ALT-BU-2016-2599-1
Branch sisyphus update bulletin.
Package thunderbird updated to version 38.6.0-alt1 for branch sisyphus in task 159677.
Closed vulnerabilities
BDU:2016-00573
Уязвимость браузеров Firefox ESR и Firefox, программного средства рендеринга Graphite 2, почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании, получить конфиденциальную информацию или выполнить произвольный код
BDU:2016-00574
Уязвимость браузера Firefox ESR, программного средства рендеринга Graphite 2, почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
BDU:2016-00575
Уязвимость браузера Firefox ESR, программного средства рендеринга Graphite 2, почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании
BDU:2016-00576
Уязвимость браузера Firefox ESR, программного средства рендеринга Graphite 2, почтового клиента Thunderbird, позволяющая нарушителю вызвать отказ в обслуживании или получить конфиденциальную информацию
Modified: 2025-04-12
CVE-2016-1521
The directrun function in directmachine.cpp in Libgraphite in Graphite 2 1.2.4, as used in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.6.1, does not validate a certain skip operation, which allows remote attackers to execute arbitrary code, obtain sensitive information, or cause a denial of service (out-of-bounds read and application crash) via a crafted Graphite smart font.
- http://blog.talosintel.com/2016/02/vulnerability-spotlight-libgraphite.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177520.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184623.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00052.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00058.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00088.html
- http://rhn.redhat.com/errata/RHSA-2016-0197.html
- http://rhn.redhat.com/errata/RHSA-2016-0258.html
- http://rhn.redhat.com/errata/RHSA-2016-0594.html
- http://www.debian.org/security/2016/dsa-3479
- http://www.mozilla.org/security/announce/2016/mfsa2016-14.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.securityfocus.com/bid/82991
- http://www.ubuntu.com/usn/USN-2902-1
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- https://security.gentoo.org/glsa/201701-35
- https://security.gentoo.org/glsa/201701-63
- http://blog.talosintel.com/2016/02/vulnerability-spotlight-libgraphite.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177520.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184623.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00052.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00058.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00088.html
- http://rhn.redhat.com/errata/RHSA-2016-0197.html
- http://rhn.redhat.com/errata/RHSA-2016-0258.html
- http://rhn.redhat.com/errata/RHSA-2016-0594.html
- http://www.debian.org/security/2016/dsa-3479
- http://www.mozilla.org/security/announce/2016/mfsa2016-14.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.securityfocus.com/bid/82991
- http://www.ubuntu.com/usn/USN-2902-1
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05390722
- https://security.gentoo.org/glsa/201701-35
- https://security.gentoo.org/glsa/201701-63
Modified: 2025-04-12
CVE-2016-1522
Code.cpp in Libgraphite in Graphite 2 1.2.4, as used in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.6.1, does not consider recursive load calls during a size check, which allows remote attackers to cause a denial of service (heap-based buffer overflow) or possibly execute arbitrary code via a crafted Graphite smart font.
- http://blog.talosintel.com/2016/02/vulnerability-spotlight-libgraphite.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177520.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184623.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00058.html
- http://rhn.redhat.com/errata/RHSA-2016-0197.html
- http://rhn.redhat.com/errata/RHSA-2016-0258.html
- http://rhn.redhat.com/errata/RHSA-2016-0594.html
- http://www.debian.org/security/2016/dsa-3479
- http://www.mozilla.org/security/announce/2016/mfsa2016-14.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.securityfocus.com/bid/82991
- http://www.ubuntu.com/usn/USN-2902-1
- https://security.gentoo.org/glsa/201701-35
- https://security.gentoo.org/glsa/201701-63
- http://blog.talosintel.com/2016/02/vulnerability-spotlight-libgraphite.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177520.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184623.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00058.html
- http://rhn.redhat.com/errata/RHSA-2016-0197.html
- http://rhn.redhat.com/errata/RHSA-2016-0258.html
- http://rhn.redhat.com/errata/RHSA-2016-0594.html
- http://www.debian.org/security/2016/dsa-3479
- http://www.mozilla.org/security/announce/2016/mfsa2016-14.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.securityfocus.com/bid/82991
- http://www.ubuntu.com/usn/USN-2902-1
- https://security.gentoo.org/glsa/201701-35
- https://security.gentoo.org/glsa/201701-63
Modified: 2025-04-12
CVE-2016-1523
The SillMap::readFace function in FeatureMap.cpp in Libgraphite in Graphite 2 1.2.4, as used in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.6.1, mishandles a return value, which allows remote attackers to cause a denial of service (missing initialization, NULL pointer dereference, and application crash) via a crafted Graphite smart font.
