ALT-BU-2025-15043-1
Branch sisyphus_loongarch64 update bulletin.
Package libshape updated to version 1.6.2-alt1 for branch sisyphus_loongarch64.
Closed vulnerabilities
Modified: 2025-03-05
BDU:2022-06588
Уязвимость реализации функции malloc() библиотеки shapelib, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-05-13
CVE-2022-0699
A double-free condition exists in contrib/shpsort.c of shapelib 1.5.0 and older releases. This issue may allow an attacker to cause a denial of service or have other unspecified impact via control over malloc.
Package apt-gpgkeys-pki updated to version 0.2-alt1 for branch sisyphus_loongarch64.
Closed bugs
Команда list показывает доступные, а не импортированные ключи
Filetrigger не является исполняемым файлом и поэтому не запускается
Package candle updated to version 10.11.1-alt2 for branch sisyphus_loongarch64.
Closed bugs
Ошибка работы окон открытия файла и выбора цвета визуализатора
Зависание после попытки открыть существующий файл или при попытке изменить цвет визуализатора
Package pve-qemu updated to version 10.1.2-alt0.port for branch sisyphus_loongarch64.
Closed vulnerabilities
Modified: 2025-11-07
BDU:2024-08773
Уязвимость функции usb_ep_get() (hw/net/core.c) эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-11540
Уязвимость компонента hw/pci/pcie_sriov.c эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю выполнить произвольный код
BDU:2025-13491
Уязвимость компонента hw/pci/pcie_sriov.c эмулятора аппаратного обеспечения QEMU, позволяющая нарушителю выполнить произвольный код
Modified: 2024-11-21
CVE-2024-8354
A flaw was found in QEMU. An assertion failure was present in the usb_ep_get() function in hw/net/core.c when trying to get the USB endpoint from a USB device. This flaw may allow a malicious unprivileged guest user to crash the QEMU process on the host and cause a denial of service condition.
Modified: 2025-12-16
CVE-2025-54566
hw/pci/pcie_sriov.c in QEMU through 10.0.3 has a migration state inconsistency, a related issue to CVE-2024-26327.
Modified: 2025-12-16
CVE-2025-54567
hw/pci/pcie_sriov.c in QEMU through 10.0.3 mishandles the VF Enable bit write mask, a related issue to CVE-2024-26327.
No data currently available.
Package grub updated to version 2.12-alt16 for branch sisyphus_loongarch64.
Closed vulnerabilities
Modified: 2025-11-19
CVE-2025-54770
A vulnerability has been identified in the GRUB2 bootloader's network module that poses an immediate Denial of Service (DoS) risk. This flaw is a Use-after-Free issue, caused because the net_set_vlan command is not properly unregistered when the network module is unloaded from memory. An attacker who can execute this command can force the system to access memory locations that are no longer valid. Successful exploitation leads directly to system instability, which can result in a complete crash and halt system availability
Modified: 2025-11-19
CVE-2025-54771
A use-after-free vulnerability has been identified in the GNU GRUB (Grand Unified Bootloader). The flaw occurs because the file-closing process incorrectly retains a memory pointer, leaving an invalid reference to a file system structure. An attacker could exploit this vulnerability to cause grub to crash, leading to a Denial of Service. Possible data integrity or confidentiality compromise is not discarded.
Modified: 2025-11-19
CVE-2025-61661
A vulnerability has been identified in the GRUB (Grand Unified Bootloader) component. This flaw occurs because the bootloader mishandles string conversion when reading information from a USB device, allowing an attacker to exploit inconsistent length values. A local attacker can connect a maliciously configured USB device during the boot sequence to trigger this issue. A successful exploitation may lead GRUB to crash, leading to a Denial of Service. Data corruption may be also possible, although given the complexity of the exploit the impact is most likely limited.
Modified: 2026-01-08
CVE-2025-61662
A Use-After-Free vulnerability has been discovered in GRUB's gettext module. This flaw stems from a programming error where the gettext command remains registered in memory after its module is unloaded. An attacker can exploit this condition by invoking the orphaned command, causing the application to access a memory location that is no longer valid. An attacker could exploit this vulnerability to cause grub to crash, leading to a Denial of Service. Possible data integrity or confidentiality compromise is not discarded.
