No Image

RHSA-2016:1430-1: Moderate: java-1.7.0-ibm and java-1.7.1-ibm security update

2016-07-18 KENNETH 0

RHSA-2016:1430-1: Moderate: java-1.7.0-ibm and java-1.7.1-ibm security update RHN Satellite and Proxy: An update for java-1.7.0-ibm and java-1.7.1-ibm is now available for Red Hat Satellite 5.7 and Red Hat Satellite 5.6. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. CVE-2015-4734, CVE-2015-4803, CVE-2015-4805, CVE-2015-4806, CVE-2015-4810, CVE-2015-4835, CVE-2015-4840, CVE-2015-4842, CVE-2015-4843, CVE-2015-4844, CVE-2015-4860, CVE-2015-4871, CVE-2015-4872, CVE-2015-4882, CVE-2015-4883, CVE-2015-4893, CVE-2015-4902, CVE-2015-4903, CVE-2015-5006, CVE-2015-5041, CVE-2015-7575, CVE-2015-7981, CVE-2015-8126, CVE-2015-8472, CVE-2015-8540, CVE-2016-0264, CVE-2016-0363, CVE-2016-0376, CVE-2016-0402, CVE-2016-0448, CVE-2016-0466, CVE-2016-0483, CVE-2016-0494, CVE-2016-0686, CVE-2016-0687, CVE-2016-3422, CVE-2016-3426, CVE-2016-3427, CVE-2016-3443, CVE-2016-3449 Source: RHSA-2016:1430-1: Moderate: java-1.7.0-ibm and java-1.7.1-ibm security update

No Image

RHSA-2016:1292-2: Important: libxml2 security update

2016-07-18 KENNETH 0

RHSA-2016:1292-2: Important: libxml2 security update Red Hat Enterprise Linux: An update for libxml2 is now available for Red Hat Enterprise Linux 6 and Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. [Updated 18 July 2016] This advisory has been updated to push packages into the Red Hat Enterprise Linux 6 Desktop channels. The packages included in this revised update have not been changed in any way from the packages included in the original advisory. CVE-2016-1762, CVE-2016-1833, CVE-2016-1834, CVE-2016-1835, CVE-2016-1836, CVE-2016-1837, CVE-2016-1838, CVE-2016-1839, CVE-2016-1840, CVE-2016-3627, CVE-2016-3705, CVE-2016-4447, CVE-2016-4448, CVE-2016-4449 Source: RHSA-2016:1292-2: Important: libxml2 security update

No Image

USN-3037-1: Linux kernel (Vivid HWE) vulnerability

2016-07-15 KENNETH 0

USN-3037-1: Linux kernel (Vivid HWE) vulnerability Ubuntu Security Notice USN-3037-1 14th July, 2016 linux-lts-vivid vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 14.04 LTS Summary The system could be made to crash under certain conditions. Software description linux-lts-vivid – Linux hardware enablement kernel from Vivid for Trusty Details Jan Stancek discovered that the Linux kernel's memory manager did notproperly handle moving pages mapped by the asynchronous I/O (AIO) ringbuffer to the other nodes. A local attacker could use this to cause adenial of service (system crash). Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 14.04 LTS: linux-image-3.19.0-65-powerpc64-smp 3.19.0-65.73~14.04.1 linux-image-3.19.0-65-powerpc-smp 3.19.0-65.73~14.04.1 linux-image-3.19.0-65-powerpc-e500mc 3.19.0-65.73~14.04.1 linux-image-3.19.0-65-powerpc64-emb 3.19.0-65.73~14.04.1 linux-image-3.19.0-65-generic 3.19.0-65.73~14.04.1 linux-image-3.19.0-65-generic-lpae 3.19.0-65.73~14.04.1 linux-image-3.19.0-65-lowlatency 3.19.0-65.73~14.04.1 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. After a standard system update you need [ more… ]

No Image

USN-3036-1: Linux kernel (Utopic HWE) vulnerability

2016-07-15 KENNETH 0

USN-3036-1: Linux kernel (Utopic HWE) vulnerability Ubuntu Security Notice USN-3036-1 14th July, 2016 linux-lts-utopic vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 14.04 LTS Summary The system could be made to crash under certain conditions. Software description linux-lts-utopic – Linux hardware enablement kernel from Utopic for Trusty Details Jan Stancek discovered that the Linux kernel's memory manager did notproperly handle moving pages mapped by the asynchronous I/O (AIO) ringbuffer to the other nodes. A local attacker could use this to cause adenial of service (system crash). Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 14.04 LTS: linux-image-3.16.0-77-powerpc-smp 3.16.0-77.99~14.04.1 linux-image-3.16.0-77-powerpc-e500mc 3.16.0-77.99~14.04.1 linux-image-3.16.0-77-powerpc64-smp 3.16.0-77.99~14.04.1 linux-image-3.16.0-77-generic 3.16.0-77.99~14.04.1 linux-image-3.16.0-77-generic-lpae 3.16.0-77.99~14.04.1 linux-image-3.16.0-77-powerpc64-emb 3.16.0-77.99~14.04.1 linux-image-3.16.0-77-lowlatency 3.16.0-77.99~14.04.1 To update your system, please follow these instructions: https://wiki.ubuntu.com/Security/Upgrades. After a standard system update you need [ more… ]

No Image

USN-3035-3: Linux kernel (Wily HWE) vulnerability

2016-07-15 KENNETH 0

USN-3035-3: Linux kernel (Wily HWE) vulnerability Ubuntu Security Notice USN-3035-3 14th July, 2016 linux-lts-wily vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 14.04 LTS Summary The system could be made to crash under certain conditions. Software description linux-lts-wily – Linux hardware enablement kernel from Wily for Trusty Details USN-3035-1 fixed vulnerabilities in the Linux kernel for Ubuntu 15.10.This update provides the corresponding updates for the Linux HardwareEnablement (HWE) kernel from Ubuntu 15.10 for Ubuntu 14.04 LTS. Jan Stancek discovered that the Linux kernel's memory manager did notproperly handle moving pages mapped by the asynchronous I/O (AIO) ringbuffer to the other nodes. A local attacker could use this to cause adenial of service (system crash). Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 14.04 LTS: linux-image-4.2.0-42-powerpc64-smp 4.2.0-42.49~14.04.1 [ more… ]