Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Google Chrome is a web browser used to access the Internet. Successful exploitation of the most severe of these vulnerabilities could allow an attacker to execute arbitrary code in the context of the browser. Depending on the privileges associated with the application, an attacker could view, change, or delete data. If this application has been configured to have fewer user rights on the system, exploitation of the most severe of these vulnerabilities could have less impact than if it was configured with administrative rights.
Category Archives: Advisories
USN-5391-1: libsepol vulnerabilities
Nicolas Iooss discovered that libsepol incorrectly handled memory
when handling policies. An attacker could possibly use this issue
to cause a crash, resulting in a denial of service, or possibly
execute arbitrary code. (CVE-2021-36084)
It was discovered that libsepol incorrectly handled memory when
handling policies. An attacker could possibly use this issue to cause
a crash, resulting in a denial of service, or possibly execute
arbitrary code. (CVE-2021-36085)
It was discovered that libsepol incorrectly handled memory when
handling policies. An attacker could possibly use this issue to cause
a crash, resulting in a denial of service, or possibly execute
arbitrary code. This issue only affects Ubuntu 18.04 LTS,
Ubuntu 20.04 LTS and Ubuntu 21.10. (CVE-2021-36086)
It was discovered that libsepol incorrectly validated certain data,
leading to a heap overflow. An attacker could possibly use this issue
to cause a crash, resulting in a denial of service, or possibly execute
arbitrary code. (CVE-2021-36087)
USN-5366-2: FriBidi vulnerabilities
USN-5366-1 fixed several vulnerabilities in FriBidi. This update provides the
corresponding updates for Ubuntu 22.04 LTS.
Original advisory details:
It was discovered that FriBidi incorrectly handled processing of input strings
resulting in memory corruption. An attacker could use this issue to cause
FriBidi to crash, resulting in a denial of service, or potentially execute
arbitrary code. (CVE-2022-25308)
It was discovered that FriBidi incorrectly validated input data to its CapRTL
unicode encoder, resulting in memory corruption. An attacker could use this
issue to cause FriBidi to crash, resulting in a denial of service, or
potentially execute arbitrary code. (CVE-2022-25309)
It was discovered that FriBidi incorrectly handled empty input when removing
marks from unicode strings, resulting in a crash. An attacker could use this
to cause FriBidi to crash, resulting in a denial of service, or potentially
execute arbitrary code. (CVE-2022-25310)
DSA-5125 chromium – security update
Multiple security issues were discovered in Chromium, which could result
in the execution of arbitrary code, denial of service or information
disclosure.
suricata-6.0.5-1.fc35
FEDORA-2022-1b9f9b2993
Packages in this update:
suricata-6.0.5-1.fc35
Update description:
Various security, performance, accuracy and stability issues have been fixed.
suricata-6.0.5-1.fc36
FEDORA-2022-e7bc9caf04
Packages in this update:
suricata-6.0.5-1.fc36
Update description:
Various security, performance, accuracy and stability issues have been fixed.
suricata-6.0.5-1.fc34
FEDORA-2022-a2f0201723
Packages in this update:
suricata-6.0.5-1.fc34
Update description:
Various security, performance, accuracy and stability issues have been fixed.
suricata-5.0.9-1.el8
FEDORA-EPEL-2022-667d59a6db
Packages in this update:
suricata-5.0.9-1.el8
Update description:
Various security, performance, accuracy and stability issues have been fixed.
suricata-6.0.5-1.el9
FEDORA-EPEL-2022-1f9a7c822c
Packages in this update:
suricata-6.0.5-1.el9
Update description:
Various security, performance, accuracy and stability issues have been fixed.
CVE-2021-26629
A path traversal vulnerability in XPLATFORM’s runtime archive function could lead to arbitrary file creation. When the .xzip archive file is decompressed, an arbitrary file can be d in the parent path by using the path traversal pattern ‘..’.