ALT-BU-2016-2558-1
Branch sisyphus update bulletin.
Package branding-simply-linux updated to version 7.95.0-alt3 for branch sisyphus in task 156729.
Closed bugs
Xfce не проигрывает звуки системных событий
Closed bugs
sddm-0.13 сегфолтится в установленном(!) regular-kde5.iso
Closed vulnerabilities
BDU:2016-00509
Уязвимости браузеров Firefox и Firefox ESR, позволяющие нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2016-00510
Уязвимости браузера Firefox, позволяющие нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2016-00511
Уязвимость браузера Firefox, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2016-00512
Уязвимость браузера Firefox, позволяющая нарушителю вызвать отказ в обслуживании или оказать другое воздействие
BDU:2018-00029
Уязвимость функции BufferSubData() почтового клиента Thunderbird и браузеров Firefox позволяющая нарушителю выполнить произвольный код или вызвать отказ в обслуживании
Modified: 2024-11-21
CVE-2016-1930
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 44.0 and Firefox ESR 38.x before 38.6 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via unknown vectors.
- openSUSE-SU-2016:0306
- openSUSE-SU-2016:0306
- openSUSE-SU-2016:0309
- openSUSE-SU-2016:0309
- openSUSE-SU-2016:0310
- openSUSE-SU-2016:0310
- SUSE-SU-2016:0338
- SUSE-SU-2016:0338
- openSUSE-SU-2016:0488
- openSUSE-SU-2016:0488
- openSUSE-SU-2016:0492
- openSUSE-SU-2016:0492
- RHSA-2016:0071
- RHSA-2016:0071
- RHSA-2016:0258
- RHSA-2016:0258
- DSA-3457
- DSA-3457
- DSA-3491
- DSA-3491
- http://www.mozilla.org/security/announce/2016/mfsa2016-01.html
- http://www.mozilla.org/security/announce/2016/mfsa2016-01.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- 81953
- 81953
- 1034825
- 1034825
- USN-2880-1
- USN-2880-1
- USN-2880-2
- USN-2880-2
- USN-2904-1
- USN-2904-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1221385
- https://bugzilla.mozilla.org/show_bug.cgi?id=1221385
- https://bugzilla.mozilla.org/show_bug.cgi?id=1223670
- https://bugzilla.mozilla.org/show_bug.cgi?id=1223670
- https://bugzilla.mozilla.org/show_bug.cgi?id=1224200
- https://bugzilla.mozilla.org/show_bug.cgi?id=1224200
- https://bugzilla.mozilla.org/show_bug.cgi?id=1230483
- https://bugzilla.mozilla.org/show_bug.cgi?id=1230483
- https://bugzilla.mozilla.org/show_bug.cgi?id=1230639
- https://bugzilla.mozilla.org/show_bug.cgi?id=1230639
- https://bugzilla.mozilla.org/show_bug.cgi?id=1230668
- https://bugzilla.mozilla.org/show_bug.cgi?id=1230668
- https://bugzilla.mozilla.org/show_bug.cgi?id=1230686
- https://bugzilla.mozilla.org/show_bug.cgi?id=1230686
- https://bugzilla.mozilla.org/show_bug.cgi?id=1233152
- https://bugzilla.mozilla.org/show_bug.cgi?id=1233152
- https://bugzilla.mozilla.org/show_bug.cgi?id=1233346
- https://bugzilla.mozilla.org/show_bug.cgi?id=1233346
- https://bugzilla.mozilla.org/show_bug.cgi?id=1233925
- https://bugzilla.mozilla.org/show_bug.cgi?id=1233925
- https://bugzilla.mozilla.org/show_bug.cgi?id=1234280
- https://bugzilla.mozilla.org/show_bug.cgi?id=1234280
- https://bugzilla.mozilla.org/show_bug.cgi?id=1234571
- https://bugzilla.mozilla.org/show_bug.cgi?id=1234571
- GLSA-201605-06
- GLSA-201605-06
Modified: 2024-11-21
CVE-2016-1931
Multiple unspecified vulnerabilities in the browser engine in Mozilla Firefox before 44.0 allow remote attackers to cause a denial of service (memory corruption and application crash) or possibly execute arbitrary code via vectors related to uninitialized memory encountered during brotli data compression, and other vectors.
