Red Hat Security Advisory 2018-0287-01 - Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience. This release of Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 4 serves as a replacement of Red Hat JBoss Core Services Apache HTTP Server 2.4.23, and includes bug fixes.
f52fe37aac8b95ac68c1794794888eb0
Debian Linux Security Advisory 4107-1 - It was discovered that the webhook validation of Anymail, a Django email backends for multiple ESPs, is prone to a timing attack. A remote attacker can take advantage of this flaw to obtain a WEBHOOK_AUTHORIZATION secret and post arbitrary email tracking events.
19242d0186d2470142753e3b728d4c56
HP Security Bulletin HPSBHF02981 2 - A potential security vulnerability has been identified in HPE Integrated Lights-Out 2, 3, 4 (iLO2, iLO3, iLO4) and HPE Superdome Flex RMC. The vulnerability could be exploited to allow an attacker to gain unauthorized privileges and unauthorized access to privileged information. **Note:** - This vulnerability also impacts the RMC of the "Superdome Flex" Server. Revision 2 of this advisory.
eb5ef641e915728903a8f9b4a7c48571
VMware Security Advisory 2018-0007 - VMware Virtual Appliance updates address side-channel analysis due to speculative execution.
8ef7e64adb8f4d4ff7d94be1d0f4763d
Debian Linux Security Advisory 4106-1 - Two vulnerabilities were discovered in Libtasn1, a library to manage ASN.1 structures, allowing a remote attacker to cause a denial of service against an application using the Libtasn1 library.
59b81c16b6973dde15225d9c0c8a9a19
Ubuntu Security Notice 3563-1 - It was discovered that Mailman incorrectly handled certain web scripts. An attacker could possibly use this to inject arbitrary code.
94c8f3233523698b33de44032dd25b3f
LibreOffice suffers from a remote arbitrary file disclosure vulnerability.
56b6160adf079983cc0e6c94ee97b3a9
HPE iLO4 versions prior to 2.54 add new administrator user exploit.
dad171f6ad6ef46cbcae5e002666ac46
The macOS kernel suffers from a use-after-free issue due to a lack of locking in AppleEmbeddedOSSupportHostClient::registerNotificationPort.
ea0f5075fd72108cc6b63fbdbbf36665
Sonatype Nexus Repository Manager OSS/Pro versions 2.14.5 and below and 3.7.1 and below suffer from multiple cross site scripting vulnerabilities.
d8db6bf44d8c74387012dc1f924a979a
Marked2 suffers from a local file disclosure vulnerability.
b4f74b1272ff2ea1ecb3b528ef704c4d
Ubuntu Security Notice 3562-1 - It was discovered that MiniUPnP incorrectly handled memory. A remote attacker could use this issue to cause a denial of service or possibly execute arbitrary code with privileges of the user running an application that uses the MiniUPnP library.
1671dd117f57cd5b5416c1a43e0e38b9
Ubuntu Security Notice 3561-1 - It was discovered that microprocessors utilizing speculative execution and branch prediction may allow unauthorized memory reads via sidechannel attacks. This flaw is known as Spectre. An attacker in the guest could use this to expose sensitive guest information, including kernel memory. This update allows libvirt to expose new CPU features added by microcode updates to guests. On amd64 and i386, new CPU models that match the updated microcode features were added with an -IBRS suffix. Certain environments will require guests to be switched manually to the new CPU models after microcode updates have been applied to the host. Various other issues were also addressed.
723edcb7a6f5e9a9cddff2b48c964a2f
This Microsoft bulletin summary holds information regarding Microsoft security updates for February, 2018.
2d42deb6090578c3dbebf2ea7c6867dc
Asterisk version 13.17.2 chan_skinny remote memory corruption exploit.
3b1c78eff3f3c7398a3f857e84fd7446