ALT-BU-2025-8151-1
Branch sisyphus_riscv64 update bulletin.
Package lsb-release updated to version 3.3-alt2 for branch sisyphus_riscv64.
Closed bugs
Обновить пакет lsb-release
Package branding-alt-sisyphus updated to version 20250612-alt1 for branch sisyphus_riscv64.
Closed bugs
Неправильная иконка во время установки
Package assimp updated to version 6.0.2-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2025-02258
Уязвимость функции SkipSpacesAndLineEnd кроссплатформенной библиотеки импорта 3D-моделей, Assimp (Open Asset Import Library), позволяющая нарушителю выполнить произвольный код
BDU:2025-03337
Уязвимость функции Assimp::SplitLargeMeshesProcess_Triangle::UpdateNode() библиотеки импорта 3D-моделей Open Asset Import Library (Assimp), позволяющая нарушителю вызвать отказ в обслуживании
BDU:2025-03338
Уязвимость функции OpenDDLParser::parseStructure() библиотеки импорта 3D-моделей Open Asset Import Library (Assimp), позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-05-27
CVE-2024-46632
Assimp v5.4.3 is vulnerable to Buffer Overflow via the MD5Importer::LoadMD5MeshFile function.
Modified: 2024-11-21
CVE-2024-48423
An issue in assimp v.5.4.3 allows a local attacker to execute arbitrary code via the CallbackToLogRedirector function within the Assimp library.
Modified: 2025-06-10
CVE-2024-48424
A heap-buffer-overflow vulnerability has been identified in the OpenDDLParser::parseStructure function within the Assimp library, specifically during the processing of OpenGEX files.
Modified: 2025-06-10
CVE-2024-48425
A segmentation fault (SEGV) was detected in the Assimp::SplitLargeMeshesProcess_Triangle::UpdateNode function within the Assimp library during fuzz testing using AddressSanitizer. The crash occurs due to a read access violation at address 0x000000000460, which points to the zero page, indicating a null or invalid pointer dereference.
Modified: 2025-05-28
CVE-2024-48426
A segmentation fault (SEGV) was detected in the SortByPTypeProcess::Execute function in the Assimp library during fuzz testing with AddressSanitizer. The crash occurred due to a read access to an invalid memory address (0x1000c9714971).
Modified: 2025-06-13
CVE-2024-53425
A heap-buffer-overflow vulnerability was discovered in the SkipSpacesAndLineEnd function in Assimp v5.4.3. This issue occurs when processing certain malformed MD5 model files, leading to an out-of-bounds read and potential application crash.
Modified: 2025-05-28
CVE-2025-2151
A vulnerability classified as critical was found in Open Asset Import Library Assimp 5.4.3. This vulnerability affects the function Assimp::GetNextLine in the library ParsingUtils.h of the component File Handler. The manipulation leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
- https://github.com/assimp/assimp/issues/6016
- https://github.com/assimp/assimp/issues/6026
- https://github.com/sae-as-me/Crashes/raw/refs/heads/main/assimp/assimp_crash_1
- https://vuldb.com/?ctiid.299062
- https://vuldb.com/?id.299062
- https://vuldb.com/?submit.510582
- https://github.com/assimp/assimp/issues/6016
- https://github.com/assimp/assimp/issues/6026
Modified: 2025-03-13
CVE-2025-2152
A vulnerability, which was classified as critical, has been found in Open Asset Import Library Assimp 5.4.3. This issue affects the function Assimp::BaseImporter::ConvertToUTF8 of the file BaseImporter.cpp of the component File Handler. The manipulation leads to heap-based buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used.
Modified: 2025-07-17
CVE-2025-2750
A vulnerability, which was classified as critical, was found in Open Asset Import Library Assimp 5.4.3. This affects the function Assimp::CSMImporter::InternReadFile of the file code/AssetLib/CSM/CSMLoader.cpp of the component CSM File Handler. The manipulation leads to out-of-bounds write. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used.
