The video framework has memory overwriting caused by addition overflow. Successful exploitation of this vulnerability may affect availability.
Category Archives: Advisories
CVE-2021-46885
The video framework has memory overwriting caused by addition overflow. Successful exploitation of this vulnerability may affect availability.
CVE-2021-46881
The video framework has memory overwriting caused by addition overflow. Successful exploitation of this vulnerability may affect availability.
python3.6-3.6.15-18.fc39
FEDORA-2023-2415ca21a4
Packages in this update:
python3.6-3.6.15-18.fc39
Update description:
Automatic update for python3.6-3.6.15-18.fc39.
Changelog
* Fri May 26 2023 Charalampos Stratakis <cstratak@redhat.com> – 3.6.15-18
– Security fix for CVE-2023-24329
– Resolves: rhbz#2174013
python2.7-2.7.18-27.fc37
FEDORA-2023-953c2607d8
Packages in this update:
python2.7-2.7.18-27.fc37
Update description:
Fix for CVE-2023-24329
texlive-base-20210325-54.fc37
FEDORA-2023-d261122726
Packages in this update:
texlive-base-20210325-54.fc37
Update description:
Fix CVE-2023-32700
texlive-base-20220321-72.fc38
FEDORA-2023-38094d905c
Packages in this update:
texlive-base-20220321-72.fc38
Update description:
Fixes CVE-2023-32700. Also fixes issues with mptopdf.pl, thumb2pdf.pl, and mtxrun.
mingw-python-requests-2.31.0-1.fc38
FEDORA-2023-f3824383be
Packages in this update:
mingw-python-requests-2.31.0-1.fc38
Update description:
Update to requests-2.31.0.
ZDI-23-742: (0Day) Wacom Drivers for Windows Link Following Local Privilege Escalation Vulnerability
This vulnerability allows local attackers to escalate privileges on affected installations of Wacom Drivers for Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
ZDI-23-741: (0Day) Wacom Drivers for Windows Incorrect Permission Assignment Local Privilege Escalation Vulnerability
This vulnerability allows local attackers to escalate privileges on affected installations of Wacom Drivers for Windows. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.