Category Archives: Advisories

3 vulnerabilities in Palo Alto Deep Packet Inspection mechanism

Read Time:21 Second

Posted by Pierre Kim on Apr 02

## Advisory Information

Title: 3 vulnerabilities in Palo Alto Deep Packet Inspection mechanism
Advisory URL: https://pierrekim.github.io/advisories/2025-palo-alto-dpi.txt
Blog URL: https://pierrekim.github.io/blog/2025-03-31-paloalto-dpi-3-vulnerabilities.html
Date published: 2025-03-31
Vendors contacted: Palo Alto
Release mode: Released
CVE: None

## Product description

## Vulnerabilities Summary

Vulnerable versions: all versions of Palo Alto…

Read More

10 vulnerabilities in Brocade Fibre Channel switches

Read Time:22 Second

Posted by Pierre Kim on Apr 02

## Advisory Information

Title: 10 vulnerabilities in Brocade Fibre Channel switches
Advisory URL: https://pierrekim.github.io/advisories/2025-brocade-switches.txt
Blog URL: https://pierrekim.github.io/blog/2025-03-31-brocade-switches-10-vulnerabilities.html
Date published: 2025-03-31
Vendors contacted: Brocade
Release mode: Released
CVE: CVE-2021-27797, CVE-2022-33186, CVE-2023-3454, CVE-2024-5460,
CVE-2024-5461, CVE-2024-7516

## Product…

Read More

Multiple Vulnerabilities in IBM AIX could allow for arbitrary code execution.

Read Time:34 Second

Multiple vulnerabilities have been discovered in IBM AIX, the most severe of which could allow for arbitrary code execution. IBM AIX is a secure and reliable Unix operating system designed for IBM’s Power Systems. It supports modern applications and provides strong security features, making it ideal for mission-critical business environments. Successful exploitation of these vulnerabilities could allow for arbitrary code execution in the context of the affected system. Depending on the privileges associated with the account, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Accounts with fewer privileges on the system could be less impacted than those with administrative user rights.

Read More

cri-o1.31-1.31.7-1.fc43

Read Time:42 Second

FEDORA-2025-556d8c02d7

Packages in this update:

cri-o1.31-1.31.7-1.fc43

Update description:

Automatic update for cri-o1.31-1.31.7-1.fc43.

Changelog

* Wed Apr 2 2025 Bradley G Smith <bradley.g.smith@gmail.com> – 1.31.7-1
– Update to release v1.31.7
– Resolves FTBFS due to changes in license detector
– Upstream fix
* Fri Mar 21 2025 Bradley G Smith <bradley.g.smith@gmail.com> – 1.31.6-2
– Resolve CVE-2024-40635 and CVE-2025-22870 and CVE-2025-27144
– Resolves rhbz#2352147, rhbz#2353096, rhbz#2347476
– Update vendored go modules: golang.org/x/net v0.34.0 to
v0.36.0 github.com/containerd/containerd v1.7.24 to v1.7.27
github.com/go-jose/go-jose/v4 v4.0.2 to v4.0.5

Read More

DSA-5892-1 atop – security update

Read Time:24 Second

It was discovered that Atop, a monitor tool for system resources and
process activity, always tried to connect to the port of atopgpud
(an additional daemon gathering GPU statistics not shipped in Debian)
while performing insufficient sanitising of the data read from this
port.

With this update, additional validation is added and by default atop
no longer tries to connect to the atopgpud daemon port unless explicitly
enabled via -k.

https://security-tracker.debian.org/tracker/DSA-5892-1

Read More

zabbix7.0-7.0.11-1.el8

Read Time:17 Second

FEDORA-EPEL-2025-01e745cb85

Packages in this update:

zabbix7.0-7.0.11-1.el8

Update description:

Update to 7.0.11

CVE-2024-36465, CVE-2024-36469, CVE-2024-42325, CVE-2024-45699, CVE-2024-45700
Re-install SELinux module in %%posttrans to address “upgrade” from zabbixA.B to zabbixX.Y in one transaction

Read More