Red Hat Security Advisory 2018-1525-01 - The RHV-M Virtual Appliance automates the process of installing and configuring the Red Hat Virtualization Manager. The appliance is available to download as an OVA file from the Customer Portal. The following packages have been upgraded to a later upstream version: rhvm-appliance. Issues addressed include bypass and code execution vulnerabilities.
e6a5fd51eb4bbc1336b92b87cd4b3f9f18abfe888ced6b32d3df237fff97585f
Ubuntu Security Notice 3647-1 - It was discovered that poppler incorrectly handled certain PDF files. An attacker could possibly use this to cause a denial of service. It was discovered that poppler incorrectly handled certain PDF files. An attacker could possibly use this to cause a denial of service. This issue only affected Ubuntu 14.04 LTS.
07653b9d309c53b9f2b536652061e04b0c6d30f5abe74c29d0c8690f46f2388b
Totemomail Encryption Gateway version 6.0.0_Build_371 suffers from a cross site request forgery vulnerability.
e8a2843d81adf1981b8ebee55ab7f42985b01fabd91b40f0f0ca5b28861631a8
Red Hat Security Advisory 2018-1427-01 - Docker is an open-source engine that automates the deployment of any application as a lightweight, portable, self-sufficient container that runs virtually anywhere. The docker-latest package provides a version of Docker that iterates outside of the release cadence of Red Hat's container platforms. The docker-latest package will no longer be updated through the Extras channel. Instead, Red Hat customers are advised to use the docker package, which continues to be updated and fully supported.
91a75ced5d8a00ea1e47b530ff7de66e78ef37de2c668406486d8ebcb2805073
Red Hat Security Advisory 2018-1523-01 - The redhat-virtualization-host packages provide the Red Hat Virtualization Host. These packages include redhat-release-virtualization-host, ovirt-node, and rhev-hypervisor. Red Hat Virtualization Hosts are installed using a special build of Red Hat Enterprise Linux with only the packages required to host virtual machines. RHVH features a Cockpit user interface for monitoring the host's resources and performing administrative tasks. Includes GlusterFS fixes for CVE-2018-1088, dhcp fixes for CVE-2018-1111, kernel fixes for CVE-2018-1087, and kernel fixes for CVE-2018-8897. Issues addressed include code execution and denial of service vulnerabilities.
86682245728d0509a02389329bcf0edddbdae534665e7f8d77e1c15e22b7d90b
WhatsApp version 2.18.31 on iOS suffers from a remote memory corruption vulnerability.
ff92e1c85fb8bd8ac7902fd96cddf503538f3176b7b042ad1dbbfe8fb8038ef6
Metronet Tag Manager version 1.2.7 suffers from a cross site request forgery vulnerability.
4ab4d2176f53eb69df95bbb67d0c117d46bdab059f7376224e9529ecaeee5ec1
Red Hat Security Advisory 2018-1415-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 52.8.0 ESR. Issues addressed include buffer overflow, bypass, and use-after-free vulnerabilities.
bdddee69a3e6595d6cd6272f020d4f0c50210a3d45119f997e881b8d78e54c1e
Microsoft Windows suffers from a token process trust SID access check bypass elevation of privilege vulnerability.
2033addbbe5ebd84569983aa729d944003476f409e9a96a8424ceefbfbc9b13f
Red Hat Security Advisory 2018-1455-01 - The Dynamic Host Configuration Protocol is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network. Issues addressed include a code execution vulnerability.
ea5da6c368a53ea528a86551dd00850622b0960cbdd716bb0a4da50d185f7322
Red Hat Security Advisory 2018-1448-01 - Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 6.4.20 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.19, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include code execution and traversal vulnerabilities.
3c0c1ca65d59c2c4e54c42628e2675bc4b0c3a29236da3e884ab31d478a28679
Red Hat Security Advisory 2018-1374-01 - The kernel-alt packages provide the Linux kernel version 4.x. Issues addressed include denial of service and remote file inclusion vulnerabilities.
