ALT-BU-2023-7261-2
Branch sisyphus update bulletin.
Package subversion updated to version 1.14.2-alt2 for branch sisyphus in task 334365.
Closed bugs
rebuild with swig-4.1.1 produces undefined symbol: SWIG_InstallConstants
Package transmission updated to version 4.0.4-alt4 for branch sisyphus in task 334392.
Closed bugs
При скачивании файла через веб-интерфейс возникает ошибка : "Error: Couldnt't get var/lib/transmission-daemon : Отказано в доступе
Package alterator-ports-access updated to version 0.5.6-alt1 for branch sisyphus in task 334418.
Closed bugs
Не применяются настройки владельца, группы и режима доступа для USB устройства
Package python3-module-pelican updated to version 4.9.0-alt1 for branch sisyphus in task 334370.
Closed bugs
FeedGenerator is needed to run Pelican
Package firmware-intel-ucode updated to version 23-alt1.20231114 for branch sisyphus in task 334426.
Closed vulnerabilities
Modified: 2025-08-19
BDU:2023-07325
Уязвимость микропрограммного обеспечения процессоров Intel, позволяющая нарушителю повысить свои привилегии (с третьего до нулевого кольца защиты (CPL0)), получить доступ к конфиденциальной информации или вызвать отказ в обслуживании
Modified: 2025-01-07
CVE-2023-23583
Sequence of processor instructions leads to unexpected behavior for some Intel(R) Processors may allow an authenticated user to potentially enable escalation of privilege and/or information disclosure and/or denial of service via local access.
- http://www.openwall.com/lists/oss-security/2023/11/14/4
- http://www.openwall.com/lists/oss-security/2023/11/14/5
- http://www.openwall.com/lists/oss-security/2023/11/14/6
- http://www.openwall.com/lists/oss-security/2023/11/14/7
- http://www.openwall.com/lists/oss-security/2023/11/14/8
- http://www.openwall.com/lists/oss-security/2023/11/14/9
- https://lists.debian.org/debian-lts-announce/2023/12/msg00012.html
- https://security.netapp.com/advisory/ntap-20231116-0015/
- https://www.debian.org/security/2023/dsa-5563
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00950.html
- http://www.openwall.com/lists/oss-security/2023/11/14/4
- http://www.openwall.com/lists/oss-security/2023/11/14/5
- http://www.openwall.com/lists/oss-security/2023/11/14/6
- http://www.openwall.com/lists/oss-security/2023/11/14/7
- http://www.openwall.com/lists/oss-security/2023/11/14/8
- http://www.openwall.com/lists/oss-security/2023/11/14/9
- https://lists.debian.org/debian-lts-announce/2023/12/msg00012.html
- https://security.netapp.com/advisory/ntap-20231116-0015/
- https://www.debian.org/security/2023/dsa-5563
- https://www.intel.com/content/www/us/en/security-center/advisory/intel-sa-00950.html
Closed bugs
Сломалась сборка audacity
Closed vulnerabilities
Modified: 2025-03-05
BDU:2023-07699
Уязвимость прокси-сервера Squid, связанная с ошибками при проверке сертификата SSL/TLS, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2026-01-20
BDU:2023-07920
Уязвимость обработчика аутентификации HTTP Digest Authentication прокси-сервера Squid, позволяющая нарушителю вызвать отказ в обслуживании или оказать иное воздействие
Modified: 2025-03-05
BDU:2023-08061
Уязвимость прокси-сервера Squid, связана с неправильным обращением с исключительными условиями и неконтролируемым потреблением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-03-05
BDU:2023-08062
Уязвимость прокси-сервера Squid, связана с неправильным преобразованием между числовыми типами и неконтролируемым потреблением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-03-19
BDU:2023-08063
Уязвимость декодера chunked прокси-сервера Squid, позволяющая нарушителю взаимодействовать с сервером напрямую
Modified: 2026-01-20
BDU:2023-08580
Уязвимость прокси-сервера Squid, связанная с недостаточной проверкой исключительных состояний, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2026-01-20
BDU:2023-08581
Уязвимость прокси-сервера Squid, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2026-01-20
