Red Hat Security Advisory 2015-1718-01 – KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM. An information leak flaw was found in the way QEMU’s RTL8139 emulation implementation processed network packets under RTL8139 controller’s C+ mode of operation. An unprivileged guest user could use this flaw to read up to 65 KB of uninitialized QEMU heap memory.
Monthly Archives: September 2015
Red Hat Security Advisory 2015-1723-01
Red Hat Security Advisory 2015-1723-01 – OpenStack Compute launches and schedules large networks of virtual machines, creating a redundant and scalable cloud computing platform. Compute provides the software, control panels, and APIs required to orchestrate a cloud, including running virtual machine instances and controlling access through users and projects. A denial of service flaw was found in the OpenStack Compute instance migration process. Because the migration process does not terminate when an instance is deleted, an authenticated user could bypass user quota and deplete all available disk space by repeatedly re-sizing and deleting an instance.
Red Hat Security Advisory 2015-1736-01
Red Hat Security Advisory 2015-1736-01 – Red Hat OpenShift Enterprise is a cloud computing Platform-as-a-Service solution designed for on-premise or private cloud deployments. Improper error handling in the API server can cause the master process to crash. A user with network access to the master could cause this to happen. This issue was discovered by Jordan Liggitt of the Red Hat OpenShift Enterprise Team.
Fake vouchers and WhatsApp: Analyzing a new scam trend
Over the last few weeks we’ve seen an increase in fake vouchers being spread via WhatsApp. This scam has all the hallmarks of a global campaign.
The post Fake vouchers and WhatsApp: Analyzing a new scam trend appeared first on We Live Security.
![]()
Pwn2Own Loses HP As Its Sponsor Thanks To The Wassenaar Arrangement
The Dangers Of Looking At Ashley Madison Hack Infographics
Ex-Tesla Worker Charged With Leaking Confidential Documents
Balancing Security Solutions And The People Who Use It
Threatpost News Wrap, September 4, 2015
Dennis Fisher and Mike Mimoso talk about the potential US sanctions against China over cyberespionage, the browser vendors dumping RC4, the trouble at Mobile Pwn2Own and more security news of the week.
Sophisticated webinjects ‘tailored’ to beat bank security
From its relatively simplistic and niche origins, webinjects have advanced significantly in recent years to become a more sophisticated beast.
The post Sophisticated webinjects ‘tailored’ to beat bank security appeared first on We Live Security.
![]()