ALT-BU-2024-6698-1
Branch sisyphus_e2k update bulletin.
Package gem-yajl-ruby updated to version 1.4.3-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2023-07630
Уязвимость компонента yajl_buf.c библиотеки JSON YAJL-ruby, позволяющая нарушителю получить доступ к конфиденциальным данным
Modified: 2024-11-21
CVE-2022-24795
yajl-ruby is a C binding to the YAJL JSON parsing and generation library. The 1.x branch and the 2.x branch of `yajl` contain an integer overflow which leads to subsequent heap memory corruption when dealing with large (~2GB) inputs. The reallocation logic at `yajl_buf.c#L64` may result in the `need` 32bit integer wrapping to 0 when `need` approaches a value of 0x80000000 (i.e. ~2GB of data), which results in a reallocation of buf->alloc into a small heap chunk. These integers are declared as `size_t` in the 2.x branch of `yajl`, which practically prevents the issue from triggering on 64bit platforms, however this does not preclude this issue triggering on 32bit builds on which `size_t` is a 32bit integer. Subsequent population of this under-allocated heap chunk is based on the original buffer size, leading to heap memory corruption. This vulnerability mostly impacts process availability. Maintainers believe exploitation for arbitrary code execution is unlikely. A patch is available and anticipated to be part of yajl-ruby version 1.4.2. As a workaround, avoid passing large inputs to YAJL.
- https://github.com/brianmario/yajl-ruby/blob/7168bd79b888900aa94523301126f968a93eb3a6/ext/yajl/yajl_buf.c#L64
- https://github.com/brianmario/yajl-ruby/blob/7168bd79b888900aa94523301126f968a93eb3a6/ext/yajl/yajl_buf.c#L64
- https://github.com/brianmario/yajl-ruby/commit/7168bd79b888900aa94523301126f968a93eb3a6
- https://github.com/brianmario/yajl-ruby/commit/7168bd79b888900aa94523301126f968a93eb3a6
- https://github.com/brianmario/yajl-ruby/security/advisories/GHSA-jj47-x69x-mxrm
- https://github.com/brianmario/yajl-ruby/security/advisories/GHSA-jj47-x69x-mxrm
- [debian-lts-announce] 20230711 [SECURITY] [DLA 3492-1] yajl security update
- [debian-lts-announce] 20230711 [SECURITY] [DLA 3492-1] yajl security update
- [debian-lts-announce] 20230805 [SECURITY] [DLA 3516-1] burp security update
- [debian-lts-announce] 20230805 [SECURITY] [DLA 3516-1] burp security update
- FEDORA-2023-00572178e1
- FEDORA-2023-00572178e1
- FEDORA-2023-852b377773
- FEDORA-2023-852b377773
Package gem-redcarpet updated to version 3.5.1.1-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2021-03625
Уязвимость библиотеки Ruby для парсинга Markdown в HTML Redcarpet, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю оказать воздействие на целостность защищаемой информации
Modified: 2024-11-21
CVE-2020-26298
Redcarpet is a Ruby library for Markdown processing. In Redcarpet before version 3.5.1, there is an injection vulnerability which can enable a cross-site scripting attack. In affected versions no HTML escaping was being performed when processing quotes. This applies even when the `:escape_html` option was being used. This is fixed in version 3.5.1 by the referenced commit.
- https://github.com/advisories/GHSA-q3wr-qw3g-3p4h
- https://github.com/advisories/GHSA-q3wr-qw3g-3p4h
- https://github.com/vmg/redcarpet/blob/master/CHANGELOG.md#version-351-security
- https://github.com/vmg/redcarpet/blob/master/CHANGELOG.md#version-351-security
- https://github.com/vmg/redcarpet/commit/a699c82292b17c8e6a62e1914d5eccc252272793
- https://github.com/vmg/redcarpet/commit/a699c82292b17c8e6a62e1914d5eccc252272793
- [debian-lts-announce] 20210115 [SECURITY] [DLA 2526-1] ruby-redcarpet security update
- [debian-lts-announce] 20210115 [SECURITY] [DLA 2526-1] ruby-redcarpet security update
- FEDORA-2023-8682a0e17d
- FEDORA-2023-8682a0e17d
- FEDORA-2023-597f13ffb9
- FEDORA-2023-597f13ffb9
- FEDORA-2023-44daa9c1d4
- FEDORA-2023-44daa9c1d4
- https://rubygems.org/gems/redcarpet
- https://rubygems.org/gems/redcarpet
- DSA-4831
- DSA-4831
Package rpm-build-ruby updated to version 1.1.1-alt1 for branch sisyphus_e2k.