- http://blog.talosintel.com/2016/02/vulnerability-spotlight-libgraphite.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177520.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184623.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00053.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00055.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00052.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00058.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00088.html
- http://rhn.redhat.com/errata/RHSA-2016-0197.html
- http://rhn.redhat.com/errata/RHSA-2016-0258.html
- http://rhn.redhat.com/errata/RHSA-2016-0594.html
- http://www.debian.org/security/2016/dsa-3477
- http://www.debian.org/security/2016/dsa-3479
- http://www.debian.org/security/2016/dsa-3491
- http://www.mozilla.org/security/announce/2016/mfsa2016-14.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.securityfocus.com/bid/82991
- http://www.securitytracker.com/id/1035017
- http://www.ubuntu.com/usn/USN-2902-1
- http://www.ubuntu.com/usn/USN-2904-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1246093
- https://security.gentoo.org/glsa/201605-06
- https://security.gentoo.org/glsa/201701-35
- https://security.gentoo.org/glsa/201701-63
- http://blog.talosintel.com/2016/02/vulnerability-spotlight-libgraphite.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177520.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184623.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00053.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00055.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00052.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00058.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00088.html
- http://rhn.redhat.com/errata/RHSA-2016-0197.html
- http://rhn.redhat.com/errata/RHSA-2016-0258.html
- http://rhn.redhat.com/errata/RHSA-2016-0594.html
- http://www.debian.org/security/2016/dsa-3477
- http://www.debian.org/security/2016/dsa-3479
- http://www.debian.org/security/2016/dsa-3491
- http://www.mozilla.org/security/announce/2016/mfsa2016-14.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjan2016-2867209.html
- http://www.securityfocus.com/bid/82991
- http://www.securitytracker.com/id/1035017
- http://www.ubuntu.com/usn/USN-2902-1
- http://www.ubuntu.com/usn/USN-2904-1
- https://bugzilla.mozilla.org/show_bug.cgi?id=1246093
- https://security.gentoo.org/glsa/201605-06
- https://security.gentoo.org/glsa/201701-35
- https://security.gentoo.org/glsa/201701-63
Modified: 2025-04-12
CVE-2016-1526
The TtfUtil:LocaLookup function in TtfUtil.cpp in Libgraphite in Graphite 2 1.2.4, as used in Mozilla Firefox before 43.0 and Firefox ESR 38.x before 38.6.1, incorrectly validates a size value, which allows remote attackers to obtain sensitive information or cause a denial of service (out-of-bounds read and application crash) via a crafted Graphite smart font.
- http://blog.talosintel.com/2016/02/vulnerability-spotlight-libgraphite.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177520.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184623.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00052.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00058.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00088.html
- http://rhn.redhat.com/errata/RHSA-2016-0594.html
- http://rhn.redhat.com/errata/RHSA-2016-0695.html
- http://www.debian.org/security/2016/dsa-3479
- http://www.mozilla.org/security/announce/2016/mfsa2016-14.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.securityfocus.com/bid/82991
- http://www.ubuntu.com/usn/USN-2902-1
- https://security.gentoo.org/glsa/201701-35
- https://security.gentoo.org/glsa/201701-63
- http://blog.talosintel.com/2016/02/vulnerability-spotlight-libgraphite.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/177520.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-May/184623.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00052.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00058.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00088.html
- http://rhn.redhat.com/errata/RHSA-2016-0594.html
- http://rhn.redhat.com/errata/RHSA-2016-0695.html
- http://www.debian.org/security/2016/dsa-3479
- http://www.mozilla.org/security/announce/2016/mfsa2016-14.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-2952096.html
- http://www.securityfocus.com/bid/82991
- http://www.ubuntu.com/usn/USN-2902-1
- https://security.gentoo.org/glsa/201701-35
- https://security.gentoo.org/glsa/201701-63
No data currently available.
No data currently available.
No data currently available.
No data currently available.
Package kernel-image-un-def updated to version 4.4.2-alt1 for branch sisyphus in task 159699.
