ALT-BU-2024-3878-1
Branch sisyphus_riscv64 update bulletin.
Package python3 updated to version 3.12.2-alt1 for branch sisyphus_riscv64.
Closed bugs
unknown encoding: rot13
Package python3-module-fastapi updated to version 0.110.0-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2024-24762
`python-multipart` is a streaming multipart parser for Python. When using form data, `python-multipart` uses a Regular Expression to parse the HTTP `Content-Type` header, including options. An attacker could send a custom-made `Content-Type` option that is very difficult for the RegEx to process, consuming CPU resources and stalling indefinitely (minutes or more) while holding the main event loop. This means that process can't handle any more requests, leading to regular expression denial of service. This vulnerability has been patched in version 0.0.7.
- https://github.com/andrew-d/python-multipart/blob/d3d16dae4b061c34fe9d3c9081d9800c49fc1f7a/multipart/multipart.py#L72-L74
- https://github.com/andrew-d/python-multipart/blob/d3d16dae4b061c34fe9d3c9081d9800c49fc1f7a/multipart/multipart.py#L72-L74
- https://github.com/encode/starlette/commit/13e5c26a27f4903924624736abd6131b2da80cc5
- https://github.com/encode/starlette/commit/13e5c26a27f4903924624736abd6131b2da80cc5
- https://github.com/encode/starlette/security/advisories/GHSA-93gm-qmq6-w238
- https://github.com/encode/starlette/security/advisories/GHSA-93gm-qmq6-w238
- https://github.com/Kludex/python-multipart/commit/20f0ef6b4e4caf7d69a667c54dff57fe467109a4
- https://github.com/Kludex/python-multipart/commit/20f0ef6b4e4caf7d69a667c54dff57fe467109a4
- https://github.com/Kludex/python-multipart/security/advisories/GHSA-2jv5-9r88-3w3p
- https://github.com/Kludex/python-multipart/security/advisories/GHSA-2jv5-9r88-3w3p
- https://github.com/tiangolo/fastapi/commit/9d34ad0ee8a0dfbbcce06f76c2d5d851085024fc
- https://github.com/tiangolo/fastapi/commit/9d34ad0ee8a0dfbbcce06f76c2d5d851085024fc
- https://github.com/tiangolo/fastapi/releases/tag/0.109.1
- https://github.com/tiangolo/fastapi/releases/tag/0.109.1
- https://github.com/tiangolo/fastapi/security/advisories/GHSA-qf9m-vfgh-m389
- https://github.com/tiangolo/fastapi/security/advisories/GHSA-qf9m-vfgh-m389
Package p7zip updated to version 17.05-alt2 for branch sisyphus_riscv64.
Closed bugs
При распаковке zip архива сообщает об уже существующем файле
Package libvirt updated to version 9.8.0-alt4 for branch sisyphus_riscv64.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2024-1441
An off-by-one error flaw was found in the udevListInterfacesByStatus() function in libvirt when the number of interfaces exceeds the size of the `names` array. This issue can be reproduced by sending specially crafted data to the libvirt daemon, allowing an unprivileged client to perform a denial of service attack by causing the libvirt daemon to crash.
- RHSA-2024:2560
- RHSA-2024:2560
- https://access.redhat.com/security/cve/CVE-2024-1441
- https://access.redhat.com/security/cve/CVE-2024-1441
- RHBZ#2263841
- RHBZ#2263841
- https://lists.debian.org/debian-lts-announce/2024/04/msg00000.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/45FFKU3LODT345LAB5T4XZA5WKYMXJYU/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/E6MVZO5GXDB7RHY6MS3ZXES3HPK34P3A/
Package admx-basealt updated to version 0.1.13.6-alt1 for branch sisyphus_riscv64.
Closed bugs
Нет правил control для qemu-kvm
Неясно, что делает Фильтрация по требованиям
Опечатка и несогласованное предложение в описании политики
Опечатки в описании политик Polkit и раздела "Настройки Системы"
Некорректное описание политики "Ограничение возможности перезагрузки NetworkManager"
Опечатка: frotend -> frontend для политики Сервер frontend веб-интерфейса Alterator
Опечатки в описании политик KDE и GSettings
Скорректировать опцию в политике Проверка сертификата при установлении соединений TLS OpenLDAP
Групповые политики Mate. Перепутаны местами описания в политиках "Время до выхода из сеанса" и "Время до блокировки паролем"
FR: улучшить перевод названия групповой политики "Выход из системы после блокировки" (org-mate-screensaver-logout-enabled)
GPUI позволяет установить параметр смены тем Хранителя экрана = 0 минут
Удаленный доступ через Vino - Пароль для подключения: отсутствует возможность скрывать пароль при вводе
Package vault updated to version 1.13.12-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2023-08660
Уязвимость компонента max_request_duration платформ для архивирования корпоративной информации HashiCorp Vault и Vault Enterprise, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2023-3775
A Vault Enterprise Sentinel Role Governing Policy created by an operator to restrict access to resources in one namespace can be applied to requests outside in another non-descendant namespace, potentially resulting in denial of service. Fixed in Vault Enterprise 1.15.0, 1.14.4, 1.13.8.
Modified: 2024-11-21
CVE-2023-4680
HashiCorp Vault and Vault Enterprise transit secrets engine allowed authorized users to specify arbitrary nonces, even with convergent encryption disabled. The encrypt endpoint, in combination with an offline attack, could be used to decrypt arbitrary ciphertext and potentially derive the authentication subkey when using transit secrets engine without convergent encryption. Introduced in 1.6.0 and fixed in 1.14.3, 1.13.7, and 1.12.11.
Modified: 2025-02-13
CVE-2023-6337
HashiCorp Vault and Vault Enterprise 1.12.0 and newer are vulnerable to a denial of service through memory exhaustion of the host when handling large unauthenticated and authenticated HTTP requests from a client. Vault will attempt to map the request to memory, resulting in the exhaustion of available memory on the host, which may cause Vault to crash. Fixed in Vault 1.15.4, 1.14.8, 1.13.12.
- https://discuss.hashicorp.com/t/hcsec-2023-34-vault-vulnerable-to-denial-of-service-through-memory-exhaustion-when-handling-large-http-requests/60741
- https://discuss.hashicorp.com/t/hcsec-2023-34-vault-vulnerable-to-denial-of-service-through-memory-exhaustion-when-handling-large-http-requests/60741
- https://security.netapp.com/advisory/ntap-20240112-0006/
- https://security.netapp.com/advisory/ntap-20240112-0006/