ALT-BU-2022-4567-1
Branch p10_e2k update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-32765
Hiredis is a minimalistic C client library for the Redis database. In affected versions Hiredis is vulnurable to integer overflow if provided maliciously crafted or corrupted `RESP` `mult-bulk` protocol data. When parsing `multi-bulk` (array-like) replies, hiredis fails to check if `count * sizeof(redisReply*)` can be represented in `SIZE_MAX`. If it can not, and the `calloc()` call doesn't itself make this check, it would result in a short allocation and subsequent buffer overflow. Users of hiredis who are unable to update may set the [maxelements](https://github.com/redis/hiredis#reader-max-array-elements) context option to a value small enough that no overflow is possible.
- https://github.com/redis/hiredis/commit/76a7b10005c70babee357a7d0f2becf28ec7ed1e
- https://github.com/redis/hiredis/commit/76a7b10005c70babee357a7d0f2becf28ec7ed1e
- https://github.com/redis/hiredis/security/advisories/GHSA-hfm9-39pp-55p2
- https://github.com/redis/hiredis/security/advisories/GHSA-hfm9-39pp-55p2
- [debian-lts-announce] 20211012 [SECURITY] [DLA 2783-1] hiredis security update
- [debian-lts-announce] 20211012 [SECURITY] [DLA 2783-1] hiredis security update
- GLSA-202210-32
- GLSA-202210-32
- https://security.netapp.com/advisory/ntap-20211104-0003/
- https://security.netapp.com/advisory/ntap-20211104-0003/
- https://wiki.sei.cmu.edu/confluence/display/c/MEM07-C.+Ensure+that+the+arguments+to+calloc%28%29%2C+when+multiplied%2C+do+not+wrap
- https://wiki.sei.cmu.edu/confluence/display/c/MEM07-C.+Ensure+that+the+arguments+to+calloc%28%29%2C+when+multiplied%2C+do+not+wrap
Package xfce4-panel updated to version 4.16.3-alt3.g1870071c for branch p10_e2k.
Closed bugs
Падает панель XFCE "gdbus.error:org.freedesktop.DBus.Error.ServiceUnknown: The name org.xfce.Panel was not provided by any .servis files"
Package python3-module-django updated to version 3.2.13-alt1 for branch p10_e2k.
Closed vulnerabilities
BDU:2022-02670
Уязвимость реализации функции QuerySet.explain() программной платформы для веб-приложений Django, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2022-02671
Уязвимость реализации методов QuerySet.annotate(), aggregate() и extra() программной платформы для веб-приложений Django, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
Modified: 2024-11-21
CVE-2022-28346
An issue was discovered in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. QuerySet.annotate(), aggregate(), and extra() methods are subject to SQL injection in column aliases via a crafted dictionary (with dictionary expansion) as the passed **kwargs.
- http://www.openwall.com/lists/oss-security/2022/04/11/1
- http://www.openwall.com/lists/oss-security/2022/04/11/1
- https://docs.djangoproject.com/en/4.0/releases/security/
- https://docs.djangoproject.com/en/4.0/releases/security/
- https://groups.google.com/forum/#%21forum/django-announce
- https://groups.google.com/forum/#%21forum/django-announce
- [debian-lts-announce] 20220414 [SECURITY] [DLA 2982-1] python-django security update
- [debian-lts-announce] 20220414 [SECURITY] [DLA 2982-1] python-django security update
- FEDORA-2023-8fed428c5e
- FEDORA-2023-8fed428c5e
- FEDORA-2023-a53ab7c969
- FEDORA-2023-a53ab7c969
- https://security.netapp.com/advisory/ntap-20220609-0002/
- https://security.netapp.com/advisory/ntap-20220609-0002/
- DSA-5254
- DSA-5254
- https://www.djangoproject.com/weblog/2022/apr/11/security-releases/
- https://www.djangoproject.com/weblog/2022/apr/11/security-releases/
Modified: 2024-11-21
CVE-2022-28347
A SQL injection issue was discovered in QuerySet.explain() in Django 2.2 before 2.2.28, 3.2 before 3.2.13, and 4.0 before 4.0.4. This occurs by passing a crafted dictionary (with dictionary expansion) as the **options argument, and placing the injection payload in an option name.
- http://www.openwall.com/lists/oss-security/2022/04/11/1
- http://www.openwall.com/lists/oss-security/2022/04/11/1
- https://docs.djangoproject.com/en/4.0/releases/security/
- https://docs.djangoproject.com/en/4.0/releases/security/
- https://groups.google.com/forum/#%21forum/django-announce
- https://groups.google.com/forum/#%21forum/django-announce
- FEDORA-2023-8fed428c5e
- FEDORA-2023-8fed428c5e
- FEDORA-2023-a53ab7c969
- FEDORA-2023-a53ab7c969
- DSA-5254
- DSA-5254
- https://www.djangoproject.com/weblog/2022/apr/11/security-releases/
- https://www.djangoproject.com/weblog/2022/apr/11/security-releases/