Apache Subversion SVN authz protected copyfrom paths regression Subversion servers reveal ‘copyfrom’ paths that should be hidden according to configured path-based authorization (authz) rules. When a node has been copied from a protected location, users with access to the copy can see the ‘copyfrom’ path of the original. This also reveals the fact that the node was copied. Only the ‘copyfrom’ path is revealed; not its contents. Both httpd and svnserve servers are vulnerable.
Category Archives: Advisories
pdns-4.6.2-1.fc34
FEDORA-2022-6e19acf414
Packages in this update:
pdns-4.6.2-1.fc34
Update description:
Update to 4.6.2
Release notes: https://doc.powerdns.com/authoritative/changelog/4.6.html#change-4.6.2
Update to 4.6.1
Release notes: https://doc.powerdns.com/authoritative/changelog/4.6.html#change-4.6.1
pdns-4.6.2-1.el9
FEDORA-EPEL-2022-72a7426715
Packages in this update:
pdns-4.6.2-1.el9
Update description:
Update to 4.6.2
Release notes: https://doc.powerdns.com/authoritative/changelog/4.6.html#change-4.6.2
Update to 4.6.1
Release notes: https://doc.powerdns.com/authoritative/changelog/4.6.html#change-4.6.1
pdns-4.6.2-1.el8
FEDORA-EPEL-2022-7aca455c41
Packages in this update:
pdns-4.6.2-1.el8
Update description:
Update to 4.6.2
Release notes: https://doc.powerdns.com/authoritative/changelog/4.6.html#change-4.6.2
Update to 4.6.1
Release notes: https://doc.powerdns.com/authoritative/changelog/4.6.html#change-4.6.1
CVE-2021-0694
In setServiceForegroundInnerLocked of ActiveServices.java, there is a possible way for a background application to regain foreground permissions due to insufficient background restrictions. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-11Android ID: A-183147114
CVE-2021-0707
In dma_buf_release of dma-buf.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android kernelAndroid ID: A-155756045References: Upstream kernel
USN-5372-1: Subversion vulnerabilities
Evgeny Kotkov discovered that Subversion servers did not properly follow
path-based authorization rules in certain cases. An attacker could
potentially use this issue to retrieve information about private paths.
(CVE-2021-28544)
Thomas Weißschuh discovered that Subversion servers did not properly handle
memory in certain configurations. A remote attacker could potentially use
this issue to cause a denial of service or other unspecified impact.
(CVE-2022-24070)
Post Title
A vulnerability has been discovered in the Linux kernel, which could allow for data overwrite in arbitrary read-only files by non-privilege users. Linux is a family of open-source Unix-like operating systems based on the Linux kernel. Successful exploitation of this vulnerability could allow for root privilege escalation.
CVE-2021-31805
The fix issued for CVE-2020-17530 was incomplete. So from Apache Struts 2.0.0 to 2.5.29, still some of the tag’s attributes could perform a double evaluation if a developer applied forced OGNL evaluation by using the %{…} syntax. Using forced OGNL evaluation on untrusted user input can lead to a Remote Code Execution and security degradation.
USN-5371-1: nginx vulnerabilities
It was discovered that nginx Lua module mishandled certain inputs.
An attacker could possibly use this issue to perform an HTTP Request
Smuggling attack. This issue only affects Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2020-11724)
It was discovered that nginx Lua module mishandled certain inputs.
An attacker could possibly use this issue to disclose sensitive
information. This issue only affects Ubuntu 18.04 LTS and
Ubuntu 20.04 LTS. (CVE-2020-36309)
It was discovered that nginx mishandled the use of
compatible certificates among multiple encryption protocols.
If a remote attacker were able to intercept the communication,
this issue could be used to redirect traffic between subdomains.
(CVE-2021-3618)