——————————————————————————–
Fedora Update Notification
FEDORA-2016-0e7694c456
2016-11-01 08:56:12.224125
——————————————————————————–
Name : libXfixes
Product : Fedora 23
Version : 5.0.3
Release : 1.fc23
URL : http://www.x.org
Summary : X Fixes library
Description :
X Fixes library.
——————————————————————————–
Update Information:
Security fix for CVE-2016-7944
——————————————————————————–
References:
[ 1 ] Bug #1381865 – CVE-2016-7944 libXfixes: Insufficient validation of server responses results in Integer overflow
https://bugzilla.redhat.com/show_bug.cgi?id=1381865
——————————————————————————–
This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade libXfixes’ at the command line.
For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
——————————————————————————–
Fedora Update Notification
FEDORA-2016-d045c2c7b3
2016-11-01 08:56:12.224182
——————————————————————————–
Name : libXrandr
Product : Fedora 23
Version : 1.5.1
Release : 1.fc23
URL : http://www.x.org
Summary : X.Org X11 libXrandr runtime library
Description :
X.Org X11 libXrandr runtime library
——————————————————————————–
Update Information:
Security fix for CVE-2016-7947, CVE-2016-7948
——————————————————————————–
References:
[ 1 ] Bug #1381872 – CVE-2016-7947 libXrandr: Insufficient validation of server responses result in Integer overflows
https://bugzilla.redhat.com/show_bug.cgi?id=1381872
[ 2 ] Bug #1381873 – CVE-2016-7948 libXrandr: Insufficient validation of server responses result in various data mishandlings
https://bugzilla.redhat.com/show_bug.cgi?id=1381873
——————————————————————————–
This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade libXrandr’ at the command line.
For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
——————————————————————————–
Fedora Update Notification
FEDORA-2016-b26b497381
2016-11-01 08:56:12.224255
——————————————————————————–
Name : libXtst
Product : Fedora 23
Version : 1.2.3
Release : 1.fc23
URL : http://www.x.org
Summary : X.Org X11 libXtst runtime library
Description :
X.Org X11 libXtst runtime library
——————————————————————————–
Update Information:
Security fix for CVE-2016-7951, CVE-2016-7952
——————————————————————————–
References:
[ 1 ] Bug #1381919 – CVE-2016-7951 libXtst: Insufficient validation of server responses result in Integer overflows
https://bugzilla.redhat.com/show_bug.cgi?id=1381919
[ 2 ] Bug #1381922 – CVE-2016-7952 libXtst: Insufficient validation of server responses result in various data mishandlings
https://bugzilla.redhat.com/show_bug.cgi?id=1381922
——————————————————————————–
This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade libXtst’ at the command line.
For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
——————————————————————————–
Fedora Update Notification
FEDORA-2016-49d560da23
2016-11-01 08:56:12.224324
——————————————————————————–
Name : libXrender
Product : Fedora 23
Version : 0.9.10
Release : 1.fc23
URL : http://www.x.org
Summary : X.Org X11 libXrender runtime library
Description :
X.Org X11 libXrender runtime library
——————————————————————————–
Update Information:
Security fix for CVE-2016-7949, CVE-2016-7950
——————————————————————————–
References:
[ 1 ] Bug #1381927 – CVE-2016-7949 libXrender: Insufficient validation of server responses results in overflow of previously reserved memory
https://bugzilla.redhat.com/show_bug.cgi?id=1381927
[ 2 ] Bug #1381928 – CVE-2016-7950 libXrender: Insufficient validation of server responses results out-of-bounds write in XRenderQueryFilters
https://bugzilla.redhat.com/show_bug.cgi?id=1381928
——————————————————————————–
This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade libXrender’ at the command line.
For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
——————————————————————————–
Fedora Update Notification
FEDORA-2016-d286ffb801
2016-11-01 08:56:12.224384
——————————————————————————–
Name : libXvMC
Product : Fedora 23
Version : 1.0.10
Release : 1.fc23
URL : http://www.x.org
Summary : X.Org X11 libXvMC runtime library
Description :
X.Org X11 libXvMC runtime library
——————————————————————————–
Update Information:
Security fix for CVE-2016-7953
——————————————————————————–
References:
[ 1 ] Bug #1381933 – CVE-2016-7953 libXvMC: Insufficient validation of server responses results in buffer underflow
https://bugzilla.redhat.com/show_bug.cgi?id=1381933
——————————————————————————–
This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade libXvMC’ at the command line.
For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org
——————————————————————————–
Fedora Update Notification
FEDORA-2016-3b41a9eaa8
2016-11-01 08:56:12.224455
——————————————————————————–
Name : libXv
Product : Fedora 23
Version : 1.0.11
Release : 1.fc23
URL : http://www.x.org
Summary : X.Org X11 libXv runtime library
Description :
X.Org X11 libXv runtime library
——————————————————————————–
Update Information:
Security fix for CVE-2016-5407
——————————————————————————–
References:
[ 1 ] Bug #1381931 – CVE-2016-5407 libXv: Insufficient validation of server responses results in out-of bounds accesses
https://bugzilla.redhat.com/show_bug.cgi?id=1381931
——————————————————————————–
This update can be installed with the “dnf” update program. Use
su -c ‘dnf upgrade libXv’ at the command line.
For more information, refer to the dnf documentation available at
http://dnf.readthedocs.io/en/latest/command_ref.html#upgrade-command-label
All packages are signed with the Fedora Project GPG key. More details on the
GPG keys used by the Fedora Project can be found at
https://fedoraproject.org/keys
——————————————————————————–
_______________________________________________
package-announce mailing list — package-announce@lists.fedoraproject.org
To unsubscribe send an email to package-announce-leave@lists.fedoraproject.org