ALT-BU-2025-14675-1
Branch sisyphus update bulletin.
Package python3-module-numpy updated to version 2.3.4-alt2 for branch sisyphus in task 399853.
Closed bugs
merge tests subpackage back
Closed bugs
Сбой программы Kleopatra после действия "Заверить"
Нельзя установить значение 0 для атрибута lockoutTime
В ADMC нет индикации отключенных компьютеров
Package thunderbird updated to version 145.0-alt1 for branch sisyphus in task 400266.
Closed vulnerabilities
BDU:2025-14085
Уязвимость компонента JavaScript Engine браузера Mozilla Firefox, позволяющая нарушителю выполнить произвольный код
BDU:2025-14086
Уязвимость компонента WebGPU браузера Mozilla Firefox, позволяющая нарушителю выполнить произвольный код
BDU:2025-14087
Уязвимость компонента WebGPU браузера Mozilla Firefox, позволяющая нарушителю обойти защитный механизм песочницы
BDU:2025-14088
Уязвимость браузеров Mozilla Firefox и Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
Modified: 2025-11-19
CVE-2025-13012
Race condition in the Graphics component. This vulnerability affects Firefox < 145, Firefox ESR < 140.5, Firefox ESR < 115.30, Thunderbird < 145, and Thunderbird < 140.5.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1991458
- https://www.mozilla.org/security/advisories/mfsa2025-87/
- https://www.mozilla.org/security/advisories/mfsa2025-88/
- https://www.mozilla.org/security/advisories/mfsa2025-89/
- https://www.mozilla.org/security/advisories/mfsa2025-90/
- https://www.mozilla.org/security/advisories/mfsa2025-91/
Modified: 2025-11-19
CVE-2025-13013
Mitigation bypass in the DOM: Core & HTML component. This vulnerability affects Firefox < 145, Firefox ESR < 140.5, Firefox ESR < 115.30, Thunderbird < 145, and Thunderbird < 140.5.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1991945
- https://www.mozilla.org/security/advisories/mfsa2025-87/
- https://www.mozilla.org/security/advisories/mfsa2025-88/
- https://www.mozilla.org/security/advisories/mfsa2025-89/
- https://www.mozilla.org/security/advisories/mfsa2025-90/
- https://www.mozilla.org/security/advisories/mfsa2025-91/
Modified: 2025-11-19
CVE-2025-13014
Use-after-free in the Audio/Video component. This vulnerability affects Firefox < 145, Firefox ESR < 140.5, Firefox ESR < 115.30, Thunderbird < 145, and Thunderbird < 140.5.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1994241
- https://www.mozilla.org/security/advisories/mfsa2025-87/
- https://www.mozilla.org/security/advisories/mfsa2025-88/
- https://www.mozilla.org/security/advisories/mfsa2025-89/
- https://www.mozilla.org/security/advisories/mfsa2025-90/
- https://www.mozilla.org/security/advisories/mfsa2025-91/
Modified: 2025-11-19
CVE-2025-13015
Spoofing issue in Firefox. This vulnerability affects Firefox < 145, Firefox ESR < 140.5, Firefox ESR < 115.30, Thunderbird < 145, and Thunderbird < 140.5.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1994164
- https://www.mozilla.org/security/advisories/mfsa2025-87/
- https://www.mozilla.org/security/advisories/mfsa2025-88/
- https://www.mozilla.org/security/advisories/mfsa2025-89/
- https://www.mozilla.org/security/advisories/mfsa2025-90/
- https://www.mozilla.org/security/advisories/mfsa2025-91/
Modified: 2025-11-25
CVE-2025-13016
Incorrect boundary conditions in the JavaScript: WebAssembly component. This vulnerability affects Firefox < 145, Firefox ESR < 140.5, Thunderbird < 145, and Thunderbird < 140.5.
Modified: 2025-11-19
CVE-2025-13017
Same-origin policy bypass in the DOM: Notifications component. This vulnerability affects Firefox < 145, Firefox ESR < 140.5, Thunderbird < 145, and Thunderbird < 140.5.
Modified: 2025-11-19
CVE-2025-13018
Mitigation bypass in the DOM: Security component. This vulnerability affects Firefox < 145, Firefox ESR < 140.5, Thunderbird < 145, and Thunderbird < 140.5.