Closed vulnerabilities
Modified: 2025-04-12
CVE-2015-7566
The clie_5_attach function in drivers/usb/serial/visor.c in the Linux kernel through 4.4.1 allows physically proximate attackers to cause a denial of service (NULL pointer dereference and system crash) or possibly have unspecified other impact by inserting a USB device that lacks a bulk-out endpoint.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cb3232138e37129e88240a98a1d2aba2187ff57c
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175792.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176194.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html
- http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
- http://www.debian.org/security/2016/dsa-3448
- http://www.debian.org/security/2016/dsa-3503
- http://www.securityfocus.com/archive/1/537733/100/0/threaded
- http://www.securityfocus.com/bid/82975
- http://www.ubuntu.com/usn/USN-2929-1
- http://www.ubuntu.com/usn/USN-2929-2
- http://www.ubuntu.com/usn/USN-2930-1
- http://www.ubuntu.com/usn/USN-2930-2
- http://www.ubuntu.com/usn/USN-2930-3
- http://www.ubuntu.com/usn/USN-2932-1
- http://www.ubuntu.com/usn/USN-2948-1
- http://www.ubuntu.com/usn/USN-2948-2
- http://www.ubuntu.com/usn/USN-2967-1
- http://www.ubuntu.com/usn/USN-2967-2
- https://bugzilla.redhat.com/show_bug.cgi?id=1283371
- https://bugzilla.redhat.com/show_bug.cgi?id=1296466
- https://github.com/torvalds/linux/commit/cb3232138e37129e88240a98a1d2aba2187ff57c
- https://security-tracker.debian.org/tracker/CVE-2015-7566
- https://www.exploit-db.com/exploits/39540/
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=cb3232138e37129e88240a98a1d2aba2187ff57c
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-January/175792.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-January/176194.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00052.html
- http://lists.opensuse.org/opensuse-security-announce/2016-06/msg00059.html
- http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
- http://www.debian.org/security/2016/dsa-3448
- http://www.debian.org/security/2016/dsa-3503
- http://www.securityfocus.com/archive/1/537733/100/0/threaded
- http://www.securityfocus.com/bid/82975
- http://www.ubuntu.com/usn/USN-2929-1
- http://www.ubuntu.com/usn/USN-2929-2
- http://www.ubuntu.com/usn/USN-2930-1
- http://www.ubuntu.com/usn/USN-2930-2
- http://www.ubuntu.com/usn/USN-2930-3
- http://www.ubuntu.com/usn/USN-2932-1
- http://www.ubuntu.com/usn/USN-2948-1
- http://www.ubuntu.com/usn/USN-2948-2
- http://www.ubuntu.com/usn/USN-2967-1
- http://www.ubuntu.com/usn/USN-2967-2
- https://bugzilla.redhat.com/show_bug.cgi?id=1283371
- https://bugzilla.redhat.com/show_bug.cgi?id=1296466
- https://github.com/torvalds/linux/commit/cb3232138e37129e88240a98a1d2aba2187ff57c
- https://security-tracker.debian.org/tracker/CVE-2015-7566
- https://www.exploit-db.com/exploits/39540/
Modified: 2025-04-12
CVE-2015-8709
kernel/ptrace.c in the Linux kernel through 4.4.1 mishandles uid and gid mappings, which allows local users to gain privileges by establishing a user namespace, waiting for a root process to enter that namespace with an unsafe uid or gid, and then using the ptrace system call. NOTE: the vendor states "there is no kernel bug here.
