ALT-BU-2024-10554-1
Branch sisyphus_loongarch64 update bulletin.
Package isync updated to version 1.4.3-alt1 for branch sisyphus_loongarch64.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-3578
A flaw was found in mbsync before v1.3.6 and v1.4.2, where an unchecked pointer cast allows a malicious or compromised server to write an arbitrary integer value past the end of a heap-allocated structure by issuing an unexpected APPENDUID response. This could be plausibly exploited for remote code execution on the client.
- [oss-security] 20210607 CVE-2021-3578: possible remote code execution in isync/mbsync
- [oss-security] 20210607 CVE-2021-3578: possible remote code execution in isync/mbsync
- https://bugzilla.redhat.com/show_bug.cgi?id=1961710
- https://bugzilla.redhat.com/show_bug.cgi?id=1961710
- https://bugzilla.redhat.com/show_bug.cgi?id=1967397
- https://bugzilla.redhat.com/show_bug.cgi?id=1967397
- https://github.blog/2021-06-10-privilege-escalation-polkit-root-on-linux-with-bug/
- https://github.blog/2021-06-10-privilege-escalation-polkit-root-on-linux-with-bug/
- [debian-lts-announce] 20220701 [SECURITY] [DLA 3066-1] isync security update
- [debian-lts-announce] 20220701 [SECURITY] [DLA 3066-1] isync security update
- FEDORA-2021-754af4d52b
- FEDORA-2021-754af4d52b
- FEDORA-2021-f236f9f01a
- FEDORA-2021-f236f9f01a
- GLSA-202208-15
- GLSA-202208-15
- https://www.openwall.com/lists/oss-security/2021/06/07/1
- https://www.openwall.com/lists/oss-security/2021/06/07/1
Modified: 2024-11-21
CVE-2021-44143
A flaw was found in mbsync in isync 1.4.0 through 1.4.3. Due to an unchecked condition, a malicious or compromised IMAP server could use a crafted mail message that lacks headers (i.e., one that starts with an empty line) to provoke a heap overflow, which could conceivably be exploited for remote code execution.
- [oss-security] 20211203 CVE-2021-44143: heap overflow in isync/mbsync
- [oss-security] 20211203 CVE-2021-44143: heap overflow in isync/mbsync
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=999804
- https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=999804
- FEDORA-2021-577129851b
- FEDORA-2021-577129851b
- FEDORA-2021-b7fdb7e69a
- FEDORA-2021-b7fdb7e69a
- GLSA-202208-15
- GLSA-202208-15
- https://sourceforge.net/p/isync/isync/commit_browser
- https://sourceforge.net/p/isync/isync/commit_browser
- https://sourceforge.net/p/isync/isync/ref/master/tags/
- https://sourceforge.net/p/isync/isync/ref/master/tags/
Package python3-module-django updated to version 5.0.7-alt1 for branch sisyphus_loongarch64.
Closed vulnerabilities
BDU:2024-01517
Уязвимость программной платформы для веб-приложений Django, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-04292
Уязвимость функции django.utils.text.Truncator.words() программной платформы для веб-приложений Django, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2024-24680
An issue was discovered in Django 3.2 before 3.2.24, 4.2 before 4.2.10, and Django 5.0 before 5.0.2. The intcomma template filter was subject to a potential denial-of-service attack when used with very long strings.
- https://docs.djangoproject.com/en/5.0/releases/security/
- https://docs.djangoproject.com/en/5.0/releases/security/
- https://groups.google.com/forum/#%21forum/django-announce
- https://groups.google.com/forum/#%21forum/django-announce
- FEDORA-2024-5c7fb64c74
- FEDORA-2024-5c7fb64c74
- FEDORA-2024-2ec03ca8cb
- FEDORA-2024-2ec03ca8cb
- FEDORA-2024-84fbbbb914
- FEDORA-2024-84fbbbb914
- https://www.djangoproject.com/weblog/2024/feb/06/security-releases/
- https://www.djangoproject.com/weblog/2024/feb/06/security-releases/
Modified: 2024-11-21
CVE-2024-27351
In Django 3.2 before 3.2.25, 4.2 before 4.2.11, and 5.0 before 5.0.3, the django.utils.text.Truncator.words() method (with html=True) and the truncatewords_html template filter are subject to a potential regular expression denial-of-service attack via a crafted string. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232 and CVE-2023-43665.
