Aggregator

openssl3-3.2.1-1.1.el8

1 day 4 hours ago
FEDORA-EPEL-2024-b002585dd2 Packages in this update:
  • openssl3-3.2.1-1.1.el8
Update description:

Merge in changes from c9s' openssl to pick up various CVE fixes and other bugfixes

USN-6743-2: Linux kernel (Low Latency) vulnerabilities

1 day 10 hours ago
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the following subsystems: - JFS file system; - BPF subsystem; - Netfilter; (CVE-2023-52600, CVE-2024-26589, CVE-2024-26591, CVE-2024-26581, CVE-2023-52603)

flatpak-runtime-f40-2 flatpak-sdk-f40-1

1 day 13 hours ago
FEDORA-FLATPAK-2024-a3977e7532 Packages in this update:
  • flatpak-runtime-f40-2
  • flatpak-sdk-f40-1
Update description:

Updated flatpak runtime and SDK, including latest Fedora 40 security and bug-fix errata.

In addition, this update also includes updated nss 3.99.0 that's needed for upcoming firefox 125.0 update.

USN-6744-2: Pillow vulnerability

1 day 14 hours ago
USN-6744-1 fixed a vulnerability in Pillow (Python 3). This update provides the corresponding updates for Pillow (Python 2) in Ubuntu 20.04 LTS. Original advisory details: Hugo van Kemenade discovered that Pillow was not properly performing bounds checks when processing an ICC file, which could lead to a buffer overflow. If a user or automated system were tricked into processing a specially crafted ICC file, an attacker could possibly use this issue to cause a denial of service or execute arbitrary code.

USN-6738-1: LXD vulnerability

1 day 18 hours ago
Fabian Bäumer, Marcus Brinkmann, and Jörg Schwenk discovered that LXD incorrectly handled the handshake phase and the use of sequence numbers in SSH Binary Packet Protocol (BPP). If a user or an automated system were tricked into opening a specially crafted input file, a remote attacker could possibly use this issue to bypass integrity checks.

USN-6744-1: Pillow vulnerability

1 day 19 hours ago
Hugo van Kemenade discovered that Pillow was not properly performing bounds checks when processing an ICC file, which could lead to a buffer overflow. If a user or automated system were tricked into processing a specially crafted ICC file, an attacker could possibly use this issue to cause a denial of service or execute arbitrary code.