ALT-BU-2025-13067-1
Branch sisyphus_loongarch64 update bulletin.
Package raptor2 updated to version 2.0.16-alt2 for branch sisyphus_loongarch64.
Closed vulnerabilities
Modified: 2025-11-19
BDU:2025-03460
Уязвимость функции raptor_uri_normalize_path() библиотеки Raptor, позволяющая нарушителю получить выполнить произвольный код
Modified: 2025-10-29
BDU:2025-11887
Уязвимость функции raptor_ntriples_parse_term_internal() библиотеки RAPtor, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-11-03
CVE-2024-57822
In Raptor RDF Syntax Library through 2.0.16, there is a heap-based buffer over-read when parsing triples with the nquads parser in raptor_ntriples_parse_term_internal().
Modified: 2025-11-03
CVE-2024-57823
In Raptor RDF Syntax Library through 2.0.16, there is an integer underflow when normalizing a URI with the turtle parser in raptor_uri_normalize_path().
Package firmware-linux updated to version 20251011-alt1 for branch sisyphus_loongarch64.
Closed bugs
крашится ядро на модуле mt7921e в версии firmware-linux 20250917
Package alterator-kopidel updated to version 1.0.3-alt1 for branch sisyphus_loongarch64.
Closed bugs
Не работает запуск Копидела от пользователя
Нет предупреждения для ntfs о том, что ФС не поддерживается
Не пропадает предупреждение о неподдерживаемой файловой системе при переходе на другой способ сохранения образа
Не игнорируются файлы из примера в стандартном списке игнорируемых файлов
Package libtiff5 updated to version 4.4.0-alt9 for branch sisyphus_loongarch64.
Closed vulnerabilities
Modified: 2025-11-24
CVE-2025-9900
A flaw was found in Libtiff. This vulnerability is a "write-what-where" condition, triggered when the library processes a specially crafted TIFF image file. By providing an abnormally large image height value in the file's metadata, an attacker can trick the library into writing attacker-controlled color data to an arbitrary memory location. This memory corruption can be exploited to cause a denial of service (application crash) or to achieve arbitrary code execution with the permissions of the user.
- https://access.redhat.com/errata/RHSA-2025:17651
- https://access.redhat.com/errata/RHSA-2025:17675
- https://access.redhat.com/errata/RHSA-2025:17710
- https://access.redhat.com/errata/RHSA-2025:17738
- https://access.redhat.com/errata/RHSA-2025:17739
- https://access.redhat.com/errata/RHSA-2025:17740
- https://access.redhat.com/errata/RHSA-2025:19113
- https://access.redhat.com/errata/RHSA-2025:19156
- https://access.redhat.com/errata/RHSA-2025:19276
- https://access.redhat.com/errata/RHSA-2025:19906
- https://access.redhat.com/errata/RHSA-2025:19947
- https://access.redhat.com/errata/RHSA-2025:20956
- https://access.redhat.com/errata/RHSA-2025:20998
- https://access.redhat.com/errata/RHSA-2025:21060
- https://access.redhat.com/errata/RHSA-2025:21061
- https://access.redhat.com/errata/RHSA-2025:21062
- https://access.redhat.com/errata/RHSA-2025:21407
- https://access.redhat.com/errata/RHSA-2025:21506
- https://access.redhat.com/errata/RHSA-2025:21507
- https://access.redhat.com/errata/RHSA-2025:21508
- https://access.redhat.com/errata/RHSA-2025:21994
- https://access.redhat.com/security/cve/CVE-2025-9900
- https://bugzilla.redhat.com/show_bug.cgi?id=2392784
- https://github.com/SexyShoelessGodofWar/LibTiff-4.7.0-Write-What-Where?tab=readme-ov-file
- https://gitlab.com/libtiff/libtiff/-/issues/704
- https://gitlab.com/libtiff/libtiff/-/merge_requests/732
- https://libtiff.gitlab.io/libtiff/releases/v4.7.1.html
- http://www.openwall.com/lists/oss-security/2025/09/26/3
- https://lists.debian.org/debian-lts-announce/2025/09/msg00031.html
- https://github.com/SexyShoelessGodofWar/LibTiff-4.7.0-Write-What-Where?tab=readme-ov-file