Category Archives: Ubuntu

Ubuntu Security Notices

USN-3139-1: Vim vulnerability

Ubuntu Security Notice USN-3139-1

28th November, 2016

vim vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 16.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

Vim could be made to run programs as your login if it opened a specially
crafted file.

Software description

  • vim
    – Vi IMproved – enhanced vi editor

Details

Florian Larysch discovered that the Vim text editor did not properly
validate values for the ‘filetype’, ‘syntax’, and ‘keymap’ options. An
attacker could trick a user into opening a file with specially crafted
modelines and possibly execute arbitrary code with the user’s privileges.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 16.10:
vim-common

2:7.4.1829-1ubuntu2.1
vim-runtime

2:7.4.1829-1ubuntu2.1
vim-gui-common

2:7.4.1829-1ubuntu2.1
vim

2:7.4.1829-1ubuntu2.1
Ubuntu 16.04 LTS:
vim-common

2:7.4.1689-3ubuntu1.2
vim-runtime

2:7.4.1689-3ubuntu1.2
vim-gui-common

2:7.4.1689-3ubuntu1.2
vim

2:7.4.1689-3ubuntu1.2
Ubuntu 14.04 LTS:
vim-common

2:7.4.052-1ubuntu3.1
vim-runtime

2:7.4.052-1ubuntu3.1
vim-gui-common

2:7.4.052-1ubuntu3.1
vim

2:7.4.052-1ubuntu3.1
Ubuntu 12.04 LTS:
vim-common

2:7.3.429-2ubuntu2.2
vim-runtime

2:7.3.429-2ubuntu2.2
vim-gui-common

2:7.3.429-2ubuntu2.2
vim

2:7.3.429-2ubuntu2.2

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart Vim to make
all the necessary changes.

References

CVE-2016-1248

USN-3138-1: python-cryptography vulnerability

Ubuntu Security Notice USN-3138-1

28th November, 2016

python-cryptography vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 16.10
  • Ubuntu 16.04 LTS

Summary

python-cryptography could generate incorrect keys.

Software description

  • python-cryptography
    – Cryptography Python library

Details

Markus Döring discovered that python-cryptography incorrectly handled
certain HKDF lengths. This could result in python-cryptography returning an
empty string instead of the expected derived key.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 16.10:
python3-cryptography

1.5-2ubuntu0.1
python-cryptography

1.5-2ubuntu0.1
Ubuntu 16.04 LTS:
python3-cryptography

1.2.3-1ubuntu0.1
python-cryptography

1.2.3-1ubuntu0.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2016-9243

USN-3136-1: LXC vulnerability

Ubuntu Security Notice USN-3136-1

23rd November, 2016

lxc vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 16.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS

Summary

LXC could be made to allow containers to access to the host filesystem.

Software description

  • lxc
    – Linux Containers userspace tools

Details

Roman Fiedler discovered a directory traversal flaw in lxc-attach. An
attacker with access to an LXC container could exploit this flaw to access
files outside of the container.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 16.10:
lxc1

2.0.5-0ubuntu1.2
liblxc1

2.0.5-0ubuntu1.2
Ubuntu 16.04 LTS:
lxc1

2.0.5-0ubuntu1~ubuntu16.04.3
liblxc1

2.0.5-0ubuntu1~ubuntu16.04.3
Ubuntu 14.04 LTS:
lxc

1.0.8-0ubuntu0.4
liblxc1

1.0.8-0ubuntu0.4

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2016-8649

USN-3137-1: MoinMoin vulnerabilities

Ubuntu Security Notice USN-3137-1

23rd November, 2016

moin vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 16.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

Several security issues were fixed in MoinMoin.

Software description

  • moin
    – Collaborative hypertext environment

Details

It was discovered that MoinMoin did not properly sanitize certain inputs,
resulting in cross-site scripting (XSS) vulnerabilities. With cross-site
scripting vulnerabilities, if a user were tricked into viewing server
output during a crafted server request, a remote attacker could exploit
this to modify the contents, or steal confidential data, within the same
domain.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 16.10:
python-moinmoin

1.9.8-1ubuntu1.16.10.1
Ubuntu 16.04 LTS:
python-moinmoin

1.9.8-1ubuntu1.16.04.1
Ubuntu 14.04 LTS:
python-moinmoin

1.9.7-1ubuntu2.1
Ubuntu 12.04 LTS:
python-moinmoin

1.9.3-1ubuntu2.3

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2016-7146,

CVE-2016-7148,

CVE-2016-9119

USN-3135-1: GStreamer Good Plugins vulnerability

Ubuntu Security Notice USN-3135-1

22nd November, 2016

gst-plugins-good0.10, gst-plugins-good1.0 vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 16.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

GStreamer could be made to crash or run programs as your login if it
opened a specially crafted file.

