CEBA-2016:1024 CentOS 5 kernel BugFix Update

CentOS Errata and Bugfix Advisory 2016:1024 

Upstream details at : https://rhn.redhat.com/errata/RHBA-2016-1024.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

i386:
e21333e5147902b2e6ac2b21ab7102ea36a883a25376cfab7f13a173974cd08c  kernel-2.6.18-410.el5.i686.rpm
234ed889efed1ccac7319ca9ea536917eb8bebb70a9b862c683a993afa997778  kernel-debug-2.6.18-410.el5.i686.rpm
7137d4acd8e588d35f8476fefe106e95f53b4c43867f3c27d904f4685e74c1c1  kernel-debug-devel-2.6.18-410.el5.i686.rpm
c4ad98d530a86f26279ea80ccb77c3032f81cf566a54cf6a6d1e19f0fb3c9723  kernel-devel-2.6.18-410.el5.i686.rpm
304092640b7c4f9311c6cc27453c28c32516dc29e9024edaea35bb5546f2e7ae  kernel-doc-2.6.18-410.el5.noarch.rpm
58dcfdffd8b8dddb6ad204a6a3bd79ebf8ecea53cf12f22e6b2da6880332afeb  kernel-headers-2.6.18-410.el5.i386.rpm
ca1d5a7fe86af1d2b8ff1532112c307e4bd06d8d7c0494fff54109e352c1e2a9  kernel-PAE-2.6.18-410.el5.i686.rpm
0a5c2bc78da5244e1066b40d326e887d5209d9e8f4c2436f9a84228907871125  kernel-PAE-devel-2.6.18-410.el5.i686.rpm
199ec6dfa92f5ca778c07f8207c8a8e3115196d903f5418dfda55c306bbcd941  kernel-xen-2.6.18-410.el5.i686.rpm
eef410ce2a225688beb24b95610fdb5daf63aab030712825d6030447c1f9bc31  kernel-xen-devel-2.6.18-410.el5.i686.rpm

x86_64:
8a73befd4fdd7242d0ebd0d6dd6509289e2372f6f3571366fa7f93f29355bf98  kernel-2.6.18-410.el5.x86_64.rpm
b766ff2c1e3ebe9e59de3c8c965e4e9322371f0405d52bf301e2255e442972d7  kernel-debug-2.6.18-410.el5.x86_64.rpm
b0fa14014fe9ff9dd0951450c3ee325c1b6af2cb39ffdb357752ca22d08ebcf6  kernel-debug-devel-2.6.18-410.el5.x86_64.rpm
81a8451290fe0e7dfaf57f00128965f73ea8dec1005cd4cc7c09b011a7d313ec  kernel-devel-2.6.18-410.el5.x86_64.rpm
304092640b7c4f9311c6cc27453c28c32516dc29e9024edaea35bb5546f2e7ae  kernel-doc-2.6.18-410.el5.noarch.rpm
2c6b31ab671e234557f538f300a0f41055277cd68774a298e1647d4c022d35ec  kernel-headers-2.6.18-410.el5.x86_64.rpm
8a34a520288918670ded8b109d0a1b3b0e7ecb9c2f8da2576c5212dd18448af2  kernel-xen-2.6.18-410.el5.x86_64.rpm
f5687120f37a3b8619029c0454a1334e7e6e88c2107912edb343f2b0b2f8d1a9  kernel-xen-devel-2.6.18-410.el5.x86_64.rpm

Source:
ac407137307e919622acb07705f4b42189bd75fc66c1ca29b558102a07842a4a  kernel-2.6.18-410.el5.src.rpm



Red Hat Security Advisory 2016-0855-01

Red Hat Security Advisory 2016-0855-01 – The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: It was found that reporting emulation failures to user space could lead to either a local or a L2->L1 denial of service. In the case of a local denial of service, an attacker must have access to the MMIO area or be able to access an I/O port. Please note that on certain systems, HPET is mapped to userspace as part of vdso and thus an unprivileged user may generate MMIO transactions this way.

Red Hat Security Advisory 2016-0760-01

Red Hat Security Advisory 2016-0760-01 – The file command is used to identify a particular file according to the type of data the file contains. It can identify many different file types, including Executable and Linkable Format binary files, system libraries, RPM packages, and different graphics formats. Security Fix: Multiple flaws were found in the file regular expression rules for detecting various files. A remote attacker could use these flaws to cause file to consume an excessive amount of CPU.

Red Hat Security Advisory 2016-0780-01

Red Hat Security Advisory 2016-0780-01 – The Network Time Protocol is used to synchronize a computer’s time with another referenced time source. These packages include the ntpd service which continuously adjusts system time and utilities used to query and configure the ntpd service. Security Fix: It was found that the fix for CVE-2014-9750 was incomplete: three issues were found in the value length checks in NTP’s ntp_crypto.c, where a packet with particular autokey operations that contained malicious data was not always being completely validated. A remote attacker could use a specially crafted NTP packet to crash ntpd.

Ubuntu Security Notice USN-2972-1

Ubuntu Security Notice 2972-1 – Multiple vulnerabilities were discovered in the OpenJDK JRE related to information disclosure, data integrity, and availability. An attacker could exploit these to cause a denial of service, expose sensitive data over the network, or possibly execute arbitrary code. CVE-2016-0687, A vulnerability was discovered in the OpenJDK JRE related to information disclosure. An attacker could exploit this to expose sensitive data over the network. Various other issues were also addressed.

Red Hat Security Advisory 2016-1019-01

Red Hat Security Advisory 2016-1019-01 – KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM in environments managed by Red Hat Enterprise Virtualization Manager. Security Fix: An out-of-bounds read/write access flaw was found in the way QEMU’s VGA emulation with VESA BIOS Extensions support performed read/write operations via I/O port methods. A privileged guest user could use this flaw to execute arbitrary code on the host with the privileges of the host’s QEMU process.

Debian Security Advisory 3574-1

Debian Linux Security Advisory 3574-1 – Rock Stevens, Andrew Ruef and Marcin ‘Icewall’ Noga discovered a heap-based buffer overflow vulnerability in the zip_read_mac_metadata function in libarchive, a multi-format archive and compression library, which may lead to the execution of arbitrary code if a user or automated system is tricked into processing a specially crafted ZIP file.