No Image

RHSA-2016:0707-1: Important: chromium-browser security update

2016-05-02 KENNETH 0

RHSA-2016:0707-1: Important: chromium-browser security update Red Hat Enterprise Linux: An update for chromium-browser is now available for Red Hat Enterprise Linux 6 Supplementary. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. CVE-2016-1660, CVE-2016-1661, CVE-2016-1662, CVE-2016-1663, CVE-2016-1664, CVE-2016-1665, CVE-2016-1666 Source: RHSA-2016:0707-1: Important: chromium-browser security update

No Image

RHSA-2016:0706-1: Important: mercurial security update

2016-05-02 KENNETH 0

RHSA-2016:0706-1: Important: mercurial security update Red Hat Enterprise Linux: An update for mercurial is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. CVE-2016-3068, CVE-2016-3069 Source: RHSA-2016:0706-1: Important: mercurial security update

No Image

RHSA-2016:0705-1: Critical: rh-mysql56-mysql security update

2016-05-02 KENNETH 0

RHSA-2016:0705-1: Critical: rh-mysql56-mysql security update Red Hat Enterprise Linux: An update for rh-mysql56-mysql is now available for Red Hat Software Collections. Red Hat Product Security has rated this update as having a security impact of Critical. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. CVE-2015-4792, CVE-2015-4800, CVE-2015-4802, CVE-2015-4815, CVE-2015-4826, CVE-2015-4830, CVE-2015-4836, CVE-2015-4858, CVE-2015-4861, CVE-2015-4862, CVE-2015-4870, CVE-2015-4890, CVE-2015-4910, CVE-2015-4913, CVE-2016-0503, CVE-2016-0504, CVE-2016-0505, CVE-2016-0546, CVE-2016-0595, CVE-2016-0596, CVE-2016-0597, CVE-2016-0598, CVE-2016-0600, CVE-2016-0605, CVE-2016-0606, CVE-2016-0607, CVE-2016-0608, CVE-2016-0609, CVE-2016-0610, CVE-2016-0611, CVE-2016-0639, CVE-2016-0640, CVE-2016-0641, CVE-2016-0642, CVE-2016-0643, CVE-2016-0644, CVE-2016-0646, CVE-2016-0647, CVE-2016-0648, CVE-2016-0649, CVE-2016-0650, CVE-2016-0655, CVE-2016-0661, CVE-2016-0665, CVE-2016-0666, CVE-2016-0668, CVE-2016-2047 Source: RHSA-2016:0705-1: Critical: rh-mysql56-mysql security update

No Image

Microsoft Bounty Programs Expansion – Nano Server Technical Preview Bounty

2016-04-30 KENNETH 0

Microsoft Bounty Programs Expansion – Nano Server Technical Preview Bounty Microsoft is pleased to announce another expansion of the Microsoft Bounty Programs. Today we begin a bounty for the Nano Server installation option of Windows Server 2016 Technical Preview 5. Please visit https://aka.ms/BugBounty to find more details. Nano Server is a remotely administered, headless installation option of the server operating system. In this first release, the Nano Server deployment is focused on two scenarios: As the host for compute and/or storage clusters As a lightweight OS in a VM or container for “born in the cloud” applications. In summary: All binaries included in the Nano Server configuration of Windows Server 2016 Technical Preview 5 and any subsequent Betas, Technical Previews or Release Candidates during the bounty period Hyper-V escapes and Mitigation Bypass vulnerabilities will be evaluated against the Mitigation Bypass [ more… ]

No Image

Changes to Security Update Links

2016-04-30 KENNETH 0

Changes to Security Update Links Updates have historically been published on both both the Microsoft Download Center and the Microsoft Update Catalog and Security Bulletins linked directly to update packages on the Microsoft Download Center. Starting May 10, some updates will no longer be available from the Microsoft Download Center. Security bulletins will continue to link directly to the updates, but will now point to the packages on the Microsoft Update Catalog for updates not available on the Microsoft Download Center. Customers that use tools linking to the Microsoft Download Center should follow the links provided in the Security Bulletins or search directly on the Microsoft Update Catalog. For tips on searching the Microsoft Update Catalogue visit the frequently asked questions page. Source: Changes to Security Update Links