VMware Releases Security Updates

Original release date: March 16, 2016

VMware has released security updates to address vulnerabilities in VMware vRealize Automation and vRealize Business Advanced and Enterprise. Exploitation of these vulnerabilities may allow a remote attacker to take control of an affected system.

Users and administrators are encouraged to review VMware Security Advisory VMSA-2016-0003 and apply the necessary updates. 


This product is provided subject to this Notification and this Privacy & Use policy.

CESA-2016:0460 Important CentOS 6 thunderbirdSecurity Update

CentOS Errata and Security Advisory 2016:0460 Important

Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-0460.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

i386:
a2cbbb1ef22cf4c5e57bb96e3b70052b717ac98111df3602e23b48154668c8d2  thunderbird-38.7.0-1.el6.centos.i686.rpm

x86_64:
ce55155e4e690413a00ff766bfe11bcde31afc00ffbb3a9c5b9d671d898dc6f6  thunderbird-38.7.0-1.el6.centos.x86_64.rpm

Source:
512e75ac75370a15ab3b43e4c49d7437cae64475498f8b3a79f95d3c6c124ab8  thunderbird-38.7.0-1.el6.centos.src.rpm



CESA-2016:0460 Important CentOS 7 thunderbirdSecurity Update

CentOS Errata and Security Advisory 2016:0460 Important

Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-0460.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

x86_64:
ea82d6a541d761a4f10e06f4f2a0102ec10d8955497bf6651f32900e8473a7fd  thunderbird-38.7.0-1.el7.centos.x86_64.rpm

Source:
e88b2002088f2546505af351cf2a05183ffd7b7f67d889888113dab53742b606  thunderbird-38.7.0-1.el7.centos.src.rpm



[CORE-2016-0005] – FreeBSD Kernel amd64_set_ldt Heap Overflow

Posted by CORE Advisories Team on Mar 16

1. Advisory Information

Title: FreeBSD Kernel amd64_set_ldt Heap Overflow
Advisory ID: CORE-2016-0005
Advisory URL: http://www.coresecurity.com/content/freebsd-kernel-amd64_set_ldt-heap-overflow
Date published: 2016-03-16
Date of last update: 2016-03-14
Vendors contacted: FreeBSD
Release mode: Coordinated release

2. Vulnerability Information

Class: Unsigned to Signed Conversion Error [CWE-196]
Impact: Denial of service
Remotely Exploitable: No…