Log

CVE-2021-3573 edited at 10 Jun 2021 19:24:35
References
https://www.openwall.com/lists/oss-security/2021/06/08/2
- https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=e305509e678b3a4af2b3cfd410f409f7cdaabb52
+ https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.12.10&id=7422eadcf201f2e25eb45b46ffc900fc4214e14f
+ https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/commit/?h=v5.10.43&id=74caf718cc7422a957aac381c73d798c0a999a65
AVG-1594 edited at 10 Jun 2021 19:22:51
Affected
- 5.12.9.arch1-1
+ 5.12.10.arch1-1
AVG-1393 edited at 10 Jun 2021 11:07:22
Affected
- 245-1
+ 246-1
CVE-2021-31618 edited at 10 Jun 2021 11:06:33
References
https://httpd.apache.org/security/vulnerabilities_24.html#CVE-2021-31618
+ https://svn.apache.org/viewvc?view=revision&revision=1889759
AVG-2062 edited at 10 Jun 2021 10:59:08
Severity
- Unknown
+ Medium
CVE-2021-34363 edited at 10 Jun 2021 10:59:08
Severity
- Unknown
+ Medium
Remote
- Unknown
+ Local
Type
- Unknown
+ Arbitrary file overwrite
Description
+ The thefuck package before 3.31 allows path traversal that leads to arbitrary file deletion via the "undo archive operation" feature.
References
+ https://vuln.ryotak.me/advisories/48
+ https://github.com/nvbn/thefuck/commit/e343c577cd7da4d304b837d4a07ab4df1e023092
Notes
AVG-2062 created at 10 Jun 2021 10:56:56
Packages
+ thefuck
Issues
+ CVE-2021-34363
Status
+ Fixed
Severity
+ Unknown
Affected
+ 3.30-3
Fixed
+ 3.31-1
Ticket
Advisory qualified
+ Yes
References
Notes
CVE-2021-34363 created at 10 Jun 2021 10:56:56
AVG-2061 edited at 10 Jun 2021 09:28:23
Advisory qualified
- Yes
+ No
AVG-2061 edited at 10 Jun 2021 09:28:19
Status
- Vulnerable
+ Fixed
Affected
- 5.58-1
+ 5.55-3
Fixed
+ 5.56-1
CVE-2021-3588 edited at 10 Jun 2021 09:27:44
Description
- A security issue has been found in BlueZ 5.58. The cli_feat_read_cb() function in src/gatt-database.c does not perform bounds checks on the 'offset' variable before using it as an index into an array for reading.
+ A security issue has been found in BlueZ before version 5.56. The cli_feat_read_cb() function in src/gatt-database.c does not perform bounds checks on the 'offset' variable before using it as an index into an array for reading.
References
https://github.com/bluez/bluez/issues/70
- https://github.com/tedd-an/test-bluez/commit/3a40bef49305f8327635b81ac8be52a3ca063d5a
+ https://git.kernel.org/pub/scm/bluetooth/bluez.git/commit/?h=5.56&id=3a40bef49305f8327635b81ac8be52a3ca063d5a
AVG-2057 edited at 10 Jun 2021 08:46:32
Status
- Vulnerable
+ Fixed
Fixed
+ 91.0.4472.101-1