Category Archives: Advisories

USN-5405-1: jbig2dec vulnerabilities

Read Time:19 Second

It was discovered that jbig2dec incorrectly handled memory when parsing
invalid files. An attacker could use this issue to cause jbig2dec to crash,
leading to a denial of service. (CVE-2017-9216)

It was discovered that jbig2dec incorrectly handled memory when processing
untrusted input. An attacker could use this issue to cause a denial of service,
or possibly execute arbitrary code. (CVE-2020-12268)

Read More

slurm-21.08.8-1.fc37

Read Time:21 Second

FEDORA-2022-417587a4b9

Packages in this update:

slurm-21.08.8-1.fc37

Update description:

Automatic update for slurm-21.08.8-1.fc37.

Changelog

* Thu May 5 2022 Carl George <carl@george.computer> – 21.08.8-1
– Update to 21.08.8, resolves: rhbz#2082276
– Fix CVE-2022-29500, resolves: rhbz#2082286
– Fix CVE-2022-29501, resolves: rhbz#2082289
– Fix CVE-2022-29502, resolves: rhbz#2082293

Read More

Post Title

Read Time:1 Minute, 2 Second

Multiple vulnerabilities have been discovered in F5Networks products, the most severe of which could result in arbitrary code execution.

BIG-IP is a family of products covering software and hardware designed around application availability, access control, and security solutions.
Traffix SDC is a product that provides load balancing and gateway connectivity.
Big-IQ Centralized Management tracks assets and manages policies for BIG-IP products.
F5 Access for Android is an Android application that allows users to access enterprise networks and applications.
BIG-IP Guided Configuration is a products that provides a way to deploy configurations of BIP-IP APM and Advanced WAF.
The F5OS-A is the operating system software for the F5 rSeries system.
NGINX Service Mesh is a product that allows for traffic control of distributed systems.
BIG-IP APM provides access control and authentication for applications.
Successful exploitation of the most severe of these vulnerabilities could allow for arbitrary code execution. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.

Read More