Closed bugs
gem-method-source теряет requires/provides при пересборке
Package gem-nokogiri updated to version 1.16.2-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2020-04514
Уязвимость компонента xmlschemas.c библиотеки libxml2, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-02772
Уязвимость библиотеки libxml2, связанная с недостаточной проверкой вводимых данных, позволяющая нарушителю, вызвать состояние отказа в обслуживании
BDU:2021-03429
Уязвимость функции xmlEncodeEntitiesInternal компонента libxml2/entities.c библиотеки Libxml2, связанная с чтением за допустимыми границами буфера данных, позволяющая нарушителю получить доступ к конфиденциальным данным, а также вызвать отказ в обслуживании
BDU:2021-05268
Уязвимость компонента parser.c библиотеки Libxml2, связанная с ошибками разыменования указателя, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2021-05274
Уязвимость функционала кодирования xml объектов библиотеки Libxml2, связанная с записью за границами буфера, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2021-05283
Уязвимость компонента xinclude.c библиотеки Libxml2, связанная с использованием памяти после её освобождения, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2022-01641
Уязвимость библиотеки zlib, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-06047
Уязвимость программной библиотеки Nokogiri, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-01415
Уязвимость функции xmlValidatePopElement компонента XML Reader Interface библиотеки Libxml2, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-01887
Уязвимость анализатора html-кода NekoHTML программной библиотеки Nokogiri, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-03-28
CVE-2018-25032
zlib before 1.2.12 allows memory corruption when deflating (i.e., when compressing) if the input has many distant matches.
- 20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina
- 20220516 APPLE-SA-2022-05-16-4 Security Update 2022-004 Catalina
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- 20220516 APPLE-SA-2022-05-16-3 macOS Big Sur 11.6.6
- 20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4
- 20220516 APPLE-SA-2022-05-16-2 macOS Monterey 12.4
- [oss-security] 20220325 Re: zlib memory corruption on deflate (i.e. compress)
- [oss-security] 20220325 Re: zlib memory corruption on deflate (i.e. compress)
- [oss-security] 20220326 Re: zlib memory corruption on deflate (i.e. compress)
- [oss-security] 20220326 Re: zlib memory corruption on deflate (i.e. compress)
- https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-333517.pdf
- https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
- https://github.com/madler/zlib/commit/5c44459c3b28a9bd3283aaceab7c615f8020c531
- https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
- https://github.com/madler/zlib/compare/v1.2.11...v1.2.12
- https://github.com/madler/zlib/issues/605
- https://github.com/madler/zlib/issues/605
- [debian-lts-announce] 20220402 [SECURITY] [DLA 2968-1] zlib security update
- [debian-lts-announce] 20220402 [SECURITY] [DLA 2968-1] zlib security update
- [debian-lts-announce] 20220507 [SECURITY] [DLA 2993-1] libz-mingw-w64 security update
- [debian-lts-announce] 20220507 [SECURITY] [DLA 2993-1] libz-mingw-w64 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- [debian-lts-announce] 20220916 [SECURITY] [DLA 3114-1] mariadb-10.3 security update
- FEDORA-2022-b58a85e167
- FEDORA-2022-b58a85e167
- FEDORA-2022-61cf1c64f6
- FEDORA-2022-61cf1c64f6
- FEDORA-2022-3a92250fd5
- FEDORA-2022-3a92250fd5
- FEDORA-2022-413a80a102
- FEDORA-2022-413a80a102
- FEDORA-2022-12b89e2aad
- FEDORA-2022-12b89e2aad
- FEDORA-2022-dbd2935e44
- FEDORA-2022-dbd2935e44
- GLSA-202210-42
- GLSA-202210-42
- https://security.netapp.com/advisory/ntap-20220526-0009/
- https://security.netapp.com/advisory/ntap-20220526-0009/
- https://security.netapp.com/advisory/ntap-20220729-0004/
- https://security.netapp.com/advisory/ntap-20220729-0004/
- https://support.apple.com/kb/HT213255
- https://support.apple.com/kb/HT213255
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213256
- https://support.apple.com/kb/HT213257
- https://support.apple.com/kb/HT213257
- DSA-5111
- DSA-5111
- https://www.openwall.com/lists/oss-security/2022/03/24/1
- https://www.openwall.com/lists/oss-security/2022/03/24/1
- https://www.openwall.com/lists/oss-security/2022/03/28/1
- https://www.openwall.com/lists/oss-security/2022/03/28/1
- https://www.openwall.com/lists/oss-security/2022/03/28/3
- https://www.openwall.com/lists/oss-security/2022/03/28/3
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
Modified: 2024-11-21
CVE-2019-20388
xmlSchemaPreRun in xmlschemas.c in libxml2 2.9.10 allows an xmlSchemaValidateStream memory leak.
- openSUSE-SU-2020:0681
- openSUSE-SU-2020:0681
- https://gitlab.gnome.org/GNOME/libxml2/merge_requests/68
- https://gitlab.gnome.org/GNOME/libxml2/merge_requests/68
- [debian-lts-announce] 20200909 [SECURITY] [DLA 2369-1] libxml2 security update
- [debian-lts-announce] 20200909 [SECURITY] [DLA 2369-1] libxml2 security update
- FEDORA-2020-41fe1680f6
- FEDORA-2020-41fe1680f6
- FEDORA-2020-0c71c00af4
- FEDORA-2020-0c71c00af4
- FEDORA-2020-7694e8be73
- FEDORA-2020-7694e8be73
- GLSA-202010-04
- GLSA-202010-04
- https://security.netapp.com/advisory/ntap-20200702-0005/
- https://security.netapp.com/advisory/ntap-20200702-0005/
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
Modified: 2024-11-21
CVE-2020-24977
GNOME project libxml2 v2.9.10 has a global buffer over-read vulnerability in xmlEncodeEntitiesInternal at libxml2/entities.c. The issue has been fixed in commit 50f06b3e.
