Post Content
Category Archives: Advisories
GLSA 202408-12: Bitcoin: Denial of Service
FreeBSD-EN-24:14.ifconfig
thunderbird-115.14.0-1.fc39
FEDORA-2024-7fe5206574
Packages in this update:
thunderbird-115.14.0-1.fc39
Update description:
Update to 115.14.0
https://www.thunderbird.net/en-US/thunderbird/115.14.0esr/releasenotes/
https://www.mozilla.org/en-US/security/advisories/mfsa2024-38/
thunderbird-115.14.0-1.fc40
FEDORA-2024-a060f26e22
Packages in this update:
thunderbird-115.14.0-1.fc40
Update description:
Update to 115.14.0
https://www.thunderbird.net/en-US/thunderbird/115.14.0esr/releasenotes/
https://www.mozilla.org/en-US/security/advisories/mfsa2024-38/
USN-6946-1: Django vulnerabilities
It was discovered that Django incorrectly handled certain strings in
floatformat function. An attacker could possibly use this issue to
cause a memory exhaustion. (CVE-2024-41989)
It was discovered that Django incorrectly handled very large inputs.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2024-41990)
It was discovered that Django in AdminURLFieldWidget incorrectly
handled certain inputs with a very large number of Unicode characters.
An attacker could possibly use this issue to cause a denial of service.
(CVE-2024-41991)
It was discovered that Django incorrectly handled certain JSON objects.
An attacker could possibly use this issue to cause a potential SQL
injection. This issue only affected Ubuntu 22.04 LTS, and Ubuntu 24.04
LTS. (CVE-2024-42005)
USN-6945-1: wpa_supplicant and hostapd vulnerability
Rory McNamara discovered that wpa_supplicant could be made to load
arbitrary shared objects by unprivileged users that have access to
the control interface. An attacker could use this to escalate privileges
to root.
Multiple Vulnerabilities in Mozilla Products Could Allow for Arbitrary Code Execution
Multiple vulnerabilities have been discovered in Mozilla products, the most severe of which could allow for arbitrary code execution. Mozilla Firefox is a web browser used to access the Internet. Mozilla Firefox ESR is a version of the web browser intended to be deployed in large organizations. Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution in the context of the logged on user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
tor-0.4.8.12-2.el8
FEDORA-EPEL-2024-2d8a766d53
Packages in this update:
tor-0.4.8.12-2.el8
Update description:
Re-add systemd-devel as build dependency so the daemon knows how to notify systemd that it was started – fixes bz#2302910
tor-0.4.8.12-2.el9
FEDORA-EPEL-2024-4188096f1c
Packages in this update:
tor-0.4.8.12-2.el9
Update description:
Re-add systemd-devel as build dependency so the daemon knows how to notify systemd that it was started – fixes bz#2302910