ALT-BU-2025-2250-3
Branch sisyphus update bulletin.
Closed vulnerabilities
BDU:2026-00291
Уязвимость системы контроля доступа и мониторинга событий LenelS2 NetBox, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю проводить межсайтовые сценарные атаки (XSS)
BDU:2026-00292
Уязвимость системы контроля доступа и мониторинга событий LenelS2 NetBox, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю проводить межсайтовые сценарные атаки (XSS)
BDU:2026-00293
Уязвимость системы контроля доступа и мониторинга событий LenelS2 NetBox, связанная с непринятием мер по защите структуры веб-страницы, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Modified: 2025-06-30
CVE-2024-56915
Netbox Community v4.1.7 and fixed in v.4.2.2 is vulnerable to Cross Site Scripting (XSS) via the RSS feed widget.
Modified: 2025-06-30
CVE-2024-56916
In Netbox Community 4.1.7, once authenticated, Configuration History > Add`is vulnerable to cross-site scripting (XSS) due to the `current value` field rendering user supplied html. An authenticated attacker can leverage this to add malicious JavaScript to the any banner field. Once a victim edits a Configuration History version or attempts to Add a new version, the XSS payload will trigger.
Modified: 2025-06-30
CVE-2024-56917
Netbox Community 4.1.7 is vulnerable to Cross Site Scripting (XSS) via the maintenance banner` in maintenance mode.
Modified: 2025-06-30
CVE-2024-56918
In Netbox Community 4.1.7, the login page is vulnerable to cross-site scripting (XSS), which allows a privileged, authenticated attacker to exfiltrate user input from the login form.
Closed bugs
Сообщения "usermod: /etc/subgid не существует" при установке пакета incus
Непрописанный файловый конфликт с пакетом lxd
Closed bugs
Не запускается на wayland
Closed vulnerabilities
Modified: 2026-03-04
BDU:2025-00908
Уязвимость набора инструментов для веб-разработки DevTools браузера Google Chrome, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
Modified: 2025-04-21
CVE-2025-0762
Use after free in DevTools in Google Chrome prior to 132.0.6834.159 allowed a remote attacker to potentially exploit heap corruption via a crafted Chrome Extension. (Chromium security severity: Medium)
Closed bugs
Медленная работа с сайтом 2gis
Closed vulnerabilities
Modified: 2025-04-30
BDU:2024-07419
Уязвимость набора инструментов XML для Ruby REXML, связанная с неконтролируемым потреблением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-07430
Уязвимость набора инструментов XML для Ruby REXML, связанная с неправильным ограничением рекурсивных ссылок на сущности в DTD, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-11-03
CVE-2024-41946
REXML is an XML toolkit for Ruby. The REXML gem 3.3.2 has a DoS vulnerability when it parses an XML that has many entity expansions with SAX2 or pull parser API. The REXML gem 3.3.3 or later include the patch to fix the vulnerability.
- https://github.com/ruby/rexml/commit/033d1909a8f259d5a7c53681bcaf14f13bcf0368
- https://github.com/ruby/rexml/security/advisories/GHSA-5866-49gr-22v4
- https://www.ruby-lang.org/en/news/2008/08/23/dos-vulnerability-in-rexml
- https://www.ruby-lang.org/en/news/2024/08/01/dos-rexml-cve-2024-41946
- https://lists.debian.org/debian-lts-announce/2025/01/msg00011.html
- https://security.netapp.com/advisory/ntap-20250117-0007/
Modified: 2025-11-03
CVE-2024-43398
REXML is an XML toolkit for Ruby. The REXML gem before 3.3.6 has a DoS vulnerability when it parses an XML that has many deep elements that have same local name attributes. If you need to parse untrusted XMLs with tree parser API like REXML::Document.new, you may be impacted to this vulnerability. If you use other parser APIs such as stream parser API and SAX2 parser API, this vulnerability is not affected. The REXML gem 3.3.6 or later include the patch to fix the vulnerability.
