ALT-BU-2023-4077-4
Branch sisyphus update bulletin.
Closed bugs
Не запускается программа RasMol
Closed vulnerabilities
BDU:2023-03124
Уязвимость текстового поля для ввода пароля менеджера паролей KeePass, связанная с хранением учетных данных в незашифрованном виде, позволяющая нарушителю восстановить мастер-пароль в открытом виде
Modified: 2024-11-02
BDU:2023-07674
Уязвимость менеджера паролей KeePass, связанная с незашифрованным хранением критичной информации, позволяющая нарушителю получить пароли в открытом виде
Modified: 2024-11-21
CVE-2023-24055
KeePass through 2.53 (in a default installation) allows an attacker, who has write access to the XML configuration file, to obtain the cleartext passwords by adding an export trigger. NOTE: the vendor's position is that the password database is not intended to be secure against an attacker who has that level of access to the local PC.
- https://securityboulevard.com/2023/01/keepass-password-manager-leak-cve-richixbw/
- https://sourceforge.net/p/keepass/discussion/329220/thread/a146e5cf6b/
- https://sourceforge.net/p/keepass/feature-requests/2773/
- https://securityboulevard.com/2023/01/keepass-password-manager-leak-cve-richixbw/
- https://sourceforge.net/p/keepass/discussion/329220/thread/a146e5cf6b/
- https://sourceforge.net/p/keepass/feature-requests/2773/
Modified: 2025-01-23
CVE-2023-32784
In KeePass 2.x before 2.54, it is possible to recover the cleartext master password from a memory dump, even when a workspace is locked or no longer running. The memory dump can be a KeePass process dump, swap file (pagefile.sys), hibernation file (hiberfil.sys), or RAM dump of the entire system. The first character cannot be recovered. In 2.54, there is different API usage and/or random string insertion for mitigation.
- https://github.com/keepassxreboot/keepassxc/discussions/9433
- https://github.com/vdohney/keepass-password-dumper
- https://sourceforge.net/p/keepass/discussion/329220/thread/f3438e6283/
- https://github.com/keepassxreboot/keepassxc/discussions/9433
- https://github.com/vdohney/keepass-password-dumper
- https://sourceforge.net/p/keepass/discussion/329220/thread/f3438e6283/
Package hunspell-mhr updated to version 230312-alt2 for branch sisyphus in task 323760.
Closed bugs
Отсутствует языковой пакет языка марийского-лугового диалекта
Closed bugs
epm play netbeans: программа не устанавливается
Closed vulnerabilities
Modified: 2025-09-05
BDU:2023-02923
Уязвимость функции EncodeAlphaInternal() библиотеки libwebp для кодирования и декодирования изображений в формате WebP браузеров Mozilla Firefox, Firefox ESR и почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-02-13
CVE-2023-1999
There exists a use after free/double free in libwebp. An attacker can use the ApplyFiltersAndEncode() function and loop through to free best.bw and assign best = trial pointer. The second loop will then return 0 because of an Out of memory error in VP8 encoder, the pointer is still assigned to trial and the AddressSanitizer will attempt a double free.
Closed bugs
Нет справки
Closed vulnerabilities
BDU:2023-07707
Уязвимость функции set_term_title() (ipython/IPython/utils/terminal.py) командной оболочки для интерактивных вычислений IPython, позволяющая нарушителю выполнить произвольные команды
Modified: 2024-11-21
CVE-2023-24816
IPython (Interactive Python) is a command shell for interactive computing in multiple programming languages, originally developed for the Python programming language. Versions prior to 8.1.0 are subject to a command injection vulnerability with very specific prerequisites. This vulnerability requires that the function `IPython.utils.terminal.set_term_title` be called on Windows in a Python environment where ctypes is not available. The dependency on `ctypes` in `IPython.utils._process_win32` prevents the vulnerable code from ever being reached in the ipython binary. However, as a library that could be used by another tool `set_term_title` could be called and hence introduce a vulnerability. Should an attacker get untrusted input to an instance of this function they would be able to inject shell commands as current process and limited to the scope of the current process. Users of ipython as a library are advised to upgrade. Users unable to upgrade should ensure that any calls to the `IPython.utils.terminal.set_term_title` function are done with trusted or filtered input.
