
OpenSSH could be made to bypass authentication and remotely access systems without proper credentials.

OpenSSH could be made to bypass authentication and remotely access systems without proper credentials.

The Qualys Threat Research Unit (TRU) discovered that OpenSSH, an implementation of the SSH protocol suite, is prone to a signal handler race condition. If a client does not authenticate within LoginGraceTime seconds (120 by default), then sshd’s SIGALRM handler is called

Several security issues were fixed in eSpeak NG.

Update to 4.15 for CVE-2024-3652

Update to gstreamer-1.22.9. Backport fix for CVE-2024-0444.

Update to 4.15 for CVE-2024-3652

Update to gstreamer-1.22.9. Backport fix for CVE-2024-0444.
51 queries. 8.75 mb Memory usage. 0.510 seconds.