ALT-BU-2025-1631-1
Branch sisyphus_riscv64 update bulletin.
Package kde-theme-alt updated to version 0.3.1-alt1 for branch sisyphus_riscv64.
Closed bugs
Тема ломает функционал Plasma.
Package kde-set updated to version 25.01.0-alt1 for branch sisyphus_riscv64.
Closed bugs
kdenlive крашится запуск: qrc:/qml/kdenliveclipmonitor.qml: module "org.kde.desktop" is not installed Segmentation fault
Package avahi updated to version 0.8-alt5 for branch sisyphus_riscv64.
Closed vulnerabilities
CVE-2024-52616
A flaw was found in the Avahi-daemon, where it initializes DNS transaction IDs randomly only once at startup, incrementing them sequentially after that. This predictable behavior facilitates DNS spoofing attacks, allowing attackers to guess transaction IDs.
Package golang updated to version 1.23.5-alt0.port for branch sisyphus_riscv64.
Closed vulnerabilities
Modified: 2025-02-21
CVE-2024-45336
The HTTP client drops sensitive headers after following a cross-domain redirect. For example, a request to a.com/ containing an Authorization header which is redirected to b.com/ will not send that header to b.com. In the event that the client received a subsequent same-domain redirect, however, the sensitive headers would be restored. For example, a chain of redirects from a.com/, to b.com/1, and finally to b.com/2 would incorrectly send the Authorization header to b.com/2.
Modified: 2025-02-21
CVE-2024-45341
A certificate with a URI which has a IPv6 address with a zone ID may incorrectly satisfy a URI name constraint that applies to the certificate chain. Certificates containing URIs are not permitted in the web PKI, so this only affects users of private PKIs which make use of URIs.
Package python3-module-notebook updated to version 7.3.2-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
Modified: 2024-08-30
CVE-2024-43805
jupyterlab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook Architecture. This vulnerability depends on user interaction by opening a malicious notebook with Markdown cells, or Markdown file using JupyterLab preview feature. A malicious user can access any data that the attacked user has access to as well as perform arbitrary requests acting as the attacked user. JupyterLab v3.6.8, v4.2.5 and Jupyter Notebook v7.2.2 have been patched to resolve this issue. Users are advised to upgrade. There is no workaround for the underlying DOM Clobbering susceptibility. However, select plugins can be disabled on deployments which cannot update in a timely fashion to minimise the risk. These are: 1. `@jupyterlab/mathjax-extension:plugin` - users will loose ability to preview mathematical equations. 2. `@jupyterlab/markdownviewer-extension:plugin` - users will loose ability to open Markdown previews. 3. `@jupyterlab/mathjax2-extension:plugin` (if installed with optional `jupyterlab-mathjax2` package) - an older version of the mathjax plugin for JupyterLab 4.x. To disable these extensions run: ```jupyter labextension disable @jupyterlab/markdownviewer-extension:plugin && jupyter labextension disable @jupyterlab/mathjax-extension:plugin && jupyter labextension disable @jupyterlab/mathjax2-extension:plugin ``` in bash.
Package python3-module-jupyterlab updated to version 4.3.4-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
Modified: 2024-08-30
CVE-2024-43805
jupyterlab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook Architecture. This vulnerability depends on user interaction by opening a malicious notebook with Markdown cells, or Markdown file using JupyterLab preview feature. A malicious user can access any data that the attacked user has access to as well as perform arbitrary requests acting as the attacked user. JupyterLab v3.6.8, v4.2.5 and Jupyter Notebook v7.2.2 have been patched to resolve this issue. Users are advised to upgrade. There is no workaround for the underlying DOM Clobbering susceptibility. However, select plugins can be disabled on deployments which cannot update in a timely fashion to minimise the risk. These are: 1. `@jupyterlab/mathjax-extension:plugin` - users will loose ability to preview mathematical equations. 2. `@jupyterlab/markdownviewer-extension:plugin` - users will loose ability to open Markdown previews. 3. `@jupyterlab/mathjax2-extension:plugin` (if installed with optional `jupyterlab-mathjax2` package) - an older version of the mathjax plugin for JupyterLab 4.x. To disable these extensions run: ```jupyter labextension disable @jupyterlab/markdownviewer-extension:plugin && jupyter labextension disable @jupyterlab/mathjax-extension:plugin && jupyter labextension disable @jupyterlab/mathjax2-extension:plugin ``` in bash.
