
- FEDORA-2022-2dd60f1f00
- FEDORA-2022-80e1724780
- FEDORA-2022-80e1724780
- FEDORA-2022-0985b0cb9f
- FEDORA-2022-0985b0cb9f
- FEDORA-2022-5e45671294
- FEDORA-2022-5e45671294
- GLSA-202402-06
- GLSA-202402-06