Mcafee Foundstone Fsl Update

Mcafee Foundstone Fsl Update

2016-DEC-15 FSL version 7.5.876 MCAFEE FOUNDSTONE FSL UPDATE To better protect your environment McAfee has created this FSL check update for the Foundstone Product Suite. The following is a detailed summary of the new and updated checks included with this release. NEW CHECKS 132310 - Oracle VM OVMSA-2016-0175 Update Is Not Installed Category: SSH Module -> NonIntrusive -> Oracle VM Patches and Hotfixes Risk Level: High CVE: CVE-2016-8650, CVE-2016-9555 Description The scan detected that the host is missing the following update: OVMSA-2016-0175 Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://oss.oracle.com/pipermail/oraclevm-errata/2016-December/000602.html OVM3.3 x86_64 kernel-uek-firmware-3.8.13-118.15.1.el6uek kernel-uek-3.8.13-118.15.1.el6uek 132314 - Oracle VM OVMSA-2016-0174 Update Is Not Installed Category: SSH Module -> NonIntrusive -> Oracle VM Patches and Hotfixes Risk Level: High CVE: CVE-2016-8650, CVE-2016-9555 Description The scan detected that the host is missing the following update: OVMSA-2016-0174 Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://oss.oracle.com/pipermail/oraclevm-errata/2016-December/000601.html OVM3.4 x86_64 kernel-uek-4.1.12-61.1.22.el6uek kernel-uek-firmware-4.1.12-61.1.22.el6uek 141379 - Red Hat Enterprise Linux RHSA-2016-2928 Update Is Not Installed Category: SSH Module -> NonIntrusive -> Red Hat Enterprise Linux Patches and Hotfixes Risk Level: High CVE: CVE-2016-3492, CVE-2016-5616, CVE-2016-5624, CVE-2016-5626, CVE-2016-5629, CVE-2016-6662, CVE-2016-6663, CVE- 2016-8283 Description The scan detected that the host is missing the following update: RHSA-2016-2928 Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://rhn.redhat.com/errata/RHSA-2016-2928.html RHEL6S x86_64 rh-mariadb101-mariadb-oqgraph-engine-10.1.19-6.el6 rh-mariadb101-mariadb-config-10.1.19-6.el6 rh-mariadb101-mariadb-errmsg-10.1.19-6.el6 rh-mariadb101-mariadb-server-10.1.19-6.el6 rh-mariadb101-mariadb-server-galera-10.1.19-6.el6 rh-mariadb101-mariadb-10.1.19-6.el6 rh-mariadb101-mariadb-common-10.1.19-6.el6 rh-mariadb101-mariadb-bench-10.1.19-6.el6 rh-mariadb101-mariadb-debuginfo-10.1.19-6.el6 rh-mariadb101-mariadb-devel-10.1.19-6.el6 rh-mariadb101-mariadb-test-10.1.19-6.el6 RHEL6WS x86_64 rh-mariadb101-mariadb-oqgraph-engine-10.1.19-6.el6 rh-mariadb101-mariadb-config-10.1.19-6.el6 rh-mariadb101-mariadb-errmsg-10.1.19-6.el6 rh-mariadb101-mariadb-server-10.1.19-6.el6 rh-mariadb101-mariadb-server-galera-10.1.19-6.el6 rh-mariadb101-mariadb-10.1.19-6.el6 rh-mariadb101-mariadb-common-10.1.19-6.el6 rh-mariadb101-mariadb-bench-10.1.19-6.el6 rh-mariadb101-mariadb-debuginfo-10.1.19-6.el6 rh-mariadb101-mariadb-devel-10.1.19-6.el6 rh-mariadb101-mariadb-test-10.1.19-6.el6 RHEL7S x86_64 rh-mariadb101-mariadb-oqgraph-engine-10.1.19-6.el7 rh-mariadb101-mariadb-test-10.1.19-6.el7 rh-mariadb101-mariadb-devel-10.1.19-6.el7 rh-mariadb101-mariadb-server-galera-10.1.19-6.el7 rh-mariadb101-mariadb-common-10.1.19-6.el7 rh-mariadb101-mariadb-server-10.1.19-6.el7 rh-mariadb101-mariadb-10.1.19-6.el7 rh-mariadb101-mariadb-bench-10.1.19-6.el7 rh-mariadb101-mariadb-debuginfo-10.1.19-6.el7 rh-mariadb101-mariadb-config-10.1.19-6.el7 rh-mariadb101-mariadb-errmsg-10.1.19-6.el7 RHEL7WS x86_64 rh-mariadb101-mariadb-oqgraph-engine-10.1.19-6.el7 rh-mariadb101-mariadb-test-10.1.19-6.el7 