KNOX versions 1.0 through 2.3 on Android suffer from a clipboard data disclosure vulnerability.
Monthly Archives: April 2016
IPSet List 3.6
ipset_list is a wrapper script written in bash for listing sets of the netfilter ipset program. It allows you to match and display sets, headers, and elements in various ways. The output can optionally be colorized. An interactive mode allows to select the query options in a wizard based manner.
DSA-3552 tomcat7 – security update
Multiple security vulnerabilities have been discovered in the Tomcat
servlet and JSP engine, which may result in information disclosure,
the bypass of CSRF protections and bypass of the SecurityManager.
*correction* Notification of outage : mirrorlist.centos.org (ipv4) 2016-04-16 08:58 UTC
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi, Apologies for this, the correct date should be : 2016-04-16 Sat. The timestamps remain accurate. On 16/04/16 10:09, Karanbir Singh wrote: - -- Karanbir Singh, Project Lead, The CentOS Project +44-207-0999389 | http://www.centos.org/ | twitter.com/CentOS GnuPG Key : http://www.karan.org/publickey.asc -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (GNU/Linux) iQEcBAEBAgAGBQJXErmsAAoJEI3Oi2Mx7xbtJdgIAI1+4KTYCdI4O+kFlrJ5IlMy TwFGYt7O1WyGDfXC27VLehDxNP0lFiZOd1TMMSWy0/P64TYcBr5GLa4Vc7WLpLef ywgjvgNE9VY69z4D1Lkgdxlgnhg31tPtW8kA1Py24nKrEFMYYi7/2tUGZn43kE8D SRn0CywFizCFIScB0xI7uSJRE2PzFFwixIG4LaEdqppxcId6hsKb80hzpIP35pPU eXlagl5CMad2XD0aVqKrqoU5W9vS9swKv9rc6ASsUHB28W7KcT0mq0YsIojhS81L w8hiSsTpW3b62uBb55MIvkg1Y11H0qlkW306ZaZAXjTpRsvNaz82+qRmgcVVJvc= =Uvpc -----END PGP SIGNATURE-----
[ERPSCAN-16-003] SAP NetWeaver 7.4 – cryptographic issues
Posted by ERPScan inc on Apr 16
Application: SAP NetWeaver
Versions Affected: SAP NetWeaver J2EE Engine 7.40
Vendor URL: http://SAP.com
Bugs: cryptographic issues
Sent: 01.09.2015
Reported: 01.09.2015
Vendor response: 02.09.2015
Date of Public Advisory: 12.01.2016
Reference: SAP Security Note 2191290
Author: Vahagn Vardanyan (ERPScan)
Description
1. ADVISORY INFORMATION
Title: SAP NetWeaver J2EE Engine 7.40
Advisory ID: [ERPSCAN-16-003]
Risk: Hight
Advisory URL:…
Microsoft Internet Explorer 11 MSHTML.DLL Remote Binary Planting Vulnerability
Posted by Sandro Poppi on Apr 16
Abstract
——–
Microsoft Internet Explorer 11 MSHTML.DLL Remote Binary Planting
Vulnerability
Affected Version: MSHTML.DLL 11.0.9600.18231 and probably below on
Windows 7 SP1
Vendor Homepage: http://www.microsoft.com
Severity: high
Status: fixed
CVE-ID: CVE-2016-0160
Description
———–
Microsoft Internet Explorer 11 ships with MSHTML.DLL referencing various
DLLs which are not present on a Windows 7 SP1 installation, Windows 10
is not…
Announcing NorthSec 2016 – Montreal, May 19-22
Posted by Pierre-David / NorthSec Conference on Apr 16
www.nsec.io – northsec.eventbrite.ca
NorthSec 2016, one of the biggest applied security event in Canada, coming up in Montreal May 17-22, with 2 days of
intense training sessions, followed by a 2-day technical conference and the largest 48h on-site CTF.
——– Training Sessions ——–
There are still a few seats available in our Training Sessions
https://www.nsec.io/training-sessions/
* Modern Object-Oriented Malware Reverse Engineering…
Slackware Security Advisory – samba Updates
Slackware Security Advisory – New samba packages are available for Slackware 14.0, 14.1, and -current to fix security issues.
Slackware Security Advisory – mozilla-thunderbird Updates
Slackware Security Advisory – New mozilla-thunderbird packages are available for Slackware 14.1 and -current to fix security issues.
Notification of outage : mirrorlist.centos.org (ipv4) 2016-05-16 08:58 UTC
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi, At 05:00 UTC 2016-05-16 an automated component update caused the mirrorlist service for CentOS to go down for all IPv4 based services. The IPv6 service for mirrorlist.centos.org was unaffected. By 08:11 UTC 2016-05-16 I rolled back the impacted components, disabled the update mechanics, and restarted services. By 08:15 UTC 2016-05-16 Services were returning to normal. By 08:23 UTC 2016-05-16 we had multiple confirmations from around the world that services were restored. - --------------- system wide followup: - - We will work to extend and add where needed, better testing around each component involved in such roles. - - I will work with Fabian and make sure that all our automated component and system changes that impact a production service are only run during regular working hours for the team. - --------------- root cause: all the components involved in the downtime are backed up and we will start looking at the root cause of why services went down, for now the immediate focus was to restore services which was done by a rollback. - --------------- reporting issues: Note that for real time, time sensitive issues always drop into #centos-devel on irc.freenode.net and let us know, along with filing a bug report at bugs.centos.org - For any non time critical issues, please report them at bugs.centos.org against the 'Infrastructure' project, and we will aim to address them as soon as possible. - -- Karanbir Singh, Project Lead, The CentOS Project +44-207-0999389 | http://www.centos.org/ | twitter.com/CentOS GnuPG Key : http://www.karan.org/publickey.asc -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.22 (GNU/Linux) iQEcBAEBAgAGBQJXEgFAAAoJEI3Oi2Mx7xbtHQoIAKBsD6xIlBCfuqRcx0AHto2g dwB7Pl5ijwVkqsIMpDNq4a3aws72P1PTwqi19PbnkwACh0kPxx8iT8/8RL4LLvmC dahoMjYrIpZYULij6u0QEy9RM9HZ7Xyo6lGe41+Rz1yFMv+QgqjhYBtt+EuvBrO1 ILM1PsQypXsxQaGKRMnhzjcIWXhpNNBinRAVEOmzLiHU2WYDefUwlB1gtHx5JmZl l/vWLSlMWRiC5HaDtKGBV5rPickqBrRkFfvGdYezrj3KHsoj8NCUhdir75gd6RXN b++FRAuRZZGcvCYquvwbrG2V+Ix1GG8GQBs2ej3p4wvaw9G5gBCR2hEa6ZINrQ8= =ZdAB -----END PGP SIGNATURE-----