LWN.net's Journal
 
[Most Recent Entries] [Calendar View]

Friday, September 4th, 2015

    Time Event
    3:28p
    Friday's security updates

    CentOS has updated spice (C7: code execution) and spice-server (C6: code execution).

    Debian has updated chromium-browser (multiple vulnerabilities) and screen (denial of service).

    Fedora has updated mediawiki (F21; F22: multiple vulnerabilities) and struts (F22: input validation bypass).

    openSUSE has updated firefox (13.1, 13.2: multiple vulnerabilities).

    Oracle has updated bind (O7; O6; O5: denial of service), bind97 (O5: multiple vulnerabilities), libXfont (O7; O6: multiple vulnerabilities), spice (O7: code execution), and spice-server (O6: code execution).

    Red Hat has updated chromium-browser (RHEL6: multiple vulnerabilities), openshift (RHOSE3: denial of service), openstack-nova (RHELOSP7: denial of service), qemu-kvm-rhev (RHELOSP7: information leak), spice (RHEL7: code execution), and spice-server (RHEL6: code execution).

    Scientific Linux has updated spice-server (SL7; SL6: code execution).

    Slackware has updated seamonkey (multiple vulnerabilities).

    SUSE has updated kernel (SLELP12 3.12.43; 3.12.39; 3.12.38; 3.12.36; 3.12.32: multiple vulnerabilities).

    Ubuntu has updated kernel (12.04: information leak; 14.04: code execution), libvdpau (12.04, 14.04, 15.04: multiple vulnerabilities), linux-lts-trusty (12.04: code execution), linux-ti-omap4 (12.04: information leak), and openslp-dfsg (12.04, 14.04, 15.04: denial of service).

    10:03p
    Mozilla: Improving Security for Bugzilla

    The Mozilla blog has disclosed that the official Mozilla instance of Bugzilla was recently compromised by an attacker who stole "security-sensitive information" related to unannounced vulnerabilities in Firefox—in particular, the PDF Viewer exploit discovered on August 5. The blog post explains that Mozilla has now taken several steps to reduce the risk of future attacks using Bugzilla as a stepping stone. "As an immediate first step, all users with access to security-sensitive information have been required to change their passwords and use two-factor authentication. We are reducing the number of users with privileged access and limiting what each privileged user can do. In other words, we are making it harder for an attacker to break in, providing fewer opportunities to break in, and reducing the amount of information an attacker can get by breaking in."

    << Previous Day 2015/09/04
    [Calendar]
    Next Day >>

LWN.net   About LJ.Rossia.org