Debian Linux Security Advisory 3619-1 – Several vulnerabilities were discovered in libgd2, a library for programmatic graphics creation and manipulation. A remote attacker can take advantage of these flaws to cause a denial-of-service against an application using the libgd2 library (application crash), or potentially to execute arbitrary code with the privileges of the user running the application.
Monthly Archives: July 2016
Debian Security Advisory 3620-1
Debian Linux Security Advisory 3620-1 – Yves Younan of Cisco Talos discovered several vulnerabilities in the MXit protocol support in pidgin, a multi-protocol instant messaging client. A remote attacker can take advantage of these flaws to cause a denial of service (application crash), overwrite files, information disclosure, or potentially to execute arbitrary code.
HP Security Bulletin HPSBMU03562 3
HP Security Bulletin HPSBMU03562 3 – A vulnerability in Apache Commons Collections for handling Java object deserialization was addressed by HPE Service Manager. The vulnerability could be exploited remotely to allow remote code execution. Revision 3 of this advisory.
Japan's Softbank buys semiconductor giant ARM for $32 Billion in Cash
Japanese telecommunication giant SoftBank has confirmed that the company intends to acquire UK chip designer ARM Holdings for almost $32 Billion (£24.3 Billion) in an all-cash deal.
ARM has also agreed to this offer from SoftBank and said that its board would recommend the all-cash deal to shareholders.
SoftBank will pay nearly $22.5 per ARM share, which is 43 percent more than ARM’s closing
![]()
Researchers Crack Furtim, SFG Malware Connection
Damballa goes deep with Furtim and SFG malware to uncover new details about how the two are connected, distributed and who their targets are.
Two Million Passwords Breached in Ubuntu Hack
Canonical’s CEO claims a SQL injection vulnerability led to the hack of Ubuntu’s Two million user strong forums.
CESA-2016:1422 Important CentOS 7 httpd SecurityUpdate
CentOS Errata and Security Advisory 2016:1422 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-1422.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) x86_64: 045c43a0da2efc68117105e9018c475dc4cbb90a98aeb06542973ce953af1040 httpd-2.4.6-40.el7.centos.4.x86_64.rpm 16550ea80cc0241c3e25fece54a8ee4592fa1183056d8b72f0cd82278817554e httpd-devel-2.4.6-40.el7.centos.4.x86_64.rpm 9db85efe6e5a599a11eb853e9133e7f2e07b32cb5029c8f360bd8b9664ba31c8 httpd-manual-2.4.6-40.el7.centos.4.noarch.rpm b2f351116f23f0bef4293f62430cf6028d5b174823af5d1e53ad4c86c70ac14b httpd-tools-2.4.6-40.el7.centos.4.x86_64.rpm 388627215a1cf1cea9eac7ced702226998663154b63d10e93399a31ca3591f7e mod_ldap-2.4.6-40.el7.centos.4.x86_64.rpm 9f3104a304983a1ccf7fac98abca9a0ca411624d7ee2c998c8f1db5efb94c5b5 mod_proxy_html-2.4.6-40.el7.centos.4.x86_64.rpm cbdf94bb93b19fb4f4dbe452a3b2b2988e028bde5376782a0ec0185815b9a893 mod_session-2.4.6-40.el7.centos.4.x86_64.rpm 3f72250641bc96c5c190e933b496352c65318474492806b99ed0cab4cdbefd9d mod_ssl-2.4.6-40.el7.centos.4.x86_64.rpm Source: fc08ade63965c80e7ae80bcaef7cbbb496d76ec3e8e03409b1a223af657ef98f httpd-2.4.6-40.el7.centos.4.src.rpm
