This release contains fixes for the following vulnerabilities:
-
- CVE-2023-37920: python-certifi: Removal of e-Tugra root certificate
-
- CVE-2024-25062: libxml2: use-after-free in XMLReader
-
- CVE-2023-38709: httpd: HTTP response splitting
-
- CVE-2024-34064: jinja2: accepts keys containing non-attribute characters
-
- CVE-2023-7250: iperf3: possible denial of service
- CVE-2024-26306: iperf3: vulnerable to marvin attack if the authentication option is used
-
- CVE-2024-25629: c-ares: Out of bounds read in ares__read_line()
-
- CVE-2024-28182: nghttp2: CONTINUATION frames DoS
-
- CVE-2022-48624: less: missing quoting of shell metacharacters in LESSCLOSE handling
- CVE-2024-32487: less: OS command injection
-
- CVE-2024-3651: python-idna: potential DoS via resource consumption via specially crafted inputs to idna.encode()
-
- CVE-2023-2953: openldap: null pointer dereference in ber_memalloc_x function
-
- CVE-2024-35235: cups: Cupsd Listen arbitrary chmod 0140777
-
- CVE-2024-21131: OpenJDK: potential UTF8 size overflow (8314794)
- CVE-2024-21138: OpenJDK: Excessive symbol length can lead to infinite loop (8319859)
- CVE-2024-21140: OpenJDK: Range Check Elimination (RCE) pre-loop limit overflow (8320548)
- CVE-2024-21144: OpenJDK: Pack200 increase loading time due to improper header validation (8322106)
- CVE-2024-21145: OpenJDK: Out-of-bounds access in 2D image handling (8324559)
- CVE-2024-21147: OpenJDK: RangeCheckElimination array index overflow (8323231)
-
- CVE-2024-5564: libndp: buffer overflow in route information length field
-
- CVE-2024-38473: httpd: Encoding problem in mod_proxy
- CVE-2024-38474: httpd: Substitution encoding issue in mod_rewrite
- CVE-2024-38475: httpd: Improper escaping of output in mod_rewrite
- CVE-2024-38477: httpd: NULL pointer dereference in mod_proxy
- CVE-2024-39573: httpd: Potential SSRF in mod_rewrite
-
- CVE-2018-15209: libtiff: Heap-based buffer overflow in ChopUpSingleUncompressedStrip in tif_dirread.c
- CVE-2023-6228: libtiff: heap-based buffer overflow in cpStripToTile() in tools/tiffcp.c
- CVE-2023-25433: libtiff: Buffer Overflow via /libtiff/tools/tiffcrop.c
- CVE-2023-52356: libtiff: Segment fault in libtiff in TIFFReadRGBATileExt() leading to denial of service
-
- CVE-2024-38476: httpd: Security issues via backend applications whose response headers are malicious or exploitable
-
- CVE-2024-38428: wget: Misinterpretation of input may lead to improper behavior
-
- CVE-2024-37891: urllib3: proxy-authorization request header is not stripped during cross-origin redirects
-
- CVE-2024-37370: krb5: GSS message token handling
- CVE-2024-37371: krb5: GSS message token handling
-
- CVE-2024-1737: bind: bind9: BIND’s database will be slow if a very large number of RRs exist at the same nam
- CVE-2024-1975: bind9: bind: SIG(0) can be used to exhaust CPU resources
-
- CVE-2024-6345: pypa/setuptools: Remote code execution via download functions in the package_index module in pypa/setuptools
-
- CVE-2024-2398: curl: HTTP/2 push headers memory-leak
-
- CVE-2024-4317: postgresql: PostgreSQL pg_stats_ext and pg_stats_ext_exprs lack authorization checks
- CVE-2024-7348: postgresql: PostgreSQL relation replacement during pg_dump executes arbitrary SQL
-
- CVE-2024-6655: gtk3: gtk2: Library injection from CWD
-
- CVE-2024-4032: python: incorrect IPv4 and IPv6 private ranges
- CVE-2024-6232: python: cpython: tarfile: ReDos via excessive backtracking while parsing header values
- CVE-2024-6923: cpython: python: email module doesn’t properly quotes newlines in email headers, allowing header injection
-
- CVE-2024-5742: nano: running
chmod
andchown
on the filename allows malicious user to replace the emergency file with a malicious symlink to a root-owned file
- CVE-2024-5742: nano: running
-
- CVE-2024-45490: libexpat: Negative Length Parsing Vulnerability in libexpat
- CVE-2024-45491: libexpat: Integer Overflow or Wraparound
- CVE-2024-45492: libexpat: integer overflow
-
- CVE-2024-5535: openssl: SSL_select_next_proto buffer overread
-
- CVE-2023-48161: giflib: Heap-Buffer Overflow during Image Saving in DumpScreen2RGB Function
- CVE-2024-21208: JDK: HTTP client improper handling of maxHeaderSize (8328286)
- CVE-2024-21210: JDK: Array indexing integer overflow (8328544)
- CVE-2024-21217: JDK: Unbounded allocation leads to out-of-memory error (8331446)
- CVE-2024-21235: JDK: Integer conversion error leads to incorrect range check (8332644)
-
- CVE-2024-7006: libtiff: NULL pointer dereference in tif_dirinfo.c
-
- CVE-2024-3596: freeradius: forgery attack
-
- CVE-2019-12900: bzip2: out-of-bounds write in function BZ2_decompress
-
- CVE-2024-50602: libexpat: expat: DoS via XML_ResumeParser
-
- CVE-2024-52530: libsoup: HTTP request smuggling via stripping null bytes from the ends of header names
- CVE-2024-52532: libsoup: infinite loop while reading websocket data
Comments
Please sign in to leave a comment.