1. Vulnerability
in Adobe ColdFusion (APSB15-21)
[28/08/2015] Vulnerability was identified in the Adobe ColdFusion. An
attacker could bypass security restrictions and obtain sensitive information.
This vulnerability affects versions prior to 10 Update 17 or 11 Update 6 of the
mentioned product. Security patches are available to resolve this
vulnerability.
URL:helpx.adobe.com/security/products/coldfusion/apsb15-21.html
2. Vulnerabilities in Mozilla Firefox (MFSA 2015-94, MFSA
2015-95)
[28/08/2015]
Vulnerabilities were identified in the Mozilla
Firefox. An attacker could bypass security restriction and execute arbitrary
code on the system. These vulnerabilities affect multiple versions of the
mentioned products. Security patches are available to resolve these
vulnerabilities.
URL:www.mozilla.org/en-US/security/known-vulnerabilities/firefox/
URL:www.mozilla.org/en-US/security/known-vulnerabilities/firefox-esr/
URL:www.mozilla.org/en-US/security/advisories/mfsa2015-94/
URL:www.mozilla.org/en-US/security/advisories/mfsa2015-95/
URL:www.hkcert.org/my_url/en/alert/15082801
URL:exchange.xforce.ibmcloud.com/vulnerabilities/105897
URL:exchange.xforce.ibmcloud.com/vulnerabilities/105898
3. Vulnerability in Cisco Identity Services Engine Guest
Portal
[28/08/2015]
Vulnerability was identified in the Cisco
Identity Services Engine Guest Portal. An attacker could bypass security
restrictions. This vulnerability affects firmware version 1.2.0.899 patch 14 of
the mentioned
product.
URL:tools.cisco.com/security/center/viewAlert.x?alertId=40691
4. Vulnerabilities in F5 Products
(SOL17169)
[28/08/2015]
Vulnerability was identified in the F5 BIG-IP
LTM, BIG-IP AAM, BIG-IP AFM, BIG-IP Analytics, BIG-IP APM, BIG-IP ASM, BIG-IP
Edge Gateway, BIG-IP GTM, BIG-IP Link Controller, BIG-IP PEM, BIG-IP PSM, BIG-IP
WebAccelerator, BIG-IP WOM, Enterprise Manager, BIG-IQ Cloud, BIG-IQ Device,
BIG-IQ Security and BIG-IQ ADC. An attacker could bypass security restrictions
and obtain sensitive information. This vulnerability affects multiple versions
of the mentioned products. Security patches are available to resolve this
vulnerability.
URL:support.f5.com/kb/en-us/solutions/public/17000/100/sol17169.html
5. Vulnerabilities in HP notebook PCs
(c04773272)
[28/08/2015] Vulnerabilities were identified in the HP notebook PCs with
the HP lt4112 LTE/HSPA+ Gobi 4G Module. An attacker could bypass security
restriction and execute arbitrary code on the system. These vulnerabilities
affect multiple versions of the mentioned products. Security patches are
available to resolve these
vulnerabilities.
URL:h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04773272
URL:exchange.xforce.ibmcloud.com/vulnerabilities/105904
URL:exchange.xforce.ibmcloud.com/vulnerabilities/105905
6. Vulnerabilities in Moxa SoftCMS
(ICSA-15-239-01)
[28/08/2015] Vulnerabilities were identified in the Moxa SoftCMS. An
attacker could bypass security restrictions and execute arbitrary code on the
system. These vulnerabilities affect versions prior to 1.4 of the mentioned
product. Security patches are available to resolve these
vulnerabilities.
URL:ics-cert.us-cert.gov/advisories/ICSA-15-239-01
7. Vulnerability in Siemens SIMATIC S7-1200
(ICSA-15-239-02)
[28/08/2015] Vulnerability was identified in the Siemens SIMATIC S7-1200.
An attacker could bypass security restrictions, gain elevated privileges and
execute arbitrary code on the system. This vulnerability affects versions prior
to V4.1.3 of the mentioned product. Security patches are available to resolve
this
vulnerability.
