[REVIVE-SA-2015-001] Revive Adserver – Multiple vulnerabilities

Posted by Matteo Beccati on Oct 08

========================================================================
Revive Adserver Security Advisory REVIVE-SA-2015-001
========================================================================
http://www.revive-adserver.com/security/revive-sa-2015-001
========================================================================
CVE-IDs: CVE-2015-7364, CVE-2015-7365, CVE-2015-7366,…

Re: Authentication Bypass in Netgear Router Firmware N300_1.1.0.31_1.0.1.img and N300-1.1.0.28_1.0.1.img

Posted by Alexandre Herzog on Oct 08

Hi Joe,

Thanks for your feedback. Daniel, who discovered the issue and liaised with Netgear to get the issue patched, is in CC
of this email.

Would you mind to share some further details? This may help putting pressure on Netgear to release the patch they
actually developed beginning of September (!) but did not yet publish…

Thanks,

Alexandre

From: Joe G [mailto:joseph.giron13 () gmail com]
Sent: Dienstag, 6. Oktober 2015 19:02
To:…

RHEA-2015:1863-1: tzdata enhancement update

Red Hat Enterprise Linux: Updated tzdata packages that add various enhancements are now available for Red
Hat Enterprise Linux 4 Extended Life Cycle Support, Red Hat Enterprise Linux 5.6
Long Life, Red Hat Enterprise Linux 5.11, Red Hat Enterprise Linux 5.9 Advanced
Update Support, Red Hat Enterprise Linux 6.2 Advanced Update Support, Red Hat
Enterprise Linux 6.4 Extended Update Support, Red Hat Enterprise Linux 6.5
Extended Update Support, Red Hat Enterprise Linux 6.6 Extended Update Support,
Red Hat Enterprise Linux 6.7, Red Hat Enterprise Linux 7.1, and Red Hat
Enterprise Linux 7.1 Little Endian.

USN-2766-1: Spice vulnerabilities

Ubuntu Security Notice USN-2766-1

6th October, 2015

spice vulnerabilities

A security issue affects these releases of Ubuntu and its
derivatives:

  • Ubuntu 15.04
  • Ubuntu 14.04 LTS

Summary

Spice could be made to crash or run programs.

Software description

  • spice
    – SPICE protocol client and server library

Details

Frediano Ziglio discovered multiple buffer overflows, undefined behavior
signed integer operations, race conditions, memory leaks, and denial
of service issues in Spice. A malicious guest operating system could
potentially exploit these issues to escape virtualization. (CVE-2015-5260,
CVE-2015-5261)

Update instructions

The problem can be corrected by updating your system to the following
package version:

Ubuntu 15.04:
libspice-server1

0.12.5-1ubuntu0.2
Ubuntu 14.04 LTS:
libspice-server1

0.12.4-0nocelt2ubuntu1.2

To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.

After a standard system update you need to restart qemu guests to make
all the necessary changes.

References

CVE-2015-5260,

CVE-2015-5261