ALT-BU-2024-17564-1
Branch sisyphus_e2k update bulletin.
Package evms updated to version 2.5.5-alt85 for branch sisyphus_e2k.
Closed bugs
Захардкожен устаревший шифр aes-cbc-essiv:sha256
Package qt4 updated to version 4.8.7-alt26.E2K.2 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2021-03630
Уязвимость функции read_xbm_body кроссплатформенной IDE Qt, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2020-17507
An issue was discovered in Qt through 5.12.9, and 5.13.x through 5.15.x before 5.15.1. read_xbm_body in gui/image/qxbmhandler.cpp has a buffer over-read.
- openSUSE-SU-2020:1452
- openSUSE-SU-2020:1452
- openSUSE-SU-2020:1500
- openSUSE-SU-2020:1500
- openSUSE-SU-2020:1501
- openSUSE-SU-2020:1501
- openSUSE-SU-2020:1530
- openSUSE-SU-2020:1530
- openSUSE-SU-2020:1564
- openSUSE-SU-2020:1564
- openSUSE-SU-2020:1568
- openSUSE-SU-2020:1568
- https://codereview.qt-project.org/c/qt/qtbase/+/308436
- https://codereview.qt-project.org/c/qt/qtbase/+/308436
- https://codereview.qt-project.org/c/qt/qtbase/+/308495
- https://codereview.qt-project.org/c/qt/qtbase/+/308495
- https://codereview.qt-project.org/c/qt/qtbase/+/308496
- https://codereview.qt-project.org/c/qt/qtbase/+/308496
- [debian-lts-announce] 20200928 [SECURITY] [DLA 2377-1] qt4-x11 security update
- [debian-lts-announce] 20200928 [SECURITY] [DLA 2377-1] qt4-x11 security update
- [debian-lts-announce] 20200928 [SECURITY] [DLA 2376-1] qtbase-opensource-src security update
- [debian-lts-announce] 20200928 [SECURITY] [DLA 2376-1] qtbase-opensource-src security update
- FEDORA-2020-b8091188d0
- FEDORA-2020-b8091188d0
- FEDORA-2020-8dd86f1b3f
- FEDORA-2020-8dd86f1b3f
- GLSA-202009-04
- GLSA-202009-04
Package python3-module-django updated to version 4.2.17-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2024-10874
Уязвимость класса django.db.models.fields.json.HasKey программной платформы для веб-приложений Django, позволяющая нарушителю выполнить произвольный SQL-код
BDU:2024-11394
Уязвимость функции strip_tags() модуля django.utils.html программной платформы для веб-приложений Django, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-12-31
CVE-2024-53907
An issue was discovered in Django 5.1 before 5.1.4, 5.0 before 5.0.10, and 4.2 before 4.2.17. The strip_tags() method and striptags template filter are subject to a potential denial-of-service attack via certain inputs containing large sequences of nested incomplete HTML entities.
Modified: 2024-12-06
CVE-2024-53908
An issue was discovered in Django 5.1 before 5.1.4, 5.0 before 5.0.10, and 4.2 before 4.2.17. Direct usage of the django.db.models.fields.json.HasKey lookup, when an Oracle database is used, is subject to SQL injection if untrusted data is used as an lhs value. (Applications that use the jsonfield.has_key lookup via __ are unaffected.)
Package vim updated to version 9.1.0917-alt3 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2024-06299
Уязвимость компонента File Name Handler текстового редактора vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2024-06478
Уязвимость функции tagstack_clear_entry() файла src/alloc.c текстового редактора vim, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
Modified: 2024-11-29
CVE-2024-41957
Vim is an open source command line text editor. Vim < v9.1.0647 has double free in src/alloc.c:616. When closing a window, the corresponding tagstack data will be cleared and freed. However a bit later, the quickfix list belonging to that window will also be cleared and if that quickfix list points to the same tagstack data, Vim will try to free it again, resulting in a double-free/use-after-free access exception. Impact is low since the user must intentionally execute vim with several non-default flags, but it may cause a crash of Vim. The issue has been fixed as of Vim patch v9.1.0647
Modified: 2024-11-21
CVE-2024-41965
Vim is an open source command line text editor. double-free in dialog_changed() in Vim < v9.1.0648. When abandoning a buffer, Vim may ask the user what to do with the modified buffer. If the user wants the changed buffer to be saved, Vim may create a new Untitled file, if the buffer did not have a name yet. However, when setting the buffer name to Unnamed, Vim will falsely free a pointer twice, leading to a double-free and possibly later to a heap-use-after-free, which can lead to a crash. The issue has been fixed as of Vim patch v9.1.0648.
Modified: 2024-11-21
CVE-2024-45306
Vim is an open source, command line text editor. Patch v9.1.0038 optimized how the cursor position is calculated and removed a loop, that verified that the cursor position always points inside a line and does not become invalid by pointing beyond the end of a line. Back then we assumed this loop is unnecessary. However, this change made it possible that the cursor position stays invalid and points beyond the end of a line, which would eventually cause a heap-buffer-overflow when trying to access the line pointer at the specified cursor position. It's not quite clear yet, what can lead to this situation that the cursor points to an invalid position. That's why patch v9.1.0707 does not include a test case. The only observed impact has been a program crash. This issue has been addressed in with the patch v9.1.0707. All users are advised to upgrade.
Closed bugs
Для закрытия CVE-2024-43374 необходимо обновить пакет
Конфликт: файл /usr/share/vim/ftplugin/mediawiki.vim из устанавливаемого пакета vim-plugin-mediawiki-syntax-0.0-alt5.noarch конфликтует с файлом из пакета vim-common-4:9.1.0917-alt1.noarch
Непрописанный файловый конфликт с пакетом vim-plugin-nim