This vulnerability allows remote attackers to delete arbitrary files on affected installations of Ivanti Avalanche. Authentication is not required to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.2. The following CVEs are assigned: CVE-2024-38652.
Category Archives: Advisories
USN-6961-1: BusyBox vulnerabilities
It was discovered that BusyBox did not properly validate user input when
performing certain arithmetic operations. If a user or automated system
were tricked into processing a specially crafted file, an attacker could
possibly use this issue to cause a denial of service, or execute arbitrary
code. (CVE-2022-48174)
It was discovered that BusyBox incorrectly managed memory when evaluating
certain awk expressions. An attacker could possibly use this issue to cause
a denial of service, or execute arbitrary code. This issue only affected
Ubuntu 24.04 LTS. (CVE-2023-42363, CVE-2023-42364, CVE-2023-42365)
USN-6951-2: Linux kernel (Azure) vulnerabilities
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
– ARM64 architecture;
– M68K architecture;
– User-Mode Linux (UML);
– x86 architecture;
– Accessibility subsystem;
– Character device driver;
– Clock framework and drivers;
– CPU frequency scaling framework;
– Hardware crypto device drivers;
– Buffer Sharing and Synchronization framework;
– FireWire subsystem;
– GPU drivers;
– HW tracing;
– Macintosh device drivers;
– Multiple devices driver;
– Media drivers;
– Network drivers;
– Pin controllers subsystem;
– S/390 drivers;
– SCSI drivers;
– SoundWire subsystem;
– Greybus lights staging drivers;
– TTY drivers;
– Framebuffer layer;
– Virtio drivers;
– 9P distributed file system;
– eCrypt file system;
– EROFS file system;
– Ext4 file system;
– F2FS file system;
– JFFS2 file system;
– Network file system client;
– NILFS2 file system;
– SMB network file system;
– Kernel debugger infrastructure;
– IRQ subsystem;
– Tracing infrastructure;
– Dynamic debug library;
– 9P file system network protocol;
– Bluetooth subsystem;
– Networking core;
– IPv4 networking;
– IPv6 networking;
– Netfilter;
– NET/ROM layer;
– NFC subsystem;
– NSH protocol;
– Open vSwitch;
– Phonet protocol;
– TIPC protocol;
– Unix domain sockets;
– Wireless networking;
– eXpress Data Path;
– XFRM subsystem;
– ALSA framework;
(CVE-2024-36934, CVE-2024-38578, CVE-2024-38600, CVE-2024-27399,
CVE-2024-39276, CVE-2024-38596, CVE-2024-36933, CVE-2024-36919,
CVE-2024-35976, CVE-2024-37356, CVE-2023-52585, CVE-2024-38558,
CVE-2024-38560, CVE-2024-38634, CVE-2024-36959, CVE-2024-38633,
CVE-2024-36886, CVE-2024-27398, CVE-2024-39493, CVE-2024-26886,
CVE-2024-31076, CVE-2024-38559, CVE-2024-38615, CVE-2024-36971,
CVE-2024-38627, CVE-2024-36964, CVE-2024-38780, CVE-2024-37353,
CVE-2024-38621, CVE-2024-36883, CVE-2024-39488, CVE-2024-38661,
CVE-2024-36939, CVE-2024-38589, CVE-2024-38565, CVE-2024-38381,
CVE-2024-35947, CVE-2024-36905, CVE-2022-48772, CVE-2024-36017,
CVE-2024-36946, CVE-2024-27401, CVE-2024-38579, CVE-2024-38612,
CVE-2024-38598, CVE-2024-38635, CVE-2024-38587, CVE-2024-38567,
CVE-2024-38549, CVE-2024-36960, CVE-2023-52752, CVE-2024-27019,
CVE-2024-38601, CVE-2024-39489, CVE-2024-39467, CVE-2023-52882,
CVE-2024-38583, CVE-2024-39480, CVE-2024-38607, CVE-2024-36940,
CVE-2024-38659, CVE-2023-52434, CVE-2024-36015, CVE-2024-38582,
CVE-2024-36950, CVE-2024-38552, CVE-2024-33621, CVE-2024-36954,
CVE-2024-39475, CVE-2024-39301, CVE-2024-38599, CVE-2024-36902,
CVE-2024-36286, CVE-2024-38613, CVE-2024-38637, CVE-2024-36941,
CVE-2024-36014, CVE-2024-38618, CVE-2024-36904, CVE-2024-36270,
CVE-2024-39292, CVE-2024-39471, CVE-2022-48674)
USN-6960-1: RMagick vulnerability
Nick Browning discovered that RMagick incorrectly handled memory under
certain operations. An attacker could possibly use this issue to cause
a denial of service through memory exhaustion.
webkitgtk-2.44.3-1.fc39
FEDORA-2024-e9219d3a6e
Packages in this update:
webkitgtk-2.44.3-1.fc39
Update description:
Fix web process cache suspend/resume when sandbox is enabled.
Fix accelerated images disappearing after scrolling.
Fix video flickering with DMA-BUF sink.
Fix pointer lock on X11.
Fix movement delta on mouse events in GTK3.
Undeprecate console message API and make it available in 2022 API.
Fix several crashes and rendering issues.
community-mysql-8.0.39-1.fc39
FEDORA-2024-c611359ae1
Packages in this update:
community-mysql-8.0.39-1.fc39
Update description:
MySQL 8.0.39
Release notes:
https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-38.html
https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-39.html
libtiff-4.6.0-6.fc41
FEDORA-2024-f19c79e713
Packages in this update:
libtiff-4.6.0-6.fc41
Update description:
Automatic update for libtiff-4.6.0-6.fc41.
Changelog
* Wed Aug 14 2024 Michal Hlavinka <mhlavink@redhat.com> – 4.6.0-6
– fix CVE-2024-7006 (rhbz#2302997)
– fix CVE-2023-52356 (rhbz#2260112)
– fix CVE-2023-6228 (rhbz#2251863)
libtiff-4.6.0-6.fc42
FEDORA-2024-4d0efe49df
Packages in this update:
libtiff-4.6.0-6.fc42
Update description:
Automatic update for libtiff-4.6.0-6.fc42.
Changelog
* Wed Aug 14 2024 Michal Hlavinka <mhlavink@redhat.com> – 4.6.0-6
– fix CVE-2024-7006 (rhbz#2302997)
– fix CVE-2023-52356 (rhbz#2260112)
– fix CVE-2023-6228 (rhbz#2251863)
iaito-5.9.4-1.fc40 radare2-5.9.4-1.fc40
FEDORA-2024-a562addefa
Packages in this update:
iaito-5.9.4-1.fc40
radare2-5.9.4-1.fc40
Update description:
Bump to version 5.9.4
iaito-5.9.4-1.fc39 radare2-5.9.4-1.fc39
FEDORA-2024-3667e29b88
Packages in this update:
iaito-5.9.4-1.fc39
radare2-5.9.4-1.fc39
Update description:
Bump to version 5.9.4