BDU:2024-02844
Уязвимость прокси-сервера Squid, связанная с неконтролируемым потреблением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-10-29
BDU:2025-09345
Уязвимость прокси-сервера Squid, связанная с переполнением буфера в динамической памяти при обработке URN-заголовков, позволяющая нарушителю выполнить произвольный код
Modified: 2025-02-13
CVE-2023-46724
Squid is a caching proxy for the Web. Due to an Improper Validation of Specified Index bug, Squid versions 3.3.0.1 through 5.9 and 6.0 prior to 6.4 compiled using `--with-openssl` are vulnerable to a Denial of Service attack against SSL Certificate validation. This problem allows a remote server to perform Denial of Service against Squid Proxy by initiating a TLS Handshake with a specially crafted SSL Certificate in a server certificate chain. This attack is limited to HTTPS and SSL-Bump. This bug is fixed in Squid version 6.4. In addition, patches addressing this problem for the stable releases can be found in Squid's patch archives. Those who you use a prepackaged version of Squid should refer to the package vendor for availability information on updated packages.
- http://www.squid-cache.org/Versions/v5/SQUID-2023_4.patch
- http://www.squid-cache.org/Versions/v6/SQUID-2023_4.patch
- https://github.com/squid-cache/squid/commit/b70f864940225dfe69f9f653f948e787f99c3810
- https://github.com/squid-cache/squid/security/advisories/GHSA-73m6-jm96-c6r3
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/
- https://security.netapp.com/advisory/ntap-20231208-0001/
- http://www.squid-cache.org/Versions/v5/SQUID-2023_4.patch
- http://www.squid-cache.org/Versions/v6/SQUID-2023_4.patch
- https://github.com/squid-cache/squid/commit/b70f864940225dfe69f9f653f948e787f99c3810
- https://github.com/squid-cache/squid/security/advisories/GHSA-73m6-jm96-c6r3
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/
- https://security.netapp.com/advisory/ntap-20231208-0001/
Modified: 2024-12-18
CVE-2023-46846
SQUID is vulnerable to HTTP request smuggling, caused by chunked decoder lenience, allows a remote attacker to perform Request/Response smuggling past firewall and frontend security systems.
- https://access.redhat.com/errata/RHSA-2023:6266
- https://access.redhat.com/errata/RHSA-2023:6267
- https://access.redhat.com/errata/RHSA-2023:6268
- https://access.redhat.com/errata/RHSA-2023:6748
- https://access.redhat.com/errata/RHSA-2023:6801
- https://access.redhat.com/errata/RHSA-2023:6803
- https://access.redhat.com/errata/RHSA-2023:6804
- https://access.redhat.com/errata/RHSA-2023:6810
- https://access.redhat.com/errata/RHSA-2023:7213
- https://access.redhat.com/errata/RHSA-2024:11049
- https://access.redhat.com/security/cve/CVE-2023-46846
- https://bugzilla.redhat.com/show_bug.cgi?id=2245910
- https://github.com/squid-cache/squid/security/advisories/GHSA-j83v-w3p4-5cqh
- https://access.redhat.com/errata/RHSA-2023:6266
- https://access.redhat.com/errata/RHSA-2023:6267
- https://access.redhat.com/errata/RHSA-2023:6268
- https://access.redhat.com/errata/RHSA-2023:6748
- https://access.redhat.com/errata/RHSA-2023:6801
- https://access.redhat.com/errata/RHSA-2023:6803
- https://access.redhat.com/errata/RHSA-2023:6804
- https://access.redhat.com/errata/RHSA-2023:6810
- https://access.redhat.com/errata/RHSA-2023:7213
- https://access.redhat.com/security/cve/CVE-2023-46846
- https://bugzilla.redhat.com/show_bug.cgi?id=2245910
- https://github.com/squid-cache/squid/security/advisories/GHSA-j83v-w3p4-5cqh
- https://lists.debian.org/debian-lts-announce/2024/01/msg00003.html
- https://lists.debian.org/debian-lts-announce/2024/01/msg00008.html
- https://security.netapp.com/advisory/ntap-20231130-0002/
Modified: 2024-11-21
CVE-2023-46847
Squid is vulnerable to a Denial of Service, where a remote attacker can perform buffer overflow attack by writing up to 2 MB of arbitrary data to heap memory when Squid is configured to accept HTTP Digest Authentication.
