ALT-BU-2025-8044-2
Branch sisyphus update bulletin.
Package kernel-image-pine updated to version 6.12.33-alt1 for branch sisyphus in task 386892.
Closed vulnerabilities
Modified: 2026-03-10
BDU:2025-08271
Уязвимость функции tb_cfg_request_dequeue() модуля drivers/thunderbolt/ctl.c ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2026-04-13
BDU:2025-10560
Уязвимость функции jsm_uart_port_init компонента serial ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2026-03-04
BDU:2025-11985
Уязвимость ядра операционной системы Linux, связанная с недостаточной проверкой подлинности данных, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2026-03-04
BDU:2025-12331
Уязвимость компонента f2fs ядра операционной системы Linux, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-11-03
CVE-2025-22122
In the Linux kernel, the following vulnerability has been resolved: block: fix adding folio to bio >4GB folio is possible on some ARCHs, such as aarch64, 16GB hugepage is supported, then 'offset' of folio can't be held in 'unsigned int', cause warning in bio_add_folio_nofail() and IO failure. Fix it by adjusting 'page' & trimming 'offset' so that `->bi_offset` won't be overflow, and folio can be added to bio successfully.
Modified: 2025-11-03
CVE-2025-22123
In the Linux kernel, the following vulnerability has been resolved:
f2fs: fix to avoid accessing uninitialized curseg
syzbot reports a f2fs bug as below:
F2FS-fs (loop3): Stopped filesystem due to reason: 7
kworker/u8:7: attempt to access beyond end of device
BUG: unable to handle page fault for address: ffffed1604ea3dfa
RIP: 0010:get_ckpt_valid_blocks fs/f2fs/segment.h:361 [inline]
RIP: 0010:has_curseg_enough_space fs/f2fs/segment.h:570 [inline]
RIP: 0010:__get_secs_required fs/f2fs/segment.h:620 [inline]
RIP: 0010:has_not_enough_free_secs fs/f2fs/segment.h:633 [inline]
RIP: 0010:has_enough_free_secs+0x575/0x1660 fs/f2fs/segment.h:649
Modified: 2025-12-18
CVE-2025-38174
In the Linux kernel, the following vulnerability has been resolved:
thunderbolt: Do not double dequeue a configuration request
Some of our devices crash in tb_cfg_request_dequeue():
general protection fault, probably for non-canonical address 0xdead000000000122
CPU: 6 PID: 91007 Comm: kworker/6:2 Tainted: G U W 6.6.65
RIP: 0010:tb_cfg_request_dequeue+0x2d/0xa0
Call Trace:
- https://git.kernel.org/stable/c/0771bcbe2f6e5d5f263cf466efe571d2754a46da
- https://git.kernel.org/stable/c/0a3011d47dbc92a33621861c423cb64833d7fe57
- https://git.kernel.org/stable/c/0f73628e9da1ee39daf5f188190cdbaee5e0c98c
- https://git.kernel.org/stable/c/2f62eda4d974c26bc595425eafd429067541f2c9
- https://git.kernel.org/stable/c/5a057f261539720165d03d85024da2b52e67f63d
- https://git.kernel.org/stable/c/85286e634ebbaf9c0fb1cdf580add2f33fc7628c
- https://git.kernel.org/stable/c/cdb4feab2f39e75a66239e3a112beced279612a8
- https://git.kernel.org/stable/c/e49e994cd83705f7ca30eda1e304abddfd96a37a
- https://git.kernel.org/stable/c/eb2d5e794fb966b3ef8bde99eb8561446a53509f
- https://lists.debian.org/debian-lts-announce/2025/10/msg00007.html
- https://lists.debian.org/debian-lts-announce/2025/10/msg00008.html
Modified: 2025-11-18
CVE-2025-38265
In the Linux kernel, the following vulnerability has been resolved:
serial: jsm: fix NPE during jsm_uart_port_init
No device was set which caused serial_base_ctrl_add to crash.
BUG: kernel NULL pointer dereference, address: 0000000000000050
Oops: Oops: 0000 [#1] PREEMPT SMP NOPTI
CPU: 16 UID: 0 PID: 368 Comm: (udev-worker) Not tainted 6.12.25-amd64 #1 Debian 6.12.25-1
RIP: 0010:serial_base_ctrl_add+0x96/0x120
Call Trace:
- https://git.kernel.org/stable/c/3258d7ff8ebfa451426662b23e8f2b51b129afe1
- https://git.kernel.org/stable/c/985961dd2688a527a4847300d41beaad475ab7af
- https://git.kernel.org/stable/c/a14c0d2eb3f0b1836fdec22908b87ecffd2ac844
- https://git.kernel.org/stable/c/abaecb2a4ad021c2f2426e9b2a9c020aef57aca9
- https://git.kernel.org/stable/c/e3975aa899c0a3bbc10d035e699b142cd1373a71
Package python3-module-requests updated to version 2.32.4-alt1 for branch sisyphus in task 386815.