- openSUSE-SU-2020:1430
- openSUSE-SU-2020:1430
- openSUSE-SU-2020:1465
- openSUSE-SU-2020:1465
- https://gitlab.gnome.org/GNOME/libxml2/-/commit/50f06b3efb638efb0abd95dc62dca05ae67882c2
- https://gitlab.gnome.org/GNOME/libxml2/-/commit/50f06b3efb638efb0abd95dc62dca05ae67882c2
- https://gitlab.gnome.org/GNOME/libxml2/-/issues/178
- https://gitlab.gnome.org/GNOME/libxml2/-/issues/178
- [mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar
- [mina-dev] 20210225 [jira] [Created] (FTPSERVER-500) Security vulnerability in common/lib/log4j-1.2.17.jar
- [debian-lts-announce] 20200909 [SECURITY] [DLA 2369-1] libxml2 security update
- [debian-lts-announce] 20200909 [SECURITY] [DLA 2369-1] libxml2 security update
- FEDORA-2020-35087800be
- FEDORA-2020-35087800be
- FEDORA-2020-ff317550e4
- FEDORA-2020-ff317550e4
- FEDORA-2020-b6aaf25741
- FEDORA-2020-b6aaf25741
- FEDORA-2020-be489044df
- FEDORA-2020-be489044df
- FEDORA-2020-935f62c3d9
- FEDORA-2020-935f62c3d9
- FEDORA-2020-7dd29dacad
- FEDORA-2020-7dd29dacad
- FEDORA-2020-20ab468a33
- FEDORA-2020-20ab468a33
- FEDORA-2020-dd2fc19b78
- FEDORA-2020-dd2fc19b78
- FEDORA-2020-b60dbdd538
- FEDORA-2020-b60dbdd538
- FEDORA-2020-7773c53bc8
- FEDORA-2020-7773c53bc8
- GLSA-202107-05
- GLSA-202107-05
- https://security.netapp.com/advisory/ntap-20200924-0001/
- https://security.netapp.com/advisory/ntap-20200924-0001/
- https://security.netapp.com/advisory/ntap-20200924-0001/
- https://security.netapp.com/advisory/ntap-20200924-0001/
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
Modified: 2024-11-21
CVE-2021-3517
There is a flaw in the xml entity encoding functionality of libxml2 in versions before 2.9.11. An attacker who is able to supply a crafted file to be processed by an application linked with the affected functionality of libxml2 could trigger an out-of-bounds read. The most likely impact of this flaw is to application availability, with some potential impact to confidentiality and integrity if an attacker is able to use memory information to further exploit the application.
- https://bugzilla.redhat.com/show_bug.cgi?id=1954232
- https://bugzilla.redhat.com/show_bug.cgi?id=1954232
- [bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [debian-lts-announce] 20210510 [SECURITY] [DLA 2653-1] libxml2 security update
- [debian-lts-announce] 20210510 [SECURITY] [DLA 2653-1] libxml2 security update
- FEDORA-2021-b950000d2b
- FEDORA-2021-b950000d2b
- FEDORA-2021-e3ed1ba38b
- FEDORA-2021-e3ed1ba38b
- GLSA-202107-05
- GLSA-202107-05
- https://security.netapp.com/advisory/ntap-20210625-0002/
- https://security.netapp.com/advisory/ntap-20210625-0002/
- https://security.netapp.com/advisory/ntap-20211022-0004/
- https://security.netapp.com/advisory/ntap-20211022-0004/
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
Modified: 2024-11-21
CVE-2021-3518
There's a flaw in libxml2 in versions before 2.9.11. An attacker who is able to submit a crafted file to be processed by an application linked with libxml2 could trigger a use-after-free. The greatest impact from this flaw is to confidentiality, integrity, and availability.
- 20210723 APPLE-SA-2021-07-21-1 iOS 14.7 and iPadOS 14.7
- 20210723 APPLE-SA-2021-07-21-1 iOS 14.7 and iPadOS 14.7
- 20210723 APPLE-SA-2021-07-21-2 macOS Big Sur 11.5
- 20210723 APPLE-SA-2021-07-21-2 macOS Big Sur 11.5
- 20210723 APPLE-SA-2021-07-21-5 watchOS 7.6
- 20210723 APPLE-SA-2021-07-21-5 watchOS 7.6
- 20210723 APPLE-SA-2021-07-21-6 tvOS 14.7
- 20210723 APPLE-SA-2021-07-21-6 tvOS 14.7
- https://bugzilla.redhat.com/show_bug.cgi?id=1954242
- https://bugzilla.redhat.com/show_bug.cgi?id=1954242
- [bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210629 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [bookkeeper-issues] 20210628 [GitHub] [bookkeeper] padma81 opened a new issue #2746: Security Vulnerabilities in CentOS 7 image, Upgrade image to CentOS 8
- [debian-lts-announce] 20210510 [SECURITY] [DLA 2653-1] libxml2 security update
- [debian-lts-announce] 20210510 [SECURITY] [DLA 2653-1] libxml2 security update
- FEDORA-2021-b950000d2b
- FEDORA-2021-b950000d2b
- FEDORA-2021-e3ed1ba38b
- FEDORA-2021-e3ed1ba38b
- GLSA-202107-05
- GLSA-202107-05
- https://security.netapp.com/advisory/ntap-20210625-0002/
- https://security.netapp.com/advisory/ntap-20210625-0002/
- https://support.apple.com/kb/HT212601
- https://support.apple.com/kb/HT212601
- https://support.apple.com/kb/HT212602
- https://support.apple.com/kb/HT212602
- https://support.apple.com/kb/HT212604
- https://support.apple.com/kb/HT212604
- https://support.apple.com/kb/HT212605
- https://support.apple.com/kb/HT212605
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
Modified: 2024-11-21
CVE-2021-3537
A vulnerability found in libxml2 in versions before 2.9.11 shows that it did not propagate errors while parsing XML mixed content, causing a NULL dereference. If an untrusted XML document was parsed in recovery mode and post-validated, the flaw could be used to crash the application. The highest threat from this vulnerability is to system availability.
