Fedora Essential and Critical Security Patch Updates - Page 727
Find the information you need for your favorite open source distribution .
Find the information you need for your favorite open source distribution .
- Update to 3.4.4 - CVE-2015-1868 Release notes: https://doc.powerdns.com/md/changelog/#powerdns-authoritative-server-344 External References:
- CVE-2015-1868 External References: https://doc.powerdns.com/md/security/powerdns-advisory-2015-01/
- Update to 3.7.2 - CVE-2015-1868 External References: https://doc.powerdns.com/md/security/powerdns-advisory-2015-01/
This update provides a security fix related to the Nasal scripting language.
This update provides a security fix related to the Nasal scripting language.
- Update to 3.7.2 - CVE-2015-1868 External References: https://doc.powerdns.com/md/security/powerdns-advisory-2015-01/
R50f is a required security and bugfix release: * Add a patch marker for vendor patch versioning to mksh.1 * SECURITY: make unset HISTFILE actually work * Document some more issues with the current history code * Remove some unused code
Fix some .docx import crashes. And finally fix the re-render of checked->unchecked checkbox transition update to 4.3.7
Security fix for CVE 2014-8119, as well as adding a few other minor bugfixes and enhancements (support for multiple IPv4 addresses, simultaneous static & dhcp for IPv4)
TestDisk 7.0 fixes several stack overflows. The new photorec is faster. qphotorec is a qt4 version of PhotoRec. Full release notes: https://www.cgsecurity.org/wiki/TestDisk_7.0_Release
Fixes CVE-2015-1855 ruby: OpenSSL extension hostname matching implementation violates RFC 6125
This update addresses a security vulnerability identified as CVE-2015-1863 . More information on this vulnerability is provided by upstream at https://w1.fi/security/2015-1/wpa_supplicant-p2p-ssid-overflow.txt . An extract: Attacker (or a system controlled by the attacker) needs to be within radio range of the vulnerable system to send a suitably constructed management frame that triggers a P2P pe [More...]