Security advisories for Wednesday
Arch Linux has updated bind (denial of service).
Debian has updated bind9 (denial of service) and tar (file overwrite).
Debian-LTS has updated libwmf (denial of service), tiff (multiple vulnerabilities), and tiff3 (two vulnerabilities).
Fedora has updated ecryptfs-utils(F23: two vulnerabilities), libass (F23:multiple vulnerabilities), libXfixes (F23:integer overflow), libXrandr (F23:insufficient validation), libXrender (F23:insufficient validation), libXtst (F23:insufficient validation), libXv (F23:insufficient validation), libXvMC (F23:insufficient validation), systemd (F23:denial of service), and tor (F23: denial of service).
Mageia has updated libtiff (two vulnerabilities).
Red Hat has updated java-1.7.0-ibm (RHEL5: multiplevulnerabilities), java-1.7.1-ibm (RHEL6,7:multiple vulnerabilities), and java-1.8.0-ibm (RHEL6,7: multiple vulnerabilities).
SUSE has updated bind (SLE12-SP1,2; SLES12: denial of service), curl (SLE12-SP1; SSO1.3: multiple vulnerabilities), nodejs4 (SLEM12: multiple vulnerabilities), php7 (SLEM12: many vulnerabilities), and php7 (SLEM12: three vulnerabilities in libgd).
Ubuntu has updated bind9 (denialof service), dbus (denial of service from2015), libgd2 (three vulnerabilities), mailman (two vulnerabilities), oxide-qt (16.10, 16.04, 14.04: multiplevulnerabilities), and python-django (twovulnerabilities).