Nmap Port Scanner 7.40

Nmap is a utility for port scanning large networks, although it works fine for single hosts. Sometimes you need speed, other times you may need stealth. In some cases, bypassing firewalls may be required. Not to mention the fact that you may want to scan different protocols (UDP, TCP, ICMP, etc.). Nmap supports Vanilla TCP connect() scanning, TCP SYN (half open) scanning, TCP FIN, Xmas, or NULL (stealth) scanning, TCP ftp proxy (bounce attack) scanning, SYN/FIN scanning using IP fragments (bypasses some packet filters), TCP ACK and Window scanning, UDP raw ICMP port unreachable scanning, ICMP scanning (ping-sweep), TCP Ping scanning, Direct (non portmapper) RPC scanning, Remote OS Identification by TCP/IP Fingerprinting, and Reverse-ident scanning. Nmap also supports a number of performance and reliability features such as dynamic delay time calculations, packet timeout and retransmission, parallel port scanning, detection of down hosts via parallel pings.

Link: https://packetstormsecurity.com/files/140234/nmap-7.40.tgz

Ubuntu Security Notice USN-3162-2

Ubuntu Security Notice 3162-2 – CAI Qian discovered that shared bind mounts in a mount namespace exponentially added entries without restriction to the Linux kernel’s mount table. A local attacker could use this to cause a denial of service. Andreas Gruenbacher and Jan Kara discovered that the filesystem implementation in the Linux kernel did not clear the setgid bit during a setxattr call. A local attacker could use this to possibly elevate group privileges. Various other issues were also addressed.

Link: https://packetstormsecurity.com/files/140225/USN-3162-2.txt

Ubuntu Security Notice USN-3161-1

Ubuntu Security Notice 3161-1 – Tilman Schmidt and Sasha Levin discovered a use-after-free condition in the TTY implementation in the Linux kernel. A local attacker could use this to expose sensitive information. It was discovered that the Video For Linux Two implementation in the Linux kernel did not properly handle multiple planes when processing a VIDIOC_DQBUF ioctl. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Various other issues were also addressed.

Link: https://packetstormsecurity.com/files/140220/USN-3161-1.txt

Ubuntu Security Notice USN-3161-2

Ubuntu Security Notice 3161-2 – USN-3161-1 fixed vulnerabilities in the Linux kernel for Ubuntu 16.04 LTS. This update provides the corresponding updates for the Linux Hardware Enablement kernel from Ubuntu 16.04 LTS for Ubuntu 14.04 LTS. Tilman Schmidt and Sasha Levin discovered a use-after-free condition in the TTY implementation in the Linux kernel. A local attacker could use this to expose sensitive information. Various other issues were also addressed.

Link: https://packetstormsecurity.com/files/140221/USN-3161-2.txt

Ubuntu Security Notice USN-3161-4

Ubuntu Security Notice 3161-4 – Tilman Schmidt and Sasha Levin discovered a use-after-free condition in the TTY implementation in the Linux kernel. A local attacker could use this to expose sensitive information. It was discovered that the Video For Linux Two implementation in the Linux kernel did not properly handle multiple planes when processing a VIDIOC_DQBUF ioctl. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Various other issues were also addressed.

Link: https://packetstormsecurity.com/files/140223/USN-3161-4.txt

Ubuntu Security Notice USN-3161-3

Ubuntu Security Notice 3161-3 – Tilman Schmidt and Sasha Levin discovered a use-after-free condition in the TTY implementation in the Linux kernel. A local attacker could use this to expose sensitive information. It was discovered that the Video For Linux Two implementation in the Linux kernel did not properly handle multiple planes when processing a VIDIOC_DQBUF ioctl. A local attacker could use this to cause a denial of service or possibly execute arbitrary code. Various other issues were also addressed.

Link: https://packetstormsecurity.com/files/140222/USN-3161-3.txt

Red Hat Security Advisory 2016-2962-01

Red Hat Security Advisory 2016-2962-01 – The kernel packages contain the Linux kernel, the core of any Linux operating system. Security Fix: A use-after-free vulnerability was found in the kernels socket recvmmsg subsystem. This may allows remote attackers to corrupt memory and may allow execution of arbitrary code. This corruption takes place during the error handling routines within __sys_recvmmsg() function.

Link: https://packetstormsecurity.com/files/140212/RHSA-2016-2962-01.txt

Red Hat Security Advisory 2016-2963-01

Red Hat Security Advisory 2016-2963-01 – Xen is a virtual machine monitor Security Fix: An out of bounds array access issue was found in the Xen virtual machine monitor, built with the QEMU ioport support. It could occur while doing ioport read/write operations, if guest was to supply a 32bit address parameter. A privileged guest user/process could use this flaw to potentially escalate their privileges on a host.

Link: https://packetstormsecurity.com/files/140214/RHSA-2016-2963-01.txt