Multiple vulnerabilities have been discovered in Request Tracker, an
extensible trouble-ticket tracking system.
Category Archives: Advisories
xen-4.16.1-6.fc36
FEDORA-2022-3e6ce58029
Packages in this update:
xen-4.16.1-6.fc36
Update description:
Retbleed – arbitrary speculative code execution with return instructions
[XSA-407, CVE-2022-23816, CVE-2022-23825, CVE-2022-29900]
suricata-5.0.10-1.el8
FEDORA-EPEL-2022-fb8ccb0976
Packages in this update:
suricata-5.0.10-1.el8
Update description:
This update fixes many bugs some of which are security relevant.
suricata-6.0.6-1.fc36
FEDORA-2022-16b60f20fa
Packages in this update:
suricata-6.0.6-1.fc36
Update description:
This update fixes many bugs some of which are security relevant.
suricata-6.0.6-1.fc35
FEDORA-2022-0513984304
Packages in this update:
suricata-6.0.6-1.fc35
Update description:
This update fixes many bugs some of which are security relevant.
suricata-6.0.6-1.el9
FEDORA-EPEL-2022-97fbf85fb6
Packages in this update:
suricata-6.0.6-1.el9
Update description:
This update fixes many bugs some of which are security relevant.
CVE-2011-4916
Linux kernel through 3.1 allows local users to obtain sensitive keystroke information via access to /dev/pts/ and /dev/tty*.
USN-5510-2: X.Org X Server vulnerabilities
USN-5510-1 fixed several vulnerabilities in X.Org. This update provides
the corresponding update for Ubuntu 16.04 ESM.
Original advisory details:
Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
certain inputs. An attacker could use this issue to cause the server to
crash, resulting in a denial of service, or possibly execute arbitrary
code and escalate privileges.
USN-5510-1: X.Org X Server vulnerabilities
Jan-Niklas Sohn discovered that the X.Org X Server incorrectly handled
certain inputs. An attacker could use this issue to cause the server to
crash, resulting in a denial of service, or possibly execute arbitrary
code and escalate privileges.
USN-5503-2: GnuPG vulnerability
USN-5503-1 fixed a vulnerability in GnuPG. This update provides
the corresponding update for Ubuntu 14.04 ESM and Ubuntu 16.04 ESM.
Original advisory details:
Demi Marie Obenour discovered that GnuPG incorrectly handled injection in
the status message. A remote attacker could possibly use this issue to
forge signatures.