ALT-BU-2023-6943-1
Branch sisyphus_e2k update bulletin.
Package roundcube updated to version 1.6.4-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2023-06297
Уязвимость компонента program/lib/Roundcube/rcube_string_replacer.php почтового клиента RoundCube Webmail, позволяющая нарушителю провести атаку межсайтового скриптинга
BDU:2023-07143
Уязвимость библиотеки program/lib/Roundcube/rcube_washtml.php почтового клиента RoundCube Webmail, позволяющая нарушителю выполнить произвольный JavaScript-код
Modified: 2024-12-20
CVE-2023-43770
Roundcube before 1.4.14, 1.5.x before 1.5.4, and 1.6.x before 1.6.3 allows XSS via text/plain e-mail messages with crafted links because of program/lib/Roundcube/rcube_string_replacer.php behavior.
- https://github.com/roundcube/roundcubemail/commit/e92ec206a886461245e1672d8530cc93c618a49b
- https://lists.debian.org/debian-lts-announce/2023/09/msg00024.html
- https://roundcube.net/news/2023/09/15/security-update-1.6.3-released
- https://github.com/roundcube/roundcubemail/commit/e92ec206a886461245e1672d8530cc93c618a49b
- https://lists.debian.org/debian-lts-announce/2023/09/msg00024.html
- https://roundcube.net/news/2023/09/15/security-update-1.6.3-released
Modified: 2025-03-19
CVE-2023-5631
Roundcube before 1.4.15, 1.5.x before 1.5.5, and 1.6.x before 1.6.4 allows stored XSS via an HTML e-mail message with a crafted SVG document because of program/lib/Roundcube/rcube_washtml.php behavior. This could allow a remote attacker to load arbitrary JavaScript code.
- http://www.openwall.com/lists/oss-security/2023/11/01/1
- http://www.openwall.com/lists/oss-security/2023/11/01/3
- http://www.openwall.com/lists/oss-security/2023/11/17/2
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1054079
- https://github.com/roundcube/roundcubemail/commit/41756cc3331b495cc0b71886984474dc529dd31d
- https://github.com/roundcube/roundcubemail/commit/6ee6e7ae301e165e2b2cb703edf75552e5376613
- https://github.com/roundcube/roundcubemail/issues/9168
- https://github.com/roundcube/roundcubemail/releases/tag/1.4.15
- https://github.com/roundcube/roundcubemail/releases/tag/1.5.5
- https://github.com/roundcube/roundcubemail/releases/tag/1.6.4
- https://lists.debian.org/debian-lts-announce/2023/10/msg00035.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LK67Q46OIEGJCRQUBHKLH3IIJTBNGGX4/
- https://roundcube.net/news/2023/10/16/security-update-1.6.4-released
- https://roundcube.net/news/2023/10/16/security-updates-1.5.5-and-1.4.15
- https://www.debian.org/security/2023/dsa-5531
- http://www.openwall.com/lists/oss-security/2023/11/01/1
- http://www.openwall.com/lists/oss-security/2023/11/01/3
- http://www.openwall.com/lists/oss-security/2023/11/17/2
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=1054079
- https://github.com/roundcube/roundcubemail/commit/41756cc3331b495cc0b71886984474dc529dd31d
- https://github.com/roundcube/roundcubemail/commit/6ee6e7ae301e165e2b2cb703edf75552e5376613
- https://github.com/roundcube/roundcubemail/issues/9168
- https://github.com/roundcube/roundcubemail/releases/tag/1.4.15
- https://github.com/roundcube/roundcubemail/releases/tag/1.5.5
- https://github.com/roundcube/roundcubemail/releases/tag/1.6.4
- https://lists.debian.org/debian-lts-announce/2023/10/msg00035.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/LK67Q46OIEGJCRQUBHKLH3IIJTBNGGX4/
- https://roundcube.net/news/2023/10/16/security-update-1.6.4-released
- https://roundcube.net/news/2023/10/16/security-updates-1.5.5-and-1.4.15
- https://www.debian.org/security/2023/dsa-5531
Package kf5-breeze-icons updated to version 5.111.0-alt2 for branch sisyphus_e2k.
