ALT-BU-2023-8373-1
Branch p10 update bulletin.
Closed vulnerabilities
BDU:2021-03499
Уязвимость компонента raptor_xml_writer_start_element_common библиотеки на Си Raptor, связанная с записью за границами буфера, позволяющая нарушителю нарушить целостность данных или вызвать отказ в обслуживании
BDU:2022-05307
Уязвимость функции raptor_xml_writer_start_element_common библиотеки Raptor, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2017-18926
raptor_xml_writer_start_element_common in raptor_xml_writer.c in Raptor RDF Syntax Library 2.0.15 miscalculates the maximum nspace declarations for the XML writer, leading to heap-based buffer overflows (sometimes seen in raptor_qname_format_as_xml).
- [oss-security] 20201113 Buffer Overflow in raptor widely unfixed in Linux distros
- [oss-security] 20201113 Buffer Overflow in raptor widely unfixed in Linux distros
- [oss-security] 20201113 Re: Buffer Overflow in raptor widely unfixed in Linux distros
- [oss-security] 20201113 Re: Buffer Overflow in raptor widely unfixed in Linux distros
- [oss-security] 20201114 Re: Buffer Overflow in raptor widely unfixed in Linux distros
- [oss-security] 20201114 Re: Buffer Overflow in raptor widely unfixed in Linux distros
- [oss-security] 20201116 Re: Buffer Overflow in raptor widely unfixed in Linux distros
- [oss-security] 20201116 Re: Buffer Overflow in raptor widely unfixed in Linux distros
- [oss-security] 20201116 Re: Buffer Overflow in raptor widely unfixed in Linux distros
- [oss-security] 20201116 Re: Buffer Overflow in raptor widely unfixed in Linux distros
- https://github.com/LibreOffice/core/blob/master/external/redland/raptor/0001-Calcualte-max-nspace-declarations-correctly-for-XML-.patch.1
- https://github.com/LibreOffice/core/blob/master/external/redland/raptor/0001-Calcualte-max-nspace-declarations-correctly-for-XML-.patch.1
- [debian-lts-announce] 20201107 [SECURITY] [DLA 2438-1] raptor2 security update
- [debian-lts-announce] 20201107 [SECURITY] [DLA 2438-1] raptor2 security update
- FEDORA-2020-b15dd44972
- FEDORA-2020-b15dd44972
- FEDORA-2020-d6675a61f1
- FEDORA-2020-d6675a61f1
- FEDORA-2020-3c1e69f1b1
- FEDORA-2020-3c1e69f1b1
- DSA-4785
- DSA-4785
- https://www.openwall.com/lists/oss-security/2017/06/07/1
- https://www.openwall.com/lists/oss-security/2017/06/07/1
Modified: 2024-11-21
CVE-2020-25713
A malformed input file can lead to a segfault due to an out of bounds array access in raptor_xml_writer_start_element_common.
- [oss-security] 20201116 Re: Buffer Overflow in raptor widely unfixed in Linux distros
- [oss-security] 20201116 Re: Buffer Overflow in raptor widely unfixed in Linux distros
- https://bugs.librdf.org/mantis/view.php?id=650
- https://bugs.librdf.org/mantis/view.php?id=650
- https://bugzilla.redhat.com/show_bug.cgi?id=1900685
- https://bugzilla.redhat.com/show_bug.cgi?id=1900685
- [debian-lts-announce] 20211214 [SECURITY] [DLA 2846-1] raptor2 security update
- [debian-lts-announce] 20211214 [SECURITY] [DLA 2846-1] raptor2 security update
- FEDORA-2021-8fe81dcf9f
- FEDORA-2021-8fe81dcf9f
- FEDORA-2021-5752e07eb6
- FEDORA-2021-5752e07eb6
Closed bugs
FTBFS с 16 декабря
Package python3-module-django updated to version 3.2.23-alt1 for branch p10 in task 337271.
Closed vulnerabilities
BDU:2023-08741
Уязвимость программной платформы для веб-приложений Django, связанная c неограниченным распределением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании (DoS)
Modified: 2024-11-21
CVE-2023-46695
An issue was discovered in Django 3.2 before 3.2.23, 4.1 before 4.1.13, and 4.2 before 4.2.7. The NFKC normalization is slow on Windows. As a consequence, django.contrib.auth.forms.UsernameField is subject to a potential DoS (denial of service) attack via certain inputs with a very large number of Unicode characters.
- https://docs.djangoproject.com/en/4.2/releases/security/
- https://docs.djangoproject.com/en/4.2/releases/security/
- https://groups.google.com/forum/#%21forum/django-announce
- https://groups.google.com/forum/#%21forum/django-announce
- https://security.netapp.com/advisory/ntap-20231214-0001/
- https://security.netapp.com/advisory/ntap-20231214-0001/
- https://www.djangoproject.com/weblog/2023/nov/01/security-releases/
- https://www.djangoproject.com/weblog/2023/nov/01/security-releases/