2f31ed48f61739be5e9d210aca175fb0edb7325afed23ec43f9eba4309a8268f
Red Hat Security Advisory 2018-1446-01 - Chromium is an open-source web browser, powered by WebKit. This update upgrades Chromium to version 66.0.3359.170. Issues addressed include a buffer overflow vulnerability.
85a620ecc9b5ef6438fc32d62be0ef6f2b4e72eccd660b94090f5d448a0f5f6e
Totemomail Encryption Gateway version 6.0.0_Build_371 suffers from a JSONP hijacking vulnerability.
8756d7ad799faafde0a4ae9c09997e1ffb18efb7f8b6ff2a9e362f6eeb8f8e7c
Red Hat Security Advisory 2018-1452-01 - The ovirt-ansible-roles package contains Ansible roles which automate common Red Hat Virtualization administration tasks. Issues addressed include a password revelation vulnerability.
bd6435fedb0c9a3b75a4d729dc4b9e2c4f4afde445db4e086bdfcb222fe3bb27
Red Hat Security Advisory 2018-1372-01 - HAProxy is a TCP/HTTP reverse proxy which is particularly suited for high availability environments. Issues addressed include buffer overflow and denial of service vulnerabilities.
a7ea57fd89fe7ea759b82986ac47f8287be6466f5cdb53ea7792f9115e5969b9
Red Hat Security Advisory 2018-1459-01 - The Dynamic Host Configuration Protocol is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network. Issues addressed include a code execution vulnerability.
4eb2dfa529027133e704a8e15c7598c85fd6b814250d30fe3c5fe1984771ecc7
Red Hat Security Advisory 2018-1458-01 - The Dynamic Host Configuration Protocol is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network. Issues addressed include a code execution vulnerability.
c5f6d4f6785af8d3910b54cba124bbfa45c91125a0ff5fb5ede44e92074a63c8
Red Hat Security Advisory 2018-1457-01 - The Dynamic Host Configuration Protocol is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network. Issues addressed include a code execution vulnerability.
19662e7dea0bf7ff8e35c63a3394ede4a258a0251ed2b23ab901fb86c13c9939
Red Hat Security Advisory 2018-1454-01 - The Dynamic Host Configuration Protocol is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network. Issues addressed include a code execution vulnerability.
b66022b71fe8964ff172081c729e0547a9a3f122736e18cbbf8fa5f297cf4eea
Red Hat Security Advisory 2018-1463-01 - IBM Java SE version 8 includes the IBM Java Runtime Environment and the IBM Java Software Development Kit. This update upgrades IBM Java SE 8 to version 8 SR5-FP10. Issues addressed include insecure handling, randomization, and use-after-free vulnerabilities.
80ce6d0081fec02cd94f1f4ffeaf0d179a18234d8f8ba21736afebe5737f2d94
Red Hat Security Advisory 2018-1456-01 - The Dynamic Host Configuration Protocol is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network. Issues addressed include a code execution vulnerability.
b15f57f5e88c0ba7ec3769b2d9c8b40b11700bd7ceae81f1073536f8f070432e
Red Hat Security Advisory 2018-1449-01 - Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This release of Red Hat JBoss Enterprise Application Platform 6.4.20 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.19, and includes bug fixes and enhancements, which are documented in the Release Notes document linked to in the References. Issues addressed include code execution and traversal vulnerabilities.
f070e28e8e82699624cb25ee0c2660f74d5f3385a6584e52ebfcc2f6d8983c73
Red Hat Security Advisory 2018-1461-01 - The Dynamic Host Configuration Protocol is a protocol that allows individual devices on an IP network to get their own network configuration information, including an IP address, a subnet mask, and a broadcast address. The dhcp packages provide a relay agent and ISC DHCP service required to enable and administer DHCP on a network. Issues addressed include a command injection vulnerability.
8138aca032aa14886676280e6887d7c8613fdbc6fb92311082bda0eb934ad903
Red Hat Security Advisory 2018-1380-01 - 389 Directory Server is an LDAP version 3 compliant server. The base packages include the Lightweight Directory Access Protocol server and command-line utilities for server administration. Issues addressed include an ns-slapd crash vulnerability.
fd5350d21c26cbcb9b75175b3a8f42d354c711ab8c27bfbed1a1c68a5dfd4d6f