Software description

  • gst-plugins-good0.10
    – GStreamer plugins

  • gst-plugins-good1.0
    – GStreamer plugins

Details

Chris Evans discovered that GStreamer Good Plugins did not correctly handle
malformed FLC movie files. If a user were tricked into opening a crafted
FLC movie file with a GStreamer application, an attacker could cause a
denial of service via application crash, or execute arbitrary code with the
privileges of the user invoking the program.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 16.10:
gstreamer1.0-plugins-good

1.8.3-1ubuntu1.1
Ubuntu 16.04 LTS:
gstreamer1.0-plugins-good

1.8.2-1ubuntu0.2
Ubuntu 14.04 LTS:
gstreamer0.10-plugins-good

0.10.31-3+nmu1ubuntu5.1
gstreamer1.0-plugins-good

1.2.4-1~ubuntu1.1
Ubuntu 12.04 LTS:
gstreamer0.10-plugins-good

0.10.31-1ubuntu1.3

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

LP: 1643901

USN-3134-1: Python vulnerabilities

Ubuntu Security Notice USN-3134-1

22nd November, 2016

python2.7, python3.2, python3.4, python3.5 vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

Several security issues were fixed in Python.

Software description

  • python2.7
    – An interactive high-level object-oriented language

  • python3.2
    – An interactive high-level object-oriented language

  • python3.4
    – An interactive high-level object-oriented language

  • python3.5
    – An interactive high-level object-oriented language

Details

It was discovered that the smtplib library in Python did not return an
error when StartTLS fails. A remote attacker could possibly use this to
expose sensitive information. (CVE-2016-0772)

Rémi Rampin discovered that Python would not protect CGI applications
from contents of the HTTP_PROXY environment variable when based on
the contents of the Proxy header from HTTP requests. A remote attacker
could possibly use this to cause a CGI application to redirect outgoing
HTTP requests. (CVE-2016-1000110)

Insu Yun discovered an integer overflow in the zipimporter module in
Python that could lead to a heap-based overflow. An attacker could
use this to craft a special zip file that when read by Python could
possibly execute arbitrary code. (CVE-2016-5636)

Guido Vranken discovered that the urllib modules in Python did
not properly handle carriage return line feed (CRLF) in headers. A
remote attacker could use this to craft URLs that inject arbitrary
HTTP headers. This issue only affected Ubuntu 12.04 LTS and Ubuntu
14.04 LTS. (CVE-2016-5699)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 16.04 LTS:
libpython2.7-minimal

2.7.12-1ubuntu0~16.04.1
libpython3.5-stdlib

3.5.2-2ubuntu0~16.04.1
libpython2.7

2.7.12-1ubuntu0~16.04.1
libpython3.5-minimal

3.5.2-2ubuntu0~16.04.1
python2.7

2.7.12-1ubuntu0~16.04.1
python2.7-minimal

2.7.12-1ubuntu0~16.04.1
python3.5

3.5.2-2ubuntu0~16.04.1
python3.5-minimal

3.5.2-2ubuntu0~16.04.1
libpython3.5

3.5.2-2ubuntu0~16.04.1
libpython2.7-stdlib

2.7.12-1ubuntu0~16.04.1
Ubuntu 14.04 LTS:
libpython2.7-minimal

2.7.6-8ubuntu0.3
libpython2.7

2.7.6-8ubuntu0.3
python2.7

2.7.6-8ubuntu0.3
python3.4-minimal

3.4.3-1ubuntu1~14.04.5
python2.7-minimal

2.7.6-8ubuntu0.3
python3.4

3.4.3-1ubuntu1~14.04.5
libpython3.4-minimal

3.4.3-1ubuntu1~14.04.5
libpython3.4

3.4.3-1ubuntu1~14.04.5
libpython2.7-stdlib

2.7.6-8ubuntu0.3
libpython3.4-stdlib

3.4.3-1ubuntu1~14.04.5
Ubuntu 12.04 LTS:
libpython2.7

2.7.3-0ubuntu3.9
python2.7

2.7.3-0ubuntu3.9
python2.7-minimal

2.7.3-0ubuntu3.9
python3.2

3.2.3-0ubuntu3.8
python3.2-minimal

3.2.3-0ubuntu3.8
libpython3.2

3.2.3-0ubuntu3.8

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart any Python
applications to make all the necessary changes.