- openSUSE-SU-2016:0306
- openSUSE-SU-2016:0306
- openSUSE-SU-2016:0309
- openSUSE-SU-2016:0309
- http://www.mozilla.org/security/announce/2016/mfsa2016-01.html
- http://www.mozilla.org/security/announce/2016/mfsa2016-01.html
- 81953
- 81953
- 1034825
- 1034825
- USN-2880-1
- USN-2880-1
- USN-2880-2
- USN-2880-2
- https://bugzilla.mozilla.org/show_bug.cgi?id=1180064
- https://bugzilla.mozilla.org/show_bug.cgi?id=1180064
- https://bugzilla.mozilla.org/show_bug.cgi?id=1186973
- https://bugzilla.mozilla.org/show_bug.cgi?id=1186973
- https://bugzilla.mozilla.org/show_bug.cgi?id=1206675
- https://bugzilla.mozilla.org/show_bug.cgi?id=1206675
- https://bugzilla.mozilla.org/show_bug.cgi?id=1207298
- https://bugzilla.mozilla.org/show_bug.cgi?id=1207298
- https://bugzilla.mozilla.org/show_bug.cgi?id=1209358
- https://bugzilla.mozilla.org/show_bug.cgi?id=1209358
- https://bugzilla.mozilla.org/show_bug.cgi?id=1209365
- https://bugzilla.mozilla.org/show_bug.cgi?id=1209365
- https://bugzilla.mozilla.org/show_bug.cgi?id=1209366
- https://bugzilla.mozilla.org/show_bug.cgi?id=1209366
- https://bugzilla.mozilla.org/show_bug.cgi?id=1209368
- https://bugzilla.mozilla.org/show_bug.cgi?id=1209368
- https://bugzilla.mozilla.org/show_bug.cgi?id=1209546
- https://bugzilla.mozilla.org/show_bug.cgi?id=1209546
- https://bugzilla.mozilla.org/show_bug.cgi?id=1222015
- https://bugzilla.mozilla.org/show_bug.cgi?id=1222015
- https://bugzilla.mozilla.org/show_bug.cgi?id=1229825
- https://bugzilla.mozilla.org/show_bug.cgi?id=1229825
- https://bugzilla.mozilla.org/show_bug.cgi?id=1231121
- https://bugzilla.mozilla.org/show_bug.cgi?id=1231121
- https://bugzilla.mozilla.org/show_bug.cgi?id=1234576
- https://bugzilla.mozilla.org/show_bug.cgi?id=1234576
- GLSA-201605-06
- GLSA-201605-06
Modified: 2024-11-21
CVE-2016-1933
Integer overflow in the image-deinterlacing functionality in Mozilla Firefox before 44.0 allows remote attackers to cause a denial of service (memory consumption or application crash) via a crafted GIF image.
- openSUSE-SU-2016:0306
- openSUSE-SU-2016:0306
- openSUSE-SU-2016:0309
- openSUSE-SU-2016:0309
- http://www.mozilla.org/security/announce/2016/mfsa2016-02.html
- http://www.mozilla.org/security/announce/2016/mfsa2016-02.html
- 81956
- 81956
- 1034825
- 1034825
- USN-2880-1
- USN-2880-1
- USN-2880-2
- USN-2880-2
- https://bugzilla.mozilla.org/show_bug.cgi?id=1231761
- https://bugzilla.mozilla.org/show_bug.cgi?id=1231761
- GLSA-201605-06
- GLSA-201605-06
Modified: 2024-11-21
CVE-2016-1935
Buffer overflow in the BufferSubData function in Mozilla Firefox before 44.0 and Firefox ESR 38.x before 38.6 allows remote attackers to execute arbitrary code via crafted WebGL content.
