Post Content
Category Archives: Advisories
GLSA 202407-06: cryptography: Multiple Vulnerabilities
GLSA 202407-05: SSSD: Command Injection
GLSA 202407-04: Pixman: Heap Buffer Overflow
GLSA 202407-03: Liferea: Remote Code Execution
GLSA 202407-02: SDL_ttf: Arbitrary Memory Write
GLSA 202407-01: Zsh: Prompt Expansion Vulnerability
DSA-5724-1 openssh – security update
Read Time:33 Second
The Qualys Threat Research Unit (TRU) discovered that OpenSSH, an
implementation of the SSH protocol suite, is prone to a signal handler
race condition. If a client does not authenticate within LoginGraceTime
seconds (120 by default), then sshd’s SIGALRM handler is called
asynchronously and calls various functions that are not
async-signal-safe. A remote unauthenticated attacker can take advantage
of this flaw to execute arbitrary code with root privileges. This flaw
affects sshd in its default configuration.
Details can be found in the Qualys advisory at
https://www.qualys.com/2024/07/01/cve-2024-6387/regresshion.txt
GLSA 202407-09: OpenSSH: Remote Code Execution
netatalk-3.2.1-1.fc40
Read Time:9 Second
FEDORA-2024-900475e0f7
Packages in this update:
netatalk-3.2.1-1.fc40
Update description:
Security fix for CVE-2024-38439, CVE-2024-38440, and CVE-2024-38441