Войти в систему

Home
    - Создать дневник
    - Написать в дневник
       - Подробный режим

LJ.Rossia.org
    - Новости сайта
    - Общие настройки
    - Sitemap
    - Оплата
    - ljr-fif

Редактировать...
    - Настройки
    - Список друзей
    - Дневник
    - Картинки
    - Пароль
    - Вид дневника

Сообщества

Настроить S2

Помощь
    - Забыли пароль?
    - FAQ
    - Тех. поддержка



Пишет LWN.net ([info]syn_lwnheadline)
@ 2016-11-02 16:47:00


Previous Entry  Add to memories!  Tell a Friend!  Next Entry
Security advisories for Wednesday

Arch Linux has updated bind (denial of service).

Debian has updated bind9 (denial of service) and tar (file overwrite).

Debian-LTS has updated libwmf (denial of service), tiff (multiple vulnerabilities), and tiff3 (two vulnerabilities).

Fedora has updated ecryptfs-utils (F23: two vulnerabilities), libass (F23: multiple vulnerabilities), libXfixes (F23: integer overflow), libXrandr (F23: insufficient validation), libXrender (F23: insufficient validation), libXtst (F23: insufficient validation), libXv (F23: insufficient validation), libXvMC (F23: insufficient validation), systemd (F23: denial of service), and tor (F23: denial of service).

Mageia has updated libtiff (two vulnerabilities).

Red Hat has updated java-1.7.0-ibm (RHEL5: multiple vulnerabilities), java-1.7.1-ibm (RHEL6,7: multiple vulnerabilities), and java-1.8.0-ibm (RHEL6,7: multiple vulnerabilities).

SUSE has updated bind (SLE12-SP1,2; SLES12: denial of service), curl (SLE12-SP1; SSO1.3: multiple vulnerabilities), nodejs4 (SLEM12: multiple vulnerabilities), php7 (SLEM12: many vulnerabilities), and php7 (SLEM12: three vulnerabilities in libgd).

Ubuntu has updated bind9 (denial of service), dbus (denial of service from 2015), libgd2 (three vulnerabilities), mailman (two vulnerabilities), oxide-qt (16.10, 16.04, 14.04: multiple vulnerabilities), and python-django (two vulnerabilities).



(Читать комментарии) (Добавить комментарий)