Ubuntu Security Notice 2606-1 – For compatibility reasons, Ubuntu 12.04 LTS shipped OpenSSL with TLSv1.2 disabled when being used as a client. This update re-enables TLSv1.2 by default now that the majority of problematic sites have been updated to fix compatibility issues. For problematic environments, TLSv1.2 can be disabled again by setting the OPENSSL_NO_CLIENT_TLS1_2 environment variable before library initialization. Various other issues were also addressed.
Monthly Archives: May 2015
Ubuntu Security Notice USN-2607-1
Ubuntu Security Notice 2607-1 – John Lightsey discovered that Module::Signature incorrectly handled PGP signature boundaries. A remote attacker could use this issue to trick Module::Signature into parsing the unsigned portion of the SIGNATURE file as the signed portion. John Lightsey discovered that Module::Signature incorrectly handled files that were not listed in the SIGNATURE file. A remote attacker could use this flaw to execute arbitrary code when tests were run. Various other issues were also addressed.
Debian Security Advisory 3257-1
Debian Linux Security Advisory 3257-1 – Jesse Hertz of Matasano Security discovered that Mercurial, a distributed version control system, is prone to a command injection vulnerability via a crafted repository name in a clone command.
Slackware Security Advisory – mariadb Updates
Slackware Security Advisory – New mariadb packages are available for Slackware 14.1 and -current to fix security issues.
Slackware Security Advisory – wpa_supplicant Updates
Slackware Security Advisory – New wpa_supplicant packages are available for Slackware 14.0, 14.1, and -current to fix security issues.
Microsoft Edge Browser Seen as a Big Security Upgrade
For many years now, the browser has been the most dangerous piece of software on most users’ machines. Attackers love to target browsers and a remote code execution bug in a major browser is gold for them. The browser vendors have been making gradual changes to better protect users in recent years, and now Microsoft […]
Fedora 22 Security Update: mingw-LibRaw-0.16.1-1.fc22
Resolved Bugs
1221249 – CVE-2015-3885 dcraw: input sanitization flaw leading to buffer overflow
1221254 – CVE-2015-3885 mingw-LibRaw: dcraw: input sanitization flaw leading to buffer overflow [fedora-all]<br
Update to version 0.16.1, see http://www.libraw.org/download#changelog for details.
Security fix for CVE-2015-3885.
Fedora 21 Security Update: mingw-LibRaw-0.16.1-1.fc21
Resolved Bugs
1221249 – CVE-2015-3885 dcraw: input sanitization flaw leading to buffer overflow
1221254 – CVE-2015-3885 mingw-LibRaw: dcraw: input sanitization flaw leading to buffer overflow [fedora-all]<br
Update to version 0.16.1, see http://www.libraw.org/download#changelog for details.
Security fix for CVE-2015-3885.
Fedora 21 Security Update: LibRaw-0.16.1-6.fc21
Resolved Bugs
1220382 – LibRaw-0.16.1 is available<br
Fixed dcraw vulnerability in ljpeg_start()
New Facebook scam promises “shocking video,†but contains only malware
When you see what this Facebook clickbait really links to, your jaw will drop.
The post New Facebook scam promises “shocking video,” but contains only malware appeared first on We Live Security.
![]()