GnuPG (the GNU Privacy Guard or GPG) is GNU's tool for secure communication and data storage. It can be used to encrypt data and to create digital signatures. It includes an advanced key management facility and is compliant with the proposed OpenPGP Internet standard as described in RFC2440. As such, it is meant to be compatible with PGP from NAI, Inc. Because it does not use any patented algorithms, it can be used without any restrictions.
e64d8c5fa2d05938a5080cb784a98ac21be0812f2a26f844b18f0d6a0e711984
Gentoo Linux Security Advisory 201804-11 - Multiple vulnerabilities have been found in Adobe Flash Player, the worst of which allows remote attackers to execute arbitrary code. Versions less than 29.0.0.140 are affected.
c73c6b00b29cbacb0ed84f7be891fe38db64286b7d1db45f1c448f34a5c06a7c
Red Hat Security Advisory 2018-1113-01 - KVM is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products. Issues addressed include denial of service and use-after-free vulnerabilities.
6de7eec096e080140d980512652315e56e46c0a3f5d23f9dd2d2305d3e03fdc3
Red Hat Security Advisory 2018-1112-01 - Sensu is a monitoring framework that aims to be simple, malleable, and scalable. Issues addressed include information disclosure.
5374ea2480df2c3d37336f459b60d7cb57cc30a446d2e0b1aeb1aedfc1e20bcd
I2P is an anonymizing network, offering a simple layer that identity-sensitive applications can use to securely communicate. All data is wrapped with several layers of encryption, and the network is both distributed and dynamic, with no trusted parties. This is the source code release version.
30a2cd843e379c2e0d1b3f917ef4e98ea967f3759b81fcb7e0fe47f509aed813
Faraday is a tool that introduces a new concept called IPE, or Integrated Penetration-Test Environment. It is a multiuser penetration test IDE designed for distribution, indexation and analysis of the generated data during the process of a security audit. The main purpose of Faraday is to re-use the available tools in the community to take advantage of them in a multiuser way.
0a53cd7a10c37cd193eb2cd9eb4eda504d0af06208f19dbb9830f19c916905b3
aircrack-ng is a set of tools for auditing wireless networks. It's an enhanced/reborn version of aircrack. It consists of airodump (an 802.11 packet capture program), aireplay (an 802.11 packet injection program), aircrack (static WEP and WPA-PSK cracking), airdecap (decrypts WEP/WPA capture files), and some tools to handle capture files (merge, convert, etc.).
fe7fb1b045da8a14075766c68f4481fe1168f26f66d281e114965cf6b360574b
Whowatch is an interactive utility that displays information about the users currently on the machine in real time. Besides standard information (login name, tty, host, user's process) you can see the connection type (ie. telnet or ssh). You can also watch the process tree, navigate it, and send INT and KILL signals. Ncurses ascii graphics.
9bdf0338850fd66036cb4db1f7a61b35f502158c315981f7176d8f834a0b5a02
Debian Linux Security Advisory 4169-1 - Cedric Buissart from Red Hat discovered an information disclosure bug in pcs, a pacemaker command line interface and GUI. The REST interface normally doesn't allow passing --debug parameter to prevent information leak, but the check wasn't sufficient.
2ac2115f09656721f7b983dfebd144f6c125f2261ae196e9df7dc112990061ce
Red Hat Security Advisory 2018-1104-01 - KVM is a full virtualization solution for Linux on a variety of architectures. The qemu-kvm-rhev packages provide the user-space component for running virtual machines that use KVM in environments managed by Red Hat products. The following packages have been upgraded to a later upstream version: qemu-kvm-rhev. Issues addressed include buffer overflow, denial of service, randomization, and use-after-free vulnerabilities.
2cb26bd50990ca14d9d5a77af055d6edafcdcafbffd3b470bbe2f59d39ce1103
Ubuntu Security Notice 3624-1 - It was discovered that Patch incorrectly handled certain files. An attacker could possibly use this to cause a denial of service. It was discovered that Patch incorrectly handled certain input validation. An attacker could possibly use this to execute arbitrary code. It was discovered that Patch incorrectly handled certain inputs. An attacker could possibly use this to cause a denial of service. Various other issues were also addressed.
23b2238de3fedf6260e2c497292dab06b0b883adf12ef84c4fed3da08b2b10f5
WOOT '12 Call For Papers - This will be held August 13th through the 14th, 2018, in Baltimore, MD, USA. WOOT '12 is co-located with the USENIX Security Symposium.
