Cisco Security Advisory 20150513-tp

Cisco Security Advisory – A vulnerability in the web framework of multiple Cisco TelePresence products could allow an authenticated, remote attacker to inject arbitrary commands that are executed with the privileges of the root user. The vulnerability is due to insufficient input validation. An attacker could exploit this vulnerability by authenticating to the device and submitting crafted input to the affected parameter in a web page. Administrative privileges are required in order to access the affected parameter. A successful exploit could allow an attacker to execute system commands with the privileges of the root user.

CESA-2015:0999 Important CentOS 7 qemu-kvmSecurity Update

CentOS Errata and Security Advisory 2015:0999 Important

Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-0999.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

x86_64:
dda37f8fc9e8c901b4d1709393da94e118a7c2b96c58573e4b2ef044e77c93c1  libcacard-1.5.3-86.el7_1.2.i686.rpm
48a2af56333ae14157c3ee9278d648f45997e54cf8fd0c2f33e381ce5bd0a36b  libcacard-1.5.3-86.el7_1.2.x86_64.rpm
8f3c87cccd75e0254fa9c9d28d890f0e00a51215ac8279183f909cacd4a1cf6b  libcacard-devel-1.5.3-86.el7_1.2.i686.rpm
a1960686a362f7cf8d2e2bdc3088c0de0599649d71a3ce82639d8d1a5a369f5e  libcacard-devel-1.5.3-86.el7_1.2.x86_64.rpm
16f802e69b608cbf0a4b5838b9994e4a598bbc793c7887f0dd2a38ff93a90d0d  libcacard-tools-1.5.3-86.el7_1.2.x86_64.rpm
08f63d81307fcf1e045a37b7c86b28839ec8680c09521857996d4d1ace040a75  qemu-img-1.5.3-86.el7_1.2.x86_64.rpm
d0678f3b174cf068e642d76780704bf4f7fc075db22d567a7ce594b9f6838c4b  qemu-kvm-1.5.3-86.el7_1.2.x86_64.rpm
07804198046372556c874bc5ec8012ddc18e1acf629047ef1e1e7fe4a4667bd1  qemu-kvm-common-1.5.3-86.el7_1.2.x86_64.rpm
2e1ac4f15785f744b60ca2f74f11b84f0667d451ab845a2b054ffe0a0c550c15  qemu-kvm-tools-1.5.3-86.el7_1.2.x86_64.rpm

Source:
f3b89e26b0dc20e86c939e9bd0332b900c6ef695a004b577fba36b3e2c75c77b  qemu-kvm-1.5.3-86.el7_1.2.src.rpm



CESA-2015:0987 Important CentOS 7 kernel SecurityUpdate

CentOS Errata and Security Advisory 2015:0987 Important

Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-0987.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

x86_64:
7a4d5d47579bafa29008ae01338909c2a0f116a4ae63ab4904173c6f80a448c5  kernel-3.10.0-229.4.2.el7.x86_64.rpm
2301601245a7cdae9d9e7ddb11ab9d0369432a9bbe78af10efb47a8ae4f10ad6  kernel-abi-whitelists-3.10.0-229.4.2.el7.noarch.rpm
ccdd59ec62c48366438f378a94e248ea16c6bd8cd3393f0b37d30791cd512c97  kernel-debug-3.10.0-229.4.2.el7.x86_64.rpm
6625087eec9f7ac70d081d044a0a517cc68189fcffe98bd2d8a16f4f400f115f  kernel-debug-devel-3.10.0-229.4.2.el7.x86_64.rpm
890da51da35bd26d5c15732b459554157c67690155835d328639988d1cbf4d8c  kernel-devel-3.10.0-229.4.2.el7.x86_64.rpm
c0703c24a1ecf85187838de5f2f6de1be4e338352396017470dc62ac8d0fa30a  kernel-doc-3.10.0-229.4.2.el7.noarch.rpm
5ff7b3f0fdede1e3b28abec5d366003b88cec24f89258021bb16815383353297  kernel-headers-3.10.0-229.4.2.el7.x86_64.rpm
7880deae0dc939670dbb94dff0dbebc140b1b2b4475852529182f55ae2dbbc44  kernel-tools-3.10.0-229.4.2.el7.x86_64.rpm
8f9fca69c3807583a22a91c4d10ad66a247eb541eb62817a9bf9d3f000d67522  kernel-tools-libs-3.10.0-229.4.2.el7.x86_64.rpm
e0a679abf7090b90068161509db0df2d1234160c9f15998959e0da23b78dcfb4  kernel-tools-libs-devel-3.10.0-229.4.2.el7.x86_64.rpm
880bb5cea72f9158c9b54f6ae5650ac2dee8ab44ad925462b80ab6114c9299c7  perf-3.10.0-229.4.2.el7.x86_64.rpm
a37b855147ea3c0d7e0f90730fcf9c07a8f7bea52302eedf718b841ef9113ff0  python-perf-3.10.0-229.4.2.el7.x86_64.rpm

Source:
2af4c89e3b188ee7012955cab90fa5c0bb366797601909a5fac640b4ba298b22  kernel-3.10.0-229.4.2.el7.src.rpm