Category Archives: Advisories

buildah-1.37.4-1.fc41 podman-5.2.4-1.fc41

Read Time:28 Second

FEDORA-2024-2e8c63e8bf

Packages in this update:

buildah-1.37.4-1.fc41
podman-5.2.4-1.fc41

Update description:

Automatic update for buildah-1.37.4-1.fc41, podman-5.2.4-1.fc41.

Changelog for buildah

* Mon Oct 07 2024 Packit <hello@packit.dev> – 2:1.37.4-1
– Update to 1.37.4 upstream release

Changelog for podman

* Mon Oct 07 2024 Packit <hello@packit.dev> – 5:5.2.4-1
– Update to 5.2.4 upstream release

Fixes CVE-2024-9341 and CVE-2024-9407.

Read More

ZDI-CAN-25312: Ivanti

Read Time:21 Second

A CVSS score 7.8 AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H severity vulnerability discovered by ’06fe5fd2bc53027c4a3b7e395af0b850e7b8a044′ was reported to the affected vendor on: 2024-10-08, 0 days ago. The vendor is given until 2025-02-05 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.

Read More

APPLE-SA-10-03-2024-1 iOS 18.0.1 and iPadOS 18.0.1

Read Time:27 Second

Posted by Apple Product Security via Fulldisclosure on Oct 07

APPLE-SA-10-03-2024-1 iOS 18.0.1 and iPadOS 18.0.1

iOS 18.0.1 and iPadOS 18.0.1 addresses the following issues.
Information about the security content is also available at
https://support.apple.com/121373.

Apple maintains a Security Releases page at
https://support.apple.com/100100 which lists recent
software updates with security advisories.

Media Session
Available for: iPhone 16 (all models)
Impact: Audio messages in Messages may be able to…

Read More

Multiple Vulnerabilities in Google Android OS Could Allow for Remote Code Execution

Read Time:35 Second

Multiple vulnerabilities have been discovered in Google Android OS, the most severe of which could allow for remote code execution. Android is an operating system developed by Google for mobile devices, including, but not limited to, smartphones, tablets, and watches. Successful exploitation of the most severe of these vulnerabilities could allow for remote code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

Read More

valkey-8.0.1-1.fc40

Read Time:18 Second

FEDORA-2024-8a9a692906

Packages in this update:

valkey-8.0.1-1.fc40

Update description:

update to 8.0.1
fixes
(CVE-2024-31449) Lua library commands may lead to stack overflow and potential RCE.
(CVE-2024-31227) Potential Denial-of-service due to malformed ACL selectors.
(CVE-2024-31228) Potential Denial-of-service due to unbounded pattern matching.

Read More

valkey-8.0.1-1.fc41

Read Time:18 Second

FEDORA-2024-e717420659

Packages in this update:

valkey-8.0.1-1.fc41

Update description:

update to 8.0.1
fixes
(CVE-2024-31449) Lua library commands may lead to stack overflow and potential RCE.
(CVE-2024-31227) Potential Denial-of-service due to malformed ACL selectors.
(CVE-2024-31228) Potential Denial-of-service due to unbounded pattern matching.

Read More

valkey-8.0.1-1.el9

Read Time:18 Second

FEDORA-EPEL-2024-845b92ee3f

Packages in this update:

valkey-8.0.1-1.el9

Update description:

update to 8.0.1
fixes
(CVE-2024-31449) Lua library commands may lead to stack overflow and potential RCE.
(CVE-2024-31227) Potential Denial-of-service due to malformed ACL selectors.
(CVE-2024-31228) Potential Denial-of-service due to unbounded pattern matching.

Read More