ALT-BU-2016-3178-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Modified: 2025-04-12
CVE-2016-7942
The XGetImage function in X.org libX11 before 1.6.4 might allow remote X servers to gain privileges via vectors involving image type and geometry, which triggers out-of-bounds read operations.
- http://www.openwall.com/lists/oss-security/2016/10/04/2
- http://www.openwall.com/lists/oss-security/2016/10/04/4
- http://www.securityfocus.com/bid/93363
- http://www.securitytracker.com/id/1036945
- https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=8ea762f94f4c942d898fdeb590a1630c83235c17
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GMCVDXMFPXR7QGMKDG22WPPJCXH2X3L7/
- https://lists.x.org/archives/xorg-announce/2016-October/002720.html
- https://security.gentoo.org/glsa/201704-03
- https://usn.ubuntu.com/3758-1/
- https://usn.ubuntu.com/3758-2/
- http://www.openwall.com/lists/oss-security/2016/10/04/2
- http://www.openwall.com/lists/oss-security/2016/10/04/4
- http://www.securityfocus.com/bid/93363
- http://www.securitytracker.com/id/1036945
- https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=8ea762f94f4c942d898fdeb590a1630c83235c17
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GMCVDXMFPXR7QGMKDG22WPPJCXH2X3L7/
- https://lists.x.org/archives/xorg-announce/2016-October/002720.html
- https://security.gentoo.org/glsa/201704-03
- https://usn.ubuntu.com/3758-1/
- https://usn.ubuntu.com/3758-2/
Modified: 2025-04-12
CVE-2016-7943
The XListFonts function in X.org libX11 before 1.6.4 might allow remote X servers to gain privileges via vectors involving length fields, which trigger out-of-bounds write operations.
- http://www.openwall.com/lists/oss-security/2016/10/04/2
- http://www.openwall.com/lists/oss-security/2016/10/04/4
- http://www.securityfocus.com/bid/93362
- http://www.securitytracker.com/id/1036945
- https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=8c29f1607a31dac0911e45a0dd3d74173822b3c9
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GMCVDXMFPXR7QGMKDG22WPPJCXH2X3L7/
- https://lists.x.org/archives/xorg-announce/2016-October/002720.html
- https://security.gentoo.org/glsa/201704-03
- https://usn.ubuntu.com/3758-1/
- https://usn.ubuntu.com/3758-2/
- http://www.openwall.com/lists/oss-security/2016/10/04/2
- http://www.openwall.com/lists/oss-security/2016/10/04/4
- http://www.securityfocus.com/bid/93362
- http://www.securitytracker.com/id/1036945
- https://cgit.freedesktop.org/xorg/lib/libX11/commit/?id=8c29f1607a31dac0911e45a0dd3d74173822b3c9
- https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/GMCVDXMFPXR7QGMKDG22WPPJCXH2X3L7/
- https://lists.x.org/archives/xorg-announce/2016-October/002720.html
- https://security.gentoo.org/glsa/201704-03
- https://usn.ubuntu.com/3758-1/
- https://usn.ubuntu.com/3758-2/
Package perl-DBD-mysql updated to version 4.041-alt1 for branch sisyphus in task 173743.
Closed vulnerabilities
Modified: 2025-04-12
CVE-2016-1251
There is a vulnerability of type use-after-free affecting DBD::mysql (aka DBD-mysql or the Database Interface (DBI) MySQL driver for Perl) 3.x and 4.x before 4.041 when used with mysql_server_prepare=1.
- http://www.openwall.com/lists/oss-security/2016/11/28/2
- http://www.securityfocus.com/bid/94573
- https://anonscm.debian.org/cgit/pkg-perl/packages/libdbd-mysql-perl.git/commit/?id=a8b97e4713391b1f8beffbfddac483c276feaff1
- https://github.com/perl5-dbi/DBD-mysql/commit/3619c170461a3107a258d1fd2d00ed4832adb1b1
- https://security.gentoo.org/glsa/201701-51
- https://tracker.debian.org/news/819888
- http://www.openwall.com/lists/oss-security/2016/11/28/2
- http://www.securityfocus.com/bid/94573
- https://anonscm.debian.org/cgit/pkg-perl/packages/libdbd-mysql-perl.git/commit/?id=a8b97e4713391b1f8beffbfddac483c276feaff1
- https://github.com/perl5-dbi/DBD-mysql/commit/3619c170461a3107a258d1fd2d00ed4832adb1b1
- https://security.gentoo.org/glsa/201701-51
- https://tracker.debian.org/news/819888
Closed bugs
Вышла версия 1.1.1
Closed vulnerabilities
Modified: 2025-04-12
CVE-2016-9920
steps/mail/sendmail.inc in Roundcube before 1.1.7 and 1.2.x before 1.2.3, when no SMTP server is configured and the sendmail program is enabled, does not properly restrict the use of custom envelope-from addresses on the sendmail command line, which allows remote authenticated users to execute arbitrary code via a modified HTTP request that sends a crafted e-mail message.
- http://www.openwall.com/lists/oss-security/2016/12/08/10
- http://www.securityfocus.com/bid/94858
- https://blog.ripstech.com/2016/roundcube-command-execution-via-email/
- https://roundcube.net/news/2016/11/28/updates-1.2.3-and-1.1.7-released
- https://security.gentoo.org/glsa/201612-44
- http://www.openwall.com/lists/oss-security/2016/12/08/10
- http://www.securityfocus.com/bid/94858
- https://blog.ripstech.com/2016/roundcube-command-execution-via-email/
- https://roundcube.net/news/2016/11/28/updates-1.2.3-and-1.1.7-released
- https://security.gentoo.org/glsa/201612-44
Closed bugs
verify_rpath when both RUNPATH and RPATH are set
Package xfce4-session updated to version 4.12.1-alt4 for branch sisyphus in task 173804.
Closed bugs
Разные поля Exec