FEDORA-2024-f3c8d05888
Packages in this update:
fluent-bit-3.0.4-1.fc39
Update description:
Update to 3.0.4
fluent-bit-3.0.4-1.fc39
Update to 3.0.4
fluent-bit-3.0.4-1.el9
Update to 3.0.4
It was discovered that the Intel Data Streaming and Intel Analytics
Accelerator drivers in the Linux kernel allowed direct access to the
devices for unprivileged users and virtual machines. A local attacker could
use this to cause a denial of service. (CVE-2024-21823)
A security issue was discovered in the Linux kernel.
An attacker could possibly use it to compromise the system.
This update corrects flaws in the following subsystem:
– Netfilter;
(CVE-2024-26924)
Muqing Liu and neoni discovered that Apport incorrectly handled detecting
if an executable was replaced after a crash. A local attacker could
possibly use this issue to execute arbitrary code as the root user.
(CVE-2021-3899)
Gerrit Venema discovered that Apport incorrectly handled connections to
Apport sockets inside containers. A local attacker could possibly use this
issue to connect to arbitrary sockets as the root user. (CVE-2022-1242)
Gerrit Venema discovered that Apport incorrectly handled user settings
files. A local attacker could possibly use this issue to cause Apport to
consume resources, leading to a denial of service. (CVE-2022-28652)
Gerrit Venema discovered that Apport did not limit the amount of logging
from D-Bus connections. A local attacker could possibly use this issue to
fill up the Apport log file, leading to a denial of service.
(CVE-2022-28654)
Gerrit Venema discovered that Apport did not filter D-Bus connection
strings. A local attacker could possibly use this issue to cause Apport to
make arbitrary network connections. (CVE-2022-28655)
Gerrit Venema discovered that Apport did not limit the amount of memory
being consumed during D-Bus connections. A local attacker could possibly
use this issue to cause Apport to consume memory, leading to a denial of
service. (CVE-2022-28656)
Gerrit Venema discovered that Apport did not disable the python crash
handler before chrooting into a container. A local attacker could possibly
use this issue to execute arbitrary code. (CVE-2022-28657)
Gerrit Venema discovered that Apport incorrectly handled filename argument
whitespace. A local attacker could possibly use this issue to spoof
arguments to the Apport daemon. (CVE-2022-28658)
yt-dlp-2024.07.09-1.fc39
Update to 2024.07.09
Update to 2024.07.07
Update to 2024.07.02
It was discovered that a race condition existed in the Bluetooth subsystem
in the Linux kernel when modifying certain settings values through debugfs.
A privileged local attacker could use this to cause a denial of service.
(CVE-2024-24857, CVE-2024-24858, CVE-2024-24859)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
– ARM64 architecture;
– RISC-V architecture;
– S390 architecture;
– x86 architecture;
– Block layer subsystem;
– Compute Acceleration Framework;
– Accessibility subsystem;
– Android drivers;
– Drivers core;
– Bluetooth drivers;
– Clock framework and drivers;
– Data acquisition framework and drivers;
– Cryptographic API;
– Buffer Sharing and Synchronization framework;
– GPU drivers;
– On-Chip Interconnect management framework;
– IOMMU subsystem;
– Multiple devices driver;
– Media drivers;
– VMware VMCI Driver;
– Network drivers;
– Microsoft Azure Network Adapter (MANA) driver;
– Device tree and open firmware driver;
– Chrome hardware platform drivers;
– i.MX PM domains;
– TI SCI PM domains driver;
– S/390 drivers;
– SCSI drivers;
– SPI subsystem;
– Thermal drivers;
– TTY drivers;
– USB subsystem;
– Framebuffer layer;
– BTRFS file system;
– Network file system server daemon;
– NILFS2 file system;
– File systems infrastructure;
– Pstore file system;
– SMB network file system;
– BPF subsystem;
– Bluetooth subsystem;
– Netfilter;
– io_uring subsystem;
– Core kernel;
– Extra boot config (XBC);
– Memory management;
– Amateur Radio drivers;
– B.A.T.M.A.N. meshing protocol;
– Ethernet bridge;
– Networking core;
– IPv4 networking;
– IPv6 networking;
– Multipath TCP;
– NFC subsystem;
– RDS protocol;
– Network traffic control;
– SMC sockets;
– Sun RPC protocol;
– TLS protocol;
– Unix domain sockets;
– Wireless networking;
– eXpress Data Path;
– SELinux security module;
(CVE-2024-35967, CVE-2024-35886, CVE-2024-26999, CVE-2024-27008,
CVE-2024-26988, CVE-2024-35980, CVE-2024-26982, CVE-2024-35946,
CVE-2024-35918, CVE-2024-27015, CVE-2024-35900, CVE-2024-35942,
CVE-2024-35879, CVE-2024-35961, CVE-2024-35944, CVE-2024-35934,