Package suricata updated to version 7.0.8-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2024-05369
Уязвимость средства обнаружения и предотвращения вторжений Suricata, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-08255
Уязвимость системы обнаружения и предотвращения вторжений Suricata связанная с ошибками при проверке JA4-идентификатора, предоставляющего информацию о прикладном протоколе, который будет использован между клиентом и сервером, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2024-11374
Уязвимость фильтра BPF системы обнаружения и предотвращения вторжений Suricata, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-00134
Уязвимость системы обнаружения и предотвращения вторжений Suricata, связанная с выходом операции за границы буфера, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2025-00135
Уязвимость функции StreamingBufferSlideToOffsetWithRegions() системы обнаружения и предотвращения вторжений Suricata, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2025-00136
Уязвимость системы обнаружения и предотвращения вторжений Suricata, связанная с асимметричным потреблением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-00137
Уязвимость реализации протокола TCP системы обнаружения и предотвращения вторжений Suricata, позволяющая нарушителю оказать воздействие на целостность защищаемой информации
Modified: 2024-11-21
CVE-2024-37151
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Mishandling of multiple fragmented packets using the same IP ID value can lead to packet reassembly failure, which can lead to policy bypass. Upgrade to 7.0.6 or 6.0.20. When using af-packet, enable `defrag` to reduce the scope of the problem.
- https://github.com/OISF/suricata/commit/9d5c4273cb7e5ca65f195f7361f0d848c85180e0
- https://github.com/OISF/suricata/commit/9d5c4273cb7e5ca65f195f7361f0d848c85180e0
- https://github.com/OISF/suricata/commit/aab7f35c76721df19403a7c0c0025feae12f3b6b
- https://github.com/OISF/suricata/commit/aab7f35c76721df19403a7c0c0025feae12f3b6b
- https://github.com/OISF/suricata/security/advisories/GHSA-qrp7-g66m-px24
- https://github.com/OISF/suricata/security/advisories/GHSA-qrp7-g66m-px24
- https://redmine.openinfosecfoundation.org/issues/7041
- https://redmine.openinfosecfoundation.org/issues/7041
- https://redmine.openinfosecfoundation.org/issues/7042
- https://redmine.openinfosecfoundation.org/issues/7042
Modified: 2024-11-21
CVE-2024-38534
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Crafted modbus traffic can lead to unlimited resource accumulation within a flow. Upgrade to 7.0.6. Set a limited stream.reassembly.depth to reduce the issue.
- https://github.com/OISF/suricata/commit/a753cdbe84caee3b66d0bf49b2712d29a50d67ae
- https://github.com/OISF/suricata/security/advisories/GHSA-59qg-h357-69fq
- https://redmine.openinfosecfoundation.org/issues/6987
- https://redmine.openinfosecfoundation.org/issues/6988
- https://github.com/OISF/suricata/commit/a753cdbe84caee3b66d0bf49b2712d29a50d67ae
- https://redmine.openinfosecfoundation.org/issues/6988
- https://redmine.openinfosecfoundation.org/issues/6987
- https://github.com/OISF/suricata/security/advisories/GHSA-59qg-h357-69fq
Modified: 2024-11-21
CVE-2024-38535
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Suricata can run out of memory when parsing crafted HTTP/2 traffic. Upgrade to 6.0.20 or 7.0.6.
- https://github.com/OISF/suricata/commit/62d5cac1b8483d5f9d2b79833a4e59f5d80129b7
- https://github.com/OISF/suricata/commit/c82fa5ca0d1ce0bd8f936e0b860707a6571373b2
- https://github.com/OISF/suricata/security/advisories/GHSA-cg8j-7mwm-v563
- https://redmine.openinfosecfoundation.org/issues/7104
- https://redmine.openinfosecfoundation.org/issues/7105
- https://redmine.openinfosecfoundation.org/issues/7112
- https://github.com/OISF/suricata/commit/62d5cac1b8483d5f9d2b79833a4e59f5d80129b7
- https://redmine.openinfosecfoundation.org/issues/7112
- https://redmine.openinfosecfoundation.org/issues/7105
- https://redmine.openinfosecfoundation.org/issues/7104
- https://github.com/OISF/suricata/security/advisories/GHSA-cg8j-7mwm-v563
- https://github.com/OISF/suricata/commit/c82fa5ca0d1ce0bd8f936e0b860707a6571373b2
Modified: 2024-11-21
CVE-2024-38536
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. A memory allocation failure due to `http.memcap` being reached leads to a NULL-ptr reference leading to a crash. Upgrade to 7.0.6.
- https://github.com/OISF/suricata/security/advisories/GHSA-j32j-4w6g-94hh
- https://redmine.openinfosecfoundation.org/issues/7029
- https://redmine.openinfosecfoundation.org/issues/7033
- https://github.com/OISF/suricata/security/advisories/GHSA-j32j-4w6g-94hh
- https://redmine.openinfosecfoundation.org/issues/7033
- https://redmine.openinfosecfoundation.org/issues/7029
Modified: 2024-10-22
CVE-2024-45795
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to version 7.0.7, rules using datasets with the non-functional / unimplemented "unset" option can trigger an assertion during traffic parsing, leading to denial of service. This issue is addressed in 7.0.7. As a workaround, use only trusted and well tested rulesets.
