Red Hat Security Advisory 2015-0989-01

Red Hat Security Advisory 2015-0989-01 – The kernel-rt packages contain the Linux kernel, the core of any Linux operating system. A buffer overflow flaw was found in the way the Linux kernel’s Intel AES-NI instructions optimized version of the RFC4106 GCM mode decryption functionality handled fragmented packets. A remote attacker could use this flaw to crash, or potentially escalate their privileges on, a system over a connection with an active AEC-GCM mode IPSec security association. This update provides a build of the kernel-rt package for Red Hat Enterprise MRG 2.5, which is layered on Red Hat Enterprise Linux 6. The kernel-rt sources have been updated to include fixes for the following issues:

Debian Security Advisory 3258-1

Debian Linux Security Advisory 3258-1 – It was discovered that the fix for CVE-2013-4422 in quassel, a distributed IRC client, was incomplete. This could allow remote attackers to inject SQL queries after a database reconnection (e.g. when the backend PostgreSQL server is restarted).

Red Hat Security Advisory 2015-0987-01

Red Hat Security Advisory 2015-0987-01 – The kernel packages contain the Linux kernel, the core of any Linux operating system. A buffer overflow flaw was found in the way the Linux kernel’s Intel AES-NI instructions optimized version of the RFC4106 GCM mode decryption functionality handled fragmented packets. A remote attacker could use this flaw to crash, or potentially escalate their privileges on, a system over a connection with an active AEC-GCM mode IPSec security association.

Red Hat Security Advisory 2015-0990-01

Red Hat Security Advisory 2015-0990-01 – The pcs packages provide a command-line tool and a web UI to configure and manage the Pacemaker and Corosync tools. It was found that the pcs daemon did not sign cookies containing session data that were sent to clients connecting via the pcsd web UI. A remote attacker could use this flaw to forge cookies and bypass authorization checks, possibly gaining elevated privileges in the pcsd web UI. Note: the pcsd web UI is not enabled by default. This issue was discovered by Tomas Jelinek of Red Hat.

HP Security Bulletin HPSBMU03330 1

HP Security Bulletin HPSBMU03330 1 – A potential security vulnerability has been identified with HP Matrix Operating Environment (MOE). This is the GlibC vulnerability known as “GHOST” which could be exploited remotely resulting in execution of code. Revision 1 of this advisory.

Red Hat Security Advisory 2015-0988-01

Red Hat Security Advisory 2015-0988-01 – Mozilla Firefox is an open source web browser. XULRunner provides the XUL Runtime environment for Mozilla Firefox. Several flaws were found in the processing of malformed web content. A web page containing malicious content could cause Firefox to crash or, potentially, execute arbitrary code with the privileges of the user running Firefox. A heap-based buffer overflow flaw was found in the way Firefox processed compressed XML data. An attacker could create specially crafted compressed XML content that, when processed by Firefox, could cause it to crash or execute arbitrary code with the privileges of the user running Firefox.

CEBA-2015:0976 CentOS 7 corosync BugFix Update

CentOS Errata and Bugfix Advisory 2015:0976 

Upstream details at : https://rhn.redhat.com/errata/RHBA-2015-0976.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

x86_64:
91b395f5d8785045c4b4d11b3c18e63e64f75df5b38b1b648117139aef47b225  corosync-2.3.4-4.el7_1.1.x86_64.rpm
c91d1d782f5321d7a60f1856b226f15923269aba174f5d1014ebb95b272000f4  corosynclib-2.3.4-4.el7_1.1.i686.rpm
4fc31c92b0a0a5bd99d21abcfeffe6cb81a5e7d06196d773a86be4989ea7eea3  corosynclib-2.3.4-4.el7_1.1.x86_64.rpm
6e14693d851727d98afe558537db5c91317db0b3aa83e496858f79b622c6edc9  corosynclib-devel-2.3.4-4.el7_1.1.i686.rpm
c986a6f60c5058590a29b5465e8b0d35acacdc35ab0aab923c78bb1a25082fb8  corosynclib-devel-2.3.4-4.el7_1.1.x86_64.rpm

Source:
7e4d603467ccc0f22c9c9adfe7d18fa96f41d3d1818aa575666f77f550af2ddf  corosync-2.3.4-4.el7_1.1.src.rpm



CESA-2015:0986 Moderate CentOS 7 kexec-toolsSecurity Update

CentOS Errata and Security Advisory 2015:0986 Moderate

Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-0986.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

x86_64:
3155c6d4590e7473870d3dc2356ac05e8f22b077ed6a86ffdb486a4c8ae319c8  kexec-tools-2.0.7-19.el7_1.2.x86_64.rpm
bc03603dfbc9436e6e88771e21cb30c800a0c0f4a93ea201d0bd50e591660c53  kexec-tools-anaconda-addon-2.0.7-19.el7_1.2.x86_64.rpm
2e2e6848a5f66bc1edb7da437a5b1812e25f67148e53d2c461f20819c8181e35  kexec-tools-eppic-2.0.7-19.el7_1.2.x86_64.rpm

Source:
ec1347bcb61a82dfdf40161790afed5f92f79077d3ec2c8f9cd990396175e385  kexec-tools-2.0.7-19.el7_1.2.src.rpm



CESA-2015:0988 Critical CentOS 7 firefox SecurityUpdate

CentOS Errata and Security Advisory 2015:0988 Critical

Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-0988.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

x86_64:
0515534be7270e32c574f9d869fa86afacb9285285c394d7b5a3d0a50c7a8838  firefox-38.0-3.el7.centos.i686.rpm
3b0c44ed663e3270058f9dc19f088b34380cc854a3632dd41db4ec2ba2551c67  firefox-38.0-3.el7.centos.x86_64.rpm

Source:
4d106e031fffbf2c7c19f8f9fbc8f9253d5dc8aa5c8d0e97facb8f22db84e27b  firefox-38.0-3.el7.centos.src.rpm