No Image

RHBA-2017:1370-1: Red Hat Certification bug fix and enhancement update

2017-05-30 KENNETH 0

RHBA-2017:1370-1: Red Hat Certification bug fix and enhancement update Red Hat Enterprise Linux: An updated redhat-certification package that fixes several bugs and adds various enhancements is now available for Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7. Source: RHBA-2017:1370-1: Red Hat Certification bug fix and enhancement update

No Image

RHSA-2017:1364-1: Important: nss security and bug fix update

2017-05-30 KENNETH 0

RHSA-2017:1364-1: Important: nss security and bug fix update Red Hat Enterprise Linux: An update for nss is now available for Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. CVE-2017-7502 Source: RHSA-2017:1364-1: Important: nss security and bug fix update

No Image

RHSA-2017:1365-1: Important: nss security and bug fix update

2017-05-30 KENNETH 0

RHSA-2017:1365-1: Important: nss security and bug fix update Red Hat Enterprise Linux: An update for nss is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. CVE-2017-7502 Source: RHSA-2017:1365-1: Important: nss security and bug fix update

No Image

USN-3300-1: juju-core vulnerability

2017-05-27 KENNETH 0

USN-3300-1: juju-core vulnerability Ubuntu Security Notice USN-3300-1 26th May, 2017 juju-core vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 17.04 Ubuntu 16.10 Ubuntu 16.04 LTS Ubuntu 14.04 LTS Summary The system could be made to run programs as an administrator. Software description juju-core – next generation service orchestration system Details Ryan Beisner discovered juju did not set permissions on a Unix domainsocket. A local attacker could use this flaw to gain administrativeprivileges. Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 17.04: juju 2.0.2-0ubuntu2.1 juju-2.0 2.0.2-0ubuntu2.1 Ubuntu 16.10: juju 2.0.2-0ubuntu0.16.10.2 juju-2.0 2.0.2-0ubuntu0.16.10.2 Ubuntu 16.04 LTS: juju 2.0.2-0ubuntu0.16.04.2 juju-2.0 2.0.2-0ubuntu0.16.04.2 Ubuntu 14.04 LTS: juju 1.25.6-0ubuntu1.14.04.2 juju-core 1.25.6-0ubuntu1.14.04.2 juju-local 1.25.6-0ubuntu1.14.04.2 juju-local-kvm 1.25.6-0ubuntu1.14.04.2 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. After a standard system update you need to [ more… ]