ALT-BU-2024-16891-1
Branch sisyphus_loongarch64 update bulletin.
Package bash5 updated to version 5.2.37-alt1 for branch sisyphus_loongarch64.
Closed bugs
/usr/lib/bash5 не в BASH_LOADABLES_PATH
Сборка с --enable-net-redirections
Package mediawiki updated to version 1.42.3-alt1 for branch sisyphus_loongarch64.
Closed vulnerabilities
BDU:2024-02778
Уязвимость файла include/logging/RightsLogFormatter.php программного средства для реализации гипертекстовой среды MediaWiki, позволяющая нарушителю осуществлять межсайтовые сценарные атаки (XSS)
BDU:2024-02784
Уязвимость расширения CampaignEvents программного средства для реализации гипертекстовой среды MediaWiki, позволяющая нарушителю осуществить межсайтовые сценарные атаки
BDU:2024-02785
Уязвимость расширения CheckUser программного средства для реализации гипертекстовой среды MediaWiki, позволяющая нарушителю осуществить межсайтовые сценарные атаки
BDU:2024-02786
Уязвимость расширения Cargo программного средства для реализации гипертекстовой среды MediaWiki, позволяющая нарушителю осуществить межсайтовые сценарные атаки
BDU:2024-02787
Уязвимость расширения PageTriage программного средства для реализации гипертекстовой среды MediaWiki, позволяющая нарушителю осуществить межсайтовые сценарные атаки
BDU:2024-02788
Уязвимость расширения WatchAnalytics программного средства для реализации гипертекстовой среды MediaWiki, позволяющая нарушителю осуществить межсайтовые сценарные атаки
BDU:2024-02789
Уязвимость расширения Phonos программного средства для реализации гипертекстовой среды MediaWiki, позволяющая нарушителю осуществить межсайтовые сценарные атаки
BDU:2024-02790
Уязвимость расширения GlobalBlocking программного средства для реализации гипертекстовой среды MediaWiki, позволяющая нарушителю осуществить межсайтовые сценарные атаки
Modified: 2024-11-21
CVE-2023-51704
An issue was discovered in MediaWiki before 1.35.14, 1.36.x through 1.39.x before 1.39.6, and 1.40.x before 1.40.2. In includes/logging/RightsLogFormatter.php, group-*-member messages can result in XSS on Special:log/rights.
- [debian-lts-announce] 20240427 [SECURITY] [DLA 3796-1] mediawiki security update
- [debian-lts-announce] 20240427 [SECURITY] [DLA 3796-1] mediawiki security update
- https://lists.debian.org/debian-lts-announce/2024/09/msg00039.html
- FEDORA-2024-2c564b942d
- FEDORA-2024-2c564b942d
- https://phabricator.wikimedia.org/T347726
- https://phabricator.wikimedia.org/T347726
Modified: 2024-11-21
CVE-2024-23171
An issue was discovered in the CampaignEvents extension in MediaWiki before 1.35.14, 1.36.x through 1.39.x before 1.39.6, and 1.40.x before 1.40.2. The Special:EventDetails page allows XSS via the x-xss language setting for internationalization (i18n).
Modified: 2024-11-21
CVE-2024-23172
An issue was discovered in the CheckUser extension in MediaWiki before 1.35.14, 1.36.x through 1.39.x before 1.39.6, and 1.40.x before 1.40.2. XSS can occur via message definitions. e.g., in SpecialCheckUserLog.
Modified: 2024-11-21
CVE-2024-23173
An issue was discovered in the Cargo extension in MediaWiki before 1.35.14, 1.36.x through 1.39.x before 1.39.6, and 1.40.x before 1.40.2. The Special:Drilldown page allows XSS via artist, album, and position parameters because of applied filter values in drilldown/CargoAppliedFilter.php.
Modified: 2024-11-21
CVE-2024-23174
An issue was discovered in the PageTriage extension in MediaWiki before 1.35.14, 1.36.x through 1.39.x before 1.39.6, and 1.40.x before 1.40.2. XSS can occur via the rev-deleted-user, pagetriage-tags-quickfilter-label, pagetriage-triage, pagetriage-filter-date-range-format-placeholder, pagetriage-filter-date-range-to, pagetriage-filter-date-range-from, pagetriage-filter-date-range-heading, pagetriage-filter-set-button, or pagetriage-filter-reset-button message.