- https://bugzilla.redhat.com/show_bug.cgi?id=1956522
- https://bugzilla.redhat.com/show_bug.cgi?id=1956522
- [debian-lts-announce] 20210510 [SECURITY] [DLA 2653-1] libxml2 security update
- [debian-lts-announce] 20210510 [SECURITY] [DLA 2653-1] libxml2 security update
- FEDORA-2021-b950000d2b
- FEDORA-2021-b950000d2b
- FEDORA-2021-e3ed1ba38b
- FEDORA-2021-e3ed1ba38b
- GLSA-202107-05
- GLSA-202107-05
- https://security.netapp.com/advisory/ntap-20210625-0002/
- https://security.netapp.com/advisory/ntap-20210625-0002/
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
- https://www.oracle.com/security-alerts/cpuoct2021.html
Modified: 2024-11-21
CVE-2021-3541
A flaw was found in libxml2. Exponential entity expansion attack its possible bypassing all existing protection mechanisms and leading to denial of service.
- https://bugzilla.redhat.com/show_bug.cgi?id=1950515
- https://bugzilla.redhat.com/show_bug.cgi?id=1950515
- https://security.netapp.com/advisory/ntap-20210805-0007/
- https://security.netapp.com/advisory/ntap-20210805-0007/
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
Modified: 2024-11-21
CVE-2021-41098
Nokogiri is a Rubygem providing HTML, XML, SAX, and Reader parsers with XPath and CSS selector support. In Nokogiri v1.12.4 and earlier, on JRuby only, the SAX parser resolves external entities by default. Users of Nokogiri on JRuby who parse untrusted documents using any of these classes are affected: Nokogiri::XML::SAX::Parse, Nokogiri::HTML4::SAX::Parser or its alias Nokogiri::HTML::SAX::Parser, Nokogiri::XML::SAX::PushParser, and Nokogiri::HTML4::SAX::PushParser or its alias Nokogiri::HTML::SAX::PushParser. JRuby users should upgrade to Nokogiri v1.12.5 or later to receive a patch for this issue. There are no workarounds available for v1.12.4 or earlier. CRuby users are not affected.
- https://github.com/sparklemotion/nokogiri/commit/5bf729ff3cc84709ee3c3248c981584088bf9f6d
- https://github.com/sparklemotion/nokogiri/commit/5bf729ff3cc84709ee3c3248c981584088bf9f6d
- https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-2rr5-8q37-2w7h
- https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-2rr5-8q37-2w7h
Modified: 2024-11-21
CVE-2022-23437
There's a vulnerability within the Apache Xerces Java (XercesJ) XML parser when handling specially crafted XML document payloads. This causes, the XercesJ XML parser to wait in an infinite loop, which may sometimes consume system resources for prolonged duration. This vulnerability is present within XercesJ version 2.12.1 and the previous versions.
- [oss-security] 20220124 CVE-2022-23437: Infinite loop within Apache XercesJ xml parser
- [oss-security] 20220124 CVE-2022-23437: Infinite loop within Apache XercesJ xml parser
- https://lists.apache.org/thread/6pjwm10bb69kq955fzr1n0nflnjd27dl
- https://lists.apache.org/thread/6pjwm10bb69kq955fzr1n0nflnjd27dl
- https://security.netapp.com/advisory/ntap-20221028-0005/
- https://security.netapp.com/advisory/ntap-20221028-0005/
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
Modified: 2024-11-21
CVE-2022-24836
Nokogiri is an open source XML and HTML library for Ruby. Nokogiri `< v1.13.4` contains an inefficient regular expression that is susceptible to excessive backtracking when attempting to detect encoding in HTML documents. Users are advised to upgrade to Nokogiri `>= 1.13.4`. There are no known workarounds for this issue.