rh-mariadb101-mariadb-devel-10.1.19-6.el7 rh-mariadb101-mariadb-server-galera-10.1.19-6.el7 rh-mariadb101-mariadb-common-10.1.19-6.el7 rh-mariadb101-mariadb-server-10.1.19-6.el7 rh-mariadb101-mariadb-10.1.19-6.el7 rh-mariadb101-mariadb-bench-10.1.19-6.el7 rh-mariadb101-mariadb-debuginfo-10.1.19-6.el7 rh-mariadb101-mariadb-config-10.1.19-6.el7 rh-mariadb101-mariadb-errmsg-10.1.19-6.el7 141380 - Red Hat Enterprise Linux RHSA-2016-2927 Update Is Not Installed Category: SSH Module -> NonIntrusive -> Red Hat Enterprise Linux Patches and Hotfixes Risk Level: High CVE: CVE-2016-3492, CVE-2016-5612, CVE-2016-5616, CVE-2016-5624, CVE-2016-5626, CVE-2016-5629, CVE-2016-5630, CVE- 2016-6662, CVE-2016-6663, CVE-2016-8283 Description The scan detected that the host is missing the following update: RHSA-2016-2927 Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: https://rhn.redhat.com/errata/RHSA-2016-2927.html RHEL6S x86_64 rh-mariadb100-mariadb-bench-10.0.28-5.el6 rh-mariadb100-mariadb-errmsg-10.0.28-5.el6 rh-mariadb100-mariadb-config-10.0.28-5.el6 rh-mariadb100-mariadb-oqgraph-engine-10.0.28-5.el6 rh-mariadb100-mariadb-devel-10.0.28-5.el6 rh-mariadb100-mariadb-10.0.28-5.el6 rh-mariadb100-mariadb-test-10.0.28-5.el6 rh-mariadb100-mariadb-debuginfo-10.0.28-5.el6 rh-mariadb100-mariadb-common-10.0.28-5.el6 rh-mariadb100-mariadb-server-10.0.28-5.el6 RHEL6WS x86_64 rh-mariadb100-mariadb-bench-10.0.28-5.el6 rh-mariadb100-mariadb-errmsg-10.0.28-5.el6 rh-mariadb100-mariadb-config-10.0.28-5.el6 rh-mariadb100-mariadb-oqgraph-engine-10.0.28-5.el6 rh-mariadb100-mariadb-devel-10.0.28-5.el6 rh-mariadb100-mariadb-10.0.28-5.el6 rh-mariadb100-mariadb-test-10.0.28-5.el6 rh-mariadb100-mariadb-debuginfo-10.0.28-5.el6 rh-mariadb100-mariadb-common-10.0.28-5.el6 rh-mariadb100-mariadb-server-10.0.28-5.el6 RHEL7S x86_64 rh-mariadb100-mariadb-config-10.0.28-5.el7 rh-mariadb100-mariadb-oqgraph-engine-10.0.28-5.el7 rh-mariadb100-mariadb-errmsg-10.0.28-5.el7 rh-mariadb100-mariadb-test-10.0.28-5.el7 rh-mariadb100-mariadb-server-10.0.28-5.el7 rh-mariadb100-mariadb-devel-10.0.28-5.el7 rh-mariadb100-mariadb-bench-10.0.28-5.el7 rh-mariadb100-mariadb-debuginfo-10.0.28-5.el7 rh-mariadb100-mariadb-common-10.0.28-5.el7 rh-mariadb100-mariadb-10.0.28-5.el7 RHEL7WS x86_64 rh-mariadb100-mariadb-config-10.0.28-5.el7 rh-mariadb100-mariadb-oqgraph-engine-10.0.28-5.el7 rh-mariadb100-mariadb-errmsg-10.0.28-5.el7 rh-mariadb100-mariadb-test-10.0.28-5.el7 rh-mariadb100-mariadb-server-10.0.28-5.el7 rh-mariadb100-mariadb-devel-10.0.28-5.el7 rh-mariadb100-mariadb-bench-10.0.28-5.el7 rh-mariadb100-mariadb-debuginfo-10.0.28-5.el7 rh-mariadb100-mariadb-common-10.0.28-5.el7 rh-mariadb100-mariadb-10.0.28-5.el7 145056 - SuSE Linux 13.2 openSUSE-SU-2016:3061-1 Update Is Not Installed Category: SSH Module -> NonIntrusive -> SuSE Patches and Hotfixes Risk Level: High CVE: CVE-2015-8962, CVE-2015-8963, CVE-2016-7042, CVE-2016-7910, CVE-2016-7911, CVE-2016-7913, CVE-2016-7914, CVE- 2016-7916, CVE-2016-8633, CVE-2016-8646, CVE-2016-8655, CVE-2016-9555 Description The scan detected that the host is missing the following update: openSUSE-SU-2016:3061-1 Observation Updates often remediate critical security problems that should be quickly addressed. For more information see: http://lists.opensuse.org/opensuse-updates/2016-12/msg00058.html SuSE Linux 13.2 i586 bbswitch-0.8-3.26.1 kernel-default-3.16.7-53.1 ipset-kmp-xen-6.23_k3.16.7_53-26.1 