References

CVE-2016-0772,

CVE-2016-1000110,

CVE-2016-5636,

CVE-2016-5699

USN-3132-1: tar vulnerability

Ubuntu Security Notice USN-3132-1

21st November, 2016

tar vulnerability

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 16.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

tar could be made to overwrite files.

Software description

  • tar
    – GNU version of the tar archiving utility

Details

Harry Sintonen discovered that tar incorrectly handled extracting files
when path names are specified on the command line. If a user or automated
system were tricked into processing a specially crafted archive, an
attacker could possibly overwrite arbitrary files.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 16.10:
tar

1.29b-1ubuntu0.1
Ubuntu 16.04 LTS:
tar

1.28-2.1ubuntu0.1
Ubuntu 14.04 LTS:
tar

1.27.1-1ubuntu0.1
Ubuntu 12.04 LTS:
tar

1.26-4ubuntu1.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2016-6321

USN-3131-1: ImageMagick vulnerabilities

Ubuntu Security Notice USN-3131-1

21st November, 2016

imagemagick vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 16.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

Several security issues were fixed in ImageMagick.

Software description

  • imagemagick
    – Image manipulation programs and library

Details

It was discovered that ImageMagick incorrectly handled certain malformed
image files. If a user or automated system using ImageMagick were tricked
into opening a specially crafted image, an attacker could exploit this to
cause a denial of service or possibly execute code with the privileges of
the user invoking the program.

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 16.10:
libmagick++-6.q16-5v5

8:6.8.9.9-7ubuntu8.1
imagemagick

8:6.8.9.9-7ubuntu8.1
libmagickcore-6.q16-2-extra

8:6.8.9.9-7ubuntu8.1
imagemagick-6.q16

8:6.8.9.9-7ubuntu8.1
libmagickcore-6.q16-2

8:6.8.9.9-7ubuntu8.1
Ubuntu 16.04 LTS:
libmagick++-6.q16-5v5

8:6.8.9.9-7ubuntu5.2
imagemagick

8:6.8.9.9-7ubuntu5.2
libmagickcore-6.q16-2-extra

8:6.8.9.9-7ubuntu5.2
imagemagick-6.q16

8:6.8.9.9-7ubuntu5.2
libmagickcore-6.q16-2

8:6.8.9.9-7ubuntu5.2
Ubuntu 14.04 LTS:
libmagick++5

8:6.7.7.10-6ubuntu3.2
libmagickcore5-extra

8:6.7.7.10-6ubuntu3.2
libmagickcore5

8:6.7.7.10-6ubuntu3.2
imagemagick

8:6.7.7.10-6ubuntu3.2
Ubuntu 12.04 LTS:
libmagick++4

8:6.6.9.7-5ubuntu3.5
libmagickcore4

8:6.6.9.7-5ubuntu3.5
imagemagick

8:6.6.9.7-5ubuntu3.5
libmagickcore4-extra

8:6.6.9.7-5ubuntu3.5

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

In general, a standard system update will make all the necessary changes.

