ALT-BU-2023-4402-2
Branch sisyphus update bulletin.
Package qt5-script updated to version 5.15.10-alt1 for branch sisyphus in task 324640.
Closed bugs
qt5-script: ошибка сборки на LoongArch
Package qt5-webengine updated to version 5.15.14-alt1 for branch sisyphus in task 324640.
Closed vulnerabilities
Modified: 2025-01-28
CVE-2023-32573
In Qt before 5.15.14, 6.0.x through 6.2.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1, QtSvg QSvgFont m_unitsPerEm initialization is mishandled.
- https://codereview.qt-project.org/c/qt/qtsvg/+/474093
- https://codereview.qt-project.org/c/qt/qtsvg/+/474093
- [debian-lts-announce] 20230822 [SECURITY] [DLA 3539-1] qt4-x11 security update
- [debian-lts-announce] 20230822 [SECURITY] [DLA 3539-1] qt4-x11 security update
- FEDORA-2023-0d4b3316f6
- FEDORA-2023-0d4b3316f6
Modified: 2024-11-21
CVE-2023-32762
An issue was discovered in Qt before 5.15.14, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1. Qt Network incorrectly parses the strict-transport-security (HSTS) header, allowing unencrypted connections to be established, even when explicitly prohibited by the server. This happens if the case used for this header does not exactly match.
- https://codereview.qt-project.org/c/qt/qtbase/+/476140
- https://github.com/qt/qtbase/commit/1b736a815be0222f4b24289cf17575fc15707305
- [debian-lts-announce] 20240430 [SECURITY] [DLA 3805-1] qtbase-opensource-src security update
- https://lists.qt-project.org/pipermail/announce/2023-May/000414.html
- https://codereview.qt-project.org/c/qt/qtbase/+/476140
- https://lists.qt-project.org/pipermail/announce/2023-May/000414.html
- [debian-lts-announce] 20240430 [SECURITY] [DLA 3805-1] qtbase-opensource-src security update
- https://github.com/qt/qtbase/commit/1b736a815be0222f4b24289cf17575fc15707305
Package linux-tools updated to version 6.4-alt1 for branch sisyphus in task 324765.
Closed vulnerabilities
BDU:2023-03656
Уязвимость функции nft_set_lookup_global() подсистемы Netfilter ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии и вызвать отказ в обслуживании
Modified: 2023-11-07
CVE-2023-3117
Rejected reason: Duplicate of CVE-2023-3390.
Package installer-feature-bootloader-lilo updated to version 0.1.0-alt1.1 for branch sisyphus in task 324788.
Closed bugs
Ошибка в summary в слове bootloader
Package installer-feature-bootloader-grub updated to version 0.1.0-alt4 for branch sisyphus in task 324787.
Closed bugs
Ошибка в summary в слове bootloader
Package observium-ce updated to version 23.1-alt0.1 for branch sisyphus in task 324802.
Closed bugs
Обновить до
Package gnome-shell updated to version 44.3-alt1.1 for branch sisyphus in task 324779.
Closed bugs
gnome-shell-data зависит от gnome-shell
Closed bugs
Добавить пакету phosh зависимости на gnome-shell-data и mutter-gnome
Closed vulnerabilities
BDU:2023-00154
Уязвимость реализации сценария remote_agent.php программного средства мониторинга сети Cacti, позволяющая нарушителю выполнить произвольные команды
Modified: 2025-02-18
CVE-2022-46169
Cacti is an open source platform which provides a robust and extensible operational monitoring and fault management framework for users. In affected versions a command injection vulnerability allows an unauthenticated user to execute arbitrary code on a server running Cacti, if a specific data source was selected for any monitored device. The vulnerability resides in the `remote_agent.php` file. This file can be accessed without authentication. This function retrieves the IP address of the client via `get_client_addr` and resolves this IP address to the corresponding hostname via `gethostbyaddr`. After this, it is verified that an entry within the `poller` table exists, where the hostname corresponds to the resolved hostname. If such an entry was found, the function returns `true` and the client is authorized. This authorization can be bypassed due to the implementation of the `get_client_addr` function. The function is defined in the file `lib/functions.php` and checks serval `$_SERVER` variables to determine the IP address of the client. The variables beginning with `HTTP_` can be arbitrarily set by an attacker. Since there is a default entry in the `poller` table with the hostname of the server running Cacti, an attacker can bypass the authentication e.g. by providing the header `Forwarded-For:
- https://github.com/Cacti/cacti/commit/7f0e16312dd5ce20f93744ef8b9c3b0f1ece2216
- https://github.com/Cacti/cacti/commit/7f0e16312dd5ce20f93744ef8b9c3b0f1ece2216
- https://github.com/Cacti/cacti/commit/a8d59e8fa5f0054aa9c6981b1cbe30ef0e2a0ec9
- https://github.com/Cacti/cacti/commit/a8d59e8fa5f0054aa9c6981b1cbe30ef0e2a0ec9
- https://github.com/Cacti/cacti/commit/b43f13ae7f1e6bfe4e8e56a80a7cd867cf2db52b
- https://github.com/Cacti/cacti/commit/b43f13ae7f1e6bfe4e8e56a80a7cd867cf2db52b
- https://github.com/Cacti/cacti/security/advisories/GHSA-6p93-p743-35gf
- https://github.com/Cacti/cacti/security/advisories/GHSA-6p93-p743-35gf
Closed vulnerabilities
BDU:2023-00696
Уязвимость утилиты для текстовых терминалов UNIX-подобных систем Less, связанная с некорректной фильтрацией встроенных последовательностей ANSI при обработке элемента -R, позволяющая нарушителю повысить свои привилегии
Modified: 2025-03-25
CVE-2022-46663
In GNU Less before 609, crafted data can result in "less -R" not filtering ANSI escape sequences sent to the terminal.
- http://www.greenwoodsoftware.com/less/news.609.html
- http://www.greenwoodsoftware.com/less/news.609.html
- [oss-security] 20230207 CVE-2022-46663: less -R filtering bypass
- [oss-security] 20230207 CVE-2022-46663: less -R filtering bypass
- https://github.com/gwsw/less/commit/a78e1351113cef564d790a730d657a321624d79c
- https://github.com/gwsw/less/commit/a78e1351113cef564d790a730d657a321624d79c
- FEDORA-2023-71442d7613
- FEDORA-2023-71442d7613
- GLSA-202310-11
- GLSA-202310-11
- https://www.openwall.com/lists/oss-security/2023/02/07/7
- https://www.openwall.com/lists/oss-security/2023/02/07/7