Users login

Create an account »

JOIN XATRIX

Users login

Home » Security Advisories

Security Advisories

Here you'll find the latest security advisories from various Vendors.
Page: 123456 out of 720

OpenStack Nova vulnerability | USN-2325-1 | August 21, 2014

OpenStack Keystone vulnerabilities | USN-2324-1 | August 21, 2014

OpenStack Horizon vulnerabilities | USN-2323-1 | August 21, 2014

OpenStack Glance vulnerability | USN-2322-1 | August 21, 2014

OpenStack Neutron vulnerabilities | USN-2321-1 | August 21, 2014

OpenStack Ceilometer vulnerability | USN-2311-2 | August 21, 2014

Important Red Hat JBoss Web Server 2.1.0 update | RHSA-2014:1088-01 | August 21, 2014
The following security issues are also fixed with this release:

Important Red Hat JBoss Web Server 2.1.0 update | RHSA-2014:1087-01 | August 21, 2014
The following security issues are also fixed with this release:

Important Red Hat JBoss Web Server 2.1.0 update | RHSA-2014:1086-01 | August 21, 2014

drupal7-date 2.8 updates | FEDORA-2014-9052 | August 21, 2014
Update to upstream 2.8 release due to security fix for CVE-2014-5169

libndp 1.4 updates | FEDORA-2014-8972 | August 21, 2014
- Update to 1.4 - libndp: fix buffer overflow in ndp_msg_opt_dnssl_domain()

wordpress 3.9.2 updates | FEDORA-2014-9264 | August 21, 2014
Upstream annoucement: http://wordpress.org/news/2014/08/wordpress-3-9-2/

drupal7-date 2.8 updates | FEDORA-2014-9087 | August 21, 2014
Update to upstream 2.8 release, due to security fix for CVE-2014-5169

Moderate openstack-nova security, bug fix, and enhancement update | RHSA-2014:1084-01 | August 21, 2014
A side-channel timing attack flaw was found in nova. An attacker could possibly use this flaw to guess valid instance ID signatures, giving them access to details of another instance, by analyzing the

Oxide vulnerabilities | USN-2320-1 | August 21, 2014

Important kernel-rt security and bug fix update | RHSA-2014:1083-01 | August 20, 2014
* Multiple use-after-free flaws and an integer overflow flaw were found in the way the Linux kernel's Advanced Linux Sound Architecture (ALSA) implementation handled user controls. A local, privileged

Important thermostat1-httpcomponents-client security update | RHSA-2014:1082-01 | August 20, 2014
It was found that the fix for CVE-2012-5783 was incomplete: the code added to check that the server hostname matches the domain name in a subject's Common Name (CN) field in X.509 certificates was fla

Moderate openstack-neutron security update | RHSA-2014:1078-01 | August 20, 2014
Red Hat would like to thank the OpenStack project for reporting this issue. Upstream acknowledges Liping Mao from Cisco as the original reporter.

OpenJDK 7 vulnerabilities | USN-2319-1 | August 20, 2014

Moderate qemu-kvm-rhev security and bug fix update | RHSA-2014:1076-01 | August 19, 2014
Red Hat would like to thank NSA for reporting these issues.

Moderate qemu-kvm security and bug fix update | RHSA-2014:1075-01 | August 19, 2014
Red Hat would like to thank NSA for reporting these issues.

kernel 3.14.17 updates | FEDORA-2014-9449 | August 19, 2014
The 3.14.17 stable update contains a number of important fixes across the tree. Fix CVE-2014-5206, CVE-2014-5207: ro bind mount bypass with namespaces The 3.14.16 stable update contains a number of im
» CVE-2013-0343 Low: The ipv6_create_tempaddr function in n (4.90) » CVE-2013-1059 High: net/ceph/auth_none.c in the Linux kern (6.90)

OpenSSL regression | USN-2232-4 | August 18, 2014

Low nss, nss-util, nss-softokn security, bug fix, and enhancement update | RHSA-2014:1073-01 | August 18, 2014
In addition, the nss, nss-util, and nss-softokn packages have been upgraded to upstream version 3.16.2, which provides a number of bug fixes and enhancements over the previous versions. (BZ#1124659)

Linux kernel vulnerabilities | USN-2318-1 | August 18, 2014

Page: 123456 out of 720

Newsletter signup

Signup to our monthly newsletter and stay in touch with IT news!

Free E-books

We've got ebooks! But they're not online. :( Please give us a few days to bring downloads back.

Contact

Have something to say or just wanna drop us a line? Please keep this in mind: to spam, we reply with spam.

Contact us »