Войти в систему

Home
    - Создать дневник
    - Написать в дневник
       - Подробный режим

LJ.Rossia.org
    - Новости сайта
    - Общие настройки
    - Sitemap
    - Оплата
    - ljr-fif

Редактировать...
    - Настройки
    - Список друзей
    - Дневник
    - Картинки
    - Пароль
    - Вид дневника

Сообщества

Настроить S2

Помощь
    - Забыли пароль?
    - FAQ
    - Тех. поддержка



Пишет LWN.net ([info]syn_lwnheadline)
@ 2015-02-26 16:13:00


Previous Entry  Add to memories!  Tell a Friend!  Next Entry
Security advisories for Thursday

CentOS has updated thunderbird (C6; C5: multiple vulnerabilities).

Debian has updated cups (code execution), iceweasel (multiple vulnerabilities), kfreebsd-9 (denial of service), and libgtk2-perl (code execution).

Fedora has updated libhtp (F20: denial of service).

Gentoo has updated samba (multiple vulnerabilities, some from 2012 and 2013).

Mageia has updated apache-poi (denial of service), cabextract (privilege escalation), e2fsprogs (two code execution flaws), firefox, thunderbird (multiple vulnerabilities), and sympa (information disclosure).

openSUSE has updated cups (13.2, 13.1: code execution) and snack (13.2, 13.1: code execution from 2012).

Oracle has updated firefox (OL5: multiple vulnerabilities) and thunderbird (OL6: multiple vulnerabilities).

Red Hat has announced that RHEL 5.9 support will end on March 31.

Scientific Linux has updated firefox (multiple vulnerabilities) and thunderbird (SL6, SL5: multiple vulnerabilities).

Slackware has updated thunderbird (multiple vulnerabilities) and firefox (multiple vulnerabilities).

SUSE has updated java-1_5_0-ibm (SLE10SP4: many vulnerabilities) and java-1_6_0-ibm (SLE11SP2: two unspecified vulnerabilities).

Ubuntu has updated EC2 kernel (10.04: two vulnerabilities), firefox (14.10, 14.04, 12.04: many vulnerabilities), kernel (14.10; 14.04; 12.04; 10.04: multiple vulnerabilities), linux-lts-trusty (12.04: multiple vulnerabilities), linux-lts-utopic (14.04: multiple vulnerabilities), and linux-ti-omap4 (12.04: multiple vulnerabilities).



(Читать комментарии) (Добавить комментарий)