ALT-BU-2025-11558-1
Branch sisyphus update bulletin.
Package libgovarnam updated to version 1.9.1-alt2 for branch sisyphus in task 392262.
Closed bugs
govarnam: wrong soname; wrong prefix and libdir in pc-file
Closed bugs
No such file or directory в логах установки mtr
Closed bugs
hp-scan: ошибка при сохранении файла после сканирования
Closed vulnerabilities
Modified: 2025-03-14
CVE-2024-32928
The libcurl CURLOPT_SSL_VERIFYPEER option was disabled on a subset of requests made by Nest production devices which enabled a potential man-in-the-middle attack on requests to Google cloud services by any host the traffic was routed through.
Modified: 2025-09-12
CVE-2025-10148
curl's websocket code did not update the 32 bit mask pattern for each new outgoing frame as the specification says. Instead it used a fixed mask that persisted and was used throughout the entire connection. A predictable mask pattern allows for a malicious server to induce traffic between the two communicating parties that could be interpreted by an involved proxy (configured or transparent) as genuine, real, HTTP traffic with content and thereby poison its cache. That cached poisoned content could then be served to all users of that proxy.
Modified: 2025-09-12
CVE-2025-9086
1. A cookie is set using the `secure` keyword for `https://target` 2. curl is redirected to or otherwise made to speak with `http://target` (same hostname, but using clear text HTTP) using the same cookie set 3. The same cookie name is set - but with just a slash as path (`path='/'`). Since this site is not secure, the cookie *should* just be ignored. 4. A bug in the path comparison logic makes curl read outside a heap buffer boundary The bug either causes a crash or it potentially makes the comparison come to the wrong conclusion and lets the clear-text site override the contents of the secure cookie, contrary to expectations and depending on the memory contents immediately following the single-byte allocation that holds the path. The presumed and correct behavior would be to plainly ignore the second set of the cookie since it was already set as secure on a secure host so overriding it on an insecure host should not be okay.
Closed bugs
Добавить Альт Рабочая станция 11.0 и Альт Рабочая станция К 11.0
Closed vulnerabilities
Modified: 2025-09-08
CVE-2025-9566
There's a vulnerability in podman where an attacker may use the kube play command to overwrite host files when the kube file container a Secrete or a ConfigMap volume mount and such volume contains a symbolic link to a host file path. In a successful attack, the attacker can only control the target file to be overwritten but not the content to be written into the file. Binary-Affected: podman Upstream-version-introduced: v4.0.0 Upstream-version-fixed: v5.6.1
Closed bugs
Обновление пакета Calligra
Closed vulnerabilities
BDU:2025-03217
Уязвимость функции orf_token_endian_convert() системы группового общения для отказоустойчивых кластеров Corosync, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
Modified: 2025-04-01
CVE-2025-30472
Corosync through 3.1.9, if encryption is disabled or the attacker knows the encryption key, has a stack-based buffer overflow in orf_token_endian_convert in exec/totemsrp.c via a large UDP packet.