ALT-BU-2025-9849-1
Branch p11 update bulletin.
Package python3-module-pyopengl updated to version 3.1.9-alt2.1 for branch p11 in task 384856.
Closed bugs
python3-module-OpenGL: new version
Closed bugs
Обновить glances до актуальной версии
Package python3-module-tox updated to version 4.26.0-alt1 for branch p11 in task 384856.
Closed bugs
Обновить tox до приемлемой версии
Package librum-reader updated to version 0.12.2-alt3 for branch p11 in task 384856.
Closed bugs
Requires попали в %description
Package python3-module-notebook updated to version 7.4.3-alt1 for branch p11 in task 384856.
Closed vulnerabilities
Modified: 2024-08-30
CVE-2024-43805
jupyterlab is an extensible environment for interactive and reproducible computing, based on the Jupyter Notebook Architecture. This vulnerability depends on user interaction by opening a malicious notebook with Markdown cells, or Markdown file using JupyterLab preview feature. A malicious user can access any data that the attacked user has access to as well as perform arbitrary requests acting as the attacked user. JupyterLab v3.6.8, v4.2.5 and Jupyter Notebook v7.2.2 have been patched to resolve this issue. Users are advised to upgrade. There is no workaround for the underlying DOM Clobbering susceptibility. However, select plugins can be disabled on deployments which cannot update in a timely fashion to minimise the risk. These are: 1. `@jupyterlab/mathjax-extension:plugin` - users will loose ability to preview mathematical equations. 2. `@jupyterlab/markdownviewer-extension:plugin` - users will loose ability to open Markdown previews. 3. `@jupyterlab/mathjax2-extension:plugin` (if installed with optional `jupyterlab-mathjax2` package) - an older version of the mathjax plugin for JupyterLab 4.x. To disable these extensions run: ```jupyter labextension disable @jupyterlab/markdownviewer-extension:plugin && jupyter labextension disable @jupyterlab/mathjax-extension:plugin && jupyter labextension disable @jupyterlab/mathjax2-extension:plugin ``` in bash.
Package python3-module-setuptools updated to version 80.7.1-alt1 for branch p11 in task 384856.
Closed vulnerabilities
BDU:2025-08604
Уязвимость библиотеки упрощения упаковки проектов setuptools, связанная с неверным ограничением имени пути к каталогу с ограниченным доступом, позволяющая нарушителю скомпрометировать уязвимую систему
Modified: 2025-06-12
CVE-2025-47273
setuptools is a package that allows users to download, build, install, upgrade, and uninstall Python packages. A path traversal vulnerability in `PackageIndex` is present in setuptools prior to version 78.1.1. An attacker would be allowed to write files to arbitrary locations on the filesystem with the permissions of the process running the Python code, which could escalate to remote code execution depending on the context. Version 78.1.1 fixes the issue.
- https://github.com/pypa/setuptools/blob/6ead555c5fb29bc57fe6105b1bffc163f56fd558/setuptools/package_index.py#L810C1-L825C88
- https://github.com/pypa/setuptools/commit/250a6d17978f9f6ac3ac887091f2d32886fbbb0b
- https://github.com/pypa/setuptools/issues/4946
- https://github.com/pypa/setuptools/security/advisories/GHSA-5rjg-fvgr-3xxf
- https://lists.debian.org/debian-lts-announce/2025/05/msg00035.html
- https://github.com/pypa/setuptools/issues/4946
Closed bugs
plots не запускается
plots: ошибка обновления
Package displaycal updated to version 3.9.16-alt1 for branch p11 in task 384856.
Closed bugs
Не работает displaycal-curve-viewer
Package python3-module-python-multipart updated to version 0.0.20-alt2 for branch p11 in task 384856.
Closed vulnerabilities
BDU:2025-03461
Уязвимость потокового многокомпонентного парсера python-multipart, связанная с неконтролируемым расходом ресурсов, позволяющая нарушителю вызвать отказ в обслуживании
CVE-2024-53981
python-multipart is a streaming multipart parser for Python. When parsing form data, python-multipart skips line breaks (CR \r or LF \n) in front of the first boundary and any tailing bytes after the last boundary. This happens one byte at a time and emits a log event each time, which may cause excessive logging for certain inputs. An attacker could abuse this by sending a malicious request with lots of data before the first or after the last boundary, causing high CPU load and stalling the processing thread for a significant amount of time. In case of ASGI application, this could stall the event loop and prevent other requests from being processed, resulting in a denial of service (DoS). This vulnerability is fixed in 0.0.18.