Войти в систему

Home
    - Создать дневник
    - Написать в дневник
       - Подробный режим

LJ.Rossia.org
    - Новости сайта
    - Общие настройки
    - Sitemap
    - Оплата
    - ljr-fif

Редактировать...
    - Настройки
    - Список друзей
    - Дневник
    - Картинки
    - Пароль
    - Вид дневника

Сообщества

Настроить S2

Помощь
    - Забыли пароль?
    - FAQ
    - Тех. поддержка



Пишет LWN.net ([info]syn_lwnheadline)
@ 2016-05-17 15:59:00


Previous Entry  Add to memories!  Tell a Friend!  Next Entry
Tuesday's security advisories

Debian has updated imagemagick (multiple vulnerabilities) and libndp (man-in-the-middle attacks).

Debian-LTS has updated squid3 (multiple vulnerabilities).

Fedora has updated ioprocess (F23; F22: invalid md5sum), libarchive (F23: code execution), libksba (F23: denial of service), and owncloud (F23; F22: undisclosed vulnerabilities).

Gentoo has updated chromium (multiple vulnerabilities).

openSUSE has updated atheme (Leap42.1, 13.2: two vulnerabilities), flash-player (13.2; 13.1; 11.4: multiple vulnerabilities), quagga (Leap42.1, 13.2: denial of service), quassel (Leap42.1, 13.2: denial of service), and varnish (13.2: access control bypass).

Red Hat has updated libndp (RHEL7: man-in-the-middle attacks).

SUSE has updated flash-player (SLE12-SP1: multiple vulnerabilities) and ntp (SOSC5, SMP2.1, SM2.1, SLE11-SP3, SLE11-SP2: multiple vulnerabilities).

Ubuntu has updated kernel (16.04; 15.10; 14.04: privilege escalation), libndp (16.04, 15.10: man-in-the-middle attacks), linux-lts-trusty (12.04: privilege escalation), linux-lts-utopic (14.04: privilege escalation), linux-lts-vivid (14.04: privilege escalation), linux-lts-wily (14.04: privilege escalation), linux-lts-xenial (14.04: privilege escalation), linux-raspi2 (16.04; 15.10: privilege escalation), and linux-snapdragon (16.04: privilege escalation).



(Читать комментарии) (Добавить комментарий)