Gentoo Linux Security Advisory 201611-16 – Multiple vulnerabilities have been found in the Chromium web browser, the worst of which allows remote attackers to execute arbitrary code. Versions less than 54.0.2840.100 are affected.
Monthly Archives: November 2016
Gentoo Linux Security Advisory 201611-17
Gentoo Linux Security Advisory 201611-17 – A buffer overflow in RPCBind might allow remote attackers to cause a Denial of Service. Versions less than 0.2.3-r1 are affected.
Gentoo Linux Security Advisory 201611-18
Gentoo Linux Security Advisory 201611-18 – Multiple vulnerabilities have been found in Adobe Flash Player, the worst of which allows remote attackers to execute arbitrary code. Versions less than 23.0.0.207 are affected.
Gentoo Linux Security Advisory 201611-19
Gentoo Linux Security Advisory 201611-19 – A path traversal attack in Tar may lead to the remote execution of arbitrary code. Versions less than 1.29-r1 are affected.
Gentoo Linux Security Advisory 201611-20
Gentoo Linux Security Advisory 201611-20 – A buffer overflow in TestDisk might allow remote attackers to execute arbitrary code. Versions less than 7.0-r2 are affected.
Ubuntu Security Notice USN-3132-1
Ubuntu Security Notice 3132-1 – Harry Sintonen discovered that tar incorrectly handled extracting files when path names are specified on the command line. If a user or automated system were tricked into processing a specially crafted archive, an attacker could possibly overwrite arbitrary files.
Ubuntu Security Notice USN-3134-1
Ubuntu Security Notice 3134-1 – It was discovered that the smtplib library in Python did not return an error when StartTLS fails. A remote attacker could possibly use this to expose sensitive information. Various other issues were also addressed.
Gentoo Linux Security Advisory 201611-15
Gentoo Linux Security Advisory 201611-15 – Multiple vulnerabilities have been found in Poppler, the worst of which allows remote attackers to execute arbitrary code. Versions less than 0.42.0 are affected.
xen-4.6.4-2.fc24
xen : various security flaws (#1397383)
x86 null segments not always treated as unusable [XSA-191, CVE-2016-9386]
x86 task switch to VM86 mode mis-handled [XSA-192, CVE-2016-9382]
x86 segment base write emulation lacking canonical address checks [XSA-193,
CVE-2016-9385]
x86 64-bit bit test instruction emulation broken [XSA-195, CVE-2016-9383]
x86 software interrupt injection mis-handled [XSA-196, CVE-2016-9377,
CVE-2016-9378]
qemu incautious about shared ring processing [XSA-197, CVE-2016-9381]
delimiter injection vulnerabilities in pygrub [XSA-198, CVE-2016-9379,
CVE-2016-9380]
xen-4.7.1-3.fc25
xen : various security flaws (#1397383)
x86 null segments not always treated as unusable [XSA-191, CVE-2016-9386]
x86 task switch to VM86 mode mis-handled [XSA-192, CVE-2016-9382]
x86 segment base write emulation lacking canonical address checks [XSA-193,
CVE-2016-9385]
guest 32-bit ELF symbol table load leaking host data [XSA-194, CVE-2016-9384]
x86 64-bit bit test instruction emulation broken [XSA-195, CVE-2016-9383]
x86 software interrupt injection mis-handled [XSA-196, CVE-2016-9377,
CVE-2016-9378]
qemu incautious about shared ring processing [XSA-197, CVE-2016-9381]
delimiter injection vulnerabilities in pygrub [XSA-198, CVE-2016-9379,
CVE-2016-9380]