ALT-BU-2025-6733-1
Branch sisyphus_riscv64 update bulletin.
Package ejabberd updated to version 21.12-alt6 for branch sisyphus_riscv64.
Closed bugs
ejabberd имеет ненужную зависимость на beesu
Package hardinfo2 updated to version 2.2.10-alt1.gitda7f31d for branch sisyphus_riscv64.
Closed bugs
hardinfo2 сообщает, что Альт - это Fedora
Package gnome-shell-extension-ddterm updated to version 61-alt1 for branch sisyphus_riscv64.
Closed bugs
npm/eslint не нужен
Package libgweather4.0 updated to version 4.4.4-alt2 for branch sisyphus_riscv64.
Closed bugs
Обновление локаций Российской Федерации
Package rasdaemon updated to version 0.8.3-alt3 for branch sisyphus_riscv64.
Closed bugs
rasdaemon.env: No such file or directory
Package far2l updated to version 2.6.5-alt2 for branch sisyphus_riscv64.
Closed bugs
Невозможно ввести название папки на русском языке
Package kweather updated to version 24.12.3-alt1.1 for branch sisyphus_riscv64.
Closed bugs
Ошибка при выборе местоположения
Package cri-o1.25 updated to version 1.25.5-alt3 for branch sisyphus_riscv64.
Closed bugs
При удалении пакетов kubernetes/cri-o "ошибка чтения информации о сервисе: Нет такого файла или каталога"
Package cri-o1.32 updated to version 1.32.3-alt2 for branch sisyphus_riscv64.
Closed bugs
При удалении пакетов kubernetes/cri-o "ошибка чтения информации о сервисе: Нет такого файла или каталога"
Package dante updated to version 1.4.4-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
Modified: 2024-12-18
CVE-2024-54662
Dante 1.4.0 through 1.4.3 (fixed in 1.4.4) has incorrect access control for some sockd.conf configurations involving socksmethod.
Closed bugs
клиент (socksify) не работоспособен: client not built with preloading support
Package ffmpeg updated to version 7.1.1-alt0.port for branch sisyphus_riscv64.
Closed bugs
Нет поддержки smb://
Package polkit updated to version 126-alt2 for branch sisyphus_riscv64.
Closed bugs
126
polkit: перестали работать повышения прав
Package alterator-browser-qt6 updated to version 3.6.5-alt2 for branch sisyphus_riscv64.
Closed bugs
У alterator-browser-qt6 не отображается значок приложения в wayland
Package plasma-workspace updated to version 6.3.5-alt1 for branch sisyphus_riscv64.
Closed bugs
Дублирование кнопок уведомления
Package golang updated to version 1.24.3-alt0.port for branch sisyphus_riscv64.
Closed vulnerabilities
No data currently available.
Package postgresql15 updated to version 15.13-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2025-05405
Уязвимость библиотеки libpq системы управления базами данных PostgreSQL, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-05-09
CVE-2025-4207
Buffer over-read in PostgreSQL GB18030 encoding validation allows a database input provider to achieve temporary denial of service on platforms where a 1-byte over-read can elicit process termination. This affects the database server and also libpq. Versions before PostgreSQL 17.5, 16.9, 15.13, 14.18, and 13.21 are affected.
Package cri-o1.30 updated to version 1.30.12-alt2 for branch sisyphus_riscv64.
Closed bugs
При удалении пакетов kubernetes/cri-o "ошибка чтения информации о сервисе: Нет такого файла или каталога"
Package pgbouncer updated to version 1.24.1-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
Modified: 2025-04-17
CVE-2025-2291
Password can be used past expiry in PgBouncer due to auth_query not taking into account Postgres its VALID UNTIL value, which allows an attacker to log in with an already expired password
Package emelfm2 updated to version 0.9.1-alt1 for branch sisyphus_riscv64.
Closed bugs
0.9.1
Package postgresql17-1C updated to version 17.2-alt9 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2025-05405
Уязвимость библиотеки libpq системы управления базами данных PostgreSQL, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-05-09
CVE-2025-4207
Buffer over-read in PostgreSQL GB18030 encoding validation allows a database input provider to achieve temporary denial of service on platforms where a 1-byte over-read can elicit process termination. This affects the database server and also libpq. Versions before PostgreSQL 17.5, 16.9, 15.13, 14.18, and 13.21 are affected.
