Red Hat Enterprise Linux: Updated dnsmasq packages that fix one bug are now available for Red Hat
Enterprise Linux 7.
Monthly Archives: September 2016
RHBA-2016:1843-1: NetworkManager bug fix update
Red Hat Enterprise Linux: An updated NetworkManager package that fixes one bug is now available for Red
Hat Enterprise Linux 7.
RHBA-2016:1835-1: systemd bug fix update
Red Hat Enterprise Linux: Updated systemd packages that fix two bugs are now available for Red Hat
Enterprise Linux 7.
RHBA-2016:1834-1: python bugfix update
Red Hat Enterprise Linux: Updated python packages that fix one bug are now available for Red Hat
Enterprise Linux 7.
RHBA-2016:1833-1: device-mapper-multipath bug fix update
Red Hat Enterprise Linux: Updated device-mapper-multipath packages that fix one bug are now available for
Red Hat Enterprise Linux 7.
RHBA-2016:1832-1: kmod bug fix update
Red Hat Enterprise Linux: Updated kmod packages that fix one bug are now available for Red Hat Enterprise
Linux 7.
USN-3079-1: WebKitGTK+ vulnerabilities
Ubuntu Security Notice USN-3079-1
14th September, 2016
webkit2gtk vulnerabilities
A security issue affects these releases of Ubuntu and its
derivatives:
- Ubuntu 16.04 LTS
Summary
Several security issues were fixed in WebKitGTK+.
Software description
- webkit2gtk
– JavaScript engine library from WebKitGTK+ – GObject introspection
Details
A large number of security issues were discovered in the WebKitGTK+ Web and
JavaScript engines. If a user were tricked into viewing a malicious
website, a remote attacker could exploit a variety of issues related to web
browser security, including cross-site scripting attacks, denial of service
attacks, and arbitrary code execution.
Update instructions
The problem can be corrected by updating your system to the following
package version:
- Ubuntu 16.04 LTS:
-
libwebkit2gtk-4.0-37
2.12.5-0ubuntu0.16.04.1
-
libjavascriptcoregtk-4.0-18
2.12.5-0ubuntu0.16.04.1
To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.
This update uses a new upstream release, which includes additional bug
fixes. After a standard system update you need to restart any applications
that use WebKitGTK+, such as Epiphany, to make all the necessary changes.
References
USN-3058-1: Oxide vulnerabilities
Ubuntu Security Notice USN-3058-1
14th September, 2016
oxide-qt vulnerabilities
A security issue affects these releases of Ubuntu and its
derivatives:
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary
Several security issues were fixed in Oxide.
Software description
- oxide-qt
– Web browser engine for Qt (QML plugin)
Details
An issue was discovered in Blink involving the provisional URL for an
initially empty document. An attacker could potentially exploit this to
spoof the currently displayed URL. (CVE-2016-5141)
A use-after-free was discovered in the WebCrypto implementation in Blink.
If a user were tricked in to opening a specially crafted website, an
attacker could potentially exploit this to cause a denial of service via
application crash, or execute arbitrary code. (CVE-2016-5142)
It was discovered that the devtools subsystem in Blink mishandles various
parameters. An attacker could exploit this to bypass intended access
restrictions. (CVE-2016-5143, CVE-2016-5144)
It was discovered that Blink does not ensure that a taint property is
preserved after a structure-clone operation on an ImageBitmap object
derived from a cross-origin image. If a user were tricked in to opening a
specially crafted website, an attacker could potentially exploit this to
bypass same origin restrictions. (CVE-2016-5145)
Multiple security issues were discovered in Chromium. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit these to read uninitialized memory, cause a denial
of service via application crash, or execute arbitrary code.
(CVE-2016-5146, CVE-2016-5167)
It was discovered that Blink mishandles deferred page loads. If a user
were tricked in to opening a specially crafted website, an attacker could
potentially exploit this to conduct cross-site scripting (XSS) attacks.
(CVE-2016-5147)
An issue was discovered in Blink related to widget updates. If a user were
tricked in to opening a specially crafted website, an attacker could
potentially exploit this to conduct cross-site scripting (XSS) attacks.
(CVE-2016-5148)
A use-after-free was discovered in Blink. If a user were tricked in to
opening a specially crafted website, an attacker could potentially exploit
this to cause a denial of service via application crash, or execute
arbitrary code. (CVE-2016-5150)
A use-after-free was discovered in Blink. If a user were tricked in to
opening a specially crafted website, an attacker could potentially exploit
this to cause a denial of service via application crash, or execute
arbitrary code. (CVE-2016-5153)
It was discovered that Chromium does not correctly validate access to the
initial document. An attacker could potentially exploit this to spoof the
currently displayed URL. (CVE-2016-5155)
A use-after-free was discovered in the event bindings in Blink. If a user
were tricked in to opening a specially crafted website, an attacker could
potentially exploit this to cause a denial of service via application
crash, or execute arbitrary code. (CVE-2016-5156)
A type confusion bug was discovered in Blink. If a user were tricked in to
opening a specially crafted website, an attacker could potentially exploit
this to cause a denial of service via application crash, or execute
arbitrary code. (CVE-2016-5161)
An issue was discovered with the devtools implementation. An attacker
could potentially exploit this to conduct cross-site scripting (XSS)
attacks. (CVE-2016-5164)
An issue was discovered with the devtools implementation. An attacker
could potentially exploit this to conduct cross-site scripting (XSS)
attacks. (CVE-2016-5165)
Update instructions
The problem can be corrected by updating your system to the following
package version:
- Ubuntu 16.04 LTS:
-
liboxideqtcore0
1.17.7-0ubuntu0.16.04.1
- Ubuntu 14.04 LTS:
-
liboxideqtcore0
1.17.7-0ubuntu0.14.04.1
To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.
In general, a standard system update will make all the necessary changes.
References
Vuln: Apache HTTP Server CVE-2016-5387 Security Bypass Vulnerability
Apache HTTP Server CVE-2016-5387 Security Bypass Vulnerability
Vuln: IBM WebSphere Application Server Liberty Profile CVE-2016-2923 Information Disclosure Vulnerability
IBM WebSphere Application Server Liberty Profile CVE-2016-2923 Information Disclosure Vulnerability