FEDORA-2024-39913e097a
Packages in this update:
haproxy-2.9.10-1.fc40
Update description:
Update to 2.9.10 (CVE-2024-45506)
haproxy-2.9.10-1.fc40
Update to 2.9.10 (CVE-2024-45506)
haproxy-3.0.4-1.fc41
Update to 3.0.4 (CVE-2024-45506, #2309472)
Johannes Kuhn (DasBrain) discovered that znc incorrectly handled
user input under certain operations. An attacker could possibly
use this issue to execute arbitrary code on a user’s system if
the user was tricked into joining a malicious server.
python-django4.2-4.2.16-1.fc40
urlize and urlizetrunc were subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.
python-django4.2-4.2.16-1.fc41
urlize and urlizetrunc were subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.
python-django4.2-4.2.16-1.fc39
urlize and urlizetrunc were subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.
python-django4.2-4.2.16-1.el9
urlize and urlizetrunc were subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.
The US White House Office of the National Cyber Director proposes improving internet security by protecting the Border Gateway Protocol
Dan Smith, Julia Kreger and Jay Faulkner discovered that in
image processing for Ironic, a specially crafted image
could be used by an authenticated user to exploit undesired behaviors
in qemu-img, including possible unauthorized access to potentially
sensitive data.
US law enforcement is tracking aggressive social engineering attacks against cryptocurrency operations