Modified: 2025-07-17
CVE-2025-2751
A vulnerability has been found in Open Asset Import Library Assimp 5.4.3 and classified as problematic. This vulnerability affects the function Assimp::CSMImporter::InternReadFile of the file code/AssetLib/CSM/CSMLoader.cpp of the component CSM File Handler. The manipulation of the argument na leads to out-of-bounds read. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Modified: 2025-07-17
CVE-2025-2757
A vulnerability classified as critical was found in Open Asset Import Library Assimp 5.4.3. This vulnerability affects the function AI_MD5_PARSE_STRING_IN_QUOTATION of the file code/AssetLib/MD5/MD5Parser.cpp of the component MD5 File Handler. The manipulation of the argument data leads to heap-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
Modified: 2025-04-17
CVE-2025-3015
A vulnerability classified as critical has been found in Open Asset Import Library Assimp 5.4.3. This affects the function Assimp::ASEImporter::BuildUniqueRepresentation of the file code/AssetLib/ASE/ASELoader.cpp of the component ASE File Handler. The manipulation of the argument mIndices leads to out-of-bounds read. It is possible to initiate the attack remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 6.0 is able to address this issue. The patch is named 7c705fde418d68cca4e8eff56be01b2617b0d6fe. It is recommended to apply a patch to fix this issue.
- https://github.com/assimp/assimp/commit/7c705fde418d68cca4e8eff56be01b2617b0d6fe
- https://github.com/assimp/assimp/issues/6021
- https://github.com/assimp/assimp/issues/6021#issue-2877378829
- https://github.com/assimp/assimp/pull/6045
- https://vuldb.com/?ctiid.302067
- https://vuldb.com/?id.302067
- https://vuldb.com/?submit.524589
- https://github.com/assimp/assimp/issues/6021
Modified: 2025-04-17
CVE-2025-3016
A vulnerability classified as problematic was found in Open Asset Import Library Assimp 5.4.3. This vulnerability affects the function Assimp::MDLImporter::ParseTextureColorData of the file code/AssetLib/MDL/MDLMaterialLoader.cpp of the component MDL File Handler. The manipulation of the argument mWidth/mHeight leads to resource consumption. The attack can be initiated remotely. Upgrading to version 6.0 is able to address this issue. The name of the patch is 5d2a7482312db2e866439a8c05a07ce1e718bed1. It is recommended to apply a patch to fix this issue.
- https://github.com/assimp/assimp/commit/5d2a7482312db2e866439a8c05a07ce1e718bed1
- https://github.com/assimp/assimp/issues/6022
- https://github.com/assimp/assimp/pull/6046
- https://vuldb.com/?ctiid.302068
- https://vuldb.com/?id.302068
- https://vuldb.com/?submit.524593
- https://github.com/assimp/assimp/issues/6022
Modified: 2025-07-17
CVE-2025-3158
A vulnerability, which was classified as critical, has been found in Open Asset Import Library Assimp 5.4.3. Affected by this issue is the function Assimp::LWO::AnimResolver::UpdateAnimRangeSetup of the file code/AssetLib/LWO/LWOAnimation.cpp of the component LWO File Handler. The manipulation leads to heap-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used.
Modified: 2025-05-28
CVE-2025-3160
A vulnerability has been found in Open Asset Import Library Assimp 5.4.3 and classified as problematic. This vulnerability affects the function Assimp::SceneCombiner::AddNodeHashes of the file code/Common/SceneCombiner.cpp of the component File Handler. The manipulation leads to out-of-bounds read. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The patch is identified as a0993658f40d8e13ff5823990c30b43c82a5daf0. It is recommended to apply a patch to fix this issue.
- https://github.com/assimp/assimp/commit/a0993658f40d8e13ff5823990c30b43c82a5daf0
- https://github.com/assimp/assimp/issues/6025
- https://github.com/assimp/assimp/issues/6025#issue-2877385383
- https://github.com/assimp/assimp/pull/6049
- https://vuldb.com/?ctiid.303106
- https://vuldb.com/?id.303106
- https://vuldb.com/?submit.542248
- https://github.com/assimp/assimp/issues/6025#issue-2877385383
Modified: 2025-06-03
CVE-2025-5165
A vulnerability was found in Open Asset Import Library Assimp 5.4.3 and classified as problematic. This issue affects the function MDCImporter::ValidateSurfaceHeader of the file assimp/code/AssetLib/MDC/MDCLoader.cpp. The manipulation of the argument pcSurface2 leads to out-of-bounds read. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used. The project decided to collect all Fuzzer bugs in a main-issue to address them in the future.
Modified: 2025-06-03
CVE-2025-5166
A vulnerability was found in Open Asset Import Library Assimp 5.4.3. It has been classified as problematic. Affected is the function MDCImporter::InternReadFile of the file assimp/code/AssetLib/MDC/MDCLoader.cpp of the component MDC File Parser. The manipulation of the argument pcVerts leads to out-of-bounds read. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used. The project decided to collect all Fuzzer bugs in a main-issue to address them in the future.
