Dernières alertes de sécurité

Mageia 2023-0287: libX11 security update

> date : 2023-10-14 00:58:00
> lien : https://linuxsecurity.com/advisories/mageia/mageia-2023-0287...

A vulnerability was found in libX11 due to a boundary condition within the _XkbReadKeySyms() function. This flaw allows a local user to trigger an out-of-bounds read error and read the contents of memory on the system. (CVE-2023-43785) [...]

Mageia 2023-0288: the curl security update

> date : 2023-10-14 00:58:00
> lien : https://linuxsecurity.com/advisories/mageia/mageia-2023-0288...

curl/libcurl is vulnerable to a heap buffer overflow in its SOCKS5 support that could be exploited by a remote web server when curl is configured to use a SOCKS5 proxy with remote hostname resolution. libcurl is vulnerable to a cookie injection attack where a local [...]

Mageia 2023-0286: glibc security update

> date : 2023-10-11 23:05:00
> lien : https://linuxsecurity.com/advisories/mageia/mageia-2023-0286...

The updated packages fix a security vulnerability: A buffer overflow was discovered in the GNU C Library's dynamic loader ld.so while processing the GLIBC_TUNABLES environment variable. This issue could allow a local attacker to use maliciously crafted [...]

Mageia 2023-0284: cups security update

> date : 2023-10-10 19:23:00
> lien : https://linuxsecurity.com/advisories/mageia/mageia-2023-0284...

The updated packages fix security vulnerabilities: It was discovered that CUPS incorrectly authenticated certain remote requests. A remote attacker could possibly use this issue to obtain recently printed documents. (CVE-2023-32360) [...]

| page 1 | page suivante |


 

  Sécurité



  Classement

Selon le comparatif phwinfo.com, Ironie.org est 3ème au classement des mutualisés !

   

  Nouvelles

Consulter les dernières actualités de plus de 300 sources d'informations différentes.

  news.ironie.org

connected from address localhost (127.0.0.1:33510)
using CCBot/2.0 (https://commoncrawl.org/faq/)
served for Ironie.org by Debian GNU/Linux