Several vulnerabilities have been discovered in the Linux kernel that
may lead to a privilege escalation, denial of service or information
leaks.
Category Archives: Advisories
USN-5314-1: Firefox vulnerabilities
A use-after-free was discovered when removing an XSLT parameter in some
circumstances. If a user were tricked into opening a specially crafted
website, an attacker could exploit this to cause a denial of service, or
execute arbitrary code. (CVE-2022-26485)
A use-after-free was discovered in the WebGPU IPC framework. If a user
were tricked into opening a specially crafted website, an attacker could
exploit this to cause a denial of service, or execute arbitrary code.
(CVE-2022-26486)
DSA-5091 containerd – security update
Felix Wilhelm discovered that the containerd container runtime was
susceptible to information disclosure via malformed container images.
DSA-5090 firefox-esr – security update
Two security issues have been found in the Mozilla Firefox web browser,
which result in the execution of arbitrary code.
AST-2022-006: pjproject: unconstrained malformed multipart SIP message
Posted by Asterisk Security Team on Mar 04
Asterisk Project Security Advisory – AST-2022-006
Product Asterisk
Summary pjproject: unconstrained malformed multipart SIP
message
Nature of Advisory Out of bounds memory access
Susceptibility Remote unauthenticated sessions…
AST-2022-005: pjproject: undefined behavior after freeing a dialog set
Posted by Asterisk Security Team on Mar 04
Asterisk Project Security Advisory – AST-2022-005
Product Asterisk
Summary pjproject: undefined behavior after freeing a dialog
set
Nature of Advisory Denial of service
Susceptibility Remote unauthenticated sessions…
AST-2022-004: pjproject: integer underflow on STUN message
Posted by Asterisk Security Team on Mar 04
Asterisk Project Security Advisory – AST-2022-004
Product Asterisk
Summary pjproject: possible integer underflow on STUN
message
Nature of Advisory Arbitrary code execution
Susceptibility Remote unauthenticated sessions…
CVE-2021-20319
An improper signature verification vulnerability was found in coreos-installer. A specially crafted gzip installation image can bypass the image signature verification and as a consequence can lead to the installation of unsigned content. An attacker able to modify the original installation image can write arbitrary data, and achieve full access to the node being installed.
CVE-2021-20300
A flaw was found in OpenEXR’s hufUncompress functionality in OpenEXR/IlmImf/ImfHuf.cpp. This flaw allows an attacker who can submit a crafted file that is processed by OpenEXR, to trigger an integer overflow. The highest threat from this vulnerability is to system availability.
CVE-2021-20302
A flaw was found in OpenEXR’s TiledInputFile functionality. This flaw allows an attacker who can submit a crafted single-part non-image to be processed by OpenEXR, to trigger a floating-point exception error. The highest threat from this vulnerability is to system availability.