References

CVE-2014-8354,

CVE-2014-8355,

CVE-2014-8562,

CVE-2014-8716,

CVE-2014-9805,

CVE-2014-9806,

CVE-2014-9807,

CVE-2014-9808,

CVE-2014-9809,

CVE-2014-9810,

CVE-2014-9811,

CVE-2014-9812,

CVE-2014-9813,

CVE-2014-9814,

CVE-2014-9815,

CVE-2014-9816,

CVE-2014-9817,

CVE-2014-9818,

CVE-2014-9819,

CVE-2014-9820,

CVE-2014-9821,

CVE-2014-9822,

CVE-2014-9823,

CVE-2014-9826,

CVE-2014-9828,

CVE-2014-9829,

CVE-2014-9830,

CVE-2014-9831,

CVE-2014-9833,

CVE-2014-9834,

CVE-2014-9835,

CVE-2014-9836,

CVE-2014-9837,

CVE-2014-9838,

CVE-2014-9839,

CVE-2014-9840,

CVE-2014-9841,

CVE-2014-9843,

CVE-2014-9844,

CVE-2014-9845,

CVE-2014-9846,

CVE-2014-9847,

CVE-2014-9848,

CVE-2014-9849,

CVE-2014-9850,

CVE-2014-9851,

CVE-2014-9853,

CVE-2014-9854,

CVE-2014-9907,

CVE-2015-8894,

CVE-2015-8895,

CVE-2015-8896,

CVE-2015-8897,

CVE-2015-8898,

CVE-2015-8900,

CVE-2015-8901,

CVE-2015-8902,

CVE-2015-8903,

CVE-2015-8957,

CVE-2015-8958,

CVE-2015-8959,

CVE-2016-4562,

CVE-2016-4563,

CVE-2016-4564,

CVE-2016-5010,

CVE-2016-5687,

CVE-2016-5688,

CVE-2016-5689,

CVE-2016-5690,

CVE-2016-5691,

CVE-2016-5841,

CVE-2016-5842,

CVE-2016-6491,

CVE-2016-6823,

CVE-2016-7101,

CVE-2016-7513,

CVE-2016-7514,

CVE-2016-7515,

CVE-2016-7516,

CVE-2016-7517,

CVE-2016-7518,

CVE-2016-7519,

CVE-2016-7520,

CVE-2016-7521,

CVE-2016-7522,

CVE-2016-7523,

CVE-2016-7524,

CVE-2016-7525,

CVE-2016-7526,

CVE-2016-7527,

CVE-2016-7528,

CVE-2016-7529,

CVE-2016-7530,

CVE-2016-7531,

CVE-2016-7532,

CVE-2016-7533,

CVE-2016-7534,

CVE-2016-7535,

CVE-2016-7536,

CVE-2016-7537,

CVE-2016-7538,

CVE-2016-7539,

CVE-2016-7540

USN-3124-1: Firefox vulnerabilities

Ubuntu Security Notice USN-3124-1

18th November, 2016

firefox vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 16.10
  • Ubuntu 16.04 LTS
  • Ubuntu 14.04 LTS
  • Ubuntu 12.04 LTS

Summary

Firefox could be made to crash or run programs as your login if it
opened a malicious website.

Software description

  • firefox
    – Mozilla Open Source web browser

Details

Christian Holler, Andrew McCreight, Dan Minor, Tyson Smith, Jon Coppeard,
Jan-Ivar Bruaroey, Jesse Ruderman, Markus Stange, Olli Pettay, Ehsan
Akhgari, Gary Kwong, Tooru Fujisawa, and Randell Jesup discovered multiple
memory safety issues in Firefox. If a user were tricked in to opening a
specially crafted website, an attacker could potentially exploit these to
cause a denial of service via application crash, or execute arbitrary
code. (CVE-2016-5289, CVE-2016-5290)

A same-origin policy bypass was discovered with local HTML files in some
circumstances. An attacker could potentially exploit this to obtain
sensitive information. (CVE-2016-5291)

A crash was discovered when parsing URLs in some circumstances. If a user
were tricked in to opening a specially crafted website, an attacker could
potentially exploit this to execute arbitrary code. (CVE-2016-5292)

A heap buffer-overflow was discovered in Cairo when processing SVG
content. If a user were tricked in to opening a specially crafted website,
an attacker could potentially exploit this to cause a denial of service
via application crash, or execute arbitrary code. (CVE-2016-5296)

An error was discovered in argument length checking in Javascript. If a
user were tricked in to opening a specially crafted website, an attacker
could potentially exploit this to cause a denial of service via
application crash, or execute arbitrary code. (CVE-2016-5297)

An integer overflow was discovered in the Expat library. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit this to cause a denial of service via application
crash. (CVE-2016-9063)

It was discovered that addon updates failed to verify that the addon ID
inside the signed package matched the ID of the addon being updated.
An attacker that could perform a man-in-the-middle (MITM) attack could
potentially exploit this to provide malicious addon updates.
(CVE-2016-9064)

A buffer overflow was discovered in nsScriptLoadHandler. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit this to cause a denial of service via application
crash, or execute arbitrary code. (CVE-2016-9066)

2 use-after-free bugs were discovered during DOM operations in some
circumstances. If a user were tricked in to opening a specially crafted
website, an attacker could potentially exploit these to cause a denial of
service via application crash, or execute arbitrary code. (CVE-2016-9067,
CVE-2016-9069)

