Red Hat Security Advisory 2021-3945-01 - Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log. Issues addressed include denial of service and integer overflow vulnerabilities.
20ae0bf3545d8187a20cb7a24338d4538a6dc6710cb876a68a93083afbbd7826
Red Hat Security Advisory 2021-3946-01 - Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log. Issues addressed include denial of service and integer overflow vulnerabilities.
afbd7444f6627719d0d8f8c6ac290169b2c7b9a298352d274428813288170dd8
Red Hat Security Advisory 2021-3891-01 - The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
5034c4034b469ee8fe5cbaa885fc00ea2b87032713f98db87e72f399b0451525
Red Hat Security Advisory 2021-3944-01 - Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log. Issues addressed include denial of service and integer overflow vulnerabilities.
5b185efbc108ea576d390a81c76cc160d817301a7823ded7a47c83c8245cd884
Red Hat Security Advisory 2021-3947-01 - Redis is an advanced key-value store. It is often referred to as a data-structure server since keys can contain strings, hashes, lists, sets, and sorted sets. For performance, Redis works with an in-memory data set. You can persist it either by dumping the data set to disk every once in a while, or by appending each command to a log. Issues addressed include denial of service and integer overflow vulnerabilities.
f2600e5891bd6d2edafd0470db4d64b2eb89b71186738ec87191865e0ed18be3
Red Hat Security Advisory 2021-3887-01 - The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
38b1c84071d797efe965778a2df58b7f714eb238e66d1a21ffc85dabb7e3e7a2
Red Hat Security Advisory 2021-3893-01 - The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
52e66f4b0accf47590d618d97daae0d51c53b2868e4aa139194b1f923633a737
Red Hat Security Advisory 2021-3885-01 - The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
759bd70655706dc4ee0f3181d1f9c61295cd06eee6e03beac17ff1f837817d77
Red Hat Security Advisory 2021-3884-01 - The java-1.8.0-openjdk packages provide the OpenJDK 8 Java Runtime Environment and the OpenJDK 8 Java Software Development Kit.
5dc7ec274ef6b888e1aa25f46ec555d5e4547d655f01d4ccdafda238c87049c5
Red Hat Security Advisory 2021-3886-01 - The java-11-openjdk packages provide the OpenJDK 11 Java Runtime Environment and the OpenJDK 11 Java Software Development Kit.
67bf81cf11e1f1e7130c84e3b538168c0746fbe9e19a8bf57a4a6fd66fcbe33e
Red Hat Security Advisory 2021-3880-01 - This release of Red Hat build of Quarkus 2.2.3 includes security updates, bug fixes, and enhancements. For more information, see the release notes page listed in the References section. Issues addressed include an information leakage vulnerability.
b29513db3b841e348c1c412387fb1dbe89dde6df1c0b96058ae480c121a6b7c3
Red Hat Security Advisory 2021-3943-01 - The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Issues addressed include a bypass vulnerability.
23f081f7764e8ec092d0e1f6057a145873ecedb20bd40dbfd5ebf0f58339e22b
SonicWall SMA version 10.2.1.0-17sv suffers from a remote password reset vulnerability.
1d7256a24120e085899614766e31ffce8d24fab7f97df961712c94b274e8994d
Red Hat Security Advisory 2021-3942-01 - Open vSwitch provides standard network bridging functions and support for the OpenFlow protocol for remote per-flow control of traffic. Issues addressed include a use-after-free vulnerability.
64dd479bd53f32a887a2e45c01fd3b3c0196b3b79d57c74a592be8d10b31fbf3
Red Hat Security Advisory 2021-3925-01 - Red Hat Advanced Cluster Management for Kubernetes 2.3.3 images Red Hat Advanced Cluster Management for Kubernetes provides the capabilities to address common challenges that administrators and site reliability engineers face as they work across a range of public and private cloud environments. Clusters and applications are all visible and managed from a single console—with security policy built in. This advisory contains the container images for Red Hat Advanced Cluster Management for Kubernetes, which fix several bugs and provide security updates. Issues addressed include denial of service, information leakage, integer overflow, and out of bounds read vulnerabilities.
fd1035fefbb8b3d06fa3e4a659771a25d330eb9fd90f1ff55f4f16a1d0ab3d2c
Macro Expert version 4.7 suffers from an unquoted service path vulnerability.
c53ffdacaf887c5e3bbef8ab750fa2e27d1f78ad6d36aff867e3b82dc9cf39c8
Ubuntu Security Notice 5113-1 - It was discovered that a race condition existed in the Atheros Ath9k WiFi driver in the Linux kernel. An attacker could possibly use this to expose sensitive information. Alois Wohlschlager discovered that the overlay file system in the Linux kernel did not restrict private clones in some situations. An attacker could use this to expose sensitive information. It was discovered that the btrfs file system in the Linux kernel did not properly handle removing a non-existent device id. An attacker with CAP_SYS_ADMIN could use this to cause a denial of service. Various other issues were also addressed.
5b77b651661b26b5ddee110193bf60874290434159ecf99d6501028d96ace712
Red Hat Security Advisory 2021-3820-01 - Red Hat OpenShift Container Platform is Red Hat's cloud computing Kubernetes application platform solution designed for on-premise or private cloud deployments. This advisory contains the RPM packages for Red Hat OpenShift Container Platform 4.8.15.
3c094ed0e9f32acba6f7744e5676fcf4be41b43e3984564a1924c350aa56cb9a
Ubuntu Security Notice 5111-2 - USN-5111-1 fixed a vulnerability in strongSwan. This update provides the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM. It was discovered that strongSwan incorrectly handled replacing certificates in the cache. A remote attacker could use this issue to cause strongSwan to crash, resulting in a denial of service, or possibly execute arbitrary code. Various other issues were also addressed.
10e3c393e6b2b8c356a47c0b00aa000351147ce20e3e3107dc7cfdb02f631db9
Apple Security Advisory 2021-10-11-1 - iOS 15.0.2 and iPadOS 15.0.2 address a code execution vulnerability.
9cba504156a47f191cbd327339a1bcfe0c4fafa4f7d0f155dc41f5861146870e