Войти в систему

Home
    - Создать дневник
    - Написать в дневник
       - Подробный режим

LJ.Rossia.org
    - Новости сайта
    - Общие настройки
    - Sitemap
    - Оплата
    - ljr-fif

Редактировать...
    - Настройки
    - Список друзей
    - Дневник
    - Картинки
    - Пароль
    - Вид дневника

Сообщества

Настроить S2

Помощь
    - Забыли пароль?
    - FAQ
    - Тех. поддержка



Пишет LWN.net ([info]syn_lwnheadline)
@ 2015-02-16 17:59:00


Previous Entry  Add to memories!  Tell a Friend!  Next Entry
Security advisories for Monday

Debian-LTS has updated e2fsprogs (code execution) and nss (two vulnerabilities).

Fedora has updated android-tools (F21: code execution), bugzilla (F21; F20: command injection), community-mysql (F20: multiple unspecified vulnerabilities), dbus (F21: denial of service), libvirt (F21: multiple vulnerabilities), moodle (F21: multiple vulnerabilities), mutt (F21; F20: denial of service), ntp (F21; F20: two vulnerabilities), perl-Gtk2 (F21; F20: code execution), pigz (F21; F20: directory traversal), postgresql (F20: multiple vulnerabilities), puppetlabs-stdlib (F21; F20: privilege escalation), roundcubemail (F21; F20: cross-site scripting), rubygem-actionpack (F21: two information leaks), rubygem-sprockets (F21; F20: directory traversal), unzip (F21: multiple vulnerabilities), and virt-who (F21: information leak).

Gentoo has updated cpio (two vulnerabilities), libpng (memory overwrite), and oracle-jre-bin (multiple vulnerabilities).

Mageia has updated cups (buffer overflow), krb5 (multiple vulnerabilities), and rsync (denial of service).

SUSE has updated krb5 (SLE12; SLE12: multiple vulnerabilities) and ntp (SLES11 SP2: multiple vulnerabilities).



(Читать комментарии) (Добавить комментарий)