ALT-BU-2023-2962-1
Branch sisyphus update bulletin.
Package phpMyAdmin updated to version 5.2.1-alt1 for branch sisyphus in task 317357.
Closed vulnerabilities
Modified: 2025-03-21
CVE-2023-25727
In phpMyAdmin before 4.9.11 and 5.x before 5.2.1, an authenticated user can trigger XSS by uploading a crafted .sql file through the drag-and-drop interface.
Package qt5-webengine updated to version 5.15.13-alt1 for branch sisyphus in task 317373.
Closed vulnerabilities
BDU:2023-02373
Уязвимость плагина SQL ODBC кроссплатформенного фреймворка для разработки программного обеспечения Qt, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2023-24607
Qt before 6.4.3 allows a denial of service via a crafted string when the SQL ODBC driver plugin is used and the size of SQLTCHAR is 4. The affected versions are 5.x before 5.15.13, 6.x before 6.2.8, and 6.3.x before 6.4.3.
- https://codereview.qt-project.org/c/qt/qtbase/+/456216
- https://codereview.qt-project.org/c/qt/qtbase/+/456216
- https://codereview.qt-project.org/c/qt/tqtc-qtbase/+/456217
- https://codereview.qt-project.org/c/qt/tqtc-qtbase/+/456217
- https://codereview.qt-project.org/c/qt/tqtc-qtbase/+/456238
- https://codereview.qt-project.org/c/qt/tqtc-qtbase/+/456238
- https://download.qt.io/official_releases/qt/5.15/CVE-2023-24607-qtbase-5.15.diff
- https://download.qt.io/official_releases/qt/5.15/CVE-2023-24607-qtbase-5.15.diff
- https://github.com/qt/qtbase/commit/aaf1381eab6292aa0444a5eadcc24165b6e1c02d
- https://github.com/qt/qtbase/commit/aaf1381eab6292aa0444a5eadcc24165b6e1c02d
- [debian-lts-announce] 20240430 [SECURITY] [DLA 3805-1] qtbase-opensource-src security update
- [debian-lts-announce] 20240430 [SECURITY] [DLA 3805-1] qtbase-opensource-src security update
- https://www.qt.io/blog/security-advisory-qt-sql-odbc-driver-plugin
- https://www.qt.io/blog/security-advisory-qt-sql-odbc-driver-plugin
- https://www.qt.io/blog/tag/security
- https://www.qt.io/blog/tag/security
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-4172
An integer overflow and buffer overflow issues were found in the ACPI Error Record Serialization Table (ERST) device of QEMU in the read_erst_record() and write_erst_record() functions. Both issues may allow the guest to overrun the host buffer allocated for the ERST memory device. A malicious guest could use these flaws to crash the QEMU process on the host.
- https://gitlab.com/qemu-project/qemu/-/commit/defb7098
- https://gitlab.com/qemu-project/qemu/-/commit/defb7098
- https://gitlab.com/qemu-project/qemu/-/issues/1268
- https://gitlab.com/qemu-project/qemu/-/issues/1268
- FEDORA-2022-22b1f8dae2
- FEDORA-2022-22b1f8dae2
- https://lore.kernel.org/qemu-devel/20221024154233.1043347-1-lk%40c--e.de/
- https://lore.kernel.org/qemu-devel/20221024154233.1043347-1-lk%40c--e.de/
- https://security.netapp.com/advisory/ntap-20230127-0013/
- https://security.netapp.com/advisory/ntap-20230127-0013/
Closed vulnerabilities
BDU:2023-00758
Уязвимость серверного программного обеспечения HAProxy, связанная с недостатками обработки HTTP-запросов, позволяющая нарушителю выполнять атаку «контрабанда HTTP-запросов»
Modified: 2025-02-18
CVE-2023-0836
An information leak vulnerability was discovered in HAProxy 2.1, 2.2 before 2.2.27, 2.3, 2.4 before 2.4.21, 2.5 before 2.5.11, 2.6 before 2.6.8, 2.7 before 2.7.1. There are 5 bytes left uninitialized in the connection buffer when encoding the FCGI_BEGIN_REQUEST record. Sensitive data may be disclosed to configured FastCGI backends in an unexpected way.
Modified: 2025-03-20
CVE-2023-25725
HAProxy before 2.7.3 may allow a bypass of access control because HTTP/1 headers are inadvertently lost in some situations, aka "request smuggling." The HTTP header parsers in HAProxy may accept empty header field names, which could be used to truncate the list of HTTP headers and thus make some headers disappear after being parsed and processed for HTTP/1.0 and HTTP/1.1. For HTTP/2 and HTTP/3, the impact is limited because the headers disappear before being parsed and processed, as if they had not been sent by the client. The fixed versions are 2.7.3, 2.6.9, 2.5.12, 2.4.22, 2.2.29, and 2.0.31.
