ALT-BU-2025-16179-1
Branch sisyphus_riscv64 update bulletin.
Package alien updated to version 8.95.9-alt4 for branch sisyphus_riscv64.
Closed bugs
alien ожидает slack-специфичную структуру пакета при преобразовании из tgz
Package php8.2 updated to version 8.2.30-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
Modified: 2026-01-08
CVE-2025-14177
In PHP versions:8.1.* before 8.1.34, 8.2.* before 8.2.30, 8.3.* before 8.3.29, 8.4.* before 8.4.16, 8.5.* before 8.5.1, the getimagesize() function may leak uninitialized heap memory into the APPn segments (e.g., APP1) when reading images in multi-chunk mode (such as via php://filter). This occurs due to a bug in php_read_stream_all_chunks() that overwrites the buffer without advancing the pointer, leaving tail bytes uninitialized. This may lead to information disclosure of sensitive heap data and affect the confidentiality of the target server.
Modified: 2026-01-09
CVE-2025-14178
In PHP versions:8.1.* before 8.1.34, 8.2.* before 8.2.30, 8.3.* before 8.3.29, 8.4.* before 8.4.16, 8.5.* before 8.5.1, a heap buffer overflow occurs in array_merge() when the total element count of packed arrays exceeds 32-bit limits or HT_MAX_SIZE, due to an integer overflow in the precomputation of element counts using zend_hash_num_elements(). This may lead to memory corruption or crashes and affect the integrity and availability of the target server.
Modified: 2026-01-09
CVE-2025-14180
In PHP versions 8.1.* before 8.1.34, 8.2.* before 8.2.30, 8.3.* before 8.3.29, 8.4.* before 8.4.16, 8.5.* before 8.5.1 when using the PDO PostgreSQL driver with PDO::ATTR_EMULATE_PREPARES enabled, an invalid character sequence (such as \x99) in a prepared statement parameter may cause the quoting function PQescapeStringConn to return NULL, leading to a null pointer dereference in pdo_parse_params() function. This may lead to crashes (segmentation fault) and affect the availability of the target server.
Package tuned updated to version 2.26.0-alt2 for branch sisyphus_riscv64.
Closed bugs
Просьба собрать в Сизиф пакет tuned-ppd
Package apt updated to version 0.5.15lorg2-alt98 for branch sisyphus_riscv64.
Closed bugs
Ошибка при установке пакетов больше 2 Гб на ALT Linux
Package system-backup updated to version 0.1.5-alt2 for branch sisyphus_riscv64.
Closed bugs
Package linstor updated to version 1.33.1-alt2 for branch sisyphus_riscv64.
Closed bugs
Ошибка 'JAVA_HOME is not set' при установке пакета linstor-controller
Package traefik updated to version 3.6.5-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
Modified: 2025-12-11
CVE-2025-66490
Traefik is an HTTP reverse proxy and load balancer. For versions prior to 2.11.32 and 2.11.31 through 3.6.2, requests using PathPrefix, Path or PathRegex matchers can bypass path normalization. When Traefik uses path-based routing, requests containing URL-encoded restricted characters (/, \, Null, ;, ?, #) can bypass the middleware chain and reach unintended backends. For example, a request to http://mydomain.example.com/admin%2F could reach service-a without triggering my-security-middleware, bypassing security controls for the /admin/ path. This issue is fixed in versions 2.11.32 and 3.6.3.
Modified: 2026-01-02
CVE-2025-66491
Traefik is an HTTP reverse proxy and load balancer. Versions 3.5.0 through 3.6.2 have inverted TLS verification logic in the nginx.ingress.kubernetes.io/proxy-ssl-verify annotation. Setting the annotation to "on" (intending to enable backend TLS certificate verification) actually disables verification, allowing man-in-the-middle attacks against HTTPS backends when operators believe they are protected. This issue is fixed in version 3.6.3.