- https://github.com/ipython/ipython/blob/3f0bf05f072a91b2a3042d23ce250e5e906183fd/IPython/utils/terminal.py#L103-L117
- https://github.com/ipython/ipython/blob/56e6925dfa50e2c7f4a6471547b8176275db7c25/IPython/utils/_process_win32.py#L20
- https://github.com/ipython/ipython/commit/385d69325319a5972ee9b5983638e3617f21cb1f
- https://github.com/ipython/ipython/security/advisories/GHSA-29gw-9793-fvw7
- https://github.com/ipython/ipython/blob/3f0bf05f072a91b2a3042d23ce250e5e906183fd/IPython/utils/terminal.py#L103-L117
- https://github.com/ipython/ipython/blob/56e6925dfa50e2c7f4a6471547b8176275db7c25/IPython/utils/_process_win32.py#L20
- https://github.com/ipython/ipython/commit/385d69325319a5972ee9b5983638e3617f21cb1f
- https://github.com/ipython/ipython/security/advisories/GHSA-29gw-9793-fvw7
Modified: 2024-09-24
GHSA-29gw-9793-fvw7
IPython vulnerable to command injection via set_term_title
- https://github.com/ipython/ipython/security/advisories/GHSA-29gw-9793-fvw7
- https://nvd.nist.gov/vuln/detail/CVE-2023-24816
- https://github.com/ipython/ipython/commit/385d69325319a5972ee9b5983638e3617f21cb1f
- https://github.com/ipython/ipython/commit/991849c247fc208628879e7ca2923b3c218a5a75
- https://github.com/Carreau/ipython/blob/7557ade0ed927475d5ab5b573d0ea4febfb22683/docs/source/whatsnew/version8.rst#ipython-810
- https://github.com/ipython/ipython
- https://github.com/ipython/ipython/blob/3f0bf05f072a91b2a3042d23ce250e5e906183fd/IPython/utils/terminal.py#L103-L117
- https://github.com/ipython/ipython/blob/56e6925dfa50e2c7f4a6471547b8176275db7c25/IPython/utils/_process_win32.py#L20
- https://github.com/pypa/advisory-database/tree/main/vulns/ipython/PYSEC-2023-17.yaml
Package system-monitoring-center updated to version 1.43.6-alt1 for branch sisyphus in task 323907.
Closed bugs
Не отображаются пользователи в system-monitoring-center
Опечатка в Comment[ru_RU] для system-monitoring-center
Closed vulnerabilities
Modified: 2025-03-05
BDU:2023-05969
Уязвимость компонента nsswitch.conf библиотеки, обеспечивающей системные вызовы и основные функции glibc, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-09-26
CVE-2023-4813
A flaw has been identified in glibc. In an uncommon situation, the gaih_inet function may use memory that has been freed, resulting in an application crash. This issue is only exploitable when the getaddrinfo function is called and the hosts database in /etc/nsswitch.conf is configured with SUCCESS=continue or SUCCESS=merge.
- https://access.redhat.com/errata/RHBA-2024:2413
- https://access.redhat.com/errata/RHSA-2023:5453
- https://access.redhat.com/errata/RHSA-2023:5455
- https://access.redhat.com/errata/RHSA-2023:7409
- https://access.redhat.com/security/cve/CVE-2023-4813
- https://bugzilla.redhat.com/show_bug.cgi?id=2237798
- http://www.openwall.com/lists/oss-security/2023/10/03/8
- https://access.redhat.com/errata/RHSA-2023:5453
- https://access.redhat.com/errata/RHSA-2023:5455
- https://access.redhat.com/errata/RHSA-2023:7409
- https://access.redhat.com/security/cve/CVE-2023-4813
- https://bugzilla.redhat.com/show_bug.cgi?id=2237798
- https://security.netapp.com/advisory/ntap-20231110-0003/
Modified: 2026-04-09
CVE-2026-3904
Calling NSS-backed functions that support caching via nscd may call the nscd client side code and in the GNU C Library version 2.36 under high load on x86_64 systems, the client may call memcmp on inputs that are concurrently modified by other processes or threads and crash. The nscd client in the GNU C Library uses the memcmp function with inputs that may be concurrently modified by another thread, potentially resulting in spurious cache misses, which in itself is not a security issue. However in the GNU C Library version 2.36 an optimized implementation of memcmp was introduced for x86_64 which could crash when invoked with such undefined behaviour, turning this into a potential crash of the nscd client and the application that uses it. This implementation was backported to the 2.35 branch, making the nscd client in that branch vulnerable as well. Subsequently, the fix for this issue was backported to all vulnerable branches in the GNU C Library repository. It is advised that distributions that may have cherry-picked the memcpy SSE2 optimization in their copy of the GNU C Library, also apply the fix to avoid the potential crash in the nscd client.
- https://sourceware.org/bugzilla/show_bug.cgi?id=29863
- https://sourceware.org/git/?p=glibc.git;a=blob_plain;f=advisories/GLIBC-SA-2026-0004;hb=HEAD
- https://sourceware.org/git/?p=glibc.git;a=commit;h=8804157ad9da39631703b92315460808eac86b0c
- https://sourceware.org/git/?p=glibc.git;a=commit;h=b712be52645282c706a5faa038242504feb06db5
- http://www.openwall.com/lists/oss-security/2026/03/11/5
