DSA-4115 quagga – security update

Several vulnerabilities have been discovered in Quagga, a routingdaemon. The Common Vulnerabilities and Exposures project identifies thefollowing issues: More info: https://www.debian.org/security/2018/dsa-4115

Processor Speculative Execution Research Disclosure

Concerning: CVE-2017-5715, CVE-2017-5753, CVE-2017-5754 Update As Of: 2018/02/05 4:30 PM PST This is an update for this issue. An updated kernel for Amazon Linux is available within the Amazon Linux repositories. EC2 instances launched with the default Amazon Linux configuration on or after January 13th, 2018 will automatically include the updated package, which incorporates the latest stable open source Linux security improvements to address CVE-2017-5715 within the kernel and builds upon More info: https://aws.amazon.com/security/security-bulletins/AWS-2018-013/

VMSA-2018-0007.1 – VMware Virtual Appliance updates address side-channel analysis due to speculative execution

Greetings from the VMware Security Response Center! We thought we should post an explanation of today’s changes to VMSA-2018-0007 as we have removed CVE-2017-5715 from the advisory. The reason we have done this is to clarify which of these issues have been mitigated against currently known variants of the different vulnerabilities. Because CVE-2017-5753 (Meltdown) is […]The post VMSA-2018-0007.1 – VMware Virtual Appliance updates address side-channel analysis due to More info: https://blogs.vmware.com/security/2018/02/vmsa-2018-0007-1-vmware-virtual-appliance-updates-address-side-channel-analysis-due-speculative-execution.html

DSA-4113 libvorbis – security update

Two vulnerabilities were discovered in the libraries of the Vorbis audiocompression codec, which could result in denial of service or theexecution of arbitrary code if a malformed media file is processed. More info: https://www.debian.org/security/2018/dsa-4113

DSA-4114 jackson-databind – security update

It was discovered that jackson-databind, a Java library used to parseJSON and other data formats, did not properly validate user inputbefore attempting deserialization. This allowed an attacker to performcode execution by providing maliciously crafted input. More info: https://www.debian.org/security/2018/dsa-4114

VMSA-2018-0007.1 – VMware Virtual Appliance updates address side-channel analysis due to speculative execution

Greetings from the VMware Security Response Center! We thought we should post an explanation of today’s changes to VMSA-2018-0007 as we have removed CVE-2017-5715 from the advisory. The reason we have done this is to clarify which of these issues have been mitigated against currently known variants of the different vulnerabilities. Because CVE-2017-5753 (Meltdown) is […]The post VMSA-2018-0007.1 – VMware Virtual Appliance updates address side-channel analysis due to More info: https://blogs.vmware.com/security/2018/02/vmsa-2018-0007-1-vmware-virtual-appliance-updates-address-side-channel-analysis-due-speculative-execution.html

VMSA-2018-0007.1 – VMware Virtual Appliance updates address side-channel analysis due to speculative execution

Greetings from the VMware Security Response Center! We thought we should post an explanation of today’s changes to VMSA-2018-0007 as we have removed CVE-2017-5715 from the advisory. The reason we have done this is to clarify which of these issues have been mitigated against currently known variants of the different vulnerabilities. Because CVE-2017-5753 (Meltdown) is […]The post VMSA-2018-0007.1 – VMware Virtual Appliance updates address side-channel analysis due to More info: https://blogs.vmware.com/security/2018/02/vmsa-2018-0007-1-vmware-virtual-appliance-updates-address-side-channel-analysis-due-speculative-execution.html
Translate »