Войти в систему

Home
    - Создать дневник
    - Написать в дневник
       - Подробный режим

LJ.Rossia.org
    - Новости сайта
    - Общие настройки
    - Sitemap
    - Оплата
    - ljr-fif

Редактировать...
    - Настройки
    - Список друзей
    - Дневник
    - Картинки
    - Пароль
    - Вид дневника

Сообщества

Настроить S2

Помощь
    - Забыли пароль?
    - FAQ
    - Тех. поддержка



Пишет LWN.net ([info]syn_lwnheadline)
@ 2016-01-20 17:47:00


Previous Entry  Add to memories!  Tell a Friend!  Next Entry
Security advisories for Wednesday

Arch Linux has updated kernel (privilege escalation).

CentOS has updated kernel (C5: two remote denial of service vulnerabilities).

Debian has updated bind9 (denial of service) and ecryptfs-utils (privilege escalation).

Debian-LTS has updated bind9 (denial of service), ecryptfs-utils (privilege escalation), and librsvg (out-of-bounds heap read).

Fedora has updated libxmp (F23; F22: multiple vulnerabilities), mbedtls (F23; F22: memory leak), qemu (F22: multiple vulnerabilities), and radicale (F23; F22: multiple vulnerabilities).

openSUSE has updated cups-filters (Leap42.1: code execution).

Oracle has updated kernel (OL5: two remote denial of service vulnerabilities).

Scientific Linux has updated kernel (SL5: two remote denial of service vulnerabilities).

SUSE has updated bind (SLE12-SP1: denial of service).

Ubuntu has updated bind9 (denial of service), ecryptfs-utils (privilege escalation), kernel (15.10; 15.04; 14.04: privilege escalation), libxml2 (two vulnerabilities), linux-lts-trusty (12.04: privilege escalation), linux-lts-utopic (14.04: privilege escalation), linux-lts-vivid (14.04: privilege escalation), linux-lts-wily (14.04: privilege escalation), and linux-raspi2 (15.10: privilege escalation).



(Читать комментарии) (Добавить комментарий)