Ubuntu Security Notice 7117-2 - USN-7117-1 fixed vulnerabilities in needrestart. The update introduced a regression in needrestart. This update fixes the problem. Qualys discovered that needrestart passed unsanitized data to a library which expects safe input. A local attacker could possibly use this issue to execute arbitrary code as root.
6045c90f6a06c6c706541b8ae686bc492ee7f2e736d368452534e35f1f2ef3cc
Red Hat Security Advisory 2024-10289-03 - An update for the container-tools:rhel8 module is now available for Red Hat Enterprise Linux 8. Issues addressed include denial of service and traversal vulnerabilities.
8cca4c9205ce2f835d3b0321f2fa4f2c71a7019bac0421b61c1d3c39ae209621
Red Hat Security Advisory 2024-10208-03 - A security update is now available for Red Hat JBoss Enterprise Application Platform 7.1 for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link in the References section. Issues addressed include HTTP request smuggling, bypass, code execution, denial of service, deserialization, and server-side request forgery vulnerabilities.
1be50ed3f0a1d5e14687d762fbbe47df06e17f66fd138daa3f501a9c0ccab181
Red Hat Security Advisory 2024-10207-03 - A security update is now available for Red Hat JBoss Enterprise Application Platform 7.3 for Red Hat Enterprise Linux 7. Issues addressed include code execution, denial of service, deserialization, server-side request forgery, and remote SQL injection vulnerabilities.
343cb5fb94b59bea978bd46cc9decc908df0d1bd6a97176d1b08655cf893112a
Red Hat Security Advisory 2024-10145-03 - Red Hat OpenShift Container Platform release 4.15.39 is now available with updates to packages and images that fix several bugs and add enhancements. Issues addressed include denial of service and resource exhaustion vulnerabilities.
73a93e04d409e26c93b78ea9a11924822a78f415c73be9d30adfbe6d14f5568a
Debian Linux Security Advisory 5818-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.
b10cf31b1e59a50271e644e96c8fcafc944012327273a87c01f28f6ddce9d4d0
Red Hat Security Advisory 2024-9926-03 - An update for buildah is now available for Red Hat Enterprise Linux 9.4 Extended Update Support. Issues addressed include denial of service and traversal vulnerabilities.
be7fcac98ce4ffecfc494505f1814dbd923db9776458125a237639fc9c9dd1f9
Red Hat Security Advisory 2024-9901-03 - An update for tigervnc is now available for Red Hat Enterprise Linux 7 Extended Lifecycle Support. Issues addressed include buffer overflow and privilege escalation vulnerabilities.
1ee037d2b2560079e04d7b58618fd1d81bc26baace66f90d538c4acc717409e9
Red Hat Security Advisory 2024-9820-03 - An update for tigervnc is now available for Red Hat Enterprise Linux 8.6 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.6 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.6 Telecommunications Update Service. Issues addressed include buffer overflow and privilege escalation vulnerabilities.
234e615a33b379adaa327ae2226ef16035852b364ffeede1bb96df2cc9ee91af
Red Hat Security Advisory 2024-9819-03 - An update for tigervnc is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions, and Red Hat Enterprise Linux 8.4 Telecommunications Update Service. Issues addressed include buffer overflow and privilege escalation vulnerabilities.
b38dddfa49701b72f2ebe53c38d12ce6d0763b0a4ec7dfca65b4ee760d26d120
Red Hat Security Advisory 2024-9818-03 - An update for tigervnc is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support. Issues addressed include buffer overflow and privilege escalation vulnerabilities.
a4c80313980409b9029c987d183f8bc9042dea4ac72def694fc6024b1b02c94a
Red Hat Security Advisory 2024-9816-03 - An update for tigervnc is now available for Red Hat Enterprise Linux 9.4 Extended Update Support. Issues addressed include buffer overflow and privilege escalation vulnerabilities.
159a49610d5e72da2192c672cca7957be2fc108ab6729bad468c02d0a19b031e
Red Hat Security Advisory 2024-9623-03 - Red Hat OpenShift Container Platform release 4.14.41 is now available with updates to packages and images that fix several bugs and add enhancements. Issues addressed include denial of service and resource exhaustion vulnerabilities.
d9c2fd3f272b767540e7376354b4a8fe23bcb932b302034cefad0cd406e43e8e
Red Hat Security Advisory 2024-9620-03 - Red Hat OpenShift Container Platform release 4.14.41 is now available with updates to packages and images that fix several bugs and add enhancements. Issues addressed include cross site scripting and denial of service vulnerabilities.