Package cri-o1.29 updated to version 1.29.13-alt2 for branch sisyphus_riscv64.
Closed bugs
При удалении пакетов kubernetes/cri-o "ошибка чтения информации о сервисе: Нет такого файла или каталога"
Package python3-module-imageio updated to version 2.37.0-alt2 for branch sisyphus_riscv64.
Closed bugs
подозрительные зависимости
Package mate-file-manager-extensions updated to version 1.28.0-alt2 for branch sisyphus_riscv64.
Closed bugs
Удалить подпакет mate-file-manager-beesu
Package postgresql13 updated to version 13.21-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2025-05405
Уязвимость библиотеки libpq системы управления базами данных PostgreSQL, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-05-09
CVE-2025-4207
Buffer over-read in PostgreSQL GB18030 encoding validation allows a database input provider to achieve temporary denial of service on platforms where a 1-byte over-read can elicit process termination. This affects the database server and also libpq. Versions before PostgreSQL 17.5, 16.9, 15.13, 14.18, and 13.21 are affected.
Package multipath-tools updated to version 0.11.1-alt3 for branch sisyphus_riscv64.
Closed bugs
multipath-tools 0.11.1-alt2 имеет зависимость на systemctl
Package branding-alt-education updated to version 11.0-alt0.8.beta for branch sisyphus_riscv64.
Closed bugs
Убрать зависимость на beesu
Package polymc updated to version 7.0-alt1 for branch sisyphus_riscv64.
Closed bugs
Прошу обновить до 7.0
Package cri-o1.31 updated to version 1.31.7-alt2 for branch sisyphus_riscv64.
Closed bugs
При удалении пакетов kubernetes/cri-o "ошибка чтения информации о сервисе: Нет такого файла или каталога"
Package postgresql16 updated to version 16.9-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2025-05405
Уязвимость библиотеки libpq системы управления базами данных PostgreSQL, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-05-09
CVE-2025-4207
Buffer over-read in PostgreSQL GB18030 encoding validation allows a database input provider to achieve temporary denial of service on platforms where a 1-byte over-read can elicit process termination. This affects the database server and also libpq. Versions before PostgreSQL 17.5, 16.9, 15.13, 14.18, and 13.21 are affected.
Package libhyprutils updated to version 0.7.1-alt1 for branch sisyphus_riscv64.
Closed bugs
hyprutils: too old
Package python3-module-pyopengl updated to version 3.1.9-alt2.1 for branch sisyphus_riscv64.
Closed bugs
python3-module-OpenGL: new version
Package gdm updated to version 48.0-alt2 for branch sisyphus_riscv64.
Closed bugs
gdm: убрать зависимость на PAM(pam_console.so)
Package libfcgi updated to version 2.4.6-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2025-05008
Уязвимость функции ReadParams реализации протокола FastCGI библиотеки fcgi2 (fcgi), позволяющая нарушителю выполнить произвольный код
Modified: 2025-04-24
CVE-2025-23016
FastCGI fcgi2 (aka fcgi) 2.x through 2.4.4 has an integer overflow (and resultant heap-based buffer overflow) via crafted nameLen or valueLen values in data to the IPC socket. This occurs in ReadParams in fcgiapp.c.
- http://www.openwall.com/lists/oss-security/2025/04/23/4
- https://github.com/FastCGI-Archives/fcgi2/issues/67
- https://github.com/FastCGI-Archives/fcgi2/releases/tag/2.4.5
- https://www.synacktiv.com/en/publications/cve-2025-23016-exploiting-the-fastcgi-library
- https://www.synacktiv.com/en/publications/cve-2025-23016-exploiting-the-fastcgi-library
Package apt-indicator updated to version 0.4.2-alt1 for branch sisyphus_riscv64.
