Fedora 22 Security Update: xfsprogs-3.2.2-2.fc22

Resolved Bugs
817696 – CVE-2012-2150 xfsprogs: xfs_metadump information disclosure flaw<br
Gabriel Vlasiu reported that xfs_metadump, part of the xfsprogs suite of tools for the XFS filesystem, did not properly obfuscate data. xfs_metadump properly obfuscates active metadata, but the rest of the space within that fs block comes through in the clear. This could lead to exposure of stale disk data via the produced metadump image.
The expectation of xfs_metadump is to obfuscate all but the shortest names in the metadata, as noted in the manpage:
By default, xfs_metadump obfuscates most file (regular file, directory and symbolic link) names and extended attribute names to allow the dumps to be sent without revealing confidential information. Extended attribute values are zeroed and no data is copied. The only exceptions are file or attribute names that are 4 or less characters in length. Also file names that span extents (this can only occur with the mkfs.xfs(8) options where -n size > -b size) are not obfuscated. Names between 5 and 8 characters in length inclusively are partially obfuscated.
While the xfs_metadump tool can be run by unprivileged users, it requires appropriate permissions to access block devices (such as root) where the sensitive data might be dumped. An unprivileged user, without access to the block device, could not use this flaw to obtain sensitive data they would not otherwise have permission to access.

Fedora 22 Security Update: kernel-4.1.3-201.fc22

Resolved Bugs
1180920 – [abrt] WARNING: CPU: 1 PID: 293 at kernel/sched/core.c:7303 __might_sleep+0xbd/0xd0()
1206724 – [abrt] WARNING: CPU: 0 PID: 302 at kernel/sched/core.c:7326 __might_sleep+0x87/0x90()
1243465 – CVE-2015-3290 kernel: x86: nested NMI handler and espfix64 interaction privilege escalation
1245927 – CVE-2015-3291 kernel: x86/nmi: malicious userspace programs can cause the kernel to skip NMIs [fedora-all]<br
Fixes for CVE-2015-3290 CVE-2015-3291 CVE-2015-1333 in the kernel.
Also fixes for a minor warning in pcmcia.

Fedora 21 Security Update: xfsprogs-3.2.2-2.fc21

Resolved Bugs
817696 – CVE-2012-2150 xfsprogs: xfs_metadump information disclosure flaw<br
Gabriel Vlasiu reported that xfs_metadump, part of the xfsprogs suite of tools for the XFS filesystem, did not properly obfuscate data. xfs_metadump properly obfuscates active metadata, but the rest of the space within that fs block comes through in the clear. This could lead to exposure of stale disk data via the produced metadump image.
The expectation of xfs_metadump is to obfuscate all but the shortest names in the metadata, as noted in the manpage:
By default, xfs_metadump obfuscates most file (regular file, directory and symbolic link) names and extended attribute names to allow the dumps to be sent without revealing confidential information. Extended attribute values are zeroed and no data is copied. The only exceptions are file or attribute names that are 4 or less characters in length. Also file names that span extents (this can only occur with the mkfs.xfs(8) options where -n size > -b size) are not obfuscated. Names between 5 and 8 characters in length inclusively are partially obfuscated.
While the xfs_metadump tool can be run by unprivileged users, it requires appropriate permissions to access block devices (such as root) where the sensitive data might be dumped. An unprivileged user, without access to the block device, could not use this flaw to obtain sensitive data they would not otherwise have permission to access.

DSA-3322 ruby-rack – security update

Tomek Rabczak from the NCC Group discovered a flaw in the
normalize_params() method in Rack, a modular Ruby webserver interface.
A remote attacker can use this flaw via specially crafted requests to
cause a `SystemStackError` and potentially cause a denial of service
condition for the service.

CEBA-2015:1521 CentOS 7 less FASTTRACK BugFixUpdate

CentOS Errata and Bugfix Advisory 2015:1521 

Upstream details at : https://rhn.redhat.com/errata/RHBA-2015-1521.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

x86_64:
94999b90a6ce0c291b86d07ffbd4400409c783b846b65d5c874667dc8938c492  less-458-9.el7.x86_64.rpm

Source:
cedc1c32bdf9f66401ceba704a168d2bdeae6d6671b1627bd51e1e1696a1c949  less-458-9.el7.src.rpm



CESA-2015:1526 Important CentOS 5java-1.6.0-openjdk Security Update

CentOS Errata and Security Advisory 2015:1526 Important

Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1526.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

i386:
11a2635ffab652c45c63ac6aa128866507d5aa53d04ad7030b839f31c6a5f4df  java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el5_11.i386.rpm
7597882cfdaf40f21aca2a6af73aedd1ac1bce73e18a316d6db23d56a40f44c6  java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el5_11.i386.rpm
a6ceae2f7957675fb06d209fe703019069257c1c31a48a7abf09b8933858077a  java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el5_11.i386.rpm
94ec650562cec44847914ce52fb88a83937a8646ac58093aacbb89cc44200580  java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el5_11.i386.rpm
b44c48cbff3a0eb0fc713ff4bd5624cce7aa5abafa54bdd2994026f57c3542d4  java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el5_11.i386.rpm

x86_64:
9d896fe3912a3feef0f0806d8ba0231beec02ecaaff0dd3062228c694a94acab  java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el5_11.x86_64.rpm
e5e5f98447cde6cf42dec41b2012ce03a2c4da60d149b2172f7bc594d3aeeb28  java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el5_11.x86_64.rpm
91996692b0932c47d3d3f37707bfd3d5e119d9bf091940d810b650cbb0984ce3  java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el5_11.x86_64.rpm
1f4028f6cf0ea019a8d032e1860060e71939facfce1497574b2b4420829377ee  java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el5_11.x86_64.rpm
105b064767a936c604222364891240945104958b0af6fdc013dbc474aa489b66  java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el5_11.x86_64.rpm

Source:
a1823e46d30a1db8e7631e2a912f863f3bad7442db82f9d323dca26dc7cfa9d0  java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el5_11.src.rpm



CESA-2015:1526 Important CentOS 7java-1.6.0-openjdk Security Update

CentOS Errata and Security Advisory 2015:1526 Important

Upstream details at : https://rhn.redhat.com/errata/RHSA-2015-1526.html

The following updated files have been uploaded and are currently 
syncing to the mirrors: ( sha256sum Filename ) 

x86_64:
5e91f94700cc94a8422277dcca5146e2f54a33547397d0b467e52e916ded811a  java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm
3e22027833fc703705aa7bbc9cb395733f2098320dc6538cd59bba7015d94745  java-1.6.0-openjdk-demo-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm
7a3a1b5b8bcaf615fa3797b9c76660a11e6ecd8b43670a4da00d610fe7c32b1d  java-1.6.0-openjdk-devel-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm
a2753379c1c1e628a155cd2af93a1c44ef7a44d164ce39fdddef0c51dbb53ad6  java-1.6.0-openjdk-javadoc-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm
a263d9da3f58f534699e226540180c7874fa38e7a60782a161902c1091e41eb8  java-1.6.0-openjdk-src-1.6.0.36-1.13.8.1.el7_1.x86_64.rpm

Source:
41b960e8e0cd7a4acd59a1750fcd2129c95a69a68e92d898ee613e1ae000fef8  java-1.6.0-openjdk-1.6.0.36-1.13.8.1.el7_1.src.rpm



Writing Advanced OS X Malware an ‘Elegant’ Solution to Improving Detection

OS X security researcher Patrick Wardle is expected at Black Hat to demonstrate how to write advanced Mac malware, including Gatekeeper and Xprotect bypasses, in hopes of raising awareness to the current state of OS malware detection.