Red Hat Enterprise Linux: A new cc-config-rhel71 package is now available for Red Hat Enterprise Linux 7.
Monthly Archives: October 2016
RHSA-2016:2106-1: Important: kernel security update
Red Hat Enterprise Linux: An update for kernel is now available for Red Hat Enterprise Linux 6.7 Extended
Update Support.
Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives
a detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.
CVE-2016-5195
USN-3109-1: MySQL vulnerabilities
Ubuntu Security Notice USN-3109-1
25th October, 2016
mysql-5.5, mysql-5.7 vulnerabilities
A security issue affects these releases of Ubuntu and its
derivatives:
- Ubuntu 16.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary
Several security issues were fixed in MySQL.
Software description
- mysql-5.5
– MySQL database - mysql-5.7
– MySQL database
Details
Multiple security issues were discovered in MySQL and this update includes
new upstream MySQL versions to fix these issues.
MySQL has been updated to 5.5.53 in Ubuntu 12.04 LTS and Ubuntu 14.04 LTS.
Ubuntu 16.04 LTS and Ubuntu 16.10 have been updated to MySQL 5.7.16.
In addition to security fixes, the updated packages contain bug fixes,
new features, and possibly incompatible changes.
Please see the following for more information:
http://dev.mysql.com/doc/relnotes/mysql/5.5/en/news-5-5-53.html
http://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-16.html
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
Update instructions
The problem can be corrected by updating your system to the following
package version:
- Ubuntu 16.10:
-
mysql-server-5.7
5.7.16-0ubuntu0.16.10.1
- Ubuntu 16.04 LTS:
-
mysql-server-5.7
5.7.16-0ubuntu0.16.04.1
- Ubuntu 14.04 LTS:
-
mysql-server-5.5
5.5.53-0ubuntu0.14.04.1
- Ubuntu 12.04 LTS:
-
mysql-server-5.5
5.5.53-0ubuntu0.12.04.1
To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.
In general, a standard system update will make all the necessary changes.
References
USN-3110-1: Quagga vulnerability
Ubuntu Security Notice USN-3110-1
25th October, 2016
quagga vulnerability
A security issue affects these releases of Ubuntu and its
derivatives:
- Ubuntu 16.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
- Ubuntu 12.04 LTS
Summary
Quagga could be made to crash if it received specially crafted network
traffic.
Software description
- quagga
– BGP/OSPF/RIP routing daemon
Details
David Lamparter discovered that Quagga incorrectly handled certain IPv6
router advertisements. A remote attacker could possibly use this issue to
cause Quagga to crash, resulting in a denial of service.
Update instructions
The problem can be corrected by updating your system to the following
package version:
- Ubuntu 16.10:
-
quagga
1.0.20160315-2ubuntu0.1
- Ubuntu 16.04 LTS:
-
quagga
0.99.24.1-2ubuntu1.2
- Ubuntu 14.04 LTS:
-
quagga
0.99.22.4-3ubuntu1.3
- Ubuntu 12.04 LTS:
-
quagga
0.99.20.1-0ubuntu0.12.04.6
To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.
After a standard system update you need to restart Quagga to make all the
necessary changes.
References
USN-3114-1: nginx vulnerability
Ubuntu Security Notice USN-3114-1
25th October, 2016
nginx vulnerability
A security issue affects these releases of Ubuntu and its
derivatives:
- Ubuntu 16.10
- Ubuntu 16.04 LTS
- Ubuntu 14.04 LTS
Summary
The system could be made to run programs as an administrator.
Software description
- nginx
– small, powerful, scalable web/proxy server
Details
Dawid Golunski discovered that the nginx package incorrectly handled log
file permissions. A remote attacker could possibly use this issue to obtain
root privileges.
Update instructions
The problem can be corrected by updating your system to the following
package version:
- Ubuntu 16.10:
-
nginx-extras
1.10.1-0ubuntu1.1
-
nginx-full
1.10.1-0ubuntu1.1
-
nginx-common
1.10.1-0ubuntu1.1
-
nginx-light
1.10.1-0ubuntu1.1
-
nginx-core
1.10.1-0ubuntu1.1
- Ubuntu 16.04 LTS:
-
nginx-extras
1.10.0-0ubuntu0.16.04.3
-
nginx-full
1.10.0-0ubuntu0.16.04.3
-
nginx-common
1.10.0-0ubuntu0.16.04.3
-
nginx-light
1.10.0-0ubuntu0.16.04.3
-
nginx-core
1.10.0-0ubuntu0.16.04.3
- Ubuntu 14.04 LTS:
-
nginx-extras
1.4.6-1ubuntu3.6
-
nginx-full
1.4.6-1ubuntu3.6
-
nginx-common
1.4.6-1ubuntu3.6
-
nginx-light
1.4.6-1ubuntu3.6
-
nginx-core
1.4.6-1ubuntu3.6
To update your system, please follow these instructions:
https://wiki.ubuntu.com/Security/Upgrades.
In general, a standard system update will make all the necessary changes.
References
New VMSA-2016-0017 – VMware product updates address multiple information disclosure issues
Posted by VMware Security Response Center on Oct 25
————————————————————————-
VMware Security Advisory
Advisory ID: VMSA-2016-0017
Severity: Moderate
Synopsis: VMware product updates address multiple information
disclosure issues
Issue date: 2016-10-25
Updated on: 2016-10-25 (Initial Advisory)
CVE number: CVE-2016-5328, CVE-2016-5329
1. Summary
VMware product updates address information disclosure issues in…
Apache OpenOffice 4.1.2 Privilege Escalation
The Apache OpenOffice installer for Windows contained a defective operation that allows execution of arbitrary code with elevated privileges. All Apache OpenOffice versions 4.1.2 and older are affected. OpenOffice.org versions are also affected.
tcpdump 4.8.1
tcpdump allows you to dump the traffic on a network. It can be used to print out the headers and/or contents of packets on a network interface that matches a given expression. You can use this tool to track down network problems, to detect many attacks, or to monitor the network activities.
java-1.8.0-openjdk-aarch32-1.8.0.102-7.160812.fc25
October 2016 CPU fixes: http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixJAVA
java-1.8.0-openjdk-aarch32-1.8.0.102-7.160812.fc24
October 2016 CPU fixes: http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html#AppendixJAVA