HP Security Bulletin HPSBUX03665 2 – Potential security vulnerabilities have been identified in the HP-UX Tomcat-based Servlet Engine. These vulnerabilities could be exploited remotely to create a Denial of Service (DoS) and URL Redirection. Revision 2 of this advisory.
Monthly Archives: November 2016
Red Hat Security Advisory 2016-2706-01
Red Hat Security Advisory 2016-2706-01 – KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM in environments managed by Red Hat Enterprise Virtualization Manager. The following packages have been upgraded to a newer upstream version: qemu-kvm-rhev. Security Fix: An out-of-bounds flaw was found in the QEMU emulator built using ‘address_space_translate’ to map an address to a MemoryRegionSection. The flaw could occur while doing pci_dma_read/write calls, resulting in an out-of-bounds read-write access error. A privileged user inside a guest could use this flaw to crash the guest instance.
Red Hat Security Advisory 2016-2705-01
Red Hat Security Advisory 2016-2705-01 – KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM in environments managed by Red Hat Enterprise Virtualization Manager. The following packages have been upgraded to a newer upstream version: qemu-kvm-rhev. Security Fix: An out-of-bounds flaw was found in the QEMU emulator built using ‘address_space_translate’ to map an address to a MemoryRegionSection. The flaw could occur while doing pci_dma_read/write calls, resulting in an out-of-bounds read-write access error. A privileged user inside a guest could use this flaw to crash the guest instance.
HP Security Bulletin HPSBGN03669 1
HP Security Bulletin HPSBGN03669 1 – Potential vulnerabilities have been identified in HPE SiteScope. The vulnerabilities could be exploited to allow local elevation of privilege and exploited remotely to allow denial of service, arbitrary code execution, cross-site request forgery. Revision 1 of this advisory.
Red Hat Security Advisory 2016-2704-01
Red Hat Security Advisory 2016-2704-01 – KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm-rhev package provides the user-space component for running virtual machines using KVM in environments managed by Red Hat Enterprise Virtualization Manager. The following packages have been upgraded to a newer upstream version: qemu-kvm-rhev. Security Fix: An out-of-bounds flaw was found in the QEMU emulator built using ‘address_space_translate’ to map an address to a MemoryRegionSection. The flaw could occur while doing pci_dma_read/write calls, resulting in an out-of-bounds read-write access error. A privileged user inside a guest could use this flaw to crash the guest instance.
Cybercrime Report Template
This document is meant to be a general purpose cybercrime report template for victims.
moin-1.9.9-1.fc23
Update to 1.9.9 (bugfix release for CVE-2016-7146, CVE-2016-7148)
moin-1.9.9-1.el6
Update to 1.9.9 (bugfix release for CVE-2016-7146, CVE-2016-7148)
DSA-3714 akonadi – security update
In some configurations the MySQL storage backend for Akonadi, an
extensible cross-desktop Personal Information Management (PIM) storage
service failed to start after applying the MySQL 5.5.53 security upgrade.
DSA-3713 gst-plugins-bad0.10 – security update
Chris Evans discovered that the GStreamer 0.10 plugin to decode NES
Sound Format files allowed the execution of arbitrary code. Further
details can be found in his advisory at
http://scarybeastsecurity.blogspot.de/2016/11/0day-exploit-compromising-linux-desktop.html.