FEDORA-2024-bf29e92de4
Packages in this update:
ovn-23.09.0-139.fc40
Update description:
Security fix for CVE-2024-2182 ovn: insufficient validation of BFD packets may lead to denial of service [fedora-all]
ovn-23.09.0-139.fc40
Security fix for CVE-2024-2182 ovn: insufficient validation of BFD packets may lead to denial of service [fedora-all]
chromium-122.0.6261.128-1.fc38
upstream security release 122.0.6261.128
High CVE-2024-2400: Use after free in Performance Manager
chromium-122.0.6261.128-1.fc39
upstream security release 122.0.6261.128
High CVE-2024-2400: Use after free in Performance Manager
baresip-3.10.1-1.fc38
Security Release (possible Denial of Service): A wrong or manipulated incoming RTP Timestamp can cause the baresip process to hang forever, for details see: #2954
aureceiver: fix mtx_unlock on discard
baresip-3.10.1-1.el9
Security Release (possible Denial of Service): A wrong or manipulated incoming RTP Timestamp can cause the baresip process to hang forever, for details see: #2954
aureceiver: fix mtx_unlock on discard
baresip-3.10.1-1.el7
Security Release (possible Denial of Service): A wrong or manipulated incoming RTP Timestamp can cause the baresip process to hang forever, for details see: #2954
aureceiver: fix mtx_unlock on discard
baresip-3.10.1-1.el8
Security Release (possible Denial of Service): A wrong or manipulated incoming RTP Timestamp can cause the baresip process to hang forever, for details see: #2954
aureceiver: fix mtx_unlock on discard
baresip-3.10.1-1.fc39
Security Release (possible Denial of Service): A wrong or manipulated incoming RTP Timestamp can cause the baresip process to hang forever, for details see: #2954
aureceiver: fix mtx_unlock on discard
libuev-2.4.1-1.el8
Security fix for CVE-2022-48620
USN-6663-1 provided a security update for OpenSSL.
This update provides the corresponding update for
Ubuntu 16.04 LTS.
Original advisory details:
As a security improvement, this update prevents OpenSSL
from returning an error when detecting wrong padding
in PKCS#1 v1.5 RSA, to prevent its use in possible
Bleichenbacher timing attacks.