ALT-BU-2025-16187-1
Branch sisyphus_loongarch64 update bulletin.
Package linstor updated to version 1.33.1-alt2 for branch sisyphus_loongarch64.
Closed bugs
Ошибка 'JAVA_HOME is not set' при установке пакета linstor-controller
Package php8.2 updated to version 8.2.30-alt1 for branch sisyphus_loongarch64.
Closed vulnerabilities
Modified: 2025-12-29
CVE-2025-14177
In PHP versions:8.1.* before 8.1.34, 8.2.* before 8.2.30, 8.3.* before 8.3.29, 8.4.* before 8.4.16, 8.5.* before 8.5.1, the getimagesize() function may leak uninitialized heap memory into the APPn segments (e.g., APP1) when reading images in multi-chunk mode (such as via php://filter). This occurs due to a bug in php_read_stream_all_chunks() that overwrites the buffer without advancing the pointer, leaving tail bytes uninitialized. This may lead to information disclosure of sensitive heap data and affect the confidentiality of the target server.
Modified: 2025-12-29
CVE-2025-14178
In PHP versions:8.1.* before 8.1.34, 8.2.* before 8.2.30, 8.3.* before 8.3.29, 8.4.* before 8.4.16, 8.5.* before 8.5.1, a heap buffer overflow occurs in array_merge() when the total element count of packed arrays exceeds 32-bit limits or HT_MAX_SIZE, due to an integer overflow in the precomputation of element counts using zend_hash_num_elements(). This may lead to memory corruption or crashes and affect the integrity and availability of the target server.
Modified: 2025-12-29
CVE-2025-14180
In PHP versions 8.1.* before 8.1.34, 8.2.* before 8.2.30, 8.3.* before 8.3.29, 8.4.* before 8.4.16, 8.5.* before 8.5.1 when using the PDO PostgreSQL driver with PDO::ATTR_EMULATE_PREPARES enabled, an invalid character sequence (such as \x99) in a prepared statement parameter may cause the quoting function PQescapeStringConn to return NULL, leading to a null pointer dereference in pdo_parse_params() function. This may lead to crashes (segmentation fault) and affect the availability of the target server.
Package libraw updated to version 0.21.5-alt1 for branch sisyphus_loongarch64.
Closed vulnerabilities
Modified: 2025-12-03
BDU:2025-10595
Уязвимость функции phase_one_correct() компонента decoders/load_mfbacks.cpp библиотеки для обработки изображений LibRaw, позволяющая нарушителю выполнить произвольный код
Modified: 2025-12-03
BDU:2025-10596
Уязвимость компонента metadata/tiff.cpp библиотеки для обработки изображений LibRaw, позволяющая нарушителю выполнить произвольный код
Modified: 2025-12-03
BDU:2025-10597
Уязвимость функции phase_one_correct() компонента decoders/load_mfbacks.cpp библиотеки для обработки изображений LibRaw, позволяющая нарушителю выполнить произвольный код
Modified: 2025-12-03
BDU:2025-10598
Уязвимость функции phase_one_correct() компонента decoders/load_mfbacks.cpp библиотеки для обработки изображений LibRaw, позволяющая нарушителю выполнить произвольный код
Modified: 2025-11-03
CVE-2025-43961
In LibRaw before 0.21.4, metadata/tiff.cpp has an out-of-bounds read in the Fujifilm 0xf00c tag parser.
Modified: 2025-11-03
CVE-2025-43962
In LibRaw before 0.21.4, phase_one_correct in decoders/load_mfbacks.cpp has out-of-bounds reads for tag 0x412 processing, related to large w0 or w1 values or the frac and mult calculations.
Modified: 2025-11-03
CVE-2025-43963
In LibRaw before 0.21.4, phase_one_correct in decoders/load_mfbacks.cpp allows out-of-buffer access because split_col and split_row values are not checked in 0x041f tag processing.
Modified: 2025-11-03
CVE-2025-43964
In LibRaw before 0.21.4, tag 0x412 processing in phase_one_correct in decoders/load_mfbacks.cpp does not enforce minimum w0 and w1 values.
Package system-backup updated to version 0.1.5-alt2 for branch sisyphus_loongarch64.
Closed bugs
Package tuned updated to version 2.26.0-alt2 for branch sisyphus_loongarch64.
Closed bugs
Просьба собрать в Сизиф пакет tuned-ppd
Package traefik updated to version 3.6.5-alt1 for branch sisyphus_loongarch64.
Closed vulnerabilities
Modified: 2025-12-11
CVE-2025-66490
Traefik is an HTTP reverse proxy and load balancer. For versions prior to 2.11.32 and 2.11.31 through 3.6.2, requests using PathPrefix, Path or PathRegex matchers can bypass path normalization. When Traefik uses path-based routing, requests containing URL-encoded restricted characters (/, \, Null, ;, ?, #) can bypass the middleware chain and reach unintended backends. For example, a request to http://mydomain.example.com/admin%2F could reach service-a without triggering my-security-middleware, bypassing security controls for the /admin/ path. This issue is fixed in versions 2.11.32 and 3.6.3.
Modified: 2025-12-09
CVE-2025-66491
Traefik is an HTTP reverse proxy and load balancer. Versions 3.5.0 through 3.6.2 have inverted TLS verification logic in the nginx.ingress.kubernetes.io/proxy-ssl-verify annotation. Setting the annotation to "on" (intending to enable backend TLS certificate verification) actually disables verification, allowing man-in-the-middle attacks against HTTPS backends when operators believe they are protected. This issue is fixed in version 3.6.3.