Modified: 2025-06-03
CVE-2025-5167
A vulnerability was found in Open Asset Import Library Assimp 5.4.3. It has been declared as problematic. Affected by this vulnerability is the function LWOImporter::GetS0 in the library assimp/code/AssetLib/LWO/LWOLoader.h. The manipulation of the argument out leads to out-of-bounds read. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. The project decided to collect all Fuzzer bugs in a main-issue to address them in the future.
Modified: 2025-06-03
CVE-2025-5168
A vulnerability was found in Open Asset Import Library Assimp 5.4.3. It has been rated as problematic. Affected by this issue is the function MDLImporter::ImportUVCoordinate_3DGS_MDL345 of the file assimp/code/AssetLib/MDL/MDLLoader.cpp. The manipulation of the argument iIndex leads to out-of-bounds read. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The project decided to collect all Fuzzer bugs in a main-issue to address them in the future.
Modified: 2025-06-03
CVE-2025-5169
A vulnerability classified as problematic has been found in Open Asset Import Library Assimp 5.4.3. This affects the function MDLImporter::InternReadFile_3DGS_MDL345 of the file assimp/code/AssetLib/MDL/MDLLoader.cpp. The manipulation leads to out-of-bounds read. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. The project decided to collect all Fuzzer bugs in a main-issue to address them in the future.
Package yelp-xsl updated to version 42.4-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2025-03944
Уязвимость справочной системы Yelp, связанная с включением функций из недостоверной контролируемой области при обработке документов с использованием схемы ghelp, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и выполнить произвольный код
Modified: 2025-08-12
CVE-2025-3155
A flaw was found in Yelp. The Gnome user help application allows the help document to execute arbitrary scripts. This vulnerability allows malicious users to input help documents, which may exfiltrate user files to an external environment.
- https://access.redhat.com/errata/RHSA-2025:4450
- https://access.redhat.com/errata/RHSA-2025:4451
- https://access.redhat.com/errata/RHSA-2025:4455
- https://access.redhat.com/errata/RHSA-2025:4456
- https://access.redhat.com/errata/RHSA-2025:4457
- https://access.redhat.com/errata/RHSA-2025:4505
- https://access.redhat.com/errata/RHSA-2025:4532
- https://access.redhat.com/errata/RHSA-2025:7430
- https://access.redhat.com/errata/RHSA-2025:7569
- https://access.redhat.com/security/cve/CVE-2025-3155
- https://bugzilla.redhat.com/show_bug.cgi?id=2357091
- http://www.openwall.com/lists/oss-security/2025/04/04/1
- https://lists.debian.org/debian-lts-announce/2025/05/msg00036.html
- https://lists.debian.org/debian-lts-announce/2025/05/msg00037.html
- https://gist.github.com/parrot409/e970b155358d45b298d7024edd9b17f2
Package yelp updated to version 42.3-alt1 for branch sisyphus_riscv64.
Closed vulnerabilities
BDU:2025-03944
Уязвимость справочной системы Yelp, связанная с включением функций из недостоверной контролируемой области при обработке документов с использованием схемы ghelp, позволяющая нарушителю получить несанкционированный доступ к защищаемой информации и выполнить произвольный код
Modified: 2025-08-12
CVE-2025-3155
A flaw was found in Yelp. The Gnome user help application allows the help document to execute arbitrary scripts. This vulnerability allows malicious users to input help documents, which may exfiltrate user files to an external environment.
- https://access.redhat.com/errata/RHSA-2025:4450
- https://access.redhat.com/errata/RHSA-2025:4451
- https://access.redhat.com/errata/RHSA-2025:4455
- https://access.redhat.com/errata/RHSA-2025:4456
- https://access.redhat.com/errata/RHSA-2025:4457
- https://access.redhat.com/errata/RHSA-2025:4505
- https://access.redhat.com/errata/RHSA-2025:4532
- https://access.redhat.com/errata/RHSA-2025:7430
- https://access.redhat.com/errata/RHSA-2025:7569
- https://access.redhat.com/security/cve/CVE-2025-3155
- https://bugzilla.redhat.com/show_bug.cgi?id=2357091
- http://www.openwall.com/lists/oss-security/2025/04/04/1
- https://lists.debian.org/debian-lts-announce/2025/05/msg00036.html
- https://lists.debian.org/debian-lts-announce/2025/05/msg00037.html
- https://gist.github.com/parrot409/e970b155358d45b298d7024edd9b17f2
Package konsole updated to version 25.04.2-alt2 for branch sisyphus_riscv64.
Closed bugs
Артефакты на экране при использовании дробного масштабирования