7a74006c1ab85937496c5b696ca8e43fbd7c6c7739c1dd21560137a7160b4b4d
Red Hat Security Advisory 2018-1098-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 52.7.3 ESR. Issues addressed include code execution and use-after-free vulnerabilities.
b734e113694fc839a8007cfc0eb3bda2cdba41edca92fb66ed047aead22797f6
This Microsoft bulletin summary lists security updates released for April 10, 2018.
7172dba4f0d1f17eb5e84c7d03387de3173b9bb3587393451e643b62c23106ba
This Microsoft bulletin summary holds advisories released or updated on April 10, 2018.
73eeb68b387176f146ce0ddd8765622d8ff84ca7a7732fb454b73009eb970afd
This Microsoft bulletin summary holds CVE revision updates for CVE-2016-0143.
275ee577f1d0a464e5c49db101fce6ee73b0c8d4fac12c74317bd1e6edd92d26
Red Hat Security Advisory 2018-1099-01 - Mozilla Firefox is an open-source web browser, designed for standards compliance, performance, and portability. This update upgrades Firefox to version 52.7.3 ESR. Issues addressed include code execution and use-after-free vulnerabilities.
b015b695bc90bdb41a991b71330441ca91abadee0b3a495261128bb330f0d691
WordPress WP Image Zoom plugin version 1.23 suffers from a denial of service vulnerability.
c8f25d0b435ab4c7dcc42419ac30a803214cba1b96eb5f1582fbf7cae9794cb1
WordPress Rating-Widget: Star Review System plugin version 2.8.9 suffers from an information disclosure vulnerability.
6996d44e889c5267184b5c120e1c55d97a2ff86f9bc246ed1fa782b6c6a78622
Relevanssi versions 3.5.12 and 3.6.0 suffer from a remote SQL injection vulnerability.
b1003f50fb7511916e783ef77d17d917a5477abadf7f4f6ad76c0ea8a44c6c0c
Red Hat Security Advisory 2018-1072-01 - The kubernetes packages provide utilities for container cluster management. Kubernetes and its dependencies will no longer be updated through the Extras channel. Instead, the Red Hat customers are advised to use Red Hat's supported Kubernetes-based products such as Red Hat OpenShift Container Platform. Components impacted by this change include the following deprecated Kubernetes RPM packages, images, and associated documentation: RPM Packages: Issues addressed include Kubernetes support being moved.
4f29021a1a8ada75a166450ba7d7d2e0d84133409b072e417473440dccd2699a
Red Hat Security Advisory 2018-1075-01 - Ansible and its dependencies will no longer be updated through the Extras channel. Instead, the Red Hat Ansible Engine product has been made available to Red Hat Enterprise Linux subscriptions and will provide access to the official Ansible Engine channel. Customers who have previously installed Ansible and its dependencies from the Extras channel are advised to enable and update from the Ansible Engine channel, or uninstall the packages as future errata will not be provided from the Extras channel. Ansible was previously provided in Extras as a runtime dependency of, and limited in support to, the Red Hat Enterprise Linux System Roles. Ansible Engine is available today for AMD64 and Intel 64 architectures, with IBM POWER, little endian availability coming soon. Issues addressed include Ansible deprecation.
7e5ed54babaf695638335327a8ce81b46bd75e8833a465dbd37a9c9fb5e3280c
Red Hat Security Advisory 2018-1062-01 - The kernel packages contain the Linux kernel, the core of any Linux operating system. Issues addressed include buffer overflow, bypass, denial of service, randomization, and use-after-free vulnerabilities.
fbeade70a9a2b1fd9926eaf605a9a3afcda14c9b6e58abd7aae2926d31ecbaa9
Chrome V8 JIT has a bug in LoadElimination::ReduceTransitionElementsKind.
52130a23075fc5e0b4b4579f903a76984d5f42031dd384419293b72dcd72fee7
Red Hat Security Advisory 2018-1058-01 - The libvorbis package contains runtime libraries for use in programs that support Ogg Vorbis, a fully open, non-proprietary, patent- and royalty-free, general-purpose compressed format for audio and music at fixed and variable bitrates. Issues addressed include an out of bounds write.
d55714a9eb4ce03079d51114c74f73dc6de05be4c9fa6a2d49adfb3580305eda