ALT-BU-2022-7517-1
Branch sisyphus_e2k update bulletin.
Package rpm-build-tex updated to version 0.4.5-alt1 for branch sisyphus_e2k.
Closed bugs
Optimize /usr/lib/rpm/tex.req.files
Package libetpan updated to version 1.9.4-alt3 for branch sisyphus_e2k.
Closed vulnerabilities
Modified: 2025-04-04
CVE-2022-4121
In libetpan a null pointer dereference in mailimap_mailbox_data_status_free in low-level/imap/mailimap_types.c was found that could lead to a remote denial of service or other potential consequences.
Package eepm updated to version 3.28.1-alt1 for branch sisyphus_e2k.
Closed bugs
Просьба добавить в epm или репозиторий программу iptvnator.
Package python3-module-jose updated to version 3.3.0-alt2 for branch sisyphus_e2k.
Closed bugs
Собрать без python3-module-pytest-runner
Package curl updated to version 7.87.0-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2023-02157
Уязвимость механизма HSTS (HTTP Strict Transport Security) утилиты командной строки cURL, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Modified: 2024-11-21
CVE-2022-43551
A vulnerability exists in curl <7.87.0 HSTS check that could be bypassed to trick it to keep using HTTP. Using its HSTS support, curl can be instructed to use HTTPS instead of using an insecure clear-text HTTP step even when HTTP is provided in the URL. However, the HSTS mechanism could be bypassed if the host name in the given URL first uses IDN characters that get replaced to ASCII counterparts as part of the IDN conversion. Like using the character UTF-8 U+3002 (IDEOGRAPHIC FULL STOP) instead of the common ASCII full stop (U+002E) `.`. Then in a subsequent request, it does not detect the HSTS state and makes a clear text transfer. Because it would store the info IDN encoded but look for it IDN decoded.
- https://hackerone.com/reports/1755083
- https://hackerone.com/reports/1755083
- FEDORA-2022-d7ee33d4ad
- FEDORA-2022-d7ee33d4ad
- https://security.gentoo.org/glsa/202310-12
- https://security.gentoo.org/glsa/202310-12
- https://security.netapp.com/advisory/ntap-20230427-0007/
- https://security.netapp.com/advisory/ntap-20230427-0007/
Modified: 2024-11-21
CVE-2022-43552
A use after free vulnerability exists in curl <7.87.0. Curl can be asked to *tunnel* virtually all protocols it supports through an HTTP proxy. HTTP proxies can (and often do) deny such tunnel operations. When getting denied to tunnel the specific protocols SMB or TELNET, curl would use a heap-allocated struct after it had been freed, in its transfer shutdown code path.
- 20230327 APPLE-SA-2023-03-27-3 macOS Ventura 13.3
- 20230327 APPLE-SA-2023-03-27-3 macOS Ventura 13.3
- https://hackerone.com/reports/1764858
- https://hackerone.com/reports/1764858
- GLSA-202310-12
- GLSA-202310-12
- https://security.netapp.com/advisory/ntap-20230214-0002/
- https://security.netapp.com/advisory/ntap-20230214-0002/
- https://support.apple.com/kb/HT213670
- https://support.apple.com/kb/HT213670
Package dbus updated to version 1.14.4-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2022-06389
Уязвимость системы межпроцессного взаимодействия D-Bus, связанная с достижимостью утверждения в отладочных сборках, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06391
Уязвимость системы межпроцессного взаимодействия D-Bus, связанная с ошибкой использования памяти после освобождения, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06394
Уязвимость системы межпроцессного взаимодействия D-Bus, связанная с граничной ошибкой, вызванной недопустимым массивом элементов фиксированной длины, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2022-42010
An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash when receiving a message with certain invalid type signatures.
- https://gitlab.freedesktop.org/dbus/dbus/-/issues/418
- https://gitlab.freedesktop.org/dbus/dbus/-/issues/418
- FEDORA-2022-7a963a79d1
- FEDORA-2022-7a963a79d1
- FEDORA-2022-b0c2f2ab74
- FEDORA-2022-b0c2f2ab74
- FEDORA-2022-076544c8aa
- FEDORA-2022-076544c8aa
- GLSA-202305-08
- GLSA-202305-08
- https://www.openwall.com/lists/oss-security/2022/10/06/1
- https://www.openwall.com/lists/oss-security/2022/10/06/1
Modified: 2024-11-21
CVE-2022-42011
An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash when receiving a message where an array length is inconsistent with the size of the element type.
- https://gitlab.freedesktop.org/dbus/dbus/-/issues/413
- https://gitlab.freedesktop.org/dbus/dbus/-/issues/413
- FEDORA-2022-7a963a79d1
- FEDORA-2022-7a963a79d1
- FEDORA-2022-b0c2f2ab74
- FEDORA-2022-b0c2f2ab74
- FEDORA-2022-076544c8aa
- FEDORA-2022-076544c8aa
- GLSA-202305-08
- GLSA-202305-08
- https://www.openwall.com/lists/oss-security/2022/10/06/1
- https://www.openwall.com/lists/oss-security/2022/10/06/1
Modified: 2024-11-21
CVE-2022-42012
An issue was discovered in D-Bus before 1.12.24, 1.13.x and 1.14.x before 1.14.4, and 1.15.x before 1.15.2. An authenticated attacker can cause dbus-daemon and other programs that use libdbus to crash by sending a message with attached file descriptors in an unexpected format.
- https://gitlab.freedesktop.org/dbus/dbus/-/issues/417
- https://gitlab.freedesktop.org/dbus/dbus/-/issues/417
- FEDORA-2022-7a963a79d1
- FEDORA-2022-7a963a79d1
- FEDORA-2022-b0c2f2ab74
- FEDORA-2022-b0c2f2ab74
- FEDORA-2022-076544c8aa
- FEDORA-2022-076544c8aa
- GLSA-202305-08
- GLSA-202305-08
- https://www.openwall.com/lists/oss-security/2022/10/06/1
- https://www.openwall.com/lists/oss-security/2022/10/06/1
Package howdy updated to version 3.0.0-alt4.beta1.git943f1e1 for branch sisyphus_e2k.
Closed bugs
Не работает аутентификация с помощью howdy в sudo