Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-3959: Release v1.8.2 · drogonframework/drogon

A vulnerability, which was classified as problematic, has been found in drogon up to 1.8.1. Affected by this issue is some unknown functionality of the component Session Hash Handler. The manipulation leads to small space of random values. The attack may be launched remotely. Upgrading to version 1.8.2 is able to address this issue. The name of the patch is c0d48da99f66aaada17bcd28b07741cac8697647. It is recommended to upgrade the affected component. The identifier of this vulnerability is VDB-213464.

CVE
#sql#vulnerability#redis

API changes list

  • Add the queueInLoopCoro function.

  • Avoid HashDoS attacks via random per-session hash initial state.

Changed

  • Support the mediumint column when generate the mysql model.

  • Set Hiredis_FOUND to true when finding Hiredis library.

  • Add rate limiter.

  • Add some test cases for the sqlite datetime type.

Fixed

  • Fix typo in drogon_test.h.

  • Fix a date race in drogon_test.

  • Fix a deadlock bug when closing all database connections.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907