URL:ics-cert.us-cert.gov/advisories/ICSA-15-239-02
8. Vulnerability in Innominate mGuard VPN
(ICSA-15-239-03)
[28/08/2015] Vulnerability was identified in the Innominate mGuard VPN. An
attacker could bypass security restrictions, cause a denial of service condition
and crash the system. This vulnerability affects firmware versions prior to
8.1.7 of the mentioned product. Security patches are available to resolve this
vulnerability.
URL:ics-cert.us-cert.gov/advisories/ICSA-15-239-03
9. Security Updates in Oracle Linux
(ELSA-2015-1693)
[28/08/2015] Oracle has
released security update packages for fixing the vulnerabilities identified in
the firefox packages for Oracle Linux 5, 6 and 7. Due to multiple errors, an
attacker could bypass security restrictions, gain elevated privileges, execute
arbitrary code and compromise the
system.
URL:linux.oracle.com/errata/ELSA-2015-1693.html
10.
Security Updates in Debian
(DSA-3344-1)
[28/08/2015] Debian has
released security update packages for fixing the vulnerabilities identified in
the php5 packages for multiple versions of Debian GNU/Linux. Due to multiple
errors, an attacker could bypass security restrictions, obtain sensitive
information, gain elevated privileges, execute arbitrary code, cause a denial of
service condition and crash the
system.
URL:www.debian.org/security/2015/dsa-3344
11.
Security Updates in Mageia
(MGASA-2015-0326, MGASA-2015-0327, MGASA-2015-0328, MGASA-2015-0329,
MGASA-2015-0330)
[28/08/2015] Mageia has
released security update packages for fixing the vulnerabilities identified in
the subversion, python-django14, python-django, drupal, vlc, thunderbird and
thunderbird-l10n packages for multiple versions of Mageia. Due to multiple
errors, an attacker could bypass security restrictions, obtain sensitive
information, gain elevated privileges, execute arbitrary code, cause a denial of
service condition and compromise the
system.
URL:advisories.mageia.org/MGASA-2015-0326.html
URL:advisories.mageia.org/MGASA-2015-0327.html
URL:advisories.mageia.org/MGASA-2015-0328.html
URL:advisories.mageia.org/MGASA-2015-0329.html
URL:advisories.mageia.org/MGASA-2015-0330.html
12.
Security Updates in Red Hat Enterprise
Linux (RHSA-2015:1693-1)
[28/08/2015] Red Hat
has released security update packages for fixing the vulnerabilities identified
in the firefox packages for Red Hat Enterprise Linux 5, 6 and 7. Due to multiple
errors, an attacker could bypass security restrictions, gain elevated
privileges, execute arbitrary code and compromise the
system.
URL:rhn.redhat.com/errata/RHSA-2015-1693.html
13.
Security Updates in Ubuntu GNU/Linux
(USN-2723-1, USN-2724-1, USN-2725-1)
[28/08/2015] Ubuntu has
released security update packages for fixing the vulnerabilities identified in
the firefox, qemu, qemu-kvm and cups-filters packages for versions 12.04 LTS,
14.04 LTS and 15.04 of Ubuntu GNU/Linux. Due to multiple errors, an attacker
could bypass security restrictions, obtain sensitive information, gain elevated
privileges, execute arbitrary code, cause a denial of service condition and
compromise the
system.
URL:www.ubuntu.com/usn/usn-2723-1/
URL:www.ubuntu.com/usn/usn-2724-1/
URL:www.ubuntu.com/usn/usn-2725-1/
14.
Vulnerabilities in Apache Products
(105879, 105884)
[27/08/2015] Vulnerabilities were identified in the Apache Struts and
Apache CXF Fediz. An attacker could bypass security restrictions, obtain
sensitive information, gain elevated privileges, execute arbitrary code, cause a
denial of service condition and crash the system. These vulnerabilities affect
multiple versions of the mentioned products. Security patches are available to
resolve these
vulnerabilities.
