USN-6615-1: MySQL vulnerabilities
Multiple security issues were discovered in MySQL and this update includes new upstream MySQL versions to fix these issues. MySQL has been updated to 8.0.36...
USN-6614-1: amanda vulnerability
It was discovered that amanda did not properly check certain arguments. A local unprivileged attacker could possibly use this issue to perform a privilege escalation...
A Vulnerability in Trend Micro uiAirSupport Could Allow for Arbitrary Code Execution
A vulnerability has been discovered in Trend Micro uiAirSupport, that could allow for arbitrary code execution. Trend Micro uiAirSupport is a support tool product made...
DSA-5611-1 glibc – security update
The Qualys Research Labs discovered several vulnerabilities in the GNU C Library's __vsyslog_internal() function (called by syslog() and vsyslog()). A heap-based buffer overflow (CVE-2023-6246), an...
USN-6605-2: Linux kernel (KVM) vulnerabilities
Lin Ma discovered that the netfilter subsystem in the Linux kernel did not properly validate network family support while creating a new netfilter table. A...
USN-6604-2: Linux kernel (Azure) vulnerabilities
It was discovered that the ASUS HID driver in the Linux kernel did not properly handle device removal, leading to a use-after-free vulnerability. A local...
USN-6613-1: Ceph vulnerability
Lucas Henry discovered that Ceph incorrectly handled specially crafted POST requests. An uprivileged user could use this to bypass Ceph's authorization checks and upload a...
USN-6612-1: TinyXML vulnerability
It was discovered that TinyXML incorrectly handled certain inputs. If a user or an automated system were tricked into opening a specially crafted XML file,...
Multiple Vulnerabilities in Jenkins Could Allow for Remote Code Execution
Multiple vulnerabilities have been discovered in Jenkins, the most severe of which could allow for remote code execution. Jenkins (Core) is an open source automation...
USN-6610-1: Firefox vulnerabilities
Multiple security issues were discovered in Firefox. If a user were tricked into opening a specially crafted website, an attacker could potentially exploit these to...