ALT-BU-2025-15420-1
Branch p11 update bulletin.
Closed bugs
Ошибки /boot/efi/EFI/BOOT/grub.cfg: invalid pe header
Closed bugs
Много лишних зависимостей
Closed vulnerabilities
Modified: 2025-12-26
BDU:2025-14497
Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, связанная с ошибками смешения типов данных, позволяющая нарушителю выполнить произвольный код
Modified: 2025-12-26
BDU:2025-14498
Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
Modified: 2025-12-02
CVE-2025-13223
Type Confusion in V8 in Google Chrome prior to 142.0.7444.175 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Modified: 2025-11-19
CVE-2025-13224
Type Confusion in V8 in Google Chrome prior to 142.0.7444.175 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Package libaccounts-glib updated to version 1.27-alt2 for branch p11 in task 401617.
Closed bugs
Не отображаются сервисы, для которых можно добавить учетные записи
Closed bugs
Не работает поиск по содержимому файла в catfish
Closed vulnerabilities
Modified: 2025-12-27
CVE-2025-12819
Untrusted search path in auth_query connection handler in PgBouncer before 1.25.1 allows an unauthenticated attacker to execute arbitrary SQL during authentication via a malicious search_path parameter in the StartupMessage.
Closed vulnerabilities
Modified: 2025-12-18
CVE-2025-61727
An excluded subdomain constraint in a certificate chain does not restrict the usage of wildcard SANs in the leaf certificate. For example a constraint that excludes the subdomain test.example.com does not prevent a leaf certificate from claiming the SAN *.example.com.
Modified: 2025-12-19
CVE-2025-61729
Within HostnameError.Error(), when constructing an error string, there is no limit to the number of hosts that will be printed out. Furthermore, the error string is constructed by repeated string concatenation, leading to quadratic runtime. Therefore, a certificate provided by a malicious actor can result in excessive resource consumption.