Modified: 2025-11-19
CVE-2025-61663
A vulnerability has been identified in the GRUB2 bootloader's normal command that poses an immediate Denial of Service (DoS) risk. This flaw is a Use-after-Free issue, caused because the normal command is not properly unregistered when the module is unloaded. An attacker who can execute this command can force the system to access memory locations that are no longer valid. Successful exploitation leads directly to system instability, which can result in a complete crash and halt system availability. Impact on the data integrity and confidentiality is also not discarded.
Modified: 2025-11-19
CVE-2025-61664
A vulnerability in the GRUB2 bootloader has been identified in the normal module. This flaw, a memory Use After Free issue, occurs because the normal_exit command is not properly unregistered when its related module is unloaded. An attacker can exploit this condition by invoking the command after the module has been removed, causing the system to improperly access a previously freed memory location. This leads to a system crash or possible impacts in data confidentiality and integrity.
Closed bugs
grub-efi-autoupdate для removable
Сломался grub-mkstandalone --format="i386-pc"
Package firefox updated to version 145.0.1-alt0.port for branch sisyphus_loongarch64.
Closed vulnerabilities
BDU:2025-14085
Уязвимость компонента JavaScript Engine браузера Mozilla Firefox, позволяющая нарушителю выполнить произвольный код
BDU:2025-14086
Уязвимость компонента WebGPU браузера Mozilla Firefox, позволяющая нарушителю выполнить произвольный код
BDU:2025-14087
Уязвимость компонента WebGPU браузера Mozilla Firefox, позволяющая нарушителю обойти защитный механизм песочницы
BDU:2025-14088
Уязвимость браузеров Mozilla Firefox и Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю выполнить произвольный код
BDU:2025-14508
Уязвимость интерфейса WebGPU API браузера Mozilla Firefox и почтового клиента Thunderbird, позволяющая нарушителю обойти защитный механизм песочницы и оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2025-14509
Уязвимость интерфейса WebGPU API браузера Mozilla Firefox и почтового клиента Thunderbird, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
BDU:2025-14510
Уязвимость интерфейса WebGPU API браузера Mozilla Firefox и почтового клиента Thunderbird, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
Modified: 2025-12-03
BDU:2025-14544
Уязвимость компонента WebRTC: Audio/Video браузеров Mozilla Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-12-03
BDU:2025-14545
Уязвимость компонента DOM: Workers браузеров Mozilla Firefox и Firefox ESR, позволяющая нарушителю обойти существующие ограничения безопасности
Modified: 2025-12-03
BDU:2025-14546
Уязвимость компонента DOM: Security браузеров Mozilla Firefox и Firefox ESR, позволяющая нарушителю обойти существующие ограничения безопасности
Modified: 2025-12-03
BDU:2025-14547
Уязвимость компонента DOM: Notifications браузеров Mozilla Firefox и Firefox ESR, позволяющая нарушителю обойти существующие ограничения безопасности
Modified: 2025-12-03
BDU:2025-14548
Уязвимость компонента JavaScript: WebAssembly браузеров Mozilla Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-12-26
BDU:2025-14549
Уязвимость браузеров Mozilla Firefox и Firefox ESR, связанная с ошибками представления информации пользовательским интерфейсом, позволяющая нарушителю проводить спуфинг-атаки
Modified: 2025-12-26
BDU:2025-14550
Уязвимость компонента Audio/Video браузеров Mozilla Firefox и Firefox ESR, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-12-26
BDU:2025-14551
Уязвимость компонента Graphics браузеров Mozilla Firefox и Firefox ESR, позволяющая нарушителю выполнить произвольный код
Modified: 2025-12-26
BDU:2025-14552
Уязвимость компонента DOM: Core & HTML браузеров Mozilla Firefox и Firefox ESR, позволяющая нарушителю обойти существующие ограничения безопасности
Modified: 2025-11-19
CVE-2025-13012
Race condition in the Graphics component. This vulnerability affects Firefox < 145, Firefox ESR < 140.5, Firefox ESR < 115.30, Thunderbird < 145, and Thunderbird < 140.5.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1991458