URL:exchange.xforce.ibmcloud.com/vulnerabilities/105879
URL:exchange.xforce.ibmcloud.com/vulnerabilities/105884
15.
Vulnerability in Cisco ACE 4700 Series
Application Control Engine Appliances
[27/08/2015] Vulnerability was identified in the Cisco ACE 4700 Series
Application Control Engine Appliances. An attacker could bypass security
restrictions, gain elevated privileges and execute arbitrary code. This
vulnerability affects firmware version A5 Base, 3.0 of the mentioned
product.
URL:tools.cisco.com/security/center/viewAlert.x?alertId=40666
URL:exchange.xforce.ibmcloud.com/vulnerabilities/105886
16.
Vulnerabilities in F5 Products (SOL17170,
SOL17171)
[27/08/2015]
Vulnerabilities were identified in the F5 BIG-IP
LTM, BIG-IP AAM, BIG-IP AFM, BIG-IP Analytics, BIG-IP APM, BIG-IP ASM, BIG-IP
Edge Gateway, BIG-IP GTM, BIG-IP Link Controller, BIG-IP PEM, BIG-IP PSM, BIG-IP
WebAccelerator, BIG-IP WOM, Enterprise Manager, BIG-IQ Cloud, BIG-IQ Device,
BIG-IQ Security and BIG-IQ ADC. An attacker could bypass security restrictions,
obtain sensitive information, gain elevated privileges, execute arbitrary code,
cause a denial of service condition and crash the system. These vulnerabilities
affect multiple versions of the mentioned products. Security patches are
available to resolve these
vulnerabilities.
URL:support.f5.com/kb/en-us/solutions/public/17000/100/sol17170.html
URL:support.f5.com/kb/en-us/solutions/public/17000/100/sol17171.html
17.
Vulnerability in Konica Minolta FTP
(105869)
[27/08/2015]
Vulnerability was identified in the Konica
Minolta FTP. An attacker could bypass security restrictions, cause a denial of
service condition and crash the system. This vulnerability affects version 1.0
of the mentioned
product.
URL:exchange.xforce.ibmcloud.com/vulnerabilities/105869
18.
Vulnerability in Endress+Hauser HART
Device DTM (ICSA-15-237-01)
[27/08/2015] Vulnerability was identified in the Endress+Hauser HART
Device DTM. An attacker could bypass security restrictions. This vulnerability
affects multiple versions of the mentioned products. Security patches are
available to resolve this
vulnerability.
URL:ics-cert.us-cert.gov/advisories/ICSA-15-237-01
19.
Vulnerability in OpenStack Nova
(105880)
[27/08/2015]
Vulnerability was identified in the OpenStack
Nova. An attacker could bypass security restrictions, cause a denial of service
condition and crash the system. This vulnerability affects versions 2014.2.3 or
2015.1.1 of the mentioned product. Security patches are available to resolve
this
vulnerability.
URL:exchange.xforce.ibmcloud.com/vulnerabilities/105880
20.
Security Updates in Debian
(DSA-3343-1)
[27/08/2015] Debian has
released security update packages for fixing the vulnerability identified in the
twig package for multiple versions of Debian GNU/Linux. An attacker could bypass
security restrictions and execute arbitrary
code.
URL:www.debian.org/security/2015/dsa-3343
21.
Security Updates in FreeBSD
(FreeBSD-SA-15:21.amd64, FreeBSD-SA-15:22.openssh)
[27/08/2015] FreeBSD has released security update packages for fixing the
vulnerabilities identified in the sys_amd64 and openssh packages for multiple
versions of FreeBSD Linux. Due to multiple errors, an attacker could bypass
security restrictions, obtain sensitive information, gain elevated privileges,
execute arbitrary code, cause a denial of service condition and compromise the
system.
URL:www.freebsd.org/security/advisories/FreeBSD-SA-15:21.amd64.asc
URL:www.freebsd.org/security/advisories/FreeBSD-SA-15:22.openssh.asc
22.
