Dell BSAFE Crypto-C Micro Edition, versions before 4.1.5, and Dell BSAFE Micro Edition Suite, versions before 4.5.2, contain an Observable Timing Discrepancy Vulnerability.
Category Archives: Advisories
CVE-2020-29507
Dell BSAFE Crypto-C Micro Edition, versions before 4.1.4, and Dell BSAFE Micro Edition Suite, versions before 4.4, contain an Improper Input Validation Vulnerability.
vim-9.0.049-1.fc35
FEDORA-2022-9d7a58e376
Packages in this update:
vim-9.0.049-1.fc35
Update description:
Security fixes for CVE-2022-2257, CVE-2022-2284, CVE-2022-2285, CVE-2022-2286, CVE-2022-2287, CVE-2022-2288, CVE-2022-2289, CVE-2022-2264, CVE-2022-2304.
vim-9.0.049-1.fc36
FEDORA-2022-b06fbea2c7
Packages in this update:
vim-9.0.049-1.fc36
Update description:
The newest upstream commit
Security fixes for CVE-2022-2257, CVE-2022-2284, CVE-2022-2285, CVE-2022-2286, CVE-2022-2287, CVE-2022-2288, CVE-2022-2289, CVE-2022-2264, CVE-2022-2304.
USN-5508-1: Python LDAP vulnerability
It was discovered that Python LDAP incorrectly handled certain regular expressions.
An remote attacker could possibly use this issue to cause a denial of service.
buildah-1.26.2-1.fc36
FEDORA-2022-c904572450
Packages in this update:
buildah-1.26.2-1.fc36
Update description:
auto bump to v1.26.2
oci-seccomp-bpf-hook-1.2.6-1.fc35
FEDORA-2022-7c45aa090a
Packages in this update:
oci-seccomp-bpf-hook-1.2.6-1.fc35
Update description:
auto bump to v1.2.6
oci-seccomp-bpf-hook-1.2.6-1.fc36
FEDORA-2022-24438de133
Packages in this update:
oci-seccomp-bpf-hook-1.2.6-1.fc36
Update description:
auto bump to v1.2.6
USN-5509-1: Dovecot vulnerability
Julian Brook discovered that Dovecot incorrectly handled multiple passdb
configuration entries. In certain configurations, a remote attacker could
possibly use this issue to escalate privileges.
ZDI-22-961: Linux Kernel LightNVM Subsystem Heap-based Overflow Privilege Escalation Vulnerability
This vulnerability allows local attackers to escalate privileges on affected installations of Linux Kernel. An attacker must first obtain the ability to execute high-privileged code on the target system in order to exploit this vulnerability.