Multiple security issues were discovered in Firefox. If a user were
tricked into opening a specially crafted website, an attacker could
potentially exploit these to cause a denial of service, obtain sensitive
information across domains, or execute arbitrary code. (CVE-2024-11692,
CVE-2024-11694, CVE-2024-11695, CVE-2024-11696, CVE-2024-11697,
CVE-2024-11699, CVE-2024-11701, CVE-2024-11704, CVE-2024-11705,
CVE-2024-11706, CVE-2024-11708)
Category Archives: Advisories
USN-7133-1: HAProxy vulnerability
Yuki Mogi discovered that HAProxy incorrectly handled the interpretation
of certain HTTP requests. A remote attacker could possibly use this issue
to perform a request smuggling attack and obtain sensitive information.
radare2-5.9.8-4.el10_0
FEDORA-EPEL-2024-acbed9a263
Packages in this update:
radare2-5.9.8-4.el10_0
Update description:
Bump radare2 to 5.9.8, iaito to 5.9.9, fixes CVE-2024-11858
iaito-5.9.9-2.fc41 radare2-5.9.8-4.fc41
FEDORA-2024-ac8d48e58a
Packages in this update:
iaito-5.9.9-2.fc41
radare2-5.9.8-4.fc41
Update description:
Bump radare2 to 5.9.8, iaito to 5.9.9, fixes CVE-2024-11858
iaito-5.9.9-2.el8 radare2-5.9.8-5.el8
FEDORA-EPEL-2024-f9e4479284
Packages in this update:
iaito-5.9.9-2.el8
radare2-5.9.8-5.el8
Update description:
Bump radare2 to 5.9.8, iaito to 5.9.9, fixes CVE-2024-11858
fix CVE-2024-48241
iaito-5.9.9-2.fc40 radare2-5.9.8-4.fc40
FEDORA-2024-d4d1e89e61
Packages in this update:
iaito-5.9.9-2.fc40
radare2-5.9.8-4.fc40
Update description:
Bump radare2 to 5.9.8, iaito to 5.9.9, fixes CVE-2024-11858
iaito-5.9.9-2.el9 radare2-5.9.8-4.el9
FEDORA-EPEL-2024-773cd93621
Packages in this update:
iaito-5.9.9-2.el9
radare2-5.9.8-4.el9
Update description:
Bump radare2 to 5.9.8, iaito to 5.9.9, fixes CVE-2024-11858
fix CVE-2024-48241
Multiple Vulnerabilities in Google Android OS Could Allow for Remote Code Execution
Multiple vulnerabilities have been discovered in Google Android OS, the most severe of which could allow for remote code execution. Android is an operating system developed by Google for mobile devices, including, but not limited to, smartphones, tablets, and watches. Successful exploitation of the most severe of these vulnerabilities could allow for remote code execution in the context of the logged on user. Depending on the privileges associated with the user an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Users whose accounts are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
tomcat-9.0.97-1.fc40
FEDORA-2024-59074d64e0
Packages in this update:
tomcat-9.0.97-1.fc40
Update description:
Automatic update for tomcat-9.0.97-1.fc40.
Changelog for tomcat
* Mon Dec 02 2024 Dimitris Soumis <dsoumis@redhat.com> – 1:9.0.97-1
– Update to version 9.0.97
– Resolves: rhbz#2327089
tomcat-9.0.97-1.fc41
FEDORA-2024-39c6bb9e06
Packages in this update:
tomcat-9.0.97-1.fc41
Update description:
Automatic update for tomcat-9.0.97-1.fc41.
Changelog for tomcat
* Mon Dec 02 2024 Dimitris Soumis <dsoumis@redhat.com> – 1:9.0.97-1
– Update to version 9.0.97
– Resolves: rhbz#2327090