A flaw was found in the Linux kernels implementation of audit rules, where a syscall can unexpectedly not be correctly not be logged by the audit subsystem
Category Archives: Advisories
CVE-2021-1000
In createBluetoothDeviceSlice of ConnectedDevicesSliceProvider.java, there is a possible permission bypass due to an unsafe PendingIntent. This could lead to local escalation of privilege with no additional execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-185190688
CVE-2021-1033
In createGeneralSlice of ConnectedDevicesSliceProvider.java.java, there is a possible permission bypass due to an unsafe PendingIntent. This could lead to local escalation of privilege with User execution privileges needed. User interaction is not needed for exploitation.Product: AndroidVersions: Android-12LAndroid ID: A-185247656
USN-5356-1: DOSBox vulnerabilities
Alexandre Bartel discovered that DOSBox incorrectly handled
long lines in certain files. An attacker could possibly use
this issue to execute arbitrary code. (CVE-2019-7165)
Alexandre Bartel discovered that DOSBox incorrectly performed
access control over certain directories. An attacker could
possibly use this issue to execute arbitrary code.
(CVE-2019-12594)
[R1] Nessus Versions 8.15.4 and 10.1.2 Fix One Third-Party Vulnerability
Out of caution and in line with best practice, Tenable has opted to upgrade OpenSSL to address the potential impact of the issue. Nessus 8.15.4 and Nessus 10.1.2 update OpenSSL to version 1.1.1n to address the identified vulnerability.
USN-5355-1: zlib vulnerability
Danilo Ramos discovered that zlib incorrectly handled memory when
performing certain deflating operations. An attacker could use this issue
to cause zlib to crash, resulting in a denial of service, or possibly
execute arbitrary code.
bijiben-stable-3520211209084351.3 darktable-stable-3520211006132303.5 evolution-stable-3520211208122809.2 firefox-stable-3520220222133031.2 geary-stable-3520211209084524.2 gimp-stable-3520211027082858.3 gnome-maps-stable-3520211208123101.2 hydrapaper-stable-3520211015150021.2 inkscape-stable-3520211112074856.3 libreoffice-stable-3520220111091453.3 quearcode-stable-3520211015120106.2 ricochet-stable-3520211015121522.2 thunderbird-stable-3520211109101458.2
FEDORA-FLATPAK-2022-79fb2d1d63
Packages in this update:
bijiben-stable-3520211209084351.3
darktable-stable-3520211006132303.5
evolution-stable-3520211208122809.2
firefox-stable-3520220222133031.2
geary-stable-3520211209084524.2
gimp-stable-3520211027082858.3
gnome-maps-stable-3520211208123101.2
hydrapaper-stable-3520211015150021.2
inkscape-stable-3520211112074856.3
libreoffice-stable-3520220111091453.3
quearcode-stable-3520211015120106.2
ricochet-stable-3520211015121522.2
thunderbird-stable-3520211109101458.2
Update description:
Fedora Flatpaks update that is fixing the current security issues.
USN-5354-1: Twisted vulnerabilities
It was discovered that Twisted incorrectly filtered HTTP headers when clients
are being redirected to another origin. A remote attacker could use this issue
to obtain sensitive information. (CVE-2022-21712)
It was discovered that Twisted incorrectly processed SSH handshake data on
connection establishments. A remote attacker could use this issue to cause
Twisted to crash, resulting in a denial of service. (CVE-2022-21716)
Post Title
Multiple vulnerabilities have been discovered in Google Chrome, the most severe of which could allow for arbitrary code execution. Google Chrome is a web browser used to access the Internet. Successful exploitation of the most severe of these vulnerabilities could allow an attacker to execute arbitrary code in the context of the browser. Depending on the privileges associated with the application, an attacker could view, change, or delete data. If this application has been configured to have fewer user rights on the system, exploitation of the most severe of these vulnerabilities could have less impact than if it was configured with administrative rights.
CVE-2020-24769
SQL injection vulnerability in takeconfirm.php in NexusPHP 1.5 allows remote attackers to execute arbitrary SQL commands via the classes parameter.