Language Selection

English French German Italian Portuguese Spanish

LinuxSecurity.com Advisories

Syndicate content
The central voice for Linux and Open Source security news.
Updated: 11 hours 37 min ago

Fedora 22 wesnoth-1.12.4-1.fc22

Monday 13th of July 2015 03:15:00 PM
LinuxSecurity.com: Latest upstream.http://www.openwall.com/lists/oss-security/2015/06/25/2http://www.openwall.com/lists/oss-security/2015/06/25/2

Fedora 21 openssl-1.0.1k-11.fc21

Monday 13th of July 2015 03:14:00 PM
LinuxSecurity.com: Security fix for CVE-2015-1793 high severity issue.

Fedora 21 wesnoth-1.12.4-1.fc21

Monday 13th of July 2015 03:11:00 PM
LinuxSecurity.com: Latest upstream.http://www.openwall.com/lists/oss-security/2015/06/25/2http://www.openwall.com/lists/oss-security/2015/06/25/2

Fedora 22 polkit-0.113-1.fc22

Monday 13th of July 2015 03:10:00 PM
LinuxSecurity.com: Security fix for CVE-2015-3218, CVE-2015-3255, CVE-2015-3256, CVE-2015-4625

Fedora 22 firefox-39.0-8.fc22

Monday 13th of July 2015 03:10:00 PM
LinuxSecurity.com: New upstream - Firefox 39.0

Slackware: 2015-192-01: mozilla-thunderbird: Security Update

Sunday 12th of July 2015 03:00:00 AM
LinuxSecurity.com: New mozilla-thunderbird packages are available for Slackware 14.1 and -current to fix security issues. [More Info...]

Fedora 22 openssh-6.9p1-1.fc22

Friday 10th of July 2015 03:20:00 PM
LinuxSecurity.com: This update brings security fix for two announced vulnerabilities. Namely XSECURITY restrictions bypass under certain conditions AND weakness of agent locking (ssh-add -x) to password guessing (more info in related bugs). It also provides new version of openssh-6.9 which is bringing many bugfixes and few new features with maintaining compatibility with previous version.

Fedora 21 s3ql-2.13-1.fc21

Friday 10th of July 2015 03:17:00 PM
LinuxSecurity.com: Update to 2.13

Fedora 22 libwmf-0.2.8.4-45.fc22

Friday 10th of July 2015 03:13:00 PM
LinuxSecurity.com: CVE-2015-0848 heap overflow when decoding BMP imagesCVE-2015-4588 RLE decoding doesn't check that the "count" fits into the imageCVE-2015-4695 meta_pen_create heap buffer overflowCVE-2015-4696 wmf2gd/wmf2eps use after free

Fedora 21 mariadb-10.0.20-1.fc21

Friday 10th of July 2015 03:12:00 PM
LinuxSecurity.com: This is an update to most recent version 10.0.20, that also fixes CVE-2015-3152.

Fedora 22 s3ql-2.13-1.fc22

Friday 10th of July 2015 03:12:00 PM
LinuxSecurity.com: Update to 2.13

Fedora 21 openssh-6.6.1p1-13.fc21

Friday 10th of July 2015 03:11:00 PM
LinuxSecurity.com: This update brings security fix for two announced vulnerabilities. Namely XSECURITY restrictions bypass under certain conditions AND weakness of agent locking (ssh-add -x) to password guessing (more info in related bugs). For more information see related bugs.