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00028.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00030.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00032.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00033.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00034.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00036.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00037.html
- http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
- http://marc.info/?l=linux-kernel&m=145204362722256&w=2
- http://marc.info/?l=linux-kernel&m=145204641422813&w=2
- http://www.debian.org/security/2016/dsa-3434
- http://www.openwall.com/lists/oss-security/2015/12/17/12
- http://www.openwall.com/lists/oss-security/2015/12/31/5
- http://www.securityfocus.com/bid/79899
- http://www.securitytracker.com/id/1034899
- https://bugzilla.redhat.com/show_bug.cgi?id=1295287
- https://lkml.org/lkml/2015/12/25/71
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00019.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00025.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00027.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00028.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00029.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00030.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00032.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00033.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00034.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00036.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00037.html
- http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
- http://marc.info/?l=linux-kernel&m=145204362722256&w=2
- http://marc.info/?l=linux-kernel&m=145204641422813&w=2
- http://www.debian.org/security/2016/dsa-3434
- http://www.openwall.com/lists/oss-security/2015/12/17/12
- http://www.openwall.com/lists/oss-security/2015/12/31/5
- http://www.securityfocus.com/bid/79899
- http://www.securitytracker.com/id/1034899
- https://bugzilla.redhat.com/show_bug.cgi?id=1295287
- https://lkml.org/lkml/2015/12/25/71
Modified: 2025-04-12
CVE-2015-8970
crypto/algif_skcipher.c in the Linux kernel before 4.4.2 does not verify that a setkey operation has been performed on an AF_ALG socket before an accept system call is processed, which allows local users to cause a denial of service (NULL pointer dereference and system crash) via a crafted application that does not supply a key, related to the lrw_crypt function in crypto/lrw.c.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=dd504589577d8e8e70f51f997ad487a4cb6c026f
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.2
- http://www.openwall.com/lists/oss-security/2016/11/04/3
- http://www.securityfocus.com/bid/94217
- https://access.redhat.com/errata/RHSA-2017:1842
- https://access.redhat.com/errata/RHSA-2017:2077
- https://access.redhat.com/errata/RHSA-2017:2437
- https://access.redhat.com/errata/RHSA-2017:2444
- https://bugzilla.redhat.com/show_bug.cgi?id=1386286
- https://github.com/torvalds/linux/commit/dd504589577d8e8e70f51f997ad487a4cb6c026f
- https://groups.google.com/forum/#%21msg/syzkaller/frb2XrB5aWk/xCXzkIBcDAAJ
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=dd504589577d8e8e70f51f997ad487a4cb6c026f
- http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.4.2
- http://www.openwall.com/lists/oss-security/2016/11/04/3
- http://www.securityfocus.com/bid/94217
- https://access.redhat.com/errata/RHSA-2017:1842
- https://access.redhat.com/errata/RHSA-2017:2077
- https://access.redhat.com/errata/RHSA-2017:2437
- https://access.redhat.com/errata/RHSA-2017:2444
- https://bugzilla.redhat.com/show_bug.cgi?id=1386286
- https://github.com/torvalds/linux/commit/dd504589577d8e8e70f51f997ad487a4cb6c026f
- https://groups.google.com/forum/#%21msg/syzkaller/frb2XrB5aWk/xCXzkIBcDAAJ
Modified: 2025-04-12
CVE-2016-0723
Race condition in the tty_ioctl function in drivers/tty/tty_io.c in the Linux kernel through 4.4.1 allows local users to obtain sensitive information from kernel memory or cause a denial of service (use-after-free and system crash) by making a TIOCGETD ioctl call during processing of a TIOCSETD ioctl call.
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5c17c861a357e9458001f021a7afa7aab9937439
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176464.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
- http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
- http://source.android.com/security/bulletin/2016-07-01.html
- http://www.debian.org/security/2016/dsa-3448
- http://www.debian.org/security/2016/dsa-3503
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
- http://www.securityfocus.com/bid/82950
- http://www.securitytracker.com/id/1035695
- http://www.ubuntu.com/usn/USN-2929-1
- http://www.ubuntu.com/usn/USN-2929-2
- http://www.ubuntu.com/usn/USN-2930-1
- http://www.ubuntu.com/usn/USN-2930-2
- http://www.ubuntu.com/usn/USN-2930-3
- http://www.ubuntu.com/usn/USN-2932-1
- http://www.ubuntu.com/usn/USN-2948-1
- http://www.ubuntu.com/usn/USN-2948-2
- http://www.ubuntu.com/usn/USN-2967-1
- http://www.ubuntu.com/usn/USN-2967-2
- https://bugzilla.redhat.com/show_bug.cgi?id=1296253
- https://github.com/torvalds/linux/commit/5c17c861a357e9458001f021a7afa7aab9937439
- https://security-tracker.debian.org/tracker/CVE-2016-0723
- https://support.f5.com/csp/article/K43650115
- http://git.kernel.org/cgit/linux/kernel/git/torvalds/linux.git/commit/?id=5c17c861a357e9458001f021a7afa7aab9937439
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176464.html
- http://lists.fedoraproject.org/pipermail/package-announce/2016-February/176484.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00094.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00015.html
- http://lists.opensuse.org/opensuse-security-announce/2016-04/msg00045.html
- http://lists.opensuse.org/opensuse-security-announce/2016-07/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
- http://source.android.com/security/bulletin/2016-07-01.html
- http://www.debian.org/security/2016/dsa-3448
- http://www.debian.org/security/2016/dsa-3503
- http://www.oracle.com/technetwork/topics/security/linuxbulletinjul2016-3090544.html
- http://www.oracle.com/technetwork/topics/security/ovmbulletinoct2016-3090547.html
- http://www.securityfocus.com/bid/82950
- http://www.securitytracker.com/id/1035695
- http://www.ubuntu.com/usn/USN-2929-1
- http://www.ubuntu.com/usn/USN-2929-2
- http://www.ubuntu.com/usn/USN-2930-1
- http://www.ubuntu.com/usn/USN-2930-2
- http://www.ubuntu.com/usn/USN-2930-3
- http://www.ubuntu.com/usn/USN-2932-1
- http://www.ubuntu.com/usn/USN-2948-1
- http://www.ubuntu.com/usn/USN-2948-2
- http://www.ubuntu.com/usn/USN-2967-1
- http://www.ubuntu.com/usn/USN-2967-2
- https://bugzilla.redhat.com/show_bug.cgi?id=1296253
- https://github.com/torvalds/linux/commit/5c17c861a357e9458001f021a7afa7aab9937439
- https://security-tracker.debian.org/tracker/CVE-2016-0723
- https://support.f5.com/csp/article/K43650115
Package kernel-source-lsadrv updated to version 1.2.3-alt1 for branch sisyphus in task 159728.