Closed bugs
У Yandex Browser красно-белая иконка в icon-theme-breeze
Package python3-module-GitPython updated to version 3.1.40-alt1 for branch sisyphus_e2k.
Closed bugs
[CVE] Прошу собрать версию 3.1.37
Package netdata updated to version 1.43.0-alt2 for branch sisyphus_e2k.
Closed bugs
Собрать netdata без distutils
Package python3-module-passlib updated to version 1.7.4-alt2 for branch sisyphus_e2k.
Closed bugs
Собрать python3-module-passlib без distutils
Package vim updated to version 9.0.2081-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2023-5535
Use After Free in GitHub repository vim/vim prior to v9.0.2010.
- https://github.com/vim/vim/commit/41e6f7d6ba67b61d911f9b1d76325cd79224753d
- https://huntr.dev/bounties/2c2d85a7-1171-4014-bf7f-a2451745861f
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VDDWD25AZIHBAA44HQT75OWLQ5UMDKU3/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGTVLUV7UCXXCZAIQIUCLG6JXAVYT3HE/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XPT7NMYJRLBPIALGSE24UWTY6F774GZW/
- https://github.com/vim/vim/commit/41e6f7d6ba67b61d911f9b1d76325cd79224753d
- https://huntr.dev/bounties/2c2d85a7-1171-4014-bf7f-a2451745861f
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VDDWD25AZIHBAA44HQT75OWLQ5UMDKU3/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/VGTVLUV7UCXXCZAIQIUCLG6JXAVYT3HE/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/XPT7NMYJRLBPIALGSE24UWTY6F774GZW/
Package appstream-data updated to version 20231031-alt1 for branch sisyphus_e2k.
Closed bugs
VLC устанавливает из Центра приложений Gnome vlc-mini а не vlc
Package python3-module-buildozer updated to version 1.5.0-alt2 for branch sisyphus_e2k.
Closed bugs
Собрать python3-module-buildozer без distutils
Package apache2-mod_perl updated to version 2.0.13-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2022-02598
Уязвимость компонентов PerlRun.pm и RegistryCooker.pm модуль для веб-сервера Apache mod_perl, позволяющие нарушителю вызвать отказ в обслуживании
Modified: 2025-04-09
CVE-2007-1349
PerlRun.pm in Apache mod_perl before 1.30, and RegistryCooker.pm in mod_perl 2.x, does not properly escape PATH_INFO before use in a regular expression, which allows remote attackers to cause a denial of service (resource consumption) via a crafted URI.
- ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc
- http://rhn.redhat.com/errata/RHSA-2007-0395.html
- http://rhn.redhat.com/errata/RHSA-2008-0630.html
- http://secunia.com/advisories/24678
- http://secunia.com/advisories/24839
- http://secunia.com/advisories/25072
- http://secunia.com/advisories/25110
- http://secunia.com/advisories/25432
- http://secunia.com/advisories/25655
- http://secunia.com/advisories/25730
- http://secunia.com/advisories/25894
- http://secunia.com/advisories/26084
- http://secunia.com/advisories/26231
- http://secunia.com/advisories/26290
- http://secunia.com/advisories/31490
- http://secunia.com/advisories/31493
- http://secunia.com/advisories/33720
- http://secunia.com/advisories/33723
- http://security.gentoo.org/glsa/glsa-200705-04.xml
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-248386-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021508.1-1
- http://support.avaya.com/elmodocs2/security/ASA-2007-293.htm
- http://svn.apache.org/repos/asf/perl/modperl/branches/1.x/Changes
- http://www.gossamer-threads.com/lists/modperl/modperl/92739
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:083
- http://www.novell.com/linux/security/advisories/2007_12_sr.html
- http://www.novell.com/linux/security/advisories/2007_8_sr.html
- http://www.redhat.com/support/errata/RHSA-2007-0396.html
- http://www.redhat.com/support/errata/RHSA-2007-0486.html
- http://www.redhat.com/support/errata/RHSA-2008-0261.html