- https://access.redhat.com/errata/RHSA-2023:6266
- https://access.redhat.com/errata/RHSA-2023:6267
- https://access.redhat.com/errata/RHSA-2023:6268
- https://access.redhat.com/errata/RHSA-2023:6748
- https://access.redhat.com/errata/RHSA-2023:6801
- https://access.redhat.com/errata/RHSA-2023:6803
- https://access.redhat.com/errata/RHSA-2023:6804
- https://access.redhat.com/errata/RHSA-2023:6805
- https://access.redhat.com/errata/RHSA-2023:6810
- https://access.redhat.com/errata/RHSA-2023:6882
- https://access.redhat.com/errata/RHSA-2023:6884
- https://access.redhat.com/errata/RHSA-2023:7213
- https://access.redhat.com/errata/RHSA-2023:7576
- https://access.redhat.com/errata/RHSA-2023:7578
- https://access.redhat.com/security/cve/CVE-2023-46847
- https://bugzilla.redhat.com/show_bug.cgi?id=2245916
- https://github.com/squid-cache/squid/security/advisories/GHSA-phqj-m8gv-cq4g
- https://access.redhat.com/errata/RHSA-2023:6266
- https://access.redhat.com/errata/RHSA-2023:6267
- https://access.redhat.com/errata/RHSA-2023:6268
- https://access.redhat.com/errata/RHSA-2023:6748
- https://access.redhat.com/errata/RHSA-2023:6801
- https://access.redhat.com/errata/RHSA-2023:6803
- https://access.redhat.com/errata/RHSA-2023:6804
- https://access.redhat.com/errata/RHSA-2023:6805
- https://access.redhat.com/errata/RHSA-2023:6810
- https://access.redhat.com/errata/RHSA-2023:6882
- https://access.redhat.com/errata/RHSA-2023:6884
- https://access.redhat.com/errata/RHSA-2023:7213
- https://access.redhat.com/errata/RHSA-2023:7576
- https://access.redhat.com/errata/RHSA-2023:7578
- https://access.redhat.com/security/cve/CVE-2023-46847
- https://bugzilla.redhat.com/show_bug.cgi?id=2245916
- https://github.com/squid-cache/squid/security/advisories/GHSA-phqj-m8gv-cq4g
- https://lists.debian.org/debian-lts-announce/2024/01/msg00003.html
- https://security.netapp.com/advisory/ntap-20231130-0002/
Modified: 2024-11-21
CVE-2023-46848
Squid is vulnerable to Denial of Service, where a remote attacker can perform DoS by sending ftp:// URLs in HTTP Request messages or constructing ftp:// URLs from FTP Native input.
