ALT-BU-2024-6393-1
Branch c10f2 update bulletin.
Package pve-doc-generator updated to version 7.4.2-alt3 for branch c10f2 in task 343669.
Closed bugs
pve-cluster: cyclic build dependency (blocks perl 5.38 update)
Package pve-cluster updated to version 7.3.3-alt5 for branch c10f2 in task 343669.
Closed bugs
pve-cluster: cyclic build dependency (blocks perl 5.38 update)
Package pve-common updated to version 7.4.2-alt1 for branch c10f2 in task 343669.
Closed bugs
Pvestatd does not start when specifying table in ipv4 route
Package proxmox-perl-rs updated to version 0.2.1-alt3 for branch c10f2 in task 343669.
Closed bugs
proxmox-perl-rs: /usr/lib64/perl5/auto/libpve_rs.so from libpve-rs-perl should link with -lperl
Package pve-access-control updated to version 7.4.3-alt3 for branch c10f2 in task 343669.
Closed bugs
Ошибка входа при использовании 2FA
Package pve-qemu-server updated to version 7.4.4-alt1 for branch c10f2 in task 343669.
Closed bugs
Вылет демона qmeventd "случайным образом" (на самом деле по EINTR)
Package alterator-grub updated to version 0.25-alt2 for branch c10f2 in task 344074.
Closed bugs
Есть возможность ввести знаки кириллицы в пароль загрузчика
grub-md-list не поддерживает nvme диски
Closed vulnerabilities
BDU:2022-05975
Уязвимость функций extract и extractall модуля tarfile интерпретатора языка программирования Python, позволяющая нарушителю выполнить произвольный код
BDU:2023-00665
Уязвимость функции GENERAL_NAME_cmp библиотеки OpenSSL, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-04978
Уязвимость компонента urllib.parse интерпретатора языка программирования Python, позволяющая нарушителю обходить блокировки URL-адресов
BDU:2023-05002
Уязвимость класса SSLSocket интерпретатора языка программирования Python, позволяющая нарушителю раскрыть защищаемую информацию
Modified: 2025-01-17
CVE-2007-4559
Directory traversal vulnerability in the (1) extract and (2) extractall functions in the tarfile module in Python allows user-assisted remote attackers to overwrite arbitrary files via a .. (dot dot) sequence in filenames in a TAR archive, a related issue to CVE-2001-1267.
- [python-dev] 20070824 tarfile and directory traversal vulnerability
- [python-dev] 20070824 tarfile and directory traversal vulnerability
- [python-dev] 20070825 tarfile and directory traversal vulnerability
- [python-dev] 20070825 tarfile and directory traversal vulnerability
- 26623
- 26623
- ADV-2007-3022
- ADV-2007-3022
- https://bugzilla.redhat.com/show_bug.cgi?id=263261
- https://bugzilla.redhat.com/show_bug.cgi?id=263261
- FEDORA-2024-ebb3c95344
- FEDORA-2024-ebb3c95344
- FEDORA-2024-d1f1084584
- FEDORA-2024-d1f1084584
- FEDORA-2024-46374d2703
- FEDORA-2024-46374d2703
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/CVBB7NU3YIRRDOKLYVN647WPRR3IAKR6/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/FI55PGL47ES3OU2FQPGEHOI2EK3S2OBH/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/KA4Z44ZAI4SY7THCFBUDNT5EEFO4XQ3A/
- GLSA-202309-06
- GLSA-202309-06
Modified: 2025-04-02
CVE-2022-4303
The WP Limit Login Attempts WordPress plugin through 2.6.4 prioritizes getting a visitor's IP from certain HTTP headers over PHP's REMOTE_ADDR, which makes it possible to bypass IP-based restrictions on login forms.
Modified: 2025-03-21
CVE-2023-0286
There is a type confusion vulnerability relating to X.400 address processing inside an X.509 GeneralName. X.400 addresses were parsed as an ASN1_STRING but the public structure definition for GENERAL_NAME incorrectly specified the type of the x400Address field as ASN1_TYPE. This field is subsequently interpreted by the OpenSSL function GENERAL_NAME_cmp as an ASN1_TYPE rather than an ASN1_STRING. When CRL checking is enabled (i.e. the application sets the X509_V_FLAG_CRL_CHECK flag), this vulnerability may allow an attacker to pass arbitrary pointers to a memcmp call, enabling them to read memory contents or enact a denial of service. In most cases, the attack requires the attacker to provide both the certificate chain and CRL, neither of which need to have a valid signature. If the attacker only controls one of these inputs, the other input must already contain an X.400 address as a CRL distribution point, which is uncommon. As such, this vulnerability is most likely to only affect applications which have implemented their own functionality for retrieving CRLs over a network.
- https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.6.2-relnotes.txt
- https://ftp.openbsd.org/pub/OpenBSD/LibreSSL/libressl-3.6.2-relnotes.txt
- https://ftp.openbsd.org/pub/OpenBSD/patches/7.2/common/018_x509.patch.sig
- https://ftp.openbsd.org/pub/OpenBSD/patches/7.2/common/018_x509.patch.sig
- 1.1.1t git commit
- 1.1.1t git commit
- 3.0.8 git commit
- 3.0.8 git commit
- 1.0.2zg patch (premium)
- 1.0.2zg patch (premium)
- https://security.gentoo.org/glsa/202402-08
- https://security.gentoo.org/glsa/202402-08
- OpenSSL Advisory
- OpenSSL Advisory
Modified: 2025-03-18
CVE-2023-24329
An issue in the urllib.parse component of Python before 3.11.4 allows attackers to bypass blocklisting methods by supplying a URL that starts with blank characters.
