CentOS Errata and Security Advisory 2015:0988 Critical Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-0988.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: e16e0881adb2c9d38b91e1d3f462b771aafed76a09180ea20919d6eb67f2d409 firefox-38.0-4.el5.centos.i386.rpm x86_64: e16e0881adb2c9d38b91e1d3f462b771aafed76a09180ea20919d6eb67f2d409 firefox-38.0-4.el5.centos.i386.rpm 4697bf29bd2e7f8d882e1e8a114a166bcda18c5bca3201e025ef05aa0450eb85 firefox-38.0-4.el5.centos.x86_64.rpm Source: 0f483bacff00c84f27c876e873471a05bbde3a013aae3728d88eeb141a1b5b43 firefox-38.0-4.el5.centos.src.rpm
Monthly Archives: May 2015
Bugtraq: [slackware-security] mysql (SSA:2015-132-02)
[slackware-security] mysql (SSA:2015-132-02)
Bugtraq: [slackware-security] wpa_supplicant (SSA:2015-132-03)
[slackware-security] wpa_supplicant (SSA:2015-132-03)
Bugtraq: [security bulletin] HPSBMU03330 rev.1 – HP Matrix Operating Environment (MOE) running glibc on Linux, Remote Disclosure of Information
[security bulletin] HPSBMU03330 rev.1 – HP Matrix Operating Environment (MOE) running glibc on Linux, Remote Disclosure of Information
Bugtraq: [SECURITY] [DSA 3258-1] quassel security update
[SECURITY] [DSA 3258-1] quassel security update
Red Hat Security Advisory 2015-0981-01
Red Hat Security Advisory 2015-0981-01 – The kernel-rt packages contain the Linux kernel, the core of any Linux operating system. A buffer overflow flaw was found in the way the Linux kernel’s Intel AES-NI instructions optimized version of the RFC4106 GCM mode decryption functionality handled fragmented packets. A remote attacker could use this flaw to crash, or potentially escalate their privileges on, a system over a connection with an active AEC-GCM mode IPSec security association. The kernel-rt packages have been upgraded to version 3.10.0-229.4.1, which provides a number of bug fixes and enhancements over the previous version, including:
Red Hat Security Advisory 2015-0983-01
Red Hat Security Advisory 2015-0983-01 – Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages technologies. It was discovered that the ChunkedInputFilter in Tomcat did not fail subsequent attempts to read input after malformed chunked encoding was detected. A remote attacker could possibly use this flaw to make Tomcat process part of the request body as new request, or cause a denial of service. All Tomcat 7 users are advised to upgrade to these updated packages, which contain a backported patch to correct this issue. After installing this update, the tomcat service will be restarted automatically.
Red Hat Security Advisory 2015-0986-01
Red Hat Security Advisory 2015-0986-01 – The kexec-tools packages contain the /sbin/kexec binary and utilities that together form the user-space component of the kernel’s kexec feature. The /sbin/kexec binary facilitates a new kernel to boot using the kernel’s kexec feature either on a normal or a panic reboot. The kexec fastboot mechanism allows booting a Linux kernel from the context of an already running kernel. It was found that the module-setup.sh script provided by kexec-tools created temporary files in an insecure way. A malicious, local user could use this flaw to conduct a symbolic link attack, allowing them to overwrite the contents of arbitrary files.
Red Hat Security Advisory 2015-0991-01
Red Hat Security Advisory 2015-0991-01 – Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages technologies. It was discovered that the ChunkedInputFilter in Tomcat did not fail subsequent attempts to read input after malformed chunked encoding was detected. A remote attacker could possibly use this flaw to make Tomcat process part of the request body as new request, or cause a denial of service.
Red Hat Security Advisory 2015-0980-01
Red Hat Security Advisory 2015-0980-01 – The pcs packages provide a command-line tool and a web UI to configure and manage the Pacemaker and Corosync tools. It was found that the pcs daemon did not sign cookies containing session data that were sent to clients connecting via the pcsd web UI. A remote attacker could use this flaw to forge cookies and bypass authorization checks, possibly gaining elevated privileges in the pcsd web UI. This issue was discovered by Tomas Jelinek of Red Hat.