ALT-BU-2023-2835-1
Branch sisyphus_e2k update bulletin.
Package ansible-core updated to version 2.14.3-alt3 for branch sisyphus_e2k.
Closed bugs
Требует resolvelib версии меньшей, чем в репозитории
Ошибка запуска ansible-test (модуль удалён, но бинарник всё ещё упакован)
Package awstats updated to version 7.9-alt0.1 for branch sisyphus_e2k.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2020-29600
In AWStats through 7.7, cgi-bin/awstats.pl?config= accepts an absolute pathname, even though it was intended to only read a file in the /etc/awstats/awstats.conf format. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000501.
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891469
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=891469
- https://github.com/eldy/awstats/issues/90
- https://github.com/eldy/awstats/issues/90
- [debian-lts-announce] 20201223 [SECURITY] [DLA 2506-1] awstats security update
- [debian-lts-announce] 20201223 [SECURITY] [DLA 2506-1] awstats security update
- FEDORA-2020-d1aa0e030c
- FEDORA-2020-d1aa0e030c
Modified: 2024-11-21
CVE-2020-35176
In AWStats through 7.8, cgi-bin/awstats.pl?config= accepts a partial absolute pathname (omitting the initial /etc), even though it was intended to only read a file in the /etc/awstats/awstats.conf format. NOTE: this issue exists because of an incomplete fix for CVE-2017-1000501 and CVE-2020-29600.
- https://github.com/eldy/awstats/issues/195
- https://github.com/eldy/awstats/issues/195
- [debian-lts-announce] 20201223 [SECURITY] [DLA 2506-1] awstats security update
- [debian-lts-announce] 20201223 [SECURITY] [DLA 2506-1] awstats security update
- FEDORA-2020-d1aa0e030c
- FEDORA-2020-d1aa0e030c
- FEDORA-2020-4cba5f2846
- FEDORA-2020-4cba5f2846
Modified: 2024-11-21
CVE-2022-46391
AWStats 7.x through 7.8 allows XSS in the hostinfo plugin due to printing a response from Net::XWhois without proper checks.
- https://github.com/eldy/AWStats/pull/226
- https://github.com/eldy/AWStats/pull/226
- [debian-lts-announce] 20221205 [SECURITY] [DLA 3225-1] awstats security update
- [debian-lts-announce] 20221205 [SECURITY] [DLA 3225-1] awstats security update
- FEDORA-2023-b645c7feda
- FEDORA-2023-b645c7feda
- FEDORA-2023-fda5480804
- FEDORA-2023-fda5480804
Package clamav updated to version 0.103.8-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2023-00757
Уязвимость анализатора файлов разделов HFS+ пакета антивирусных программ ClamAV, позволяющая нарушителю выполнить произвольный код
BDU:2023-02206
Уязвимость пакета антивирусных программ ClamAV, связанная с неправильным ограничением рекурсивных ссылок на объекты в DTDS, позволяющая нарушителю получить доступ к конфиденциальной информации
Modified: 2024-11-21
CVE-2023-20032
On Feb 15, 2023, the following vulnerability in the ClamAV scanning library was disclosed: A vulnerability in the HFS+ partition file parser of ClamAV versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier could allow an unauthenticated, remote attacker to execute arbitrary code. This vulnerability is due to a missing buffer size check that may result in a heap buffer overflow write. An attacker could exploit this vulnerability by submitting a crafted HFS+ partition file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to execute arbitrary code with the privileges of the ClamAV scanning process, or else crash the process, resulting in a denial of service (DoS) condition. For a description of this vulnerability, see the ClamAV blog ["https://blog.clamav.net/"].
Modified: 2024-11-21
CVE-2023-20052
On Feb 15, 2023, the following vulnerability in the ClamAV scanning library was disclosed: A vulnerability in the DMG file parser of ClamAV versions 1.0.0 and earlier, 0.105.1 and earlier, and 0.103.7 and earlier could allow an unauthenticated, remote attacker to access sensitive information on an affected device. This vulnerability is due to enabling XML entity substitution that may result in XML external entity injection. An attacker could exploit this vulnerability by submitting a crafted DMG file to be scanned by ClamAV on an affected device. A successful exploit could allow the attacker to leak bytes from any file that may be read by the ClamAV scanning process.
Package apache2 updated to version 2.4.56-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2023-01738
Уязвимость модуля mod_proxy веб-сервера Apache HTTP Server, позволяющая нарушителю отправить скрытый HTTP-запрос (атака типа HTTP Request Smuggling)
BDU:2023-02021
Уязвимость компонента mod_proxy_uwsgi веб-сервера Apache HTTP Server связанная с недостатками обработки HTTP-запросов, позволяющая нарушителю выполнять атаку "контрабанда HTTP-запросов"
Modified: 2025-02-13
CVE-2023-25690
Some mod_proxy configurations on Apache HTTP Server versions 2.4.0 through 2.4.55 allow a HTTP Request Smuggling attack. Configurations are affected when mod_proxy is enabled along with some form of RewriteRule or ProxyPassMatch in which a non-specific pattern matches some portion of the user-supplied request-target (URL) data and is then re-inserted into the proxied request-target using variable substitution. For example, something like: RewriteEngine on RewriteRule "^/here/(.*)" "http://example.com:8080/elsewhere?$1"; [P] ProxyPassReverse /here/ http://example.com:8080/ Request splitting/smuggling could result in bypass of access controls in the proxy server, proxying unintended URLs to existing origin servers, and cache poisoning. Users are recommended to update to at least version 2.4.56 of Apache HTTP Server.
- http://packetstormsecurity.com/files/176334/Apache-2.4.55-mod_proxy-HTTP-Request-Smuggling.html
- http://packetstormsecurity.com/files/176334/Apache-2.4.55-mod_proxy-HTTP-Request-Smuggling.html
- https://httpd.apache.org/security/vulnerabilities_24.html
- https://httpd.apache.org/security/vulnerabilities_24.html
- https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html
- https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html
- https://security.gentoo.org/glsa/202309-01
- https://security.gentoo.org/glsa/202309-01
Modified: 2025-02-13
CVE-2023-27522
HTTP Response Smuggling vulnerability in Apache HTTP Server via mod_proxy_uwsgi. This issue affects Apache HTTP Server: from 2.4.30 through 2.4.55. Special characters in the origin response header can truncate/split the response forwarded to the client.
- https://httpd.apache.org/security/vulnerabilities_24.html
- https://httpd.apache.org/security/vulnerabilities_24.html
- https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html
- https://lists.debian.org/debian-lts-announce/2023/04/msg00028.html
- https://security.gentoo.org/glsa/202309-01
- https://security.gentoo.org/glsa/202309-01
Package admx-basealt updated to version 0.1.12.3-alt1 for branch sisyphus_e2k.
Closed bugs
Переименовать политики "Управление ярлычками" и "Управление ярлычками для пользователей"
Добавить информацию про начальный / конечный цвет градиента
Опечатка в описании политики Группы для контроля доступа к серверу OpenSSH