ALT-BU-2023-3852-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-45061
An issue was discovered in Python before 3.11.1. An unnecessary quadratic algorithm exists in one path when processing some inputs to the IDNA (RFC 3490) decoder, such that a crafted, unreasonably long name being presented to the decoder could lead to a CPU denial of service. Hostnames are often supplied by remote servers that could be controlled by a malicious actor; in such a scenario, they could trigger excessive CPU consumption on the client attempting to make use of an attacker-supplied supposed hostname. For example, the attack payload could be placed in the Location header of an HTTP response with status code 302. A fix is planned in 3.11.1, 3.10.9, 3.9.16, 3.8.16, and 3.7.16.
- https://github.com/python/cpython/issues/98433
- https://github.com/python/cpython/issues/98433
- [debian-lts-announce] 20230524 [SECURITY] [DLA 3432-1] python2.7 security update
- [debian-lts-announce] 20230524 [SECURITY] [DLA 3432-1] python2.7 security update
- [debian-lts-announce] 20230630 [SECURITY] [DLA 3477-1] python3.7 security update
- [debian-lts-announce] 20230630 [SECURITY] [DLA 3477-1] python3.7 security update
- FEDORA-2022-bcf089dd07
- FEDORA-2022-bcf089dd07
- FEDORA-2022-3d7e44dbd5
- FEDORA-2022-3d7e44dbd5
- FEDORA-2022-3e859b6bc6
- FEDORA-2022-3e859b6bc6
- FEDORA-2022-50deb53896
- FEDORA-2022-50deb53896
- FEDORA-2023-f1381c83af
- FEDORA-2023-f1381c83af
- FEDORA-2022-6ba889e0e3
- FEDORA-2022-6ba889e0e3
- FEDORA-2023-5460cf6dfb
- FEDORA-2023-5460cf6dfb
- FEDORA-2023-c43a940a93
- FEDORA-2023-c43a940a93
- FEDORA-2022-e1ce71ff40
- FEDORA-2022-e1ce71ff40
- FEDORA-2023-943556a733
- FEDORA-2023-943556a733
- FEDORA-2022-de755fd092
- FEDORA-2022-de755fd092
- FEDORA-2022-e699dd5247
- FEDORA-2022-e699dd5247
- FEDORA-2022-dbb811d203
- FEDORA-2022-dbb811d203
- FEDORA-2022-6b8b96f883
- FEDORA-2022-6b8b96f883
- FEDORA-2022-45d2cfdfa4
- FEDORA-2022-45d2cfdfa4
- FEDORA-2022-93c6916349
- FEDORA-2022-93c6916349
- FEDORA-2022-e6d0495206
- FEDORA-2022-e6d0495206
- FEDORA-2023-129178fd27
- FEDORA-2023-129178fd27
- FEDORA-2023-af5206f71d
- FEDORA-2023-af5206f71d
- FEDORA-2023-097dd40685
- FEDORA-2023-097dd40685
- FEDORA-2022-fd3771db30
- FEDORA-2022-fd3771db30
- FEDORA-2022-fdb2739feb
- FEDORA-2022-fdb2739feb
- FEDORA-2022-18b234c18b
- FEDORA-2022-18b234c18b
- FEDORA-2022-fbf6a320fe
- FEDORA-2022-fbf6a320fe
- FEDORA-2022-6d51289820
- FEDORA-2022-6d51289820
- FEDORA-2023-a990c93ed0
- FEDORA-2023-a990c93ed0
- FEDORA-2023-78b4ce2f23
- FEDORA-2023-78b4ce2f23
- FEDORA-2022-b2f06fbb62
- FEDORA-2022-b2f06fbb62
- FEDORA-2022-6f4e6120d7
- FEDORA-2022-6f4e6120d7
- GLSA-202305-02
- GLSA-202305-02
- https://security.netapp.com/advisory/ntap-20221209-0007/
- https://security.netapp.com/advisory/ntap-20221209-0007/
Closed bugs
python3: поддержка архитектуры LoongArch
python3: упрощение начальной (bootstrap) сборки
Closed bugs
Q: ppc64le support
Closed vulnerabilities
Modified: 2024-11-21
CVE-2023-2618
A vulnerability, which was classified as problematic, has been found in OpenCV wechat_qrcode Module up to 4.7.0. Affected by this issue is the function DecodedBitStreamParser::decodeHanziSegment of the file qrcode/decoder/decoded_bit_stream_parser.cpp. The manipulation leads to memory leak. The attack may be launched remotely. The name of the patch is 2b62ff6181163eea029ed1cab11363b4996e9cd6. It is recommended to apply a patch to fix this issue. The identifier of this vulnerability is VDB-228548.
- https://github.com/opencv/opencv_contrib/pull/3484
- https://github.com/opencv/opencv_contrib/pull/3484/commits/2b62ff6181163eea029ed1cab11363b4996e9cd6
- https://vuldb.com/?ctiid.228548
- https://vuldb.com/?id.228548
- https://github.com/opencv/opencv_contrib/pull/3484
- https://vuldb.com/?id.228548
- https://vuldb.com/?ctiid.228548
- https://github.com/opencv/opencv_contrib/pull/3484/commits/2b62ff6181163eea029ed1cab11363b4996e9cd6