- openSUSE-SU-2016:0306
- openSUSE-SU-2016:0306
- openSUSE-SU-2016:0309
- openSUSE-SU-2016:0309
- openSUSE-SU-2016:0310
- openSUSE-SU-2016:0310
- SUSE-SU-2016:0338
- SUSE-SU-2016:0338
- openSUSE-SU-2016:0488
- openSUSE-SU-2016:0488
- openSUSE-SU-2016:0492
- openSUSE-SU-2016:0492
- RHSA-2016:0071
- RHSA-2016:0071
- RHSA-2016:0258
- RHSA-2016:0258
- DSA-3457
- DSA-3457
- DSA-3491
- DSA-3491
- http://www.mozilla.org/security/announce/2016/mfsa2016-03.html
- http://www.mozilla.org/security/announce/2016/mfsa2016-03.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- 81952
- 81952
- 1034825
- 1034825
- USN-2880-1
- USN-2880-1
- USN-2880-2
- USN-2880-2
- USN-2904-1
- USN-2904-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1220450
- https://bugzilla.mozilla.org/show_bug.cgi?id=1220450
- GLSA-201605-06
- GLSA-201605-06
Modified: 2024-11-21
CVE-2016-1937
The protocol-handler dialog in Mozilla Firefox before 44.0 allows remote attackers to conduct clickjacking attacks via a crafted web site that triggers a single-click action in a situation where a double-click action was intended.
- openSUSE-SU-2016:0306
- openSUSE-SU-2016:0306
- openSUSE-SU-2016:0309
- openSUSE-SU-2016:0309
- http://www.mozilla.org/security/announce/2016/mfsa2016-06.html
- http://www.mozilla.org/security/announce/2016/mfsa2016-06.html
- 81957
- 81957
- 1034825
- 1034825
- USN-2880-1
- USN-2880-1
- USN-2880-2
- USN-2880-2
- https://bugzilla.mozilla.org/show_bug.cgi?id=724353
- https://bugzilla.mozilla.org/show_bug.cgi?id=724353
- GLSA-201605-06
- GLSA-201605-06
Modified: 2024-11-21
CVE-2016-1939
Mozilla Firefox before 44.0 stores cookies with names containing vertical tab characters, which allows remote attackers to obtain sensitive information by reading HTTP Cookie headers. NOTE: this vulnerability exists because of an incomplete fix for CVE-2015-7208.
- openSUSE-SU-2016:0306
- openSUSE-SU-2016:0306
- openSUSE-SU-2016:0309
- openSUSE-SU-2016:0309
- http://www.mozilla.org/security/announce/2016/mfsa2016-04.html
- http://www.mozilla.org/security/announce/2016/mfsa2016-04.html
- 1034825
- 1034825
- USN-2880-1
- USN-2880-1
- USN-2880-2
- USN-2880-2
- https://bugzilla.mozilla.org/show_bug.cgi?id=1233784
- https://bugzilla.mozilla.org/show_bug.cgi?id=1233784
- GLSA-201605-06
- GLSA-201605-06
Modified: 2024-11-21
CVE-2016-1942
Mozilla Firefox before 44.0 allows user-assisted remote attackers to spoof a trailing substring in the address bar by leveraging a user's paste of a (1) wyciwyg: URI or (2) resource: URI.
- openSUSE-SU-2016:0306
- openSUSE-SU-2016:0306
- openSUSE-SU-2016:0309
- openSUSE-SU-2016:0309
- http://www.mozilla.org/security/announce/2016/mfsa2016-09.html
- http://www.mozilla.org/security/announce/2016/mfsa2016-09.html
- 81948
- 81948
- 1034825
- 1034825
- USN-2880-1
- USN-2880-1
- USN-2880-2
- USN-2880-2
- https://bugzilla.mozilla.org/show_bug.cgi?id=1189082
- https://bugzilla.mozilla.org/show_bug.cgi?id=1189082
- GLSA-201605-06
- GLSA-201605-06
Modified: 2024-11-21
CVE-2016-1944
The Buffer11::NativeBuffer11::map function in ANGLE, as used in Mozilla Firefox before 44.0, might allow remote attackers to cause a denial of service (memory corruption) or possibly have unspecified other impact via unknown vectors.
