ALT-BU-2025-9195-1
Branch sisyphus_e2k update bulletin.
Package protobuf updated to version 3.25.5-alt6 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2024-07527
Уязвимость библиотеки среды выполнения Java Protocol Buffers protobuf-java, связанная с недостаточной проверкой входных данных, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2025-09-08
CVE-2024-7254
Any project that parses untrusted Protocol Buffers data containing an arbitrary number of nested groups / series of SGROUP tags can corrupted by exceeding the stack limit i.e. StackOverflow. Parsing nested groups as unknown fields with DiscardUnknownFieldsParser or Java Protobuf Lite parser, or against Protobuf map fields, creates unbounded recursions that can be abused by an attacker.
Package pipewire updated to version 1.4.5-alt1 for branch sisyphus_e2k.
Closed bugs
Низкая частота кадров по-умолчанию
pipewire: Отсутствие звука при воспроизведении видео в браузерах Яндекс браузер и Chromium установленных через Flatpak
Package grpc updated to version 1.70.1-alt1.1 for branch sisyphus_e2k.
Closed vulnerabilities
BDU:2023-05360
Уязвимость системы удалённого вызова процедур Google gRPC, связанная с недостаточной проверкой вводимых данных и некорректной реализацией функций, позволяющая нарушителю вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2023-32731
When gRPC HTTP2 stack raised a header size exceeded error, it skipped parsing the rest of the HPACK frame. This caused any HPACK table mutations to also be skipped, resulting in a desynchronization of HPACK tables between sender and receiver. If leveraged, say, between a proxy and a backend, this could lead to requests from the proxy being interpreted as containing headers from different proxy clients - leading to an information leak that can be used for privilege escalation or data exfiltration. We recommend upgrading beyond the commit contained in https://github.com/grpc/grpc/pull/33005 https://github.com/grpc/grpc/pull/33005
Package libabseil-cpp updated to version 20250127.1-alt2 for branch sisyphus_e2k.
Closed vulnerabilities
Modified: 2025-07-30
CVE-2025-0838
There exists a heap buffer overflow vulnerable in Abseil-cpp. The sized constructors, reserve(), and rehash() methods of absl::{flat,node}hash{set,map} did not impose an upper bound on their size argument. As a result, it was possible for a caller to pass a very large size that would cause an integer overflow when computing the size of the container's backing store, and a subsequent out-of-bounds memory write. Subsequent accesses to the container might also access out-of-bounds memory. We recommend upgrading past commit 5a0e2cb5e3958dd90bb8569a2766622cb74d90c1