Modified: 2024-10-22
CVE-2024-45796
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to version 7.0.7, a logic error during fragment reassembly can lead to failed reassembly for valid traffic. An attacker could craft packets to trigger this behavior.This issue has been addressed in 7.0.7.
Modified: 2024-10-18
CVE-2024-45797
LibHTP is a security-aware parser for the HTTP protocol and the related bits and pieces. Prior to version 0.5.49, unbounded processing of HTTP request and response headers can lead to excessive CPU time and memory utilization, possibly leading to extreme slowdowns. This issue is addressed in 0.5.49.
Modified: 2024-10-22
CVE-2024-47187
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to version 7.0.7, missing initialization of the random seed for "thash" leads to datasets having predictable hash table behavior. This can lead to dataset file loading to use excessive time to load, as well as runtime performance issues during traffic handling. This issue has been addressed in 7.0.7. As a workaround, avoid loading datasets from untrusted sources. Avoid dataset rules that track traffic in rules.
Modified: 2024-10-22
CVE-2024-47188
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to version 7.0.7, missing initialization of the random seed for "thash" leads to byte-range tracking having predictable hash table behavior. This can lead to an attacker forcing lots of data into a single hash bucket, leading to severe performance degradation. This issue has been addressed in 7.0.7.
Modified: 2024-10-22
CVE-2024-47522
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to version 7.0.7, invalid ALPN in TLS/QUIC traffic when JA4 matching/logging is enabled can lead to Suricata aborting with a panic. This issue has been addressed in 7.0.7. One may disable ja4 as a workaround.
Modified: 2025-03-31
CVE-2024-55605
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.8, a large input buffer to the to_lowercase, to_uppercase, strip_whitespace, compress_whitespace, dotprefix, header_lowercase, strip_pseudo_headers, url_decode, or xor transform can lead to a stack overflow causing Suricata to crash. The issue has been addressed in Suricata 7.0.8.
Modified: 2025-03-31
CVE-2024-55626
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.8, a large BPF filter file provided to Suricata at startup can lead to a buffer overflow at Suricata startup. The issue has been addressed in Suricata 7.0.8.
Modified: 2025-03-31
CVE-2024-55627
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.8, a specially crafted TCP stream can lead to a very large buffer overflow while being zero-filled during initialization with memset due to an unsigned integer underflow. The issue has been addressed in Suricata 7.0.8.
- https://github.com/OISF/suricata/commit/282509f70c4ce805098e59535af445362e3e9ebd
- https://github.com/OISF/suricata/commit/8900041405dbb5f9584edae994af2100733fb4be
- https://github.com/OISF/suricata/commit/9a53ec43b13f0039a083950511a18bf6f408e432
- https://github.com/OISF/suricata/security/advisories/GHSA-h2mv-7gg8-8x7v
- https://redmine.openinfosecfoundation.org/issues/7393
Modified: 2025-03-31
CVE-2024-55628
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to version 7.0.8, DNS resource name compression can lead to small DNS messages containing very large hostnames which can be costly to decode, and lead to very large DNS log records. While there are limits in place, they were too generous. The issue has been addressed in Suricata 7.0.8.
- https://github.com/OISF/suricata/commit/19cf0f81335d9f787d587450f7105ad95a648951
- https://github.com/OISF/suricata/commit/37f4c52b22fcdde4adf9b479cb5700f89d00768d
- https://github.com/OISF/suricata/commit/3a5671739f5b25e5dd973a74ca5fd8ea40e1ae2d
- https://github.com/OISF/suricata/security/advisories/GHSA-96w4-jqwf-qx2j
- https://redmine.openinfosecfoundation.org/issues/7280
Modified: 2025-03-31
CVE-2024-55629
Suricata is a network Intrusion Detection System, Intrusion Prevention System and Network Security Monitoring engine. Prior to 7.0.8, TCP streams with TCP urgent data (out of band data) can lead to Suricata analyzing data differently than the applications at the TCP endpoints, leading to possible evasions. Suricata 7.0.8 includes options to allow users to configure how to handle TCP urgent data. In IPS mode, you can use a rule such as drop tcp any any -> any any (sid:1; tcp.flags:U*;) to drop all the packets with urgent flag set.
Package ocaml-camlzip updated to version 1.13-alt2 for branch sisyphus_riscv64.
Closed bugs
Слинкованные бинарники не находят dllcamlzip.so на i586
Package python3-module-jupyter_client updated to version 8.6.3-alt1 for branch sisyphus_riscv64.
Closed bugs
Зависит от пакета, который нерабочий