ALT-BU-2025-3375-1
Branch sisyphus_e2k update bulletin.
Package surguch updated to version 0.2.2-alt1 for branch sisyphus_e2k.
Closed bugs
Некорректное переключение страниц в surguch
Переход на первую страницу при масштабировании документа в surguch
Package nginx updated to version 1.26.3-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
Modified: 2025-02-05
CVE-2025-23419
When multiple server blocks are configured to share the same IP address and port, an attacker can use session resumption to bypass client certificate authentication requirements on these servers. This vulnerability arises when TLS Session Tickets https://nginx.org/en/docs/http/ngx_http_ssl_module.html#ssl_session_ticket_key are used and/or the SSL session cache https://nginx.org/en/docs/http/ngx_http_ssl_module.html#ssl_session_cache are used in the default server and the default server is performing client certificate authentication. Note: Software versions which have reached End of Technical Support (EoTS) are not evaluated.
Package SDL2 updated to version 2.30.12-alt2 for branch sisyphus_e2k.
Closed bugs
Сборочный скрипт не может обнаружить libdrm и gbm
Package asterisk updated to version 20.9.3-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2025-00920
Уязвимость систем управления Asterisk, связанная с недостатками разграничения доступа, позволяющая нарушителю повысить привилегии
Modified: 2024-09-16
CVE-2024-42365
Asterisk is an open source private branch exchange (PBX) and telephony toolkit. Prior to asterisk versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk versions 18.9-cert11 and 20.7-cert2, an AMI user with `write=originate` may change all configuration files in the `/etc/asterisk/` directory. This occurs because they are able to curl remote files and write them to disk, but are also able to append to existing files using the `FILE` function inside the `SET` application. This issue may result in privilege escalation, remote code execution and/or blind server-side request forgery with arbitrary protocol. Asterisk versions 18.24.2, 20.9.2, and 21.4.2 and certified-asterisk versions 18.9-cert11 and 20.7-cert2 contain a fix for this issue.
- https://github.com/asterisk/asterisk/blob/14367caaf7241df1eceea7c45c5b261989c2c6db/main/manager.c#L6426
- https://github.com/asterisk/asterisk/blob/7d28165cb1b2d02d66e8693bd3fe23ee72fc55d8/main/manager.c#L6426
- https://github.com/asterisk/asterisk/commit/42a2f4ccfa2c7062a15063e765916b3332e34cc4
- https://github.com/asterisk/asterisk/commit/7a0090325bfa9d778a39ae5f7d0a98109e4651c8
- https://github.com/asterisk/asterisk/commit/b4063bf756272254b160b6d1bd6e9a3f8e16cc71
- https://github.com/asterisk/asterisk/commit/bbe68db10ab8a80c29db383e4dfe14f6eafaf993
- https://github.com/asterisk/asterisk/commit/faddd99f2b9408b524e5eb8a01589fe1fa282df2
- https://github.com/asterisk/asterisk/security/advisories/GHSA-c4cg-9275-6w44
Package vorbis-tools updated to version 1.4.2-alt2 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2024-02625
Уязвимость пакета Vorbis-tools, связанная с возможностью записи за границами буфера в памяти, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
Modified: 2024-11-21
CVE-2023-43361
Buffer Overflow vulnerability in Vorbis-tools v.1.4.2 allows a local attacker to execute arbitrary code and cause a denial of service during the conversion of wav files to ogg files.
- https://github.com/xiph/vorbis
- https://github.com/xiph/vorbis
- https://github.com/xiph/vorbis-tools
- https://github.com/xiph/vorbis-tools
- https://github.com/xiph/vorbis-tools/issues/41
- https://github.com/xiph/vorbis-tools/issues/41
- FEDORA-2024-faff3dd9d6
- FEDORA-2024-faff3dd9d6
- FEDORA-2024-5f8da7c1f1
- FEDORA-2024-5f8da7c1f1
- https://xiph.org/vorbis/
- https://xiph.org/vorbis/
Package dbus updated to version 1.16.0-alt2 for branch sisyphus_e2k.
Closed bugs
Failed to start message bus in hasher
Package curl updated to version 8.12.0-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2025-01585
Уязвимость функции gzip_do_write() библиотеки сжатия zlib утилиты командной строки cURL, позволяющая нарушителю обойти механизм защиты ASLR, выполнить произвольный код или вызвать отказ в обслуживании
Modified: 2025-03-07
CVE-2025-0167
When asked to use a `.netrc` file for credentials **and** to follow HTTP redirects, curl could leak the password used for the first host to the followed-to host under certain circumstances. This flaw only manifests itself if the netrc file has a `default` entry that omits both login and password. A rare circumstance.
Modified: 2025-03-18
CVE-2025-0665
libcurl would wrongly close the same eventfd file descriptor twice when taking down a connection channel after having completed a threaded name resolve.
Modified: 2025-03-07
CVE-2025-0725
When libcurl is asked to perform automatic gzip decompression of content-encoded HTTP responses with the `CURLOPT_ACCEPT_ENCODING` option, **using zlib 1.2.0.3 or older**, an attacker-controlled integer overflow would make libcurl perform a buffer overflow.
Package rsync updated to version 3.2.7-alt3 for branch sisyphus_e2k.
Closed bugs
rsync -F: *** buffer overflow detected ***: terminated Aborted (core dumped)
Package wget updated to version 1.25.0-alt4 for branch sisyphus_e2k.
Closed bugs
wget: OpenSSL: error:80000000:system library::Success
Package zoneminder updated to version 1.37.61-alt10.git9afec506a for branch sisyphus_e2k.
Closed bugs
Failed to start zoneminder.service: Unit janus.service not found.
Package bind updated to version 9.18.33-alt1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2025-01459
Уязвимость сервера DNS BIND, связанная с асимметричным потреблением ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-02-11
CVE-2024-11187
It is possible to construct a zone such that some queries to it will generate responses containing numerous records in the Additional section. An attacker sending many such queries can cause either the authoritative server itself or an independent resolver to use disproportionate resources processing the queries. Zones will usually need to have been deliberately crafted to attack this exposure. This issue affects BIND 9 versions 9.11.0 through 9.11.37, 9.16.0 through 9.16.50, 9.18.0 through 9.18.32, 9.20.0 through 9.20.4, 9.21.0 through 9.21.3, 9.11.3-S1 through 9.11.37-S1, 9.16.8-S1 through 9.16.50-S1, and 9.18.11-S1 through 9.18.32-S1.
Modified: 2025-02-07
CVE-2024-12705
Clients using DNS-over-HTTPS (DoH) can exhaust a DNS resolver's CPU and/or memory by flooding it with crafted valid or invalid HTTP/2 traffic. This issue affects BIND 9 versions 9.18.0 through 9.18.32, 9.20.0 through 9.20.4, 9.21.0 through 9.21.3, and 9.18.11-S1 through 9.18.32-S1.