Category Archives: Advisories

firejail-0.9.70-1.fc36

Read Time:9 Second

FEDORA-2022-e8e9b50a33

Packages in this update:

firejail-0.9.70-1.fc36

Update description:

Update to 0.9.70 (rhbz#2042724).
Mitigates CVE-2022-31214 (rhbz#2095070).

Read More

firejail-0.9.70-1.fc38

Read Time:16 Second

FEDORA-2022-674e299893

Packages in this update:

firejail-0.9.70-1.fc38

Update description:

Automatic update for firejail-0.9.70-1.fc38.

Changelog

* Tue Sep 6 2022 Maxwell G <gotmax@e.email> – 0.9.70-1
– Update to 0.9.70 (rhbz#2042724).
– Mitigates CVE-2022-31214 (rhbz#2095070).

Read More

CVE-2020-8586

Read Time:9 Second

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

Read More

CVE-2021-39324

Read Time:9 Second

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

Read More

CVE-2021-39326

Read Time:9 Second

** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.

Read More

Multiple Vulnerabilities in Adobe Products Could Allow for Arbitrary Code Execution.

Read Time:48 Second

Multiple vulnerabilities have been discovered in Adobe products, the most severe of which could allow for arbitrary code execution.

Adobe Commerce is an offering that provides companies with a flexible and scalable end-to-end plate form to manage commerce experiences of their customers.
Adobe Acrobat and Reader are used to view, create, print, and mange PDF files.
Illustrator is a vector graphics editor and design program.
Framemaker is a document processor designed for writing and editing large or complex documents.
Premiere Elements is a video editing software similar to Premiere Pro.
Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

Read More