- https://www.mozilla.org/security/advisories/mfsa2025-87/
- https://www.mozilla.org/security/advisories/mfsa2025-88/
- https://www.mozilla.org/security/advisories/mfsa2025-89/
- https://www.mozilla.org/security/advisories/mfsa2025-90/
- https://www.mozilla.org/security/advisories/mfsa2025-91/
Modified: 2025-11-19
CVE-2025-13013
Mitigation bypass in the DOM: Core & HTML component. This vulnerability affects Firefox < 145, Firefox ESR < 140.5, Firefox ESR < 115.30, Thunderbird < 145, and Thunderbird < 140.5.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1991945
- https://www.mozilla.org/security/advisories/mfsa2025-87/
- https://www.mozilla.org/security/advisories/mfsa2025-88/
- https://www.mozilla.org/security/advisories/mfsa2025-89/
- https://www.mozilla.org/security/advisories/mfsa2025-90/
- https://www.mozilla.org/security/advisories/mfsa2025-91/
Modified: 2025-11-19
CVE-2025-13014
Use-after-free in the Audio/Video component. This vulnerability affects Firefox < 145, Firefox ESR < 140.5, Firefox ESR < 115.30, Thunderbird < 145, and Thunderbird < 140.5.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1994241
- https://www.mozilla.org/security/advisories/mfsa2025-87/
- https://www.mozilla.org/security/advisories/mfsa2025-88/
- https://www.mozilla.org/security/advisories/mfsa2025-89/
- https://www.mozilla.org/security/advisories/mfsa2025-90/
- https://www.mozilla.org/security/advisories/mfsa2025-91/
Modified: 2025-11-19
CVE-2025-13015
Spoofing issue in Firefox. This vulnerability affects Firefox < 145, Firefox ESR < 140.5, Firefox ESR < 115.30, Thunderbird < 145, and Thunderbird < 140.5.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1994164
- https://www.mozilla.org/security/advisories/mfsa2025-87/
- https://www.mozilla.org/security/advisories/mfsa2025-88/
- https://www.mozilla.org/security/advisories/mfsa2025-89/
- https://www.mozilla.org/security/advisories/mfsa2025-90/
- https://www.mozilla.org/security/advisories/mfsa2025-91/
Modified: 2025-11-25
CVE-2025-13016
Incorrect boundary conditions in the JavaScript: WebAssembly component. This vulnerability affects Firefox < 145, Firefox ESR < 140.5, Thunderbird < 145, and Thunderbird < 140.5.
Modified: 2025-11-19
CVE-2025-13017
Same-origin policy bypass in the DOM: Notifications component. This vulnerability affects Firefox < 145, Firefox ESR < 140.5, Thunderbird < 145, and Thunderbird < 140.5.
Modified: 2025-11-19
CVE-2025-13018
Mitigation bypass in the DOM: Security component. This vulnerability affects Firefox < 145, Firefox ESR < 140.5, Thunderbird < 145, and Thunderbird < 140.5.
Modified: 2025-11-19
CVE-2025-13019
Same-origin policy bypass in the DOM: Workers component. This vulnerability affects Firefox < 145, Firefox ESR < 140.5, Thunderbird < 145, and Thunderbird < 140.5.
Modified: 2025-11-19
CVE-2025-13020
Use-after-free in the WebRTC: Audio/Video component. This vulnerability affects Firefox < 145, Firefox ESR < 140.5, Thunderbird < 145, and Thunderbird < 140.5.
Modified: 2025-11-19
CVE-2025-13021
Incorrect boundary conditions in the Graphics: WebGPU component. This vulnerability affects Firefox < 145 and Thunderbird < 145.
Modified: 2025-11-19
CVE-2025-13022
Incorrect boundary conditions in the Graphics: WebGPU component. This vulnerability affects Firefox < 145 and Thunderbird < 145.
Modified: 2025-11-19
CVE-2025-13023
Sandbox escape due to incorrect boundary conditions in the Graphics: WebGPU component. This vulnerability affects Firefox < 145 and Thunderbird < 145.
Modified: 2025-11-19
CVE-2025-13024
JIT miscompilation in the JavaScript Engine: JIT component. This vulnerability affects Firefox < 145 and Thunderbird < 145.
Modified: 2025-11-19
CVE-2025-13025
Incorrect boundary conditions in the Graphics: WebGPU component. This vulnerability affects Firefox < 145 and Thunderbird < 145.
Modified: 2025-11-19
CVE-2025-13026
Sandbox escape due to incorrect boundary conditions in the Graphics: WebGPU component. This vulnerability affects Firefox < 145 and Thunderbird < 145.
Modified: 2025-11-19
CVE-2025-13027
Memory safety bugs present in Firefox 144 and Thunderbird 144. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 145 and Thunderbird < 145.