CentOS Errata and Security Advisory 2016:1205 Important
Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-1205.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
6373aaf37d9487127df5fb1afed95d2629f63ca38209b0e550758558798ce7c5 spice-server-0.12.4-15.el7_2.1.x86_64.rpm
5cb372ceb2fdf595c7eba34b8938ad8db7e87a61bfb77c73a5afb57e559e28a4 spice-server-devel-0.12.4-15.el7_2.1.x86_64.rpm
Source:
98a5551264ccbd5d1e686783186d6d36a63d375ff90f87f2b8d779b9320e9481 spice-0.12.4-15.el7_2.1.src.rpm
CentOS Errata and Security Advisory 2016:1204 Important
Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-1204.html
The following updated files have been uploaded and are currently
syncing to the mirrors: ( sha256sum Filename )
x86_64:
809e9d71025ce9587d91b9f2d5d9fb02534a80cacae2a99996f46e1be7187480 spice-server-0.12.4-13.el6.1.x86_64.rpm
9fbb2f0cc41fa67b76a366ef426de81d516a6514a23942ca30e97cfb52599c32 spice-server-devel-0.12.4-13.el6.1.x86_64.rpm
Source:
b1a32672aeb5a90664d461b30155a6f74f8d6c533750551eb3111d222e5c1a10 spice-server-0.12.4-13.el6.1.src.rpm
Facebook has patched a vulnerability in its desktop and mobile Messenger apps that allows an attacker to modify chats and expose victims to malware and fraud.
The Red Hat gluster-swift package, as used in Red Hat Gluster Storage (formerly Red Hat Storage Server), allows remote authenticated users to bypass the max_meta_count constraint via multiple crafted requests which exceed the limit when combined.
The (1) t1_parse_font_matrix function in type1/t1load.c, (2) cid_parse_font_matrix function in cid/cidload.c, (3) t42_parse_font_matrix function in type42/t42parse.c, and (4) ps_parser_load_field function in psaux/psobjs.c in FreeType before 2.5.4 do not check return values, which allows remote attackers to cause a denial of service (uninitialized memory access and application crash) or possibly have unspecified other impact via a crafted font.
The t42_parse_encoding function in type42/t42parse.c in FreeType before 2.5.4 does not properly update the current position for immediates-only mode, which allows remote attackers to cause a denial of service (infinite loop) via a Type42 font.