* Create GLX OpenGL contexts using version 3.2 (core profile) when available to reduce the memory consumption on Mesa based drivers.
* Improve memory pressure handler to reduce the CPU usage on memory pressure situations.
* Fix a regression in WebKitWebView title notify signal emission that caused the signal to be emitted multiple times.
* Fix high CPU usage in the web process loading hyphenation dictionaries.
More user agent string improvements to improve compatibility with several websites.
* Fix web process crash when closing the web view in X11.
* Fix the build with OpenGL ES2 enabled.
* Fix several crashes and rendering issues.
* Create GLX OpenGL contexts using version 3.2 (core profile) when available to reduce the memory consumption on Mesa based drivers.
* Improve memory pressure handler to reduce the CPU usage on memory pressure situations.
* Fix a regression in WebKitWebView title notify signal emission that caused the signal to be emitted multiple times.
* Fix high CPU usage in the web process loading hyphenation dictionaries.
More user agent string improvements to improve compatibility with several websites.
* Fix web process crash when closing the web view in X11.
* Fix the build with OpenGL ES2 enabled.
* Fix several crashes and rendering issues.
A use after free vulnerability exists in Adobe Acrobat and Reader. The vulnerability is due to an error in the way Adobe Acrobat and Reader handles objects in memory. A remote attacker can exploit this vulnerability by enticing the user to open a specially crafted PDF file.
A type confusion vulnerability exists in Adobe Acrobat and Reader. The vulnerability is due to an error in Adobe Acrobat and Reader while handling a specially crafted PDF file. A remote attacker can exploit this vulnerability by enticing a target user to open a specially crafted PDF file with an affected version of Adobe Acrobat or Adobe Reader .
Red Hat Security Advisory 2017-0086-01 – The kernel packages contain the Linux kernel, the core of any Linux operating system. These updated kernel packages include several security issues and numerous bug fixes.
Ubuntu Security Notice 3173-1 – It was discovered that the NVIDIA graphics drivers contained a flaw in the kernel mode layer. A local attacker could use this issue to cause a denial of service.
Red Hat Security Advisory 2017-0083-01 – Kernel-based Virtual Machine is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm packages provide the user-space component for running virtual machines using KVM. Security Fix: An out-of-bounds read-access flaw was found in the QEMU emulator built with IP checksum routines. The flaw could occur when computing a TCP/UDP packet’s checksum, because a QEMU function used the packet’s payload length without checking against the data buffer’s size. A user inside a guest could use this flaw to crash the QEMU process.
Red Hat Security Advisory 2017-0091-01 – The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. Security Fix: A use-after-free vulnerability was found in the kernel’s socket recvmmsg subsystem. This may allow remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function.
Red Hat Security Advisory 2017-0113-01 – The kernel-rt packages provide the Real Time Linux Kernel, which enables fine-tuning for systems with extremely high determinism requirements. The kernel-rt packages have been upgraded to version 3.10.0-514, which provides a number of security and bug fixes over the previous version. Security Fix: A use-after-free vulnerability was found in the kernel’s socket recvmmsg subsystem. This may allow remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function.