Resolved Bugs
1168463 – CVE-2014-9116 mutt: incorrect use of mutt_substrdup() in write_one_header()
1168464 – mutt: heap-based buffer overflow in mutt_substrdup() [fedora-all]<br
Security fix for
Category Archives: Fedora
Fedora – Security Updates
Fedora 21 Security Update: sagemath-6.3-5.fc21
Fedora 20 Security Update: ctdb-2.5.4-2.fc20
Fedora 21 Security Update: xen-4.4.1-10.fc21
p2m lock starvation, fix build with –without xsm
Fedora 19 Security Update: xorg-x11-server-1.14.4-5.fc19
CVE fixes for everyone – all the X.org CVE fixes from Dec 9th 2014
Fedora 19 Security Update: curl-7.29.0-27.fc19
Resolved Bugs
1172572 – XBMC issues due to Curl
1153814 – yum cannot access repositories using TLS 1.2
1166567 – curl: Disable out-of-protocol fallback to SSL 3.0
1166239 – Please include “low-speed-limit: avoid timeout flood” patch into fedora curl package
1154941 – CVE-2014-3707 curl: incorrect handle duplication after COPYPOSTFIELDS<br
– make CURLOPT_LOW_SPEED_LIMIT work again with threaded resolver (#1172572)
– allow to use TLS 1.1 and TLS 1.2 (#1153814)
– disable libcurl-level downgrade to SSLv3 (#1166567)
– low-speed-limit: avoid timeout flood (#1166239)
– fix handling of CURLOPT_COPYPOSTFIELDS in curl_easy_duphandle (CVE-2014-3707)
Fedora 20 Security Update: unbound-1.5.1-2.fc20
Fedora 20 Security Update: sagemath-6.1.1-6.fc20
Fedora 20 Security Update: qemu-1.6.2-12.fc20
Resolved Bugs
1163080 – CVE-2014-7840 qemu: insufficient parameter validation during ram load [fedora-all]
1163075 – CVE-2014-7840 qemu: insufficient parameter validation during ram load<br
* Fix qemu-img convert corruption for unflushed files (bz #1167249)
* Fix SLES11 migration issue (bz #1109427)
* CVE-2014-7840: insufficient parameter validation during ram load (bz #1163080)
Fedora 20 Security Update: kernel-3.17.6-200.fc20
Resolved Bugs
1165206 – USB mouse fails after resume from suspend
1167511 – HDMI output broken on Radeon with kernels 3.17.3 and 3.17.4
1094048 – [abrt] WARNING: CPU: 4 PID: 0 at drivers/usb/core/urb.c:450 usb_submit_urb+0x1fd/0x5c0()
1170691 – CVE-2014-9090 kernel: espfix64: local DoS via do_double_fault() due to improper handling of faults associated with SS segment register<br
The 3.17.6 stable update contains a number of important fixes across the tree.