- 20221220 APPLE-SA-2022-12-13-4 macOS Ventura 13.1
- 20221220 APPLE-SA-2022-12-13-4 macOS Ventura 13.1
- https://github.com/sparklemotion/nokogiri/commit/e444525ef1634b675cd1cf52d39f4320ef0aecfd
- https://github.com/sparklemotion/nokogiri/commit/e444525ef1634b675cd1cf52d39f4320ef0aecfd
- https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-crjr-9rc5-ghw8
- https://github.com/sparklemotion/nokogiri/security/advisories/GHSA-crjr-9rc5-ghw8
- [debian-lts-announce] 20220513 [SECURITY] [DLA 3003-1] ruby-nokogiri security update
- [debian-lts-announce] 20220513 [SECURITY] [DLA 3003-1] ruby-nokogiri security update
- [debian-lts-announce] 20221012 [SECURITY] [DLA 3149-1] ruby-nokogiri security update
- [debian-lts-announce] 20221012 [SECURITY] [DLA 3149-1] ruby-nokogiri security update
- https://lists.debian.org/debian-lts-announce/2024/09/msg00010.html
- FEDORA-2022-d231cb5e1f
- FEDORA-2022-d231cb5e1f
- FEDORA-2022-9ed7641ce0
- FEDORA-2022-9ed7641ce0
- FEDORA-2022-132c6d7c2e
- FEDORA-2022-132c6d7c2e
- GLSA-202208-29
- GLSA-202208-29
- https://support.apple.com/kb/HT213532
- https://support.apple.com/kb/HT213532
Modified: 2024-11-21
CVE-2022-24839
org.cyberneko.html is an html parser written in Java. The fork of `org.cyberneko.html` used by Nokogiri (Rubygem) raises a `java.lang.OutOfMemoryError` exception when parsing ill-formed HTML markup. Users are advised to upgrade to `>= 1.9.22.noko2`. Note: The upstream library `org.cyberneko.html` is no longer maintained. Nokogiri uses its own fork of this library located at https://github.com/sparklemotion/nekohtml and this CVE applies only to that fork. Other forks of nekohtml may have a similar vulnerability.
- https://github.com/sparklemotion/nekohtml/commit/a800fce3b079def130ed42a408ff1d09f89e773d
- https://github.com/sparklemotion/nekohtml/commit/a800fce3b079def130ed42a408ff1d09f89e773d
- https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv
- https://github.com/sparklemotion/nekohtml/security/advisories/GHSA-9849-p7jc-9rmv
- https://www.oracle.com/security-alerts/cpujul2022.html
- https://www.oracle.com/security-alerts/cpujul2022.html
Modified: 2024-11-21
CVE-2024-25062
An issue was discovered in libxml2 before 2.11.7 and 2.12.x before 2.12.5. When using the XML Reader interface with DTD validation and XInclude expansion enabled, processing crafted XML documents can lead to an xmlValidatePopElement use-after-free.
Package ruby updated to version 3.1.4-alt4.3 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2021-04264
Уязвимость реализации класса Net::IMAP интерпретатора Ruby, позволяющая нарушителю реализовать атаку типа «человек посередине»
BDU:2022-03067
Уязвимость методов алгоритма преобразования строки в число с плавающей запятой Kernel#Float и String#to_f интерпретатора языка программирования Ruby, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-03068
Уязвимость реализации класса Regexp интерпретатора языка программирования Ruby, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05714
Уязвимость методов разбора даты языка программирования Ruby, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2022-05837
Уязвимость функции CGI::Cookie.parse языка программирования Ruby, позволяющая нарушителю оказать воздействие на целостность данных
BDU:2023-02020
Уязвимость библиотеки Time интерпретатора Ruby, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2023-03834
Уязвимость компонента CGI языка программирования Ruby, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
BDU:2023-06647
Уязвимость распределенной системы контроля версий Git для Windows, связанная с отсутствием защиты служебных данных, позволяющая нарушителю получить доступ к конфиденциальной информации
Modified: 2024-11-21
CVE-2021-32066
An issue was discovered in Ruby through 2.6.7, 2.7.x through 2.7.3, and 3.x through 3.0.1. Net::IMAP does not raise an exception when StartTLS fails with an an unknown response, which might allow man-in-the-middle attackers to bypass the TLS protections by leveraging a network position between the client and the registry to block the StartTLS command, aka a "StartTLS stripping attack."
- https://github.com/ruby/ruby/commit/a21a3b7d23704a01d34bd79d09dc37897e00922a
- https://github.com/ruby/ruby/commit/a21a3b7d23704a01d34bd79d09dc37897e00922a
- https://hackerone.com/reports/1178562
- https://hackerone.com/reports/1178562
- [debian-lts-announce] 20211013 [SECURITY] [DLA 2780-1] ruby2.3 security update
- [debian-lts-announce] 20211013 [SECURITY] [DLA 2780-1] ruby2.3 security update
- [debian-lts-announce] 20230430 [SECURITY] [DLA 3408-1] jruby security update
- [debian-lts-announce] 20230430 [SECURITY] [DLA 3408-1] jruby security update
- GLSA-202401-27
- GLSA-202401-27
- https://security.netapp.com/advisory/ntap-20210902-0004/
- https://security.netapp.com/advisory/ntap-20210902-0004/
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.oracle.com/security-alerts/cpuapr2022.html
- https://www.ruby-lang.org/en/news/2021/07/07/starttls-stripping-in-net-imap/
- https://www.ruby-lang.org/en/news/2021/07/07/starttls-stripping-in-net-imap/
Modified: 2024-11-21
CVE-2021-33621
The cgi gem before 0.1.0.2, 0.2.x before 0.2.2, and 0.3.x before 0.3.5 for Ruby allows HTTP response splitting. This is relevant to applications that use untrusted user input either to generate an HTTP response or to create a CGI::Cookie object.