Security Updates in Mageia
(MGASA-2015-0325)
[27/08/2015] Mageia has
released security update packages for fixing the vulnerability identified in the
cgit packages for multiple versions of Mageia. An attacker could bypass security
restrictions, execute arbitrary code, cause a denial of service condition and
crash the
system.
URL:advisories.mageia.org/MGASA-2015-0325.html
23.
Security Updates in Ubuntu GNU/Linux
(USN-2722-1)
[27/08/2015] Ubuntu has
released security update packages for fixing the vulnerability identified in the
gdk-pixbuf packages for versions 12.04 LTS, 14.04 LTS and 15.04 of Ubuntu
GNU/Linux. An attacker could bypass security restrictions, execute arbitrary
code, cause a denial of service condition and crash the
system.
URL:www.ubuntu.com/usn/usn-2722-1/
24. Vulnerability in Cisco TelePresence Video
Communication Server Expressway
[26/08/2015] Vulnerability was identified in the Cisco TelePresence Video
Communication Server Expressway. An attacker could bypass security restrictions
and obtain sensitive information. This vulnerability affects firmware version
X8.5.2 of the mentioned
product.
URL:tools.cisco.com/security/center/viewAlert.x?alertId=40620
25.
Vulnerabilities in HP KeyView
(c04771027)
[26/08/2015] Vulnerabilities were identified in the HP KeyView. An
attacker could bypass security restrictions, obtain sensitive information, gain
elevated privileges, execute arbitrary code, cause a denial of service condition
and compromise the system. These vulnerabilities affect versions prior to
v10.23.0.1 or v10.24.0.1 of the mentioned product. Security patches are
available to resolve these
vulnerabilities.
URL:h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c04771027
URL:exchange.xforce.ibmcloud.com/vulnerabilities/105854
URL:exchange.xforce.ibmcloud.com/vulnerabilities/105855
URL:exchange.xforce.ibmcloud.com/vulnerabilities/105856
URL:exchange.xforce.ibmcloud.com/vulnerabilities/105857
URL:exchange.xforce.ibmcloud.com/vulnerabilities/105858
URL:exchange.xforce.ibmcloud.com/vulnerabilities/105859
URL:exchange.xforce.ibmcloud.com/vulnerabilities/105860
URL:exchange.xforce.ibmcloud.com/vulnerabilities/105861
URL:exchange.xforce.ibmcloud.com/vulnerabilities/105862
26.
Vulnerabilities in F5 Products (SOL17172,
SOL17174, SOL17175)
[26/08/2015] Vulnerabilities were identified in the F5 BIG-IP LTM, BIG-IP
AAM, BIG-IP AFM, BIG-IP Analytics, BIG-IP APM, BIG-IP ASM, BIG-IP Edge Gateway,
BIG-IP GTM, BIG-IP Link Controller, BIG-IP PEM, BIG-IP PSM, BIG-IP
WebAccelerator, BIG-IP WOM, Enterprise Manager, BIG-IQ Cloud, BIG-IQ Device,
BIG-IQ Security and BIG-IQ ADC. An attacker could bypass security restrictions,
obtain sensitive information, gain elevated privileges, execute arbitrary code,
cause a denial of service condition and crash the system. These vulnerabilities
affect multiple versions of the mentioned products. Security patches are
available to resolve these
vulnerabilities.
URL:support.f5.com/kb/en-us/solutions/public/17000/100/sol17172.html
URL:support.f5.com/kb/en-us/solutions/public/17000/100/sol17174.html
URL:support.f5.com/kb/en-us/solutions/public/17000/100/sol17175.html
27.
Vulnerabilities in Novell NetIQ Access
Manager (5219870)
[26/08/2015] Vulnerabilities were identified in the Novell NetIQ Access
Manager. An attacker could bypass security restrictions, obtain sensitive
information, gain elevated privileges, execute arbitrary code, cause a denial of
service condition and crash the system. These vulnerabilities affects versions
4.0 and 4.0.2 of the mentioned product. Security patches are available to
resolve these
vulnerabilities.
URL:download.novell.com/Download?buildid=hEFHOxg6tAo~
28.