- https://github.com/python/cpython/issues/102153
- https://github.com/python/cpython/pull/99421
- [debian-lts-announce] 20230920 [SECURITY] [DLA 3575-1] python2.7 security update
- FEDORA-2023-690e150a39
- FEDORA-2023-03599274db
- FEDORA-2023-96aa33f0d3
- FEDORA-2023-994ecd7dbc
- FEDORA-2023-f52390b9d2
- FEDORA-2023-31888c4781
- FEDORA-2023-401947eb94
- FEDORA-2023-2b25dd2a11
- FEDORA-2023-d8b0003ecd
- FEDORA-2023-1092538441
- FEDORA-2023-81bb8e3b99
- FEDORA-2023-dd526ed2e4
- FEDORA-2023-406c1c6ed7
- FEDORA-2023-acdfd145f2
- FEDORA-2023-309cadedc6
- FEDORA-2023-d294ef140e
- FEDORA-2023-b854908745
- FEDORA-2023-b3a3df39dd
- FEDORA-2023-953c2607d8
- FEDORA-2023-63c69aa712
- FEDORA-2023-56cefa23df
- https://pointernull.com/security/python-url-parse-problem.html
- https://security.netapp.com/advisory/ntap-20230324-0004/
- VU#127587
- https://github.com/python/cpython/issues/102153
- VU#127587
- https://security.netapp.com/advisory/ntap-20230324-0004/
- https://pointernull.com/security/python-url-parse-problem.html
- FEDORA-2023-56cefa23df
- FEDORA-2023-63c69aa712
- FEDORA-2023-953c2607d8
- FEDORA-2023-b3a3df39dd
- FEDORA-2023-b854908745
- FEDORA-2023-d294ef140e
- FEDORA-2023-309cadedc6
- FEDORA-2023-acdfd145f2
- FEDORA-2023-406c1c6ed7
- FEDORA-2023-dd526ed2e4
- FEDORA-2023-81bb8e3b99
- FEDORA-2023-1092538441
- FEDORA-2023-d8b0003ecd
- FEDORA-2023-2b25dd2a11
- FEDORA-2023-401947eb94
- FEDORA-2023-31888c4781
- FEDORA-2023-f52390b9d2
- FEDORA-2023-994ecd7dbc
- FEDORA-2023-96aa33f0d3
- FEDORA-2023-03599274db
- FEDORA-2023-690e150a39
- [debian-lts-announce] 20230920 [SECURITY] [DLA 3575-1] python2.7 security update
- https://github.com/python/cpython/pull/99421
Modified: 2024-11-21
CVE-2023-40217
An issue was discovered in Python before 3.8.18, 3.9.x before 3.9.18, 3.10.x before 3.10.13, and 3.11.x before 3.11.5. It primarily affects servers (such as HTTP servers) that use TLS client authentication. If a TLS server-side socket is created, receives data into the socket buffer, and then is closed quickly, there is a brief window where the SSLSocket instance will detect the socket as "not connected" and won't initiate a handshake, but buffered data will still be readable from the socket buffer. This data will not be authenticated if the server-side TLS peer is expecting client certificate authentication, and is indistinguishable from valid TLS stream data. Data is limited in size to the amount that will fit in the buffer. (The TLS connection cannot directly be used for data exfiltration because the vulnerable code path requires that the connection be closed on initialization of the SSLSocket.)
- [debian-lts-announce] 20230920 [SECURITY] [DLA 3575-1] python2.7 security update
- [debian-lts-announce] 20230920 [SECURITY] [DLA 3575-1] python2.7 security update
- [debian-lts-announce] 20231011 [SECURITY] [DLA 3614-1] python3.7 security update
- [debian-lts-announce] 20231011 [SECURITY] [DLA 3614-1] python3.7 security update
- https://mail.python.org/archives/list/security-announce%40python.org/thread/PEPLII27KYHLF4AK3ZQGKYNCRERG4YXY/
- https://mail.python.org/archives/list/security-announce%40python.org/thread/PEPLII27KYHLF4AK3ZQGKYNCRERG4YXY/
- https://security.netapp.com/advisory/ntap-20231006-0014/
- https://security.netapp.com/advisory/ntap-20231006-0014/
- https://www.python.org/dev/security/
- https://www.python.org/dev/security/
Closed bugs
Обновление python3 для закрытия уязвимостей
Package NetworkManager-applet-gtk updated to version 1.36.0-alt1 for branch c10f2 in task 344297.
Closed bugs
Не импортируется конфигурация для соединения VPN: Ошибка сегментирования
build with indicator support
Package NetworkManager updated to version 1.46.0-alt1.p10.1 for branch c10f2 in task 344297.
Closed bugs
NetworkManager-daemon: depends on systemd
Добавить зависимость на mobile-broadband-provider-info
В апплете NetworkManager позволяется настроить и удалить интерфейс подсистемы etcnet
Package 389-ds-base updated to version 2.4.5-alt1 for branch c10f2 in task 344761.
Closed vulnerabilities
BDU:2023-04786
Уязвимость плагина Content Synchronization сервера службы каталогов 389 Directory Server, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2022-2850
A flaw was found In 389-ds-base. When the Content Synchronization plugin is enabled, an authenticated user can reach a NULL pointer dereference using a specially crafted query. This flaw allows an authenticated attacker to cause a denial of service. This CVE is assigned against an incomplete fix of CVE-2021-3514.
- https://access.redhat.com/security/cve/CVE-2022-2850
- https://access.redhat.com/security/cve/CVE-2022-2850
- https://bugzilla.redhat.com/show_bug.cgi?id=2118691
- https://bugzilla.redhat.com/show_bug.cgi?id=2118691
- https://lists.debian.org/debian-lts-announce/2023/04/msg00026.html
- https://lists.debian.org/debian-lts-announce/2023/04/msg00026.html