OS: Suse
* bsc#1208995 * bsc#1220946 * bsc#1225742 * bsc#1232472 * bsc#1232919 |
* bsc#1170891 * bsc#1173139 * bsc#1185010 * bsc#1190358 * bsc#1190428 |
* bsc#1194869 * bsc#1216813 * bsc#1223384 * bsc#1225736 * bsc#1226848 |
* bsc#1208995 * bsc#1220946 * bsc#1225742 * bsc#1232472 * bsc#1232919 |
NIST Vulnerability Database
OS: CentOS
Upstream details at : https://access.redhat.com/errata/RHSA-2024:1498 |
Upstream details at : https://access.redhat.com/errata/RHSA-2024:1486 |
Upstream details at : https://access.redhat.com/errata/RHSA-2024:1249 |
Upstream details at : https://access.redhat.com/errata/RHSA-2024:0957 |
Exploit-DB.com
OS: Slackware
New mozilla-thunderbird packages are available for Slackware 15.0 and -current to fix security issues. |
New mozilla-firefox packages are available for Slackware 15.0 and -current to fix security issues. |
New emacs packages are available for Slackware 15.0 and -current to fix security issues. |
New tigervnc packages are available for Slackware 15.0 and -current to fix security issues. |
OS: Debian LTS
Two separate issues where identified and have now been adressed in libmodbus. For one of the problems multiple CVE identifiers have been allocated to the same issue and all of them are mentioned below. |
Several security vulnerabilities have been discovered in Squid, a full featured web proxy cache. CVE-2024-25111 |
Ruby a popular language was affected by multiple vulnerabilities CVE-2025-27219 |
AdaCore released a security advisory for "Insecure defaults in AWS.Client when linked with GnuTLS". The debian package of libaws is built with GnuTLS and the reproducer included in the advisory was used to confirm the (previous version of) |
OS: Debian
Multiple security issues were discovered in Thunderbird, which could result in denial of service or the execution of arbitrary code. For the stable distribution (bookworm), these problems have been fixed in |
Security issues were discovered in Chromium which could result in the execution of arbitrary code, denial of service, or information disclosure. |
Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code. |
Amel Bouziane-Leblond discovered that insufficient validation of "vnd.libreoffice.command" URI schemes could result in the execution of arbitrary macro commands. |
NIST Vulnerability Database
OS: Scientific
python: TLS handshake bypass (CVE-2023-40217) --- This content is derived from https://access.redhat.com/errata/RHSA-2023:6885 SL7 srpm python-0:2.7.5-94.el7_9.src x86_64 python-0:2.7.5-94.el7_9.x86_64 i386 python-libs-0:2.7.5-94.el7_9.i686 - Scientific Linux Development Team |
plexus-archiver: Arbitrary File Creation in AbstractUnArchiver (CVE-2023-37460) --- This content is derived from https://access.redhat.com/errata/RHSA-2023:6886 SL7 srpm plexus-archiver-0:2.4.2-6.el7_9.src noarch plexus-archiver-0:2.4.2-6.el7_9.noarch - Scientific Linux Development Team |
bind: stack exhaustion in control channel code may lead to DoS (CVE-2023-3341) --- This content is derived from https://access.redhat.com/errata/RHSA-2023:5691 SL7 srpm bind-32:9.11.4-26.P2.el7_9.15.src i386 bind-export-libs-32:9.11.4-26.P2.el7_9.15.i686 x86_64 bind-export-libs-32:9.11.4-26.P2.el7_9.15.x86_64 noarch bind-license-32:9.11.4-26.P2.el7_9.15.noarch - Scie [More...] |
libssh2: use-of-uninitialized-value in _libssh2_transport_read (CVE-2020-22218) --- This content is derived from https://access.redhat.com/errata/RHSA-2 023:5615 SL7 srpm libssh2-0:1.8.0-4.el7_9.1.src i386 libssh2-0:1.8.0-4.el7_9.1.i686 x86_64 libssh2-0:1.8.0-4.el7_9.1.x86_64 noarch libssh2-docs-0:1.8.0- 4.el7_9.1.noarch - Scientific Linux Development Team |
OS: Mageia
High CVE-2025-1914: Out of bounds read in V8. Medium CVE-2025-1915: Improper Limitation of a Pathname to a Restricted Directory in DevTools. Medium CVE-2025-1916: Use after free in Profiles. Medium CVE-2025-1917: Inappropriate Implementation in Browser UI. |
Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.2.2. (CVE-2023-5520) Stack-based Buffer Overflow in GitHub repository gpac/gpac prior to 2.3-DEV. (CVE-2024-0321) Out-of-bounds Read in GitHub repository gpac/gpac prior to 2.3-DEV. |
Potential code execution with tar.vim and special crafted tar files. References: - https://bugs.mageia.org/show_bug.cgi?id=34057 - https://www.openwall.com/lists/oss-security/2025/03/02/1 |
SSH SFTP packet size not verified properly in Erlang OTP. (CVE-2025-26618) References: - https://bugs.mageia.org/show_bug.cgi?id=34067 |
OS: Arch
The package rsync before version 3.4.0-1 is vulnerable to multiple issues including arbitrary code execution, arbitrary file upload, information disclosure and privilege escalation. |
The package oath-toolkit before version 2.6.12-1 is vulnerable to privilege escalation. |
The package openssh before version 9.8p1-1 is vulnerable to authentication bypass. |
The package xz before version 5.6.1-2 is vulnerable to arbitrary code execution. |
OS: Redhat
An update for libvpx is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, |
An update for bind is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. |
An update for libvpx is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions. |
An update for libvpx is now available for Red Hat Enterprise Linux 9. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability |
CVEMAP.ORG: Vulnerabilities & Exposures
OS: Gentoo
Multiple vulnerabilities have been found in OpenSSH, the worst of which could allow a remote attacker to gain unauthorized access. |
Multiple vulnerabilities have been discovered in PHP, the worst of which could lead to arbitrary code execution. |
Multiple vulnerabilities have been discovered in Mozilla Firefox, the worst of which can lead to arbitrary code execution. |
Multiple vulnerabilities have been discovered in QtWebEngine, the worst of which could lead to arbitrary code execution. |
OS: Rocky
Important: nodejs:22 security update |
Important: nodejs:22 security update |
Important: postgresql:16 security update |
Important: postgresql:16 security update |
OS: Fedora
Version 3.1.6 Released 2025-03-05 The |attr filter does not bypass the environment's attribute lookup, allowing the sandbox to apply its checks. |
Update to tree-sitter 0.25.2 and emacs 30.1. |
Update to tree-sitter 0.25.2 and emacs 30.1. |
Update to tree-sitter 0.25.2 and emacs 30.1. |
OS: Ubuntu
Several security issues were fixed in the Linux kernel. |
Several security issues were fixed in the Linux kernel. |
Several security issues were fixed in FreeRDP. |
Several security issues were fixed in the Linux kernel. |