Modified: 2025-11-04
GHSA-5866-49gr-22v4
REXML DoS vulnerability
- https://github.com/ruby/rexml/security/advisories/GHSA-5866-49gr-22v4
- https://nvd.nist.gov/vuln/detail/CVE-2024-41946
- https://github.com/ruby/rexml/commit/033d1909a8f259d5a7c53681bcaf14f13bcf0368
- https://github.com/ruby/rexml
- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rexml/CVE-2024-41946.yml
- https://lists.debian.org/debian-lts-announce/2025/01/msg00011.html
- https://security.netapp.com/advisory/ntap-20250117-0007
- https://www.ruby-lang.org/en/news/2008/08/23/dos-vulnerability-in-rexml
- https://www.ruby-lang.org/en/news/2024/08/01/dos-rexml-cve-2024-41946
Modified: 2025-11-04
GHSA-vmwr-mc7x-5vc3
REXML denial of service vulnerability
- https://github.com/ruby/rexml/security/advisories/GHSA-vmwr-mc7x-5vc3
- https://nvd.nist.gov/vuln/detail/CVE-2024-43398
- https://github.com/ruby/rexml/commit/7cb5eaeb221c322b9912f724183294d8ce96bae3
- https://github.com/ruby/rexml
- https://github.com/ruby/rexml/releases/tag/v3.3.6
- https://github.com/rubysec/ruby-advisory-db/blob/master/gems/rexml/CVE-2024-43398.yml
- https://lists.debian.org/debian-lts-announce/2025/01/msg00011.html
- https://security.netapp.com/advisory/ntap-20250103-0006
- https://www.ruby-lang.org/en/news/2024/08/22/dos-rexml-cve-2024-43398
Closed bugs
Mark /etc/sysconfig/byedpi as %config(noreplace)
Closed vulnerabilities
Modified: 2026-03-04
BDU:2025-01459
Уязвимость сервера DNS BIND, связанная с асимметричным потреблением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2026-03-04
BDU:2025-07734
Уязвимость реализации DoH сервера DNS BIND, связанная с выделением неограниченной памяти, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2026-04-15
CVE-2024-11187
It is possible to construct a zone such that some queries to it will generate responses containing numerous records in the Additional section. An attacker sending many such queries can cause either the authoritative server itself or an independent resolver to use disproportionate resources processing the queries. Zones will usually need to have been deliberately crafted to attack this exposure. This issue affects BIND 9 versions 9.11.0 through 9.11.37, 9.16.0 through 9.16.50, 9.18.0 through 9.18.32, 9.20.0 through 9.20.4, 9.21.0 through 9.21.3, 9.11.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.50-S1, and 9.18.11-S1 through 9.18.32-S1.
Modified: 2026-04-15
CVE-2024-12705
Clients using DNS-over-HTTPS (DoH) can exhaust a DNS resolver's CPU and/or memory by flooding it with crafted valid or invalid HTTP/2 traffic. This issue affects BIND 9 versions 9.18.0 through 9.18.32, 9.20.0 through 9.20.4, 9.21.0 through 9.21.3, and 9.18.11-S1 through 9.18.32-S1.
Closed bugs
Прошу обновить пакет codium до версии 1.91.1.24193
Просьба обновить версию до актуальной(1.95.3.24321)
Package signature-image updated to version 0.4-alt1 for branch sisyphus in task 372166.
Closed bugs
Некорректное отображение штампа при добавлении логотипа с белым фоном surguch
Package python3-module-django updated to version 5.1.5-alt1 for branch sisyphus in task 372174.
Closed vulnerabilities
Modified: 2025-10-29
BDU:2024-06736
Уязвимость функции django.utils.html.urlize программной платформы для веб-приложений Django, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-01-30
BDU:2024-10874
Уязвимость класса django.db.models.fields.json.HasKey программной платформы для веб-приложений Django, позволяющая нарушителю выполнить произвольный SQL-код
Modified: 2025-10-29
BDU:2024-11394
Уязвимость функции strip_tags() модуля django.utils.html программной платформы для веб-приложений Django, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-10-29
BDU:2025-01179
Уязвимость функций clean_ipv6_address и is_valid_ipv6_address программной платформы для веб-приложений Django, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-10-29
BDU:2025-09401
Уязвимость программной платформы для веб-приложений Django, связанная с недостатками механизма формирования отчетов об ошибках, позволяющая нарушителю оказать воздействие на конфиденциальность защищаемой информации
Modified: 2025-03-17
CVE-2024-45230
An issue was discovered in Django 5.1 before 5.1.1, 5.0 before 5.0.9, and 4.2 before 4.2.16. The urlize() and urlizetrunc() template filters are subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.
Modified: 2025-03-17
CVE-2024-45231
An issue was discovered in Django v5.1.1, v5.0.9, and v4.2.16. The django.contrib.auth.forms.PasswordResetForm class, when used in a view implementing password reset flows, allows remote attackers to enumerate user e-mail addresses by sending password reset requests and observing the outcome (only when e-mail sending is consistently failing).
Modified: 2025-06-24
CVE-2024-53907
An issue was discovered in Django 5.1 before 5.1.4, 5.0 before 5.0.10, and 4.2 before 4.2.17. The strip_tags() method and striptags template filter are subject to a potential denial-of-service attack via certain inputs containing large sequences of nested incomplete HTML entities.
