16.07.2024 04:00 * bsc#1226040 Cross-References: * CVE-2024-6126
16.07.2024 04:00 * bsc#1219559 * bsc#1220664 * bsc#1221563 * bsc#1221854 * bsc#1222075
16.07.2024 04:00 Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.
15.07.2024 17:15 * bsc#1224122 * bsc#1226136 Cross-References: * CVE-2024-24786
14.07.2024 19:15 Vanilla upstream kernel version 6.6.37 fix bugs and vulnerabilities. For information about the vulnerabilities see the links. References: - https://bugs.mageia.org/show_bug.cgi?id=33374
14.07.2024 19:15 Due to an Out-of-bounds Write error when assigning ESI variables, Squid is susceptible to a Memory Corruption error. This error can lead to a Denial of Service attack. References:
14.07.2024 19:15 This vulnerability allows an attacker performing a meddler-in-the-middle attack between Palo Alto Networks PAN-OS firewall and a RADIUS server to bypass authentication and escalate privileges to ¢''superuser¢'' when RADIUS authentication is in use and either CHAP or PAP is selected in the RADIUS server profile.
13.07.2024 22:17 Upstream kernel version 6.6.37 fix bugs and vulnerabilities. The dwarves, kmod-virtualbox and kmod-xtables-addons packages have been updated to work with this new kernel. For information about the vulnerabilities see the links.
13.07.2024 22:17 This update fixes multiple CVEs and rebases to the latest upstream version: * Tue Jul 09 2024 Julien Rische - 1.21.3-1 - New upstream version - CVE-2024-26458: Memory leak in src/lib/rpc/pmap_rmt.c Resolves: rhbz#2266732
13.07.2024 22:17 Backport fix for CVE-2024-4067.
13.07.2024 22:17 Backport security fixes for CVE-2024-4216, CVE-2024-4068, CVE-2024-4067.
13.07.2024 02:00 * bsc#1216377 Cross-References: * CVE-2023-45803
13.07.2024 02:00 * bsc#1189936 * bsc#1190531 * bsc#935380 Cross-References:
13.07.2024 02:00 * bsc#1216293 Affected Products: * SUSE Linux Enterprise Micro 5.5
13.07.2024 02:00 * bsc#1216591 Cross-References: * CVE-2023-46316