Thursday's security advisories Arch Linux has updated bind (two
denial of service flaws).
CentOS has updated bind (C7; C6; C5: denial of service), bind97 (C5: denial of service), and
libXfont (C7; C6: three privilege escalation flaws).
Debian has updated bind9 (denial
of service), qemu (multiple
vulnerabilities), and qemu-kvm (two vulnerabilities).
Debian-LTS has updated openslp-dfsg (three vulnerabilities, one from
2010, another from 2012).
Red Hat has updated bind (RHEL6,7; RHEL5: denial of service), bind97 (RHEL5: denial of service), and libXfont (RHEL6,7: three privilege escalation flaws).
Scientific Linux has updated bind (SL6,7; SL5:
denial of service), bind97 (SL5: denial of
service), and libXfont (SL6,7: three
privilege escalation flaws).
Slackware has updated bind (two
denial of service flaws).
SUSE has updated bind (SLE12; SLE11SP2,3,4: denial of service), kernel (SLE11SP2: multiple vulnerabilities,
three from 2014), and xen (SLE11SP3;
SLED11SP3: multiple vulnerabilities).
Ubuntu has updated bind9 (denial
of service).