- https://access.redhat.com/errata/RHSA-2023:6266
- https://access.redhat.com/errata/RHSA-2023:6268
- https://access.redhat.com/errata/RHSA-2023:6748
- https://access.redhat.com/security/cve/CVE-2023-46848
- https://bugzilla.redhat.com/show_bug.cgi?id=2245919
- https://github.com/squid-cache/squid/security/advisories/GHSA-2g3c-pg7q-g59w
- https://access.redhat.com/errata/RHSA-2023:6266
- https://access.redhat.com/errata/RHSA-2023:6268
- https://access.redhat.com/errata/RHSA-2023:6748
- https://access.redhat.com/security/cve/CVE-2023-46848
- https://bugzilla.redhat.com/show_bug.cgi?id=2245919
- https://github.com/squid-cache/squid/security/advisories/GHSA-2g3c-pg7q-g59w
- https://security.netapp.com/advisory/ntap-20231214-0005/
Modified: 2024-11-21
CVE-2023-49285
Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a Buffer Overread bug Squid is vulnerable to a Denial of Service attack against Squid HTTP Message processing. This bug is fixed by Squid version 6.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.
- http://www.squid-cache.org/Versions/v5/SQUID-2023_7.patch
- http://www.squid-cache.org/Versions/v6/SQUID-2023_7.patch
- https://github.com/squid-cache/squid/commit/77b3fb4df0f126784d5fd4967c28ed40eb8d521b
- https://github.com/squid-cache/squid/commit/deee944f9a12c9fd399ce52f3e2526bb573a9470
- https://github.com/squid-cache/squid/security/advisories/GHSA-8w9r-p88v-mmx9
- https://lists.debian.org/debian-lts-announce/2024/01/msg00003.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/
- https://security.netapp.com/advisory/ntap-20240119-0004/
- http://www.squid-cache.org/Versions/v5/SQUID-2023_7.patch
- http://www.squid-cache.org/Versions/v6/SQUID-2023_7.patch
- https://github.com/squid-cache/squid/commit/77b3fb4df0f126784d5fd4967c28ed40eb8d521b
- https://github.com/squid-cache/squid/commit/deee944f9a12c9fd399ce52f3e2526bb573a9470
- https://github.com/squid-cache/squid/security/advisories/GHSA-8w9r-p88v-mmx9
- https://lists.debian.org/debian-lts-announce/2024/01/msg00003.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/
- https://security.netapp.com/advisory/ntap-20240119-0004/
Modified: 2024-11-21
CVE-2023-49286
Squid is a caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to an Incorrect Check of Function Return Value bug Squid is vulnerable to a Denial of Service attack against its Helper process management. This bug is fixed by Squid version 6.5. Users are advised to upgrade. There are no known workarounds for this vulnerability.
- http://www.squid-cache.org/Versions/v6/SQUID-2023_8.patch
- https://github.com/squid-cache/squid/commit/6014c6648a2a54a4ecb7f952ea1163e0798f9264
- https://github.com/squid-cache/squid/security/advisories/GHSA-xggx-9329-3c27
- https://lists.debian.org/debian-lts-announce/2024/01/msg00003.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/
- https://security.netapp.com/advisory/ntap-20240119-0004/
- http://www.squid-cache.org/Versions/v6/SQUID-2023_8.patch
- https://github.com/squid-cache/squid/commit/6014c6648a2a54a4ecb7f952ea1163e0798f9264
- https://github.com/squid-cache/squid/security/advisories/GHSA-xggx-9329-3c27
- https://lists.debian.org/debian-lts-announce/2024/01/msg00003.html
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/A5QASTMCUSUEW3UOMKHZJB3FTONWSRXS/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/MEV66D3PAAY6K7TWDT3WZBLCPLASFJDC/
- https://security.netapp.com/advisory/ntap-20240119-0004/
Modified: 2025-11-03
CVE-2023-5824
A flaw was found in Squid. The limits applied for validation of HTTP response headers are applied before caching. However, Squid may grow a cached HTTP response header beyond the configured maximum size, causing a stall or crash of the worker process when a large header is retrieved from the disk cache, resulting in a denial of service.