CVE-2024-35978, CVE-2024-35938, CVE-2024-27003, CVE-2024-35976,
CVE-2024-36019, CVE-2024-35880, CVE-2024-35866, CVE-2024-35929,
CVE-2024-35917, CVE-2024-35912, CVE-2024-35896, CVE-2024-26986,
CVE-2024-35951, CVE-2024-35958, CVE-2024-26997, CVE-2024-35965,
CVE-2024-35953, CVE-2024-26993, CVE-2024-26991, CVE-2024-35892,
CVE-2024-36026, CVE-2024-35882, CVE-2024-35964, CVE-2024-35865,
CVE-2024-35897, CVE-2024-26981, CVE-2024-35872, CVE-2024-36027,
CVE-2024-26983, CVE-2024-35909, CVE-2024-35985, CVE-2024-35875,
CVE-2024-35890, CVE-2024-26922, CVE-2024-26994, CVE-2024-35903,
CVE-2024-35936, CVE-2024-35904, CVE-2024-27013, CVE-2024-36025,
CVE-2024-26980, CVE-2024-27006, CVE-2024-35861, CVE-2024-35864,
CVE-2024-27018, CVE-2024-36022, CVE-2024-26990, CVE-2024-35968,
CVE-2024-35860, CVE-2024-36024, CVE-2024-35933, CVE-2024-27019,
CVE-2024-35925, CVE-2024-35950, CVE-2024-35915, CVE-2024-35916,
CVE-2024-35956, CVE-2024-36020, CVE-2024-35873, CVE-2024-27002,
CVE-2024-35963, CVE-2024-35959, CVE-2024-35937, CVE-2024-27011,
CVE-2024-27020, CVE-2024-35883, CVE-2024-35913, CVE-2024-35910,
CVE-2024-27021, CVE-2024-35921, CVE-2024-35905, CVE-2024-27010,
CVE-2024-35981, CVE-2024-35885, CVE-2024-35955, CVE-2024-35894,
CVE-2024-35969, CVE-2024-36018, CVE-2024-35867, CVE-2024-27007,
CVE-2024-35908, CVE-2024-26985, CVE-2024-27016, CVE-2024-35960,
CVE-2024-35935, CVE-2024-35932, CVE-2024-35957, CVE-2024-27001,
CVE-2024-35871, CVE-2024-35907, CVE-2024-35878, CVE-2024-35979,
CVE-2024-35972, CVE-2024-35975, CVE-2024-35877, CVE-2024-35926,
CVE-2024-26817, CVE-2024-35899, CVE-2024-27004, CVE-2024-35920,
CVE-2024-35924, CVE-2024-35977, CVE-2024-35930, CVE-2024-35911,
CVE-2024-26996, CVE-2024-27005, CVE-2024-35870, CVE-2024-35982,
CVE-2024-35895, CVE-2024-35943, CVE-2024-35902, CVE-2024-35919,
CVE-2024-35973, CVE-2024-35931, CVE-2024-35888, CVE-2024-35914,
CVE-2024-35970, CVE-2024-36023, CVE-2024-27012, CVE-2024-35939,
CVE-2024-26984, CVE-2024-35884, CVE-2024-35901, CVE-2024-26811,
CVE-2024-35966, CVE-2024-35891, CVE-2024-35887, CVE-2024-35945,
CVE-2024-35971, CVE-2024-35862, CVE-2024-26987, CVE-2024-26921,
CVE-2024-26989, CVE-2024-35952, CVE-2024-27009, CVE-2024-35893,
CVE-2024-26995, CVE-2024-26925, CVE-2024-35868, CVE-2024-35954,
CVE-2024-35922, CVE-2024-27000, CVE-2024-36021, CVE-2024-27014,
CVE-2024-35940, CVE-2024-26992, CVE-2024-26926, CVE-2024-35927,
CVE-2024-35863, CVE-2024-27022, CVE-2024-26998, CVE-2024-27017,
CVE-2024-26928, CVE-2024-35889, CVE-2024-35898, CVE-2024-35869,
CVE-2024-26936, CVE-2024-26923, CVE-2023-52699, CVE-2024-35974)
USN-6885-1 fixed vulnerabilities in Apache HTTP Server. One of the security
fixes introduced a regression when proxying requests to a HTTP/2 server.
This update fixes the problem.
We apologize for the inconvenience.
Original advisory details:
Marc Stern discovered that the Apache HTTP Server incorrectly handled
serving WebSocket protocol upgrades over HTTP/2 connections. A remote
attacker could possibly use this issue to cause the server to crash,
resulting in a denial of service. (CVE-2024-36387)
Orange Tsai discovered that the Apache HTTP Server mod_proxy module
incorrectly sent certain request URLs with incorrect encodings to backends.
A remote attacker could possibly use this issue to bypass authentication.
(CVE-2024-38473)
Orange Tsai discovered that the Apache HTTP Server mod_rewrite module
incorrectly handled certain substitutions. A remote attacker could possibly
use this issue to execute scripts in directories not directly reachable
by any URL, or cause a denial of service. Some environments may require
using the new UnsafeAllow3F flag to handle unsafe substitutions.
(CVE-2024-38474, CVE-2024-38475, CVE-2024-39573)
Orange Tsai discovered that the Apache HTTP Server incorrectly handled
certain response headers. A remote attacker could possibly use this issue
to obtain sensitive information, execute local scripts, or perform SSRF
attacks. (CVE-2024-38476)
Orange Tsai discovered that the Apache HTTP Server mod_proxy module
incorrectly handled certain requests. A remote attacker could possibly use
this issue to cause the server to crash, resulting in a denial of service.
(CVE-2024-38477)
It was discovered that the Apache HTTP Server incorrectly handled certain
handlers configured via AddType. A remote attacker could possibly use this
issue to obtain source code. (CVE-2024-39884)
suricata-6.0.20-1.el8
New bugfix and security update
suricata-6.0.20-1.fc39
New bugfix and security update
suricata-7.0.6-1.fc40
New bugfix and security update