ALT-BU-2025-13628-1
Branch sisyphus_riscv64 update bulletin.
Package kube-state-metrics updated to version 2.17.0-alt1 for branch sisyphus_riscv64.
Closed bugs
Некорректное отображение версии kube-state-metrics
Package neochat updated to version 25.08.2-alt2 for branch sisyphus_riscv64.
Closed bugs
Нет явной зависимости от qt6-speech, а без неё не отображается окно чата
Package angie updated to version 1.10.2-alt2 for branch sisyphus_riscv64.
Closed bugs
Собран без XSLT модуля
Собран без Image Filter модуля
Собран без GeoIP модуля
Собран без Perl модуля
Собран без опции --with-debug
Package vips updated to version 8.17.2-alt0.port for branch sisyphus_riscv64.
Closed vulnerabilities
Modified: 2025-10-18
CVE-2025-59933
libvips is a demand-driven, horizontally threaded image processing library. For versions 8.17.1 and below, when libvips is compiled with support for PDF input via poppler, the pdfload operation is affected by a buffer read overflow when parsing the header of a crafted PDF with a page that defines a width but not a height. Those using libvips compiled without support for PDF input are unaffected as well as thosewith support for PDF input via PDFium. This issue is fixed in version 8.17.2. A workaround for those affected is to block the VipsForeignLoadPdf operation via vips_operation_block_set, which is available in most language bindings, or to set VIPS_BLOCK_UNTRUSTED environment variable at runtime, which will block all untrusted loaders including PDF input via poppler.
Package libowt-tg updated to version 4.3.0.13-alt1 for branch sisyphus_riscv64.
Closed bugs
Отсутствует трансляция экрана(ов) или окон (Wayland) при звонке в Gnome | KDE сессия Wayland
Package unbound updated to version 1.24.1-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
Modified: 2025-11-06
CVE-2025-11411
NLnet Labs Unbound up to and including version 1.24.0 is vulnerable to possible domain hijack attacks. Promiscuous NS RRSets that complement positive DNS replies in the authority section can be used to trick resolvers to update their delegation information for the zone. Usually these RRSets are used to update the resolver's knowledge of the zone's name servers. A malicious actor can exploit the possible poisonous effect by injecting NS RRSets (and possibly their respective address records) in a reply. This could be done for example by trying to spoof a packet or fragmentation attacks. Unbound would then proceed to update the NS RRSet data it already has since the new data has enough trust for it, i.e., in-zone data for the delegation point. Unbound 1.24.1 includes a fix that scrubs unsolicited NS RRSets (and their respective address records) from replies mitigating the possible poison effect.
Package dpkg updated to version 1.21.22-alt4 for branch sisyphus_riscv64.
Closed bugs
Не хватает зависимости на perl-Term-ANSIColor
Package bind updated to version 9.18.41-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
Modified: 2025-11-04
CVE-2025-40778
Under certain circumstances, BIND is too lenient when accepting records from answers, allowing an attacker to inject forged data into the cache. This issue affects BIND 9 versions 9.11.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.11.3-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.
Modified: 2025-11-04
CVE-2025-40780
In specific circumstances, due to a weakness in the Pseudo Random Number Generator (PRNG) that is used, it is possible for an attacker to predict the source port and query ID that BIND will use. This issue affects BIND 9 versions 9.16.0 through 9.16.50, 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.16.8-S1 through 9.16.50-S1, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.
Modified: 2025-11-04
CVE-2025-8677
Querying for records within a specially crafted zone containing certain malformed DNSKEY records can lead to CPU exhaustion. This issue affects BIND 9 versions 9.18.0 through 9.18.39, 9.20.0 through 9.20.13, 9.21.0 through 9.21.12, 9.18.11-S1 through 9.18.39-S1, and 9.20.9-S1 through 9.20.13-S1.