CentOS Errata and Bugfix Advisory 2015:0747 Upstream details at : https://rhn.redhat.com/errata/RHBA-2015-0747.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: f245f627da322adb2d8745086b7e5b81c95cc6d79e460a8f1975d745e3c4d14c scl-utils-20120927-27.el6_6.i686.rpm 4fcf535dfdc64b868cdfd727b614677318dc2412d3150a8446817396679bdc15 scl-utils-build-20120927-27.el6_6.i686.rpm x86_64: b01a9bfa9332d48e950e4ff36976f7b7d72573fae13708b30993907b7773f7e4 scl-utils-20120927-27.el6_6.x86_64.rpm 829156e2443e46055a58c49456e880d2a0ebbd035369016b6a848b468b23391e scl-utils-build-20120927-27.el6_6.x86_64.rpm Source: 413167a88247d96e3c410fe12f640a7ad214327144372d28b318442b52186fae scl-utils-20120927-27.el6_6.src.rpm
Monthly Archives: March 2015
CESA-2015:0729 Important CentOS 6 setroubleshootSecurity Update
CentOS Errata and Security Advisory 2015:0729 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-0729.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 337223226372dd0f7c8738eb4a42146bcbe5a7e73be7554b8a50dfbc56e33f23 setroubleshoot-3.0.47-6.el6_6.1.i686.rpm ce36a08a17208670740cb124c1fabb0b17a89bf13c1004d5fb0158d5e77e6ba5 setroubleshoot-doc-3.0.47-6.el6_6.1.i686.rpm 0cd4337b7828b5997a1558eb2d7484c9fa9934ff7789025d4bfb65470c4e2d89 setroubleshoot-server-3.0.47-6.el6_6.1.i686.rpm x86_64: 337aafbc28969e98620bf26da2102884f6d735ec66faa4bfe7f519dfa8801a6c setroubleshoot-3.0.47-6.el6_6.1.x86_64.rpm b95ccd8ae276646ed59f31eff82d6a3719c8a6f61408accaaf6b48c8a75827ed setroubleshoot-doc-3.0.47-6.el6_6.1.x86_64.rpm 4854d7c15952b1ce3d3969cd92d62d07c6a0b882a698553abffb66dba1ada470 setroubleshoot-server-3.0.47-6.el6_6.1.x86_64.rpm Source: ba337022d7a8e593c4123db3531a4633267d71d392b1d1101aab9a0cafcdf6a5 setroubleshoot-3.0.47-6.el6_6.1.src.rpm
1501H – MSIE 8 – F12 Developer Tools tooltips use-after-free
Posted by Berend-Jan Wever on Mar 26
TL;DR: Full disclosure of low risk 0-day in MSIE 8 after 60-day deadline
passed
without a fix.
1501H – MSIE 8 – F12 Developer Tools tooltips use-after-free
=====================================
Synopsis
——–
When using the Developer Tools of MSIE 8, one might hover the mouse over a
button in the “Script” tab, at which point a “tooltip” is shown. If one then
clicks the button, a use-after-free occurs.
Known affected…
Insecure file upload in Berta CMS
Posted by Simon Waters on Mar 26
Berta CMS is a web based content management system using PHP and local file storage.
Due to use of a 3rd party Berta CMS website to redirect links within a phishing email brought to our attention we
checked the file upload functionality of this software.
We found that the file upload didn’t require authentication.
Images with a “.php” extension could be uploaded, and all that was required is that they pass…
Berta CMS File Upload Bypass
Berta CMS versions prior to 0.8.10b suffer from an issues where images with a “.php” extension can be uploaded and all that is required is that they pass the PHP getimagesize() function and have suitable dimensions.
Red Hat Security Advisory 2015-0727-01
Red Hat Security Advisory 2015-0727-01 – The kernel-rt packages contain the Linux kernel, the core of any Linux operating system. It was found that the Linux kernel’s Infiniband subsystem did not properly sanitize input parameters while registering memory regions from user space via the verbs API. A local user with access to a /dev/infiniband/uverbsX device could use this flaw to crash the system or, potentially, escalate their privileges on the system. A use-after-free flaw was found in the way the Linux kernel’s SCTP implementation handled authentication key reference counting during INIT collisions. A remote attacker could use this flaw to crash the system or, potentially, escalate their privileges on the system.
Red Hat Security Advisory 2015-0728-01
Red Hat Security Advisory 2015-0728-01 – Red Hat Identity Management is a centralized authentication, identity management, and authorization solution for both traditional and cloud-based enterprise environments. It integrates components of the Red Hat Directory Server, MIT Kerberos, Red Hat Certificate System, NTP, and DNS. It provides web browser and command-line interfaces. Its administration tools allow an administrator to quickly install, set up, and administer a group of domain controllers to meet the authentication and identity management requirements of large-scale Linux and UNIX deployments. The ipa component provides centrally managed Identity, Policy, and Audit. The slapi-nis component provides NIS Server and Schema Compatibility plug-ins for Directory Server.
Red Hat Security Advisory 2015-0726-01
Red Hat Security Advisory 2015-0726-01 – The kernel packages contain the Linux kernel, the core of any Linux operating system. It was found that the Linux kernel’s Infiniband subsystem did not properly sanitize input parameters while registering memory regions from user space via the verbs API. A local user with access to a /dev/infiniband/uverbsX device could use this flaw to crash the system or, potentially, escalate their privileges on the system. A use-after-free flaw was found in the way the Linux kernel’s SCTP implementation handled authentication key reference counting during INIT collisions. A remote attacker could use this flaw to crash the system or, potentially, escalate their privileges on the system.
Red Hat Security Advisory 2015-0729-01
Red Hat Security Advisory 2015-0729-01 – The setroubleshoot packages provide tools to help diagnose SELinux problems. When Access Vector Cache messages are returned, an alert can be generated that provides information about the problem and helps to track its resolution. It was found that setroubleshoot did not sanitize file names supplied in a shell command look-up for RPMs associated with access violation reports. An attacker could use this flaw to escalate their privileges on the system by supplying a specially crafted file to the underlying shell command.
Hotel Internet Gateways Patched Against Remote Exploit
A critical vulnerability in a popular hotel and convention center Internet gateway from AntLabs called InnGate has been patched. The flaw allows attackers read and write access to the devices from the Internet.