ALT-BU-2016-2711-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2025-04-20
CVE-2015-8864
Cross-site scripting (XSS) vulnerability in Roundcube Webmail before 1.0.9 and 1.1.x before 1.1.5 allows remote attackers to inject arbitrary web script or HTML via a crafted SVG, a different vulnerability than CVE-2016-4068.
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00078.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00079.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00095.html
- https://github.com/roundcube/roundcubemail/commit/40d7342dd9c9bd2a1d613edc848ed95a4d71aa18
- https://github.com/roundcube/roundcubemail/issues/4949
- https://github.com/roundcube/roundcubemail/releases/tag/1.0.9
- https://github.com/roundcube/roundcubemail/releases/tag/1.1.5
- https://github.com/roundcube/roundcubemail/wiki/Changelog#release-115
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00078.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00079.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00095.html
- https://github.com/roundcube/roundcubemail/commit/40d7342dd9c9bd2a1d613edc848ed95a4d71aa18
- https://github.com/roundcube/roundcubemail/issues/4949
- https://github.com/roundcube/roundcubemail/releases/tag/1.0.9
- https://github.com/roundcube/roundcubemail/releases/tag/1.1.5
- https://github.com/roundcube/roundcubemail/wiki/Changelog#release-115
Modified: 2025-04-20
CVE-2016-4068
Cross-site scripting (XSS) vulnerability in Roundcube Webmail before 1.0.9 and 1.1.x before 1.1.5 allows remote attackers to inject arbitrary web script or HTML via a crafted SVG, a different vulnerability than CVE-2015-8864.
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00078.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00079.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00095.html
- https://github.com/roundcube/roundcubemail/commit/40d7342dd9c9bd2a1d613edc848ed95a4d71aa18#commitcomment-15294218
- https://github.com/roundcube/roundcubemail/issues/4949
- https://github.com/roundcube/roundcubemail/releases/tag/1.0.9
- https://github.com/roundcube/roundcubemail/releases/tag/1.1.5
- https://github.com/roundcube/roundcubemail/wiki/Changelog#release-115
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00078.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00079.html
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00095.html
- https://github.com/roundcube/roundcubemail/commit/40d7342dd9c9bd2a1d613edc848ed95a4d71aa18#commitcomment-15294218
- https://github.com/roundcube/roundcubemail/issues/4949
- https://github.com/roundcube/roundcubemail/releases/tag/1.0.9
- https://github.com/roundcube/roundcubemail/releases/tag/1.1.5
- https://github.com/roundcube/roundcubemail/wiki/Changelog#release-115
Modified: 2025-04-12
CVE-2016-4069
Cross-site request forgery (CSRF) vulnerability in Roundcube Webmail before 1.1.5 allows remote attackers to hijack the authentication of users for requests that download attachments and cause a denial of service (disk consumption) via unspecified vectors.
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00079.html
- http://www.openwall.com/lists/oss-security/2016/04/23/4
- http://www.securityfocus.com/bid/92654
- https://github.com/roundcube/roundcubemail/commit/4a408843b0ef816daf70a472a02b78cd6073a4d5
- https://github.com/roundcube/roundcubemail/commit/699af1e5206ed9114322adaa3c25c1c969640a53
- https://github.com/roundcube/roundcubemail/issues/4957
- https://github.com/roundcube/roundcubemail/releases/tag/1.1.5
- https://github.com/roundcube/roundcubemail/wiki/Changelog#release-115
- http://lists.opensuse.org/opensuse-updates/2016-08/msg00079.html
- http://www.openwall.com/lists/oss-security/2016/04/23/4
- http://www.securityfocus.com/bid/92654
- https://github.com/roundcube/roundcubemail/commit/4a408843b0ef816daf70a472a02b78cd6073a4d5
- https://github.com/roundcube/roundcubemail/commit/699af1e5206ed9114322adaa3c25c1c969640a53
- https://github.com/roundcube/roundcubemail/issues/4957
- https://github.com/roundcube/roundcubemail/releases/tag/1.1.5
- https://github.com/roundcube/roundcubemail/wiki/Changelog#release-115
Closed bugs
Обновить версию
Closed bugs
Обновить до 3.12
Package NetworkManager updated to version 1.2.0-alt1 for branch sisyphus in task 163679.
