DSA-3047 rsyslog – security update

Mancha discovered a vulnerability in rsyslog, a system for log
processing. This vulnerability is an integer overflow that can be
triggered by malformed messages to a server, if this one accepts data
from untrusted sources, provoking message loss, denial of service and, potentially, remote code execution.

Mobius Forensic Toolkit 0.5.21

Mobius Forensic Toolkit is a forensic framework written in Python/GTK that manages cases and case items, providing an abstract interface for developing extensions. Cases and item categories are defined using XML files for easy integration with other tools.

OpenSSH 6.7p1

This is a Linux/portable port of OpenBSD’s excellent OpenSSH. OpenSSH is based on the last free version of Tatu Ylonen’s SSH with all patent-encumbered algorithms removed, all known security bugs fixed, new features reintroduced, and many other clean-ups.

Red Hat Security Advisory 2014-1365-01

Red Hat Security Advisory 2014-1365-01 – The kernel packages contain the Linux kernel, the core of any Linux operating system. A flaw was found in the way the Linux kernel’s futex subsystem handled reference counting when requeuing futexes during futex_wait(). A local, unprivileged user could use this flaw to zero out the reference counter of an inode or an mm struct that backs up the memory area of the futex, which could lead to a use-after-free flaw, resulting in a system crash or, potentially, privilege escalation. The security impact of this issue was discovered by Mateusz Guzik of Red Hat.

Google Releases Security Updates for Chrome and Chrome OS

Original release date: October 07, 2014

Google has released security updates to address multiple vulnerabilities in Chrome and Chrome OS, some of which could potentially allow an attacker to take control of the affected system or cause a denial of service condition.

Updates available include:

  • Chrome 38.0.2125.101 for Windows, Mac and Linux
  • Chrome 38.0.2125.59 for iPhone and iPad
  • Chrome OS 38.0.2125.101 for all Chrome OS devices except Chromeboxes

Users and administrators are encouraged to review the Google Chrome blog entries 1, 2 and 3, and apply the necessary updates.


This product is provided subject to this Notification and this Privacy & Use policy.

Software and Security Information