Updates the nss package to upstream NSS 3.49. For details about new functionality and a list of bugs fixed in this release please see the upstream release notes * https://developer.mozilla.org/en- US/docs/Mozilla/Projects/NSS/NSS_3.49_release_notes
Archive for January 20th, 2020
Fixes —– A maliciously corrupted file systems can trigger buffer overruns in the quota code used by e2fsck. (Addresses CVE-2019-5094) E2fsck now checks to make sure the casefold flag is only set on directories, and only when the casefold feature is enabled. E2fsck will not disable the low dtime checks when using a backup superblock where the last mount time is zero. This fixes a
Update to Linux v5.4.12 —- Update to Linux v5.4.11
Update to Linux v5.4.12 —- Update to Linux v5.4.11
This update fixes a minor security vulnerability ([`LD_PREFER_MAP_32BIT_EXEC` not ignored in setuid binaries](https://bugzilla.redhat.com/show_bug.cgi?id=1774682) and addresses are long-standing bug where missing shared objects could cause crashes due to incorrectly handled `dlopen` failures (RHBZ#1395758). The latter fix also causes
Lukas Kupczyk reported a vulnerability in the handling of chunked HTTP in openconnect, an open client for Cisco AnyConnect, Pulse and GlobalProtect VPN. A malicious HTTP server (after having accepted its identity certificate), can provide bogus chunk lengths for chunked HTTP
Several security issues were fixed in libbsd.
“You can’t go wrong with Plesk” – An Interview with Softaculous
The post “You can’t go wrong with Plesk” – An Interview with Softaculous appeared first on Plesk.
Several security issues were fixed in Sysstat.