KL-001-2016-009 : Sophos Web Appliance Remote Code Execution
Monthly Archives: November 2016
RHSA-2016:2671-1: Moderate: qemu-kvm-rhev security, bug fix, and enhancement update
Red Hat Enterprise Linux: An update for qemu-kvm-rhev is now available for Red Hat OpenStack Platform 9.0
(Mitaka).
Red Hat Product Security has rated this update as having a security impact of
Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a
detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.
CVE-2015-8817, CVE-2015-8818
RHSA-2016:2659-1: Critical: java-1.6.0-ibm security update
Red Hat Enterprise Linux: An update for java-1.6.0-ibm is now available for Red Hat Enterprise Linux 5
Supplementary and Red Hat Enterprise Linux 6 Supplementary.
Red Hat Product Security has rated this update as having a security impact of
Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a
detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.
CVE-2016-5542, CVE-2016-5554, CVE-2016-5556, CVE-2016-5573, CVE-2016-5597
RHSA-2016:2658-1: Important: java-1.7.0-openjdk security update
Red Hat Enterprise Linux: An update for java-1.7.0-openjdk is now available for Red Hat Enterprise Linux
5, Red Hat Enterprise Linux 6, and Red Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of
Important. A Common Vulnerability Scoring System (CVSS) base score, which gives
a detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.
CVE-2016-5542, CVE-2016-5554, CVE-2016-5573, CVE-2016-5582, CVE-2016-5597
RHBA-2016:2673-1: qemu-kvm-rhev bug fix and enhancement update
Red Hat Enterprise Linux: Updated qemu-kvm-rhev packages that fix several bugs and add various
enhancements are now available for Red Hat Virtualization Hypervisor 7.
RHBA-2016:2667-1: Red Hat OpenStack Platform 9 director Bug Fix Advisory
Red Hat Enterprise Linux: Updated packages that resolve various issues are now available for Red Hat
OpenStack Platform 9.0 director for RHEL 7.
RHBA-2016:2662-1: Satellite 5.7 bug fix update
RHN Satellite and Proxy: Updated spacewalk-backend, spacewalk-java, spacewalk-utils, satellite-schema and
spacewalk-schema packages that fix several bugs and add various enhancements are
now available for Red Hat Satellite 5.7.
RHBA-2016:2661-1: Red Hat Certification bug fix and enhancement update
Red Hat Enterprise Linux: An updated redhat-certification packages that fix several bugs and adds various
enhancements is now available for Red Hat Enterprise Linux 6 and Red Hat
Enterprise Linux 7.
RHBA-2016:2660-1: tzdata bug fix and enhancement update
Red Hat Enterprise Linux: Updated tzdata packages that add various enhancements are now available for Red
Hat Enterprise Linux 4 Extended Life Cycle Support, Red Hat Enterprise Linux 5.6
Long Life, Red Hat Enterprise Linux 5.9 Advanced Update Support, Red Hat
Enterprise Linux 5, Red Hat Enterprise Linux 6.2 Advanced Update Support, Red
Hat Enterprise Linux 6.4 Advanced Update Support, Red Hat Enterprise Linux 6.5
Advanced Update Support, Red Hat Enterprise Linux 6.5 Telco Extended Update
Support, Red Hat Enterprise Linux 6.6 Advanced Update Support, Red Hat
Enterprise Linux 6.6 Telco Extended Update Support, Red Hat Enterprise Linux 6.7
Extended Update Support, Red Hat Enterprise Linux 6, Red Hat Enterprise Linux
7.1 Extended Update Support, Red Hat Enterprise Linux 7.1 Little Endian Extended
Update Support, Red Hat Enterprise Linux 7.2 Extended Update Support, and Red
Hat Enterprise Linux 7.
RHSA-2016:2674-1: Moderate: libgcrypt security update
Red Hat Enterprise Linux: An update for libgcrypt is now available for Red Hat Enterprise Linux 6 and Red
Hat Enterprise Linux 7.
Red Hat Product Security has rated this update as having a security impact of
Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a
detailed severity rating, is available for each vulnerability from the CVE
link(s) in the References section.
CVE-2016-6313