Fedora has updated eog (F23: out-of-bounds write).
openSUSE has updated ImageMagick (Leap42.1: three vulnerabilities).
CentOS has updated kernel (C6: TCP injection).
Debian-LTS has updated libgcrypt11 (flawed random number generation).
Fedora has updated eog (F24: out-of-bounds write), kernel (F23: use-after-free), mariadb (F23: multiple vulnerabilities), mingw-lcms2 (F24: heap memory leak), postgresql (F23: multiple vulnerabilities), and python (F23: proxy injection).
Oracle has updated kernel (O6: TCP injection).
Scientific Linux has updated kernel (SL6: TCP injection).
Version 5.0.0 of the KDevelop integrated development environment (IDE) has been released, marking the end of a two-year development cycle. The highlight is a move to Clang for C and C++ support: "The most prominent change certainly is the move away from our own, custom C++ analysis engine. Instead, C and C++ code analysis is now performed by clang." The announcement goes on to describe other benefits of using Clang, such as more accurate diagnostics and suggested fixes for many syntax errors. KDevelop has also been ported to KDE Frameworks 5 and Qt 5, which opens up the possibility of Windows releases down the line.
Arch Linux has updated libgcrypt (information disclosure).
SUSE has updated MozillaFirefox (SLE12: multiple vulnerabilities).
Arch Linux has updated linux-lts (connection hijacking).
CentOS has updated kernel (C7: connection hijacking).
Fedora has updated firewalld (F24: authentication bypass), glibc (F24: denial of service on armhfp), knot (F24; F23: denial of service), libgcrypt (F24: bad random number generation), and perl (F23: privilege escalation).
openSUSE has updated apache2-mod_fcgid (42.1, 13.2: proxy injection), gd (13.2: multiple vulnerabilities), iperf (SPHfSLE12; 42.1, 13.2: denial of service), pdns (42.1, 13.2: denial of service), python3 (42.1, 13.2: multiple vulnerabilities), roundcubemail (42.1; 13.2; 13.1: multiple vulnerabilities, two from 2015), and typo3-cms-4_7 (42.1, 13.2: three vulnerabilities from 2013 and 2014).
Red Hat has updated kernel (RHEL7; RHEL6: TCP injection), kernel-rt (RHEL7: TCP injection), python (RHEL 6,7: multiple vulnerabilities), python27-python (RHSC: multiple vulnerabilities), python33-python (RHSC: multiple vulnerabilities), realtime-kernel (RHEM2.5: TCP injection), rh-mariadb101-mariadb (RHSC: multiple vulnerabilities), rh-python34-python (RHSC: multiple vulnerabilities), and rh-python35-python (RHSC: multiple vulnerabilities).
Ubuntu has updated gnupg (12.04, 14.04, 16.04: flawed random-number generation), libgcrypt11, libgcrypt20 (12.04, 14.04, 16.06: flawed random-number generation), and postgresql-9.1, postgresql-9.3, postgresql-9.5 (12.04, 14.04, 16.04: multiple vulnerabilities).
With optical-scan voting, the voter fills in the bubbles next to the names of her selected candidates on paper ballot; then she feeds the op-scan ballot into the optical-scan computer. The computer counts the vote, and the paper ballot is kept in a sealed ballot box. The computer could be hacked, in which case (when the polls close) the voting-machine lies about how many votes were cast for each candidate. But we can recount the physical pieces of paper marked by the voter’s own hands; that recount doesn’t rely on any computer. Instead of doing a full recount of every precinct in the state, we can spot-check just a few ballot boxes to make sure they 100% agree with the op-scan computers’ totals.
Problem: What if it’s not an optical-scan computer, what if it’s a paperless touchscreen (“DRE, Direct-Recording Electronic) voting computer? Then whatever numbers the voting computer says, at the close of the polls, are completely under the control of the computer program in there. If the computer is hacked, then the hacker gets to decide what numbers are reported. There are no paper ballots to audit or recount. All DRE (paperless touchscreen) voting computers are susceptible to this kind of hacking. This is our biggest problem.
Debian-LTS has updated libupnp (arbitrary file overwrite).
Ubuntu has updated fontconfig (16.04, 14.04, 12.04: privilege escalation).