- openSUSE-SU-2016:0306
- openSUSE-SU-2016:0306
- openSUSE-SU-2016:0309
- openSUSE-SU-2016:0309
- http://www.mozilla.org/security/announce/2016/mfsa2016-10.html
- http://www.mozilla.org/security/announce/2016/mfsa2016-10.html
- 81950
- 81950
- 1034825
- 1034825
- USN-2880-1
- USN-2880-1
- USN-2880-2
- USN-2880-2
- https://bugzilla.mozilla.org/show_bug.cgi?id=1186621
- https://bugzilla.mozilla.org/show_bug.cgi?id=1186621
- GLSA-201605-06
- GLSA-201605-06
Modified: 2024-11-21
CVE-2016-1945
The nsZipArchive function in Mozilla Firefox before 44.0 might allow remote attackers to cause a denial of service or possibly have unspecified other impact by leveraging incorrect use of a pointer during processing of a ZIP archive.
- openSUSE-SU-2016:0306
- openSUSE-SU-2016:0306
- openSUSE-SU-2016:0309
- openSUSE-SU-2016:0309
- http://www.mozilla.org/security/announce/2016/mfsa2016-10.html
- http://www.mozilla.org/security/announce/2016/mfsa2016-10.html
- 81950
- 81950
- 1034825
- 1034825
- USN-2880-1
- USN-2880-1
- USN-2880-2
- USN-2880-2
- https://bugzilla.mozilla.org/show_bug.cgi?id=1214782
- https://bugzilla.mozilla.org/show_bug.cgi?id=1214782
- GLSA-201605-06
- GLSA-201605-06
Modified: 2024-11-21
CVE-2016-1946
The MoofParser::Metadata function in binding/MoofParser.cpp in libstagefright in Mozilla Firefox before 44.0 does not limit the size of read operations, which might allow remote attackers to cause a denial of service (integer overflow and buffer overflow) or possibly have unspecified other impact via crafted metadata.
- openSUSE-SU-2016:0306
- openSUSE-SU-2016:0306
- openSUSE-SU-2016:0309
- openSUSE-SU-2016:0309
- http://www.mozilla.org/security/announce/2016/mfsa2016-10.html
- http://www.mozilla.org/security/announce/2016/mfsa2016-10.html
- 81950
- 81950
- 1034825
- 1034825
- USN-2880-1
- USN-2880-1
- USN-2880-2
- USN-2880-2
- https://bugzilla.mozilla.org/show_bug.cgi?id=1232069
- https://bugzilla.mozilla.org/show_bug.cgi?id=1232069
- https://hg.mozilla.org/mozilla-central/rev/2a57c0a0cf19
- https://hg.mozilla.org/mozilla-central/rev/2a57c0a0cf19
- GLSA-201605-06
- GLSA-201605-06
Modified: 2024-11-21
CVE-2016-1947
Mozilla Firefox 43.x mishandles attempts to connect to the Application Reputation service, which makes it easier for remote attackers to trigger an unintended download by leveraging the absence of reputation data.
- openSUSE-SU-2016:0306
- openSUSE-SU-2016:0306
- openSUSE-SU-2016:0309
- openSUSE-SU-2016:0309
- http://www.mozilla.org/security/announce/2016/mfsa2016-11.html
- http://www.mozilla.org/security/announce/2016/mfsa2016-11.html
- 81949
- 81949
- 1034825
- 1034825
- USN-2880-1
- USN-2880-1
- USN-2880-2
- USN-2880-2
- https://bugzilla.mozilla.org/show_bug.cgi?id=1237103
- https://bugzilla.mozilla.org/show_bug.cgi?id=1237103
- GLSA-201605-06
- GLSA-201605-06
Closed vulnerabilities
BDU:2016-00666
Уязвимость библиотеки OpenSSL, позволяющая нарушителю получить закрытый ключ
BDU:2016-00896
Уязвимость библиотеки OpenSSL, позволяющая нарушителю взломать криптографический механизм защиты
Modified: 2024-11-21
CVE-2015-3197
ssl/s2_srvr.c in OpenSSL 1.0.1 before 1.0.1r and 1.0.2 before 1.0.2f does not prevent use of disabled ciphers, which makes it easier for man-in-the-middle attackers to defeat cryptographic protection mechanisms by performing computations on SSLv2 traffic, related to the get_client_master_key and get_client_hello functions.
