ALT-BU-2024-17543-1
Branch c10f1 update bulletin.
Package python3-module-joblib updated to version 1.2.0-alt1 for branch c10f1 in task 365409.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2022-21797
The package joblib from 0 and before 1.2.0 are vulnerable to Arbitrary Code Execution via the pre_dispatch flag in Parallel() class due to the eval() statement.
- https://github.com/joblib/joblib/commit/b90f10efeb670a2cc877fb88ebb3f2019189e059
- https://github.com/joblib/joblib/commit/b90f10efeb670a2cc877fb88ebb3f2019189e059
- https://github.com/joblib/joblib/issues/1128
- https://github.com/joblib/joblib/issues/1128
- https://github.com/joblib/joblib/pull/1321
- https://github.com/joblib/joblib/pull/1321
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3193-1] joblib security update
- [debian-lts-announce] 20221117 [SECURITY] [DLA 3193-1] joblib security update
- [debian-lts-announce] 20230330 [SECURITY] [DLA 3193-2] joblib security update
- [debian-lts-announce] 20230330 [SECURITY] [DLA 3193-2] joblib security update
- FEDORA-2022-c0bfe37ae5
- FEDORA-2022-c0bfe37ae5
- FEDORA-2022-c83ce1c000
- FEDORA-2022-c83ce1c000
- GLSA-202401-01
- GLSA-202401-01
- https://security.snyk.io/vuln/SNYK-PYTHON-JOBLIB-3027033
- https://security.snyk.io/vuln/SNYK-PYTHON-JOBLIB-3027033
Closed bugs
При установке borgmatic не устанавливается borg
Package python3-module-ruamel-yaml updated to version 0.18.5-alt1 for branch c10f1 in task 365429.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-20478
In ruamel.yaml through 0.16.7, the load method allows remote code execution if the application calls this method with an untrusted argument. In other words, this issue affects developers who are unaware of the need to use methods such as safe_load in these use cases.
Closed bugs
Устаревшая ссылка на домашнюю страницу
Closed vulnerabilities
BDU:2024-02163
Уязвимость программного средства управления и запуска OCI-контейнеров Podman, связанная с ошибками при управлении привилегиями, позволяющая нарушителю повысить свои привилегии
BDU:2024-05780
Уязвимость библиотеки github.com/containers/image, связанная с неправильной проверкой значения целостности, позволяющая нарушителю вызвать отказ в обслуживании, выполнить атаку обхода локального пути или оказать иное воздействие
Modified: 2024-11-26
CVE-2024-1753
A flaw was found in Buildah (and subsequently Podman Build) which allows containers to mount arbitrary locations on the host filesystem into build containers. A malicious Containerfile can use a dummy image with a symbolic link to the root filesystem as a mount source and cause the mount operation to mount the host root filesystem inside the RUN step. The commands inside the RUN step will then have read-write access to the host filesystem, allowing for full container escape at build time.
- RHSA-2024:2049
- RHSA-2024:2055
- RHSA-2024:2064
- RHSA-2024:2066
- RHSA-2024:2077
- RHSA-2024:2084
- RHSA-2024:2089
- RHSA-2024:2090
- RHSA-2024:2097
- RHSA-2024:2098
- RHSA-2024:2548
- RHSA-2024:2645
- RHSA-2024:2669
- RHSA-2024:2672
- RHSA-2024:2784
- RHSA-2024:2877
- RHSA-2024:3254
- https://access.redhat.com/security/cve/CVE-2024-1753
- RHBZ#2265513
- https://github.com/containers/buildah/security/advisories/GHSA-pmf3-c36m-g5cf
- https://github.com/containers/podman/security/advisories/GHSA-874v-pj72-92f3
- https://pkg.go.dev/vuln/GO-2024-2658
- RHSA-2024:2049
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FCRZVUDOFM5CPREQKBEU2VK2QK62PSBP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KOYMVMQ7RWMDTSKQTBO734BE3WQPI2AJ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/ZVBSVZGVABPYIHK5HZM472NPGWMI7WXH/
- https://github.com/containers/podman/security/advisories/GHSA-874v-pj72-92f3
- https://github.com/containers/buildah/security/advisories/GHSA-pmf3-c36m-g5cf
- RHBZ#2265513
- https://access.redhat.com/security/cve/CVE-2024-1753
- RHSA-2024:3254
- RHSA-2024:2877
- RHSA-2024:2784
- RHSA-2024:2672
- RHSA-2024:2669
- RHSA-2024:2645
- RHSA-2024:2548
- RHSA-2024:2098
- RHSA-2024:2097
- RHSA-2024:2090
- RHSA-2024:2089
- RHSA-2024:2084
- RHSA-2024:2077
- RHSA-2024:2066
- RHSA-2024:2064
- RHSA-2024:2055
Modified: 2025-02-25
CVE-2024-3727
A flaw was found in the github.com/containers/image library. This flaw allows attackers to trigger unexpected authenticated registry accesses on behalf of a victim user, causing resource exhaustion, local path traversal, and other attacks.
- RHSA-2024:4850
- RHSA-2024:4960
- RHSA-2024:5258
- RHSA-2024:5951
- RHSA-2024:6054
- RHSA-2024:6122
- RHSA-2024:6708
- RHSA-2024:6818
- RHSA-2024:6824
- RHSA-2024:7164
- RHSA-2024:7174
- RHSA-2024:7182
- RHSA-2024:7187
- RHSA-2024:7922
- RHSA-2024:7941
- RHSA-2024:8260
- RHSA-2024:8425
- RHSA-2024:9097
- RHSA-2024:9098
- RHSA-2024:9102
- RHSA-2024:9960
- https://access.redhat.com/security/cve/CVE-2024-3727
- RHBZ#2274767
- RHSA-2024:0045
- RHSA-2024:3718
- RHSA-2024:4159
- RHSA-2024:4613
- RHSA-2024:4613
- RHSA-2024:4159
- RHSA-2024:0045
- RHBZ#2274767
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/4HEYS34N55G7NOQZKNEXZKQVNDGEICCD/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/6B37TXOKTKDBE2V26X2NSP7JKNMZOFVP/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CYT3D2P3OJKISNFKOOHGY6HCUCQZYAVR/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DLND3YDQQRWVRIUPL2G5UKXP5L3VSBBT/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DTOMYERG5ND4QFDHC4ZSGCED3T3ESRSC/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FBZQ2ZRMFEUQ35235B2HWPSXGDCBZHFV/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/GD2GSBQTBLYADASUBHHZV2CZPTSLIPQJ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/QFXMF3VVKIZN7ZMB7PKZCSWV6MOMTGMQ/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/SFVSMR7TNLO2KPWJSW4CF64C2QMQXCIN/
- https://access.redhat.com/security/cve/CVE-2024-3727
Closed bugs
/usr/libexec/podman/catatonit: no such file or directory