ALT-BU-2024-4574-2
Branch sisyphus update bulletin.
Closed bugs
excessive dependencies
Package python3-module-django updated to version 4.2.11-alt1 for branch sisyphus in task 343297.
Closed vulnerabilities
BDU:2024-01517
Уязвимость программной платформы для веб-приложений Django, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2024-24680
An issue was discovered in Django 3.2 before 3.2.24, 4.2 before 4.2.10, and Django 5.0 before 5.0.2. The intcomma template filter was subject to a potential denial-of-service attack when used with very long strings.
- https://docs.djangoproject.com/en/5.0/releases/security/
- https://docs.djangoproject.com/en/5.0/releases/security/
- https://groups.google.com/forum/#%21forum/django-announce
- https://groups.google.com/forum/#%21forum/django-announce
- FEDORA-2024-5c7fb64c74
- FEDORA-2024-5c7fb64c74
- FEDORA-2024-2ec03ca8cb
- FEDORA-2024-2ec03ca8cb
- FEDORA-2024-84fbbbb914
- FEDORA-2024-84fbbbb914
- https://www.djangoproject.com/weblog/2024/feb/06/security-releases/
- https://www.djangoproject.com/weblog/2024/feb/06/security-releases/
Modified: 2024-11-21
CVE-2024-27351
In Django 3.2 before 3.2.25, 4.2 before 4.2.11, and 5.0 before 5.0.3, the django.utils.text.Truncator.words() method (with html=True) and the truncatewords_html template filter are subject to a potential regular expression denial-of-service attack via a crafted string. NOTE: this issue exists because of an incomplete fix for CVE-2019-14232 and CVE-2023-43665.
- [oss-security] 20240304 Django: CVE-2024-27351: Potential regular expression denial-of-service in django.utils.text.Truncator.words()
- [oss-security] 20240304 Django: CVE-2024-27351: Potential regular expression denial-of-service in django.utils.text.Truncator.words()
- https://docs.djangoproject.com/en/5.0/releases/security/
- https://docs.djangoproject.com/en/5.0/releases/security/
- https://github.com/django/django/commit/072963e4c4d0b3a7a8c5412bc0c7d27d1a9c3521
- https://github.com/django/django/commit/3394fc6132436eca89e997083bae9985fb7e761e
- https://github.com/django/django/commit/3c9a2771cc80821e041b16eb36c1c37af5349d4a
- https://groups.google.com/forum/#%21forum/django-announce
- https://groups.google.com/forum/#%21forum/django-announce
- FEDORA-2024-5c7fb64c74
- FEDORA-2024-5c7fb64c74
- FEDORA-2024-2ec03ca8cb
- FEDORA-2024-2ec03ca8cb
- FEDORA-2024-84fbbbb914
- FEDORA-2024-84fbbbb914
- https://www.djangoproject.com/weblog/2024/mar/04/security-releases/
- https://www.djangoproject.com/weblog/2024/mar/04/security-releases/
Closed vulnerabilities
Modified: 2024-11-21
CVE-2023-50428
In Bitcoin Core through 26.0 and Bitcoin Knots before 25.1.knots20231115, datacarrier size limits can be bypassed by obfuscating data as code (e.g., with OP_FALSE OP_IF), as exploited in the wild by Inscriptions in 2022 and 2023. NOTE: although this is a vulnerability from the perspective of the Bitcoin Knots project, some others consider it "not a bug."
- https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures
- https://en.bitcoin.it/wiki/Common_Vulnerabilities_and_Exposures
- https://github.com/bitcoin/bitcoin/blob/65c05db660b2ca1d0076b0d8573a6760b3228068/src/kernel/mempool_options.h#L46-L53
- https://github.com/bitcoin/bitcoin/blob/65c05db660b2ca1d0076b0d8573a6760b3228068/src/kernel/mempool_options.h#L46-L53
- https://github.com/bitcoin/bitcoin/pull/28408#issuecomment-1844981799
- https://github.com/bitcoin/bitcoin/pull/28408#issuecomment-1844981799
- https://github.com/bitcoin/bitcoin/tags
- https://github.com/bitcoin/bitcoin/tags
- https://github.com/bitcoinknots/bitcoin/blob/aed49ce8989334c364a219a6eb016a3897d4e3d7/doc/release-notes.md
- https://github.com/bitcoinknots/bitcoin/blob/aed49ce8989334c364a219a6eb016a3897d4e3d7/doc/release-notes.md
- https://twitter.com/LukeDashjr/status/1732204937466032285
- https://twitter.com/LukeDashjr/status/1732204937466032285
Closed bugs
gem-reek: не хватает зависимостей для code_climate_reek (gem-rexml и codeclimate)
Closed bugs
Не работает gem-tf
Closed bugs
ri не показывает документацию
Closed vulnerabilities
Modified: 2024-11-21
CVE-2024-0948
** DISPUTED ** A vulnerability, which was classified as problematic, has been found in NetBox up to 3.7.0. This issue affects some unknown processing of the file /core/config-revisions of the component Home Page Configuration. The manipulation with the input <
>test
leads to cross site scripting. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the moment. The associated identifier of this vulnerability is VDB-252191. NOTE: The vendor was contacted early about this disclosure but did not respond in any way.- https://drive.google.com/file/d/1tcgyzu9Fh3AMG0INR0EdOR7ZjWmBK0ZR/view?usp=sharing
- https://drive.google.com/file/d/1tcgyzu9Fh3AMG0INR0EdOR7ZjWmBK0ZR/view?usp=sharing
- VDB-252191 | CTI Indicators (IOB, IOC, TTP, IOA)
- VDB-252191 | CTI Indicators (IOB, IOC, TTP, IOA)
- VDB-252191 | NetBox Home Page Configuration config-revisions cross site scripting
- VDB-252191 | NetBox Home Page Configuration config-revisions cross site scripting
- Submit #270218 | netbox netbox 3.7.0 XSS
- Submit #270218 | netbox netbox 3.7.0 XSS