Ubuntu Security Notice 5588-1 - Zhenpeng Lin discovered that the network packet scheduler implementation in the Linux kernel did not properly remove all references to a route filter before freeing it in some situations. A local attacker could use this to cause a denial of service or execute arbitrary code.
c8138f69a8c06e65b975af0240dae6a5cb69db9fbed200da3133b6094fe228f2
Ubuntu Security Notice 5572-2 - Roger Pau Monné discovered that the Xen virtual block driver in the Linux kernel did not properly initialize memory pages to be used for shared communication with the backend. A local attacker could use this to expose sensitive information. Roger Pau Monné discovered that the Xen paravirtualization frontend in the Linux kernel did not properly initialize memory pages to be used for shared communication with the backend. A local attacker could use this to expose sensitive information.
819d4e70c8a85bb39a298c0e1b33e7cb57b7b32f8fc42a08ecacc83c7413ff95
Zeek is a powerful network analysis framework that is much different from the typical IDS you may know. While focusing on network security monitoring, Zeek provides a comprehensive platform for more general network traffic analysis as well. Well grounded in more than 15 years of research, Zeek has successfully bridged the traditional gap between academia and operations since its inception. Today, it is relied upon operationally in particular by many scientific environments for securing their cyber-infrastructure. Zeek's user community includes major universities, research labs, supercomputing centers, and open-science communities. This is the source code release.
3cd43ae446200e7e59a89a9bf8190d964f3198e517f5d4be9cc1daba67ba0b81
Ubuntu Security Notice 5585-1 - It was discovered that Jupyter Notebook incorrectly handled certain notebooks. An attacker could possibly use this issue of lack of Content Security Policy in Nbconvert to perform cross-site scripting attacks on the notebook server. This issue only affected Ubuntu 18.04 LTS. It was discovered that Jupyter Notebook incorrectly handled certain SVG documents. An attacker could possibly use this issue to perform cross-site scripting attacks. This issue only affected Ubuntu 18.04 LTS.
296f6e1f06cfb5264aea277d82f968896ead13963bf24d393b0bf2029eeac7cd
Red Hat Security Advisory 2022-6206-01 - The systemd packages contain systemd, a system and service manager for Linux, compatible with the SysV and LSB init scripts. It provides aggressive parallelism capabilities, uses socket and D-Bus activation for starting services, offers on-demand starting of daemons, and keeps track of processes using Linux cgroups. Issues addressed include a use-after-free vulnerability.
4477831c0a5ae6ceb89a728d88f7b92c5b239b30c993cc9ded0f6ee362b00bbb
For VM_PFNMAP VMAs, there is a race between unmap_mapping_range() and munmap() that can lead to a page being freed by a device driver while the page still has stale TLB entries.
0c343119926cb622181935b2b8688c9dde2b0e898e81a4a44edd9820611241df
Ubuntu Security Notice 5583-1 - It was discovered that systemd incorrectly handled certain DNS requests, which leads to user-after-free vulnerability. An attacker could possibly use this issue to cause a crash or execute arbitrary code.
293792542a9b77636a5533629b2bce3011b7a3fccbac1bc971f18f82dcd3eefa
Ubuntu Security Notice 5586-1 - It was discovered that SDL incorrectly handled memory. An attacker could potentially use this issue to cause a denial of service or other unexpected behavior.
74d7023abf8fd55dd30fdf1a48cdb649dc88bf002dadfe6cae4452932a1a2fb2
KVM instruction emulation can run while KVM_VCPU_PREEMPTED is set, which can lead other vcpus to skip sending TLB flush IPIs. As a consequence, KVM instruction emulation can access memory through stale translations when the guest kernel thinks it has flushed all cached translations. This could potentially be used by unprivileged userspace inside a guest to compromise the guest kernel.
16fd49b64aee26c8f9a9ad6cb4265e74537f37bede65109a50798f82ac77833b
Aaron Adams discovered that the netfilter subsystem in the Linux kernel did not properly handle the removal of stateful expressions in some situations, leading to a use-after-free vulnerability. Ziming Zhang discovered that the netfilter subsystem in the Linux kernel did not properly validate sets with multiple ranged fields. It was discovered that the implementation of POSIX timers in the Linux kernel did not properly clean up timers in some situations. Various other vulnerabilities were also discovered.
