Apple Security Advisory 2017-01-18-2 – Logic Pro X 10.3 is now available and addresses a memory corruption vulnerability.
Monthly Archives: January 2017
Apple Security Advisory 2017-01-18-1
Apple Security Advisory 2017-01-18-1 – GarageBand 10.1.5 is now available and addresses an arbitrary code execution vulnerability.
percona-xtrabackup-2.3.6-1.fc24
– Updated to 2.3.6
– Fixes CVE-2016-6225
percona-xtrabackup-2.3.6-1.el7
– Updated to 2.3.6
– Fixes CVE-2016-6225
percona-xtrabackup-2.3.6-1.fc25
– Updated to 2.3.6
– Fixes CVE-2016-6225
Ghost Blog 0.11.3 Cross Site Scripting
Tempest Security Intelligence Advisory ADV-9/2017 – Ghost Blog version 0.11.3 suffers from a persistent cross site scripting vulnerability.
Red Hat Security Advisory 2017-0165-01
Red Hat Security Advisory 2017-0165-01 – OpenStack Block Storage manages block storage mounting and the presentation of such mounted block storage to instances. The backend physical storage can consist of local disks, or Fiber Channel, iSCSI, and NFS mounts attached to Compute nodes.
Red Hat Security Advisory 2017-0153-01
Red Hat Security Advisory 2017-0153-01 – OpenStack Block Storage manages block storage mounting and the presentation of such mounted block storage to instances. The backend physical storage can consist of local disks, or Fiber Channel, iSCSI, and NFS mounts attached to Compute nodes.
Red Hat Security Advisory 2017-0156-01
Red Hat Security Advisory 2017-0156-01 – OpenStack Block Storage manages block storage mounting and the presentation of such mounted block storage to instances. The backend physical storage can consist of local disks, or Fiber Channel, iSCSI, and NFS mounts attached to Compute nodes.
Red Hat Security Advisory 2017-0161-01
Red Hat Security Advisory 2017-0161-01 – jQuery UI is a set of user interface interactions, effects, widgets, and themes built on top of the jQuery JavaScript library. Security Fix: It was found that a parameter of the dialog box feature of jQuery UI was vulnerable to cross site scripting. An attacker could use this flaw to execute a malicious script via the dialog box when it was displayed to a user.