Once you have an idea of where you are, you can decide where you want to go. A security framework is invaluable for this type of work.
Yearly Archives: 2023
USN-5972-1: Thunderbird vulnerabilities
Multiple security issues were discovered in Thunderbird. If a user were
tricked into opening a specially crafted website in a browsing context, an
attacker could potentially exploit these to cause a denial of service,
obtain sensitive information, bypass security restrictions, cross-site
tracing, or execute arbitrary code. (CVE-2023-25152, CVE-2023-28162,
CVE-2023-28176)
Lukas Bernhard discovered that Thunderbird did not properly manage memory
when invalidating JIT code while following an iterator. An attacker could
potentially exploits this issue to cause a denial of service.
(CVE-2023-25751)
Luan Herrera discovered that Thunderbird did not properly manage
cross-origin iframe when dragging a URL. An attacker could potentially
exploit this issue to perform spoofing attacks. (CVE-2023-28164)
CVE-2018-25083
The pullit package before 1.4.0 for Node.js allows OS Command Injection because eval is used on an attacker-supplied Git branch name.
USN-5954-2: Firefox regressions
USN-5954-1 fixed vulnerabilities in Firefox. The update introduced
several minor regressions. This update fixes the problem.
We apologize for the inconvenience.
Original advisory details:
Multiple security issues were discovered in Firefox. If a user were
tricked into opening a specially crafted website, an attacker could
potentially exploit these to cause a denial of service, obtain sensitive
information across domains, or execute arbitrary code. (CVE-2023-25750,
CVE-2023-25752, CVE-2023-28162, CVE-2023-28176, CVE-2023-28177)
Lukas Bernhard discovered that Firefox did not properly manage memory
when invalidating JIT code while following an iterator. An attacker could
potentially exploits this issue to cause a denial of service.
(CVE-2023-25751)
Rob Wu discovered that Firefox did not properly manage the URLs when
following a redirect to a publicly accessible web extension file. An
attacker could potentially exploits this to obtain sensitive information.
(CVE-2023-28160)
Luan Herrera discovered that Firefox did not properly manage cross-origin
iframe when dragging a URL. An attacker could potentially exploit this
issue to perform spoofing attacks. (CVE-2023-28164)
Khiem Tran discovered that Firefox did not properly manage one-time
permissions granted to a document loaded using a file: URL. An attacker
could potentially exploit this issue to use granted one-time permissions
on the local files came from different sources. (CVE-2023-28161)
DSA-5379 dino-im – security update
Kim Alvefur discovered that insufficient message sender validation in
dino-im, a modern XMPP/Jabber client, may result in manipulation of
entries in the personal bookmark store without user interaction via a
specially crafted message. Additionally an attacker can take advantage
of this flaw to change how group chats are displayed or force a user to
join or leave an attacker-selected groupchat.
jpegoptim-1.5.3-1.fc38
FEDORA-2023-ee0bc9afb6
Packages in this update:
jpegoptim-1.5.3-1.fc38
Update description:
v1.5.3 – fix potential heap-buffer-overflow (read) when using stdin/stdout and processing corrupt JPEG
jpegoptim-1.5.3-1.el9
FEDORA-EPEL-2023-9391e7aeda
Packages in this update:
jpegoptim-1.5.3-1.el9
Update description:
v1.5.3 – fix potential heap-buffer-overflow (read) when using stdin/stdout and processing corrupt JPEG
qemu-7.0.0-15.fc37
FEDORA-2023-371519fd09
Packages in this update:
qemu-7.0.0-15.fc37
Update description:
qga/win32: Fix local privilege escalation issue (CVE-2023-0664) (rhbz#2175700)
openbgpd-7.9-1.el7
FEDORA-EPEL-2023-9a3db4278b
Packages in this update:
openbgpd-7.9-1.el7
Update description:
OpenBGPD 7.9
Include OpenBSD 7.2 errata 023: Incorrect length checks allow an out-of-bounds read in bgpd(8).
openbgpd-7.9-1.el8
FEDORA-EPEL-2023-c408e6e00e
Packages in this update:
openbgpd-7.9-1.el8
Update description:
OpenBGPD 7.9
Include OpenBSD 7.2 errata 023: Incorrect length checks allow an out-of-bounds read in bgpd(8).