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- FEDORA-2016-527018d2ff
- FEDORA-2016-527018d2ff
- SUSE-SU-2016:0617
- SUSE-SU-2016:0617
- SUSE-SU-2016:0620
- SUSE-SU-2016:0620
- SUSE-SU-2016:0621
- SUSE-SU-2016:0621
- SUSE-SU-2016:0624
- SUSE-SU-2016:0624
- openSUSE-SU-2016:0628
- openSUSE-SU-2016:0628
- SUSE-SU-2016:0631
- SUSE-SU-2016:0631
- openSUSE-SU-2016:0637
- openSUSE-SU-2016:0637
- openSUSE-SU-2016:0638
- openSUSE-SU-2016:0638
- openSUSE-SU-2016:0640
- openSUSE-SU-2016:0640
- SUSE-SU-2016:0641
- SUSE-SU-2016:0641
- SUSE-SU-2016:0678
- SUSE-SU-2016:0678
- openSUSE-SU-2016:0720
- openSUSE-SU-2016:0720
- SUSE-SU-2016:1057
- SUSE-SU-2016:1057
- openSUSE-SU-2016:1239
- openSUSE-SU-2016:1239
- openSUSE-SU-2016:1241
- openSUSE-SU-2016:1241
- http://www.openssl.org/news/secadv/20160128.txt
- http://www.openssl.org/news/secadv/20160128.txt
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpuapr2016v3-2985753.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2017-3236622.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinjul2016-3090546.html
- 82237
- 82237
- 91787
- 91787
- 1034849
- 1034849
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=d81a1600588b726c2bdccda7efad3cc7a87d6245
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=d81a1600588b726c2bdccda7efad3cc7a87d6245
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03724en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03724en_us
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390893
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390893
- FreeBSD-SA-16:11
- FreeBSD-SA-16:11
- GLSA-201601-05
- GLSA-201601-05
- VU#257823
- VU#257823
Modified: 2024-11-21
CVE-2016-0701
The DH_check_pub_key function in crypto/dh/dh_check.c in OpenSSL 1.0.2 before 1.0.2f does not ensure that prime numbers are appropriate for Diffie-Hellman (DH) key exchange, which makes it easier for remote attackers to discover a private DH exponent by making multiple handshakes with a peer that chose an inappropriate number, as demonstrated by a number in an X9.42 file.
- http://intothesymmetry.blogspot.com/2016/01/openssl-key-recovery-attack-on-dh-small.html
- http://intothesymmetry.blogspot.com/2016/01/openssl-key-recovery-attack-on-dh-small.html
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10759
- FEDORA-2016-527018d2ff
- FEDORA-2016-527018d2ff
- openSUSE-SU-2016:0637
- openSUSE-SU-2016:0637
- http://www.openssl.org/news/secadv/20160128.txt
- http://www.openssl.org/news/secadv/20160128.txt
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpujul2016-2881720.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- 82233
- 82233
- 91787
- 91787
- 1034849
- 1034849
- USN-2883-1
- USN-2883-1
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://cert-portal.siemens.com/productcert/pdf/ssa-412672.pdf
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=878e2c5b13010329c203f309ed0c8f2113f85648
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=878e2c5b13010329c203f309ed0c8f2113f85648
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=c5b831f21d0d29d1e517d139d9d101763f60c9a2
- https://git.openssl.org/?p=openssl.git%3Ba=commit%3Bh=c5b831f21d0d29d1e517d139d9d101763f60c9a2
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03724en_us
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbhf03724en_us
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164821
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05164821
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390893
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390893
- GLSA-201601-05
- GLSA-201601-05
- VU#257823
- VU#257823
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpuapr2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujan2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html
- https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.html