Войти в систему

Home
    - Создать дневник
    - Написать в дневник
       - Подробный режим

LJ.Rossia.org
    - Новости сайта
    - Общие настройки
    - Sitemap
    - Оплата
    - ljr-fif

Редактировать...
    - Настройки
    - Список друзей
    - Дневник
    - Картинки
    - Пароль
    - Вид дневника

Сообщества

Настроить S2

Помощь
    - Забыли пароль?
    - FAQ
    - Тех. поддержка



Пишет LWN.net ([info]syn_lwnheadline)
@ 2016-01-21 18:05:00


Previous Entry  Add to memories!  Tell a Friend!  Next Entry
Thursday's security advisories

Arch Linux has updated bind (two vulnerabilities) and libdwarf (information leak).

Fedora has updated kernel (F23: two vulnerabilities) and prosody (F23; F22: two vulnerabilities).

Mageia has updated bind (two vulnerabilities), cacti (three vulnerabilities), dhcp (denial of service), encfs (code execution from 2014), kernel (privilege escalation), kernel-linus (privilege escalation), kernel-tmb (privilege escalation), moodle (two vulnerabilities), and perl, perl-PathTools (taint botch).

Oracle has updated java-1.8.0-openjdk (OL7: multiple vulnerabilities), kernel (OL5: unspecified), kernel 3.8.13 (OL7; OL6: privilege escalation), and kernel 4.1.12 (OL7; OL6: privilege escalation).

Red Hat has updated java-1.6.0-sun (multiple vulnerabilities), java-1.7.0-openjdk (RHEL6; RHEL5&7: multiple vulnerabilities), java-1.7.0-oracle (multiple vulnerabilities), java-1.8.0-openjdk (RHEL7; RHEL6: multiple vulnerabilities), and java-1.8.0-oracle (RHEL6&7: multiple vulnerabilities).

Scientific Linux has updated java-1.8.0-openjdk (SL6: multiple vulnerabilities).

SUSE has updated bind (SLE12: denial of service) and kernel (SLE12SP1: privilege escalation).



(Читать комментарии) (Добавить комментарий)