ALT-BU-2016-2945-1
Branch p8 update bulletin.
Closed vulnerabilities
Modified: 2025-04-12
CVE-2016-6855
Eye of GNOME (aka eog) 3.16.5, 3.17.x, 3.18.x before 3.18.3, 3.19.x, and 3.20.x before 3.20.4, when used with glib before 2.44.1, allow remote attackers to cause a denial of service (out-of-bounds write and crash) via vectors involving passing invalid UTF-8 to GMarkup.
- http://lists.opensuse.org/opensuse-updates/2016-09/msg00021.html
- http://packetstormsecurity.com/files/138486/Gnome-Eye-Of-Gnome-3.10.2-Out-Of-Bounds-Write.html
- http://www.securityfocus.com/bid/92616
- http://www.ubuntu.com/usn/USN-3069-1
- https://bugzilla.gnome.org/show_bug.cgi?id=770143
- https://git.gnome.org/browse/eog/commit/?id=e99a8c00f959652fe7c10e2fa5a3a7a5c25e6af4
- https://git.gnome.org/browse/eog/plain/NEWS?h=3.16.5
- https://git.gnome.org/browse/eog/plain/NEWS?h=3.18.3
- https://git.gnome.org/browse/eog/plain/NEWS?h=3.20.4
- https://lists.debian.org/debian-lts-announce/2020/04/msg00018.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JVINHHR6VJKXTYYMAYKN5GROKHVT4UKB/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T6GFDHLNPUG7JHWM3QLXQNRA7NZGU2KI/
- https://www.exploit-db.com/exploits/40291/
- http://lists.opensuse.org/opensuse-updates/2016-09/msg00021.html
- http://packetstormsecurity.com/files/138486/Gnome-Eye-Of-Gnome-3.10.2-Out-Of-Bounds-Write.html
- http://www.securityfocus.com/bid/92616
- http://www.ubuntu.com/usn/USN-3069-1
- https://bugzilla.gnome.org/show_bug.cgi?id=770143
- https://git.gnome.org/browse/eog/commit/?id=e99a8c00f959652fe7c10e2fa5a3a7a5c25e6af4
- https://git.gnome.org/browse/eog/plain/NEWS?h=3.16.5
- https://git.gnome.org/browse/eog/plain/NEWS?h=3.18.3
- https://git.gnome.org/browse/eog/plain/NEWS?h=3.20.4
- https://lists.debian.org/debian-lts-announce/2020/04/msg00018.html
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/JVINHHR6VJKXTYYMAYKN5GROKHVT4UKB/
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/T6GFDHLNPUG7JHWM3QLXQNRA7NZGU2KI/
- https://www.exploit-db.com/exploits/40291/
Closed bugs
Не запускается mypaint
Closed vulnerabilities
Modified: 2025-04-20
CVE-2016-10124
An issue was discovered in Linux Containers (LXC) before 2016-02-22. When executing a program via lxc-attach, the nonpriv session can escape to the parent session by using the TIOCSTI ioctl to push characters into the terminal's input buffer, allowing an attacker to escape the container.
- http://www.openwall.com/lists/oss-security/2014/12/15/5
- http://www.openwall.com/lists/oss-security/2015/09/03/5
- http://www.securityfocus.com/bid/95404
- https://github.com/lxc/lxc/commit/e986ea3dfa4a2957f71ae9bfaed406dd6e1ffff6
- https://security.gentoo.org/glsa/201711-09
- http://www.openwall.com/lists/oss-security/2014/12/15/5
- http://www.openwall.com/lists/oss-security/2015/09/03/5
- http://www.securityfocus.com/bid/95404
- https://github.com/lxc/lxc/commit/e986ea3dfa4a2957f71ae9bfaed406dd6e1ffff6
- https://security.gentoo.org/glsa/201711-09
Modified: 2024-11-21
CVE-2017-18641
In LXC 2.0, many template scripts download code over cleartext HTTP, and omit a digital-signature check, before running it to bootstrap containers.