Ubuntu Security Notice 2860-1 - A race condition was discovered in the MutationObserver implementation in Blink. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to cause a denial of service via renderer crash, or execute arbitrary code with the privileges of the sandboxed render process. An issue was discovered with the page serializer in Blink. If a user were tricked in to opening a specially crafted website, an attacker could potentially exploit this to inject arbitrary script or HTML. Various other issues were also addressed.
90d02e34904669776ec78df314db01a39141e3276465cd38e2e12e48a812ff8b
Amanda version 3.3.1 suffers from a local root privilege escalation vulnerability via the setuid runtar binary.
2ab1cf9f4f7d96fe3a9f2cf09a358645b047b9ef18ef2daf06d8e51bc6c2b48c
This program demonstrates how to escalate privileges using an overlayfs mount within a user namespace.
245a67dc153f223afb9bd229d16d9f5c37310e1f46c7558980b40f8cb6ac3420
360-FAAR Firewall Analysis Audit and Repair is an offline command line perl policy manipulation tool to filter, compare to logs, merge, translate and output firewall commands for new policies, in checkpoint dbedit or screenos commands.
6151c2c48e2b8a4509affaaa4d7c5094fec3015411d33d7563a3e966281478af
FireHOL a simple yet powerful way to configure stateful iptables firewalls. It can be used for almost any purpose, including control of any number of internal/external/virtual interfaces, control of any combination of routed traffic, setting up DMZ routers and servers, and all kinds of NAT. It provides strong protection (flooding, spoofing, etc.), transparent caches, source MAC verification, blacklists, whitelists, and more. Its goal is to be completely abstracted and powerful but also easy to use, audit, and understand.
7df99bb42d6d85c1cd83a98f79a7489089e6bfd467f2f565bddd7ea568916e1d
Netgear router version 1.0.0.24 with JNR1010 firmware suffers from improper session management and bypass vulnerabilities.
e490b8e5eaf82cdabe3b918f772a70f63831a13c6260c4a3f649b5a052eb2bbf
Netgear router version 1.0.0.24 with JNR1010 firmware suffers from a cross site request forgery vulnerability.
da6530ed94ec74ddcb325b48d68b02ef2fe16d9c6ec393e137a00d4987f9e68a
Red Hat Security Advisory 2016-0018-01 - OpenStack Compute launches and schedules large networks of virtual machines, creating a redundant and scalable cloud computing platform. Compute provides the software, control panels, and APIs required to orchestrate a cloud, including running virtual machine instances and controlling access through users and projects. A flaw was discovered in the OpenStack Compute snapshot feature when using the libvirt driver. A compute user could overwrite an attached instance disk with a malicious header specifying a backing file, and then request a snapshot, causing a file from the compute host to be leaked. This flaw only affects LVM or Ceph setups, or setups using filesystem storage with "use_cow_images = False".
7d023ec761f5ca1a82c049d7b8aadf9ef29fbf04e95d26ac6b29cdeef7a4af53
Debian Linux Security Advisory 3439-1 - Two vulnerabilities were discovered in Prosody, a lightweight Jabber/XMPP server.
d6be66be95728c7d1f358ee60de7d1f87b3b739c818e293a39dfd5c67ef74c05
Debian Linux Security Advisory 3437-1 - Karthikeyan Bhargavan and Gaetan Leurent at INRIA discovered a flaw in the TLS 1.2 protocol which could allow the MD5 hash function to be used for signing ServerKeyExchange and Client Authentication packets during a TLS handshake. A man-in-the-middle attacker could exploit this flaw to conduct collision attacks to impersonate a TLS server or an authenticated TLS client.
868dce8773c5d2e53cf3af16d82945ada88658e24fa28370ccaf5449ba858dfc
Debian Linux Security Advisory 3438-1 - It was discovered that unplugging one of the monitors in a multi-monitor setup can cause xscreensaver to crash. Someone with physical access to a machine could use this problem to bypass a locked session.
26a19b86cdc70da913e255ba706418064956fb2a4a26fac734130bb4c8255be8
Debian Linux Security Advisory 3436-1 - Karthikeyan Bhargavan and Gaetan Leurent at INRIA discovered a flaw in the TLS 1.2 protocol which could allow the MD5 hash function to be used for signing ServerKeyExchange and Client Authentication packets during a TLS handshake. A man-in-the-middle attacker could exploit this flaw to conduct collision attacks to impersonate a TLS server or an authenticated TLS client.
518d455c05a4232810a0a0d67aa2dd6c6277e044b181a622a3a6dc374f475a1d
Debian Linux Security Advisory 3441-1 - David Golden of MongoDB discovered that File::Spec::canonpath() in Perl returned untainted strings even if passed tainted input. This defect undermines taint propagation, which is sometimes used to ensure that unvalidated user input does not reach sensitive code.
d3e6cffbb9051b2799a54538299a2a6d85ad36aa7ace7d13a2943668eb0cdd57
Debian Linux Security Advisory 3440-1 - When sudo is configured to allow a user to edit files under a directory that they can already write to without using sudo, they can actually edit (read and write) arbitrary files. Daniel Svartman reported that a configuration like this might be introduced unintentionally if the editable files are specified using wildcards, for example.
b7fd5c1572210ca6ee5a1990251b1e0e570a22591356acc8311a24238db62710
Red Hat Security Advisory 2016-0017-01 - OpenStack Compute launches and schedules large networks of virtual machines, creating a redundant and scalable cloud computing platform. Compute provides the software, control panels, and APIs required to orchestrate a cloud, including running virtual machine instances and controlling access through users and projects. A flaw was discovered in the OpenStack Compute snapshot feature when using the libvirt driver. A compute user could overwrite an attached instance disk with a malicious header specifying a backing file, and then request a snapshot, causing a file from the compute host to be leaked. This flaw only affects LVM or Ceph setups, or setups using filesystem storage with "use_cow_images = False".
c87524e4121b8ea29c3323dbe2d0d5a0524693379899590770532444f937e6a9
GDCM versions 2.6.0 and 2.6.1 suffer from an out-of-bounds read due to missing checks. The vulnerability occurs during the decoding of JPEG-LS images when the dimensions of the embedded JPEG-LS image (as specified in the JPEG headers) are smaller than the ones of the selected region (set by gdcm::ImageRegionReader::SetRegion and usually based on DICOM header values).
9fe160664c3de2590fc55b8d5d31baa051f09a4bfdb6a7eea28c5c6a6e20f826
GDCM versions 2.6.0 and 2.6.1 suffer from an integer overflow vulnerability which leads to a buffer overflow and potentially to remote code execution.
15fb0069bbd76c1bfaa4bf715f85332c78f0b2abe13e67cdfcb884e3e0e18f9e
OpenBravo Hibernate suffers from a remote HQL injection vulnerability. Vendor has patched this in versions 3.0PR15Q3.4 and 3.0PR15Q4.1.
4ee3486c0e88207818615826532461db051d1cb19335ebe9e65723f346e26283
Dream Gallery version 1.0 suffers from a remote SQL injection vulnerability.
33ad05d0f2a68f5a2cd399ca877cb6628ebdcb4ad512b5d4857db14b9c45a5ee
Dolibarr version 3.8.3 suffers from a stored cross site scripting vulnerability.
c17ecf80d34e2c761ee7e596af78927c7c4accbc17e3e897ce53a789bd3b1784
WordPress JS External Link Info plugin version 1.21 suffers from an open redirection vulnerability.
4c091c9a01dc64ef1f3a7175b8ed1bee96a8e5b9527c30132cac8464113bb6da