27.02.2019 13:39 LinuxSecurity.com: An update that solves one vulnerability and has one errata is now available.
27.02.2019 08:04 LinuxSecurity.com: New openssl packages are available for Slackware 14.2 to fix a security issue.
27.02.2019 05:05 LinuxSecurity.com: Security fix for CVE-2018-16741,CVE-2018-16744,CVE-2018-16745
27.02.2019 05:05 LinuxSecurity.com: 8u201 update
27.02.2019 03:07 LinuxSecurity.com: Security fix for CVE-2018-16741,CVE-2018-16744,CVE-2018-16745
27.02.2019 03:07 LinuxSecurity.com: 8u201 update
26.02.2019 22:32 LinuxSecurity.com: Several issues have been found in exiv2, a EXIF/IPTC/XMP metadata manipulation tool.
26.02.2019 22:32 LinuxSecurity.com: An update that fixes 15 vulnerabilities is now available.
26.02.2019 22:32 LinuxSecurity.com: An update that solves two vulnerabilities and has one errata is now available.
26.02.2019 22:32 LinuxSecurity.com: An update that solves two vulnerabilities and has one errata is now available.
26.02.2019 22:32 LinuxSecurity.com: An update that solves four vulnerabilities and has four fixes is now available.
26.02.2019 22:32 LinuxSecurity.com: An update that solves three vulnerabilities and has one errata is now available.
26.02.2019 22:32 LinuxSecurity.com: OpenJDK: memory disclosure in FileChannelImpl SL6 x86_64 java-1.8.0-openjdk-1.8.0.201.b09-1.el6_10.x86_64.rpm java-1.8.0-openjdk-debuginfo-1.8.0.201.b09-1.el6_10.x86_64.rpm java-1.8.0-openjdk-headless-1.8.0.201.b09-1.el6_10.x86_64.rpm java-1.8.0-openjdk-debug-1.8.0.201.b09-1.el6_10.x86_64.rpm java-1.8.0-openjdk-demo-1.8.0.201.b09-1.el
26.02.2019 22:32 LinuxSecurity.com: polkit: Temporary auth hijacking via PID reuse and non-atomic fork SL6 x86_64 polkit-0.96-11.el6_10.1.i686.rpm polkit-0.96-11.el6_10.1.x86_64.rpm polkit-debuginfo-0.96-11.el6_10.1.i686.rpm polkit-debuginfo-0.96-11.el6_10.1.x86_64.rpm polkit-devel-0.96-11.el6_10.1.i686.rpm polkit-devel-0.96-11.el6_10.1.x86_64.rpm polkit-docs-0.96-11.el6_10.1.x86_64
26.02.2019 22:32 LinuxSecurity.com: kernel: MIDI driver race condition leads to a double-free Bug Fix : * Previously backported upstream patch caused a change in the behavior of page fault handler. As a consequence, applications compiled through GNU Compiler Collection version 4.4.7 sometimes generated stack access exceeding the 64K limit. Running such applications subsequently triggered a segmentatio