In WAGO I/O-Check Service in multiple products an attacker can send a specially crafted packet containing OS commands to crash the diagnostic tool and write memory.
Category Archives: Advisories
CVE-2021-34567
In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to provoke a denial of service and an limited out-of-bounds read.
CVE-2021-34566
In WAGO I/O-Check Service in multiple products an unauthenticated remote attacker can send a specially crafted packet containing OS commands to crash the iocheck process and write memory resulting in loss of integrity and DoS.
python3.10-3.10.8-2.fc37
FEDORA-2022-a7cad6bd22
Packages in this update:
python3.10-3.10.8-2.fc37
Update description:
Security fix for CVE-2022-42919
python3.10-3.10.8-2.fc38
FEDORA-2022-bd02afca8c
Packages in this update:
python3.10-3.10.8-2.fc38
Update description:
Automatic update for python3.10-3.10.8-2.fc38.
Changelog
* Wed Nov 9 2022 Lumír Balhar <lbalhar@redhat.com> – 3.10.8-2
– Fix CVE-2022-42919
Resolves: rhbz#2138709
python3.9-3.9.15-2.fc38
FEDORA-2022-6728f16289
Packages in this update:
python3.9-3.9.15-2.fc38
Update description:
Automatic update for python3.9-3.9.15-2.fc38.
Changelog
* Wed Nov 9 2022 Lumír Balhar <lbalhar@redhat.com> – 3.9.15-2
– Fix for CVE-2022-42919
Resolves: rhbz#2138711
sysstat-12.6.0-4.fc37
FEDORA-2022-9f3af921a5
Packages in this update:
sysstat-12.6.0-4.fc37
Update description:
Security fix for CVE-2022-39377 – arithmetic overflow in allocate_structures() on 32 bit systems
sysstat-12.5.6-2.fc36
FEDORA-2022-dbe48a4bc7
Packages in this update:
sysstat-12.5.6-2.fc36
Update description:
Security fix for CVE-2022-39377 – arithmetic overflow in allocate_structures() on 32 bit systems
sysstat-12.5.6-2.fc35
FEDORA-2022-5adda2d05f
Packages in this update:
sysstat-12.5.6-2.fc35
Update description:
Security fix for CVE-2022-39377 – arithmetic overflow in allocate_structures() on 32 bit systems
USN-5720-1: Zstandard vulnerabilities
It was discovered that Zstandard was not properly managing file
permissions when generating output files. A local attacker could
possibly use this issue to cause a race condition and gain
unauthorized access to sensitive data.