Войти в систему

Home
    - Создать дневник
    - Написать в дневник
       - Подробный режим

LJ.Rossia.org
    - Новости сайта
    - Общие настройки
    - Sitemap
    - Оплата
    - ljr-fif

Редактировать...
    - Настройки
    - Список друзей
    - Дневник
    - Картинки
    - Пароль
    - Вид дневника

Сообщества

Настроить S2

Помощь
    - Забыли пароль?
    - FAQ
    - Тех. поддержка



Пишет LWN.net ([info]syn_lwnheadline)
@ 2015-09-03 15:54:00


Previous Entry  Add to memories!  Tell a Friend!  Next Entry
Thursday's security advisories

Arch Linux has updated bind (two denial of service flaws).

CentOS has updated bind (C7; C6; C5: denial of service), bind97 (C5: denial of service), and libXfont (C7; C6: three privilege escalation flaws).

Debian has updated bind9 (denial of service), qemu (multiple vulnerabilities), and qemu-kvm (two vulnerabilities).

Debian-LTS has updated openslp-dfsg (three vulnerabilities, one from 2010, another from 2012).

Red Hat has updated bind (RHEL6,7; RHEL5: denial of service), bind97 (RHEL5: denial of service), and libXfont (RHEL6,7: three privilege escalation flaws).

Scientific Linux has updated bind (SL6,7; SL5: denial of service), bind97 (SL5: denial of service), and libXfont (SL6,7: three privilege escalation flaws).

Slackware has updated bind (two denial of service flaws).

SUSE has updated bind (SLE12; SLE11SP2,3,4: denial of service), kernel (SLE11SP2: multiple vulnerabilities, three from 2014), and xen (SLE11SP3; SLED11SP3: multiple vulnerabilities).

Ubuntu has updated bind9 (denial of service).



(Читать комментарии) (Добавить комментарий)