Post Content
Category Archives: Advisories
GLSA 202408-10: nghttp2: Multiple Vulnerabilities
DSA-5740-1 firefox-esr – security update
Multiple security issues have been found in the Mozilla Firefox web
browser, which could potentially result in the execution of arbitrary
code, the bypass of sandbox restrictions or an information leak.
GLSA 202408-13: Nokogiri: Denial of Service
GLSA 202408-12: Bitcoin: Denial of Service
FreeBSD-EN-24:14.ifconfig
thunderbird-115.14.0-1.fc39
FEDORA-2024-7fe5206574
Packages in this update:
thunderbird-115.14.0-1.fc39
Update description:
Update to 115.14.0
https://www.thunderbird.net/en-US/thunderbird/115.14.0esr/releasenotes/
https://www.mozilla.org/en-US/security/advisories/mfsa2024-38/
thunderbird-115.14.0-1.fc40
FEDORA-2024-a060f26e22
Packages in this update:
thunderbird-115.14.0-1.fc40
Update description:
Update to 115.14.0
https://www.thunderbird.net/en-US/thunderbird/115.14.0esr/releasenotes/
https://www.mozilla.org/en-US/security/advisories/mfsa2024-38/
USN-6946-1: Django vulnerabilities
It was discovered that Django incorrectly handled certain strings in
floatformat function. An attacker could possibly use this issue to
cause a memory exhaustion. (CVE-2024-41989)
It was discovered that Django incorrectly handled very large inputs.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2024-41990)
It was discovered that Django in AdminURLFieldWidget incorrectly
handled certain inputs with a very large number of Unicode characters.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2024-41991)
It was discovered that Django incorrectly handled certain JSON objects.
An attacker could possibly use this issue to cause a potential SQL
injection. This issue only affected Ubuntu 22.04 LTS, and Ubuntu 24.04
LTS. (CVE-2024-42005)
USN-6945-1: wpa_supplicant and hostapd vulnerability
Rory McNamara discovered that wpa_supplicant could be made to load
arbitrary shared objects by unprivileged users that have access to
the control interface. An attacker could use this to escalate privileges
to root.