- [debian-lts-announce] 20230609 [SECURITY] [DLA 3450-1] ruby2.5 security update
- [debian-lts-announce] 20230609 [SECURITY] [DLA 3450-1] ruby2.5 security update
- FEDORA-2022-ef96a58bbe
- FEDORA-2022-ef96a58bbe
- FEDORA-2022-b9b710f199
- FEDORA-2022-b9b710f199
- FEDORA-2022-f0f6c6bec2
- FEDORA-2022-f0f6c6bec2
- GLSA-202401-27
- GLSA-202401-27
- https://security.netapp.com/advisory/ntap-20221228-0004/
- https://security.netapp.com/advisory/ntap-20221228-0004/
- https://www.ruby-lang.org/en/news/2022/11/22/http-response-splitting-in-cgi-cve-2021-33621/
- https://www.ruby-lang.org/en/news/2022/11/22/http-response-splitting-in-cgi-cve-2021-33621/
Modified: 2024-11-21
CVE-2021-41817
Date.parse in the date gem through 3.2.0 for Ruby allows ReDoS (regular expression Denial of Service) via a long string. The fixed versions are 3.2.1, 3.1.2, 3.0.2, and 2.0.1.
- https://hackerone.com/reports/1254844
- https://hackerone.com/reports/1254844
- FEDORA-2022-82a9edac27
- FEDORA-2022-82a9edac27
- FEDORA-2022-8cf0124add
- FEDORA-2022-8cf0124add
- GLSA-202401-27
- GLSA-202401-27
- https://www.ruby-lang.org/en/news/2021/11/15/date-parsing-method-regexp-dos-cve-2021-41817/
- https://www.ruby-lang.org/en/news/2021/11/15/date-parsing-method-regexp-dos-cve-2021-41817/
Modified: 2024-11-21
CVE-2021-41819
CGI::Cookie.parse in Ruby through 2.6.8 mishandles security prefixes in cookie names. This also affects the CGI gem through 0.3.0 for Ruby.
- https://hackerone.com/reports/910552
- https://hackerone.com/reports/910552
- FEDORA-2022-82a9edac27
- FEDORA-2022-82a9edac27
- FEDORA-2022-8cf0124add
- FEDORA-2022-8cf0124add
- GLSA-202401-27
- GLSA-202401-27
- https://security.netapp.com/advisory/ntap-20220121-0003/
- https://security.netapp.com/advisory/ntap-20220121-0003/
- https://www.ruby-lang.org/en/news/2021/11/24/cookie-prefix-spoofing-in-cgi-cookie-parse-cve-2021-41819/
- https://www.ruby-lang.org/en/news/2021/11/24/cookie-prefix-spoofing-in-cgi-cookie-parse-cve-2021-41819/
Modified: 2024-11-21
CVE-2022-28738
A double free was found in the Regexp compiler in Ruby 3.x before 3.0.4 and 3.1.x before 3.1.2. If a victim attempts to create a Regexp from untrusted user input, an attacker may be able to write to unexpected memory locations.
- https://hackerone.com/reports/1220911
- https://hackerone.com/reports/1220911
- GLSA-202401-27
- GLSA-202401-27
- https://security.netapp.com/advisory/ntap-20220624-0002/
- https://security.netapp.com/advisory/ntap-20220624-0002/
- https://security-tracker.debian.org/tracker/CVE-2022-28738
- https://security-tracker.debian.org/tracker/CVE-2022-28738
- https://www.ruby-lang.org/en/news/2022/04/12/double-free-in-regexp-compilation-cve-2022-28738/
- https://www.ruby-lang.org/en/news/2022/04/12/double-free-in-regexp-compilation-cve-2022-28738/
Modified: 2024-11-21
CVE-2022-28739
There is a buffer over-read in Ruby before 2.6.10, 2.7.x before 2.7.6, 3.x before 3.0.4, and 3.1.x before 3.1.2. It occurs in String-to-Float conversion, including Kernel#Float and String#to_f.
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-24-3 macOS Monterey 12.6.1
- 20221030 APPLE-SA-2022-10-24-3 macOS Monterey 12.6.1
- 20221030 APPLE-SA-2022-10-24-4 macOS Big Sur 11.7.1
- 20221030 APPLE-SA-2022-10-24-4 macOS Big Sur 11.7.1
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-5 Additional information for APPLE-SA-2022-10-24-2 macOS Ventura 13
- 20221030 APPLE-SA-2022-10-27-6 Additional information for APPLE-SA-2022-10-24-3 macOS Monterey 12.6.1
- 20221030 APPLE-SA-2022-10-27-6 Additional information for APPLE-SA-2022-10-24-3 macOS Monterey 12.6.1
- https://hackerone.com/reports/1248108
- https://hackerone.com/reports/1248108
- https://lists.debian.org/debian-lts-announce/2023/06/msg00012.html
- https://lists.debian.org/debian-lts-announce/2023/06/msg00012.html
- https://security.gentoo.org/glsa/202401-27
- https://security.gentoo.org/glsa/202401-27
- https://security.netapp.com/advisory/ntap-20220624-0002/
- https://security.netapp.com/advisory/ntap-20220624-0002/
- https://security-tracker.debian.org/tracker/CVE-2022-28739
- https://security-tracker.debian.org/tracker/CVE-2022-28739
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213488
- https://support.apple.com/kb/HT213493
- https://support.apple.com/kb/HT213493
- https://support.apple.com/kb/HT213494
- https://support.apple.com/kb/HT213494
- https://www.ruby-lang.org/en/news/2022/04/12/buffer-overrun-in-string-to-float-cve-2022-28739/
- https://www.ruby-lang.org/en/news/2022/04/12/buffer-overrun-in-string-to-float-cve-2022-28739/
Modified: 2024-11-21
CVE-2022-39253
Git is an open source, scalable, distributed revision control system. Versions prior to 2.30.6, 2.31.5, 2.32.4, 2.33.5, 2.34.5, 2.35.5, 2.36.3, and 2.37.4 are subject to exposure of sensitive information to a malicious actor. When performing a local clone (where the source and target of the clone are on the same volume), Git copies the contents of the source's `$GIT_DIR/objects` directory into the destination by either creating hardlinks to the source contents, or copying them (if hardlinks are disabled via `--no-hardlinks`). A malicious actor could convince a victim to clone a repository with a symbolic link pointing at sensitive information on the victim's machine. This can be done either by having the victim clone a malicious repository on the same machine, or having them clone a malicious repository embedded as a bare repository via a submodule from any source, provided they clone with the `--recurse-submodules` option. Git does not create symbolic links in the `$GIT_DIR/objects` directory. The problem has been patched in the versions published on 2022-10-18, and backported to v2.30.x. Potential workarounds: Avoid cloning untrusted repositories using the `--local` optimization when on a shared machine, either by passing the `--no-local` option to `git clone` or cloning from a URL that uses the `file://` scheme. Alternatively, avoid cloning repositories from untrusted sources with `--recurse-submodules` or run `git config --global protocol.file.allow user`.
