ALT-BU-2016-3019-1
Branch sisyphus update bulletin.
Package projectlibre updated to version 1.6.2-alt2 for branch sisyphus in task 168917.
Closed bugs
Ошибка при запуске projectlibre
Package libgdk-pixbuf updated to version 2.36.0-alt1 for branch sisyphus in task 169832.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2016-6352
The OneLine32 function in io-ico.c in gdk-pixbuf before 2.35.3 allows remote attackers to cause a denial of service (out-of-bounds write and crash) via crafted dimensions in an ICO file.
- openSUSE-SU-2016:2276
- openSUSE-SU-2016:2276
- [oss-security] 20160713 CVE Request: Write out-of-bounds in gdk-pixbuf 2.30.7
- [oss-security] 20160713 CVE Request: Write out-of-bounds in gdk-pixbuf 2.30.7
- [oss-security] 20160726 Re: CVE Request: Write out-of-bounds in gdk-pixbuf 2.30.7
- [oss-security] 20160726 Re: CVE Request: Write out-of-bounds in gdk-pixbuf 2.30.7
- USN-3085-1
- USN-3085-1
- https://bugzilla.gnome.org/show_bug.cgi?id=769170
- https://bugzilla.gnome.org/show_bug.cgi?id=769170
- https://git.gnome.org/browse/gdk-pixbuf/commit/?id=88af50a864195da1a4f7bda5f02539704fbda599
- https://git.gnome.org/browse/gdk-pixbuf/commit/?id=88af50a864195da1a4f7bda5f02539704fbda599
- https://git.gnome.org/browse/gdk-pixbuf/tree/NEWS?id=640134c46221689d263369872937192e4484c83b
- https://git.gnome.org/browse/gdk-pixbuf/tree/NEWS?id=640134c46221689d263369872937192e4484c83b
- [debian-lts-announce] 20191219 [SECURITY] [DLA 2043-1] gdk-pixbuf security update
- [debian-lts-announce] 20191219 [SECURITY] [DLA 2043-1] gdk-pixbuf security update
Package libwebkitgtk4 updated to version 2.14.0-alt1 for branch sisyphus in task 169832.
Closed vulnerabilities
Modified: 2024-11-21
CVE-2016-4761
WebKitGTK+ before 2.14.0: A use-after-free vulnerability can allow remote attackers to cause a DoS
Closed vulnerabilities
Modified: 2024-11-21
CVE-2016-10727
camel/providers/imapx/camel-imapx-server.c in the IMAPx component in GNOME evolution-data-server before 3.21.2 proceeds with cleartext data containing a password if the client wishes to use STARTTLS but the server will not use STARTTLS, which makes it easier for remote attackers to obtain sensitive information by sniffing the network. The server code was intended to report an error and not proceed, but the code was written incorrectly.
- https://bugzilla.redhat.com/show_bug.cgi?id=1334842
- https://bugzilla.redhat.com/show_bug.cgi?id=1334842
- https://github.com/GNOME/evolution-data-server/releases/tag/EVOLUTION_DATA_SERVER_3_21_2
- https://github.com/GNOME/evolution-data-server/releases/tag/EVOLUTION_DATA_SERVER_3_21_2
- https://gitlab.gnome.org/GNOME/evolution-data-server/blob/master/NEWS#L1022
- https://gitlab.gnome.org/GNOME/evolution-data-server/blob/master/NEWS#L1022
- https://gitlab.gnome.org/GNOME/evolution-data-server/commit/f26a6f67
- https://gitlab.gnome.org/GNOME/evolution-data-server/commit/f26a6f67
- USN-3724-1
- USN-3724-1