Vulnerability in DSL routers
(VU#950576)
[26/08/2015] Vulnerability was identified in the DSL routers by ASUS,
DIGICOM, Observa Telecom, Philippine Long Distance Telephone (PLDT), and ZTE. An
attacker could bypass security restrictions, obtain sensitive information, gain
elevated privileges, execute arbitrary code and compromise the system. This
vulnerability affects multiple firmware versions of the mentioned
products.
URL:www.kb.cert.org/vuls/id/950576
29.
Vulnerability in
OpenSSH
[26/08/2015]
Vulnerability was identified in the OpenSSH. An
attacker could bypass security restrictions and gain elevated privileges. This
vulnerability affects versions prior to 7.1 of the mentioned product. Security
patches are available to resolve this
vulnerability.
URL:www.openssh.com/txt/release-7.1
URL:www.hkcert.org/my_url/en/alert/15082601
30.
Security Updates in Oracle Linux
(ELSA-2015-1682)
[26/08/2015] Oracle has
released security update packages for fixing the vulnerabilities identified in
the thunderbird packages for Oracle Linux 5, 6 and 7. Due to multiple errors, an
attacker could bypass security restrictions, gain elevated privileges and
execute arbitrary
code.
URL:linux.oracle.com/errata/ELSA-2015-1682.html
31.
Security Updates in Mageia
(MGASA-2015-0322, MGASA-2015-0323, MGASA-2015-0324)
[26/08/2015] Mageia has released security update packages for fixing the
vulnerabilities identified in the gnutls, wireshark and vlc packages for
multiple versions of Mageia. Due to multiple errors, an attacker could bypass
security restrictions, obtain sensitive information, gain elevated privileges,
execute arbitrary code, cause a denial of service condition and crash the
system.
URL:advisories.mageia.org/MGASA-2015-0322.html
URL:advisories.mageia.org/MGASA-2015-0323.html
URL:advisories.mageia.org/MGASA-2015-0324.html
32.
Security Updates in Red Hat Enterprise
Linux (RHSA-2015:1682-1, RHSA-2015:1683-1, RHSA-2015:1684-1, RHSA-2015:1685-1,
RHSA-2015:1686-1)
[26/08/2015] Red Hat
has released security update packages for fixing the vulnerabilities identified
in the thunderbird, qemu-kvm-rhev, openstack-swift, python-keystoneclient and
python-django packages for Red Hat Enterprise Linux OpenStack Platform 5, Red
Hat Enterprise Linux 5, 6 and 7. Due to multiple errors, an attacker could
bypass security restrictions, obtain sensitive information, gain elevated
privileges, execute arbitrary code, cause a denial of service condition and
compromise the
system.
URL:rhn.redhat.com/errata/RHSA-2015-1682.html
URL:rhn.redhat.com/errata/RHSA-2015-1683.html
URL:rhn.redhat.com/errata/RHSA-2015-1684.html
URL:rhn.redhat.com/errata/RHSA-2015-1685.html
URL:rhn.redhat.com/errata/RHSA-2015-1686.html
33.
Security Updates in Ubuntu GNU/Linux
(USN-2712-1)
[26/08/2015] Ubuntu has
released security update packages for fixing the vulnerabilities identified in
the thunderbird packages for versions 12.04 LTS, 14.04 LTS and 15.04 of Ubuntu
GNU/Linux. Due to multiple errors, an attacker could bypass security
restrictions, gain elevated privileges and execute arbitrary
code.
URL:www.ubuntu.com/usn/usn-2712-1/
34. Information Updates on Microsoft Security Bulletin
(3086251)
[25/08/2015]
Microsoft has updated information on the
Security Bulletin for Microsoft .NET Framework. MS15-092 was revised to inform
customers that on August 18, 2015, a metadata change was implemented on Windows
Update for the updates documented in this
bulletin.
URL:technet.microsoft.com/en-us/library/security/MS15-092
35.