- 20221107 APPLE-SA-2022-11-01-1 Xcode 14.1
- 20221107 APPLE-SA-2022-11-01-1 Xcode 14.1
- [oss-security] 20230214 [Announce] Git 2.39.2 and friends
- [oss-security] 20230214 [Announce] Git 2.39.2 and friends
- [oss-security] 20240514 git: 5 vulnerabilities fixed
- [oss-security] 20240514 git: 5 vulnerabilities fixed
- https://github.com/git/git/security/advisories/GHSA-3wp6-j8xr-qw85
- https://github.com/git/git/security/advisories/GHSA-3wp6-j8xr-qw85
- [debian-lts-announce] 20221213 [SECURITY] [DLA 3239-1] git security update
- [debian-lts-announce] 20221213 [SECURITY] [DLA 3239-1] git security update
- FEDORA-2022-fb088df94c
- FEDORA-2022-fb088df94c
- FEDORA-2022-2c33bba286
- FEDORA-2022-2c33bba286
- FEDORA-2022-53aadd995f
- FEDORA-2022-53aadd995f
- FEDORA-2022-8b58806840
- FEDORA-2022-8b58806840
- FEDORA-2022-12790ca71a
- FEDORA-2022-12790ca71a
- GLSA-202312-15
- GLSA-202312-15
- https://support.apple.com/kb/HT213496
- https://support.apple.com/kb/HT213496
Modified: 2024-11-21
CVE-2023-28756
A ReDoS issue was discovered in the Time component through 0.2.1 in Ruby through 3.2.1. The Time parser mishandles invalid URLs that have specific characters. It causes an increase in execution time for parsing strings to Time objects. The fixed versions are 0.1.1 and 0.2.2.
- https://github.com/ruby/time/releases/
- [debian-lts-announce] 20230430 [SECURITY] [DLA 3408-1] jruby security update
- FEDORA-2023-6b924d3b75
- FEDORA-2023-f58d72c700
- FEDORA-2023-a7be7ea1aa
- GLSA-202401-27
- https://security.netapp.com/advisory/ntap-20230526-0004/
- https://www.ruby-lang.org/en/downloads/releases/
- https://www.ruby-lang.org/en/news/2022/12/25/ruby-3-2-0-released/
- https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/
- https://github.com/ruby/time/releases/
- https://www.ruby-lang.org/en/news/2023/03/30/redos-in-time-cve-2023-28756/
- https://www.ruby-lang.org/en/news/2022/12/25/ruby-3-2-0-released/
- https://www.ruby-lang.org/en/downloads/releases/
- https://security.netapp.com/advisory/ntap-20230526-0004/
- GLSA-202401-27
- FEDORA-2023-a7be7ea1aa
- FEDORA-2023-f58d72c700
- FEDORA-2023-6b924d3b75
- [debian-lts-announce] 20230430 [SECURITY] [DLA 3408-1] jruby security update
Closed bugs
ri не показывает документацию
Пути в $LOAD_PATH и %ruby_sitearchdir версионированы по PATCH
Gem::LoadError: You have already activated bundler 2.2.19, but your Gemfile requires bundler 2.1.4.
gem: Permission denied @ dir_s_mkdir - /var/cache/ruby/gemie/rubygems.org%443
ruby: сборочная зависимость от самой себя
Ошибка No such file or directory @ rb_sysopen при установке gem пакетов
Собрать свежий ruby
wrong ELF class: ELFCLASS32 - /usr/lib/ruby/psych.so (LoadError)
Не работает gem server
Удалить openssl 1.1
Попытка установить 16 новых пакетов при обновлении ruby
Package sisyphus_check updated to version 0.8.69-alt1 for branch sisyphus_e2k.