virtualbox-host-kmp-desktop-debuginfo-5.0.30_k3.16.7_53-62.1 pcfclock-debugsource-0.44-260.26.1 pcfclock-kmp-pae-debuginfo-0.44_k3.16.7_53-260.26.1 xtables-addons-kmp-default-debuginfo-2.6_k3.16.7_53-28.1 virtualbox-5.0.30-62.1 crash-kmp-default-7.0.8_k3.16.7_53-26.1 xtables-addons-kmp-xen-2.6_k3.16.7_53-28.1 crash-gcore-7.0.8-26.1 ipset-kmp-default-6.23_k3.16.7_53-26.1 python-virtualbox-5.0.30-62.1 cloop-kmp-pae-debuginfo-2.639_k3.16.7_53-14.26.1 virtualbox-guest-kmp-default-debuginfo-5.0.30_k3.16.7_53-62.1 xen-devel-4.4.4_05-55.1 libipset3-debuginfo-6.23-26.1 vhba-kmp-desktop-20140629_k3.16.7_53-2.26.1 crash-doc-7.0.8-26.1 kernel-default-devel-3.16.7-53.1 virtualbox-host-kmp-pae-debuginfo-5.0.30_k3.16.7_53-62.1 virtualbox-websrv-5.0.30-62.1 bbswitch-debugsource-0.8-3.26.1 virtualbox-guest-x11-5.0.30-62.1 cloop-kmp-xen-debuginfo-2.639_k3.16.7_53-14.26.1 kernel-default-debuginfo-3.16.7-53.1 crash-kmp-xen-7.0.8_k3.16.7_53-26.1 xtables-addons-kmp-default-2.6_k3.16.7_53-28.1 xtables-addons-kmp-pae-debuginfo-2.6_k3.16.7_53-28.1 vhba-kmp-debugsource-20140629-2.26.1 bbswitch-kmp-default-0.8_k3.16.7_53-3.26.1 hdjmod-debugsource-1.28-18.27.1 kernel-ec2-base-3.16.7-53.1 crash-kmp-xen-debuginfo-7.0.8_k3.16.7_53-26.1 hdjmod-kmp-pae-debuginfo-1.28_k3.16.7_53-18.27.1 cloop-kmp-desktop-debuginfo-2.639_k3.16.7_53-14.26.1 ipset-kmp-pae-6.23_k3.16.7_53-26.1 vhba-kmp-default-20140629_k3.16.7_53-2.26.1 cloop-2.639-14.26.1 kernel-obs-qa-3.16.7-53.1 hdjmod-kmp-default-1.28_k3.16.7_53-18.27.1 pcfclock-kmp-default-debuginfo-0.44_k3.16.7_53-260.26.1 bbswitch-kmp-pae-0.8_k3.16.7_53-3.26.1 bbswitch-kmp-xen-0.8_k3.16.7_53-3.26.1 ipset-debuginfo-6.23-26.1 vhba-kmp-xen-debuginfo-20140629_k3.16.7_53-2.26.1 ipset-kmp-desktop-6.23_k3.16.7_53-26.1 kernel-ec2-3.16.7-53.1 xen-libs-debuginfo-4.4.4_05-55.1 xen-tools-domU-debuginfo-4.4.4_05-55.1 virtualbox-host-kmp-default-debuginfo-5.0.30_k3.16.7_53-62.1 ipset-kmp-pae-debuginfo-6.23_k3.16.7_53-26.1 pcfclock-kmp-desktop-debuginfo-0.44_k3.16.7_53-260.26.1 virtualbox-host-kmp-pae-5.0.30_k3.16.7_53-62.1 crash-eppic-debuginfo-7.0.8-26.1 crash-kmp-default-debuginfo-7.0.8_k3.16.7_53-26.1 virtualbox-guest-kmp-pae-5.0.30_k3.16.7_53-62.1 xtables-addons-2.6-28.1 crash-7.0.8-26.1 xtables-addons-kmp-pae-2.6_k3.16.7_53-28.1 virtualbox-guest-tools-debuginfo-5.0.30-62.1 bbswitch-kmp-default-debuginfo-0.8_k3.16.7_53-3.26.1 kernel-syms-3.16.7-53.1 virtualbox-guest-kmp-desktop-5.0.30_k3.16.7_53-62.1 cloop-kmp-default-2.639_k3.16.7_53-14.26.1 cloop-kmp-xen-2.639_k3.16.7_53-14.26.1 xtables-addons-kmp-desktop-2.6_k3.16.7_53-28.1

View Full Text

Details

  • File Type
    pdf
  • Upload Time
    -
  • Content Languages
    English
  • Upload User
    Anonymous/Not logged-in
  • File Pages
    100 Page
  • File Size
    -

Download

Channel Download Status
Express Download Enable

Copyright

We respect the copyrights and intellectual property rights of all users. All uploaded documents are either original works of the uploader or authorized works of the rightful owners.

  • Not to be reproduced or distributed without explicit permission.
  • Not used for commercial purposes outside of approved use cases.
  • Not used to infringe on the rights of the original creators.
  • If you believe any content infringes your copyright, please contact us immediately.

Support

For help with questions, suggestions, or problems, please contact us