CESA-2016:1421 Important CentOS 6 httpd SecurityUpdate
CentOS Errata and Security Advisory 2016:1421 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-1421.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: 7cfbd11f14fc880c3a658124c3124a3b4c26402790eef913f38c3468c0038922 httpd-2.2.15-54.el6.centos.i686.rpm 21388bbbc70030b07395f9f2eb7ede8c160afc19e5d661543ddd42ba53c2e8cf httpd-devel-2.2.15-54.el6.centos.i686.rpm 4cfb8a97a60511a419c6b8e46f9eacfb6f702831ca3567313f927209b6fa5e39 httpd-manual-2.2.15-54.el6.centos.noarch.rpm 1a6a381d445b88f636453f7c7d039517adccac56aef9dc03127ce46e8e284246 httpd-tools-2.2.15-54.el6.centos.i686.rpm 7b187e5603d64d06f1983e96934a8f6da181220033cf989d2aa56bdfd629b791 mod_ssl-2.2.15-54.el6.centos.i686.rpm x86_64: 906becc435e278c73dfbdf10f4f1f704b7c1fff2963037c1e3b4a2eafd795f09 httpd-2.2.15-54.el6.centos.x86_64.rpm 21388bbbc70030b07395f9f2eb7ede8c160afc19e5d661543ddd42ba53c2e8cf httpd-devel-2.2.15-54.el6.centos.i686.rpm a87645e89f72a6e9362e41251d3c1be797ce31a7b7a643f0fe506f3ab506acf2 httpd-devel-2.2.15-54.el6.centos.x86_64.rpm 4cfb8a97a60511a419c6b8e46f9eacfb6f702831ca3567313f927209b6fa5e39 httpd-manual-2.2.15-54.el6.centos.noarch.rpm 4935ca24dabd3a45f83518174ea1ab5b1b0c8d281cce4db5df04f52e5743fc9c httpd-tools-2.2.15-54.el6.centos.x86_64.rpm 94ae91901d174c21c68f50d638027ecf4ab14aba483f7294107af9192b2adfb1 mod_ssl-2.2.15-54.el6.centos.x86_64.rpm Source: 5c7a92dbb6c6503be4ccd1e270c6ce96c42c61dcafc4495fe7f2c66d2c06f7cd httpd-2.2.15-54.el6.centos.src.rpm
CESA-2016:1421 Important CentOS 5 httpd SecurityUpdate
CentOS Errata and Security Advisory 2016:1421 Important Upstream details at : https://rhn.redhat.com/errata/RHSA-2016-1421.html The following updated files have been uploaded and are currently syncing to the mirrors: ( sha256sum Filename ) i386: ac324ee1118faf46ee81d043ab13428793816c78504177bd02be559ca45a0ad6 httpd-2.2.3-92.el5.centos.i386.rpm 7f507c251a02932b0530bcc9bbe3b684bcf333a8a55d159bd74ec45b907c7b74 httpd-devel-2.2.3-92.el5.centos.i386.rpm 9962fc21bb56a8db59b53c5a70cdbdb9288de76b4852cd93342d35edf99c93c4 httpd-manual-2.2.3-92.el5.centos.i386.rpm 193e7f1e8866422650c4fc3681ad7b8eb303ca94fbb271fc0f8e269da41ec44d mod_ssl-2.2.3-92.el5.centos.i386.rpm x86_64: 89c1aceb70086393b296f085cb3c1aadb2236f53d91028d24b65756d5e5ec0e6 httpd-2.2.3-92.el5.centos.x86_64.rpm 7f507c251a02932b0530bcc9bbe3b684bcf333a8a55d159bd74ec45b907c7b74 httpd-devel-2.2.3-92.el5.centos.i386.rpm 68223ae197beab75b2a2f18595659c5f00a2abce6af6949439098b3307b81a55 httpd-devel-2.2.3-92.el5.centos.x86_64.rpm c64e7002d0b3e256e58ebed1f1e298f47952ccb85d81bdd364e3970056993b9b httpd-manual-2.2.3-92.el5.centos.x86_64.rpm 5961b5567d7d8449ce917c2b0d3ce0c0bdcb268335d0a472b9600a33c99ce4d8 mod_ssl-2.2.3-92.el5.centos.x86_64.rpm Source: 9797c288db36a2b5610c73d9334b932ad6be5b11f259389c4e8159bdeeec7912 httpd-2.2.3-92.el5.centos.src.rpm
Pokémon GO goes down: Hackers claim responsibility
Both the OurMine and PoodleCorp hacking gangs appear to be taking credit for Pokémon GO being offline over the weekend. But might there be a more down-to-earth explanation?
The post Pokémon GO goes down: Hackers claim responsibility appeared first on We Live Security.
![]()
