LWN.net's Journal
 
[Most Recent Entries] [Calendar View]

Tuesday, May 26th, 2015

    Time Event
    1:24p
    The end for Mandriva
    An anonymous reader has pointed out that Mandriva is
    currently being liquidated
    (page in French). The company brought in
    €553,000 in 2013, but that is seemingly not enough to keep it going in
    2015. It is a sad end for a company that has been pursuing the desktop
    Linux dream since 1998.
    2:15p
    Fedora 22 released
    The Fedora 22 release is out. "If this release had a
    human analogue, it'd be Fedora 21 after it'd been to college,
    landed a good job, and kept its New Year's Resolution to go to the
    gym on a regular basis. What we're saying is that Fedora 22 has
    built on the foundation we laid with Fedora 21 and the work to
    create distinct editions of Fedora focused on the desktop, server,
    and cloud (respectively). It's not radically different, but there
    are a fair amount of new features coupled with features we've
    already introduced but have improved for Fedora 22.
    " LWN's preview of Fedora 22 was published in the
    May 21 Weekly Edition.
    4:53p
    Security advisories for Tuesday

    Arch Linux has updated nbd (denial of service), pgbouncer (denial of service), postgresql (multiple vulnerabilities), webkitgtk (information disclosure), and webkitgtk2 (information disclosure).

    Debian has updated ipsec-tools (denial of service), nbd (denial of service), postgresql-9.1 (multiple vulnerabilities), postgresql-9.4 (multiple vulnerabilities), tiff (multiple vulnerabilities), and zendframework (multiple vulnerabilities).

    Debian-LTS has updated ntfs-3g (privilege escalation).

    Fedora has updated firefox (F22: multiple vulnerabilities), hostapd (F22: denial of service), java-1.8.0-openjdk (F22: file overwrites), kernel (F20: two vulnerabilities), libarchive (F21: denial of service), LibRaw (F22; F20: denial of service), mingw-LibRaw (F22; F22; F20: denial of service), openstack-glance (F22: access restriction bypass), php (F22: multiple vulnerabilities), php-ZendFramework2 (F22: CRLF injection), phpMyAdmin (F22: two vulnerabilities), qemu (F22; F20: code execution), quassel (F22: denial of service), suricata (F22: denial of service), thunderbird (F22: multiple vulnerabilities), wordpress (F22: cross-site scripting), and xen (F22; F21; F20: privilege escalation).

    Mageia has updated chromium-browser-stable (multiple vulnerabilities) and kernel (memory corruption).

    openSUSE has updated coreutils (13.2: multiple vulnerabilities), firefox (13.2, 13.1: multiple vulnerabilities), libraw (13.2, 13.1: denial of service), LibVNCServer (13.2: code execution), quassel (13.2, 13.1: SQL injection), thunderbird (13.2, 13.1: multiple vulnerabilities), and wireshark (13.2; 13.1: multiple vulnerabilities).

    Red Hat has updated chromium-browser (RHEL6: multiple vulnerabilities).

    SUSE has updated KVM (SLES11SP2: code execution), MySQL (SLE11SP3: multiple vulnerabilities), and Xen (SLES11SP2; SLES11SP1; SLES10SP4: two vulnerabilities).

    Ubuntu has updated kernel (14.04: denial of service), linux-lts-trusty (12.04: denial of service), and postgresql-9.1, postgresql-9.3, postgresql-9.4 (15.04, 14.10, 14.04, 12.04: multiple vulnerabilities).

    9:28p
    The Moose is loose: Linux-based worm turns routers into social network bots (Ars Technica)
    Ars Technica takes
    a look
    at the latest malware threat. "A worm that targets cable and DSL modems, home routers, and other embedded computers is turning those devices into a proxy network for launching armies of fraudulent Instagram, Twitter, and Vine accounts as well as fake accounts on other social networks. The new worm can also hijack routers' DNS service to route requests to a malicious server, steal unencrypted social media cookies such as those used by Instagram, and then use those cookies to add "follows" to fraudulent accounts. This allows the worm to spread itself to embedded systems on the local network that use Linux-based operating systems.

    The malware, dubbed "Linux/Moose" by Olivier Bilodeau and Thomas Dupuy of the security firm ESET Canada Research, exploits routers open to connections from the Internet via Telnet by performing brute-force login attempts using default or common administrative credentials. Once connected, the worm installs itself on the targeted device.
    "
    9:45p
    Trouble with the May 22 PostgreSQL update
    If you run PostgreSQL and have applied one of the updates that were
    released on May 22, it would be a good idea to read this
    page
    about an unfortunate bug in those releases. In some
    cases, the problem can cause the server to fail to restart after a crash.
    There is a new release in the works; meanwhile, a workaround is available.

    << Previous Day 2015/05/26
    [Calendar]
    Next Day >>

LWN.net   About LJ.Rossia.org