Category Archives: Advisories

mariadb-10.7-3420220501001308.058368ca

Read Time:11 Second

FEDORA-MODULAR-2022-3903b475a9

Packages in this update:

mariadb-10.7-3420220501001308.058368ca

Update description:

MariaDB 10.7.3 & Galera 26.4.11

Release notes:

https://mariadb.com/kb/en/mariadb-1073-release-notes/

Read More

cifs-utils-6.15-1.fc34

Read Time:36 Second

FEDORA-2022-34de4f833d

Packages in this update:

cifs-utils-6.15-1.fc34

Update description:

This is a security release to address the following bugs:

CVE-2022-27239: mount.cifs: fix length check for ip option parsing
CVE-2022-29869: mount.cifs: fix verbose messages on option parsing

Description

CVE-2022-27239:

In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.

CVE-2022-29869:

cifs-utils through 6.14, with verbose logging, can cause an information leak when a file contains = (equal sign) characters but is
not a valid credentials file.

Both issues were originally reported and fixed by Jeffrey Bencteux.

Read More

cifs-utils-6.15-1.fc35

Read Time:36 Second

FEDORA-2022-7fda04ab5a

Packages in this update:

cifs-utils-6.15-1.fc35

Update description:

This is a security release to address the following bugs:

CVE-2022-27239: mount.cifs: fix length check for ip option parsing
CVE-2022-29869: mount.cifs: fix verbose messages on option parsing

Description

CVE-2022-27239:

In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.

CVE-2022-29869:

cifs-utils through 6.14, with verbose logging, can cause an information leak when a file contains = (equal sign) characters but is
not a valid credentials file.

Both issues were originally reported and fixed by Jeffrey Bencteux.

Read More

cifs-utils-6.15-1.fc36

Read Time:36 Second

FEDORA-2022-eb2d3ca94d

Packages in this update:

cifs-utils-6.15-1.fc36

Update description:

This is a security release to address the following bugs:

CVE-2022-27239: mount.cifs: fix length check for ip option parsing
CVE-2022-29869: mount.cifs: fix verbose messages on option parsing

Description

CVE-2022-27239:

In cifs-utils through 6.14, a stack-based buffer overflow when parsing the mount.cifs ip= command-line argument could lead to local attackers gaining root privileges.

CVE-2022-29869:

cifs-utils through 6.14, with verbose logging, can cause an information leak when a file contains = (equal sign) characters but is
not a valid credentials file.

Both issues were originally reported and fixed by Jeffrey Bencteux.

Read More