Red Hat Enterprise Linux: An update for postgresql92-postgresql is now available for Red Hat Software
Collections.
Red Hat Product Security has rated this update as having a security impact of
Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a
detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.
CVE-2016-5423, CVE-2016-5424
Red Hat Enterprise Linux: Updated packages that provide Red Hat JBoss Enterprise Application Platform
6.4.10, fix several bugs, and add various enhancements are now available for Red
Hat Enterprise Linux 6.
Red Hat Enterprise Linux: Updated packages that provide Red Hat JBoss Enterprise Application Platform
6.4.10, fix several bugs, and add various enhancements are now available for Red
Hat Enterprise Linux 5.
Red Hat Enterprise Linux: Updated jboss-ec2-eap packages that add an enhancement are now available for Red
Hat JBoss Enterprise Application Platform 6.4.10 on Red Hat Enterprise Linux 6.
idn in GNU libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read.
The cert_revoke command in FreeIPA does not check for the “revoke certificate” permission, which allows remote authenticated users to revoke arbitrary certificates by leveraging the “retrieve certificate” permission.
The WiFi driver in Huawei Honor6 smartphones with software H60-L01 before H60-L01C00B850, H60-L11 before H60-L11C00B850, H60-L21 before H60-L21C00B850, H60-L02 before H60-L02C00B850, H60-L12 before H60-L12C00B850, and H60-L03 before H60-L03C01B850 allows attackers to cause a denial of service (system crash) or gain privileges via a crafted application.
The idna_to_ascii_4i function in lib/idna.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via 64 bytes of input.
idn in libidn before 1.33 might allow remote attackers to obtain sensitive memory information by reading a zero byte as input, which triggers an out-of-bounds read, a different vulnerability than CVE-2015-8948.
The stringprep_utf8_nfkc_normalize function in lib/nfkc.c in libidn before 1.33 allows context-dependent attackers to cause a denial of service (out-of-bounds read and crash) via crafted UTF-8 data.