ALT-BU-2025-3539-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2018-25021
The TCP Server module in toxcore before 0.2.8 doesn't free the TCP priority queue under certain conditions, which allows a remote attacker to exhaust the system's memory, causing a denial of service (DoS).
- https://blog.tox.chat/2018/10/memory-leak-bug-and-new-toxcore-release-fixing-it/
- https://blog.tox.chat/2018/10/memory-leak-bug-and-new-toxcore-release-fixing-it/
- https://github.com/TokTok/c-toxcore/issues/1214
- https://github.com/TokTok/c-toxcore/issues/1214
- https://github.com/TokTok/c-toxcore/pull/1216
- https://github.com/TokTok/c-toxcore/pull/1216
Modified: 2024-11-21
CVE-2018-25022
The Onion module in toxcore before 0.2.2 doesn't restrict which packets can be onion-routed, which allows a remote attacker to discover a target user's IP address (when knowing only their Tox Id) by positioning themselves close to target's Tox Id in the DHT for the target to establish an onion connection with the attacker, guessing the target's DHT public key and creating a DHT node with public key close to it, and finally onion-routing a NAT Ping Request to the target, requesting it to ping the just created DHT node.
- https://blog.tox.chat/2018/04/security-vulnerability-and-new-toxcore-release
- https://blog.tox.chat/2018/04/security-vulnerability-and-new-toxcore-release
- https://github.com/TokTok/c-toxcore/issues/873
- https://github.com/TokTok/c-toxcore/issues/873
- https://github.com/TokTok/c-toxcore/pull/872
- https://github.com/TokTok/c-toxcore/pull/872
Modified: 2024-11-21
CVE-2021-44847
A stack-based buffer overflow in handle_request function in DHT.c in toxcore 0.1.9 through 0.1.11 and 0.2.0 through 0.2.12 (caused by an improper length calculation during the handling of received network packets) allows remote attackers to crash the process or potentially execute arbitrary code via a network packet.
Package make-initrd updated to version 2.51.0-alt1.1 for branch sisyphus in task 375833.
Closed bugs
50-instkernel.sh
Package userpasswd-gnome updated to version 0.0.1-alt2 for branch sisyphus in task 375891.
Closed bugs
Права устнавливаются серез %post
Closed vulnerabilities
Modified: 2025-02-27
CVE-2025-27112
Navidrome is an open source web-based music collection server and streamer. Starting in version 0.52.0 and prior to version 0.54.5, in certain Subsonic API endpoints, a flaw in the authentication check process allows an attacker to specify any arbitrary username that does not exist on the system, along with a salted hash of an empty password. Under these conditions, Navidrome treats the request as authenticated, granting access to various Subsonic endpoints without requiring valid credentials. An attacker can use any non-existent username to bypass the authentication system and gain access to various read-only data in Navidrome, such as user playlists. However, any attempt to modify data fails with a "permission denied" error due to insufficient permissions, limiting the impact to unauthorized viewing of information. Version 0.54.5 contains a patch for this issue.
Closed vulnerabilities
BDU:2024-10771
Уязвимость функции elisp-completion-at-point() и elisp-flymake-byte-compile() режима ELisp текстового редактора EMACS, позволяющая нарушителю выполнить произвольный код
Modified: 2025-03-13
CVE-2024-53920
In elisp-mode.el in GNU Emacs before 30.1, a user who chooses to invoke elisp-completion-at-point (for code completion) on untrusted Emacs Lisp source code can trigger unsafe Lisp macro expansion that allows attackers to execute arbitrary code. (This unsafe expansion also occurs if a user chooses to enable on-the-fly diagnosis that byte compiles untrusted Emacs Lisp source code.)
- https://eshelyaron.com/posts/2024-11-27-emacs-aritrary-code-execution-and-how-to-avoid-it.html
- https://git.savannah.gnu.org/cgit/emacs.git/tag/?h=emacs-30.0.92
- https://git.savannah.gnu.org/cgit/emacs.git/tree/ChangeLog.4
- https://git.savannah.gnu.org/cgit/emacs.git/tree/etc/NEWS?h=emacs-30.1
- https://news.ycombinator.com/item?id=42256409
- https://yhetil.org/emacs/CAFXAjY5f4YfHAtZur1RAqH34UbYU56_t6t2Er0YEh1Sb7-W=hg@mail.gmail.com/
Modified: 2025-03-13
CVE-2025-1244
A command injection flaw was found in the text editor Emacs. It could allow a remote, unauthenticated attacker to execute arbitrary shell commands on a vulnerable system. Exploitation is possible by tricking users into visiting a specially crafted website or an HTTP URL with a redirect.
- http://www.openwall.com/lists/oss-security/2025/03/01/2
- RHSA-2025:1915
- RHSA-2025:1917
- RHSA-2025:1961
- RHSA-2025:1962
- RHSA-2025:1963
- RHSA-2025:1964
- RHSA-2025:2022
- RHSA-2025:2130
- RHSA-2025:2157
- RHSA-2025:2195
- RHSA-2025:2754
- https://access.redhat.com/security/cve/CVE-2025-1244
- RHBZ#2345150
- https://debbugs.gnu.org/cgi/bugreport.cgi?bug=66390
- https://git.savannah.gnu.org/cgit/emacs.git/tree/etc/NEWS?h=emacs-30.1
Closed bugs
Отвалилась поддержка /etc/emacs/site-start.el
Closed bugs
Отсутствуют драйвера баз данных
Package packagekit updated to version 1.3.0-alt2 for branch sisyphus in task 375523.
Closed bugs
pkmon: finalized without ever returning
Closed bugs
Не работает с Java 17 (java.lang.NoClassDefFoundError: jdk/nashorn/api/scripting/ClassFilter)
Package alterator-sysconfig updated to version 1.3.22-alt1 for branch sisyphus in task 376060.
Closed bugs
В OEM установке на шаге "Язык" меняются местами варианты переключения раскладки клавиатуры