Closed vulnerabilities
Modified: 2025-04-12
CVE-2015-0272
GNOME NetworkManager allows remote attackers to cause a denial of service (IPv6 traffic disruption) via a crafted MTU value in an IPv6 Router Advertisement (RA) message, a different vulnerability than CVE-2015-8215.
- http://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=d5fc88e573fa58b93034b04d35a2454f5d28cad9
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/76814
- http://www.ubuntu.com/usn/USN-2792-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1192132
- http://cgit.freedesktop.org/NetworkManager/NetworkManager/commit/?id=d5fc88e573fa58b93034b04d35a2454f5d28cad9
- http://lists.opensuse.org/opensuse-security-announce/2015-11/msg00035.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00005.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00018.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00026.html
- http://lists.opensuse.org/opensuse-security-announce/2015-12/msg00031.html
- http://lists.opensuse.org/opensuse-security-announce/2016-02/msg00013.html
- http://lists.opensuse.org/opensuse-security-announce/2016-08/msg00038.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2015-2719645.html
- http://www.securityfocus.com/bid/76814
- http://www.ubuntu.com/usn/USN-2792-1
- https://bugzilla.redhat.com/show_bug.cgi?id=1192132
Closed bugs
удалите поддержку /lib/udev/devices
Closed vulnerabilities
Modified: 2021-03-23
BDU:2016-01034
Уязвимость программного средства для оптимизации PNG OptiPNG, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
Modified: 2021-03-23
BDU:2016-01035
Уязвимость программного средства для оптимизации PNG OptiPNG, позволяющая нарушителю вызвать отказ в обслуживании или выполнить произвольный код
Modified: 2025-04-12
CVE-2015-7802
gifread.c in gif2png, as used in OptiPNG before 0.7.6, allows remote attackers to cause a denial of service (uninitialized memory read) via a crafted GIF file.
Modified: 2025-04-12
CVE-2016-3981
Heap-based buffer overflow in the bmp_read_rows function in pngxrbmp.c in OptiPNG before 0.7.6 allows remote attackers to cause a denial of service (out-of-bounds read or write access and crash) or possibly execute arbitrary code via a crafted image file.
- http://bugs.fi/media/afl/optipng/1/
- http://lists.opensuse.org/opensuse-updates/2016-04/msg00061.html
- http://lists.opensuse.org/opensuse-updates/2016-04/msg00065.html
- http://www.debian.org/security/2016/dsa-3546
- http://www.ubuntu.com/usn/USN-2951-1
- https://security.gentoo.org/glsa/201608-01
- https://sourceforge.net/p/optipng/bugs/56/
- http://bugs.fi/media/afl/optipng/1/
- http://lists.opensuse.org/opensuse-updates/2016-04/msg00061.html
- http://lists.opensuse.org/opensuse-updates/2016-04/msg00065.html
- http://www.debian.org/security/2016/dsa-3546
- http://www.ubuntu.com/usn/USN-2951-1
- https://security.gentoo.org/glsa/201608-01
- https://sourceforge.net/p/optipng/bugs/56/
Modified: 2025-04-12
CVE-2016-3982
Off-by-one error in the bmp_rle4_fread function in pngxrbmp.c in OptiPNG before 0.7.6 allows remote attackers to cause a denial of service (out-of-bounds read or write access and crash) or possibly execute arbitrary code via a crafted image file, which triggers a heap-based buffer overflow.
- http://bugs.fi/media/afl/optipng/2/
- http://lists.opensuse.org/opensuse-updates/2016-04/msg00061.html
- http://lists.opensuse.org/opensuse-updates/2016-04/msg00065.html
- http://www.debian.org/security/2016/dsa-3546
- http://www.ubuntu.com/usn/USN-2951-1
- https://security.gentoo.org/glsa/201608-01
- https://sourceforge.net/p/optipng/bugs/57/
- http://bugs.fi/media/afl/optipng/2/
- http://lists.opensuse.org/opensuse-updates/2016-04/msg00061.html
- http://lists.opensuse.org/opensuse-updates/2016-04/msg00065.html
- http://www.debian.org/security/2016/dsa-3546
- http://www.ubuntu.com/usn/USN-2951-1
- https://security.gentoo.org/glsa/201608-01
- https://sourceforge.net/p/optipng/bugs/57/