ALT-BU-2025-15705-1
Branch sisyphus_loongarch64 update bulletin.
Package chromium updated to version 143.0.7499.40-alt0.port for branch sisyphus_loongarch64.
Closed vulnerabilities
Modified: 2025-12-26
BDU:2025-14373
Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-12-26
BDU:2025-14497
Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, связанная с ошибками смешения типов данных, позволяющая нарушителю выполнить произвольный код
Modified: 2025-12-26
BDU:2025-14498
Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2025-15241
Уязвимость компонента DevTools браузера Google Chrome, позволяющая нарушителю выполнить произвольный код
BDU:2025-15242
Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-15243
Уязвимость компонента Google Updater браузера Google Chrome, позволяющая нарушителю повысить свои привилегии
BDU:2025-15244
Уязвимость компонента Digital Credentials браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-15245
Уязвимость компонента Downloads браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения безопасности
BDU:2025-15246
Уязвимость компонента Downloads браузера Google Chrome, позволяющая нарушителю выполнить подмену пользовательского интерфейса
BDU:2025-15247
Уязвимость компонента Split View браузера Google Chrome, позволяющая нарушителю выполнить подмену пользовательского интерфейса
BDU:2025-15249
Уязвимость компонента Downloads браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения безопасности
BDU:2025-15250
Уязвимость компонента Media Stream браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-15251
Уязвимость технологии WebRTC браузера Google Chrome, позволяющая нарушителю получить доступ на чтение и запись произвольных файлов
BDU:2025-15253
Уязвимость компонента Passwords браузера Google Chrome, позволяющая нарушителю обойти существующие ограничения безопасности
BDU:2025-15254
Уязвимость компонента Loader браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-15255
Уязвимость обработчика JavaScript-сценариев V8 браузера Google Chrome, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-11-25
CVE-2025-13042
Inappropriate implementation in V8 in Google Chrome prior to 142.0.7444.166 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Modified: 2025-12-02
CVE-2025-13223
Type Confusion in V8 in Google Chrome prior to 142.0.7444.175 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Modified: 2025-11-19
CVE-2025-13224
Type Confusion in V8 in Google Chrome prior to 142.0.7444.175 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Modified: 2025-12-04
CVE-2025-13630
Type Confusion in V8 in Google Chrome prior to 143.0.7499.41 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Modified: 2025-12-04
CVE-2025-13631
Inappropriate implementation in Google Updater in Google Chrome on Mac prior to 143.0.7499.41 allowed a remote attacker to perform privilege escalation via a crafted file. (Chromium security severity: High)
Modified: 2025-12-04
CVE-2025-13632
Inappropriate implementation in DevTools in Google Chrome prior to 143.0.7499.41 allowed an attacker who convinced a user to install a malicious extension to potentially perform a sandbox escape via a crafted Chrome Extension. (Chromium security severity: High)
Modified: 2025-12-04
CVE-2025-13633
Use after free in Digital Credentials in Google Chrome prior to 143.0.7499.41 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: High)
Modified: 2025-12-04
CVE-2025-13634
Inappropriate implementation in Downloads in Google Chrome on Windows prior to 143.0.7499.41 allowed a local attacker to bypass mark of the web via a crafted HTML page. (Chromium security severity: Medium)
Modified: 2025-12-04
CVE-2025-13635
Inappropriate implementation in Downloads in Google Chrome prior to 143.0.7499.41 allowed a local attacker to perform UI spoofing via a crafted HTML page. (Chromium security severity: Low)
Modified: 2025-12-04
CVE-2025-13636
Inappropriate implementation in Split View in Google Chrome prior to 143.0.7499.41 allowed a remote attacker who convinced a user to engage in specific UI gestures to perform UI spoofing via a crafted domain name. (Chromium security severity: Low)
Modified: 2025-12-04
CVE-2025-13637
Inappropriate implementation in Downloads in Google Chrome prior to 143.0.7499.41 allowed a remote attacker who convinced a user to engage in specific UI gestures to bypass download protections via a crafted HTML page. (Chromium security severity: Low)
Modified: 2025-12-04
CVE-2025-13638
Use after free in Media Stream in Google Chrome prior to 143.0.7499.41 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Low)
Modified: 2025-12-08
CVE-2025-13639
Inappropriate implementation in WebRTC in Google Chrome prior to 143.0.7499.41 allowed a remote attacker to perform arbitrary read/write via a crafted HTML page. (Chromium security severity: Low)
Modified: 2025-12-04
CVE-2025-13640
Inappropriate implementation in Passwords in Google Chrome prior to 143.0.7499.41 allowed a local attacker to bypass authentication via physical access to the device. (Chromium security severity: Low)
Modified: 2025-12-04
CVE-2025-13720
Bad cast in Loader in Google Chrome prior to 143.0.7499.41 allowed a remote attacker who had compromised the renderer process to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
Modified: 2025-12-04
CVE-2025-13721
Race in v8 in Google Chrome prior to 143.0.7499.41 allowed a remote attacker to potentially exploit heap corruption via a crafted HTML page. (Chromium security severity: Medium)
Package rpm-build-pyproject updated to version 0.2.2-alt1 for branch sisyphus_loongarch64.
Closed bugs
поддержка и документация сборки с Limited API для setuptools-rust
Package hplip updated to version 3.25.8-alt2 for branch sisyphus_loongarch64.
Closed bugs
При установке плагина для сканирования несовпадение в контрольной сумме hplip
Package python3-module-django updated to version 5.2.9-alt1 for branch sisyphus_loongarch64.
Closed vulnerabilities
Modified: 2025-12-12
CVE-2025-13372
An issue was discovered in 5.2 before 5.2.9, 5.1 before 5.1.15, and 4.2 before 4.2.27. `FilteredRelation` is subject to SQL injection in column aliases, using a suitably crafted dictionary, with dictionary expansion, as the `**kwargs` passed to `QuerySet.annotate()` or `QuerySet.alias()` on PostgreSQL. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Stackered for reporting this issue.
Modified: 2025-12-10
CVE-2025-64460
An issue was discovered in 5.2 before 5.2.9, 5.1 before 5.1.15, and 4.2 before 4.2.27. Algorithmic complexity in `django.core.serializers.xml_serializer.getInnerText()` allows a remote attacker to cause a potential denial-of-service attack triggering CPU and memory exhaustion via specially crafted XML input processed by the XML `Deserializer`. Earlier, unsupported Django series (such as 5.0.x, 4.1.x, and 3.2.x) were not evaluated and may also be affected. Django would like to thank Seokchan Yoon for reporting this issue.
Package cni-plugins updated to version 1.9.0-alt1 for branch sisyphus_loongarch64.
Closed vulnerabilities
Modified: 2025-12-12
CVE-2025-67499
The CNI portmap plugin allows containers to emulate opening a host port, forwarding that traffic to the container. Versions 1.6.0 through 1.8.0 inadvertently forward all traffic with the same destination port as the host port when the portmap plugin is configured with the nftables backend, thus ignoring the destination IP. This includes traffic not intended for the node itself, i.e. traffic to containers hosted on the node. Containers that request HostPort forwarding can intercept all traffic destined for that port. This requires that the portmap plugin be explicitly configured to use the nftables backend. This issue is fixed in version 1.9.0. To workaround, configure the portmap plugin to use the iptables backend. It does not have this vulnerability.
Package qmergeinifiles updated to version 3.1.0-alt2 for branch sisyphus_loongarch64.
Closed bugs
qmergeinifiles: баг вывода информации об утилите
qmergeinifiles: неполное слияние секций