Войти в систему

Home
    - Создать дневник
    - Написать в дневник
       - Подробный режим

LJ.Rossia.org
    - Новости сайта
    - Общие настройки
    - Sitemap
    - Оплата
    - ljr-fif

Редактировать...
    - Настройки
    - Список друзей
    - Дневник
    - Картинки
    - Пароль
    - Вид дневника

Сообщества

Настроить S2

Помощь
    - Забыли пароль?
    - FAQ
    - Тех. поддержка



Пишет LWN.net ([info]syn_lwnheadline)
@ 2015-02-23 18:15:00


Previous Entry  Add to memories!  Tell a Friend!  Next Entry
Security advisories for Monday

CentOS has updated samba (C7; C6: root code execution), samba3x (C5: root code execution), and samba4 (C6: root code execution).

Debian has updated e2fsprogs (incomplete fix for code execution), eglibc (multiple vulnerabilities), ruby-redcloth (cross-site scripting), samba (root code execution), sudo (information disclosure), typo3-src (authentication bypass), and xdg-utils (command execution).

Fedora has updated apache-poi (F21: XML-handling flaws), apache-poi (F20: denial of service), cups (F21: buffer overflow), drupal6-views (F21; F20: multiple vulnerabilities), e2fsprogs (F20: code execution), sudo (F21: information disclosure), and tomcat (F21: multiple vulnerabilities).

Mageia has updated bind (denial of service).

openSUSE has updated glibc (13.2, 13.1: multiple vulnerabilities).

SUSE has updated java-1_6_0-ibm (SLES10 SP4: multiple unspecified vulnerabilities), java-1_7_0-ibm (SLE11 SP3; SLES11 SP2: multiple unspecified vulnerabilities), and samba (SLE12: root code execution).



(Читать комментарии) (Добавить комментарий)