Closed bugs
Нельзя выставить дату обновления системы более 3 недель
apt-indicator использует /usr/bin/xdg-su
Package thunderbird updated to version 138.0-alt0.port for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2025-05381
Уязвимость функции Copy as cURL браузера Mozilla Firefox и почтового клиента Thunderbird, позволяющая нарушителю выполнить произвольный код
BDU:2025-05382
Уязвимость интерфейса Storage Access API браузера Mozilla Firefox и почтового клиента Thunderbird, позволяющая нарушителю осуществить CSRF-атаку
BDU:2025-05383
Уязвимость браузера Mozilla Firefox и почтового клиента Thunderbird операционных систем Android, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
BDU:2025-05384
Уязвимость браузеров Mozilla Firefox и Firefox ESR, почтового клиента Thunderbird, связанная с выходом операции за границы буфера в памяти, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Modified: 2025-05-01
CVE-2025-2817
Thunderbird's update mechanism allowed a medium-integrity user process to interfere with the SYSTEM-level updater by manipulating the file-locking behavior. By injecting code into the user-privileged process, an attacker could bypass intended access controls, allowing SYSTEM-level file operations on paths controlled by a non-privileged user and enabling privilege escalation. This vulnerability affects Firefox < 138, Firefox ESR < 128.10, Firefox ESR < 115.23, Thunderbird < 138, and Thunderbird < 128.10.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1917536
- https://www.mozilla.org/security/advisories/mfsa2025-28/
- https://www.mozilla.org/security/advisories/mfsa2025-29/
- https://www.mozilla.org/security/advisories/mfsa2025-30/
- https://www.mozilla.org/security/advisories/mfsa2025-31/
- https://www.mozilla.org/security/advisories/mfsa2025-32/
Modified: 2025-05-09
CVE-2025-4082
Modification of specific WebGL shader attributes could trigger an out-of-bounds read, which, when chained with other vulnerabilities, could be used to escalate privileges. *This bug only affects Thunderbird for macOS. Other versions of Thunderbird are unaffected.* This vulnerability affects Firefox < 138, Firefox ESR < 128.10, Firefox ESR < 115.23, Thunderbird < 138, and Thunderbird < 128.10.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1937097
- https://www.mozilla.org/security/advisories/mfsa2025-28/
- https://www.mozilla.org/security/advisories/mfsa2025-29/
- https://www.mozilla.org/security/advisories/mfsa2025-30/
- https://www.mozilla.org/security/advisories/mfsa2025-31/
- https://www.mozilla.org/security/advisories/mfsa2025-32/
Modified: 2025-05-09
CVE-2025-4083
A process isolation vulnerability in Thunderbird stemmed from improper handling of javascript: URIs, which could allow content to execute in the top-level document's process instead of the intended frame, potentially enabling a sandbox escape. This vulnerability affects Firefox < 138, Firefox ESR < 128.10, Firefox ESR < 115.23, Thunderbird < 138, and Thunderbird < 128.10.
- https://bugzilla.mozilla.org/show_bug.cgi?id=1958350
- https://www.mozilla.org/security/advisories/mfsa2025-28/
- https://www.mozilla.org/security/advisories/mfsa2025-29/
- https://www.mozilla.org/security/advisories/mfsa2025-30/
- https://www.mozilla.org/security/advisories/mfsa2025-31/
- https://www.mozilla.org/security/advisories/mfsa2025-32/
Modified: 2025-05-09
CVE-2025-4085
An attacker with control over a content process could potentially leverage the privileged UITour actor to leak sensitive information or escalate privileges. This vulnerability affects Firefox < 138 and Thunderbird < 138.
Modified: 2025-05-09
CVE-2025-4086
A specially crafted filename containing a large number of encoded newline characters could obscure the file's extension when displayed in the download dialog. *This bug only affects Thunderbird for Android. Other versions of Thunderbird are unaffected.* This vulnerability affects Firefox < 138 and Thunderbird < 138.
Modified: 2025-05-09
CVE-2025-4087
A vulnerability was identified in Thunderbird where XPath parsing could trigger undefined behavior due to missing null checks during attribute access. This could lead to out-of-bounds read access and potentially, memory corruption. This vulnerability affects Firefox < 138, Firefox ESR < 128.10, Thunderbird < 138, and Thunderbird < 128.10.
