2017-02-09
ALT-BU-2017-2925-1
Branch sisyphus update bulletin.
Closed vulnerabilities
Published: 2017-03-16
Modified: 2025-04-20
Modified: 2025-04-20
CVE-2016-10187
The E-book viewer in calibre before 2.75 allows remote attackers to read arbitrary files via a crafted epub file with JavaScript.
Severity: MEDIUM (4.3)
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N
Severity: MEDIUM (5.5)
Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N
References:
- http://www.openwall.com/lists/oss-security/2017/01/29/8
- http://www.openwall.com/lists/oss-security/2017/01/31/9
- http://www.securityfocus.com/bid/95909
- https://bugs.launchpad.net/calibre/+bug/1651728
- https://github.com/kovidgoyal/calibre/commit/3a89718664cb8c
- http://www.openwall.com/lists/oss-security/2017/01/29/8
- http://www.openwall.com/lists/oss-security/2017/01/31/9
- http://www.securityfocus.com/bid/95909
- https://bugs.launchpad.net/calibre/+bug/1651728
- https://github.com/kovidgoyal/calibre/commit/3a89718664cb8c
Closed vulnerabilities
Published: 2019-01-16
Modified: 2024-11-21
Modified: 2024-11-21
CVE-2017-3135
Under some conditions when using both DNS64 and RPZ to rewrite query responses, query processing can resume in an inconsistent state leading to either an INSIST assertion failure or an attempt to read through a NULL pointer. Affects BIND 9.8.8, 9.9.3-S1 -> 9.9.9-S7, 9.9.3 -> 9.9.9-P5, 9.9.10b1, 9.10.0 -> 9.10.4-P5, 9.10.5b1, 9.11.0 -> 9.11.0-P2, 9.11.1b1.
Severity: MEDIUM (4.3)
Vector: AV:N/AC:M/Au:N/C:N/I:N/A:P
Severity: MEDIUM (5.9)
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H
References:
- http://rhn.redhat.com/errata/RHSA-2017-0276.html
- http://www.securityfocus.com/bid/96150
- http://www.securitytracker.com/id/1037801
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03747en_us
- https://kb.isc.org/docs/aa-01453
- https://security.gentoo.org/glsa/201708-01
- https://security.netapp.com/advisory/ntap-20180926-0005/
- https://www.debian.org/security/2017/dsa-3795
- http://rhn.redhat.com/errata/RHSA-2017-0276.html
- http://www.securityfocus.com/bid/96150
- http://www.securitytracker.com/id/1037801
- https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbux03747en_us
- https://kb.isc.org/docs/aa-01453
- https://security.gentoo.org/glsa/201708-01
- https://security.netapp.com/advisory/ntap-20180926-0005/
- https://www.debian.org/security/2017/dsa-3795