Modified: 2025-06-09
CVE-2024-53908
An issue was discovered in Django 5.1 before 5.1.4, 5.0 before 5.0.10, and 4.2 before 4.2.17. Direct usage of the django.db.models.fields.json.HasKey lookup, when an Oracle database is used, is subject to SQL injection if untrusted data is used as an lhs value. (Applications that use the jsonfield.has_key lookup via __ are unaffected.)
Modified: 2025-10-03
CVE-2024-56374
An issue was discovered in Django 5.1 before 5.1.5, 5.0 before 5.0.11, and 4.2 before 4.2.18. Lack of upper-bound limit enforcement in strings passed when performing IPv6 validation could lead to a potential denial-of-service attack. The undocumented and private functions clean_ipv6_address and is_valid_ipv6_address are vulnerable, as is the django.forms.GenericIPAddressField form field. (The django.db.models.GenericIPAddressField model field is not affected.)
Modified: 2024-10-30
GHSA-5hgc-2vfp-mqvc
Django vulnerable to denial-of-service attack via the urlize() and urlizetrunc() template filters
- https://nvd.nist.gov/vuln/detail/CVE-2024-45230
- https://github.com/django/django/commit/022ab0a75c76ab2ea31dfcc5f2cf5501e378d397
- https://github.com/django/django/commit/813de2672bd7361e9a453ab62cd6e52f96b6525b
- https://github.com/django/django/commit/d147a8ebbdf28c17cafbbe2884f0bc57e2bf82e2
- https://docs.djangoproject.com/en/dev/releases/security
- https://github.com/django/django
- https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2024-102.yaml
- https://groups.google.com/forum/#%21forum/django-announce
- https://www.djangoproject.com/weblog/2024/sep/03/security-releases
Modified: 2025-01-14
GHSA-8498-2h75-472j
Django denial-of-service in django.utils.html.strip_tags()
- https://nvd.nist.gov/vuln/detail/CVE-2024-53907
- https://docs.djangoproject.com/en/dev/releases/security
- https://github.com/django/django
- https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2024-156.yaml
- https://groups.google.com/g/django-announce
- https://lists.debian.org/debian-lts-announce/2024/12/msg00028.html
- https://www.djangoproject.com/weblog/2024/dec/04/security-releases
- https://www.openwall.com/lists/oss-security/2024/12/04/3
Modified: 2025-01-14
GHSA-m9g8-fxxm-xg86
Django SQL injection in HasKey(lhs, rhs) on Oracle
- https://nvd.nist.gov/vuln/detail/CVE-2024-53908
- https://docs.djangoproject.com/en/dev/releases/security
- https://github.com/django/django
- https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2024-157.yaml
- https://groups.google.com/g/django-announce
- https://www.djangoproject.com/weblog/2024/dec/04/security-releases
- https://www.openwall.com/lists/oss-security/2024/12/04/3
Modified: 2025-05-20
GHSA-qcgg-j2x8-h9g8
Django has a potential denial-of-service vulnerability in IPv6 validation
- https://nvd.nist.gov/vuln/detail/CVE-2024-56374
- https://github.com/django/django/commit/4806731e58f3e8700a3c802e77899d54ac6021fe
- https://github.com/django/django/commit/ad866a1ca3e7d60da888d25d27e46a8adb2ed36e
- https://github.com/django/django/commit/ca2be7724e1244a4cb723de40a070f873c6e94bf
- https://github.com/django/django/commit/e8d4a2005955dcf962193600b53bf461b190b455
- https://docs.djangoproject.com/en/dev/releases/security
- https://github.com/django/django
- https://github.com/pypa/advisory-database/tree/main/vulns/django/PYSEC-2025-1.yaml
- https://groups.google.com/g/django-announce
- https://lists.debian.org/debian-lts-announce/2025/01/msg00024.html
- https://www.djangoproject.com/weblog/2025/jan/14/security-releases
- http://www.openwall.com/lists/oss-security/2025/01/14/2
Modified: 2024-10-30
GHSA-rrqc-c2jx-6jgv
Django allows enumeration of user e-mail addresses
- https://nvd.nist.gov/vuln/detail/CVE-2024-45231
- https://github.com/django/django/commit/3c733c78d6f8e50296d6e248968b6516c92a53ca
- https://github.com/django/django/commit/96d84047715ea1715b4bd1594e46122b8a77b9e2
- https://github.com/django/django/commit/bf4888d317ba4506d091eeac6e8b4f1fcc731199
- https://docs.djangoproject.com/en/dev/releases/security
- https://github.com/django/django
- https://groups.google.com/forum/#%21forum/django-announce
- https://www.djangoproject.com/weblog/2024/sep/03/security-releases
Closed bugs
rsync -F: *** buffer overflow detected ***: terminated Aborted (core dumped)