Modified: 2025-05-09
CVE-2025-4088
A security vulnerability in Thunderbird allowed malicious sites to use redirects to send credentialed requests to arbitrary endpoints on any site that had invoked the Storage Access API. This enabled potential Cross-Site Request Forgery attacks across origins. This vulnerability affects Firefox < 138 and Thunderbird < 138.
Modified: 2025-05-09
CVE-2025-4089
Due to insufficient escaping of special characters in the "copy as cURL" feature, an attacker could trick a user into using this command, potentially leading to local code execution on the user's system. This vulnerability affects Firefox < 138 and Thunderbird < 138.
Modified: 2025-05-09
CVE-2025-4090
A vulnerability existed in Thunderbird for Android where potentially sensitive library locations were logged via Logcat. This vulnerability affects Firefox < 138 and Thunderbird < 138.
Modified: 2025-05-09
CVE-2025-4091
Memory safety bugs present in Firefox 137, Thunderbird 137, Firefox ESR 128.9, and Thunderbird 128.9. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 138, Firefox ESR < 128.10, Thunderbird < 138, and Thunderbird < 128.10.
- Memory safety bugs fixed in Firefox 138, Thunderbird 138, Firefox ESR 128.10, and Thunderbird 128.10
- https://www.mozilla.org/security/advisories/mfsa2025-28/
- https://www.mozilla.org/security/advisories/mfsa2025-29/
- https://www.mozilla.org/security/advisories/mfsa2025-31/
- https://www.mozilla.org/security/advisories/mfsa2025-32/
Modified: 2025-05-09
CVE-2025-4092
Memory safety bugs present in Firefox 137 and Thunderbird 137. Some of these bugs showed evidence of memory corruption and we presume that with enough effort some of these could have been exploited to run arbitrary code. This vulnerability affects Firefox < 138 and Thunderbird < 138.
Closed bugs
Не переведены кнопки диалогового окна Опустошение Уделенные
Package dropbear updated to version 2025.88-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
Modified: 2025-05-18
CVE-2025-47203
dbclient in Dropbear SSH before 2025.88 allows command injection via an untrusted hostname argument, because a shell is used.
- http://www.openwall.com/lists/oss-security/2025/05/09/4
- http://www.openwall.com/lists/oss-security/2025/05/12/6
- http://www.openwall.com/lists/oss-security/2025/05/13/1
- http://www.openwall.com/lists/oss-security/2025/05/13/10
- http://www.openwall.com/lists/oss-security/2025/05/13/3
- https://github.com/mkj/dropbear/blob/master/CHANGES
- https://github.com/mkj/dropbear/blob/master/src/cli-main.c
- https://lists.debian.org/debian-lts-announce/2025/05/msg00020.html
Package etherape updated to version 0.9.20-alt2 for branch sisyphus_riscv64.
Closed bugs
etherape требует beesu, но не использует
Package cri-o1.28 updated to version 1.28.11-alt2 for branch sisyphus_riscv64.
Closed bugs
При удалении пакетов kubernetes/cri-o "ошибка чтения информации о сервисе: Нет такого файла или каталога"
Package zoneminder updated to version 1.37.61-alt15.gitcc9bbb000 for branch sisyphus_riscv64.
Closed bugs
zoneminder не конвертирует видео в формат 3gp
Package python3-module-pyside6 updated to version 6.8.2.1-alt0.2 for branch sisyphus_riscv64.
Closed bugs
Отсутствует скрипт pyside6-uic
Package postgresql17 updated to version 17.5-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2025-05405
Уязвимость библиотеки libpq системы управления базами данных PostgreSQL, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-05-09
CVE-2025-4207
Buffer over-read in PostgreSQL GB18030 encoding validation allows a database input provider to achieve temporary denial of service on platforms where a 1-byte over-read can elicit process termination. This affects the database server and also libpq. Versions before PostgreSQL 17.5, 16.9, 15.13, 14.18, and 13.21 are affected.
Package cri-o1.26 updated to version 1.26.4-alt5 for branch sisyphus_riscv64.
Closed bugs
При удалении пакетов kubernetes/cri-o "ошибка чтения информации о сервисе: Нет такого файла или каталога"
Package mypaint updated to version 2.0.1-alt2.1 for branch sisyphus_riscv64.
