USN-6942-1: Gross vulnerability
It was discovered that Gross incorrectly handled memory when composing log entries. An attacker could possibly use this issue to cause Gross to crash, resulting...
USN-6922-2: Linux kernel vulnerabilities
It was discovered that a race condition existed in the Bluetooth subsystem in the Linux kernel when modifying certain settings values through debugfs. A privileged...
httpd-2.4.62-2.fc39
FEDORA-2024-e83af0855e Packages in this update: httpd-2.4.62-2.fc39 Update description: Fix regression introduced by CVE-2024-38474 fix new version 2.4.62 Fixes CVE-2024-40725 Read More
ImageMagick-6.9.13.14-1.el8
FEDORA-EPEL-2024-5efb0dbd99 Packages in this update: ImageMagick-6.9.13.14-1.el8 Update description: ImageMagick update to 6.9.13-14 Read More
ImageMagick-6.9.13.14-1.el9
FEDORA-EPEL-2024-03b4facc42 Packages in this update: ImageMagick-6.9.13.14-1.el9 Update description: ImageMagick update to 6.9.13-14 Read More
USN-6941-1: Python vulnerability
It was discovered that the Python ipaddress module contained incorrect information about which IP address ranges were considered “private” or “globally reachable”. This could possibly...
bind-9.18.28-2.fc39 bind-dyndb-ldap-11.10-26.fc39
FEDORA-2024-ef8a7031e7 Packages in this update: bind-9.18.28-2.fc39 bind-dyndb-ldap-11.10-26.fc39 Update description: Update to BIND 9.18.28 Security Fixes A malicious DNS client that sent many queries over TCP...
frr-8.5.5-1.fc39
FEDORA-2024-0c063be1cc Packages in this update: frr-8.5.5-1.fc39 Update description: New version 8.5.5 Read More
USN-6940-1: snapd vulnerabilities
Neil McPhail discovered that snapd did not properly restrict writes to the $HOME/bin path in the AppArmor profile for snaps using the home plug. An...
ZDI-24-1053: (0Day) (Pwn2Own) ChargePoint Home Flex OCPP bswitch Command Injection Remote Code Execution Vulnerability
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of ChargePoint Home Flex charging stations. Authentication is not required to exploit this...