pdns-4.6.2-1.el9
FEDORA-EPEL-2022-72a7426715 Packages in this update: pdns-4.6.2-1.el9 Update description: Update to 4.6.2 Release notes: https://doc.powerdns.com/authoritative/changelog/4.6.html#change-4.6.2 Update to 4.6.1 Release notes: https://doc.powerdns.com/authoritative/changelog/4.6.html#change-4.6.1 Read More
pdns-4.6.2-1.el8
FEDORA-EPEL-2022-7aca455c41 Packages in this update: pdns-4.6.2-1.el8 Update description: Update to 4.6.2 Release notes: https://doc.powerdns.com/authoritative/changelog/4.6.html#change-4.6.2 Update to 4.6.1 Release notes: https://doc.powerdns.com/authoritative/changelog/4.6.html#change-4.6.1 Read More
CVE-2021-0694
In setServiceForegroundInnerLocked of ActiveServices.java, there is a possible way for a background application to regain foreground permissions due to insufficient background restrictions. This could lead...
CVE-2021-0707
In dma_buf_release of dma-buf.c, there is a possible memory corruption due to a use after free. This could lead to local escalation of privilege with...
USN-5372-1: Subversion vulnerabilities
Evgeny Kotkov discovered that Subversion servers did not properly follow path-based authorization rules in certain cases. An attacker could potentially use this issue to retrieve...
Post Title
A vulnerability has been discovered in the Linux kernel, which could allow for data overwrite in arbitrary read-only files by non-privilege users. Linux is a...
CVE-2021-31805
The fix issued for CVE-2020-17530 was incomplete. So from Apache Struts 2.0.0 to 2.5.29, still some of the tag’s attributes could perform a double evaluation...
USN-5371-1: nginx vulnerabilities
It was discovered that nginx Lua module mishandled certain inputs. An attacker could possibly use this issue to perform an HTTP Request Smuggling attack. This...
CVE-2021-32040
It may be possible to have an extremely long aggregation pipeline in conjunction with a specific stage/operator and cause a stack overflow due to the...
Post Title
Multiple vulnerabilities have been discovered in Microsoft products, the most severe of which could allow for remote code execution in the context of the logged...