ALT-BU-2024-17418-1
Branch sisyphus_e2k update bulletin.
Package curl updated to version 8.11.1-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2024-11106
Уязвимость обработчика netrc-файлов утилиты командной строки cURL, позволяющая нарушителю получить доступ к учётным данным
Modified: 2025-01-31
CVE-2024-11053
When asked to both use a `.netrc` file for credentials and to follow HTTP redirects, curl could leak the password used for the first host to the followed-to host under certain circumstances. This flaw only manifests itself if the netrc file has an entry that matches the redirect target hostname but the entry either omits just the password or omits both login and password.
Package subversion updated to version 1.14.5-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
Modified: 2025-02-11
CVE-2024-45720
On Windows platforms, a "best fit" character encoding conversion of command line arguments to Subversion's executables (e.g., svn.exe, etc.) may lead to unexpected command line argument interpretation, including argument injection and execution of other programs, if a specially crafted command line argument string is processed. All versions of Subversion up to and including Subversion 1.14.3 are affected on Windows platforms only. Users are recommended to upgrade to version Subversion 1.14.4, which fixes this issue. Subversion is not affected on UNIX-like platforms.
CVE-2024-46901
Insufficient validation of filenames against control characters in Apache Subversion repositories served via mod_dav_svn allows authenticated users with commit access to commit a corrupted revision, leading to disruption for users of the repository. All versions of Subversion up to and including Subversion 1.14.4 are affected if serving repositories via mod_dav_svn. Users are recommended to upgrade to version 1.14.5, which fixes this issue. Repositories served via other access methods are not affected.
Package moodle updated to version 4.5.1-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
No data currently available.
No data currently available.
No data currently available.
No data currently available.
No data currently available.
No data currently available.
Package mupdf updated to version 1.25.2-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-3407
A flaw was found in mupdf 1.18.0. Double free of object during linearization may lead to memory corruption and other potential consequences.
- http://git.ghostscript.com/?p=mupdf.git%3Bh=cee7cefc610d42fd383b3c80c12cbc675443176a
- http://git.ghostscript.com/?p=mupdf.git%3Bh=cee7cefc610d42fd383b3c80c12cbc675443176a
- https://bugs.ghostscript.com/show_bug.cgi?id=703366
- https://bugs.ghostscript.com/show_bug.cgi?id=703366
- [debian-lts-announce] 20210311 [SECURITY] [DLA 2589-1] mupdf security update
- [debian-lts-announce] 20210311 [SECURITY] [DLA 2589-1] mupdf security update
- FEDORA-2021-d8e6f014e5
- FEDORA-2021-d8e6f014e5
- FEDORA-2021-572bb0f886
- FEDORA-2021-572bb0f886
- FEDORA-2021-baeaa7bccb
- FEDORA-2021-baeaa7bccb
- GLSA-202105-30
- GLSA-202105-30
Modified: 2024-11-21
CVE-2021-37220
MuPDF through 1.18.1 has an out-of-bounds write because the cached color converter does not properly consider the maximum key size of a hash table. This can, for example, be seen with crafted "mutool draw" input.
- http://git.ghostscript.com/?p=mupdf.git%3Bh=f5712c9949d026e4b891b25837edd2edc166151f
- http://git.ghostscript.com/?p=mupdf.git%3Bh=f5712c9949d026e4b891b25837edd2edc166151f
- https://bugs.ghostscript.com/show_bug.cgi?id=703791
- https://bugs.ghostscript.com/show_bug.cgi?id=703791
- FEDORA-2021-e1d8a99caa
- FEDORA-2021-e1d8a99caa
Modified: 2024-11-21
CVE-2021-4216
A Floating point exception (division-by-zero) flaw was found in Mupdf for zero width pages in muraster.c. It is fixed in Mupdf-1.20.0-rc1 upstream.
Package python3-module-celery updated to version 5.3.6-alt2 for branch sisyphus_e2k.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2021-23727
This affects the package celery before 5.2.2. It by default trusts the messages and metadata stored in backends (result stores). When reading task metadata from the backend, the data is deserialized. Given that an attacker can gain access to, or somehow manipulate the metadata within a celery backend, they could trigger a stored command injection vulnerability and potentially gain further access to the system.