Red Hat Security Advisory 2015-1793-01 – KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides the user-space component for running virtual machines using KVM. An information leak flaw was found in the way QEMU’s RTL8139 emulation implementation processed network packets under RTL8139 controller’s C+ mode of operation. An unprivileged guest user could use this flaw to read up to 65 KB of uninitialized QEMU heap memory.
Monthly Archives: September 2015
Red Hat Security Advisory 2015-1788-01
Red Hat Security Advisory 2015-1788-01 – The kernel-rt packages contain the Linux kernel, the core of any Linux operating system. A flaw was found in the kernel’s implementation of the Berkeley Packet Filter. A local attacker could craft BPF code to crash the system by creating a situation in which the JIT compiler would fail to correctly optimize the JIT image on the last pass. This would lead to the CPU executing instructions that were not part of the JIT code. Two flaws were found in the way the Linux kernel’s networking implementation handled UDP packets with incorrect checksum values. A remote attacker could potentially use these flaws to trigger an infinite loop in the kernel, resulting in a denial of service on the system, or cause a denial of service in applications using the edge triggered epoll functionality.
HP Security Bulletin HPSBGN03393 2
HP Security Bulletin HPSBGN03393 2 – A potential security vulnerability has been identified with HP Operations Manager i (OMi) running on Linux and Windows. The vulnerability could be exploited remotely to execute code. Revision 2 of this advisory.
Cisco Security Advisory 20150916-pca
Cisco Security Advisory – Cisco Prime Collaboration Assurance Software contains access bypass, information disclosure, and privilege escalation vulnerabilities.
Debian Security Advisory 3360-1
Debian Linux Security Advisory 3360-1 – It was discovered that the International Components for Unicode (ICU) library mishandles converter names starting with x- , which allows remote attackers to cause a denial of service (read of uninitialized memory) or possibly have unspecified other impact via a crafted file.
Red Hat Security Advisory 2015-1787-01
Red Hat Security Advisory 2015-1787-01 – The kernel-rt packages contain the Linux kernel, the core of any Linux operating system. Two flaws were found in the way the Linux kernel’s networking implementation handled UDP packets with incorrect checksum values. A remote attacker could potentially use these flaws to trigger an infinite loop in the kernel, resulting in a denial of service on the system, or cause a denial of service in applications using the edge triggered epoll functionality. A flaw was found in the way the Linux kernel’s ext4 file system handled the “page size > block size” condition when the fallocate zero range functionality was used. A local attacker could use this flaw to crash the system.
Red Hat Security Advisory 2015-1778-01
Red Hat Security Advisory 2015-1778-01 – The kernel packages contain the Linux kernel, the core of any Linux operating system. A flaw was found in the kernel’s implementation of the Berkeley Packet Filter. A local attacker could craft BPF code to crash the system by creating a situation in which the JIT compiler would fail to correctly optimize the JIT image on the last pass. This would lead to the CPU executing instructions that were not part of the JIT code. Two flaws were found in the way the Linux kernel’s networking implementation handled UDP packets with incorrect checksum values. A remote attacker could potentially use these flaws to trigger an infinite loop in the kernel, resulting in a denial of service on the system, or cause a denial of service in applications using the edge triggered epoll functionality.
HP Security Bulletin HPSBHF03509 1
HP Security Bulletin HPSBHF03509 1 – HP has released updates to the HP ThinPro and HP Smart Zero Core operating systems to address two vulnerabilities found in Adobe Flash Player versions v11.x through v11.2.202.481 on Linux. These vulnerabilities allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via crafted Flash content that either leverages improper handling of the opaqueBackground property or overrides a ValueOf function, as exploited in the wild in July 2015. Revision 1 of this advisory.
California governor vetoes drone bill
In the wake of increasing drone incidents, including the most recent highly-publicized crashes at the U.S. Open tennis tournament and the opening game of a newly renovated college football stadium in Kentucky, drones got a somewhat surprising defender last week: California Governor Jerry Brown.
Governor Brown last week vetoed a bill that would have barred drones from flying within 350 feet above a property without “express permission” of the property owners. Despite easily passing the state legislature, the bill was widely reported to have opposition by tech industry companies and trade organizations.
Brown said in his veto message that the measure went too far in its restrictions. The bill, which is SB142 by Santa Barbara Democratic Sen. Hannah-Beth Jackson, would have created a trespassing crime for operating drones within 350 feet above private property without the consent of the property owner.
In his official statement about the veto, Brown noted, “Drone technology certainly raises novel issues that merit careful examination,” and should be looked at “more carefully.” But in his measured response, he suggested the act would be a crime “whether or not anyone’s privacy was violated by the flight.”
Said the Governor, “This bill, however, while well-intentioned, could expose the occasional hobbyist and the FAA-approved commercial user alike to burdensome litigation and new causes of action.”
As industry observer news website Re/Code reported, one of the tech industry’s leading associations, The Consumer Electronics Association, was a vocal opponent of the legislation. Among CEA members are Amazon and Google, both of which are planning drone delivery services. And among other influential participants, Re/Code also reported that GoPro, which recently announced plans for a drone, was in opposition.
“Safe, responsible drone use will transform the way we do business — allowing these devices to assist in search and rescue and disaster relief missions, improve crop production and efficiency, and create safer work environments for infrastructure maintenance.” Gary Shapiro, the CEA president and CEO, said in his statement to Re/Code.
Drones are (literally) at the intersection of technology, security, and privacy. Unfortunately, some bad players have colored the drone issue to date. But there are benefits to be derived from drone technology: They can speed delivery of emergency supplies, they can provide great benefits to agriculture, and they can literally save lives. For example, in natural and/or manmade disasters, drones can be positioned to survey damage, locate lost hikers or disaster victims, and improve efficiency and safety of rescue teams.
There will no doubt be more legal decisions and bills involved. As Re/Code also noted: 46 different states have considered 156 different bills about drones this year. And as American Civil Liberties Union (ACLU) policy analyst Jay Stanley recently said about drone policing,” It’s still a bit of a Wild West.”
But as Capt. Chesley B. “Sully” Sullenberger, the now-retired US Airways pilot that in 2009 managed to safely land his Airbus A320 passenger jet in the Hudson River, saving all 155 persons aboard, emphasizes: we need better risk management, better regulation of the recreational drone industry, and more enforcement of those regulations when drone operators do what he describes as “stupid, reckless, dangerous things.”
![]()
![]()
Apple Releases Security Updates for OS X Server, iTunes, Xcode, and iOS
Original release date: September 16, 2015
Apple has released security updates for OS X Server, iTunes, Xcode, and iOS to address multiple vulnerabilities. Exploitation of some of these vulnerabilities may allow a remote attacker to take control of an affected system.
Available updates include:
- OS X Server v5.0.3 for OS X Yosemite v10.10.4 or later
- iTunes 12.3 for Windows 7 and later
- Xcode 7.0 for OS X Yosemite v10.10.4 or later
- iOS 9 for iPhone 4s and later, iPod touch (5th generation) and later, iPad 2 and later
US-CERT encourages users and administrators to review Apple security updates for OS X Server, iTunes, Xcode, and iOS and apply the necessary updates.
This product is provided subject to this Notification and this Privacy & Use policy.