ALT-BU-2025-3936-1
Branch c9f2 update bulletin.
Package python-module-pyxdg updated to version 0.26-alt1 for branch c9f2 in task 376385.
Closed vulnerabilities
BDU:2021-05299
Уязвимость библиотеки языка программирования Python pyxdg, связанная с неверным управлением генерацией кода, позволяющая нарушителю получить доступ к конфиденциальным данным, нарушить их целостность, а также вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2014-1624
Race condition in the xdg.BaseDirectory.get_runtime_dir function in python-xdg 0.25 allows local users to overwrite arbitrary files by pre-creating /tmp/pyxdg-runtime-dir-fallback-victim to point to a victim-owned location, then replacing it with a symlink to an attacker-controlled location once the get_runtime_dir function is called.
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736247
- http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=736247
- [oss-security] 20140121 Fwd: [Python-modules-team] Bug#736247: python-xdg: get_runtime_dir(strict=False): insecure use of /tmp
- [oss-security] 20140121 Fwd: [Python-modules-team] Bug#736247: python-xdg: get_runtime_dir(strict=False): insecure use of /tmp
- [oss-security] 20140121 Re: Fwd: [Python-modules-team] Bug#736247: python-xdg: get_runtime_dir(strict=False): insecure use of /tmp
- [oss-security] 20140121 Re: Fwd: [Python-modules-team] Bug#736247: python-xdg: get_runtime_dir(strict=False): insecure use of /tmp
- 65042
- 65042
- pythonxdg-cve20141624-symlink(90618)
- pythonxdg-cve20141624-symlink(90618)
Modified: 2024-11-21
CVE-2019-12761
A code injection issue was discovered in PyXDG before 0.26 via crafted Python code in a Category element of a Menu XML document in a .menu file. XDG_CONFIG_DIRS must be set up to trigger xdg.Menu.parse parsing within the directory containing this file. This is due to a lack of sanitization in xdg/Menu.py before an eval call.
- https://gist.github.com/dhondta/b45cd41f4186110a354dc7272916feba
- https://gist.github.com/dhondta/b45cd41f4186110a354dc7272916feba
- [debian-lts-announce] 20190616 [SECURITY] [DLA 1819-1] pyxdg security update
- [debian-lts-announce] 20190616 [SECURITY] [DLA 1819-1] pyxdg security update
- [debian-lts-announce] 20210803 [SECURITY] [DLA 2727-1] pyxdg security update
- [debian-lts-announce] 20210803 [SECURITY] [DLA 2727-1] pyxdg security update
- https://snyk.io/vuln/SNYK-PYTHON-PYXDG-174562
- https://snyk.io/vuln/SNYK-PYTHON-PYXDG-174562
Package libxerces-c updated to version 3.2.5-alt1 for branch c9f2 in task 376700.
Closed vulnerabilities
BDU:2021-03489
Уязвимость библиотеки для работы с XML Xerces-C, связанная с использованием памяти после её освобождения, позволяющая нарушителю получить доступ к конфиденциальной информации или вызвать отказ в обслуживании
BDU:2024-01559
Уязвимость библиотеки синтаксического анализа XML Apache Xerces, связанная с использованием памяти после её освобождения, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2018-1311
The Apache Xerces-C 3.0.0 to 3.2.3 XML parser contains a use-after-free error triggered during the scanning of external DTDs. This flaw has not been addressed in the maintained version of the library and has no current mitigation other than to disable DTD processing. This can be accomplished via the DOM using a standard parser feature, or via SAX using the XERCES_DISABLE_DTD environment variable.
- [oss-security] 20240216 CVE-2024-23807: Apache Xerces C++: Use-after-free on external DTD scan
- [oss-security] 20240216 CVE-2024-23807: Apache Xerces C++: Use-after-free on external DTD scan
- RHSA-2020:0702
- RHSA-2020:0702
- RHSA-2020:0704
- RHSA-2020:0704
- [xerces-c-dev] 20200110 [xerces-c] 06/13: Add CVE-2018-1311 advisory and web site note.
- [xerces-c-dev] 20200110 [xerces-c] 06/13: Add CVE-2018-1311 advisory and web site note.
- [xerces-c-users] 20210528 Re: Security vulnerability - CVE-2018-1311
- [xerces-c-users] 20210528 Re: Security vulnerability - CVE-2018-1311
- [xerces-c-users] 20210528 Security vulnerability - CVE-2018-1311
- [xerces-c-users] 20210528 Security vulnerability - CVE-2018-1311
- [xerces-c-users] 20210528 RE: Security vulnerability - CVE-2018-1311
- [xerces-c-users] 20210528 RE: Security vulnerability - CVE-2018-1311
- [debian-lts-announce] 20201217 [SECURITY] [DLA 2498-1] xerces-c security update
- [debian-lts-announce] 20201217 [SECURITY] [DLA 2498-1] xerces-c security update
- [debian-lts-announce] 20231231 [SECURITY] [DLA 3704-1] xerces-c security update
- [debian-lts-announce] 20231231 [SECURITY] [DLA 3704-1] xerces-c security update
- FEDORA-2023-52ba628e03
- FEDORA-2023-52ba628e03
- FEDORA-2023-817ecc703f
- FEDORA-2023-817ecc703f
- https://marc.info/?l=xerces-c-users&m=157653840106914&w=2
- https://marc.info/?l=xerces-c-users&m=157653840106914&w=2
- DSA-4814
- DSA-4814
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpujan2022.html
Modified: 2025-01-16
CVE-2024-23807
The Apache Xerces C++ XML parser on versions 3.0.0 before 3.2.5 contains a use-after-free error triggered during the scanning of external DTDs. Users are recommended to upgrade to version 3.2.5 which fixes the issue, or mitigate the issue by disabling DTD processing. This can be accomplished via the DOM using a standard parser feature, or via SAX using the XERCES_DISABLE_DTD environment variable. This issue has been disclosed before as CVE-2018-1311, but unfortunately that advisory incorrectly stated the issue would be fixed in version 3.2.3 or 3.2.4.