The wp_ajax_update_plugin function in wp-admin/includes/ajax-actions.php in WordPress before 4.6 makes a get_plugin_data call before checking the update_plugins capability, which allows remote authenticated users to bypass intended read-access restrictions via the plugin parameter to wp-admin/admin-ajax.php, a related issue to CVE-2016-6896.
Monthly Archives: January 2017
CVE-2016-6896
Directory traversal vulnerability in the wp_ajax_update_plugin function in wp-admin/includes/ajax-actions.php in WordPress 4.5.3 allows remote authenticated users to cause a denial of service or read certain text files via a .. (dot dot) in the plugin parameter to wp-admin/admin-ajax.php, as demonstrated by /dev/random read operations that deplete the entropy pool.
CVE-2016-10147
crypto/mcryptd.c in the Linux kernel before 4.8.15 allows local users to cause a denial of service (NULL pointer dereference and system crash) by using an AF_ALG socket with an incompatible algorithm, as demonstrated by mcryptd(md5).
Bugtraq: ESA-2016-143: EMC Documentum Webtop and Clients Stored Cross-Site Scripting Vulnerability
ESA-2016-143: EMC Documentum Webtop and Clients Stored Cross-Site Scripting Vulnerability
Bugtraq: ESA-2016-161: EMC Isilon OneFS LDAP Injection Vulnerability
ESA-2016-161: EMC Isilon OneFS LDAP Injection Vulnerability
Shadow IT and "No" versus "Know"
In an information-based economy where bring-your-own devices (BYOD) and, increasingly, bring-your-own applications (BYOA), are the norm, IT groups are struggling to enable their organizations to be fast and flexible while protecting their digital assets. Shadow IT, also referred to as rogue or cockroach IT, emcompasses the devices, software, and services outside the ownership or control of IT groups. While Shadow IT poses a significant threat to the management and security of organizations, it can also be a source of speed, agility, and freedom to enable business success.
![]()
RHEA-2017:0148-1: heketi bug fix and enhancement update
Red Hat Enterprise Linux: Updated heketi packages that fix several bugs and add various enhancements are
now available.
RHBA-2017:0167-1: Red Hat Enterprise Linux OpenStack Platform 5 Bug Fix and Enhancement Advisory
Red Hat Enterprise Linux: Updated packages that resolve various issues are now available for Red Hat
Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 7.
RHBA-2017:0166-1: openstack-keystone bug fix advisory
Red Hat Enterprise Linux: Updated OpenStack Identity packages that resolve various issues are now
available for Red Hat Enterprise Linux OpenStack Platform 5.0 (Icehouse)
for RHEL 6.
RHBA-2017:0164-1: Red Hat Enterprise Linux OpenStack Platform Bug Fix Advisory
Red Hat Enterprise Linux: Updated packages that resolve various issues are now available for Red Hat
Enterprise Linux OpenStack Platform 5.0 (Icehouse) for RHEL 6.