ALT-BU-2025-14483-1
Branch sisyphus_e2k update bulletin.
Package inkscape updated to version 1.4.2-alt2 for branch sisyphus_e2k.
Closed bugs
Не собирается с poppler-25.07.0
Package nginx updated to version 1.28.0-alt2 for branch sisyphus_e2k.
Closed vulnerabilities
Modified: 2025-11-04
CVE-2025-53859
NGINX Open Source and NGINX Plus have a vulnerability in the ngx_mail_smtp_module that might allow an unauthenticated attacker to over-read NGINX SMTP authentication process memory; as a result, the server side may leak arbitrary bytes sent in a request to the authentication server. This issue happens during the NGINX SMTP authentication process and requires the attacker to make preparations against the target system to extract the leaked data. The issue affects NGINX only if (1) it is built with the ngx_mail_smtp_module, (2) the smtp_auth directive is configured with method "none," and (3) the authentication server returns the "Auth-Wait" response header. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Package samba updated to version 4.21.9-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
Modified: 2025-10-22
BDU:2025-13037
Уязвимость реализации сервера разрешения имён WINS пакета программ сетевого взаимодействия Samba, позволяющая нарушителю выполнить произвольный код
Modified: 2025-11-12
CVE-2025-10230
A flaw was found in Samba, in the front-end WINS hook handling: NetBIOS names from registration packets are passed to a shell without proper validation or escaping. Unsanitized NetBIOS name data from WINS registration packets are inserted into a shell command and executed by the Samba Active Directory Domain Controller’s wins hook, allowing an unauthenticated network attacker to achieve remote command execution as the Samba process.
Modified: 2025-11-04
CVE-2025-9640
A flaw was found in Samba, in the vfs_streams_xattr module, where uninitialized heap memory could be written into alternate data streams. This allows an authenticated user to read residual memory content that may include sensitive data, resulting in an information disclosure vulnerability.
Package pgbackrest updated to version 2.57.0-alt2 for branch sisyphus_e2k.
Closed bugs
Не упакованы необходимые для работы пакета директории
Package openvpn updated to version 2.6.15-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
Modified: 2025-09-22
BDU:2025-05051
Уязвимость функции TLS-crypt-v2 сервера программного обеспечения OpenVPN, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-10-23
CVE-2025-2704
OpenVPN version 2.6.1 through 2.6.13 in server mode using TLS-crypt-v2 allows remote attackers to trigger a denial of service by corrupting and replaying network packets in the early handshake phase
Package kea updated to version 3.0.2-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
Modified: 2025-11-04
CVE-2025-11232
To trigger the issue, three configuration parameters must have specific settings: "hostname-char-set" must be left at the default setting, which is "[^A-Za-z0-9.-]"; "hostname-char-replacement" must be empty (the default); and "ddns-qualifying-suffix" must *NOT* be empty (the default is empty). DDNS updates do not need to be enabled for this issue to manifest. A client that sends certain option content would then cause kea-dhcp4 to exit unexpectedly. This issue affects Kea versions 3.0.1 through 3.0.1 and 3.1.1 through 3.1.2.