A heap use-after-free was discovered during web animations in some
circumstances. If a user were tricked in to opening a specially crafted
website, an attacker could potentially exploit this to cause a denial of
service via application crash, or execute arbitrary code. (CVE-2016-9068)

It was discovered that a page loaded in to the sidebar through a bookmark
could reference a privileged chrome window. An attacker could potentially
exploit this to bypass same origin restrictions. (CVE-2016-9070)

An issue was discovered with Content Security Policy (CSP) in combination
with HTTP to HTTPS redirection. An attacker could potentially exploit this
to verify whether a site is within the user’s browsing history.
(CVE-2016-9071)

An issue was discovered with the windows.create() WebExtensions API. If a
user were tricked in to installing a malicious extension, an attacker
could potentially exploit this to escape the WebExtensions sandbox.
(CVE-2016-9073)

It was discovered that WebExtensions can use the mozAddonManager API. An
attacker could potentially exploit this to install additional extensions
without user permission. (CVE-2016-9075)

It was discovered that <select> element dropdown menus can cover location
bar content when e10s is enabled. An attacker could potentially exploit
this to conduct UI spoofing attacks. (CVE-2016-9076)

It was discovered that canvas allows the use of the feDisplacementMap
filter on cross-origin images. An attacker could potentially exploit this
to conduct timing attacks. (CVE-2016-9077)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 16.10:
firefox

50.0+build2-0ubuntu0.16.10.2
Ubuntu 16.04 LTS:
firefox

50.0+build2-0ubuntu0.16.04.2
Ubuntu 14.04 LTS:
firefox

50.0+build2-0ubuntu0.14.04.2
Ubuntu 12.04 LTS:
firefox

50.0+build2-0ubuntu0.12.04.2

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart Firefox to make
all the necessary changes.

References

CVE-2016-5289,

CVE-2016-5290,

CVE-2016-5291,

CVE-2016-5292,

CVE-2016-5296,

CVE-2016-5297,

CVE-2016-9063,

CVE-2016-9064,

CVE-2016-9066,

CVE-2016-9067,

CVE-2016-9068,

CVE-2016-9069,

CVE-2016-9070,

CVE-2016-9071,

CVE-2016-9073,

CVE-2016-9075,

CVE-2016-9076,

CVE-2016-9077

USN-3130-1: OpenJDK 7 vulnerabilities

Ubuntu Security Notice USN-3130-1

17th November, 2016

openjdk-7 vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 14.04 LTS

Summary

Several security issues were fixed in OpenJDK 7.

Software description

  • openjdk-7
    – Open Source Java implementation

Details

It was discovered that OpenJDK did not restrict the set of algorithms used
for Jar integrity verification. An attacker could use this to modify
without detection the content of a JAR file, affecting system integrity.
(CVE-2016-5542)

It was discovered that the JMX component of OpenJDK did not sufficiently
perform classloader consistency checks. An attacker could use this to
bypass Java sandbox restrictions. (CVE-2016-5554)

It was discovered that the Hotspot component of OpenJDK did not properly
check received Java Debug Wire Protocol (JDWP) packets. An attacker could
use this to send debugging commands to a Java application with debugging
enabled. (CVE-2016-5573)

It was discovered that the Hotspot component of OpenJDK did not properly
check arguments of the System.arraycopy() function in certain cases. An
attacker could use this to bypass Java sandbox restrictions.
(CVE-2016-5582)

It was discovered that OpenJDK did not properly handle HTTP proxy
authentication. An attacker could use this to expose HTTPS server
authentication credentials. (CVE-2016-5597)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 14.04 LTS:
openjdk-7-jre-lib

7u121-2.6.8-1ubuntu0.14.04.1
openjdk-7-jre-zero

7u121-2.6.8-1ubuntu0.14.04.1
icedtea-7-jre-jamvm

7u121-2.6.8-1ubuntu0.14.04.1
openjdk-7-jre-headless

7u121-2.6.8-1ubuntu0.14.04.1
openjdk-7-jre

7u121-2.6.8-1ubuntu0.14.04.1

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart any Java
applications or applets to make all the necessary changes.

References

CVE-2016-5542,

CVE-2016-5554,

CVE-2016-5573,

CVE-2016-5582,

CVE-2016-5597