It was discovered that Ceph incorrectly handled unsupported JWT algorithms
in the RadosGW gateway. An attacker could possibly use this issue to bypass
certain authentication checks and restrictions.
Category Archives: Advisories
USN-7181-1: Salt vulnerability
It was discovered that Salt incorrectly handled web requests when the SSH
client was enabled. An attacker could possibly use this issue to achieve
remote code execution or obtain sensitive information.
USN-7180-1: Python vulnerabilities
It was discovered that Python incorrectly handled certain scripts.
An attacker could possibly use this issue to execute arbitrary code
or cause a crash. (CVE-2022-48560)
It was discovered that Python did not properly handle XML entity
declarations in plist files. An attacker could possibly use this
vulnerability to perform an XML External Entity (XXE) injection,
resulting in a denial of service or information disclosure.
(CVE-2022-48565)
It was discovered that Python did not properly provide constant-time
processing for a crypto operation. An attacker could possibly use this
issue to perform a timing attack and recover sensitive information.
(CVE-2022-48566)
It was discovered that Python incorrectly handled certain inputs. If a
user or an automated system were tricked into running a specially
crafted input, a remote attacker could possibly use this issue to cause a
denial of service. (CVE-2023-24329)
It was discovered that Python instances of ssl.SSLSocket were vulnerable
to a bypass of the TLS handshake. An attacker could possibly use this
issue to cause applications to treat unauthenticated received data before
TLS handshake as authenticated data after TLS handshake.
(CVE-2023-40217)
USN-7140-2: Tinyproxy vulnerability
USN-7140-1 fixed CVE-2022-40468 in tinyproxy. This update provides the
corresponding update for Ubuntu 14.04 LTS.
Original advisory details:
It was discovered that Tinyproxy did not properly manage memory under
certain circumstances. An attacker could possibly use this issue to leak
left-over heap data if custom error page templates containing special
non-standard variables are used.
perl-Net-OAuth-0.30-1.fc41
FEDORA-2025-f0077db20c
Packages in this update:
perl-Net-OAuth-0.30-1.fc41
Update description:
Update to 0.30, fixes CVE-2025-22376
perl-Net-OAuth-0.30-1.fc40
FEDORA-2025-05e642f1ef
Packages in this update:
perl-Net-OAuth-0.30-1.fc40
Update description:
Update to 0.30, fixes CVE-2025-22376
perl-Net-OAuth-0.30-1.el10_0
FEDORA-EPEL-2025-d8034c0356
Packages in this update:
perl-Net-OAuth-0.30-1.el10_0
Update description:
Update to 0.30, fixes CVE-2025-22376
golang-github-aws-sdk-2-20250103-1.fc41 golang-github-aws-smithy-1.22.1-1.fc41 golang-github-ncw-swift-2-2.0.3-1.fc41 rclone-1.68.2-1.fc41
FEDORA-2025-0620fdebb6
Packages in this update:
golang-github-aws-sdk-2-20250103-1.fc41
golang-github-aws-smithy-1.22.1-1.fc41
golang-github-ncw-swift-2-2.0.3-1.fc41
rclone-1.68.2-1.fc41
Update description:
Fix for CVE-2024-52522 & CVE-2024-45338
mupdf-1.24.6-4.fc41
FEDORA-2025-7d002ee0e7
Packages in this update:
mupdf-1.24.6-4.fc41
Update description:
fix CVE-2024-46657 (rhbz#2331627)
golang-github-aws-sdk-2-20250103-1.fc42 golang-github-rclone-gofakes3-0.0.3-1.fc42 rclone-1.68.2-1.fc42
FEDORA-2025-9b0b1cc333
Packages in this update:
golang-github-aws-sdk-2-20250103-1.fc42
golang-github-rclone-gofakes3-0.0.3-1.fc42
rclone-1.68.2-1.fc42
Update description:
Fix for CVE-2024-52522