Fedora 40: mingw-qt6-qtbase 2024-81c4b76a71 Security Advisory Updates
Apply fix for CVE-2024-39936
Apply fix for CVE-2024-39936
The newest upstream commit Security fixes for CVE-2024-41965, CVE-2024-41957
Apply fix for CVE-2024-39936
Update to upstream 2.1-43. 20240531 Addition of 06-aa-04/0xe6 (MTL-H/U C0) microcode at revision 0x1c; Addition of 06-ba-08/0xe0 microcode (in intel-ucode/06-ba-02) at revision 0x4121; Addition of 06-ba-08/0xe0 microcode (in intel-ucode/06-ba-03) at revision
Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code, the bypass of sandbox restrictions or an information leak.
Rory McNamara reported a local privilege escalation in wpasupplicant: A user able to escalate to the netdev group can load arbitrary shared object files in the context of the wpa_supplicant process running as root.
Several vulnerabilities have been discovered in the OpenJDK Java runtime, which may result in denial of service, information disclosure or bypass of Java sandbox restrictions.
wpa_supplicant could be made to run programs as an administrator with specially crafted configuration file.
Several security issues were fixed in Django.
Several security issues were fixed in ImageMagick.
If LibreOffice failed to validate a signed macro, it displayed a warning but still allowed execution of the script after printing a warning. Going forward in high macro security mode such macros are now disabled.
curl could be made to crash or expose information if it received specially crafted network traffic.
Several vulnerabilities have been discovered in the OpenJDK Java runtime, which may result in denial of service, information disclosure or bypass of Java sandbox restrictions.
Several security issues were fixed in the Linux kernel.
Backport fix for CVE-2023-49528
Update to upstream version 2.11.
update to 127.0.6533.88 Critical CVE-2024-6990: Uninitialized Use in Dawn High CVE-2024-7255: Out of bounds read in WebTransport High CVE-2024-7256: Insufficient data validation in Dawn
Update to upstream version 2.11.
update to 127.0.6533.88 Critical CVE-2024-6990: Uninitialized Use in Dawn High CVE-2024-7255: Out of bounds read in WebTransport High CVE-2024-7256: Insufficient data validation in Dawn update to 127.0.6533.72
Learn WordPress has been growing as a hub of educational resources for WordPress since 2020. Now, it’s undergone a transformation in content focus and design with the introduction of Learning Pathways and a reimagined look. The WordPress.org redesign continues Learn WordPress is the latest section of WordPress.org to receive a design refresh, following other sections […]
Gross could be made to crash or to allow arbitrary code execution.
update to 127.0.6533.72 * CVE-2024-6988: Use after free in Downloads * CVE-2024-6989: Use after free in Loader * CVE-2024-6991: Use after free in Dawn * CVE-2024-6992: Out of bounds memory access in ANGLE
Several security issues were fixed in Tomcat.
Several security issues were fixed in Bind.
Several security issues were fixed in the Linux kernel.
Several security issues were fixed in snapd.
Several security issues were fixed in ClickHouse.
double unlock in x86 guest IRQ handling [XSA-458, CVE-2024-31143] x86: Native Branch History Injection [XSA-456 version 3, CVE-2024-2201]
The 6.9.12 stable kernel update contains a number of important fixes across the tree.
Security fix for CVE-2023-6349 & FTBFS fixes
58 queries. 8.75 mb Memory usage. 1.318 seconds.