Improper authentication in firmware for some Intel(R) SSD DC Products may allow an unauthenticated user to potentially enable escalation of privilege via physical access.
Category Archives: Advisories
CVE-2021-33079
Protection mechanism failure in firmware for some Intel(R) SSD DC Products may allow a privileged user to potentially enable information disclosure via local access.
CVE-2021-33081
Protection mechanism failure in firmware for some Intel(R) SSD DC Products may allow a privileged user to potentially enable information disclosure via local access.
gajim-1.5.1-1.fc36 python-nbxmpp-3.2.2-1.fc36
FEDORA-2022-b60ea83571
Packages in this update:
gajim-1.5.1-1.fc36
python-nbxmpp-3.2.2-1.fc36
Update description:
Update Gajim to 1.5.1 (and python-nbxmpp to 3.2.2)
gajim-1.5.1-1.fc37 python-nbxmpp-3.2.2-1.fc37
FEDORA-2022-bf1f350185
Packages in this update:
gajim-1.5.1-1.fc37
python-nbxmpp-3.2.2-1.fc37
Update description:
Update Gajim to 1.5.1 (and python-nbxmpp to 3.2.2)
snakeyaml-1.32-1.el9
FEDORA-EPEL-2022-c48c7429c0
Packages in this update:
snakeyaml-1.32-1.el9
Update description:
Security fix for CVE-2022-25857
snakeyaml-1.32-1.el8
FEDORA-EPEL-2022-6a12c208cf
Packages in this update:
snakeyaml-1.32-1.el8
Update description:
Security fix for CVE-2022-25857
ZDI-22-1292: FreeBSD Kernel Netmap Integer Overflow Privilege Escalation Vulnerability
This vulnerability allows local attackers to escalate privileges on affected installations of FreeBSD Kernel. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.
ZDI-22-1291: FreeBSD Kernel Netmap Time-Of-Check Time-Of-Use Privilege Escalation Vulnerability
This vulnerability allows local attackers to escalate privileges on affected installations of FreeBSD Kernel. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.
ZDI-22-1290: D-Link Multiple Routers lighttpd Stack-based Buffer Overflow Remote Code Execution Vulnerability
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of multiple D-Link routers. Authentication is not required to exploit this vulnerability.