- https://git.haproxy.org/?p=haproxy-2.7.git%3Ba=commit%3Bh=a0e561ad7f29ed50c473f5a9da664267b60d1112
- https://git.haproxy.org/?p=haproxy-2.7.git%3Ba=commit%3Bh=a0e561ad7f29ed50c473f5a9da664267b60d1112
- [debian-lts-announce] 20230214 [SECURITY] [DLA 3318-1] haproxy security update
- [debian-lts-announce] 20230214 [SECURITY] [DLA 3318-1] haproxy security update
- FEDORA-2023-7e04833463
- FEDORA-2023-7e04833463
- FEDORA-2023-3e8a21cd5b
- FEDORA-2023-3e8a21cd5b
- DSA-5348
- DSA-5348
- https://www.haproxy.org/
- https://www.haproxy.org/
Package knot-resolver updated to version 5.6.0-alt1 for branch sisyphus in task 317406.
Closed vulnerabilities
Modified: 2025-03-14
CVE-2023-26249
Knot Resolver before 5.6.0 enables attackers to consume its resources, launching amplification attacks and potentially causing a denial of service. Specifically, a single client query may lead to a hundred TCP connection attempts if a DNS server closes connections without providing a response.
Package python3-module-django updated to version 3.2.18-alt1 for branch sisyphus in task 317426.
Closed vulnerabilities
BDU:2023-00662
Уязвимость программной платформы для веб-приложений Django, связанная с неограниченным распределением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-03-27
CVE-2023-23969
In Django 3.2 before 3.2.17, 4.0 before 4.0.9, and 4.1 before 4.1.6, the parsed values of Accept-Language headers are cached in order to avoid repetitive parsing. This leads to a potential denial-of-service vector via excessive memory usage if the raw value of Accept-Language headers is very large.
- https://docs.djangoproject.com/en/4.1/releases/security/
- https://docs.djangoproject.com/en/4.1/releases/security/
- https://groups.google.com/forum/#%21forum/django-announce
- https://groups.google.com/forum/#%21forum/django-announce
- [debian-lts-announce] 20230201 [SECURITY] [DLA 3306-1] python-django security update
- [debian-lts-announce] 20230201 [SECURITY] [DLA 3306-1] python-django security update
- FEDORA-2023-8fed428c5e
- FEDORA-2023-8fed428c5e
- FEDORA-2023-a53ab7c969
- FEDORA-2023-a53ab7c969
- https://security.netapp.com/advisory/ntap-20230302-0007/
- https://security.netapp.com/advisory/ntap-20230302-0007/
- https://www.djangoproject.com/weblog/2023/feb/01/security-releases/
- https://www.djangoproject.com/weblog/2023/feb/01/security-releases/
Modified: 2025-03-18
CVE-2023-24580
An issue was discovered in the Multipart Request Parser in Django 3.2 before 3.2.18, 4.0 before 4.0.10, and 4.1 before 4.1.7. Passing certain inputs (e.g., an excessive number of parts) to multipart forms could result in too many open files or memory exhaustion, and provided a potential vector for a denial-of-service attack.
- http://www.openwall.com/lists/oss-security/2023/02/14/1
- http://www.openwall.com/lists/oss-security/2023/02/14/1
- https://docs.djangoproject.com/en/4.1/releases/security/
- https://docs.djangoproject.com/en/4.1/releases/security/
- https://groups.google.com/forum/#%21forum/django-announce
- https://groups.google.com/forum/#%21forum/django-announce
- [debian-lts-announce] 20230220 [SECURITY] [DLA 3329-1] python-django security update
- [debian-lts-announce] 20230220 [SECURITY] [DLA 3329-1] python-django security update
- FEDORA-2023-bde7913e5a
- FEDORA-2023-bde7913e5a
- FEDORA-2023-8fed428c5e
- FEDORA-2023-8fed428c5e
- FEDORA-2023-a53ab7c969
- FEDORA-2023-a53ab7c969
- FEDORA-2023-3d775d93be
- FEDORA-2023-3d775d93be
- FEDORA-2023-a74513bda8
- FEDORA-2023-a74513bda8
- https://security.netapp.com/advisory/ntap-20230316-0006/
- https://security.netapp.com/advisory/ntap-20230316-0006/
- https://www.djangoproject.com/weblog/2023/feb/14/security-releases/
- https://www.djangoproject.com/weblog/2023/feb/14/security-releases/