Ubuntu Security Notice 6595-1 - It was discovered that PyCryptodome had a timing side-channel when performing OAEP decryption. A remote attacker could possibly use this issue to recover sensitive information.
3f5c78c8092109cbfeb1116d12c1695798c9026f376b74ff9a59d4fa18fc6334
Ubuntu Security Notice 6594-1 - Joshua Rogers discovered that Squid incorrectly handled HTTP message processing. A remote attacker could possibly use this issue to cause Squid to crash, resulting in a denial of service. Joshua Rogers discovered that Squid incorrectly handled Helper process management. A remote attacker could possibly use this issue to cause Squid to crash, resulting in a denial of service. Joshua Rogers discovered that Squid incorrectly handled HTTP request parsing. A remote attacker could possibly use this issue to cause Squid to crash, resulting in a denial of service.
db3db3f46c79cee5c6cf7b45a6f9a763efc55e8e7951b7556929117aafe4bdb0
Ubuntu Security Notice 6593-1 - It was discovered that GnuTLS had a timing side-channel when processing malformed ciphertexts in RSA-PSK ClientKeyExchange. A remote attacker could possibly use this issue to recover sensitive information. It was discovered that GnuTLS incorrectly handled certain certificate chains with a cross-signing loop. A remote attacker could possibly use this issue to cause GnuTLS to crash, resulting in a denial of service. This issue only affected Ubuntu 22.04 LTS, Ubuntu 23.04, and Ubuntu 23.10.
3bbd8b60bf24fb02c31deebbe0c2660004b5df5eb22635d170194dc1cefc57f3
Ubuntu Security Notice 6592-1 - It was discovered that libssh incorrectly handled the ProxyCommand and the ProxyJump features. A remote attacker could possibly use this issue to inject malicious code into the command of the features mentioned through the hostname parameter. It was discovered that libssh incorrectly handled return codes when performing message digest operations. A remote attacker could possibly use this issue to cause libssh to crash, obtain sensitive information, or execute arbitrary code.
87689bd0419a935f4880956beeb13338a224d6d3b84d52dd985591784099a17a
Logwatch analyzes and reports on unix system logs. It is a customizable and pluggable log monitoring system which will go through the logs for a given period of time and make a customizable report. It should work right out of the package on most systems.
329df0991b879764ed7e50a869de5b6bfa70d241eb254397a5659d1ff5f2588f
This Metasploit module exploits an authenticated remote code execution vulnerability in PRTG.
1130b2f5f9eb48ad5246e73d73d346d50a535c4018c53c13d27918aa7363a593
Solar FTP Server version 2.1.2 remote denial of service exploit.
27b91ab2e4f09d9b674e756056e82ec061c61c556e1b55c85fbceebd644f5ecc
Red Hat Security Advisory 2024-0332-03 - Updated images are now available for Red Hat Advanced Cluster Security 4.1.6. The updated images includes security fixes.
eef3746d158b0dd708cb3edce2a87a76936d3c6f12e04a16774863162b366f10
Red Hat Security Advisory 2024-0325-03 - Updated RHEL-7-based Middleware container images are now available. Issues addressed include code execution and deserialization vulnerabilities.
374fd229c38f9c332a6d8f44145b0e1fb3441edd72e6da5ab7cafe5151549a27
Red Hat Security Advisory 2024-0322-03 - An update is now available for Red Hat Ansible Automation Platform 2.4. Issues addressed include a local file inclusion vulnerability.
ec54d91ee61f5c72cb68e7109ab0359e6a72658c9986d06dab1a8ef8e367fea8
Red Hat Security Advisory 2024-0320-03 - An update for xorg-x11-server is now available for Red Hat Enterprise Linux 7. Issues addressed include a buffer overflow vulnerability.
ea0d633deac53fab5218ded7a2a0b64dbba7b1f698321e0e370fc673650e570a
Red Hat Security Advisory 2024-0319-03 - An update for gnutls is now available for Red Hat Enterprise Linux 8.6 Extended Update Support.
4461d7dbc5c09043d817b84f4b089dfeb7c82b869cf9bf4e8aa5fb2ed3281b28