Red Hat Security Advisory 2018-1525-01 - The RHV-M Virtual Appliance automates the process of installing and configuring the Red Hat Virtualization Manager. The appliance is available to download as an OVA file from the Customer Portal. The following packages have been upgraded to a later upstream version: rhvm-appliance. Issues addressed include bypass and code execution vulnerabilities.
0a05e52d54d6e6975a672c08b36e4f98
Ubuntu Security Notice 3647-1 - It was discovered that poppler incorrectly handled certain PDF files. An attacker could possibly use this to cause a denial of service. It was discovered that poppler incorrectly handled certain PDF files. An attacker could possibly use this to cause a denial of service. This issue only affected Ubuntu 14.04 LTS.
a1e8619a316492ba33d741cd9ed770a7
Totemomail Encryption Gateway version 6.0.0_Build_371 suffers from a cross site request forgery vulnerability.
dddff35a0ad31ee3150a91121b2f0ea5
Red Hat Security Advisory 2018-1427-01 - Docker is an open-source engine that automates the deployment of any application as a lightweight, portable, self-sufficient container that runs virtually anywhere. The docker-latest package provides a version of Docker that iterates outside of the release cadence of Red Hat's container platforms. The docker-latest package will no longer be updated through the Extras channel. Instead, Red Hat customers are advised to use the docker package, which continues to be updated and fully supported.
8267e00e1204424722990140037c9ed2
Red Hat Security Advisory 2018-1523-01 - The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Includes GlusterFS fixes for CVE-2018-1088, dhcp fixes for CVE-2018-1111, kernel fixes for CVE-2018-1087, and kernel fixes for CVE-2018-8897. Issues addressed include code execution and denial of service vulnerabilities.
7a5512991eb1a7076173fd951d1ada6f
WhatsApp version 2.18.31 on iOS suffers from a remote memory corruption vulnerability.
e1523bcfb6fbea3ce35f934bb2914515
Metronet Tag Manager version 1.2.7 suffers from a cross site request forgery vulnerability.
3f8de79cbe73030d422e1b964e4675f0
Red Hat Security Advisory 2018-1415-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 52.8.0 ESR. Issues addressed include buffer overflow, bypass, and use-after-free vulnerabilities.
a0941f737fbe0c2b91741a8ecdee350d
Microsoft Windows suffers from a token process trust SID access check bypass elevation of privilege vulnerability.
ace4fe2f42f537091fcddcf5ec0fcb58
Red Hat Security Advisory 2018-1455-01 - The Dynamic Host Configuration Protocol is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network. Issues addressed include a code execution vulnerability.
3ca7bc9b22e5327808f1e59ac4b103dd
Red Hat Security Advisory 2018-1448-01 - Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 6.4.20 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.19, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include code execution and traversal vulnerabilities.
4ca97990ced77ecf6f01f01cd81358c9
Red Hat Security Advisory 2018-1374-01 - The kernel-alt packages provide the Linux kernel version 4.x. Issues addressed include denial of service and remote file inclusion vulnerabilities.
2af19f541100be346b9ed63fdc5ce4d3
Red Hat Security Advisory 2018-1446-01 - Chromium is an open-source web browser, powered by WebKit. This update upgrades Chromium to version 66.0.3359.170. Issues addressed include a buffer overflow vulnerability.
b3eefa67a3d87adff22b8155bf900713
Totemomail Encryption Gateway version 6.0.0_Build_371 suffers from a JSONP hijacking vulnerability.
6e6f06190a4a84cb2f21b0f6884348b4
Red Hat Security Advisory 2018-1452-01 - The ovirt-ansible-roles package contains Ansible roles which automate common Red Hat Virtualization administration tasks. Issues addressed include a password revelation vulnerability.
b8019bae90ed938bc5cb709f5bc5c3ba
Red Hat Security Advisory 2018-1372-01 - HAProxy is a TCP/HTTP reverse proxy which is particularly suited for high availability environments. Issues addressed include buffer overflow and denial of service vulnerabilities.
73567ccdb0af5ca9e37e65140bbb02e5
Red Hat Security Advisory 2018-1459-01 - The Dynamic Host Configuration Protocol is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network. Issues addressed include a code execution vulnerability.
ddc1b5df1f4da9a60134ffad646d7e6c
Red Hat Security Advisory 2018-1458-01 - The Dynamic Host Configuration Protocol is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network. Issues addressed include a code execution vulnerability.
7fc10696c6a62255020c6c9d5e1b0ac9
Red Hat Security Advisory 2018-1457-01 - The Dynamic Host Configuration Protocol is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network. Issues addressed include a code execution vulnerability.
9dae688aa93855c17d8ef7859a581624
Red Hat Security Advisory 2018-1454-01 - The Dynamic Host Configuration Protocol is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network. Issues addressed include a code execution vulnerability.
224ccb34059458ee3f0826d362d9813b
Red Hat Security Advisory 2018-1463-01 - IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update upgrades IBM Java SE 8 to version 8 SR5-FP10. Issues addressed include insecure handling, randomization, and use-after-free vulnerabilities.
d564ca176d83bac59993b789f3f5d1dd
Red Hat Security Advisory 2018-1456-01 - The Dynamic Host Configuration Protocol is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network. Issues addressed include a code execution vulnerability.
0be4f67ecea476de21d517a83626a8bf
Red Hat Security Advisory 2018-1449-01 - Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 6.4.20 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.19, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include code execution and traversal vulnerabilities.
d5bb8747d4963a9701bc9fea6846f0d9
Red Hat Security Advisory 2018-1461-01 - The Dynamic Host Configuration Protocol is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network. Issues addressed include a command injection vulnerability.
2969289544e81cb39ebc61cf26e1d5ed
Red Hat Security Advisory 2018-1380-01 - 389 Directory Server is an LDAP version 3 compliant server. The base packages include the Lightweight Directory Access Protocol server and command-line utilities for server administration. Issues addressed include an ns-slapd crash vulnerability.
2e17f9e06dc7fc0a626d23d73c8aafa4