Смотрите также связанные темы 18.12.2018 "Лаборатория Касперского" выпустила бету новой линейки корпоративных продуктов В линейке Kaspersky Open Space Security представлены Антивирус Касперского для Windows Workstations 8.0, Kaspersky Administration Kit 8.0, Антивирус Касперского для Windows Server 8.0 и Антивирус Касперского Second Opinion Solution 8.0. Далее
09.11.2018 2008-11-08 - [slackware-security] cups (SSA:2008-312-01) -----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1[slackware-security] cups (SSA:2008-312-01)New cups packages are available for Slackware 12.0, 12.1, and -current tofix security issues.More details about this issue may be found in the CommonVulnerabilities and Exposures (CVE) database: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3639 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3640 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-3641Here are the details from the Slackware 12.1 ChangeLog:+-------------------...
15.01.2018 2009-01-14 - [slackware-security] openssl (SSA:2009-014-01) -----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1[slackware-security] openssl (SSA:2009-014-01)New openssl packages are available for Slackware 11.0, 12.0, 12.1, 12.2,and -current to fix a security issue when connecting to an SSL/TLS serverthat uses a certificate containing a DSA or ECDSA key.More details about this issue may be found here: http://www.openssl.org/news/secadv_20090107.txt http://www.ocert.org/advisories/ocert-2008-016.html http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2008-5077Here are the details from the Slackware 12.2 Change...
21.01.2018 Security and HIPER APARs fixed in DB2 for Linux, UNIX, and Windows Version 9.1 Fix Pack 6a Flash (Alert) Abstract Fix Pack 6a for DB2 V9.1 is now available which includes fixes for some serious vulnerabilities. These fixes, where applicable, are also available in Fixpak 3 for DB2 Version 9.5, Fix Pack 6 for DB2 Version 9.1, and FixPak 17 for DB2 Universal Database™ (DB2 UDB) Version 8.1 (also known as FixPak 10 for DB2 UDB Version 8.2), IBM® recommends that you review the vulnerability descriptions and deploy one of the above fix packs to remove the vulnerabilities on your affected DB2 installations. Content A set of secur...
06.01.2018 2009-01-05 - [slackware-security] samba (SSA:2009-005-01) -----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1[slackware-security] samba (SSA:2009-005-01)New samba packages are available for Slackware 12.2 and -current to fix asecurity issue.More details about this issue may be found in the CommonVulnerabilities and Exposures (CVE) database: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0022Here are the details from the Slackware 12.2 ChangeLog:+--------------------------+patches/packages/samba-3.2.7-i486-1_slack12.2.tgz: Upgraded to samba-3.2.7. This fixes a security issue. &n...
17.02.2018 CVE-2009-0611 Multiple cross-site scripting (XSS) vulnerabilities in qfsearch/AdminServlet in QuickFinder Server in Novell Open Enterprise Server 1.x allow remote attackers to inject arbitrary web script or HTML via (1) the siteloc parameter in a displayaddsite action, the site parameter in a (2) generalproperties or (3) clusterserviceproperties action, (4) the adminurl parameter in a global action, or (5) the print-list parameter.
27.04.2018 2009-04-26 - [slackware-security] cups (SSA:2009-116-01) -----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1[slackware-security] cups (SSA:2009-116-01)New cups packages are available for Slackware 12.0, 12.1, 12.2, and -current tofix security issues.More details about this issue may be found in the CommonVulnerabilities and Exposures (CVE) database: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0146 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0147 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0163 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0164&n...
04.06.2018 2009-06-03 - [slackware-security] ntp (SSA:2009-154-01) -----BEGIN PGP SIGNED MESSAGE-----Hash: SHA1[slackware-security] ntp (SSA:2009-154-01)New ntp packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2,11.0, 12.0, 12.1, 12.2, and -current to fix security issues.More details about this issue may be found in the CommonVulnerabilities and Exposures (CVE) database: http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0159 http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1252Here are the details from the Slackware 12.2 ChangeLog:+--------------------------+patches/packages...
09.12.2018 2009-12-08 - [slackware-security] kernel (SSA:2009-342-01) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] kernel (SSA:2009-342-01) New Linux kernel packages are available for Slackware 13.0 and -current to address a security issue. A kernel bug discovered by David Ford may allow remote attackers to crash the kernel by sending an oversized IP packet. While the impact on ordinary servers is still unclear (the problem was noticed while running openvasd), we are issuing these kernel packages as a preemptive measure. For more information, see: http://cve.mitre.o...
26.04.2018 2010-04-26 - [slackware-security] irssi (SSA:2010-116-01) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 [slackware-security] irssi (SSA:2010-116-01) New irssi packages are available for Slackware 10.1, 10.2, 11.0, 12.0, 12.1, 12.2, 13.0, and -current to fix security issues. Here are the details from the Slackware 13.0 ChangeLog: +--------------------------+ patches/packages/irssi-0.8.15-i486-1_slack13.0.txz: Upgraded. From the NEWS file: - Check if an SSL certificate matches the hostname of the server we are connecting to. &nb...
|