Войти в систему

Home
    - Создать дневник
    - Написать в дневник
       - Подробный режим

LJ.Rossia.org
    - Новости сайта
    - Общие настройки
    - Sitemap
    - Оплата
    - ljr-fif

Редактировать...
    - Настройки
    - Список друзей
    - Дневник
    - Картинки
    - Пароль
    - Вид дневника

Сообщества

Настроить S2

Помощь
    - Забыли пароль?
    - FAQ
    - Тех. поддержка



Пишет LWN.net ([info]syn_lwnheadline)
@ 2013-07-31 17:05:00


Previous Entry  Add to memories!  Tell a Friend!  Next Entry
Security advisories for Wednesday

CentOS has updated 389-ds-base (C6: information disclosure), haproxy (C6: denial of service), and sos (C5: privilege escalation).

Fedora has updated fdupes (F17; F18; F19: overwrites file permissions), libkdcraw (F17: code execution), moodle (F17: multiple vulnerabilities), rubygem-passenger (F17; F18; F19: insecure temporary directory usage), and xlockmore (F19: screen lock bypass). Today's update to Fedora 17's libkdcraw was accompanied by over 100 security advisories for various KDE packages, none of which are actually affected.

openSUSE has updated file-roller (path traversal).

Oracle has updated 389-ds-base (OL6: information disclosure), bind (OL6: denial of service), and sos (OL5: privilege escalation).

Red Hat has updated 389-ds-base (RHEL6: information disclosure), haproxy (RHEL6: denial of service), and sos (RHEL5: privilege escalation).

Scientific Linux has updated 389-ds-base (SL6: information disclosure), haproxy (SL6: denial of service), and sos (SL5: privilege escalation).

SUSE has updated IBM Java 1.6.0 (multiple vulnerabilities).

Ubuntu has updated linux-ti-omap4 (13.04: format string vulnerability).



(Читать комментарии) (Добавить комментарий)