Closed vulnerabilities
Modified: 2026-04-20
BDU:2025-08576
Уязвимость библиотеки HTTP запросов языка программирования Python Requests, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации
Modified: 2026-04-15
CVE-2024-47081
Requests is a HTTP library. Due to a URL parsing issue, Requests releases prior to 2.32.4 may leak .netrc credentials to third parties for specific maliciously-crafted URLs. Users should upgrade to version 2.32.4 to receive a fix. For older versions of Requests, use of the .netrc file can be disabled with `trust_env=False` on one's Requests Session.
- https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef
- https://github.com/psf/requests/pull/6965
- https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7
- https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env
- https://seclists.org/fulldisclosure/2025/Jun/2
- http://seclists.org/fulldisclosure/2025/Jun/2
- http://www.openwall.com/lists/oss-security/2025/06/03/11
- http://www.openwall.com/lists/oss-security/2025/06/03/9
- http://www.openwall.com/lists/oss-security/2025/06/04/1
- http://www.openwall.com/lists/oss-security/2025/06/04/6
GHSA-9hjg-9r4m-mvj7
Requests vulnerable to .netrc credentials leak via malicious URLs
- https://github.com/psf/requests/security/advisories/GHSA-9hjg-9r4m-mvj7
- https://nvd.nist.gov/vuln/detail/CVE-2024-47081
- https://github.com/psf/requests/pull/6965
- https://github.com/psf/requests/commit/96ba401c1296ab1dda74a2365ef36d88f7d144ef
- https://github.com/psf/requests
- https://requests.readthedocs.io/en/latest/api/#requests.Session.trust_env
- https://seclists.org/fulldisclosure/2025/Jun/2
- http://seclists.org/fulldisclosure/2025/Jun/2
- http://www.openwall.com/lists/oss-security/2025/06/03/11
- http://www.openwall.com/lists/oss-security/2025/06/03/9
- http://www.openwall.com/lists/oss-security/2025/06/04/1
- http://www.openwall.com/lists/oss-security/2025/06/04/6
Closed bugs
grub-mkconfig некорректно определяет доступность раздела /boot на запись
Нет поддержки zfs
Добавить переводы новых пунктов меню iso образов
Closed bugs
Ошибки /boot/efi/EFI/BOOT/grub.cfg: invalid pe header
Closed bugs
Не запускается ctwf из меню приложений (несоответствие Exec=python3 /usr/bin/ctwf с /usr/bin/cttestB)
Closed vulnerabilities
Modified: 2026-03-12
BDU:2025-01120
Уязвимость функции assert системной библиотеки GNU C Library, связанная с некорректными вычислениями размера выделяемого буфера, позволяющая нарушителю оказать воздействие на доступность защищаемой информации
Modified: 2026-04-15
CVE-2025-0395
When the assert() function in the GNU C Library versions 2.13 to 2.40 fails, it does not allocate enough space for the assertion failure message string and size information, which may lead to a buffer overflow if the message string size aligns to page size.
- https://sourceware.org/bugzilla/show_bug.cgi?id=32582
- https://sourceware.org/git/?p=glibc.git;a=blob;f=advisories/GLIBC-SA-2025-0001
- https://sourceware.org/pipermail/libc-announce/2025/000044.html
- https://www.openwall.com/lists/oss-security/2025/01/22/4
- http://www.openwall.com/lists/oss-security/2025/01/22/4
- http://www.openwall.com/lists/oss-security/2025/01/23/2
- http://www.openwall.com/lists/oss-security/2025/04/13/1
- http://www.openwall.com/lists/oss-security/2025/04/24/7
- https://lists.debian.org/debian-lts-announce/2025/04/msg00039.html
- https://security.netapp.com/advisory/ntap-20250228-0006/
Package thunderbird updated to version 139.0.2-alt1 for branch sisyphus in task 386946.
Closed vulnerabilities
Modified: 2026-03-04
BDU:2025-08579
Уязвимость почтового клиента Thunderbird, связанная с недостаточной проверкой входных данных, позволяющая нарушителю получить доступ к потенциально конфиденциальной информации
Modified: 2026-04-13
CVE-2025-5986
A crafted HTML email using mailbox:/// links can trigger automatic, unsolicited downloads of .pdf files to the user's desktop or home directory without prompting, even if auto-saving is disabled. This behavior can be abused to fill the disk with garbage data (e.g. using /dev/urandom on Linux) or to leak Windows credentials via SMB links when the email is viewed in HTML mode. While user interaction is required to download the .pdf file, visual obfuscation can conceal the download trigger. Viewing the email in HTML mode is enough to load external content. This vulnerability was fixed in Thunderbird 128.11.1 and Thunderbird 139.0.2.
