ALT-BU-2025-13891-1
Branch sisyphus_riscv64 update bulletin.
Package teem updated to version 1.12.0-alt2.20150414.r6245 for branch sisyphus_riscv64.
Closed bugs
Linkage with library under the license GPL
Package python3-module-prometheus-pve-exporter updated to version 3.5.5-alt2 for branch sisyphus_riscv64.
Closed bugs
После запуска службы prometheus-pve-exporter падает с ошибкой
Package admc updated to version 0.22.2-alt1 for branch sisyphus_riscv64.
Closed bugs
Кнопка ОК доступна, если в поле "Имя для входа (до Windows 2000)" установлен пробел (окна создания объектов)
Опечатка в вопросе в окне подтверждения сброса учетной записи
Опечатка в окне ошибки при добавлении телефонных номеров
Нельзя изменить параметры на вкладке Безопасность без помощи мыши
Диалоговые окна при старте не являются модальными
Package python3-module-geopandas updated to version 1.1.1-alt3 for branch sisyphus_riscv64.
Closed bugs
В репозитории нет библиотеки 'mapclassify'
Package clamav updated to version 1.4.3-alt3 for branch sisyphus_riscv64.
Closed bugs
файл из libclamav12-1.4.3-alt1.x86_64 конфликтует с файлом из пакета libclamav9-0.103.12-alt1.x86_64
1.4.3-alt2: /etc ищется в /usr
Package python3-module-standard-aifc updated to version 3.13.0-alt1.1 for branch sisyphus_riscv64.
Closed bugs
Сломан: не может найти модуль chunk
Package java-11-openjdk updated to version 11.0.29.0.7-alt0.port for branch sisyphus_riscv64.
Closed vulnerabilities
Modified: 2025-11-03
CVE-2025-53057
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: Security). Supported versions that are affected are Oracle Java SE: 8u461, 8u461-perf, 11.0.28, 17.0.16, 21.0.8, 25; Oracle GraalVM for JDK: 17.0.16 and 21.0.8; Oracle GraalVM Enterprise Edition: 21.3.15. Difficult to exploit vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 5.9 (Integrity impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:N).
Modified: 2025-11-03
CVE-2025-53066
Vulnerability in the Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition product of Oracle Java SE (component: JAXP). Supported versions that are affected are Oracle Java SE: 8u461, 8u461-perf, 11.0.28, 17.0.16, 21.0.8, 25; Oracle GraalVM for JDK: 17.0.16 and 21.0.8; Oracle GraalVM Enterprise Edition: 21.3.15. Easily exploitable vulnerability allows unauthenticated attacker with network access via multiple protocols to compromise Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition. Successful attacks of this vulnerability can result in unauthorized access to critical data or complete access to all Oracle Java SE, Oracle GraalVM for JDK, Oracle GraalVM Enterprise Edition accessible data. Note: This vulnerability can be exploited by using APIs in the specified Component, e.g., through a web service which supplies data to the APIs. This vulnerability also applies to Java deployments, typically in clients running sandboxed Java Web Start applications or sandboxed Java applets, that load and run untrusted code (e.g., code that comes from the internet) and rely on the Java sandbox for security. CVSS 3.1 Base Score 7.5 (Confidentiality impacts). CVSS Vector: (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N).
Package apparmor updated to version 3.0.9-alt3 for branch sisyphus_riscv64.
Closed bugs
apparmor: удалить зависимость на /sbin/telinit
Package zabbix updated to version 7.0.20-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
Modified: 2025-11-17
BDU:2025-12726
Уязвимость универсальной системы мониторинга Zabbix , связанная с ошибками авторизации, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Modified: 2025-10-08
CVE-2025-49641
A regular Zabbix user with no permission to the Monitoring -> Problems view is still able to call the problem.view.refresh action and therefore still retrieve a list of active problems.