USN-6993-1: Vim vulnerabilities

Read Time:30 Second

It was discovered that Vim incorrectly handled memory when closing a
window, leading to a double-free vulnerability. If a user was tricked
into opening a specially crafted file, an attacker could crash the
application, leading to a denial of service, or possibly achieve code
execution with user privileges. (CVE-2024-41957)

It was discovered that Vim incorrectly handled memory when adding a new
file to an argument list, leading to a use-after-free. If a user was
tricked into opening a specially crafted file, an attacker could crash
the application, leading to a denial of service. (CVE-2024-43374)

Read More

USN-6992-1: Firefox vulnerabilities

Read Time:47 Second

Multiple security issues were discovered in Firefox. If a user were
tricked into opening a specially crafted website, an attacker could
potentially exploit these to cause a denial of service, obtain sensitive
information across domains, or execute arbitrary code. (CVE-2024-8382,
CVE-2024-8383, CVE-2024-8386, CVE-2024-8387, CVE-2024-8389)

Nils Bars discovered that Firefox contained a type confusion vulnerability
when performing certain property name lookups. An attacker could
potentially exploit this issue to cause a denial of service, or execute
arbitrary code. (CVE-2024-8381)

It was discovered that Firefox did not properly manage memory during
garbage collection. An attacker could potentially exploit this issue to
cause a denial of service, or execute arbitrary code. (CVE-2024-8384)

Seunghyun Lee discovered that Firefox contained a type confusion
vulnerability when handling certain ArrayTypes. An attacker could
potentially exploit this issue to cause a denial of service, or execute
arbitrary code. (CVE-2024-8385)

Read More

Smashing Security podcast #383: The Godfather club, and AirTags to the rescue

Read Time:23 Second

There’s a whole new dating scam that could mean you end up out of pocket (or beaten up) after a first date with a glamorous admirer, and a woman in Los Alamos uses an Air Tag to entrap a thief.

Plus – don’t miss our featured interview with Maya Irvine of Sysdig.

All this, and a very bad Cockney accent, in the latest edition of the “Smashing Security” podcast by industry veterans Graham Cluley and Carole Theriault.

Read More

USN-6990-1: znc vulnerability

Read Time:12 Second

Johannes Kuhn (DasBrain) discovered that znc incorrectly handled
user input under certain operations. An attacker could possibly
use this issue to execute arbitrary code on a user’s system if
the user was tricked into joining a malicious server.

Read More

python-django4.2-4.2.16-1.fc40

Read Time:12 Second

FEDORA-2024-865828665c

Packages in this update:

python-django4.2-4.2.16-1.fc40

Update description:

urlize and urlizetrunc were subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.

Read More

python-django4.2-4.2.16-1.fc41

Read Time:12 Second

FEDORA-2024-b08735561c

Packages in this update:

python-django4.2-4.2.16-1.fc41

Update description:

urlize and urlizetrunc were subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.

Read More

python-django4.2-4.2.16-1.fc39

Read Time:12 Second

FEDORA-2024-28892f7c8f

Packages in this update:

python-django4.2-4.2.16-1.fc39

Update description:

urlize and urlizetrunc were subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.

Read More

News, Advisories and much more

Exit mobile version