ALT-BU-2023-2490-3
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2023-11-07
CVE-2022-47016
Rejected reason: DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
Closed vulnerabilities
Modified: 2026-04-29
CVE-2012-1050
Directory traversal vulnerability in Mathopd 1.4.x and 1.5.x before 1.5p7, when configured with the * construct for mass virtual hosting, allows remote attackers to read arbitrary files via a crafted Host header.
- http://archives.neohapsis.com/archives/bugtraq/2012-02/0025.html
- http://osvdb.org/78896
- http://secunia.com/advisories/47908
- http://www.mail-archive.com/mathopd%40mathopd.org/msg00392.html
- http://www.mathopd.org/security.html
- http://www.securitytracker.com/id?1026641
- https://exchange.xforce.ibmcloud.com/vulnerabilities/73049
- http://archives.neohapsis.com/archives/bugtraq/2012-02/0025.html
- http://osvdb.org/78896
- http://secunia.com/advisories/47908
- http://www.mail-archive.com/mathopd%40mathopd.org/msg00392.html
- http://www.mathopd.org/security.html
- http://www.securitytracker.com/id?1026641
- https://exchange.xforce.ibmcloud.com/vulnerabilities/73049
Package python3-module-pyee updated to version 9.0.4-alt1 for branch sisyphus in task 314860.
Closed bugs
Собрать без python3-module-pytest-runner
Package openuds-server updated to version 3.5.0-alt6 for branch sisyphus in task 314876.
Closed bugs
Не работает подключение по протоколу SPICE
Closed bugs
Параметры без значения
Package python3-module-cryptography updated to version 39.0.1-alt1 for branch sisyphus in task 314900.
Closed vulnerabilities
Modified: 2025-11-19
BDU:2023-02656
Уязвимость функции Cipher.update_into пакета cryptography интерпретатора языка программирования Python, позволяющая нарушителю оказать воздействие на целостность и доступность выходных данных
Modified: 2025-11-03
CVE-2023-23931
cryptography is a package designed to expose cryptographic primitives and recipes to Python developers. In affected versions `Cipher.update_into` would accept Python objects which implement the buffer protocol, but provide only immutable buffers. This would allow immutable objects (such as `bytes`) to be mutated, thus violating fundamental rules of Python and resulting in corrupted output. This now correctly raises an exception. This issue has been present since `update_into` was originally introduced in cryptography 1.8.
- https://github.com/pyca/cryptography/pull/8230/commits/94a50a9731f35405f0357fa5f3b177d46a726ab3
- https://github.com/pyca/cryptography/security/advisories/GHSA-w7pp-m8wf-vj6r
- https://github.com/pyca/cryptography/pull/8230/commits/94a50a9731f35405f0357fa5f3b177d46a726ab3
- https://github.com/pyca/cryptography/security/advisories/GHSA-w7pp-m8wf-vj6r
- https://lists.debian.org/debian-lts-announce/2024/10/msg00012.html
- https://security.netapp.com/advisory/ntap-20230324-0007/
Modified: 2025-11-04
GHSA-w7pp-m8wf-vj6r
Cipher.update_into can corrupt memory if passed an immutable python object as the outbuf
- https://github.com/pyca/cryptography/security/advisories/GHSA-w7pp-m8wf-vj6r
- https://nvd.nist.gov/vuln/detail/CVE-2023-23931
- https://github.com/pyca/cryptography/pull/8230
- https://github.com/pyca/cryptography/commit/d6951dca25de45abd52da51b608055371fbcde4e
- https://github.com/pyca/cryptography
- https://github.com/pypa/advisory-database/tree/main/vulns/cryptography/PYSEC-2023-11.yaml
- https://lists.debian.org/debian-lts-announce/2024/10/msg00012.html
- https://security.netapp.com/advisory/ntap-20230324-0007
Closed vulnerabilities
Modified: 2025-04-25
CVE-2022-45873
systemd 250 and 251 allows local users to achieve a systemd-coredump deadlock by triggering a crash that has a long backtrace. This occurs in parse_elf_object in shared/elf-util.c. The exploitation methodology is to crash a binary calling the same function recursively, and put it in a deeply nested directory to make its backtrace large enough to cause the deadlock. This must be done 16 times when MaxConnections=16 is set for the systemd/units/systemd-coredump.socket file.
- https://github.com/systemd/systemd/commit/076b807be472630692c5348c60d0c2b7b28ad437
- https://github.com/systemd/systemd/pull/24853#issuecomment-1326561497
- https://github.com/systemd/systemd/pull/25055#issuecomment-1313733553
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MS5N5SLYAHKENLAJWYBDKU55ICU3SVZF/
- https://github.com/systemd/systemd/commit/076b807be472630692c5348c60d0c2b7b28ad437
- https://github.com/systemd/systemd/pull/24853#issuecomment-1326561497
- https://github.com/systemd/systemd/pull/25055#issuecomment-1313733553
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/MS5N5SLYAHKENLAJWYBDKU55ICU3SVZF/
