Red Hat Security Advisory 2015-1036-01 - After May 29, 2015, as per the life-cycle support policy for Red Hat Satellite, Red Hat will discontinue technical support services as well as software maintenance services for all Red Hat Satellite versions 5.5 or older.
d2e0c17affa830afe1a1ad1eff98ae0f3a89714fee0222c369f3e0e243d70634
IBM Cognos Business Intelligence Developer version 10.2.1 suffers from an open redirect vulnerability.
28924269aaba0ce326079ba87bd57cf6995c1fd3254a0b20b6537b162200cbc8
Red Hat Security Advisory 2015-1035-01 - In accordance with the Red Hat Enterprise Linux Errata Support Policy, Extended Update Support for Red Hat Enterprise Linux 6.5 will be retired as of November 30, 2015, and support will no longer be provided. Accordingly, Red Hat will no longer provide updated packages, including Critical impact security patches or urgent priority bug fixes, for Red Hat Enterprise Linux 6.5 EUS after November 30, 2015.
e694d8ca9b7e3ffb1d3dd16773c21b80781c27b7ec0d8faf9f2bbe5dfdb9323a
SEARCH-LAB performed an independent security assessment on four different D-Link devices. The assessment has identified altogether 53 unique vulnerabilities in the latest firmware (dated 30-07-2014). Several vulnerabilities can be abused by a remote attacker to execute arbitrary code and gain full control over the devices.
1171f7b6ef3b9988b436da7e93b267aab8de442398c22cf0acfa717cbfa2ab37
Red Hat Security Advisory 2015-1037-01 - After May 29, 2015, as per the life-cycle support policy for Red Hat Satellite Proxy, Red Hat will discontinue technical support services as well as software maintenance services for all Red Hat Satellite Proxy versions 5.5 or older.
480007fb40e35b1e59efab03ee4a89a6c5dcb7fb8c3b59d6a6ac8120cde77eef
IBM Lotus Domino versions 8.5.3 and 8.5.4 suffer from a cross site scripting vulnerability.
a9c7b5a6acd2dc98c24765c4697677db50a82e0896a6a5a0880f6bd65e268444
Ubuntu Security Notice 2617-3 - USN-2617-1 fixed a vulnerability in NTFS-3G. The original patch did not completely address the issue. This update fixes the problem. Tavis Ormandy discovered that FUSE incorrectly filtered environment variables. A local attacker could use this issue to gain administrative privileges. Various other issues were also addressed.
1255484ff9f93c5661a0fef4337e1736459756ca49856dd5213dffa7c723fe5d
Red Hat Security Advisory 2015-1030-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. A use-after-free flaw was found in the way the Linux kernel's SCTP implementation handled authentication key reference counting during INIT collisions. A remote attacker could use this flaw to crash the system or, potentially, escalate their privileges on the system. This issue was discovered by Sun Baoliang of Red Hat.
ad4a54463b2f47cddb60c7d6725acbbf59644ab3acb16965b20d1bc6fdb63e2e
Red Hat Security Advisory 2015-1031-01 - KVM is a full virtualization solution for Linux on AMD64 and Intel 64 systems. The qemu-kvm package provides the user-space component for running virtual machines using KVM. An out-of-bounds memory access flaw was found in the way QEMU's virtual Floppy Disk Controller handled FIFO buffer access while processing certain FDC commands. A privileged guest user could use this flaw to crash the guest or, potentially, execute arbitrary code on the host with the privileges of the host's QEMU process corresponding to the guest.
93eb47392028955345a8256ae44071c1080466c5f4ea43f0ba141a0112927614
Audacity version 2.0.5 suffers from a dll hijacking vulnerability.
cba8abb3947bab007e378419576fafc851657cf694c8e967cbb02fd2cccde97f
Android applications built with the Cordova framework that do not have explicit values set in Config.xml can have undefined configuration variables set by Intent. This can cause unwanted dialogs appearing in applications and changes in the application behavior that can include the app force-closing. Versions up to 4.0.1 are affected except for 3.7.2
42674a0f593ca3f17986d3f71f49b38a4cf04c3dfc25bc1d37095a172bea1203