- http://www.redhat.com/support/errata/RHSA-2008-0627.html
- http://www.securityfocus.com/bid/23192
- http://www.securitytracker.com/id?1018259
- http://www.trustix.org/errata/2007/0023/
- http://www.ubuntu.com/usn/usn-488-1
- http://www.vupen.com/english/advisories/2007/1150
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33312
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10987
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8349
- ftp://patches.sgi.com/support/free/security/advisories/20070602-01-P.asc
- http://rhn.redhat.com/errata/RHSA-2007-0395.html
- http://rhn.redhat.com/errata/RHSA-2008-0630.html
- http://secunia.com/advisories/24678
- http://secunia.com/advisories/24839
- http://secunia.com/advisories/25072
- http://secunia.com/advisories/25110
- http://secunia.com/advisories/25432
- http://secunia.com/advisories/25655
- http://secunia.com/advisories/25730
- http://secunia.com/advisories/25894
- http://secunia.com/advisories/26084
- http://secunia.com/advisories/26231
- http://secunia.com/advisories/26290
- http://secunia.com/advisories/31490
- http://secunia.com/advisories/31493
- http://secunia.com/advisories/33720
- http://secunia.com/advisories/33723
- http://security.gentoo.org/glsa/glsa-200705-04.xml
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-248386-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021508.1-1
- http://support.avaya.com/elmodocs2/security/ASA-2007-293.htm
- http://svn.apache.org/repos/asf/perl/modperl/branches/1.x/Changes
- http://www.gossamer-threads.com/lists/modperl/modperl/92739
- http://www.mandriva.com/security/advisories?name=MDKSA-2007:083
- http://www.novell.com/linux/security/advisories/2007_12_sr.html
- http://www.novell.com/linux/security/advisories/2007_8_sr.html
- http://www.redhat.com/support/errata/RHSA-2007-0396.html
- http://www.redhat.com/support/errata/RHSA-2007-0486.html
- http://www.redhat.com/support/errata/RHSA-2008-0261.html
- http://www.redhat.com/support/errata/RHSA-2008-0627.html
- http://www.securityfocus.com/bid/23192
- http://www.securitytracker.com/id?1018259
- http://www.trustix.org/errata/2007/0023/
- http://www.ubuntu.com/usn/usn-488-1
- http://www.vupen.com/english/advisories/2007/1150
- https://exchange.xforce.ibmcloud.com/vulnerabilities/33312
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10987
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8349
Closed bugs
apache2-mod_perl: update to 2.0.13 to support perl 5.38
Package alterator-ports-access updated to version 0.5.5-alt1 for branch sisyphus_e2k.
Closed bugs
Сломан редактор правил USB
Package tcpreplay updated to version 4.4.4-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2023-02104
Уязвимость функции rmacinstring утилиты редактирования и воспроизведения PCAP-файлов Tcpreplay, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-02-26
CVE-2023-27783
An issue found in TCPreplay tcprewrite v.4.4.3 allows a remote attacker to cause a denial of service via the tcpedit_dlt_cleanup function at plugins/dlt_plugins.c.
- https://github.com/appneta/tcpreplay/issues/780
- https://github.com/appneta/tcpreplay/pull/781
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3ER3YTFR3XIDMYEB7LMFWFTPVQALBHC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UK2BRH3W3ECF5FDXP6QM3ZEDTHIOE4M5/
- https://github.com/appneta/tcpreplay/issues/780
- https://github.com/appneta/tcpreplay/pull/781
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3ER3YTFR3XIDMYEB7LMFWFTPVQALBHC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UK2BRH3W3ECF5FDXP6QM3ZEDTHIOE4M5/
Modified: 2025-02-26
CVE-2023-27784
An issue found in TCPReplay v.4.4.3 allows a remote attacker to cause a denial of service via the read_hexstring function at the utils.c:309 endpoint.
