A CVSS score 9.8 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H severity vulnerability discovered by ‘Piotr Bazydlo (@chudypb) of Trend Micro Zero Day Initiative’ was reported to the affected vendor on: 2024-10-11, 0 days ago. The vendor is given until 2025-02-08 to publish a fix or workaround. Once the vendor has created and tested a patch we will coordinate the release of a public advisory.
More Stories
edk2-20240813-2.fc40
FEDORA-2024-45df72afc6 Packages in this update: edk2-20240813-2.fc40 Update description: Security fix for CVE-2023-6237 (openssl: Excessive time spent checking invalid RSA public...
edk2-20240813-2.fc41
FEDORA-2024-9cc95d56ce Packages in this update: edk2-20240813-2.fc41 Update description: Security fix for CVE-2023-6237 (openssl: Excessive time spent checking invalid RSA public...
USN-7063-1: Ubuntu Advantage Desktop Daemon vulnerability
Marco Trevisan discovered that the Ubuntu Advantage Desktop Daemon leaked the Pro token to unprivileged users by passing the token...
glibc-2.38-19.fc39
FEDORA-2024-df41d584d0 Packages in this update: glibc-2.38-19.fc39 Update description: Auto-sync with upstream branch release/2.38/master Add BuildRequires:gzip for compressed character maps and...
libgsf-1.14.53-1.fc39
FEDORA-2024-7d06f67cf5 Packages in this update: libgsf-1.14.53-1.fc39 Update description: Fixes for memory vulnerabilities. Read More
libgsf-1.14.53-1.fc41
FEDORA-2024-ff08c2b41a Packages in this update: libgsf-1.14.53-1.fc41 Update description: Fixes for memory vulnerabilities. Read More