ALT-BU-2022-7634-1
Branch sisyphus_e2k update bulletin.
Package zabbix updated to version 6.0.12-alt2 for branch sisyphus_e2k.
Closed bugs
Отсутствует history_pk_prepare.sql
Package libxerces-c updated to version 3.2.4-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2021-03489
Уязвимость библиотеки для работы с XML Xerces-C, связанная с использованием памяти после её освобождения, позволяющая нарушителю получить доступ к конфиденциальной информации или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2018-1311
The Apache Xerces-C 3.0.0 to 3.2.3 XML parser contains a use-after-free error triggered during the scanning of external DTDs. This flaw has not been addressed in the maintained version of the library and has no current mitigation other than to disable DTD processing. This can be accomplished via the DOM using a standard parser feature, or via SAX using the XERCES_DISABLE_DTD environment variable.
- [oss-security] 20240216 CVE-2024-23807: Apache Xerces C++: Use-after-free on external DTD scan
- [oss-security] 20240216 CVE-2024-23807: Apache Xerces C++: Use-after-free on external DTD scan
- RHSA-2020:0702
- RHSA-2020:0702
- RHSA-2020:0704
- RHSA-2020:0704
- [xerces-c-dev] 20200110 [xerces-c] 06/13: Add CVE-2018-1311 advisory and web site note.
- [xerces-c-dev] 20200110 [xerces-c] 06/13: Add CVE-2018-1311 advisory and web site note.
- [xerces-c-users] 20210528 Re: Security vulnerability - CVE-2018-1311
- [xerces-c-users] 20210528 Re: Security vulnerability - CVE-2018-1311
- [xerces-c-users] 20210528 Security vulnerability - CVE-2018-1311
- [xerces-c-users] 20210528 Security vulnerability - CVE-2018-1311
- [xerces-c-users] 20210528 RE: Security vulnerability - CVE-2018-1311
- [xerces-c-users] 20210528 RE: Security vulnerability - CVE-2018-1311
- [debian-lts-announce] 20201217 [SECURITY] [DLA 2498-1] xerces-c security update
- [debian-lts-announce] 20201217 [SECURITY] [DLA 2498-1] xerces-c security update
- [debian-lts-announce] 20231231 [SECURITY] [DLA 3704-1] xerces-c security update
- [debian-lts-announce] 20231231 [SECURITY] [DLA 3704-1] xerces-c security update
- FEDORA-2023-52ba628e03
- FEDORA-2023-52ba628e03
- FEDORA-2023-817ecc703f
- FEDORA-2023-817ecc703f
- https://marc.info/?l=xerces-c-users&m=157653840106914&w=2
- https://marc.info/?l=xerces-c-users&m=157653840106914&w=2
- DSA-4814
- DSA-4814
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
Package mediawiki updated to version 1.39.0-alt3 for branch sisyphus_e2k.
Closed bugs
Непрописанный файловый конфликт между mediawiki-common и mediawiki-extensions-Math
Package python3-module-oauthlib updated to version 3.2.2-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-36087
OAuthLib is an implementation of the OAuth request-signing logic for Python 3.6+. In OAuthLib versions 3.1.1 until 3.2.1, an attacker providing malicious redirect uri can cause denial of service. An attacker can also leverage usage of `uri_validate` functions depending where it is used. OAuthLib applications using OAuth2.0 provider support or use directly `uri_validate` are affected by this issue. Version 3.2.1 contains a patch. There are no known workarounds.
- https://github.com/oauthlib/oauthlib/blob/2b8a44855a51ad5a5b0c348a08c2564a2e197ea2/oauthlib/uri_validate.py
- https://github.com/oauthlib/oauthlib/blob/2b8a44855a51ad5a5b0c348a08c2564a2e197ea2/oauthlib/uri_validate.py
- https://github.com/oauthlib/oauthlib/blob/d4bafd9f1d0eba3766e933b1ac598cbbf37b8914/oauthlib/oauth2/rfc6749/grant_types/base.py#L232
- https://github.com/oauthlib/oauthlib/blob/d4bafd9f1d0eba3766e933b1ac598cbbf37b8914/oauthlib/oauth2/rfc6749/grant_types/base.py#L232
- https://github.com/oauthlib/oauthlib/commit/2e40b412c844ecc4673c3fa3f72181f228bdbacd
- https://github.com/oauthlib/oauthlib/commit/2e40b412c844ecc4673c3fa3f72181f228bdbacd
- https://github.com/oauthlib/oauthlib/releases/tag/v3.2.1
- https://github.com/oauthlib/oauthlib/releases/tag/v3.2.1
- https://github.com/oauthlib/oauthlib/security/advisories/GHSA-3pgj-pg6c-r5p7
- https://github.com/oauthlib/oauthlib/security/advisories/GHSA-3pgj-pg6c-r5p7
- FEDORA-2023-5ab7049a59
- FEDORA-2023-5ab7049a59
- FEDORA-2023-49ded4c9a5
- FEDORA-2023-49ded4c9a5
- FEDORA-2022-5a74a5eea7
- FEDORA-2022-5a74a5eea7
- FEDORA-2023-da094276a2
- FEDORA-2023-da094276a2
Package mkimage-profiles updated to version 1.5.0-alt1 for branch sisyphus_e2k.
Closed bugs
Зависает сборка с make 4.4.0, если заданы THE_GROUPS или MAIN_GROUPS
Package wavpack updated to version 5.6.0-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-44269
An out of bounds read was found in Wavpack 5.4.0 in processing *.WAV files. This issue triggered in function WavpackPackSamples of file src/pack_utils.c, tainted variable cnt is too large, that makes pointer sptr read beyond heap bound.
- https://github.com/dbry/WavPack/issues/110
- https://github.com/dbry/WavPack/issues/110
- FEDORA-2022-737f020ede
- FEDORA-2022-737f020ede
- FEDORA-2022-cece705cbf
- FEDORA-2022-cece705cbf
- FEDORA-2022-0fc7b22bcd
- FEDORA-2022-0fc7b22bcd
- FEDORA-2022-8e94ec2244
- FEDORA-2022-8e94ec2244
- FEDORA-2022-7df99d9f80
- FEDORA-2022-7df99d9f80
Modified: 2024-11-21
CVE-2022-2476
A null pointer dereference bug was found in wavpack-5.4.0 The results from the ASAN log: AddressSanitizer:DEADLYSIGNAL ===================================================================84257==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x561b47a970c6 bp 0x7fff13952fb0 sp 0x7fff1394fca0 T0) ==84257==The signal is caused by a WRITE memory access. ==84257==Hint: address points to the zero page. #0 0x561b47a970c5 in main cli/wvunpack.c:834 #1 0x7efc4f5c0082 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x24082) #2 0x561b47a945ed in _start (/usr/local/bin/wvunpack+0xa5ed) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV cli/wvunpack.c:834 in main ==84257==ABORTING