CVE-2015-2426

Buffer underflow in atmfd.dll in the Windows Adobe Type Manager Library in Microsoft Windows Vista SP2, Windows Server 2008 SP2 and R2 SP1, Windows 7 SP1, Windows 8, Windows 8.1, Windows Server 2012 Gold and R2, and Windows RT Gold and 8.1 allows remote attackers to execute arbitrary code via a crafted OpenType font.

CESA-2015:1455 Important CentOS 6 thunderbirdSecurity Update

CentOS Errata and Security Advisory 2015:1455 Important

Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1455.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

i386:
67f059c84cfc13b4e16ad0be4dfec4dc96a764f7619a74d5bed1015f19eacb90  thunderbird-31.8.0-1.el6.centos.i686.rpm

x86_64:
2fb1d02f60b686fe5682a062b0dfe08663084c8fbaa4f72857e98c08a0a85dac  thunderbird-31.8.0-1.el6.centos.x86_64.rpm

Source:
2ad2a9fdb6ab46a7ba11729981995e6b227ea03e527d89ac97ded468a40c9876  thunderbird-31.8.0-1.el6.centos.src.rpm



CESA-2015:1443 Important CentOS 7 bind SecurityUpdate

CentOS Errata and Security Advisory 2015:1443 Important

Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1443.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

x86_64:
cdc8d81b1ceb9fb761a3cdbd53e64d0c3f617f2aa6a3b945da9870666fc4468f  bind-9.9.4-18.el7_1.2.x86_64.rpm
019c4fcf9aa0d6aa994d96c21e93d484b104bd3b65418a988264a3391e44609e  bind-chroot-9.9.4-18.el7_1.2.x86_64.rpm
bf08ec26ed424425917ec9da07b72d3ba5267df956acf01da0199050e6d7a4c3  bind-devel-9.9.4-18.el7_1.2.i686.rpm
c5cbd86ce254d7e332fb29c752da9e1db497c38b074b6db2dc7d1b9974ea6e48  bind-devel-9.9.4-18.el7_1.2.x86_64.rpm
de92dd5599bfcc3ccf6f104a27952970e489aca7df3f3f4ab8f545eb8be09e8e  bind-libs-9.9.4-18.el7_1.2.i686.rpm
f9ef7f973c07a627cf750ee3a050479ee84763dcef0eb9713907171f83b3602d  bind-libs-9.9.4-18.el7_1.2.x86_64.rpm
b1b3b02e28a002119edf06d1f8390a27ef367cef31b5eebb91c14dfc44bf3a44  bind-libs-lite-9.9.4-18.el7_1.2.i686.rpm
0ad9f2647c1e612f4b1252ac05ac9176ef8866976b6a43503caf3c7ef30ba584  bind-libs-lite-9.9.4-18.el7_1.2.x86_64.rpm
ab666945067b0ee1d24fb956e44b7ee95d79224b4da414565f9355a0939cc974  bind-license-9.9.4-18.el7_1.2.noarch.rpm
bd93c679a68de79068d4de6a13ad499501a57969cc97253bda942def92faccd0  bind-lite-devel-9.9.4-18.el7_1.2.i686.rpm
ce84d4246321ea465ad18b8599b5292216b52a92ea9ca7489019471ab8529c4a  bind-lite-devel-9.9.4-18.el7_1.2.x86_64.rpm
22aa3db5e2107a81137861dba475c0a1376fce7db706b7b98f5a11591ae32674  bind-sdb-9.9.4-18.el7_1.2.x86_64.rpm
191b31a3efa060cb37fc5746df22a0a3dab1c887b0dc247148710609ab35c11a  bind-sdb-chroot-9.9.4-18.el7_1.2.x86_64.rpm
51bc82831a91105582eaa5088d290b51e798837ed82b22059cd6c3aee3768f05  bind-utils-9.9.4-18.el7_1.2.x86_64.rpm

Source:
2670315fac9d99140960d7d95a5557832c98f354336105bba324b8f88fbec8af  bind-9.9.4-18.el7_1.2.src.rpm



CESA-2015:1455 Important CentOS 7 thunderbirdSecurity Update

CentOS Errata and Security Advisory 2015:1455 Important

Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1455.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

x86_64:
97b65815ab4b1eac81a61bb6ae844341e03061b02a8bfcdc590fd1c4bb672864  thunderbird-31.8.0-1.el7.centos.x86_64.rpm

Source:
117177ddc5d2f323dd376e0f9955e2e7a3465599286921930b692cf32ea06446  thunderbird-31.8.0-1.el7.centos.src.rpm



Microsoft Releases Security Update

Original release date: July 20, 2015

Microsoft has released a security update to address a critical vulnerability in Windows. Exploitation of this vulnerability may allow a remote attacker to take control of an affected system.

US-CERT encourages users and administrators to review Microsoft Security Bulletin MS15-078 and apply the necessary update.


This product is provided subject to this Notification and this Privacy & Use policy.

Fedora EPEL 6 Security Update: drupal7-path_breadcrumbs-3.3-1.el6

Resolved Bugs
1243614 – drupal7-path_breadcrumbs-3.3 is available<br
## 7.x-3.3
See [SA-CONTRIB-2015-133](https://www.drupal.org/node/2533926)
* New token `%site:current-page:path-menu-trail:pb-join:*` is an alternative approach to build breadcrumbs based on path hierarchy.
* Fixed #2473109: Destination parameter is present but doesn’t work during editing breadcrumb
* Other improvements and fixes.

Fedora EPEL 5 Security Update: drupal7-path_breadcrumbs-3.3-1.el5

Resolved Bugs
1243614 – drupal7-path_breadcrumbs-3.3 is available<br
## 7.x-3.3
See [SA-CONTRIB-2015-133](https://www.drupal.org/node/2533926)
* New token `%site:current-page:path-menu-trail:pb-join:*` is an alternative approach to build breadcrumbs based on path hierarchy.
* Fixed #2473109: Destination parameter is present but doesn’t work during editing breadcrumb
* Other improvements and fixes.