- [oss-security] 20240304 Django: CVE-2024-27351: Potential regular expression denial-of-service in django.utils.text.Truncator.words()
- [oss-security] 20240304 Django: CVE-2024-27351: Potential regular expression denial-of-service in django.utils.text.Truncator.words()
- https://docs.djangoproject.com/en/5.0/releases/security/
- https://docs.djangoproject.com/en/5.0/releases/security/
- https://github.com/django/django/commit/072963e4c4d0b3a7a8c5412bc0c7d27d1a9c3521
- https://github.com/django/django/commit/3394fc6132436eca89e997083bae9985fb7e761e
- https://github.com/django/django/commit/3c9a2771cc80821e041b16eb36c1c37af5349d4a
- https://groups.google.com/forum/#%21forum/django-announce
- https://groups.google.com/forum/#%21forum/django-announce
- FEDORA-2024-5c7fb64c74
- FEDORA-2024-5c7fb64c74
- FEDORA-2024-2ec03ca8cb
- FEDORA-2024-2ec03ca8cb
- FEDORA-2024-84fbbbb914
- FEDORA-2024-84fbbbb914
- https://www.djangoproject.com/weblog/2024/mar/04/security-releases/
- https://www.djangoproject.com/weblog/2024/mar/04/security-releases/
Modified: 2024-11-21
CVE-2024-38875
An issue was discovered in Django 4.2 before 4.2.14 and 5.0 before 5.0.7. urlize and urlizetrunc were subject to a potential denial of service attack via certain inputs with a very large number of brackets.
- https://docs.djangoproject.com/en/dev/releases/security/
- https://docs.djangoproject.com/en/dev/releases/security/
- https://groups.google.com/forum/#%21forum/django-announce
- https://groups.google.com/forum/#%21forum/django-announce
- https://www.djangoproject.com/weblog/2024/jul/09/security-releases/
- https://www.djangoproject.com/weblog/2024/jul/09/security-releases/
Modified: 2024-11-21
CVE-2024-39329
An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. The django.contrib.auth.backends.ModelBackend.authenticate() method allows remote attackers to enumerate users via a timing attack involving login requests for users with an unusable password.
- https://docs.djangoproject.com/en/dev/releases/security/
- https://docs.djangoproject.com/en/dev/releases/security/
- https://groups.google.com/forum/#%21forum/django-announce
- https://groups.google.com/forum/#%21forum/django-announce
- https://www.djangoproject.com/weblog/2024/jul/09/security-releases/
- https://www.djangoproject.com/weblog/2024/jul/09/security-releases/
Modified: 2024-11-21
CVE-2024-39330
An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. Derived classes of the django.core.files.storage.Storage base class, when they override generate_filename() without replicating the file-path validations from the parent class, potentially allow directory traversal via certain inputs during a save() call. (Built-in Storage sub-classes are unaffected.)
- https://docs.djangoproject.com/en/dev/releases/security/
- https://docs.djangoproject.com/en/dev/releases/security/
- https://groups.google.com/forum/#%21forum/django-announce
- https://groups.google.com/forum/#%21forum/django-announce
- https://www.djangoproject.com/weblog/2024/jul/09/security-releases/
- https://www.djangoproject.com/weblog/2024/jul/09/security-releases/
Modified: 2024-11-21
CVE-2024-39614
An issue was discovered in Django 5.0 before 5.0.7 and 4.2 before 4.2.14. get_supported_language_variant() was subject to a potential denial-of-service attack when used with very long strings containing specific characters.
- https://docs.djangoproject.com/en/dev/releases/security/
- https://docs.djangoproject.com/en/dev/releases/security/
- https://groups.google.com/forum/#%21forum/django-announce
- https://groups.google.com/forum/#%21forum/django-announce
- https://www.djangoproject.com/weblog/2024/jul/09/security-releases/
- https://www.djangoproject.com/weblog/2024/jul/09/security-releases/
Package alt-csp-cryptopro updated to version 0.3.0-alt3 for branch sisyphus_loongarch64.
Closed bugs
Недоступны функции "Создать имя" и "Подписать и сжать" при подписи одного файла