Войти в систему

Home
    - Создать дневник
    - Написать в дневник
       - Подробный режим

LJ.Rossia.org
    - Новости сайта
    - Общие настройки
    - Sitemap
    - Оплата
    - ljr-fif

Редактировать...
    - Настройки
    - Список друзей
    - Дневник
    - Картинки
    - Пароль
    - Вид дневника

Сообщества

Настроить S2

Помощь
    - Забыли пароль?
    - FAQ
    - Тех. поддержка



Пишет LWN.net ([info]syn_lwnheadline)
@ 2015-09-09 16:30:00


Previous Entry  Add to memories!  Tell a Friend!  Next Entry
Wednesday's security advisories

CentOS has updated haproxy (C7; C6: information leak) and subversion (C7: multiple vulnerabilities).

Debian has updated spice (code execution).

Mageia has updated chromium-browser (MG4,5: multiple vulnerabilities), libidn (MG5: information disclosure), libxml2 (MG4,5: denial of service), ntp (MG4,5: multiple vulnerabilities), pcre (MG4,5: multiple vulnerabilities), php (MG5: multiple vulnerabilities), pure-ftpd (MG4,5: denial of service), ruby-rack (MG4,5: denial of service), ruby-RubyGems (MG4,5: DNS hijacking), screen (MG4,5: denial of service), squid (MG5: security bypass), struts (MG4,5: input validation bypass), util-linux (MG5: file name collision), vorbis-tools (MG4,5: buffer overread), webmin (MG4,5: cross-site scripting), and xmltooling (MG4,5: denial of service).

Oracle has updated haproxy (OL7: information leak) and subversion (OL7: multiple vulnerabilities).

Scientific Linux has updated haproxy (SL6,7: information leak) and subversion (SL7: multiple vulnerabilities).

Ubuntu has updated kernel (15.04: privilege escalation), linux-lts-vivid (14.04: privilege escalation), and oxide-qt (15.04, 14.04: multiple vulnerabilities).



(Читать комментарии) (Добавить комментарий)