Researchers at Onapsis and DHS CERT today published reports describing a critical SAP Invoker Servlet vulnerability that has been used to attack 36 global enterprises spanning 15 critical industries.
Monthly Archives: May 2016
CEBA-2016:1024 CentOS 5 kernel BugFix Update
CentOS Errata and Bugfix Advisory 2016:1024 Upstream details at : https://rhn.redhat.com/errata/RHBA-2016-1024.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: e21333e5147902b2e6ac2b21ab7102ea36a883a25376cfab7f13a173974cd08c kernel-2.6.18-410.el5.i686.rpm 234ed889efed1ccac7319ca9ea536917eb8bebb70a9b862c683a993afa997778 kernel-debug-2.6.18-410.el5.i686.rpm 7137d4acd8e588d35f8476fefe106e95f53b4c43867f3c27d904f4685e74c1c1 kernel-debug-devel-2.6.18-410.el5.i686.rpm c4ad98d530a86f26279ea80ccb77c3032f81cf566a54cf6a6d1e19f0fb3c9723 kernel-devel-2.6.18-410.el5.i686.rpm 304092640b7c4f9311c6cc27453c28c32516dc29e9024edaea35bb5546f2e7ae kernel-doc-2.6.18-410.el5.noarch.rpm 58dcfdffd8b8dddb6ad204a6a3bd79ebf8ecea53cf12f22e6b2da6880332afeb kernel-headers-2.6.18-410.el5.i386.rpm ca1d5a7fe86af1d2b8ff1532112c307e4bd06d8d7c0494fff54109e352c1e2a9 kernel-PAE-2.6.18-410.el5.i686.rpm 0a5c2bc78da5244e1066b40d326e887d5209d9e8f4c2436f9a84228907871125 kernel-PAE-devel-2.6.18-410.el5.i686.rpm 199ec6dfa92f5ca778c07f8207c8a8e3115196d903f5418dfda55c306bbcd941 kernel-xen-2.6.18-410.el5.i686.rpm eef410ce2a225688beb24b95610fdb5daf63aab030712825d6030447c1f9bc31 kernel-xen-devel-2.6.18-410.el5.i686.rpm x86_64: 8a73befd4fdd7242d0ebd0d6dd6509289e2372f6f3571366fa7f93f29355bf98 kernel-2.6.18-410.el5.x86_64.rpm b766ff2c1e3ebe9e59de3c8c965e4e9322371f0405d52bf301e2255e442972d7 kernel-debug-2.6.18-410.el5.x86_64.rpm b0fa14014fe9ff9dd0951450c3ee325c1b6af2cb39ffdb357752ca22d08ebcf6 kernel-debug-devel-2.6.18-410.el5.x86_64.rpm 81a8451290fe0e7dfaf57f00128965f73ea8dec1005cd4cc7c09b011a7d313ec kernel-devel-2.6.18-410.el5.x86_64.rpm 304092640b7c4f9311c6cc27453c28c32516dc29e9024edaea35bb5546f2e7ae kernel-doc-2.6.18-410.el5.noarch.rpm 2c6b31ab671e234557f538f300a0f41055277cd68774a298e1647d4c022d35ec kernel-headers-2.6.18-410.el5.x86_64.rpm 8a34a520288918670ded8b109d0a1b3b0e7ecb9c2f8da2576c5212dd18448af2 kernel-xen-2.6.18-410.el5.x86_64.rpm f5687120f37a3b8619029c0454a1334e7e6e88c2107912edb343f2b0b2f8d1a9 kernel-xen-devel-2.6.18-410.el5.x86_64.rpm Source: ac407137307e919622acb07705f4b42189bd75fc66c1ca29b558102a07842a4a kernel-2.6.18-410.el5.src.rpm
Slackware Security Advisory – imagemagick Updates
Slackware Security Advisory – New imagemagick packages are available for Slackware 14.0, 14.1, and -current to fix security issues.
Debian Security Advisory 3565-2
Debian Linux Security Advisory 3565-2 – This updates fixes a regression introduced in botan1.10 by DSA-3565-1: packages depending on libbotan1.10 needed to be rebuilt against the latest version to function properly.
Red Hat Security Advisory 2016-0855-01
Red Hat Security Advisory 2016-0855-01 – The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: It was found that reporting emulation failures to user space could lead to either a local or a L2->L1 denial of service. In the case of a local denial of service, an attacker must have access to the MMIO area or be able to access an I/O port. Please note that on certain systems, HPET is mapped to userspace as part of vdso and thus an unprivileged user may generate MMIO transactions this way.
Red Hat Security Advisory 2016-0760-01
Red Hat Security Advisory 2016-0760-01 – The file command is used to identify a particular file according to the type of data the file contains. It can identify many different file types, including Executable and Linkable Format binary files, system libraries, RPM packages, and different graphics formats. Security Fix: Multiple flaws were found in the file regular expression rules for detecting various files. A remote attacker could use these flaws to cause file to consume an excessive amount of CPU.
Red Hat Security Advisory 2016-0780-01
Red Hat Security Advisory 2016-0780-01 – The Network Time Protocol is used to synchronize a computer’s time with another referenced time source. These packages include the ntpd service which continuously adjusts system time and utilities used to query and configure the ntpd service. Security Fix: It was found that the fix for CVE-2014-9750 was incomplete: three issues were found in the value length checks in NTP’s ntp_crypto.c, where a packet with particular autokey operations that contained malicious data was not always being completely validated. A remote attacker could use a specially crafted NTP packet to crash ntpd.
Ubuntu Security Notice USN-2972-1
Ubuntu Security Notice 2972-1 – Multiple vulnerabilities were discovered in the OpenJDK JRE related to information disclosure, data integrity, and availability. An attacker could exploit these to cause a denial of service, expose sensitive data over the network, or possibly execute arbitrary code. CVE-2016-0687, A vulnerability was discovered in the OpenJDK JRE related to information disclosure. An attacker could exploit this to expose sensitive data over the network. Various other issues were also addressed.
Red Hat Security Advisory 2016-1019-01
Red Hat Security Advisory 2016-1019-01 – KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM in environments managed by Red Hat Enterprise Virtualization Manager. Security Fix: An out-of-bounds read/write access flaw was found in the way QEMU’s VGA emulation with VESA BIOS Extensions support performed read/write operations via I/O port methods. A privileged guest user could use this flaw to execute arbitrary code on the host with the privileges of the host’s QEMU process.
Debian Security Advisory 3574-1
Debian Linux Security Advisory 3574-1 – Rock Stevens, Andrew Ruef and Marcin ‘Icewall’ Noga discovered a heap-based buffer overflow vulnerability in the zip_read_mac_metadata function in libarchive, a multi-format archive and compression library, which may lead to the execution of arbitrary code if a user or automated system is tricked into processing a specially crafted ZIP file.