|  | |||
|   
 |    |  
 
 Security advisories for Wednesday Arch Linux has updated kernel (privilege escalation), linux-grsec (privilege escalation), and linux-lts (privilege escalation). CentOS has updated sudo (C6: privilege escalation) and thunderbird (C6; C5: code execution). Debian-LTS has updated mapserver (information leak). Fedora has updated mingw-nsis (F23: DLL hijacking). Gentoo has updated mercurial (multiple vulnerabilities), openssh (multiple vulnerabilities), openssl (multiple vulnerabilities), and pecl-http (code execution). Mageia has updated drupal (two vulnerabilities), kernel-linus-4.4.32 (multiple vulnerabilities), and kernel-tmb-4.4.32 (multiple vulnerabilities). openSUSE has updated libXrender (13.2: insufficient validation), libXtst (13.2: insufficient validation), libXv (13.2: insufficient validation), libXvMC (13.2: insufficient validation), roundcubemail (Leap42.2,42.1: two vulnerabilities), roundcubemail (13.2: cross-site scripting), tiff (13.2: multiple vulnerabilities), and X (Leap42.2, 42.1, 13.2: multiple vulnerabilities). Oracle has updated sudo (OL7; OL6: privilege escalation). SUSE has updated kernel (SLE12-SP1: three vulnerabilities). | |||||||||||||
|  |  |