ALT-BU-2025-6186-1
Branch p11 update bulletin.
Closed bugs
passim: FTBFS
Package thunderbird updated to version 137.0.2-alt1 for branch p11 in task 382440.
Closed vulnerabilities
Modified: 2025-04-15
CVE-2025-2830
By crafting a malformed file name for an attachment in a multipart message, an attacker can trick Thunderbird into including a directory listing of /tmp when the message is forwarded or edited as a new message. This vulnerability could allow attackers to disclose sensitive information from the victim's system. This vulnerability is not limited to Linux; similar behavior has been observed on Windows as well. This vulnerability affects Thunderbird < 137.0.2 and Thunderbird < 128.9.2.
Modified: 2025-04-15
CVE-2025-3522
Thunderbird processes the X-Mozilla-External-Attachment-URL header to handle attachments which can be hosted externally. When an email is opened, Thunderbird accesses the specified URL to determine file size, and navigates to it when the user clicks the attachment. Because the URL is not validated or sanitized, it can reference internal resources like chrome:// or SMB share file:// links, potentially leading to hashed Windows credential leakage and opening the door to more serious security issues. This vulnerability affects Thunderbird < 137.0.2 and Thunderbird < 128.9.2.
Modified: 2025-04-15
CVE-2025-3523
When an email contains multiple attachments with external links via the X-Mozilla-External-Attachment-URL header, only the last link is shown when hovering over any attachment. Although the correct link is used on click, the misleading hover text could trick users into downloading content from untrusted sources. This vulnerability affects Thunderbird < 137.0.2 and Thunderbird < 128.9.2.
Closed bugs
Некорректный desktop файл
Closed vulnerabilities
BDU:2024-03807
Уязвимость интерпретатора языка программирования R, связанная с недостатками механизма десериализации, позволяющая нарушителю выполнить произвольный код в целевой системе
Modified: 2025-02-13
CVE-2024-27322
Deserialization of untrusted data can occur in the R statistical programming language, on any version starting at 1.4.0 up to and not including 4.4.0, enabling a maliciously crafted RDS (R Data Serialization) formatted file or R package to run arbitrary code on an end user’s system when interacted with.
- http://www.openwall.com/lists/oss-security/2024/04/29/3
- http://www.openwall.com/lists/oss-security/2024/04/29/3
- https://hiddenlayer.com/research/r-bitrary-code-execution/
- https://hiddenlayer.com/research/r-bitrary-code-execution/
- https://https://kb.cert.org/vuls/id/238194
- https://https://kb.cert.org/vuls/id/238194
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLV4OWXZIJ7EFBIWUZADUSHYJTFAQ4D/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/7ZLV4OWXZIJ7EFBIWUZADUSHYJTFAQ4D/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JVE5FDLFJGTAMOSJ6DREFAODEUBRFWSG/
- https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/JVE5FDLFJGTAMOSJ6DREFAODEUBRFWSG/
- https://www.kb.cert.org/vuls/id/238194
- https://www.kb.cert.org/vuls/id/238194
Closed bugs
Обновите до свежей версии
просьба обноить до 4.3.2
Просьба обновить до 4.4.x
Просьба обновить до 4.4.x
Обновление до 4.3.3
Closed vulnerabilities
Modified: 2024-11-21
CVE-2019-10069
In Godot through 3.1, remote code execution is possible due to the deserialization policy not being applied correctly.
Modified: 2024-11-21
CVE-2021-26825
An integer overflow issue exists in Godot Engine up to v3.2 that can be triggered when loading specially crafted.TGA image files. The vulnerability exists in ImageLoaderTGA::load_image() function at line: const size_t buffer_size = (tga_header.image_width * tga_header.image_height) * pixel_size; The bug leads to Dynamic stack buffer overflow. Depending on the context of the application, attack vector can be local or remote, and can lead to code execution and/or system crash.
Modified: 2024-11-21
CVE-2021-26826
A stack overflow issue exists in Godot Engine up to v3.2 and is caused by improper boundary checks when loading .TGA image files. Depending on the context of the application, attack vector can be local or remote, and can lead to code execution and/or system crash.
Closed bugs
Обновить до 3.5.3
Package multipath-tools updated to version 0.11.1-alt3 for branch p11 in task 381995.
Closed bugs
multipath-tools 0.11.1-alt2 имеет зависимость на systemctl