Language Selection

English French German Italian Portuguese Spanish

LinuxSecurity.com Advisories

Syndicate content LinuxSecurity - Security Advisories
The central voice for Linux and Open Source security news.
Updated: 1 hour 7 min ago

Fedora 35: thefuck 2022-0f1653e269>

Tuesday 18th of January 2022 09:12:42 PM
Security fix for CVE-2021-34363

Fedora 35: btrbk 2022-a66734e7a2>

Tuesday 18th of January 2022 09:12:39 PM
Remove executable permissions from scripts in /usr/shar

Fedora 34: thefuck 2022-5aeda24c24>

Tuesday 18th of January 2022 08:54:38 PM
Security fix for CVE-2021-34363

Fedora 34: btrbk 2022-dc62389784>

Tuesday 18th of January 2022 08:54:35 PM
Remove executable permissions from scripts in /usr/share

Debian LTS: DLA-2888-1: nvidia-graphics-drivers security update>

Tuesday 18th of January 2022 04:42:16 PM
Multiple security vulnerabilities have been discovered in the NVIDIA binary driver and libraries that provide optimized hardware acceleration which may lead to denial of service, information disclosure or data corruption.

Mageia 2022-0025: wpa_supplicant security update>

Tuesday 18th of January 2022 03:30:56 PM
The implementations of SAE in hostapd before 2.10 and wpa_supplicant before 2.10 are vulnerable to side channel attacks as a result of cache access patterns. NOTE: this issue exists because of an incomplete fix for CVE-2019-9494.

Mageia 2022-0024: clamav security update>

Tuesday 18th of January 2022 03:30:55 PM
A vulnerability in the OOXML parsing module in Clam AntiVirus (ClamAV) Software version 0.104.1 and LTS version 0.103.4 and prior versions could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device. The vulnerability is due to improper checks that may result in an invalid pointer read. An attacker could

Mageia 2022-0023: vim security update>

Tuesday 18th of January 2022 03:30:54 PM
vim is vulnerable to Out-of-bounds Read (CVE-2022-0128) vim is vulnerable to Use After Free (CVE-2022-0156) vim is vulnerable to Heap-based Buffer Overflow (CVE-2022-0158) vim is vulnerable to Heap-based Buffer Overflow (CVE-2022-0213)

SciLinux: SLSA-2022-0162-1 Important: gegl on SL7.x x86_64>

Tuesday 18th of January 2022 03:25:40 PM
gegl: shell expansion via a crafted pathname (CVE-2021-45463) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE SL7 x86_64 gegl-0.2.0-19.el7_9.1.i686.rpm gegl-0.2.0-19.el7_9.1.x86_64.rpm gegl-debuginfo-0.2.0-19.el7_9.1.i686.rpm gegl-debuginfo-0.2.0-19.el7_9.1.x86_64.rpm gegl [More...]

Ubuntu 5234-1: Byobu vulnerability>

Tuesday 18th of January 2022 02:41:10 PM
Byobu could be made to expose sensitive information.

openSUSE: 2022:0111-1 important: virglrenderer>

Tuesday 18th of January 2022 01:24:10 PM
An update that fixes one vulnerability is now available.

RedHat: RHSA-2022-0163:01 Important: Cryostat security update>

Tuesday 18th of January 2022 01:12:41 PM
Updated RHEL-8 based Cryostat container images are now available Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

RedHat: RHSA-2022-0164:03 Important: Red Hat Single Sign-On 7.5.1 for>

Tuesday 18th of January 2022 01:12:12 PM
A new image is available for Red Hat Single Sign-On 7.5.1, running on OpenShift Container Platform 3.10 and 3.11, and 4.9. Red Hat Product Security has rated this update as having a security impact of important. A Common Vulnerability Scoring System (CVSS) base score,

RedHat: RHSA-2022-0162:02 Important: gegl security update>

Tuesday 18th of January 2022 01:11:58 PM
An update for gegl is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability

SciLinux: SLSA-2022-0143-1 Important: httpd on SL7.x x86_64>

Tuesday 18th of January 2022 12:52:14 PM
httpd: mod_lua: Possible buffer overflow when parsing multipart content (CVE-2021-44790) * httpd: mod_session: Heap overflow via a crafted SessionHeader value (CVE-2021-26691) * httpd: NULL pointer dereference via malformed requests (CVE-2021-34798) * httpd: Out-of-bounds write in ap_escape_quotes() via malicious input (CVE-2021-39275) For more details about the security issue(s), includin [More...]

Mageia 2022-0022: kernel-linus security update>

Tuesday 18th of January 2022 11:44:29 AM
This kernel-linus update is based on upstream 5.15.15 and fixes atleast the following security issues: A data leak flaw was found in the way XFS_IOC_ALLOCSP IOCTL in the XFS filesystem allowed for size increase of files with unaligned size. A

CentOS: CESA-2022-0124: Important CentOS 7 firefox >

Tuesday 18th of January 2022 08:44:03 AM
Upstream details at : https://access.redhat.com/errata/RHSA-2022:0124

Ubuntu 5233-1: ClamAV vulnerability>

Tuesday 18th of January 2022 08:08:55 AM
ClamAV could be made to crash if it opened a specially crafted file.

RedHat: RHSA-2022-0157:03 Important: kernel security update>

Tuesday 18th of January 2022 07:12:08 AM
An update for kernel is now available for Red Hat Enterprise Linux 6 Extended Lifecycle Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score,

RedHat: RHSA-2022-0158:02 Important: telnet security update>

Tuesday 18th of January 2022 07:11:58 AM
An update for telnet is now available for Red Hat Enterprise Linux 7.7 Advanced Update Support, Red Hat Enterprise Linux 7.7 Telco Extended Update Support, and Red Hat Enterprise Linux 7.7 Update Services for SAP Solutions.

More in Tux Machines

Typesort icon Title Author Replies Last Post
goblinxfc srlinuxx 26/04/2007 - 6:30pm
nixsys.com srlinuxx 24/09/2007 - 11:24pm
wolvixondisk srlinuxx 02/10/2007 - 10:49pm
arnybw srlinuxx 18/10/2007 - 3:39pm
webpathinlovelinux srlinuxx 07/02/2008 - 3:44pm
bluewhite srlinuxx 25/03/2008 - 10:44pm
pclos srlinuxx 15/06/2008 - 11:18pm
nixsys2 srlinuxx 18/08/2008 - 7:12am
nixsys3 srlinuxx 18/08/2008 - 7:22am
gg 480x60 srlinuxx 03/09/2008 - 11:55am