CVE-2016-9245

In F5 BIG-IP systems 12.1.0 – 12.1.2, malicious requests made to virtual servers with an HTTP profile can cause the TMM to restart. The issue is exposed with BIG-IP APM profiles, regardless of settings. The issue is also exposed with the non-default “Normalize URI” configuration options used in iRules and/or BIG-IP LTM policies. An attacker may be able to disrupt traffic or cause the BIG-IP system to fail over to another device in the device group.

CVE-2016-10200

Race condition in the L2TPv3 IP Encapsulation feature in the Linux kernel before 4.8.14 allows local users to gain privileges or cause a denial of service (use-after-free) by making multiple bind system calls without properly ascertaining whether a socket has the SOCK_ZAPPED status, related to net/l2tp/l2tp_ip.c and net/l2tp/l2tp_ip6.c.

libupnp-1.6.21-1.fc26

– miniserver: fix binding to ipv6 link-local addresses
– Fix out-of-bound access in create_url_list() (CVE-2016-8863)
– If the error or info log files can not be created, use stderr and stdout instead.
– SF Bug Tracker #132 CVE-2016-6255: write files via POST

libupnp-1.6.21-1.fc24

– miniserver: fix binding to ipv6 link-local addresses
– Fix out-of-bound access in create_url_list() (CVE-2016-8863)
– If the error or info log files can not be created, use stderr and stdout instead.
– SF Bug Tracker #132 CVE-2016-6255: write files via POST

libupnp-1.6.21-1.fc25

– miniserver: fix binding to ipv6 link-local addresses
– Fix out-of-bound access in create_url_list() (CVE-2016-8863)
– If the error or info log files can not be created, use stderr and stdout instead.
– SF Bug Tracker #132 CVE-2016-6255: write files via POST

CVE-2017-5681

The RSA-CRT implementation in the Intel QuickAssist Technology (QAT) Engine for OpenSSL versions prior to 0.5.19 may allow remote attackers to obtain private RSA keys by conducting a Lenstra side-channel attack.

Unpatched Western Digital Bugs Leave NAS Boxes Open to Attack

Western Digital NAS owners were warned of critical flaws in the company’s My Cloud line of hardware that opened up data stored on those devices to attack.