GHOST Exploit Summary A nasty new remote exploit has been discovered by Qualys. Without going in to too much detail, the exploit lies in the gethostbyname function in glibc. This function is used to convert DNS addresses in to IP addresses. More details from Qaulys. What versions are affected? All versions of glibc ... Read More...
CentOS 6 Linux kernel 2.6.32-504.3.3 has recently been released. Update type(s): security, bug fix Resolved CVEs: CVE-2012-6657 CVE-2014-3673 CVE-2014-3687 CVE-2014-3688 CVE-2014-5471 CVE-2014-5472 CVE-2014-6410 CVE-2014-9322 * A flaw was found in the way the Linux kernel handled GS segment register base switching when recovering from a #SS (stack segment) fault on an erroneous return to user space. A local, unprivileged user could use this flaw to escalate ... Read More...
CentOS 6 Linux kernel 2.6.32-504.1.3 has recently been released. Update type(s): security, bug fix Resolved CVEs: CVE-2014-3185 CVE-2014-3611 CVE-2014-3645 CVE-2014-3646 * A race condition flaw was found in the way the Linux kernel's KVM subsystem handled PIT (Programmable Interval Timer) emulation. A guest user who has access to the PIT I/O ports could use this flaw to crash the host. (CVE-2014-3611, Important) * ... Read More...
CentOS 6.6 has been released - read the CentOS 6.6 Release Notes here. To update CentOS, run the following command: Review the list of packages to be updated, and then accept when you are ready to upgrade to CentOS 6.6 To download the CentOS 6.6 ISOs - see our Downloads page. ... Read More...
Update #3 - Unsurprisingly with all the attention that BASH is now receiving, additional vulnerabilities (CVE-2014-7186 and CVE-2014-7187) have been discovered. They are currently unresolved. For a more detailed write-up, see: http://www.itnews.com.au/News/396256,further-flaws-render-shellshock-patch-ineffective.aspx - when there are updates available to resolve these issues, I will update this post. Update #2 - A new BASH ... Read More...
CentOS 6 Linux kernel 2.6.32-431.29.2 has recently been released. Update type(s): security Resolved CVEs: CVE-2014-0205 CVE-2014-3535 CVE-2014-3917 CVE-2014-4667 * A flaw was found in the way the Linux kernel's futex subsystem handled reference counting when requeuing futexes during futex_wait(). A local, unprivileged user could use this flaw to zero out the reference counter of an inode or an mm struct that backs ... Read More...