Slackware Security Advisory – New mozilla-firefox packages are available for Slackware 14.1 and -current to fix security issues.
Monthly Archives: May 2015
Red Hat Security Advisory 2015-0998-01
Red Hat Security Advisory 2015-0998-01 – KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides the user-space component for running virtual machines using KVM. An out-of-bounds memory access flaw was found in the way QEMU’s virtual Floppy Disk Controller handled FIFO buffer access while processing certain FDC commands. A privileged guest user could use this flaw to crash the guest or, potentially, execute arbitrary code on the host with the privileges of the host’s QEMU process corresponding to the guest.
Red Hat Security Advisory 2015-1002-01
Red Hat Security Advisory 2015-1002-01 – The xen packages contain administration tools and the xend service for managing the kernel-xen kernel for virtualization on Red Hat Enterprise Linux. An out-of-bounds memory access flaw was found in the way QEMU’s virtual Floppy Disk Controller handled FIFO buffer access while processing certain FDC commands. A privileged guest user could use this flaw to crash the guest or, potentially, execute arbitrary code on the host with the privileges of the host’s QEMU process corresponding to the guest.
Red Hat Security Advisory 2015-1003-01
Red Hat Security Advisory 2015-1003-01 – KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. An out-of-bounds memory access flaw was found in the way QEMU’s virtual Floppy Disk Controller handled FIFO buffer access while processing certain FDC commands. A privileged guest user could use this flaw to crash the guest or, potentially, execute arbitrary code on the host with the privileges of the host’s QEMU process corresponding to the guest.
Ubuntu Security Notice USN-2608-1
Ubuntu Security Notice 2608-1 – Jason Geffner discovered that QEMU incorrectly handled the virtual floppy driver. This issue is known as VENOM. A malicious guest could use this issue to cause a denial of service, or possibly execute arbitrary code on the host as the user running the QEMU process. In the default installation, when QEMU is used with libvirt, attackers would be isolated by the libvirt AppArmor profile. Daniel P. Berrange discovered that QEMU incorrectly handled VNC websockets. A remote attacker could use this issue to cause QEMU to consume memory, resulting in a denial of service. This issue only affected Ubuntu 14.04 LTS, Ubuntu 14.10 and Ubuntu 15.04. Various other issues were also addressed.
CVE-2015-3456
The Floppy Disk Controller (FDC) in QEMU, as used in Xen 4.5.x and earlier and KVM, allows local guest users to cause a denial of service (out-of-bounds write and guest crash) or possibly execute arbitrary code via the (1) FD_CMD_READ_ID, (2) FD_CMD_DRIVE_SPECIFICATION_COMMAND, or other unspecified commands, aka VENOM.
CESA-2015:1003 Important CentOS 5 kvm SecurityUpdate
CentOS Errata and Security Advisory 2015:1003 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1003.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 1207b343118a6fdb23ebd56cecbadee6d8dec3a63afac898dab6528716457df4 kmod-kvm-83-272.el5.centos.x86_64.rpm 1396f4ccb7fd43156fc56ce14469f59609ee1620466560cbdb876c33970df5d6 kmod-kvm-debug-83-272.el5.centos.x86_64.rpm 2e0218f216a85edf1ea12d0daf665e003faba13774ae165d88010c2bd3594d8c kvm-83-272.el5.centos.x86_64.rpm bfa8d6952299a4190525c97cf0a25c38b40fdad2fc6d6a363a3e52c286f7bc10 kvm-qemu-img-83-272.el5.centos.x86_64.rpm c3016d77a7f28eb7d826ed9d0ad84e541ad51a504008d331dcb8fca11bfeff22 kvm-tools-83-272.el5.centos.x86_64.rpm Source: a2bcb8ee1e7b08249352c79ae33df472831849694b5559d746c43241f949782b kvm-83-272.el5.centos.src.rpm
Wireshark Analyzer 1.12.5
Wireshark is a GTK+-based network protocol analyzer that lets you capture and interactively browse the contents of network frames. The goal of the project is to create a commercial-quality analyzer for Unix and Win32 and to give Wireshark features that are missing from closed-source sniffers.
SAP LZC/LZH Compression Denial Of Service
Core Security Technologies Advisory – SAP products make use of a proprietary implementation of the Lempel-Ziv-Thomas (LZC) adaptive dictionary compression algorithm and the Lempel-Ziv-Huffman (LZH) compression algorithm. These compression algorithms are used across several SAP products and programs. Vulnerabilities were found in the decompression routines that could be triggered in different scenarios, and could lead to execution of arbitrary code and denial of service conditions.
Concrete5 5.7.3.1 Cross Site Scripting
Concrete5 version 5.7.3.1 suffers from multiple cross site scripting vulnerabilities.