Multiple security issues were discovered in MySQL and this update includes
new upstream MySQL versions to fix these issues.
MySQL has been updated to 8.0.29 in Ubuntu 20.04 LTS, Ubuntu 21.10, and
Ubuntu 22.04 LTS. Ubuntu 18.04 LTS has been updated to MySQL 5.7.38.
In addition to security fixes, the updated packages contain bug fixes, new
features, and possibly incompatible changes.
Please see the following for more information:
https://dev.mysql.com/doc/relnotes/mysql/5.7/en/news-5-7-38.html
https://dev.mysql.com/doc/relnotes/mysql/8.0/en/news-8-0-29.html
https://www.oracle.com/security-alerts/cpuapr2022.html
FEDORA-2022-f624aad735
Packages in this update:
libxml2-2.9.14-1.fc34
Update description:
Update to 2.9.14
Fix CVE-2022-29824: Integer overflow in xmlBuf and xmlBuffer
FEDORA-2022-7ece4f6d74
Packages in this update:
mingw-freetype-2.12.1-1.fc36
Update description:
Update to 2.12.1.
Backport fixes for CVE-2022-27404, CVE-2022-27405, CVE-2022-27406
FEDORA-2022-be6d83642a
Packages in this update:
libxml2-2.9.14-1.fc35
Update description:
Update to 2.9.14
Fix CVE-2022-29824: Integer overflow in xmlBuf and xmlBuffer
FEDORA-2022-9136d646e4
Packages in this update:
libxml2-2.9.14-1.fc36
Update description:
Update to 2.9.14
Fix CVE-2022-29824: Integer overflow in xmlBuf and xmlBuffer
FEDORA-2022-2c4ed935d1
Packages in this update:
firefox-100.0-2.fc36
Update description:
New upstream version (100.0)
Fix mozbz#1759137 (ffmpeg crash)
FEDORA-2022-63b1344b6d
Packages in this update:
firefox-100.0-1.fc35
Update description:
New upstream version (100.0)
FEDORA-2022-d2d1fd90df
Packages in this update:
firefox-100.0-1.fc34
Update description:
New upstream version (100.0)
Posted by malvuln on May 02
Discovery / credits: Malvuln – malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/40f2238875fcbd2a92cfefc4846a15a8.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln
Threat: Ransom.AvosLocker
Vulnerability: Code Execution
Description: The ransomware looks for and executes DLLs in its current
directory. Therefore, we can potentially hijack a vuln DLL execute our
own code, control and terminate the malware…
Posted by malvuln on May 02
Discovery / credits: Malvuln – malvuln.com (c) 2022
Original source:
https://malvuln.com/advisory/96de05212b30ec85d4cf03386c1b84af.txt
Contact: malvuln13 () gmail com
Media: twitter.com/malvuln
Threat: Ransom.LockBit
Vulnerability: DLL Hijacking
Description: LockBit ransomware looks for and executes DLLs in its current
directory. This can potentially allow us to execute our own code, control
and terminate the malware pre-encryption. The exploit…
Posts navigation
News, Advisories and much more