ALT-BU-2025-13946-1
Branch p10_e2k update bulletin.
Closed vulnerabilities
Modified: 2025-12-26
BDU:2025-11019
Уязвимость системы печати CUPS (Common UNIX Printing System), связанная с недостатками процедуры аутентификации, позволяющая нарушителю обойти существующие ограничения безопасности и получить несанкционированный доступ к системе
Modified: 2025-12-26
BDU:2025-12439
Уязвимость библиотеки libcups сервера печати CUPS, позволяющая нарушителю вызывать отказ в обслуживании
Modified: 2025-11-04
CVE-2025-58060
OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.12 and earlier, when the `AuthType` is set to anything but `Basic`, if the request contains an `Authorization: Basic ...` header, the password is not checked. This results in authentication bypass. Any configuration that allows an `AuthType` that is not `Basic` is affected. Version 2.4.13 fixes the issue.
Modified: 2025-11-04
CVE-2025-58364
OpenPrinting CUPS is an open source printing system for Linux and other Unix-like operating systems. In versions 2.4.12 and earlier, an unsafe deserialization and validation of printer attributes causes null dereference in the libcups library. This is a remote DoS vulnerability available in local subnet in default configurations. It can cause the cups & cups-browsed to crash, on all the machines in local network who are listening for printers (so by default for all regular linux machines). On systems where the vulnerability CVE-2024-47176 (cups-filters 1.x/cups-browsed 2.x vulnerability) was not fixed, and the firewall on the machine does not reject incoming communication to IPP port, and the machine is set to be available to public internet, attack vector "Network" is possible. The current versions of CUPS and cups-browsed projects have the attack vector "Adjacent" in their default configurations. Version 2.4.13 contains a patch for CVE-2025-58364.
Closed bugs
Файлы переводов не те и не там
Не работает цветная печать на принтере Pantum CM1100ADW при ручном добавлении в cups
сервис cups слушает 0.0.0.0 вместо localhost
Добавление нового принтера без опции print-color-mode, либо print-color-mode monochrome по умолчанию
Package cpufreq-simple updated to version 1.0.0-alt0.p10.1 for branch p10_e2k.
Closed bugs
не стартует управление частотой ЦП при загрузке simply и ws p11
Closed vulnerabilities
Modified: 2025-12-26
BDU:2025-11256
Уязвимость менеджера пакетов Dpkg, связанная с небезопасными временными файлами, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-08-19
CVE-2025-6297
It was discovered that dpkg-deb does not properly sanitize directory permissions when extracting a control member into a temporary directory, which is documented as being a safe operation even on untrusted data. This may result in leaving temporary files behind on cleanup. Given automated and repeated execution of dpkg-deb commands on adversarial .deb packages or with well compressible files, placed inside a directory with permissions not allowing removal by a non-root user, this can end up in a DoS scenario due to causing disk quota exhaustion or disk full conditions.
Closed bugs
Не хватает зависимости на perl-Term-ANSIColor
Closed vulnerabilities
Modified: 2025-12-05
CVE-2025-11411
NLnet Labs Unbound up to and including version 1.24.1 is vulnerable to possible domain hijack attacks. Promiscuous NS RRSets that complement positive DNS replies in the authority section can be used to trick resolvers to update their delegation information for the zone. Usually these RRSets are used to update the resolver's knowledge of the zone's name servers. A malicious actor can exploit the possible poisonous effect by injecting NS RRSets (and possibly their respective address records) in a reply. This could be done for example by trying to spoof a packet or fragmentation attacks. Unbound would then proceed to update the NS RRSet data it already has since the new data has enough trust for it, i.e., in-zone data for the delegation point. Unbound 1.24.1 includes a fix that scrubs unsolicited NS RRSets (and their respective address records) from replies mitigating the possible poison effect. Unbound 1.24.2 includes an additional fix that scrubs unsolicited NS RRSets (and their respective address records) from YXDOMAIN and non-referral nodata replies, further mitigating the possible poison effect.