ALT-BU-2023-2896-1
Branch sisyphus_e2k update bulletin.
Package libshout-idjc updated to version 2.4.3-alt1_3 for branch sisyphus_e2k.
Closed bugs
Файловый конфликт с пакетом libshout-idjc-devel
Package retext updated to version 7.2.3-alt2 for branch sisyphus_e2k.
Closed bugs
Зависит от python3(PyQt5.QtWebKit) и python3(PyQt5.QtWebKitWidgets)
Package sleuthkit updated to version 4.12.0-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
Modified: 2025-04-02
CVE-2022-45639
OS Command injection vulnerability in sleuthkit fls tool 4.11.1 allows attackers to execute arbitrary commands via a crafted value to the m parameter. NOTE: third parties have disputed this because there is no analysis showing that the backtick command executes outside the context of the user account that entered the command line.
- http://packetstormsecurity.com/files/171649/Sleuthkit-4.11.1-Command-Injection.html
- http://www.binaryworld.it/
- https://www.binaryworld.it/guidepoc.asp#CVE-2022-45639
- http://packetstormsecurity.com/files/171649/Sleuthkit-4.11.1-Command-Injection.html
- https://www.binaryworld.it/guidepoc.asp#CVE-2022-45639
- http://www.binaryworld.it/
Package wp-cli updated to version 2.7.1-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-29504
WP-CLI is the command-line interface for WordPress. An improper error handling in HTTPS requests management in WP-CLI version 0.12.0 and later allows remote attackers able to intercept the communication to remotely disable the certificate verification on WP-CLI side, gaining full control over the communication content, including the ability to impersonate update servers and push malicious updates towards WordPress instances controlled by the vulnerable WP-CLI agent, or push malicious updates toward WP-CLI itself. The vulnerability stems from the fact that the default behavior of `WP_CLI\Utils\http_request()` when encountering a TLS handshake error is to disable certificate validation and retry the same request. The default behavior has been changed with version 2.5.0 of WP-CLI and the `wp-cli/wp-cli` framework (via https://github.com/wp-cli/wp-cli/pull/5523) so that the `WP_CLI\Utils\http_request()` method accepts an `$insecure` option that is `false` by default and consequently that a TLS handshake failure is a hard error by default. This new default is a breaking change and ripples through to all consumers of `WP_CLI\Utils\http_request()`, including those in separate WP-CLI bundled or third-party packages. https://github.com/wp-cli/wp-cli/pull/5523 has also added an `--insecure` flag to the `cli update` command to counter this breaking change. There is no direct workaround for the default insecure behavior of `wp-cli/wp-cli` versions before 2.5.0. The workaround for dealing with the breaking change in the commands directly affected by the new secure default behavior is to add the `--insecure` flag to manually opt-in to the previous insecure behavior.
- https://github.com/wp-cli/checksum-command/pull/86
- https://github.com/wp-cli/checksum-command/pull/86
- https://github.com/wp-cli/config-command/pull/128
- https://github.com/wp-cli/config-command/pull/128
- https://github.com/wp-cli/core-command/pull/186
- https://github.com/wp-cli/core-command/pull/186
- https://github.com/wp-cli/extension-command/pull/287
- https://github.com/wp-cli/extension-command/pull/287
- https://github.com/wp-cli/package-command/pull/138
- https://github.com/wp-cli/package-command/pull/138
- https://github.com/wp-cli/wp-cli/pull/5523
- https://github.com/wp-cli/wp-cli/pull/5523
- https://github.com/wp-cli/wp-cli/security/advisories/GHSA-rwgm-f83r-v3qj
- https://github.com/wp-cli/wp-cli/security/advisories/GHSA-rwgm-f83r-v3qj
Package alien updated to version 8.95.6-alt1 for branch sisyphus_e2k.
Closed bugs
Неверная версия
Package timeshift updated to version 22.11.1-alt4 for branch sisyphus_e2k.
Closed bugs
В системе WS 10.1 Mate обновление timeshift пытается поставить kde5-konsole
Package xterm updated to version 379-alt2 for branch sisyphus_e2k.
Closed bugs
[FR] Put /usr/bin/resize into a separate subpackage
Package gimp-plugin-bimp updated to version 2.6-alt2 for branch sisyphus_e2k.
Closed bugs
Не устанавливается исполняемый файл bimp
Package eepm updated to version 3.34.1-alt1 for branch sisyphus_e2k.
Closed bugs
Не собирает zoom
Package glpi updated to version 10.0.6-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-41941
GLPI is a Free Asset and IT Management Software package. Versions 10.0.0 and above, prior to 10.0.6, are subject to Cross-site Scripting. An administrator may store malicious code in help links. This issue is patched in 10.0.6.
Modified: 2024-11-21
CVE-2023-22500
GLPI is a Free Asset and IT Management Software package. Versions 10.0.0 and above, prior to 10.0.6 are vulnerable to Incorrect Authorization. This vulnerability allow unauthorized access to inventory files. Thus, if anonymous access to FAQ is allowed, inventory files are accessbile by unauthenticated users. This issue is patched in version 10.0.6. As a workaround, disable native inventory and delete inventory files from server (default location is `files/_inventory`).
Modified: 2024-11-21
CVE-2023-22722
GLPI is a Free Asset and IT Management Software package. Versions 9.4.0 and above, prior to 10.0.6 are subject to Cross-site Scripting. An attacker can persuade a victim into opening a URL containing a payload exploiting this vulnerability. After exploited, the attacker can make actions as the victim or exfiltrate session cookies. This issue is patched in version 10.0.6.
Modified: 2024-11-21
CVE-2023-22724
GLPI is a Free Asset and IT Management Software package. Versions prior to 10.0.6 are subject to Cross-site Scripting via malicious RSS feeds. An Administrator can import a malicious RSS feed that contains Cross Site Scripting (XSS) payloads inside RSS links. Victims who wish to visit an RSS content and click on the link will execute the Javascript. This issue is patched in 10.0.6.
Modified: 2024-11-21
CVE-2023-22725
GLPI is a Free Asset and IT Management Software package. Versions 0.6.0 and above, prior to 10.0.6 are vulnerable to Cross-site Scripting. This vulnerability allow for an administrator to create a malicious external link. This issue is patched in 10.0.6.
Modified: 2024-11-21
CVE-2023-23610
GLPI is a Free Asset and IT Management Software package. Versions prior to 9.5.12 and 10.0.6 are vulnerable to Improper Privilege Management. Any user having access to the standard interface can export data of almost any GLPI item type, even those on which user is not allowed to access (including assets, tickets, users, ...). This issue is patched in 10.0.6.