refresh packaging to 1.1.0-rc3, and include fix for possible command injection vulerability, see https://bugs.freedesktop.org/show_bug.cgi?id=66670
Monthly Archives: January 2015
Fedora 21 Security Update: kernel-3.18.3-201.fc21
Resolved Bugs
1183232 – [regression] no GPU accelleration in 3.18, no video output in vlc and mplayer
1183289 – USB3 devices broken in 3.18 kernel
1181054 – CVE-2014-9585 kernel: ASLR bruteforce possible for vdso library
1181056 – CVE-2014-9585 kernel: ASLR bruteforce possible for vdso library [fedora-all]
1178975 – endless loop in clock_gettime() on a kvm-based VM
1124119 – usb 3.0 HDD SCSI UASP
1094948 – Backlight control doesn’t work on the Samsung N145P netbook
1115713 – backlight problem with Intel i915 integrated graphics adatper in N4xx/N5xx Atom after kernel 3.14.2
1163574 – Backlight control needs kernel param: video.use_native_backlight=0<br
The 3.18.3 update contains a number of important fixes across the tree. The 201 build should also fix most of the i915 issues seen in testing on 3.18.2-200
The 3.18.2 kernel rebase contains several new features as well as several fixes across the tree.
Fedora 21 Security Update: android-tools-20141219git8393e50-2.fc21
Resolved Bugs
1062095 – CVE-2014-1909 android-tools: stack-based buffer overflow flaw in Android Debug Bridge (ADB) client
1062096 – android-tools: stack-based buffer overflow flaw in Android Debug Bridge (ADB) client [fedora-all]
967216 – Device is offline if adb started via systemd
1175475 – ADB and other Android tools are outdated<br
Harden android-tools
Update to 5.0.2 release
Oracle Critical Patch Update Advisory – January 2015
Ubuntu Patches Several Security Flaws
Ubuntu has released a number of patches for security vulnerabilities in several versions of the OS, including some remote code execution flaws in Thunderbird, which is included with Ubuntu. Thunderbird is Mozilla’s email client, and the company recently fixed several memory corruption vulnerabilities, along with a cross-site request forgery bug and a flaw that could lead to […]
Ubuntu Releases Security Updates
Original release date: January 20, 2015
Ubuntu has released security updates to address multiple vulnerabilities affecting Ubuntu 10.04 LTS, 12.04 LTS, 14.04 LTS, and 14.10. Exploitation of these vulnerabilities may allow an attacker to cause a denial of service or execute arbitrary code.
Users and administrators are encouraged to review Ubuntu Security Notices USN-2460-1, USN-2477-1, USN-2478-1, and USN-2479-1, and apply the necessary updates.
This product is provided subject to this Notification and this Privacy & Use policy.
Vorbis Tools Division-By-Zero / Integer Overflow
Vorbis Tools suffers from a division-by-zero bug and integer overflow vulnerabilities.
Planning Your Digital Legacy
Over the last few years, as I have seen family and friends lose loved ones, I am constantly reminded of the importance of our digital legacy.
Just this past year, a friend and former colleague passed away. I, like so many, was shocked and saddened. He was healthy and vibrant until the day he died of a heart attack while out cycling.
I first learned of his death online – where family and friends announced his passing on a Facebook page. What soon followed was a vast outpouring of friends gathering to remember, mourn and celebrate him, and to console his family and each other.
That Facebook page remains to this day, months later, with occasional new posts that continue in remembrance and celebration of his life.
I don’t know if my friend left a directive about his digital assets, but I do think he would be pleased by the tributes and what has become a living online memorial.
While that approach was absolutely the right one for him as a tech industry figure, it may not be for everyone. We don’t always know what our loved ones would want if and when the time comes. Or we might not know how to secure and remove their assets per their wishes.
“Boomers will be one of the first to leave behind a vast and varied digital footprint”.
Our generation (the Boomers) will be one of the first to leave behind a vast and varied digital footprint – including social media accounts, emails, tweets, images, videos and more. But most of us have yet to consider just what it is we are leaving behind, and what we want others to do with it?
To me, it is like any form of estate planning. It’s something we know we should do, but most of us put off– unless forced to deal with it. Except that it’s not exactly the same, because to date there are few of us who have even thought about our digital legacy, let alone planned for it.
In new research we at AVG have just conducted with those 50-plus (aka Boomers and Seniors), 83% of nearly 5,000 people we polled in nine different countries, have yet to consider their digital legacy.
Among our research findings:
- Even the among the respondents who were familiar with the concept of digital legacy (12%), had never thought about it
- Only 3% could say they actually have taken steps to prepare their family ahead of time
- Yet, when the concept was explained to all, 1 in 4 admitted concerns about having a digital legacy.
This corroborates findings of other earlier independent surveys, which I wrote about in my column first exploring this topic last spring.
Clearly, further education is needed to help people make plans for their online lives – after they are no longer with us.
Even when all relevant paperwork is in place and documented, the task of managing a digital estate of a deceased relative can be a difficult and emotional task.
Here are three suggestions I have on digital legacy planning:
- Make a will and add a digital codicil, which is a simple document that amends your will, to include your digital assets.
- Make a list of your digital assets, passcodes and avatars, if you have them.
- Share information and help educate your family and friends about the need for digital estate planning.
Because AVG is committed to helping people deal with the security and privacy of data, devices and people, this is a topic where we feel we can contribute.
We have developed an eBook Dealing with Digital Death that offers a starting point for tackling the issue.
It offers considerations, recommendations, resources and guidance – from how to tackle the sensitive issues around what to do with social media profiles and blogs to creating memorials and practical information on digital estate planning and how to delete retail accounts. I hope you’ll find it useful.
EMC M&R (Watch4Net) XSS / Upload / Java / Traversal / Overflow
EMC M&R (Watch4Net) suffers from heap overflow, remote file upload, insecure cryptographic storage, cross site scripting, ntp-related, java-related, and path traversal vulnerabilities.
Survey: young people overwhelmingly in favor of biometric security
A survey by Visa Europe has found that the majority of those aged 16 to 24 would feel extremely comfortable with biometric security measures.
The post Survey: young people overwhelmingly in favor of biometric security appeared first on We Live Security.