Modified: 2024-11-21
CVE-2024-23177
An issue was discovered in the WatchAnalytics extension in MediaWiki before 1.40.2. XSS can occur via the Special:PageStatistics page parameter.
- https://lists.wikimedia.org/hyperkitty/list/mediawiki-announce%40lists.wikimedia.org/message/TDBUBCCOQJUT4SCHJNPHKQNPBUUETY52/
- https://lists.wikimedia.org/hyperkitty/list/mediawiki-announce%40lists.wikimedia.org/message/TDBUBCCOQJUT4SCHJNPHKQNPBUUETY52/
- https://phabricator.wikimedia.org/T348979
- https://phabricator.wikimedia.org/T348979
Modified: 2024-11-21
CVE-2024-23178
An issue was discovered in the Phonos extension in MediaWiki before 1.40.2. PhonosButton.js allows i18n-based XSS via the phonos-purge-needed-error message.
- https://lists.wikimedia.org/hyperkitty/list/mediawiki-announce%40lists.wikimedia.org/message/TDBUBCCOQJUT4SCHJNPHKQNPBUUETY52/
- https://lists.wikimedia.org/hyperkitty/list/mediawiki-announce%40lists.wikimedia.org/message/TDBUBCCOQJUT4SCHJNPHKQNPBUUETY52/
- https://phabricator.wikimedia.org/T349312
- https://phabricator.wikimedia.org/T349312
Modified: 2024-11-21
CVE-2024-23179
An issue was discovered in the GlobalBlocking extension in MediaWiki before 1.40.2. For a Special:GlobalBlock?uselang=x-xss URI, i18n-based XSS can occur via the parentheses message. This affects subtitle links in buildSubtitleLinks.
- https://lists.wikimedia.org/hyperkitty/list/mediawiki-announce%40lists.wikimedia.org/message/TDBUBCCOQJUT4SCHJNPHKQNPBUUETY52/
- https://lists.wikimedia.org/hyperkitty/list/mediawiki-announce%40lists.wikimedia.org/message/TDBUBCCOQJUT4SCHJNPHKQNPBUUETY52/
- https://phabricator.wikimedia.org/T347746
- https://phabricator.wikimedia.org/T347746
Modified: 2025-03-18
CVE-2024-40596
An issue was discovered in the CheckUser extension for MediaWiki through 1.42.1. The Special:Investigate feature can expose suppressed information for log events. (TimelineService does not support properly suppressing.)
Modified: 2025-03-25
CVE-2024-40598
An issue was discovered in the CheckUser extension for MediaWiki through 1.42.1. The API can expose suppressed information for log events. (The log_deleted attribute is not applied to entries.)
Modified: 2025-03-21
CVE-2024-40599
An issue was discovered in the GuMaxDD skin for MediaWiki through 1.42.1. There is stored XSS via MediaWiki:Sidebar top-level menu entries.
Modified: 2024-11-21
CVE-2024-40600
An issue was discovered in the Metrolook skin for MediaWiki through 1.42.1. There is stored XSS via MediaWiki:Sidebar top-level menu entries.
Modified: 2024-11-21
CVE-2024-40601
An issue was discovered in the MediaWikiChat extension for MediaWiki through 1.42.1. CSRF can occur in API modules.
Modified: 2025-03-14
CVE-2024-40602
An issue was discovered in the Tempo skin for MediaWiki through 1.42.1. There is stored XSS via MediaWiki:Sidebar top-level menu entries.
Modified: 2025-03-18
CVE-2024-40603
An issue was discovered in the ArticleRatings extension for MediaWiki through 1.42.1. Special:ChangeRating allows CSRF to alter data via a GET request.
Modified: 2025-03-18
CVE-2024-40604
An issue was discovered in the Nimbus skin for MediaWiki through 1.42.1. There is Stored XSS via MediaWiki:Nimbus-sidebar menu and submenu entries.
Modified: 2025-03-14
CVE-2024-40605
An issue was discovered in the Foreground skin for MediaWiki through 1.42.1. There is stored XSS via MediaWiki:Sidebar top-level menu entries.
