This Metasploit module exploits a heap-out-of-bounds write in the packet_set_ring function in net/packet/af_packet.c (AF_PACKET) in the Linux kernel to execute code as root (CVE-2017-7308). The bug was initially introduced in 2011 and patched in version 4.10.6, potentially affecting a large number of kernels; however this exploit targets only systems using Ubuntu Xenial kernels 4.8.0 < 4.8.0-46, including Linux distros based on Ubuntu Xenial, such as Linux Mint. The target system must have unprivileged user namespaces enabled and two or more CPU cores. Bypasses for SMEP, SMAP and KASLR are included. Failed exploitation may crash the kernel. This Metasploit module has been tested successfully on Linux Mint 18 (x86_64) with kernel versions: 4.8.0-34-generic; 4.8.0-36-generic; 4.8.0-39-generic; 4.8.0-41-generic; 4.8.0-42-generic; 4.8.0-44-generic; 4.8.0-45-generic.
7b4f48c24e371972810721c416bade431b286fec0e3a136c171f4ecb92af8692
Red Hat Security Advisory 2018-1609-01 - Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. Issues addressed include a privilege escalation vulnerability.
81f5ab6bbe3c288da5788fe603447f302cec9bd2a7e2d9c7e23024337456cad5
Slackware Security Advisory - New php packages are available for Slackware 14.0, 14.1, and 14.2 to fix security issues.
d1aa5a62111a07197a2aaccfb382dbb33114dcf775f441d2e865493d97ae346a
Intelbras NCLOUD 300 version 1.0 suffers from an authentication bypass vulnerability.
c0b2d400e49ff299100c1fc673ba05c78e1e22446fb3832ba3efe604e0003060
Red Hat Security Advisory 2018-1607-01 - Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This asynchronous patch is a security update for JBoss invoker in Red Hat JBoss Enterprise Application Platform 5.2.0. Issues addressed include a code execution vulnerability.
0b9cc24c539472cc37d25940db03c9b6a46a9a8e7eee652e38751c575832d809
Red Hat Security Advisory 2018-1593-01 - Red Hat OpenStack Platform director provides the facilities for deploying and monitoring a private or public infrastructure-as-a-service cloud based on Red Hat OpenStack Platform. Issues addressed include a denial of service vulnerability.
152b29ed1fc7877b224d7421750f311465cf5de3926f88af2eb5b25c7f3447e0
Slackware Security Advisory - New curl packages are available for Slackware 14.0, 14.1, 14.2, and -current to fix security issues.
995df06ea509e3ba0623ef636ade9ddadf80140e6d9d607242983d794e83bac1
Nanopool Claymore Dual Miner version 7.3 suffers from a remote code execution vulnerability.
53609dc34126d348a5caadd8991b65475a0d5a9df21934fb6121d47c9df2b23f
Powerlogic/Schneider Electric IONXXXX Series suffers from a cross site request forgery vulnerability.
cbfadb4f6124af0d04a94c69b20b073ca62f7db4a2dc725a2377d3bf720c262f
Red Hat Security Advisory 2018-1608-01 - Red Hat JBoss Enterprise Application Platform is a platform for Java applications based on the JBoss Application Server. This asynchronous patch is a security update for JBoss invoker in Red Hat JBoss Enterprise Application Platform 5.2.0. Issues addressed include a code execution vulnerability.
36eb1033325725ffeeae126499491998e537e07309b7bad0357e9748cfa7387e
Red Hat Security Advisory 2018-1593-01 - Red Hat OpenStack Platform director provides the facilities for deploying and monitoring a private or public infrastructure-as-a-service cloud based on Red Hat OpenStack Platform. Issues addressed include a denial of service vulnerability.
152b29ed1fc7877b224d7421750f311465cf5de3926f88af2eb5b25c7f3447e0
SuperCom Online Shopping Ecommerce Cart 1 suffers from remote SQL injection, cross site request forgery, and cross site scripting vulnerabilities.
fa826216901fe5358126b5e3b35d5aaaf8215eae09454a01da916568498f33ea
NodAPS version 4.0 suffers from cross site request forgery and remote SQL injection vulnerabilities.
5e77b51a868cbd53c3a7643bc0b4f70c3c7bf616e963ca796d9a818ad5853e41
Red Hat Security Advisory 2018-1605-01 - Red Hat OpenStack Platform Operational Tools provides the facilities for monitoring a private or public Red Hat OpenStack Platform cloud. collectd is a small C-language daemon, which reads various system metrics periodically and updates RRD files. Because the daemon does not start up each time it updates files, it has a low system footprint. Security fix: collectd: double free in csnmp_read_table function in snmp.c.
6b52920846053a63aee72c41ceb0f57b8c3b419aaf4a351a62eab41155b4bf82
Red Hat Security Advisory 2018-1606-01 - Sensu is a monitoring framework that aims to be simple, malleable, and scalable. Security fix: Sensu's redaction function fails to handle the redaction of sensitive data in deeply nested data structures, resulting in sensitive data, such as passwords, being logged in clear-text. For more details about the security issue, including the impact, a CVSS score, and other related information, refer to the CVE page listed in the References section. Issues addressed include a failed redaction issue.
45e99473cc6898aca3f57360cc0eb1aacd5d41ec12447f5148adf26ed2382d7e
Debian Linux Security Advisory 4202-1 - OSS-fuzz, assisted by Max Dymond, discovered that cURL, an URL transfer library, could be tricked into reading data beyond the end of a heap based buffer when parsing invalid headers in an RTSP response.
90a8bd88a40752bf5d9068f391d79df7a3cd320bafb58ab2092469b30f208678