Git development team reports:
+++ +CVE-2024-50349: Printing unsanitized URLs when asking for credentials made the + user susceptible to crafted URLs (e.g. in recursive clones) that + mislead the user into typing in passwords for trusted sites that + would then be sent to untrusted sites instead.
+CVE-2024-52006: Git may pass on Carriage Returns via the credential protocol to + credential helpers which use line-reading functions that + interpret said Carriage Returns as line endings, even though Git + did not intend that.
+
Keycloak reports:
This update includes 2 security fixes:
- CVE-2024-11734: Unrestricted admin use of system and environment variables
- CVE-2024-11736: Denial of Service in Keycloak Server via Security Headers
cve@mitre.org reports:
An issue in the action_listcategories() function of Sangoma Asterisk v22/22.0.0/22.0.0-rc1/22.0.0-rc2/22.0.0-pre1 allows attackers to execute a path traversal.
Redis core team reports:
An authenticated with sufficient privileges may create a malformed ACL selector which, when accessed, triggers a server panic and subsequent denial of service.The problem exists in Redis 7.0.0 or newer.
Redis core team reports:
An authenticated user may use a specially crafted Lua script to manipulate the garbage collector and potentially lead to remote code execution. The problem exists in all versions of Redis with Lua scripting.
Gitlab reports:
Possible access token exposure in GitLab logs
Cyclic reference of epics leads resource exhaustion
Unauthorized user can manipulate status of issues in public projects
Instance SAML does not respect external_provider configuration