ALT-BU-2014-3166-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2025-04-12
CVE-2014-9274
UnRTF allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code as demonstrated by a file containing the string "{\cb-999999999".
- http://advisories.mageia.org/MGASA-2014-0533.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147399.html
- http://secunia.com/advisories/62811
- http://www.debian.org/security/2015/dsa-3158
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:007
- http://www.openwall.com/lists/oss-security/2014/12/04/15
- http://www.securityfocus.com/bid/71430
- https://bugzilla.redhat.com/show_bug.cgi?id=1170233
- https://lists.gnu.org/archive/html/bug-unrtf/2014-11/msg00001.html
- https://security.gentoo.org/glsa/201507-06
- http://advisories.mageia.org/MGASA-2014-0533.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147399.html
- http://secunia.com/advisories/62811
- http://www.debian.org/security/2015/dsa-3158
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:007
- http://www.openwall.com/lists/oss-security/2014/12/04/15
- http://www.securityfocus.com/bid/71430
- https://bugzilla.redhat.com/show_bug.cgi?id=1170233
- https://lists.gnu.org/archive/html/bug-unrtf/2014-11/msg00001.html
- https://security.gentoo.org/glsa/201507-06
Modified: 2025-04-12
CVE-2014-9275
UnRTF allows remote attackers to cause a denial of service (out-of-bounds memory access and crash) and possibly execute arbitrary code via a crafted RTF file.
- http://advisories.mageia.org/MGASA-2014-0533.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147399.html
- http://secunia.com/advisories/62811
- http://www.debian.org/security/2015/dsa-3158
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:007
- http://www.openwall.com/lists/oss-security/2014/12/03/4
- http://www.openwall.com/lists/oss-security/2014/12/04/15
- http://www.securityfocus.com/bid/71506
- https://bugzilla.redhat.com/show_bug.cgi?id=1170233
- https://security.gentoo.org/glsa/201507-06
- http://advisories.mageia.org/MGASA-2014-0533.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-January/147399.html
- http://secunia.com/advisories/62811
- http://www.debian.org/security/2015/dsa-3158
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:007
- http://www.openwall.com/lists/oss-security/2014/12/03/4
- http://www.openwall.com/lists/oss-security/2014/12/04/15
- http://www.securityfocus.com/bid/71506
- https://bugzilla.redhat.com/show_bug.cgi?id=1170233
- https://security.gentoo.org/glsa/201507-06
Closed bugs
отсутствует драйвер gnuplot_qt
Package perl-DBD-mysql updated to version 4.029-alt1 for branch sisyphus in task 136655.
Closed vulnerabilities
BDU:2016-02084
Уязвимость драйвера DBD::mysq, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
Modified: 2025-04-12
CVE-2014-9906
Use-after-free vulnerability in DBD::mysql before 4.029 allows attackers to cause a denial of service (program crash) or possibly execute arbitrary code via vectors related to a lost server connection.
- http://cpansearch.perl.org/src/CAPTTOFU/DBD-mysql-4.029/ChangeLog
- http://www.debian.org/security/2016/dsa-3635
- http://www.openwall.com/lists/oss-security/2016/07/27/5
- http://www.openwall.com/lists/oss-security/2016/07/27/6
- http://www.securityfocus.com/bid/92149
- https://github.com/perl5-dbi/DBD-mysql/commit/a56ae87a4c1c1fead7d09c3653905841ccccf1cc
- https://rt.cpan.org/Public/Bug/Display.html?id=97625
- http://cpansearch.perl.org/src/CAPTTOFU/DBD-mysql-4.029/ChangeLog
- http://www.debian.org/security/2016/dsa-3635
- http://www.openwall.com/lists/oss-security/2016/07/27/5
- http://www.openwall.com/lists/oss-security/2016/07/27/6
- http://www.securityfocus.com/bid/92149
- https://github.com/perl5-dbi/DBD-mysql/commit/a56ae87a4c1c1fead7d09c3653905841ccccf1cc
- https://rt.cpan.org/Public/Bug/Display.html?id=97625