ALT-BU-2024-15374-1
Branch c10f1 update bulletin.
Package python3-module-mechanize updated to version 0.4.9-alt1 for branch c10f1 in task 361818.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-32837
mechanize, a library for automatically interacting with HTTP web servers, contains a regular expression that is vulnerable to regular expression denial of service (ReDoS) prior to version 0.4.6. If a web server responds in a malicious way, then mechanize could crash. Version 0.4.6 has a patch for the issue.
- https://github.com/python-mechanize/mechanize/blob/3acb1836f3fd8edc5a758a417dd46b53832ae3b5/mechanize/_urllib2_fork.py#L878-L879
- https://github.com/python-mechanize/mechanize/blob/3acb1836f3fd8edc5a758a417dd46b53832ae3b5/mechanize/_urllib2_fork.py#L878-L879
- https://github.com/python-mechanize/mechanize/commit/dd05334448e9f39814bab044d2eaa5ef69b410d6
- https://github.com/python-mechanize/mechanize/commit/dd05334448e9f39814bab044d2eaa5ef69b410d6
- https://github.com/python-mechanize/mechanize/releases/tag/v0.4.6
- https://github.com/python-mechanize/mechanize/releases/tag/v0.4.6
- [debian-lts-announce] 20230620 [SECURITY] [DLA 3460-1] python-mechanize security update
- [debian-lts-announce] 20230620 [SECURITY] [DLA 3460-1] python-mechanize security update
- https://securitylab.github.com/advisories/GHSL-2021-108-python-mechanize-mechanize/
- https://securitylab.github.com/advisories/GHSL-2021-108-python-mechanize-mechanize/
Package python3-module-celery updated to version 5.3.6-alt1 for branch c10f1 in task 361991.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-23727
This affects the package celery before 5.2.2. It by default trusts the messages and metadata stored in backends (result stores). When reading task metadata from the backend, the data is deserialized. Given that an attacker can gain access to, or somehow manipulate the metadata within a celery backend, they could trigger a stored command injection vulnerability and potentially gain further access to the system.
Closed vulnerabilities
BDU:2024-02816
Уязвимость базовой системы аутентификации веб-инструмента представления данных Grafana, позволяющая нарушителю обойти проверку электронной почты и помешать законным владельцам электронной почты зарегистрироваться
BDU:2024-07696
Уязвимость реализации прикладного программного интерфейса Endpoint платформы для мониторинга и наблюдения Grafana, позволяющая нарушителю повысить свои привилегии
Modified: 2025-02-15
CVE-2023-6152
A user changing their email after signing up and verifying it can change it without verification in profile settings. The configuration option "verify_email_enabled" will only validate email only on sign up.
- https://github.com/grafana/bugbounty/security/advisories/GHSA-3hv4-r2fm-h27f
- https://github.com/grafana/bugbounty/security/advisories/GHSA-3hv4-r2fm-h27f
- https://grafana.com/security/security-advisories/cve-2023-6152/
- https://grafana.com/security/security-advisories/cve-2023-6152/
- https://security.netapp.com/advisory/ntap-20250214-0008/
Modified: 2024-09-30
CVE-2024-8118
In Grafana, the wrong permission is applied to the alert rule write API endpoint, allowing users with permission to write external alert instances to also write alert rules.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-16301
The command-line argument parser in tcpdump before 4.99.0 has a buffer overflow in tcpdump.c:read_infile(). To trigger this vulnerability the attacker needs to create a 4GB file on the local filesystem and to specify the file name as the value of the -F command-line argument of tcpdump.
Modified: 2024-11-21
CVE-2020-8037
The ppp decapsulator in tcpdump 4.9.3 can be convinced to allocate a large amount of memory.
- 20210427 APPLE-SA-2021-04-26-3 Security Update 2021-002 Catalina
- 20210427 APPLE-SA-2021-04-26-3 Security Update 2021-002 Catalina
- https://github.com/the-tcpdump-group/tcpdump/commit/32027e199368dad9508965aae8cd8de5b6ab5231
- https://github.com/the-tcpdump-group/tcpdump/commit/32027e199368dad9508965aae8cd8de5b6ab5231
- [debian-lts-announce] 20201110 [SECURITY] [DLA 2444-1] tcpdump security update
- [debian-lts-announce] 20201110 [SECURITY] [DLA 2444-1] tcpdump security update
- FEDORA-2020-c5e78886d6
- FEDORA-2020-c5e78886d6
- FEDORA-2020-fae2e1f2bc
- FEDORA-2020-fae2e1f2bc
- https://support.apple.com/kb/HT212325
- https://support.apple.com/kb/HT212325
- https://support.apple.com/kb/HT212326
- https://support.apple.com/kb/HT212326
- https://support.apple.com/kb/HT212327
- https://support.apple.com/kb/HT212327