Vulnerabilities in Trend Micro
OfficeScan
[25/08/2015]
Vulnerabilities were identified in the Trend
Micro OfficeScan 10. An attacker could bypass security restrictions, obtain
sensitive information, cause a denial of service condition and crash the system.
These vulnerabilities affect versions prior to 10.6 Service Pack 3 of the
mentioned product. Security patches are available to resolve these
vulnerabilities.
URL:downloadcenter.trendmicro.com/index.php?regs=NABU&clk=tbl&clkval=4153&cm_mmc=RSS-_-Download%20Center-_-product-_-5#fragment-4204
URL:docs.trendmicro.com/all/ent/officescan/v10.6/en-us/osce_10.6_sp3_cp_files.pdf
36.
Vulnerability in Cisco Prime
Infrastructure
[25/08/2015] Vulnerability was identified in the Cisco Prime
Infrastructure. An attacker could bypass security restrictions, obtain sensitive
information, gain elevated privileges, execute arbitrary code, cause a denial of
service condition and crash the system. This vulnerability affects multiple
firmware versions of the mentioned product. Security patches are available to
resolve this
vulnerability.
URL:tools.cisco.com/security/center/viewAlert.x?alertId=40652
URL:exchange.xforce.ibmcloud.com/vulnerabilities/105853
37.
Vulnerability in IBM WebSphere
Application Server (1962107)
[25/08/2015] Vulnerability was identified in the IBM WebSphere Application
Server. An attacker could bypass security restrictions and obtain sensitive
information. This vulnerability affects multiple versions of the mentioned
product. Security patches are available to resolve this
vulnerability.
URL:www-01.ibm.com/support/docview.wss?uid=swg21962107
38.
Vulnerabilities in F5 Products (SOL17132,
SOL17136)
[25/08/2015]
Vulnerabilities were identified in the F5 BIG-IP
LTM, #BIG-IP AAM, BIG-IP APM, BIG-IP ASM, BIG-IP Edge Gateway, BIG-IP GTM,
BIG-IP Link Controller, BIG-IP PSM, BIG-IP WebAccelerator, BIG-IP WOM and
Traffix SDC. An attacker could bypass security restrictions, obtain sensitive
information, gain elevated privileges, execute arbitrary code, cause a denial of
service condition and crash the system. These vulnerabilities affect multiple
versions of the mentioned products. Security patches are available to resolve
these
vulnerabilities.
URL:support.f5.com/kb/en-us/solutions/public/17000/100/sol17132.html
URL:support.f5.com/kb/en-us/solutions/public/17000/100/sol17136.html
39.
Vulnerability in Splunk Enterprise
(105841)
[25/08/2015]
Vulnerability was identified in the Splunk
Enterprise. An attacker could bypass security restrictions, execute arbitrary
code and perform cross-site scripting attacks. This vulnerability affects
multiple versions of the mentioned product. Security patches are available to
resolve this
vulnerability.
URL:exchange.xforce.ibmcloud.com/vulnerabilities/105841
40.
Security Updates in Oracle Linux
(ELSA-2015-1664, ELSA-2015-1665, ELSA-2015-1667,
ELSA-2015-1668)
[25/08/2015] Oracle has
released security update packages for fixing the vulnerabilities identified in
the nss, mariadb and httpd packages for Oracle Linux 5, 6 and 7. Due to multiple
errors, an attacker could bypass security restrictions, obtain sensitive
information, gain elevated privileges, execute arbitrary code, cause a denial of
service condition and compromise the
system.
URL:linux.oracle.com/errata/ELSA-2015-1664.html
URL:linux.oracle.com/errata/ELSA-2015-1665.html
URL:linux.oracle.com/errata/ELSA-2015-1667.html
URL:linux.oracle.com/errata/ELSA-2015-1668.html
41.