Closed bugs
Обновить до 1.2.3
Closed vulnerabilities
BDU:2016-00584
Уязвимость браузера Google Chrome, позволяющая нарушителю обойти существующую политику ограничения доступа
Modified: 2025-04-12
CVE-2016-1629
Google Chrome before 48.0.2564.116 allows remote attackers to bypass the Blink Same Origin Policy and a sandbox protection mechanism via unspecified vectors.
- http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_18.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00045.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00047.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00048.html
- http://rhn.redhat.com/errata/RHSA-2016-0286.html
- http://www.debian.org/security/2016/dsa-3486
- http://www.securityfocus.com/bid/83302
- http://www.securitytracker.com/id/1035184
- http://www.ubuntu.com/usn/USN-2905-1
- https://code.google.com/p/chromium/issues/detail?id=583431
- https://security.gentoo.org/glsa/201603-09
- http://googlechromereleases.blogspot.com/2016/02/stable-channel-update_18.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00045.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00047.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00048.html
- http://rhn.redhat.com/errata/RHSA-2016-0286.html
- http://www.debian.org/security/2016/dsa-3486
- http://www.securityfocus.com/bid/83302
- http://www.securitytracker.com/id/1035184
- http://www.ubuntu.com/usn/USN-2905-1
- https://code.google.com/p/chromium/issues/detail?id=583431
- https://security.gentoo.org/glsa/201603-09
Package ipsec-tools updated to version 0.8.2-alt1 for branch sisyphus in task 159787.
Closed vulnerabilities
Modified: 2025-04-12
CVE-2015-4047
racoon/gssapi.c in IPsec-Tools 0.8.2 allows remote attackers to cause a denial of service (NULL pointer dereference and IKE daemon crash) via a series of crafted UDP requests.
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159482.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159549.html
- http://packetstormsecurity.com/files/131992/IPsec-Tools-0.8.2-Denial-Of-Service.html
- http://seclists.org/fulldisclosure/2015/May/81
- http://seclists.org/fulldisclosure/2015/May/83
- http://www.debian.org/security/2015/dsa-3272
- http://www.openwall.com/lists/oss-security/2015/05/20/1
- http://www.openwall.com/lists/oss-security/2015/05/21/11
- http://www.securityfocus.com/bid/74739
- http://www.securitytracker.com/id/1032397
- http://www.ubuntu.com/usn/USN-2623-1
- https://support.f5.com/csp/article/K05013313
- https://www.altsci.com/ipsec/ipsec-tools-sa.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159482.html
- http://lists.fedoraproject.org/pipermail/package-announce/2015-June/159549.html
- http://packetstormsecurity.com/files/131992/IPsec-Tools-0.8.2-Denial-Of-Service.html
- http://seclists.org/fulldisclosure/2015/May/81
- http://seclists.org/fulldisclosure/2015/May/83
- http://www.debian.org/security/2015/dsa-3272
- http://www.openwall.com/lists/oss-security/2015/05/20/1
- http://www.openwall.com/lists/oss-security/2015/05/21/11
- http://www.securityfocus.com/bid/74739
- http://www.securitytracker.com/id/1032397
- http://www.ubuntu.com/usn/USN-2623-1
- https://support.f5.com/csp/article/K05013313
- https://www.altsci.com/ipsec/ipsec-tools-sa.html