05867268c3cb4a38f1e83386efef57668577cf6a6daf5f223e85f17b2010f8e2
Ubuntu Security Notice 5584-1 - It was discovered that Schroot incorrectly handled certain Schroot names. An attacker could possibly use this issue to break schroot's internal state causing a denial of service.
a085a291d3bdbe1fdf919c2645df24cbb46222f28afb0ee7cb2d21a03cd241dd
AeroCMS version 0.0.1 suffers from a remote SQL injection vulnerability.
6ad6e0c3d5d0d42b2784f9f7f7a8d4b0d53123b46c7de609a3173db9ed01f80a
Debian Linux Security Advisory 5197-1 - Multiple security vulnerabilities have been discovered in cURL, an URL transfer library. These flaws may allow remote attackers to obtain sensitive information, leak authentication or cookie header data or facilitate a denial of service attack.
77ef9f5619851e18009af5092abdfe753f0a668e45b9771f079b64a5b7aa8eca
Debian Linux Security Advisory 5198-1 - Two security vulnerabilities were discovered in Jetty, a Java servlet engine and webserver.
695ca96adf954f70e5f429b0b2053ea842089a7370f0f1ebf74fc33cb60a823f
Debian Linux Security Advisory 5199-1 - Jan-Niklas Sohn discovered that multiple input validation failures in the Xkb extension of the X.org X server may result in privilege escalation if the X server is running privileged.
b3b294395295b66ffccc26bc429578ddddf1ade98b67b031259e15d8fb2008c0
Debian Linux Security Advisory 5200-1 - It was discovered that libtirpc, a transport-independent RPC library, does not properly handle idle TCP connections. A remote attacker can take advantage of this flaw to cause a denial of service.
38ada30e05468c4fd73f4fe688a57bcf62aef2973f92e0c34641313f31d4fc1f
Debian Linux Security Advisory 5201-1 - Multiple security issues were discovered in Chromium, which could result in the execution of arbitrary code, denial of service or information disclosure.
a27e4d376369abe925a9538cc82bba061f3b0944979834a297e3d979bd273d9e
Debian Linux Security Advisory 5202-1 - Sandipan Roy discovered two vulnerabilities in InfoZIP's unzip program, a de-archiver for .zip files, which could result in denial of service or potentially the execution of arbitrary code.
36556aef4d8ee1ea1bca8e75235ed57c9ee83212074eb61d50252bb122797595
Debian Linux Security Advisory 5203-1 - Jaak Ristioja discovered a double-free vulnerability in GnuTLS, a library implementing the TLS and SSL protocols, during verification of pkcs7 signatures. A remote attacker can take advantage of this flaw to cause an application using the GnuTLS library to crash (denial of service), or potentially, to execute arbitrary code.
c038aaae2edb6a92b44350b0af52c6b5fe0b18727cac7c7ac4c1435373e68b57
Debian Linux Security Advisory 5204-1 - Adam Doupe discovered multiple vulnerabilities in the Gstreamer plugins to demux Mastroska and AVI files which could result in denial of service or the execution of arbitrary code.
b555cdccfe1de5cbb4b4bbecdeba81f5ea861bdfa4844dfb17d59142aedddaab
Debian Linux Security Advisory 5205-1 - Several vulnerabilities have been discovered in Samba, a SMB/CIFS file, print, and login server for Unix.
38c8b3ebb22a1e66f47eff731274a021a8d73de61f0bbd2b2282753d67ee31e9
Debian Linux Security Advisory 5206-1 - Several vulnerabilities were discovered in Apache Traffic Server, a reverse and forward proxy server, which could result in HTTP request smuggling, cache poisoning or information disclosure.
360f2d39b410c071cd8f7de51bc39704e2140bcc7d3c4795e6882565c3d01c09
Debian Linux Security Advisory 5207-1 - Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks.
a834fc5673ea42539aceee3099b521390b2bb10a60b230031ba7bb0a98087e77
Debian Linux Security Advisory 5208-1 - Michael Catanzaro discovered a buffer overflow in the Epiphany web browser.
d23341ebf5472198b1a93f4fd586704dacaf0011c8c3ad4ad28172856421aae2
Debian Linux Security Advisory 5209-1 - Yu Zhang and Nanyu Zhong discovered several vulnerabilities in net-snmp, a suite of Simple Network Management Protocol applications, which could result in denial of service or the execution of arbitrary code.
9d5a758e9f384092d74475c755963922f216382b3dcfaa96caae55b56f367106