Multiple security issues were discovered in Thunderbird, which could
result in denial of service, the execution of arbitrary code or leaks
of encrypted email subjects.
Category Archives: Advisories
USN-6702-2: Linux kernel vulnerabilities
It was discovered that the NVIDIA Tegra XUSB pad controller driver in the
Linux kernel did not properly handle return values in certain error
conditions. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-23000)
It was discovered that the ARM Mali Display Processor driver implementation
in the Linux kernel did not properly handle certain error conditions. A
local attacker could possibly use this to cause a denial of service (system
crash). (CVE-2023-23004)
Notselwyn discovered that the netfilter subsystem in the Linux kernel did
not properly handle verdict parameters in certain cases, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2024-1086)
It was discovered that a race condition existed in the SCSI Emulex
LightPulse Fibre Channel driver in the Linux kernel when unregistering FCF
and re-scanning an HBA FCF table, leading to a null pointer dereference
vulnerability. A local attacker could use this to cause a denial of service
(system crash). (CVE-2024-24855)
USN-6701-2: Linux kernel (GCP) vulnerabilities
Ruihan Li discovered that the bluetooth subsystem in the Linux kernel did
not properly perform permissions checks when handling HCI sockets. A
physically proximate attacker could use this to cause a denial of service
(bluetooth communication). (CVE-2023-2002)
It was discovered that the NVIDIA Tegra XUSB pad controller driver in the
Linux kernel did not properly handle return values in certain error
conditions. A local attacker could use this to cause a denial of service
(system crash). (CVE-2023-23000)
It was discovered that Spectre-BHB mitigations were missing for Ampere
processors. A local attacker could potentially use this to expose sensitive
information. (CVE-2023-3006)
It was discovered that the ext4 file system implementation in the Linux
kernel did not properly handle block device modification while it is
mounted. A privileged attacker could use this to cause a denial of service
(system crash) or possibly expose sensitive information. (CVE-2023-34256)
Eric Dumazet discovered that the netfilter subsystem in the Linux kernel
did not properly handle DCCP conntrack buffers in certain situations,
leading to an out-of-bounds read vulnerability. An attacker could possibly
use this to expose sensitive information (kernel memory). (CVE-2023-39197)
It was discovered that the Siano USB MDTV receiver device driver in the
Linux kernel did not properly handle device initialization failures in
certain situations, leading to a use-after-free vulnerability. A physically
proximate attacker could use this cause a denial of service (system crash).
(CVE-2023-4132)
Pratyush Yadav discovered that the Xen network backend implementation in
the Linux kernel did not properly handle zero length data request, leading
to a null pointer dereference vulnerability. An attacker in a guest VM
could possibly use this to cause a denial of service (host domain crash).
(CVE-2023-46838)
It was discovered that a race condition existed in the AppleTalk networking
subsystem of the Linux kernel, leading to a use-after-free vulnerability. A
local attacker could use this to cause a denial of service (system crash)
or possibly execute arbitrary code. (CVE-2023-51781)
Alon Zahavi discovered that the NVMe-oF/TCP subsystem of the Linux kernel
did not properly handle connect command payloads in certain situations,
leading to an out-of-bounds read vulnerability. A remote attacker could use
this to expose sensitive information (kernel memory). (CVE-2023-6121)
It was discovered that the ext4 file system implementation in the Linux
kernel did not properly handle the remount operation in certain cases,
leading to a use-after-free vulnerability. A local attacker could use this
to cause a denial of service (system crash) or possibly expose sensitive
information. (CVE-2024-0775)
Notselwyn discovered that the netfilter subsystem in the Linux kernel did
not properly handle verdict parameters in certain cases, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2024-1086)
It was discovered that a race condition existed in the SCSI Emulex
LightPulse Fibre Channel driver in the Linux kernel when unregistering FCF
and re-scanning an HBA FCF table, leading to a null pointer dereference
vulnerability. A local attacker could use this to cause a denial of service
(system crash). (CVE-2024-24855)
USN-6707-1: Linux kernel vulnerabilities
Lonial Con discovered that the netfilter subsystem in the Linux kernel did
not properly handle element deactivation in certain cases, leading to a
use-after-free vulnerability. A local attacker could use this to cause a
denial of service (system crash) or possibly execute arbitrary code.
(CVE-2024-1085)
Notselwyn discovered that the netfilter subsystem in the Linux kernel did
not properly handle verdict parameters in certain cases, leading to a use-
after-free vulnerability. A local attacker could use this to cause a denial
of service (system crash) or possibly execute arbitrary code.
(CVE-2024-1086)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
– Network drivers;
– PWM drivers;
(CVE-2024-26597, CVE-2024-26599)
USN-6706-1: Linux kernel (OEM) vulnerability
It was discovered that the Microchip USB Ethernet driver in the Linux
kernel contained a race condition during device removal, leading to a use-
after-free vulnerability. A physically proximate attacker could use this to
cause a denial of service (system crash).
ghc-base64-0.4.2.4-28.fc40 ghc-hakyll-4.16.2.0-4.fc40 ghc-isocline-1.0.9-28.fc40 ghc-toml-parser-1.3.2.0-29.fc40 gitit-0.15.1.1-6.fc40 pandoc-3.1.3-29.fc40 pandoc-cli-3.1.3-29.fc40 patat-0.11.0.0-1.fc40
FEDORA-2024-7d83cbccb6
Packages in this update:
ghc-base64-0.4.2.4-28.fc40
ghc-hakyll-4.16.2.0-4.fc40
ghc-isocline-1.0.9-28.fc40
ghc-toml-parser-1.3.2.0-29.fc40
gitit-0.15.1.1-6.fc40
pandoc-3.1.3-29.fc40
pandoc-cli-3.1.3-29.fc40
patat-0.11.0.0-1.fc40
Update description:
Security fix for CVE-2023-35936 and CVE-2023-38745
pandoc:
backport fixes for CVE-2023-35936 and CVE-2023-38745
pandoc-cli:
new package for pandoc binary
patat:
update to 0.11.0.0 and enable tests
base64, isocline, toml-parser: now packaged in Fedora
csmock-3.5.3-1.el9
FEDORA-EPEL-2024-626c1844b4
Packages in this update:
csmock-3.5.3-1.el9
Update description:
update to latest upstream (fixes CVE-2024-2243)
csmock-3.5.3-1.fc38
FEDORA-2024-816ffc9598
Packages in this update:
csmock-3.5.3-1.fc38
Update description:
update to latest upstream (fixes CVE-2024-2243)
csmock-3.5.3-1.el7
FEDORA-EPEL-2024-346421d49b
Packages in this update:
csmock-3.5.3-1.el7
Update description:
update to latest upstream (fixes CVE-2024-2243)
csmock-3.5.3-1.el8
FEDORA-EPEL-2024-4f9d0665fa
Packages in this update:
csmock-3.5.3-1.el8
Update description:
update to latest upstream (fixes CVE-2024-2243)