Closed bugs
semver prerelease or tilde support
Package libredwg updated to version 0.13.3.7227-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2023-26157
Versions of the package libredwg before 0.12.5.6384 are vulnerable to Denial of Service (DoS) due to an out-of-bounds read involving section->num_pages in decode_r2007.c.
- https://github.com/LibreDWG/libredwg/commit/c8cf03ce4c2315b146caf582ea061c0460193bcc
- https://github.com/LibreDWG/libredwg/commit/c8cf03ce4c2315b146caf582ea061c0460193bcc
- https://github.com/LibreDWG/libredwg/issues/850
- https://github.com/LibreDWG/libredwg/issues/850
- https://security.snyk.io/vuln/SNYK-UNMANAGED-LIBREDWG-6070730
- https://security.snyk.io/vuln/SNYK-UNMANAGED-LIBREDWG-6070730
Package systemd updated to version 254.10-alt1.E2K.1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2023-07591
Уязвимость службы systemd-coredump демона Systemd, позволяющая нарушителю нарушителю оказать воздействие на конфиденциальность защищаемой информации
Modified: 2024-11-21
CVE-2022-3821
An off-by-one Error issue was discovered in Systemd in format_timespan() function of time-util.c. An attacker could supply specific values for time and accuracy that leads to buffer overrun in format_timespan(), leading to a Denial of Service.
- https://bugzilla.redhat.com/show_bug.cgi?id=2139327
- https://bugzilla.redhat.com/show_bug.cgi?id=2139327
- https://github.com/systemd/systemd/commit/9102c625a673a3246d7e73d8737f3494446bad4e
- https://github.com/systemd/systemd/commit/9102c625a673a3246d7e73d8737f3494446bad4e
- https://github.com/systemd/systemd/issues/23928
- https://github.com/systemd/systemd/issues/23928
- https://github.com/systemd/systemd/pull/23933
- https://github.com/systemd/systemd/pull/23933
- [debian-lts-announce] 20230629 [SECURITY] [DLA 3474-1] systemd security update
- [debian-lts-announce] 20230629 [SECURITY] [DLA 3474-1] systemd security update
- FEDORA-2022-8ac4104a02
- FEDORA-2022-8ac4104a02
- GLSA-202305-15
- GLSA-202305-15
Modified: 2024-11-21
CVE-2022-4415
A vulnerability was found in systemd. This security flaw can cause a local information leak due to systemd-coredump not respecting the fs.suid_dumpable kernel setting.
- https://github.com/systemd/systemd/commit/b7641425659243c09473cd8fb3aef2c0d4a3eb9c
- https://github.com/systemd/systemd/commit/b7641425659243c09473cd8fb3aef2c0d4a3eb9c
- https://security.netapp.com/advisory/ntap-20230216-0010/
- https://www.openwall.com/lists/oss-security/2022/12/21/3
- https://www.openwall.com/lists/oss-security/2022/12/21/3
Modified: 2024-11-21
CVE-2022-45873
systemd 250 and 251 allows local users to achieve a systemd-coredump deadlock by triggering a crash that has a long backtrace. This occurs in parse_elf_object in shared/elf-util.c. The exploitation methodology is to crash a binary calling the same function recursively, and put it in a deeply nested directory to make its backtrace large enough to cause the deadlock. This must be done 16 times when MaxConnections=16 is set for the systemd/units/systemd-coredump.socket file.
- https://github.com/systemd/systemd/commit/076b807be472630692c5348c60d0c2b7b28ad437
- https://github.com/systemd/systemd/commit/076b807be472630692c5348c60d0c2b7b28ad437
- https://github.com/systemd/systemd/pull/24853#issuecomment-1326561497
- https://github.com/systemd/systemd/pull/24853#issuecomment-1326561497
- https://github.com/systemd/systemd/pull/25055#issuecomment-1313733553
- https://github.com/systemd/systemd/pull/25055#issuecomment-1313733553
- FEDORA-2022-ef4f57b072
- FEDORA-2022-ef4f57b072
Modified: 2024-11-21
CVE-2023-31439
An issue was discovered in systemd 253. An attacker can modify the contents of past events in a sealed log file and then adjust the file such that checking the integrity shows no error, despite modifications. NOTE: the vendor reportedly sent "a reply denying that any of the finding was a security vulnerability."
- https://github.com/kastel-security/Journald
- https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
- https://github.com/systemd/systemd/pull/28885
- https://github.com/systemd/systemd/releases
- https://github.com/kastel-security/Journald
- https://github.com/systemd/systemd/releases
- https://github.com/systemd/systemd/pull/28885
- https://github.com/kastel-security/Journald/blob/main/journald-publication.pdf
Closed bugs
Есть правило для неизвестной группы sgx
control libnss-role status не работает
Increase vm.max_map_count
Package usrmerge updated to version 0.6-alt2 for branch sisyphus_e2k.
Closed bugs
Migrate /sbin/ifup correctly
detect equivalent symlinks
Package kamoso updated to version 24.02.2-alt1 for branch sisyphus_e2k.
Closed bugs
kamoso: Не хватает qt5-quickcontrols в зависимостях пакета
kamoso: Не хватает kf5-kio в зависимостях пакета
Package zabbix updated to version 6.0.28-alt2 for branch sisyphus_e2k.
Closed bugs
отсутствует зависимость на zabbix-phpfrontend-engine