No Image

USN-3231-1: Pidgin vulnerability

2017-03-14 KENNETH 0

USN-3231-1: Pidgin vulnerability Ubuntu Security Notice USN-3231-1 14th March, 2017 pidgin vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 14.04 LTS Ubuntu 12.04 LTS Summary Pidgin could be made to crash or run programs if it received specially crafted network traffic. Software description pidgin – graphical multi-protocol instant messaging client for X Details Joseph Bisch discovered that Pidgin incorrectly handled certain xmlmessages. A remote attacker could use this issue to cause Pidgin to crash,resulting in a denial of service, or possibly execute arbitrary code. Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 14.04 LTS: libpurple0 1:2.10.9-0ubuntu3.4 Ubuntu 12.04 LTS: libpurple0 1:2.10.3-0ubuntu1.8 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. After a standard system update you need to restart Pidgin to make all thenecessary changes. References [ more… ]

No Image

Recovering from a Failed NGINX Plus Upgrade: ‘module “M” version X instead of Y’

2017-03-14 KENNETH 0

Recovering from a Failed NGINX Plus Upgrade: ‘module “M” version X instead of Y’ If you are using dynamic modules, you might see an error like this during the upgrade to a new NGINX or NGINX Plus release: Setting up nginx-plus (1.11.10-1~xenial) … nginx: [emerg] module “/etc/nginx/modules/ngx_http_geoip_module.so” version 1011005 instead of 1011006 in /etc/nginx/nginx.conf:7 nginx: configuration file /etc/nginx/nginx.conf test failed invoke-rc.d: initscript nginx, action “upgrade” failed. The most likely reason is that you haven’t upgraded the specified dynamic module (.so file): If you are running open source NGINX, dynamic modules must be compiled against the version you are upgrading to. If you are running NGINX Plus, dynamic modules must be compiled against the open source NGINX version that corresponds to the NGINX Plus release you are upgrading to. For the sake of brevity we’ll refer to NGINX Plus only from now on. Don’t Panic! [ more… ]

No Image

Introduction to nginScript

2017-03-14 KENNETH 0

Introduction to nginScript <!– table, th, td { border: 1px solid black; } th { background-color: #d3d3d3; align: left; padding-left: 5px; padding-bottom: 2px; padding-top: 2px; line-height: 120%; } td { padding-left: 5px; padding-bottom: 5px; padding-top: 5px; line-height: 120%; } td.center { text-align: center; padding-bottom: 5px; padding-top: 5px; line-height: 120%; } –> Harnessing the Power and Convenience of JavaScript for Each Request Since nginScript launched in September 2015 it has been remained an experimental module while additional capabilities and core language support were added. With NGINX Plus R12 we are pleased to announce that nginScript is now generally available as a stable module for NGINX and NGINX Plus. nginScript is a unique JavaScript implementation for NGINX and NGINX Plus, designed specifically for server‑side use cases and per‑request processing. It extends NGINX configuration syntax with JavaScript code in order to implement sophisticated configuration solutions. The [ more… ]

Announcing NGINX Plus R12

2017-03-14 KENNETH 0

Announcing NGINX Plus R12 Today we are pleased to announce that NGINX Plus R12 is available as a free upgrade for all NGINX Plus subscribers. NGINX Plus is a high‑performance software application delivery platform that includes a load balancer, content cache, and web server. NGINX Plus R12 is a significant release with new features focused on clustering, customization, and monitoring. <!–To learn more about NGINX Plus R12, you can also sign up for our live webinar to be held on Wednesday, April 12, 2017 at 10:00 AM PT. –> Enterprise users will benefit from the new clustering feature, which simplifies the process of managing highly available clusters of NGINX Plus servers. All users will benefit from official support for nginScript, a lightweight and high‑performance scripting language that is embedded directly into the NGINX configuration. Improvements in monitoring and instrumentation, caching, and health checks improve the [ more… ]

No Image

RHSA-2017:0499-1: Important: chromium-browser security update

2017-03-14 KENNETH 0

RHSA-2017:0499-1: Important: chromium-browser security update Red Hat Enterprise Linux: An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. CVE-2017-5029, CVE-2017-5030, CVE-2017-5031, CVE-2017-5032, CVE-2017-5033, CVE-2017-5034, CVE-2017-5035, CVE-2017-5036, CVE-2017-5037, CVE-2017-5038, CVE-2017-5039, CVE-2017-5040, CVE-2017-5041, CVE-2017-5042, CVE-2017-5043, CVE-2017-5044, CVE-2017-5045, CVE-2017-5046 Source: RHSA-2017:0499-1: Important: chromium-browser security update