7c7df799ff00c8fbe353a20cd00c851d09a904b23c82feb782b368b4444343a5
Red Hat Security Advisory 2024-9618-03 - Red Hat OpenShift Container Platform release 4.16.23 is now available with updates to packages and images that fix several bugs and add enhancements. Issues addressed include denial of service and resource exhaustion vulnerabilities.
3d5b2b493ee299849f15f8d8ba608fab29d2ff68d881a7ec476a2c2845bf49b5
Red Hat Security Advisory 2024-9613-03 - Red Hat OpenShift Container Platform release 4.17.5 is now available with updates to packages and images that fix several bugs and add enhancements. Issues addressed include denial of service and resource exhaustion vulnerabilities.
2e72b9c2dab3203152840efc72052f42b83d27d060d18b80f1fc68a9818546b5
Red Hat Security Advisory 2024-10090-03 - An update for tigervnc is now available for Red Hat Enterprise Linux 9. Issues addressed include buffer overflow and privilege escalation vulnerabilities.
e7ed8cbfa7c10af5c1617844572a7d53796130e322f8939ff52d576036e0999c
This Metasploit module exploits vulnerabilities in OpenPrinting CUPS, which is running by default on most Linux distributions. The vulnerabilities allow an attacker on the LAN to advertise a malicious printer that triggers remote code execution when a victim sends a print job to the malicious printer. Successful exploitation requires user interaction, but no CUPS services need to be reachable via accessible ports. Code execution occurs in the context of the lp user. Affected versions are cups-browsed less than or equal to 2.0.1, libcupsfilters versions 2.1b1 and below, libppd versions 2.1b1 and below, and cups-filters versions 2.0.1 and below.
16431cc7dbb038947f886cccbda9ff1e8abb4ffdc1cbb4066839871766422f13
Qualys discovered that needrestart suffers from multiple local privilege escalation vulnerabilities that allow for root access from an unprivileged user.
5e1a7285b40cf60a49ec4d0075d1398f00688905145e895ec8cd09d0cc0d9564
SEH utnservyer Pro version 20.1.22 suffers from multiple persistent cross site scripting vulnerabilities.
8a817f7a2f70f702d665df042fc9c3e7290ebdec05e9d80aed3e21cb27a39f2b
Ubuntu Security Notice 7015-6 - USN-7015-5 fixed vulnerabilities in python2.7. The update introduced several minor regressions. This update fixes the problem. It was discovered that the Python email module incorrectly parsed email addresses that contain special characters. A remote attacker could possibly use this issue to bypass certain protection mechanisms. It was discovered that Python allowed excessive backtracking while parsing certain tarfile headers. A remote attacker could possibly use this issue to cause Python to consume resources, leading to a denial of service. It was discovered that the Python email module incorrectly quoted newlines for email headers. A remote attacker could possibly use this issue to perform header injection. It was discovered that the Python http.cookies module incorrectly handled parsing cookies that contained backslashes for quoted characters. A remote attacker could possibly use this issue to cause Python to consume resources, leading to a denial of service. It was discovered that the Python zipfile module incorrectly handled certain malformed zip files. A remote attacker could possibly use this issue to cause Python to stop responding, resulting in a denial of service.
667ae966414c566b7ba032fe92060c7e3cfb42504b259cece2ff73a5eb36f7f3
Apple Security Advisory 11-19-2024-5 - macOS Sequoia 15.1.1 addresses code execution vulnerabilities.
673b14a99725a70874faebe9587a107cc5fbae5423965b93d84ad6e8a0b21673
Red Hat Security Advisory 2024-9690-03 - An update for tigervnc is now available for Red Hat Enterprise Linux 8.8 Extended Update Support. Issues addressed include buffer overflow and privilege escalation vulnerabilities.
e06e4b3943cb9cd32e98e0796f2b8793271bd95d04ead69e6376bb29edfd77b0
Apple Security Advisory 11-19-2024-4 - iOS 17.7.2 and iPadOS 17.7.2 addresses code execution vulnerabilities.
25e2616d143e5a6c02a25baf655b4c3ddde1a0de992a7276ba8e26c156982841
Red Hat Security Advisory 2024-9679-03 - An update for webkit2gtk3 is now available for Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support, Red Hat Enterprise Linux 8.4 Telecommunications Update Service, and Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions. Issues addressed include code execution, out of bounds read, and use-after-free vulnerabilities.
a072c4a79a7fba3d9f798f6c536dc83e6ba851f5eaf528700d2eb523fe8015bd