Package scrcpy updated to version 3.0.2-alt1 for branch sisyphus_loongarch64.
Closed bugs
scrcpy: new version
Package djvu updated to version 3.5.28-alt3 for branch sisyphus_loongarch64.
Closed vulnerabilities
BDU:2023-05878
Уязвимость компонента IW44EncodeCodec.cpp библиотеки для просмотра, создания, редактирования DjVu-файлов DjVuLibre, связанная с разделением на ноль, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2021-46312
An issue was discovered IW44EncodeCodec.cpp in djvulibre 3.5.28 in allows attackers to cause a denial of service via divide by zero.
Package vim updated to version 9.1.0917-alt1 for branch sisyphus_loongarch64.
Closed vulnerabilities
BDU:2024-06299
Уязвимость компонента File Name Handler текстового редактора vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2024-06478
Уязвимость функции tagstack_clear_entry() файла src/alloc.c текстового редактора vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
Modified: 2024-11-29
CVE-2024-41957
Vim is an open source command line text editor. Vim < v9.1.0647 has double free in src/alloc.c:616. When closing a window, the corresponding tagstack data will be cleared and freed. However a bit later, the quickfix list belonging to that window will also be cleared and if that quickfix list points to the same tagstack data, Vim will try to free it again, resulting in a double-free/use-after-free access exception. Impact is low since the user must intentionally execute vim with several non-default flags, but it may cause a crash of Vim. The issue has been fixed as of Vim patch v9.1.0647
Modified: 2024-11-21
CVE-2024-41965
Vim is an open source command line text editor. double-free in dialog_changed() in Vim < v9.1.0648. When abandoning a buffer, Vim may ask the user what to do with the modified buffer. If the user wants the changed buffer to be saved, Vim may create a new Untitled file, if the buffer did not have a name yet. However, when setting the buffer name to Unnamed, Vim will falsely free a pointer twice, leading to a double-free and possibly later to a heap-use-after-free, which can lead to a crash. The issue has been fixed as of Vim patch v9.1.0648.
Modified: 2024-11-21
CVE-2024-45306
Vim is an open source, command line text editor. Patch v9.1.0038 optimized how the cursor position is calculated and removed a loop, that verified that the cursor position always points inside a line and does not become invalid by pointing beyond the end of a line. Back then we assumed this loop is unnecessary. However, this change made it possible that the cursor position stays invalid and points beyond the end of a line, which would eventually cause a heap-buffer-overflow when trying to access the line pointer at the specified cursor position. It's not quite clear yet, what can lead to this situation that the cursor points to an invalid position. That's why patch v9.1.0707 does not include a test case. The only observed impact has been a program crash. This issue has been addressed in with the patch v9.1.0707. All users are advised to upgrade.
Closed bugs
Для закрытия CVE-2024-43374 необходимо обновить пакет
Package redis updated to version 7.2.6-alt1 for branch sisyphus_loongarch64.
Closed vulnerabilities
BDU:2024-07792
Уязвимость системы управления базами данных (СУБД) Redis, связанная с переполнением буфера в стеке, позволяющая нарушителю выполнить произвольный код
BDU:2024-09249
Уязвимость системы управления базами данных Redis, существующая из-за недостаточной проверки входных данных, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-10-10
CVE-2024-31227
Redis is an open source, in-memory database that persists on disk. An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service. The problem exists in Redis 7 prior to versions 7.2.6 and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Modified: 2024-10-10
CVE-2024-31228
Redis is an open source, in-memory database that persists on disk. Authenticated users can trigger a denial-of-service by using specially crafted, long string match patterns on supported commands such as `KEYS`, `SCAN`, `PSUBSCRIBE`, `FUNCTION LIST`, `COMMAND LIST` and ACL definitions. Matching of extremely long patterns may result in unbounded recursion, leading to stack overflow and process crash. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.
Modified: 2024-10-10
CVE-2024-31449
Redis is an open source, in-memory database that persists on disk. An authenticated user may use a specially crafted Lua script to trigger a stack buffer overflow in the bit library, which may potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting. This problem has been fixed in Redis versions 6.2.16, 7.2.6, and 7.4.1. Users are advised to upgrade. There are no known workarounds for this vulnerability.