Red Hat Security Advisory 2018-0287-01 - Red Hat JBoss Core Services is a set of supplementary software for Red Hat JBoss middleware products. This software, such as Apache HTTP Server, is common to multiple JBoss middleware products, and is packaged under Red Hat JBoss Core Services to allow for faster distribution of updates, and for a more consistent update experience. This release of Red Hat JBoss Core Services Apache HTTP Server 2.4.23 Service Pack 4 serves as a replacement of Red Hat JBoss Core Services Apache HTTP Server 2.4.23, and includes bug fixes.
da4425b71f26da2469debd67beca7ccb905206efc354003322faeff196e8d68a
Debian Linux Security Advisory 4107-1 - It was discovered that the webhook validation of Anymail, a Django email backends for multiple ESPs, is prone to a timing attack. A remote attacker can take advantage of this flaw to obtain a WEBHOOK_AUTHORIZATION secret and post arbitrary email tracking events.
72744935de785760401d98987bbeaabfb711ae71d0beb335b3b768cca5382140
HP Security Bulletin HPSBHF02981 2 - A potential security vulnerability has been identified in HPE Integrated Lights-Out 2, 3, 4 (iLO2, iLO3, iLO4) and HPE Superdome Flex RMC. The vulnerability could be exploited to allow an attacker to gain unauthorized privileges and unauthorized access to privileged information. **Note:** - This vulnerability also impacts the RMC of the "Superdome Flex" Server. Revision 2 of this advisory.
a2964cc8b96f7208d5ae7e0ddcf956c8d282b386abf5ac64183dbead5d56315e
VMware Security Advisory 2018-0007 - VMware Virtual Appliance updates address side-channel analysis due to speculative execution.
ec8f147c16b39decc064b40987ddaf4daf5a97ec067ad903f105fee9b1a0a0d9
Debian Linux Security Advisory 4106-1 - Two vulnerabilities were discovered in Libtasn1, a library to manage ASN.1 structures, allowing a remote attacker to cause a denial of service against an application using the Libtasn1 library.
8891131abb3ecb748839b63593d0fd657e763ef1bc5bbf7b0e21f83327caff75
Ubuntu Security Notice 3563-1 - It was discovered that Mailman incorrectly handled certain web scripts. An attacker could possibly use this to inject arbitrary code.
e37262374a510e78ca6ffc4ad02a497378e1f8ea46f377a5a9593c3e43d1581b
LibreOffice suffers from a remote arbitrary file disclosure vulnerability.
c4071bf03e810293c3cb6deea0723e0b0184f9809ba6cdb332084b00b4c39d02
HPE iLO4 versions prior to 2.54 add new administrator user exploit.
350446ace84a527655160a8fc8584b4707b9244e7bb4214a39fcb0b688a8239e
The macOS kernel suffers from a use-after-free issue due to a lack of locking in AppleEmbeddedOSSupportHostClient::registerNotificationPort.
eec797130f52da70dd819480af48fe7a16912703424066995f6aff06c66f0548
Sonatype Nexus Repository Manager OSS/Pro versions 2.14.5 and below and 3.7.1 and below suffer from multiple cross site scripting vulnerabilities.
3b80587bce0be93510d9991ad9cba5f6fb982d17a3ece5321a6148deded4146c
Marked2 suffers from a local file disclosure vulnerability.
3afe747dc610f85ce34fd6595093e3c0f7fd5d04e4fcb4ea03d5ae1c138962dd
Ubuntu Security Notice 3562-1 - It was discovered that MiniUPnP incorrectly handled memory. A remote attacker could use this issue to cause a denial of service or possibly execute arbitrary code with privileges of the user running an application that uses the MiniUPnP library.
98d9226801e5c7587d9b5810a6e8d0708dc53fcc0720617b17f6e80442e0f585
Ubuntu Security Notice 3561-1 - It was discovered that microprocessors utilizing speculative execution and branch prediction may allow unauthorized memory reads via sidechannel attacks. This flaw is known as Spectre. An attacker in the guest could use this to expose sensitive guest information, including kernel memory. This update allows libvirt to expose new CPU features added by microcode updates to guests. On amd64 and i386, new CPU models that match the updated microcode features were added with an -IBRS suffix. Certain environments will require guests to be switched manually to the new CPU models after microcode updates have been applied to the host. Various other issues were also addressed.
dcecc1c0c320933f560d27edcde2541b800157c29b7c91559c36818fa010ff71
This Microsoft bulletin summary holds information regarding Microsoft security updates for February, 2018.
61faea73c1b902f8b0a37675555f8d7ed455127e01ed15cc0f3b18f2393dbe26
Asterisk version 13.17.2 chan_skinny remote memory corruption exploit.
d2db182d69faada1486fac6510d54d5e42a8c8a40f7a76e7cc6eded032d6743a