ALT-BU-2024-15378-1
Branch p11 update bulletin.
Closed vulnerabilities
BDU:2024-09106
Узвимость реализации механизма HSTS (HTTP Strict Transport Security) утилиты командной строки curl, позволяющая нарушителю проводить атаки типа "человек посередине"
Modified: 2024-12-13
CVE-2024-9681
When curl is asked to use HSTS, the expiry time for a subdomain might overwrite a parent domain's cache entry, making it end sooner or later than otherwise intended. This affects curl using applications that enable HSTS and use URLs with the insecure `HTTP://` scheme and perform transfers with hosts like `x.example.com` as well as `example.com` where the first host is a subdomain of the second host. (The HSTS cache either needs to have been populated manually or there needs to have been previous HTTPS accesses done as the cache needs to have entries for the domains involved to trigger this problem.) When `x.example.com` responds with `Strict-Transport-Security:` headers, this bug can make the subdomain's expiry timeout *bleed over* and get set for the parent domain `example.com` in curl's HSTS cache. The result of a triggered bug is that HTTP accesses to `example.com` get converted to HTTPS for a different period of time than what was asked for by the origin server. If `example.com` for example stops supporting HTTPS at its expiry time, curl might then fail to access `http://example.com` until the (wrongly set) timeout expires. This bug can also expire the parent's entry *earlier*, thus making curl inadvertently switch back to insecure HTTP earlier than otherwise intended.
Closed bugs
Захардкожен устаревший шифр aes-cbc-essiv:sha256
Критическая ошибка Недопустимый аргумент при двойном нажатии на кнопку на шаге "4/13 Подготовка диска"
Package alterator-l10n updated to version 2.9.147-alt1 for branch p11 in task 361939.
Closed bugs
При создании RAID опция Version 1.2 Super Block не переведена
Package python3-module-quart updated to version 0.19.8-alt1 for branch p11 in task 362009.
Closed vulnerabilities
Modified: 2025-01-03
CVE-2024-49767
Werkzeug is a Web Server Gateway Interface web application library. Applications using `werkzeug.formparser.MultiPartParser` corresponding to a version of Werkzeug prior to 3.0.6 to parse `multipart/form-data` requests (e.g. all flask applications) are vulnerable to a relatively simple but effective resource exhaustion (denial of service) attack. A specifically crafted form submission request can cause the parser to allocate and block 3 to 8 times the upload size in main memory. There is no upper limit; a single upload at 1 Gbit/s can exhaust 32 GB of RAM in less than 60 seconds. Werkzeug version 3.0.6 fixes this issue.
- https://github.com/pallets/quart/commit/5e78c4169b8eb66b91ead3e62d44721b9e1644ee
- https://github.com/pallets/quart/commit/abb04a512496206de279225340ed022852fbf51f
- https://github.com/pallets/werkzeug/commit/50cfeebcb0727e18cc52ffbeb125f4a66551179b
- https://github.com/pallets/werkzeug/releases/tag/3.0.6
- https://github.com/pallets/werkzeug/security/advisories/GHSA-q34m-jh98-gwm2
- https://security.netapp.com/advisory/ntap-20250103-0007/
Package stellarium updated to version 24.3-alt1 for branch p11 in task 362015.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2023-28371
In Stellarium through 1.2, attackers can write to files that are typically unintended, such as ones with absolute pathnames or .. directory traversal.
- https://github.com/Stellarium/stellarium/commit/1261f74dc4aa6bbd01ab514343424097f8cf46b7
- https://github.com/Stellarium/stellarium/commit/787a894897b7872ae96e6f5804a182210edd5c78
- https://github.com/Stellarium/stellarium/commit/eba61df3b38605befcb43687a4c0a159dbc0c5cb
- FEDORA-2023-57f5e7c000
- FEDORA-2023-b7e90bc682
- FEDORA-2023-2cf272ad72
- https://github.com/Stellarium/stellarium/commit/1261f74dc4aa6bbd01ab514343424097f8cf46b7
- FEDORA-2023-2cf272ad72
- FEDORA-2023-b7e90bc682
- FEDORA-2023-57f5e7c000
- https://github.com/Stellarium/stellarium/commit/eba61df3b38605befcb43687a4c0a159dbc0c5cb
- https://github.com/Stellarium/stellarium/commit/787a894897b7872ae96e6f5804a182210edd5c78
Closed bugs
Обновить yakuake до актуальной версии
Package plasma-discover updated to version 6.2.3-alt2 for branch p11 in task 362167.
Closed bugs
Невозможно открыть страницу приложения в Discover