ALT-BU-2023-4402-2
Branch sisyphus update bulletin.
Package qt5-script updated to version 5.15.10-alt1 for branch sisyphus in task 324640.
Closed bugs
qt5-script: ошибка сборки на LoongArch
Package qt5-webengine updated to version 5.15.14-alt1 for branch sisyphus in task 324640.
Closed vulnerabilities
Modified: 2025-01-27
CVE-2023-32573
In Qt before 5.15.14, 6.0.x through 6.2.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1, QtSvg QSvgFont m_unitsPerEm initialization is mishandled.
- https://codereview.qt-project.org/c/qt/qtsvg/+/474093
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3IHQZCEUFVOPWG75V2HDKXNUZBB4FX/
- https://codereview.qt-project.org/c/qt/qtsvg/+/474093
- https://lists.debian.org/debian-lts-announce/2023/08/msg00028.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3IHQZCEUFVOPWG75V2HDKXNUZBB4FX/
Modified: 2025-03-05
CVE-2023-32762
An issue was discovered in Qt before 5.15.14, 6.x before 6.2.9, and 6.3.x through 6.5.x before 6.5.1. Qt Network incorrectly parses the strict-transport-security (HSTS) header, allowing unencrypted connections to be established, even when explicitly prohibited by the server. This happens if the case used for this header does not exactly match.
- https://codereview.qt-project.org/c/qt/qtbase/+/476140
- https://github.com/qt/qtbase/commit/1b736a815be0222f4b24289cf17575fc15707305
- https://lists.debian.org/debian-lts-announce/2024/04/msg00027.html
- https://lists.qt-project.org/pipermail/announce/2023-May/000414.html
- https://codereview.qt-project.org/c/qt/qtbase/+/476140
- https://github.com/qt/qtbase/commit/1b736a815be0222f4b24289cf17575fc15707305
- https://lists.debian.org/debian-lts-announce/2024/04/msg00027.html
- https://lists.qt-project.org/pipermail/announce/2023-May/000414.html
Package linux-tools updated to version 6.4-alt1 for branch sisyphus in task 324765.
Closed vulnerabilities
Modified: 2024-01-09
BDU:2023-03656
Уязвимость функции nft_set_lookup_global() подсистемы Netfilter ядра операционных систем Linux, позволяющая нарушителю повысить свои привилегии и вызвать отказ в обслуживании
Modified: 2023-11-07
CVE-2023-3117
Rejected reason: Duplicate of CVE-2023-3390.
Package installer-feature-bootloader-lilo updated to version 0.1.0-alt1.1 for branch sisyphus in task 324788.
Closed bugs
Ошибка в summary в слове bootloader
Package installer-feature-bootloader-grub updated to version 0.1.0-alt4 for branch sisyphus in task 324787.
Closed bugs
Ошибка в summary в слове bootloader
Package observium-ce updated to version 23.1-alt0.1 for branch sisyphus in task 324802.
Closed bugs
Обновить до
Package gnome-shell updated to version 44.3-alt1.1 for branch sisyphus in task 324779.
Closed bugs
gnome-shell-data зависит от gnome-shell
Closed bugs
Добавить пакету phosh зависимости на gnome-shell-data и mutter-gnome
Closed vulnerabilities
Modified: 2024-09-24
BDU:2023-00154
Уязвимость реализации сценария remote_agent.php программного средства мониторинга сети Cacti, позволяющая нарушителю выполнить произвольные команды
Modified: 2025-10-24
CVE-2022-46169
Cacti is an open source platform which provides a robust and extensible operational monitoring and fault management framework for users. In affected versions a command injection vulnerability allows an unauthenticated user to execute arbitrary code on a server running Cacti, if a specific data source was selected for any monitored device. The vulnerability resides in the `remote_agent.php` file. This file can be accessed without authentication. This function retrieves the IP address of the client via `get_client_addr` and resolves this IP address to the corresponding hostname via `gethostbyaddr`. After this, it is verified that an entry within the `poller` table exists, where the hostname corresponds to the resolved hostname. If such an entry was found, the function returns `true` and the client is authorized. This authorization can be bypassed due to the implementation of the `get_client_addr` function. The function is defined in the file `lib/functions.php` and checks serval `$_SERVER` variables to determine the IP address of the client. The variables beginning with `HTTP_` can be arbitrarily set by an attacker. Since there is a default entry in the `poller` table with the hostname of the server running Cacti, an attacker can bypass the authentication e.g. by providing the header `Forwarded-For:
- https://github.com/Cacti/cacti/commit/7f0e16312dd5ce20f93744ef8b9c3b0f1ece2216
- https://github.com/Cacti/cacti/commit/a8d59e8fa5f0054aa9c6981b1cbe30ef0e2a0ec9
- https://github.com/Cacti/cacti/commit/b43f13ae7f1e6bfe4e8e56a80a7cd867cf2db52b
- https://github.com/Cacti/cacti/security/advisories/GHSA-6p93-p743-35gf
- https://github.com/Cacti/cacti/commit/7f0e16312dd5ce20f93744ef8b9c3b0f1ece2216
- https://github.com/Cacti/cacti/commit/a8d59e8fa5f0054aa9c6981b1cbe30ef0e2a0ec9
- https://github.com/Cacti/cacti/commit/b43f13ae7f1e6bfe4e8e56a80a7cd867cf2db52b
- https://github.com/Cacti/cacti/security/advisories/GHSA-6p93-p743-35gf
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2022-46169
Closed vulnerabilities
Modified: 2023-11-09
BDU:2023-00696
Уязвимость утилиты для текстовых терминалов UNIX-подобных систем Less, связанная с некорректной фильтрацией встроенных последовательностей ANSI при обработке элемента -R, позволяющая нарушителю повысить свои привилегии
Modified: 2025-03-25
CVE-2022-46663
In GNU Less before 609, crafted data can result in "less -R" not filtering ANSI escape sequences sent to the terminal.
- http://www.greenwoodsoftware.com/less/news.609.html
- http://www.openwall.com/lists/oss-security/2023/02/07/7
- https://github.com/gwsw/less/commit/a78e1351113cef564d790a730d657a321624d79c
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LR7AUWB34JD4PCW3HHASBEDGGHFWPAQP/
- https://security.gentoo.org/glsa/202310-11
- https://www.openwall.com/lists/oss-security/2023/02/07/7
- http://www.greenwoodsoftware.com/less/news.609.html
- http://www.openwall.com/lists/oss-security/2023/02/07/7
- https://github.com/gwsw/less/commit/a78e1351113cef564d790a730d657a321624d79c
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/LR7AUWB34JD4PCW3HHASBEDGGHFWPAQP/
- https://security.gentoo.org/glsa/202310-11
- https://www.openwall.com/lists/oss-security/2023/02/07/7