No Image

RHSA-2017:0461-1: Critical: firefox security update

2017-03-08 KENNETH 0

RHSA-2017:0461-1: Critical: firefox security update Red Hat Enterprise Linux: An update for firefox is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. CVE-2017-5398, CVE-2017-5400, CVE-2017-5401, CVE-2017-5402, CVE-2017-5404, CVE-2017-5405, CVE-2017-5407, CVE-2017-5408, CVE-2017-5410 Source: RHSA-2017:0461-1: Critical: firefox security update

No Image

RHEA-2017:0460-1: nspr, nss-util, and nss bug fix and enhancement update

2017-03-08 KENNETH 0

RHEA-2017:0460-1: nspr, nss-util, and nss bug fix and enhancement update Red Hat Enterprise Linux: Updated nspr, nss-util, and nss packages that fix several bugs and add various enhancements are now available for Red Hat Enterprise Linux 7. Source: RHEA-2017:0460-1: nspr, nss-util, and nss bug fix and enhancement update

No Image

RHSA-2017:0459-1: Critical: firefox security update

2017-03-08 KENNETH 0

RHSA-2017:0459-1: Critical: firefox security update Red Hat Enterprise Linux: An update for firefox is now available for Red Hat Enterprise Linux 5 and Red Hat Enterprise Linux 6. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. CVE-2017-5398, CVE-2017-5400, CVE-2017-5401, CVE-2017-5402, CVE-2017-5404, CVE-2017-5405, CVE-2017-5407, CVE-2017-5408, CVE-2017-5410 Source: RHSA-2017:0459-1: Critical: firefox security update

No Image

USN-3218-1: Linux kernel vulnerability

2017-03-08 KENNETH 0

USN-3218-1: Linux kernel vulnerability Ubuntu Security Notice USN-3218-1 7th March, 2017 linux, linux-ti-omap4 vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 12.04 LTS Summary The system could be made to crash or run programs as an administrator. Software description linux – Linux kernel linux-ti-omap4 – Linux kernel for OMAP4 Details Alexander Popov discovered that the N_HDLC line discipline implementationin the Linux kernel contained a double-free vulnerability. A local attackercould use this to cause a denial of service (system crash) or possibly gainadministrative privileges. Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 12.04 LTS: linux-image-omap4 3.2.0.1502.97 linux-image-3.2.0-124-virtual 3.2.0-124.167 linux-image-generic 3.2.0.124.139 linux-image-powerpc-smp 3.2.0.124.139 linux-image-generic-pae 3.2.0.124.139 linux-image-3.2.0-124-generic-pae 3.2.0-124.167 linux-image-highbank 3.2.0.124.139 linux-image-virtual 3.2.0.124.139 linux-image-3.2.0-124-omap 3.2.0-124.167 linux-image-powerpc64-smp 3.2.0.124.139 linux-image-3.2.0-124-highbank 3.2.0-124.167 linux-image-3.2.0-124-generic 3.2.0-124.167 linux-image-3.2.0-1502-omap4 3.2.0-1502.129 linux-image-omap 3.2.0.124.139 linux-image-3.2.0-124-powerpc-smp 3.2.0-124.167 linux-image-3.2.0-124-powerpc64-smp 3.2.0-124.167 To [ more… ]

No Image

USN-3219-1: Linux kernel vulnerability

2017-03-08 KENNETH 0

USN-3219-1: Linux kernel vulnerability Ubuntu Security Notice USN-3219-1 7th March, 2017 linux vulnerability A security issue affects these releases of Ubuntu and its derivatives: Ubuntu 14.04 LTS Summary The system could be made to crash or run programs as an administrator. Software description linux – Linux kernel Details Alexander Popov discovered that the N_HDLC line discipline implementationin the Linux kernel contained a double-free vulnerability. A local attackercould use this to cause a denial of service (system crash) or possibly gainadministrative privileges. Update instructions The problem can be corrected by updating your system to the following package version: Ubuntu 14.04 LTS: linux-image-powerpc-smp 3.13.0.112.120 linux-image-3.13.0-112-powerpc-e500 3.13.0-112.159 linux-image-3.13.0-112-powerpc-smp 3.13.0-112.159 linux-image-generic 3.13.0.112.120 linux-image-3.13.0-112-powerpc-e500mc 3.13.0-112.159 linux-image-powerpc-e500mc 3.13.0.112.120 linux-image-generic-lpae 3.13.0.112.120 linux-image-3.13.0-112-powerpc64-smp 3.13.0-112.159 linux-image-powerpc-e500 3.13.0.112.120 linux-image-3.13.0-112-generic-lpae 3.13.0-112.159 linux-image-3.13.0-112-lowlatency 3.13.0-112.159 linux-image-lowlatency 3.13.0.112.120 linux-image-3.13.0-112-generic 3.13.0-112.159 linux-image-3.13.0-112-powerpc64-emb 3.13.0-112.159 linux-image-powerpc64-emb 3.13.0.112.120 linux-image-powerpc64-smp 3.13.0.112.120 To update your system, please follow these instructions: [ more… ]