| |||
![]()
|
![]() ![]() |
![]()
Security advisories for Tuesday Arch Linux has updated curl (three vulnerabilities). Debian has updated chromium-browser (multiple vulnerabilities) and fontconfig (privilege escalation). Debian-LTS has updated libreoffice (code execution) and python-django (rebase to 1.4.x). Fedora has updated bind99 (F23: denial of service), ca-certificates (F23: certificate update), dhcp (F23: denial of service), dnsmasq (F23: denial of service), flex (F24: buffer overflow), fontconfig (F24: privilege escalation), kernel (F24; F23: two vulnerabilities), libidn (F23: multiple vulnerabilities), libreswan (F23: unspecified), nodejs-tough-cookie (F24: denial of service), pdns (F24: denial of service), perl-CGI-Emulate-PSGI (F24; F23: HTTP redirect), perl-Module-Load-Conditional (F24; F23: privilege escalation), v8 (F24; F23: denial of service), and xen (F23: multiple vulnerabilities). Mageia has updated chromium-browser-stable (multiple vulnerabilities), firefox (multiple vulnerabilities), and openntpd/busybox (denial of service). Red Hat has updated chromium-browser (RHEL6: multiple vulnerabilities), kernel (RHEL6.4: privilege escalation), nodejs010-nodejs-minimatch (RHSCL: denial of service), and rh-nodejs4-nodejs-minimatch (RHSCL: denial of service). SUSE has updated kernel (SLE11-SP4: multiple vulnerabilities). Ubuntu has updated curl (three vulnerabilities). |
|||||||||||||
![]() |
![]() |