ALT-BU-2025-6863-1
Branch sisyphus_riscv64 update bulletin.
Package postgresql16-pgpool-II updated to version 4.6.1-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
CVE-2025-46801
Pgpool-II provided by PgPool Global Development Group contains an authentication bypass by primary weakness vulnerability. if the vulnerability is exploited, an attacker may be able to log in to the system as an arbitrary user, allowing them to read or tamper with data in the database, and/or disable the database.
Package postgresql13-pgpool-II updated to version 4.6.1-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
CVE-2025-46801
Pgpool-II provided by PgPool Global Development Group contains an authentication bypass by primary weakness vulnerability. if the vulnerability is exploited, an attacker may be able to log in to the system as an arbitrary user, allowing them to read or tamper with data in the database, and/or disable the database.
Package assimp updated to version 5.4.3-alt2 for branch sisyphus_riscv64.
Closed vulnerabilities
Modified: 2025-05-28
CVE-2025-3196
A vulnerability, which was classified as critical, was found in Open Asset Import Library Assimp 5.4.3. Affected is the function Assimp::MD2Importer::InternReadFile in the library code/AssetLib/MD2/MD2Loader.cpp of the component Malformed File Handler. The manipulation of the argument Name leads to stack-based buffer overflow. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component.
- https://github.com/assimp/assimp/issues/6069
- https://github.com/assimp/assimp/issues/6069
- https://github.com/assimp/assimp/issues/6069#issuecomment-2763273425
- https://github.com/assimp/assimp/milestone/11
- VDB-303150 | CTI Indicators (IOB, IOC, IOA)
- VDB-303150 | Open Asset Import Library Assimp Malformed File MD2Loader.cpp InternReadFile stack-based overflow
- Submit #545368 | Open Asset Import Library Assimp 5.4.3 Stack-based Buffer Overflow
Package postgresql15-pgpool-II updated to version 4.6.1-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
CVE-2025-46801
Pgpool-II provided by PgPool Global Development Group contains an authentication bypass by primary weakness vulnerability. if the vulnerability is exploited, an attacker may be able to log in to the system as an arbitrary user, allowing them to read or tamper with data in the database, and/or disable the database.
Package apt updated to version 0.5.15lorg2-alt93 for branch sisyphus_riscv64.
Closed bugs
^(NVIDIA_)?(kernel|alsa)[0-9]*(-adv|-linus)?($|-up|-smp|-secure|-custom|-enterprise|-BOOT|-tape|-aureal)
Package xorg-server updated to version 21.1.16-alt2 for branch sisyphus_riscv64.
Closed bugs
xorg-server: удалить зависимости на /etc/security/console.apps и PAM(pam_console.so)
Package gnome-shell-extension-clipboard-indicator updated to version 68-alt3 for branch sisyphus_riscv64.
Closed bugs
В настройках расширения появился неработающий пункт "Уведомление при копировании".
Package postgresql17-pgpool-II updated to version 4.6.1-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
CVE-2025-46801
Pgpool-II provided by PgPool Global Development Group contains an authentication bypass by primary weakness vulnerability. if the vulnerability is exploited, an attacker may be able to log in to the system as an arbitrary user, allowing them to read or tamper with data in the database, and/or disable the database.
Package libarchive updated to version 3.7.9-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2025-05203
Уязвимость файла bsdunzip.c библиотеки Libarchive, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-04-14
CVE-2024-48615
Null Pointer Dereference vulnerability in libarchive 3.7.6 and earlier when running program bsdtar in function header_pax_extension at rchive_read_support_format_tar.c:1844:8.
Modified: 2025-03-25
CVE-2025-1632
A vulnerability was found in libarchive up to 3.7.7. It has been classified as problematic. This affects the function list of the file bsdunzip.c. The manipulation leads to null pointer dereference. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
Package ghostscript updated to version 10.05.1-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2025-03704
Уязвимость функции Type 4 файла pdf/pdf_func.c набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, позволяющая нарушителю выполнить произвольный код
BDU:2025-03705
Уязвимость файла contrib/japanese/gdevnpdl.c компонента NPDL Device набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, позволяющая нарушителю выполнить произвольный код
BDU:2025-03706
Уязвимость файла psi/zbfont.c набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, позволяющая нарушителю выполнить произвольный код
BDU:2025-03707
Уязвимость функции bj10v_print_page() файла contrib/japanese/gdev10v.c компонента BJ10V Device набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
BDU:2025-03708
Уязвимость функции gp_open_scratch_file_impl() файлов base/gp_mswin.c и base/winrtsup.cpp набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, позволяющая нарушителю читать произвольные файлы
BDU:2025-03710
Уязвимость файлов base/write_t1.c и psi/zfapi.c компонента DollarBlend набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, позволяющая нарушителю выполнить произвольный код
BDU:2025-03711
Уязвимость функции txt_get_unicode() файла devices/vector/doc_common.c набора программного обеспечения для обработки, преобразования и генерации документов Ghostscript, позволяющая нарушителю выполнить произвольный код
Modified: 2025-04-01
CVE-2025-27830
An issue was discovered in Artifex Ghostscript before 10.05.0. A buffer overflow occurs during serialization of DollarBlend in a font, for base/write_t1.c and psi/zfapi.c.
Modified: 2025-04-01
CVE-2025-27831
An issue was discovered in Artifex Ghostscript before 10.05.0. The DOCXWRITE TXTWRITE device has a text buffer overflow via long characters to devices/vector/doc_common.c.
Modified: 2025-04-01
CVE-2025-27832
An issue was discovered in Artifex Ghostscript before 10.05.0. The NPDL device has a Compression buffer overflow for contrib/japanese/gdevnpdl.c.
Modified: 2025-04-01
CVE-2025-27833
An issue was discovered in Artifex Ghostscript before 10.05.0. A buffer overflow occurs for a long TTF font name to pdf/pdf_fmap.c.
Modified: 2025-04-01
CVE-2025-27834
An issue was discovered in Artifex Ghostscript before 10.05.0. A buffer overflow occurs via an oversized Type 4 function in a PDF document to pdf/pdf_func.c.
Modified: 2025-04-01
CVE-2025-27835
An issue was discovered in Artifex Ghostscript before 10.05.0. A buffer overflow occurs when converting glyphs to Unicode in psi/zbfont.c.
Modified: 2025-04-01
CVE-2025-27836
An issue was discovered in Artifex Ghostscript before 10.05.0. The BJ10V device has a Print buffer overflow in contrib/japanese/gdev10v.c.
Modified: 2025-04-01
CVE-2025-27837
An issue was discovered in Artifex Ghostscript before 10.05.0. Access to arbitrary files can occur through a truncated path with invalid UTF-8 characters, for base/gp_mswin.c and base/winrtsup.cpp.
Package postgresql14-pgpool-II updated to version 4.6.1-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
CVE-2025-46801
Pgpool-II provided by PgPool Global Development Group contains an authentication bypass by primary weakness vulnerability. if the vulnerability is exploited, an attacker may be able to log in to the system as an arbitrary user, allowing them to read or tamper with data in the database, and/or disable the database.
Package xdg-utils updated to version 1.2.1-alt4 for branch sisyphus_riscv64.
Closed bugs
Исключить xdg-su