Information Updates on Microsoft Security
Bulletins (3073094, 3078662)
[24/08/2015] Microsoft
has updated information on the Security Bulletins for Microsoft Windows,
Microsoft .NET Framework, Microsoft Office, Microsoft Lync, and Microsoft
Silverlight. (a) MS15-067 was revised to improve the Update FAQ section and the
footnote for the Affected Software table to help customers more easily identify
the correct update to apply based on the currently installed version of RDP on
Windows 7 systems. (b) MS15-080 was revised to inform customers running Windows
Vista, Server 2008 and Windows 7 that the 3078601 update on the Microsoft
Download Center was updated on August 18, 2015. Microsoft recommends that
customers who installed the 3078601 update via the Microsoft Download Center
prior to August 18 reinstall the update to be fully protected. If customers
installed update via Windows Update, Windows Update Catalog, or WSUS, no action
is
required.
URL:technet.microsoft.com/en-us/library/security/MS15-067
URL:technet.microsoft.com/en-us/library/security/MS15-080
42.
Vulnerability in Cisco Wireless LAN
Controller
[24/08/2015]
Vulnerability was identified in the Cisco
Wireless LAN Controller. An attacker could bypass security restrictions, obtain
sensitive information, cause a denial of service condition and crash the system.
This vulnerability affects firmware version 8.1 .104.37 of the mentioned
product.
URL:tools.cisco.com/security/center/viewAlert.x?alertId=40586
43.
Security Updates in Debian (DSA-3338-1,
DSA-3339-1, DSA-3340-1, DSA-3342-1)
[24/08/2015] Debian has
released security update packages for fixing the vulnerabilities identified in
the python-django, openjdk-6, zendframework and vlc packages for multiple
versions of Debian GNU/Linux. Due to multiple errors, an attacker could bypass
security restrictions, obtain sensitive information, gain elevated privileges,
execute arbitrary code, cause a denial of service condition and compromise the
system.
URL:www.debian.org/security/2015/dsa-3338
URL:www.debian.org/security/2015/dsa-3339
URL:www.debian.org/security/2015/dsa-3340
URL:www.debian.org/security/2015/dsa-3342
44.
Security Updates in Mageia
(MGASA-2015-0316, MGASA-2015-0317, MGASA-2015-0318, MGASA-2015-0319,
MGASA-2015-0320, MGASA-2015-0321)
[24/08/2015] Mageia has
released security update packages for fixing the vulnerabilities identified in
the x11-server, libcryptopp, php, php-apc, mediawiki and openssh packages for
multiple versions of Mageia. Due to multiple errors, an attacker could bypass
security restrictions, obtain sensitive information, gain elevated privileges,
execute arbitrary code, cause a denial of service condition and compromise the
system.
URL:advisories.mageia.org/MGASA-2015-0316.html
URL:advisories.mageia.org/MGASA-2015-0317.html
URL:advisories.mageia.org/MGASA-2015-0318.html
URL:advisories.mageia.org/MGASA-2015-0319.html
URL:advisories.mageia.org/MGASA-2015-0320.html
URL:advisories.mageia.org/MGASA-2015-0321.html
45.
Security Updates in Slackware
(SSA:2015-233-01)
[24/08/2015] Slackware
has released security update packages for fixing the vulnerability identified in
the gnutls package for multiple versions of Slackware Linux. An attacker could
bypass security restrictions, cause a denial of service condition and crash the
system.
URL:www.slackware.com/security/viewer.php?l=slackware-security&y=2015&m=slackware-security.395455
46.
Security Updates in SUSE
(SUSE-SU-2015:1421-1, SUSE-SU-2015:1424-1,
SUSE-SU-2015:1426-1)
[24/08/2015] SUSE has
released security update packages for fixing the vulnerabilities identified in
the xen, glibc and kvm package of SUSE Linux Enterprise 11. Due to multiple
errors, an attacker could bypass security restrictions, obtain sensitive
information, gain elevated privileges, execute arbitrary code, cause a denial of
service condition and crash the
system.
URL:lists.opensuse.org/opensuse-security-announce/2015-08/msg00018.html
URL:lists.opensuse.org/opensuse-security-announce/2015-08/msg00019.html
URL:lists.opensuse.org/opensuse-security-announce/2015-08/msg00020.html
Source(s)
of above information:
No comments:
Post a Comment