Modified: 2025-11-19
CVE-2025-13019
Same-origin policy bypass in the DOM: Workers component. This vulnerability affects Firefox < 145, Firefox ESR < 140.5, Thunderbird < 145, and Thunderbird < 140.5.
Modified: 2025-11-19
CVE-2025-13020
Use-after-free in the WebRTC: Audio/Video component. This vulnerability affects Firefox < 145, Firefox ESR < 140.5, Thunderbird < 145, and Thunderbird < 140.5.
Modified: 2025-11-19
CVE-2025-13021
Incorrect boundary conditions in the Graphics: WebGPU component. This vulnerability affects Firefox < 145 and Thunderbird < 145.
Modified: 2025-11-19
CVE-2025-13022
Incorrect boundary conditions in the Graphics: WebGPU component. This vulnerability affects Firefox < 145 and Thunderbird < 145.
Modified: 2025-11-19
CVE-2025-13023
Sandbox escape due to incorrect boundary conditions in the Graphics: WebGPU component. This vulnerability affects Firefox < 145 and Thunderbird < 145.
Modified: 2025-11-19
CVE-2025-13024
JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability affects Firefox < 145 and Thunderbird < 145.
Modified: 2025-11-19
CVE-2025-13025
Incorrect boundary conditions in the Graphics: WebGPU component. This vulnerability affects Firefox < 145 and Thunderbird < 145.
Modified: 2025-11-19
CVE-2025-13026
Sandbox escape due to incorrect boundary conditions in the Graphics: WebGPU component. This vulnerability affects Firefox < 145 and Thunderbird < 145.
Modified: 2025-11-19
CVE-2025-13027
Memory safety bugs present in Firefox 144 and Thunderbird 144. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 145 and Thunderbird < 145.
Closed bugs
Необходимо собрать bluez-test-tools
Closed vulnerabilities
Modified: 2025-12-03
BDU:2025-13169
Уязвимость серверного программного обеспечения HAProxy, связанная с алгоритмической сложностью, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-12-19
CVE-2025-11230
Inefficient algorithm complexity in mjson in HAProxy allows remote attackers to cause a denial of service via specially crafted JSON requests.
Package alt-chksum updated to version 0.1.7-alt1 for branch sisyphus in task 400329.
Closed vulnerabilities
No data currently available.
Closed vulnerabilities
BDU:2025-13811
Уязвимость фреймворка для логирования на C++ Log4cxx, связанная с неправильной обработкой выходных данных для журналов регистрации, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным
BDU:2025-13812
Уязвимость фреймворка для логирования на C++ Log4cxx, связанная с неправильной обработкой выходных данных для журналов регистрации, позволяющая нарушителю получить несанкционированный доступ к конфиденциальным данным
Modified: 2025-11-04
CVE-2025-54812
Improper Output Neutralization for Logs vulnerability in Apache Log4cxx. When using HTMLLayout, logger names are not properly escaped when writing out to the HTML file. If untrusted data is used to retrieve the name of a logger, an attacker could theoretically inject HTML or Javascript in order to hide information from logs or steal data from the user. In order to activate this, the following sequence must occur: * Log4cxx is configured to use HTMLLayout. * Logger name comes from an untrusted string * Logger with compromised name logs a message * User opens the generated HTML log file in their browser, leading to potential XSS Because logger names are generally constant strings, we assess the impact to users as LOW This issue affects Apache Log4cxx: before 1.5.0. Users are recommended to upgrade to version 1.5.0, which fixes the issue.
Modified: 2025-11-04
CVE-2025-54813
Improper Output Neutralization for Logs vulnerability in Apache Log4cxx. When using JSONLayout, not all payload bytes are properly escaped. If an attacker-supplied message contains certain non-printable characters, these will be passed along in the message and written out as part of the JSON message. This may prevent applications that consume these logs from correctly interpreting the information within them. This issue affects Apache Log4cxx: before 1.5.0. Users are recommended to upgrade to version 1.5.0, which fixes the issue.
Closed bugs
Не устанавливается язык системы по умолчанию, язык можно сменить через настройки.
Неправильная работа дочерних окон при запуске от обычного пользователя, либо из меню приложений
Package alterator-l10n updated to version 2.9.174-alt2 for branch sisyphus in task 400341.
Closed bugs
Опечатка в тексте справки для модуля "Копидел"