- https://github.com/appneta/tcpreplay/issues/787
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3ER3YTFR3XIDMYEB7LMFWFTPVQALBHC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UK2BRH3W3ECF5FDXP6QM3ZEDTHIOE4M5/
- https://github.com/appneta/tcpreplay/issues/787
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3ER3YTFR3XIDMYEB7LMFWFTPVQALBHC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UK2BRH3W3ECF5FDXP6QM3ZEDTHIOE4M5/
Modified: 2025-02-26
CVE-2023-27785
An issue found in TCPreplay TCPprep v.4.4.3 allows a remote attacker to cause a denial of service via the parse endpoints function.
- https://github.com/appneta/tcpreplay/issues/785
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3ER3YTFR3XIDMYEB7LMFWFTPVQALBHC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UK2BRH3W3ECF5FDXP6QM3ZEDTHIOE4M5/
- https://github.com/appneta/tcpreplay/issues/785
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3ER3YTFR3XIDMYEB7LMFWFTPVQALBHC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UK2BRH3W3ECF5FDXP6QM3ZEDTHIOE4M5/
Modified: 2025-02-26
CVE-2023-27786
An issue found in TCPprep v.4.4.3 allows a remote attacker to cause a denial of service via the macinstring function.
- https://github.com/appneta/tcpreplay/issues/782
- https://github.com/appneta/tcpreplay/pull/783
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3ER3YTFR3XIDMYEB7LMFWFTPVQALBHC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UK2BRH3W3ECF5FDXP6QM3ZEDTHIOE4M5/
- https://github.com/appneta/tcpreplay/issues/782
- https://github.com/appneta/tcpreplay/pull/783
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3ER3YTFR3XIDMYEB7LMFWFTPVQALBHC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UK2BRH3W3ECF5FDXP6QM3ZEDTHIOE4M5/
Modified: 2025-02-26
CVE-2023-27787
An issue found in TCPprep v.4.4.3 allows a remote attacker to cause a denial of service via the parse_list function at the list.c:81 endpoint.
- https://github.com/appneta/tcpreplay/issues/788
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3ER3YTFR3XIDMYEB7LMFWFTPVQALBHC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UK2BRH3W3ECF5FDXP6QM3ZEDTHIOE4M5/
- https://github.com/appneta/tcpreplay/issues/788
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3ER3YTFR3XIDMYEB7LMFWFTPVQALBHC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UK2BRH3W3ECF5FDXP6QM3ZEDTHIOE4M5/
Modified: 2025-02-26
CVE-2023-27788
An issue found in TCPrewrite v.4.4.3 allows a remote attacker to cause a denial of service via the ports2PORT function at the portmap.c:69 endpoint.
- https://github.com/appneta/tcpreplay/issues/786
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3ER3YTFR3XIDMYEB7LMFWFTPVQALBHC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UK2BRH3W3ECF5FDXP6QM3ZEDTHIOE4M5/
- https://github.com/appneta/tcpreplay/issues/786
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3ER3YTFR3XIDMYEB7LMFWFTPVQALBHC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UK2BRH3W3ECF5FDXP6QM3ZEDTHIOE4M5/
Modified: 2025-02-26
CVE-2023-27789
An issue found in TCPprep v.4.4.3 allows a remote attacker to cause a denial of service via the cidr2cidr function at the cidr.c:178 endpoint.
- https://github.com/appneta/tcpreplay/issues/784
- https://github.com/appneta/tcpreplay/pull/783
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3ER3YTFR3XIDMYEB7LMFWFTPVQALBHC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UK2BRH3W3ECF5FDXP6QM3ZEDTHIOE4M5/
- https://github.com/appneta/tcpreplay/issues/784
- https://github.com/appneta/tcpreplay/pull/783
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/R3ER3YTFR3XIDMYEB7LMFWFTPVQALBHC/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UE3J4LKYFNKPKNSLDQK4JG36THQMQH3V/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/UK2BRH3W3ECF5FDXP6QM3ZEDTHIOE4M5/
Package alterator-l10n updated to version 2.9.137-alt3 for branch sisyphus_e2k.
Closed bugs
В справке для alterator-vm указана ext3, а реально создаётся ext4.
Отсутствует help для шагов 1, 2, 4, 5, 6, 7, 8, 12 при установке (язык: English)