Trend Micro recommends that you apply this critical patch on IMSVA 9.x.
Download IMSVA 9.0 Critical Patch Build 1605 here, and the corresponding Readme here.
Download IMSVA 9.1 Critical Patch Build 1625 here, and the corresponding Readme here.
Trend Micro recommends that you apply this critical patch on IMSVA 9.x.
Download IMSVA 9.0 Critical Patch Build 1605 here, and the corresponding Readme here.
Download IMSVA 9.1 Critical Patch Build 1625 here, and the corresponding Readme here.
Interscan Messaging Security Virtual Appliance9.1 , Interscan Messaging Security Virtual Appliance9.0
IMSVA 9.x Critical Patch to upgrade Linux kernel and remove the vulnerability CVE-2016-5195 is now available on Trend Micro’s Download Center.
This patch resolves the race condition issue that occurs when the Linux kernel's memory subsystem handles copy-on-write (COW) breakage of private read-only memory mappings. An attacker could use this to gain write access to read-only memory mappings. Anyone who has created an unprivileged root account can be vulnerable to this issue.
This critical patch upgrades the Linux kernel to remove the vulnerability.
Trend Micro recommends that you apply this critical patch on IMSVA 9.x.
Download IMSVA 9.0 Critical Patch Build 1605 here, and the corresponding Readme here.
Download IMSVA 9.1 Critical Patch Build 1625 here, and the corresponding Readme here.