- https://access.redhat.com/errata/RHSA-2023:7465
- https://access.redhat.com/errata/RHSA-2023:7668
- https://access.redhat.com/errata/RHSA-2024:0072
- https://access.redhat.com/errata/RHSA-2024:0397
- https://access.redhat.com/errata/RHSA-2024:0771
- https://access.redhat.com/errata/RHSA-2024:0772
- https://access.redhat.com/errata/RHSA-2024:0773
- https://access.redhat.com/errata/RHSA-2024:1153
- https://access.redhat.com/security/cve/CVE-2023-5824
- https://bugzilla.redhat.com/show_bug.cgi?id=2245914
- https://github.com/squid-cache/squid/security/advisories/GHSA-543m-w2m2-g255
- https://access.redhat.com/errata/RHSA-2023:7465
- https://access.redhat.com/errata/RHSA-2023:7668
- https://access.redhat.com/errata/RHSA-2024:0072
- https://access.redhat.com/errata/RHSA-2024:0397
- https://access.redhat.com/errata/RHSA-2024:0771
- https://access.redhat.com/errata/RHSA-2024:0772
- https://access.redhat.com/errata/RHSA-2024:0773
- https://access.redhat.com/errata/RHSA-2024:1153
- https://access.redhat.com/security/cve/CVE-2023-5824
- https://bugzilla.redhat.com/show_bug.cgi?id=2245914
- https://github.com/squid-cache/squid/security/advisories/GHSA-543m-w2m2-g255
- https://lists.debian.org/debian-lts-announce/2025/09/msg00027.html
- https://security.netapp.com/advisory/ntap-20231130-0003/
Modified: 2025-06-25
CVE-2024-25617
Squid is an open source caching proxy for the Web supporting HTTP, HTTPS, FTP, and more. Due to a Collapse of Data into Unsafe Value bug ,Squid may be vulnerable to a Denial of Service attack against HTTP header parsing. This problem allows a remote client or a remote server to perform Denial of Service when sending oversized headers in HTTP messages. In versions of Squid prior to 6.5 this can be achieved if the request_header_max_size or reply_header_max_size settings are unchanged from the default. In Squid version 6.5 and later, the default setting of these parameters is safe. Squid will emit a critical warning in cache.log if the administrator is setting these parameters to unsafe values. Squid will not at this time prevent these settings from being changed to unsafe values. Users are advised to upgrade to version 6.5. There are no known workarounds for this vulnerability. This issue is also tracked as SQUID-2024:2
- https://github.com/squid-cache/squid/commit/72a3bbd5e431597c3fdb56d752bc56b010ba3817
- https://github.com/squid-cache/squid/security/advisories/GHSA-h5x6-w8mv-xfpr
- https://security.netapp.com/advisory/ntap-20240322-0006/
- https://github.com/squid-cache/squid/commit/72a3bbd5e431597c3fdb56d752bc56b010ba3817
- https://github.com/squid-cache/squid/security/advisories/GHSA-h5x6-w8mv-xfpr
- https://security.netapp.com/advisory/ntap-20240322-0006/
Modified: 2025-11-05
CVE-2025-54574
Squid is a caching proxy for the Web. In versions 6.3 and below, Squid is vulnerable to a heap buffer overflow and possible remote code execution attack when processing URN due to incorrect buffer management. This has been fixed in version 6.4. To work around this issue, disable URN access permissions.
- https://github.com/squid-cache/squid/commit/a27bf4b84da23594150c7a86a23435df0b35b988
- https://github.com/squid-cache/squid/releases/tag/SQUID_6_4
- https://github.com/squid-cache/squid/security/advisories/GHSA-w4gv-vw3f-29g3
- http://www.openwall.com/lists/oss-security/2025/11/05/5
- https://lists.debian.org/debian-lts-announce/2025/09/msg00027.html
Package altlinux-freedesktop-menu updated to version 0.69-alt1 for branch sisyphus in task 334452.
Closed bugs
Добавить категорию System в cinnamon-settings.desktop
Package spirv-cross updated to version 0.57.0-alt0.3.g2de1265f for branch sisyphus in task 334455.
Closed bugs
Просьба собрать статическую библиотеку
