You are here
Home > Preporuke > Sigurnosni nedostaci više Xorg programskih biblioteka

Sigurnosni nedostaci više Xorg programskih biblioteka

  • Detalji os-a: WN7
  • Važnost: IMP
  • Operativni sustavi: L
  • Kategorije: LFE

——————————————————————————–
Fedora Update Notification
FEDORA-2016-0e7694c456
2016-11-01 08:56:12.224125
——————————————————————————–

Name : libXfixes
Product : Fedora 23
Version : 5.0.3
Release : 1.fc23
URL : http://www.x.org
Summary : X Fixes library
Description :
X Fixes library.

——————————————————————————–
Update Information:

Security fix for CVE-2016-7944
——————————————————————————–
References:

[ 1 ] Bug #1381865 – CVE-2016-7944 libXfixes: Insufficient validation of server responses results in Integer overflow
https://bugzilla.redhat.com/show_bug.cgi?id=1381865
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade libXfixes’ at the command line.
For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

——————————————————————————–
Fedora Update Notification
FEDORA-2016-d045c2c7b3
2016-11-01 08:56:12.224182
——————————————————————————–

Name : libXrandr
Product : Fedora 23
Version : 1.5.1
Release : 1.fc23
URL : http://www.x.org
Summary : X.Org X11 libXrandr runtime library
Description :
X.Org X11 libXrandr runtime library

——————————————————————————–
Update Information:

Security fix for CVE-2016-7947, CVE-2016-7948
——————————————————————————–
References:

[ 1 ] Bug #1381872 – CVE-2016-7947 libXrandr: Insufficient validation of server responses result in Integer overflows
https://bugzilla.redhat.com/show_bug.cgi?id=1381872
[ 2 ] Bug #1381873 – CVE-2016-7948 libXrandr: Insufficient validation of server responses result in various data mishandlings
https://bugzilla.redhat.com/show_bug.cgi?id=1381873
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade libXrandr’ at the command line.
For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

——————————————————————————–
Fedora Update Notification
FEDORA-2016-b26b497381
2016-11-01 08:56:12.224255
——————————————————————————–

Name : libXtst
Product : Fedora 23
Version : 1.2.3
Release : 1.fc23
URL : http://www.x.org
Summary : X.Org X11 libXtst runtime library
Description :
X.Org X11 libXtst runtime library

——————————————————————————–
Update Information:

Security fix for CVE-2016-7951, CVE-2016-7952
——————————————————————————–
References:

[ 1 ] Bug #1381919 – CVE-2016-7951 libXtst: Insufficient validation of server responses result in Integer overflows
https://bugzilla.redhat.com/show_bug.cgi?id=1381919
[ 2 ] Bug #1381922 – CVE-2016-7952 libXtst: Insufficient validation of server responses result in various data mishandlings
https://bugzilla.redhat.com/show_bug.cgi?id=1381922
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade libXtst’ at the command line.
For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

——————————————————————————–
Fedora Update Notification
FEDORA-2016-49d560da23
2016-11-01 08:56:12.224324
——————————————————————————–

Name : libXrender
Product : Fedora 23
Version : 0.9.10
Release : 1.fc23
URL : http://www.x.org
Summary : X.Org X11 libXrender runtime library
Description :
X.Org X11 libXrender runtime library

——————————————————————————–
Update Information:

Security fix for CVE-2016-7949, CVE-2016-7950
——————————————————————————–
References:

[ 1 ] Bug #1381927 – CVE-2016-7949 libXrender: Insufficient validation of server responses results in overflow of previously reserved memory
https://bugzilla.redhat.com/show_bug.cgi?id=1381927
[ 2 ] Bug #1381928 – CVE-2016-7950 libXrender: Insufficient validation of server responses results out-of-bounds write in XRenderQueryFilters
https://bugzilla.redhat.com/show_bug.cgi?id=1381928
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade libXrender’ at the command line.
For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

——————————————————————————–
Fedora Update Notification
FEDORA-2016-d286ffb801
2016-11-01 08:56:12.224384
——————————————————————————–

Name : libXvMC
Product : Fedora 23
Version : 1.0.10
Release : 1.fc23
URL : http://www.x.org
Summary : X.Org X11 libXvMC runtime library
Description :
X.Org X11 libXvMC runtime library

——————————————————————————–
Update Information:

Security fix for CVE-2016-7953
——————————————————————————–
References:

[ 1 ] Bug #1381933 – CVE-2016-7953 libXvMC: Insufficient validation of server responses results in buffer underflow
https://bugzilla.redhat.com/show_bug.cgi?id=1381933
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade libXvMC’ at the command line.
For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

——————————————————————————–
Fedora Update Notification
FEDORA-2016-3b41a9eaa8
2016-11-01 08:56:12.224455
——————————————————————————–

Name : libXv
Product : Fedora 23
Version : 1.0.11
Release : 1.fc23
URL : http://www.x.org
Summary : X.Org X11 libXv runtime library
Description :
X.Org X11 libXv runtime library

——————————————————————————–
Update Information:

Security fix for CVE-2016-5407
——————————————————————————–
References:

[ 1 ] Bug #1381931 – CVE-2016-5407 libXv: Insufficient validation of server responses results in out-of bounds accesses
https://bugzilla.redhat.com/show_bug.cgi?id=1381931
——————————————————————————–

This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade libXv’ at the command line.
For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label

All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org

AutorTomislav Protega
Cert idNCERT-REF-2016-11-0021-ADV
CveCERT-CVE-DUMMY
ID izvornikaCERT-ORIGID-DUMMY
ProizvodCERT-DUMMY-PRODUCT
Izvorhttp://www.adobe.com/
Top
More in Preporuke
Ranjivost programskog paketa bind

Otkrivena je ranjivost u programskom paketu bind za RHEL 5 i 6 uzrokovana neispravnim upravljanjem rekurzivnih odgovora s DNAME zapisom...

Close