1 week 1 day ago
Jorge Sancho Larraz discovered that iperf3 did not properly manage certain
inputs, which could cause the server process to stop responding, waiting
for input on the control connection. A remote attacker could possibly use
this issue to cause a denial of service. This issue was only addressed in
Ubuntu 22.04 LTS. (CVE-2023-7250)
It was discovered that iperf3 had a timing side-channel when performing RSA
decryption. An attacker could possibly use this issue to recover sensitive
information. This issue was only addressed in Ubuntu 20.04 LTS and Ubuntu
22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-26306)
It was discovered that iperf3 incorrectly handled certain inputs. An
attacker could possibly use this issue to cause a denial of service. This
issue was only addressed in Ubuntu 20.04 LTS, Ubuntu 22.04 LTS and Ubuntu
24.04 LTS. (CVE-2024-53580)
Han Lee discovered that iperf3 had an off-by-one heap overflow. An attacker
could possibly use this issue to crash the program or execute arbitrary
code. This issue was only addressed in Ubuntu 20.04 LTS, Ubuntu 22.04 LTS,
Ubuntu 24.04 LTS and Ubuntu 25.10. (CVE-2025-54349)
Han Lee discovered that iperf3 did not properly manage certain inputs. An
attacker could possibly use this issue to cause a denial of service.
(CVE-2025-54350)
1 week 1 day ago
1 week 2 days ago
Version:next-20260120 (linux-next)
Released:2026-01-20
1 week 2 days ago
FEDORA-2026-f59e87ad88
Packages in this update:
- python-tinycss2-1.5.1-1.fc43
- weasyprint-68.0-1.fc43
Update description:
update to new upstream version including a fix for CVE-2025-68616
1 week 2 days ago
FEDORA-2026-943caf40d9
Packages in this update:
Update description:
Update to 3.21.0
1 week 2 days ago
FEDORA-2026-23d669bf94
Packages in this update:
Update description:
Update to 3.21.0
1 week 2 days ago
FEDORA-2026-3f0f0f85be
Packages in this update:
Update description:
- fix broken TLS options for threaded LDAPS (CVE-2025-14017)
1 week 2 days ago
FEDORA-2026-e27b23af78
Packages in this update:
Update description:
- fix broken TLS options for threaded LDAPS (CVE-2025-14017)
1 week 2 days ago
FEDORA-2026-2a6cbb84d6
Packages in this update:
- perl-HarfBuzz-Shaper-0.033-1.fc42
Update description:
Upgrade to upstream. Eliminates distributing harfbuzz sources.
Upgrade to upstream 0.032.
1 week 2 days ago
FEDORA-2026-2b5249b4b6
Packages in this update:
- perl-HarfBuzz-Shaper-0.033-2.fc43
Update description:
Merge branch 'rawhide' into f43
Upgrade to upstream 0.032 to fix CVE-2026-22693.
1 week 2 days ago
1 week 3 days ago
Version:next-20260119 (linux-next)
Released:2026-01-19
1 week 3 days ago
David Mendenhall discovered that Dungeon Crawl Stone Soup was incorrectly
handling Lua bytecode embedded in an uploaded .crawlrc file. An attacker
could possibly use this issue to execute arbitrary code.
1 week 3 days ago
It was discovered that the Apache HTTP Server incorrectly handled failed
ACME certificate renewals. This could result in renewal attempts to be
repeated without delays, possibly leading to a denial of service.
(CVE-2025-55753)
Anthony Parfenov discovered that the Apache HTTP Server would pass the
query string to cmd directives when configured with Server Side Includes
(SSI) enabled and mod_cgid. An attacker could possibly use this issue to
execute arbitrary code. (CVE-2025-58098)
Mattias Åsander discovered that the Apache HTTP Server incorrectly
neutralized certain environment variables. This could result in
unexpectedly superseding variables calculated by the server for CGI
programs. (CVE-2025-65082)
Mattias Åsander discovered that the Apache HTTP Server incorrectly
handled AllowOverride FileInfo configurations when using mod_userdir with
suexec. An attacker with access to use the RequestHeader directive in
htaccess can cause some CGI scripts to run under an unexpected userid.
(CVE-2025-66200)
1 week 3 days ago
USN-7966-1 fixed vulnerabilities in Snowflake. This update provides the
corresponding updates for Telegraf.
Original advisory details:
It was discovered that Pion DTLS, vendored in Telegraf, did not impose a limit
on the amount of data that was buffered during the handshake. An attacker could
possibly use the issue to cause a denial of service. (CVE-2022-29189)
It was discovered that Pion DTLS, vendored in Telegraf, did not prevent the
fragmentBuffer from processing zero length fragments. An attacker could
possibly use the issue to cause a denial of service. (CVE-2022-29190)
It was discovered that Pion DTLS, vendored in Telegraf, did not require
CertificateVerify when Client Cert was sent. An attacker could
possibly use the issue to cause a denial of service. (CVE-2022-29222)
1 week 3 days ago
It was discovered that Avahi incorrectly terminated when processing browser
records with wide-area disabled. An attacker could possibly use this issue
to cause Avahi to crash, resulting in a denial of service. (CVE-2025-68276)
It was discovered that Avahi incorrectly terminated when processing
unsolicited CNAME records pointing to resource records with short TTLs. An
attacker could possibly use this issue to cause Avahi to crash, resulting
in a denial of service. (CVE-2025-68468)
It was discovered that Avahi incorrectly terminated when processing
unsolicited CNAME records in quick succession. An attacker could possibly
use this issue to cause Avahi to crash, resulting in a denial of service.
(CVE-2025-68471)
1 week 3 days ago
1 week 3 days ago
1 week 3 days ago
USN-7955-1 fixed vulnerabilities in urllib3. The update introduced a
regression in response streaming on Ubuntu 20.04 LTS and Ubuntu 22.04 LTS.
This update fixes the problem.
We apologize for the inconvenience.
Original advisory details:
It was discovered that urllib3 incorrectly handled decompression during
HTTP redirects. An attacker could possibly use this issue to cause urllib3
to use excessive resources, causing a denial of service.
1 week 3 days ago
It was discovered that Pion DTLS, vendored in Snowflake, did not impose a limit
on the amount of data that was buffered during the handshake. An attacker could
possibly use the issue to cause a denial of service. (CVE-2022-29189)
It was discovered that Pion DTLS, vendored in Snowflake, did not prevent the
fragmentBuffer from processing zero length fragments. An attacker could
possibly use the issue to cause a denial of service. (CVE-2022-29190)
It was discovered that Pion DTLS, vendored in Snowflake, did not require
CertificateVerify when Client Cert was sent. An attacker could
possibly use the issue to cause a denial of service. (CVE-2022-29222)