Fedora 21 cups-x2go-3.0.1.3-1.fc21

Friday 10th of July 2015 03:10:00 PM
LinuxSecurity.com: * New upstream version (3.0.1.2): - cups-x2go{,.conf}: port to File::Temp. Use Text::ParseWords to split up the ps2pdf command line correctly. Don't use system() but IPC::Open2::open2(). Capture the ps2pdf program's stdout and write it to the temporary file handle "manually". Should fix problems reported by Jan Bi on IRC. - cups-x2go: fix commented out second ps2pdf definition to output PDF data to stdout. * New upstream version (3.0.1.3): - cups-x2go: import tempfile() function from File::Temp module. - cups-x2go: only repeat the last X, not the whole ".pdfX" string (or the like.) - cups-x2go: actually print "real" executed command instead of the "original" one with placeholders. - cups-x2go: read output from ghostscript, don't write a filehandle to the temporary file. Fixes a hanging ghostscript call and... well... random junk, instead of a "real" PDF file. - cups-x2go: use parentheses around function arguments. - cups-x2go: fix binmode() call, :raw layer is implicit. - cups-x2go: fix print call... Does not allow to separate parameters with a comma. - cups-x2go: add correct :raw layer to binmode calls. - cups-x2go: fix tiny typo. - cups-x2go: read data from GS and STDIN in chunks of 8 kbytes, instead of everything at once. Handles large print jobs gracefully. - cups-x2go: add parentheses to close() calls. - cups-x2go: delete PDF and title temporary files automatically. - cups-x2go: unlink PS temporary file on-demand in END block. Also move closelog to END block, because we want to print diagnosis messages in the END block. - cups-x2go: don't use unlink() explicitly. Trust File::Temp and our END block to clean up correctly. - cups-x2go: there is no continue in perl for stepping forward a loop. Still not. I keep forgetting that. Use next. (Partly) Fixes: #887. - cups-x2go: use the same temp file template for PS, PDF and title files. Use appropriate suffixes if necessary when generating PDF and title temp files. (Fully) Fixes: #887.Update to 3.0.1.1:- Add a short README that provides some getting started information.Update to 3.0.1.1:- Add a short README that provides some getting started information.

Gentoo: 201507-12 libCapsiNetwork: Denial of Service

Friday 10th of July 2015 02:52:00 PM
LinuxSecurity.com: A buffer overflow in libcapsinetwork might allow remote attackers to cause a Denial of Service condition.

Gentoo: 201507-19 MySQL: Multiple vulnerabilities

Friday 10th of July 2015 09:29:00 AM
LinuxSecurity.com: Multiple vulnerabilities have been found in MySQL, allowing attackers to execute arbitrary code or cause Denial of Service.

Gentoo: 201507-18 Chromium: Multiple vulnerabilities

Friday 10th of July 2015 09:24:00 AM
LinuxSecurity.com: Multiple vulnerabilities have been found in Chromium allowing remote attackers to bypass security restrictions.

Gentoo: 201507-17 SNMP: Denial of Service

Friday 10th of July 2015 09:20:00 AM
LinuxSecurity.com: A vulnerability in SNMP could lead to Denial of Service condition.

Gentoo: 201507-11 Perl: Denial of Service

Friday 10th of July 2015 04:23:00 AM
LinuxSecurity.com: A vulnerability in Perl allows a remote attacker to cause Denial of Service.

Gentoo: 201507-10 t1utils: Arbitrary code execution

Friday 10th of July 2015 04:07:00 AM
LinuxSecurity.com: A buffer overflow in t1utils could result in execution of arbitrary code or Denial of Service.

Debian: 3307-1: pdns-recursor: Summary

Thursday 9th of July 2015 06:20:00 PM
LinuxSecurity.com: Security Report Summary

More in Tux Machines

Canonical Closes SQLite Vulnerabilities in All Supported Ubuntu OSes

Canonical has published details in a security notice about a number of SQLite vulnerabilities that have been found and fixed in Ubuntu 15.04, Ubuntu 14.04 LTS, and Ubuntu 12.04 LTS OSes. Read more

Fotoxx 15.08 Is a Free and Powerful Image Editor for Linux

Fotoxx, a free, open source Linux photo editing application that is useful both beginner and experts alike, has been upgraded to version 15.08 and is now available for download. Read more

Ubuntu MATE Projects Donates Money to Debian, MATE, and Syncthing Developers

The Ubuntu MATE project does something very admirable each month. Its makers contribute financially to other open source projects that are being used in the operating system, and that is something that doesn't happen all the often in the FOSS universe. Read more

Wine 1.7 Series Turn Two Years Old, No Sign Of Wine 1.8

Today marks two years since the start of the Wine 1.7 development series. While it's been two years of doing bi-weekly development releases, there's no sign of Wine 1.8.0 being ready for release in the near future. Read more