ALT-BU-2023-2587-1
Branch sisyphus_e2k update bulletin.
Package git updated to version 2.33.7-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2023-01602
Уязвимость распределенной системы управления версиями Git, связанная с передачей частных ресурсов в новую сферу, позволяющая нарушителю получить доступ к конфиденциальной информации
BDU:2023-01603
Уязвимость распределенной системы управления версиями Git, связанная с неправильным ограничением имени пути к каталогу с ограниченным доступом, позволяющая нарушителю перезаписать произвольные файлы в системе
Modified: 2024-11-21
CVE-2023-22490
Git is a revision control system. Using a specially-crafted repository, Git prior to versions 2.39.2, 2.38.4, 2.37.6, 2.36.5, 2.35.7, 2.34.7, 2.33.7, 2.32.6, 2.31.7, and 2.30.8 can be tricked into using its local clone optimization even when using a non-local transport. Though Git will abort local clones whose source `$GIT_DIR/objects` directory contains symbolic links, the `objects` directory itself may still be a symbolic link. These two may be combined to include arbitrary files based on known paths on the victim's filesystem within the malicious repository's working copy, allowing for data exfiltration in a similar manner as CVE-2022-39253. A fix has been prepared and will appear in v2.39.2 v2.38.4 v2.37.6 v2.36.5 v2.35.7 v2.34.7 v2.33.7 v2.32.6, v2.31.7 and v2.30.8. If upgrading is impractical, two short-term workarounds are available. Avoid cloning repositories from untrusted sources with `--recurse-submodules`. Instead, consider cloning repositories without recursively cloning their submodules, and instead run `git submodule update` at each layer. Before doing so, inspect each new `.gitmodules` file to ensure that it does not contain suspicious module URLs.
- https://github.com/git/git/commit/c867e4fa180bec4750e9b54eb10f459030dbebfd
- https://github.com/git/git/commit/c867e4fa180bec4750e9b54eb10f459030dbebfd
- https://github.com/git/git/security/advisories/GHSA-3wp6-j8xr-qw85
- https://github.com/git/git/security/advisories/GHSA-3wp6-j8xr-qw85
- https://github.com/git/git/security/advisories/GHSA-gw92-x3fm-3g3q
- https://github.com/git/git/security/advisories/GHSA-gw92-x3fm-3g3q
- https://security.gentoo.org/glsa/202312-15
- https://security.gentoo.org/glsa/202312-15
Modified: 2024-11-21
CVE-2023-23946
Git, a revision control system, is vulnerable to path traversal prior to versions 2.39.2, 2.38.4, 2.37.6, 2.36.5, 2.35.7, 2.34.7, 2.33.7, 2.32.6, 2.31.7, and 2.30.8. By feeding a crafted input to `git apply`, a path outside the working tree can be overwritten as the user who is running `git apply`. A fix has been prepared and will appear in v2.39.2, v2.38.4, v2.37.6, v2.36.5, v2.35.7, v2.34.7, v2.33.7, v2.32.6, v2.31.7, and v2.30.8. As a workaround, use `git apply --stat` to inspect a patch before applying; avoid applying one that creates a symbolic link and then creates a file beyond the symbolic link.
- https://github.com/git/git/commit/c867e4fa180bec4750e9b54eb10f459030dbebfd
- https://github.com/git/git/commit/c867e4fa180bec4750e9b54eb10f459030dbebfd
- https://github.com/git/git/security/advisories/GHSA-r87m-v37r-cwfh
- https://github.com/git/git/security/advisories/GHSA-r87m-v37r-cwfh
- https://security.gentoo.org/glsa/202312-15
- https://security.gentoo.org/glsa/202312-15
Package nextcloud updated to version 25.0.3-alt2 for branch sisyphus_e2k.
Closed bugs
Собрать nextcloud с php8.0 или php8.1 вместо php7
Package libbpf updated to version 0.8.1-alt2 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2022-07344
Уязвимость функции find_prog_by_sec_insn() (tools/lib/bpf/libbpf.c) ядра операционных систем Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2022-3534
A vulnerability classified as critical has been found in Linux Kernel. Affected is the function btf_dump_name_dups of the file tools/lib/bpf/btf_dump.c of the component libbpf. The manipulation leads to use after free. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-211032.
Modified: 2024-11-21
CVE-2022-3606
A vulnerability was found in Linux Kernel. It has been classified as problematic. This affects the function find_prog_by_sec_insn of the file tools/lib/bpf/libbpf.c of the component BPF. The manipulation leads to null pointer dereference. It is recommended to apply a patch to fix this issue. The identifier VDB-211749 was assigned to this vulnerability.
Package curl updated to version 7.88.0-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2023-02154
Уязвимость механизма HSTS (HTTP Strict Transport Security) утилиты командной строки cURL, позволяющая нарушителю изменить функциональность HSTS при последовательном запросе нескольких URL-адресов
Modified: 2025-03-12
CVE-2023-23914
A cleartext transmission of sensitive information vulnerability exists in curl
Modified: 2024-11-21
CVE-2023-23915
A cleartext transmission of sensitive information vulnerability exists in curl
Modified: 2025-03-12
CVE-2023-23916
An allocation of resources without limits or throttling vulnerability exists in curl
- https://hackerone.com/reports/1826048
- https://hackerone.com/reports/1826048
- [debian-lts-announce] 20230224 [SECURITY] [DLA 3341-1] curl security update
- [debian-lts-announce] 20230224 [SECURITY] [DLA 3341-1] curl security update
- FEDORA-2023-94df30cbec
- FEDORA-2023-94df30cbec
- GLSA-202310-12
- GLSA-202310-12
- https://security.netapp.com/advisory/ntap-20230309-0006/
- https://security.netapp.com/advisory/ntap-20230309-0006/
- DSA-5365
- DSA-5365
Closed bugs
Просьба обновить до 7.88.0
Package alternatives updated to version 0.5.2-alt2 for branch sisyphus_e2k.
Closed bugs
Ошибка в выполнении /usr/lib/rpm/90-apache2-base-httpd.filetrigger во время установки apache-mod_php