ALT-BU-2025-13564-1
Branch sisyphus_riscv64 update bulletin.
Package inkscape updated to version 1.4.2-alt2 for branch sisyphus_riscv64.
Closed bugs
Не собирается с poppler-25.07.0
Package alterator-kopidel updated to version 1.0.6-alt1 for branch sisyphus_riscv64.
Closed bugs
[FR] Добавить информацию, что опция -s является тестовой
Package vte3 updated to version 0.82.1-alt1.1 for branch sisyphus_riscv64.
Closed bugs
Невозможно удалить лишний
Package rear updated to version 2.9-alt2 for branch sisyphus_riscv64.
Closed bugs
Requires: syslinux syslinux-extlinux
ERROR: Could not create ISO image (with /usr/bin/mkisofs)
Package ansible-core updated to version 2.19.3-alt1 for branch sisyphus_riscv64.
Closed bugs
ansible-core: ошибка при вызове модуля package_facts
Package fail2ban updated to version 1.1.0-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
Modified: 2024-09-13
BDU:2021-03927
Уязвимость программного обеспечения fail2ban, связанная с ошибками проверки функции, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2021-32749
fail2ban is a daemon to ban hosts that cause multiple authentication errors. In versions 0.9.7 and prior, 0.10.0 through 0.10.6, and 0.11.0 through 0.11.2, there is a vulnerability that leads to possible remote code execution in the mailing action mail-whois. Command `mail` from mailutils package used in mail actions like `mail-whois` can execute command if unescaped sequences (`\n~`) are available in "foreign" input (for instance in whois output). To exploit the vulnerability, an attacker would need to insert malicious characters into the response sent by the whois server, either via a MITM attack or by taking over a whois server. The issue is patched in versions 0.10.7 and 0.11.3. As a workaround, one may avoid the usage of action `mail-whois` or patch the vulnerability manually.
- https://github.com/fail2ban/fail2ban/commit/2ed414ed09b3bb4c478abc9366a1ff22024a33c9
- https://github.com/fail2ban/fail2ban/commit/410a6ce5c80dd981c22752da034f2529b5eee844
- https://github.com/fail2ban/fail2ban/security/advisories/GHSA-m985-3f3v-cwmm
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5WHJK2X2MR2WDYZMCW7COZXJDUSDYMY6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZRYQ77MTX5WSV33VCJLK4KBKR55QZ7ZA/
- https://security.gentoo.org/glsa/202310-13
- https://github.com/fail2ban/fail2ban/commit/2ed414ed09b3bb4c478abc9366a1ff22024a33c9
- https://github.com/fail2ban/fail2ban/commit/410a6ce5c80dd981c22752da034f2529b5eee844
- https://github.com/fail2ban/fail2ban/security/advisories/GHSA-m985-3f3v-cwmm
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/5WHJK2X2MR2WDYZMCW7COZXJDUSDYMY6/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/ZRYQ77MTX5WSV33VCJLK4KBKR55QZ7ZA/
- https://security.gentoo.org/glsa/202310-13
Package alterator-l10n updated to version 2.9.172-alt1 for branch sisyphus_riscv64.
Closed bugs
Отсутствует справочная информация для шага установщика "12/12 Информация о завершении установки"
Опечатка в справке команды kopidel
Package clementine updated to version 1.4.1.58-alt1.gbae968a2f for branch sisyphus_riscv64.
Closed bugs
Linkage with library under the license GPL
Package passwdqc updated to version 2.0.3-alt3 for branch sisyphus_riscv64.
Closed bugs
Увеличить минимальную длину пин-кодов до 6 символов
Package gem-passenger updated to version 6.1.0-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
Modified: 2025-02-28
CVE-2025-26803
The http parser in Phusion Passenger 6.0.21 through 6.0.25 before 6.0.26 allows a denial of service during parsing of a request with an invalid HTTP method.
- https://blog.phusion.nl/2025/02/19/passenger-6-0-26/
- https://github.com/phusion/passenger/commit/bb15591646687064ab2d578d5f9660b2a4168017
- https://github.com/phusion/passenger/compare/release-6.0.25...release-6.0.26
- https://github.com/phusion/passenger/releases/tag/release-6.0.26
- https://www.phusionpassenger.com/support
Package spdk updated to version 25.05.1-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
Modified: 2025-10-21
CVE-2025-57275
Storage Performance Development Kit (SPDK) 25.05 is vulnerable to Buffer Overflow in the NVMe-oF target component in SPDK - lib/nvmf.
Package sane updated to version 1.4.0-alt1 for branch sisyphus_riscv64.
Closed bugs
new version
Package dpkg updated to version 1.21.22-alt3 for branch sisyphus_riscv64.
Closed vulnerabilities
Modified: 2025-12-26
BDU:2025-11256
Уязвимость менеджера пакетов Dpkg, связанная с небезопасными временными файлами, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-08-19
CVE-2025-6297
It was discovered that dpkg-deb does not properly sanitize directory permissions when extracting a control member into a temporary directory, which is documented as being a safe operation even on untrusted data. This may result in leaving temporary files behind on cleanup. Given automated and repeated execution of dpkg-deb commands on adversarial .deb packages or with well compressible files, placed inside a directory with permissions not allowing removal by a non-root user, this can end up in a DoS scenario due to causing disk quota exhaustion or disk full conditions.
Package branding-simply-linux updated to version 11.0.900-alt1 for branch sisyphus_riscv64.
Closed bugs
branding-simply-linux: system-logo.png является симлинком
Package python3-module-jupyterlab updated to version 4.4.9-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
Modified: 2025-10-22
CVE-2025-59842
jupyterlab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook Architecture. Prior to version 4.4.8, links generated with LaTeX typesetters in Markdown files and Markdown cells in JupyterLab and Jupyter Notebook did not include the noopener attribute. This is deemed to have no impact on the default installations. Theoretically users of third-party LaTeX-rendering extensions could find themselves vulnerable to reverse tabnabbing attacks if links generated by those extensions included target=_blank (no such extensions are known at time of writing) and they were to click on a link generated in LaTeX (typically visibly different from other links). This issue has been patched in version 4.4.8.