Closed bugs
Не запускается.
Package freecad updated to version 1.0.0-alt4 for branch sisyphus_riscv64.
Closed bugs
FreeCAD 1.0.0 не работает с модулями
Ошибка при экспорте в форматы OpenSCAD Format, OpenSCAD CSG Format
Ошибка при выборе верстака OpenSCAD
Package audacity updated to version 3.7.3-alt2 for branch sisyphus_riscv64.
Closed bugs
/usr/bin/audacity is huge
Package alterator-wizardface updated to version 2.3-alt2 for branch sisyphus_riscv64.
Closed bugs
Удалить подпакет alterator-wizardface-usermode
Package postgresql14 updated to version 14.18-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2025-05405
Уязвимость библиотеки libpq системы управления базами данных PostgreSQL, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-05-09
CVE-2025-4207
Buffer over-read in PostgreSQL GB18030 encoding validation allows a database input provider to achieve temporary denial of service on platforms where a 1-byte over-read can elicit process termination. This affects the database server and also libpq. Versions before PostgreSQL 17.5, 16.9, 15.13, 14.18, and 13.21 are affected.
Package sddm updated to version 0.21.0-alt4 for branch sisyphus_riscv64.
Closed bugs
sddm: убрать зависимость на PAM(pam_console.so)
Package altmediawriter updated to version 1.0.9-alt1 for branch sisyphus_riscv64.
Closed bugs
Кнопка назад нажимается только с 3-го раза
Package 0ad updated to version 0.27.0-alt2 for branch sisyphus_riscv64.
Closed bugs
0ad: port to mozjs128
Package python3-module-django updated to version 5.2.1-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
CVE-2025-32873
An issue was discovered in Django 4.2 before 4.2.21, 5.1 before 5.1.9, and 5.2 before 5.2.1. The django.utils.html.strip_tags() function is vulnerable to a potential denial-of-service (slow performance) when processing inputs containing large sequences of incomplete HTML tags. The template filter striptags is also vulnerable, because it is built on top of strip_tags().
Package taplo updated to version 0.9.3-alt4 for branch sisyphus_riscv64.
Closed bugs
Отсутсвует LSP при сборке.
Package lightdm updated to version 1.32.0-alt10 for branch sisyphus_riscv64.
Closed bugs
lightdm: убрать зависимость на PAM(pam_console.so)
Package girar-summary updated to version 1.11-alt1 for branch sisyphus_riscv64.
Closed bugs
Не работает команда girar-summary-task
Package cri-o1.27 updated to version 1.27.8-alt2 for branch sisyphus_riscv64.
Closed bugs
При удалении пакетов kubernetes/cri-o "ошибка чтения информации о сервисе: Нет такого файла или каталога"
Package dropbear-musl updated to version 2025.88-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
Modified: 2025-05-18
CVE-2025-47203
dbclient in Dropbear SSH before 2025.88 allows command injection via an untrusted hostname argument, because a shell is used.
- http://www.openwall.com/lists/oss-security/2025/05/09/4
- http://www.openwall.com/lists/oss-security/2025/05/12/6
- http://www.openwall.com/lists/oss-security/2025/05/13/1
- http://www.openwall.com/lists/oss-security/2025/05/13/10
- http://www.openwall.com/lists/oss-security/2025/05/13/3
- https://github.com/mkj/dropbear/blob/master/CHANGES
- https://github.com/mkj/dropbear/blob/master/src/cli-main.c
- https://lists.debian.org/debian-lts-announce/2025/05/msg00020.html
Package screen updated to version 4.9.1-alt2 for branch sisyphus_riscv64.
Closed vulnerabilities
Modified: 2025-05-27
CVE-2025-46802
For a short time they PTY is set to mode 666, allowing any user on the system to connect to the screen session.
Modified: 2025-05-27
CVE-2025-46804
A minor information leak when running Screen with setuid-root privileges allows unprivileged users to deduce information about a path that would otherwise not be available. Affected are older Screen versions, as well as version 5.0.0.
CVE-2025-46805
Screen version 5.0.0 and older version 4 releases have a TOCTOU race potentially allowing to send SIGHUP, SIGCONT to privileged processes when installed setuid-root.