
Apply fix for CVE-2024-39936

Apply fix for CVE-2024-39936

The newest upstream commit Security fixes for CVE-2024-41965, CVE-2024-41957

Apply fix for CVE-2024-39936

Update to upstream 2.1-43. 20240531 Addition of 06-aa-04/0xe6 (MTL-H/U C0) microcode at revision 0x1c; Addition of 06-ba-08/0xe0 microcode (in intel-ucode/06-ba-02) at revision 0x4121; Addition of 06-ba-08/0xe0 microcode (in intel-ucode/06-ba-03) at revision

Multiple security issues have been found in the Mozilla Firefox web browser, which could potentially result in the execution of arbitrary code, the bypass of sandbox restrictions or an information leak.

Rory McNamara reported a local privilege escalation in wpasupplicant: A user able to escalate to the netdev group can load arbitrary shared object files in the context of the wpa_supplicant process running as root.

Several vulnerabilities have been discovered in the OpenJDK Java runtime, which may result in denial of service, information disclosure or bypass of Java sandbox restrictions.

wpa_supplicant could be made to run programs as an administrator with specially crafted configuration file.

Several security issues were fixed in Django.

Several security issues were fixed in ImageMagick.

If LibreOffice failed to validate a signed macro, it displayed a warning but still allowed execution of the script after printing a warning. Going forward in high macro security mode such macros are now disabled.

curl could be made to crash or expose information if it received specially crafted network traffic.

Several vulnerabilities have been discovered in the OpenJDK Java runtime, which may result in denial of service, information disclosure or bypass of Java sandbox restrictions.

Several security issues were fixed in the Linux kernel.

Backport fix for CVE-2023-49528

Update to upstream version 2.11.

update to 127.0.6533.88 Critical CVE-2024-6990: Uninitialized Use in Dawn High CVE-2024-7255: Out of bounds read in WebTransport High CVE-2024-7256: Insufficient data validation in Dawn

Update to upstream version 2.11.

update to 127.0.6533.88 Critical CVE-2024-6990: Uninitialized Use in Dawn High CVE-2024-7255: Out of bounds read in WebTransport High CVE-2024-7256: Insufficient data validation in Dawn update to 127.0.6533.72

Gross could be made to crash or to allow arbitrary code execution.

update to 127.0.6533.72 * CVE-2024-6988: Use after free in Downloads * CVE-2024-6989: Use after free in Loader * CVE-2024-6991: Use after free in Dawn * CVE-2024-6992: Out of bounds memory access in ANGLE

Several security issues were fixed in Tomcat.

Several security issues were fixed in Bind.

Several security issues were fixed in the Linux kernel.

Several security issues were fixed in snapd.

Several security issues were fixed in ClickHouse.

double unlock in x86 guest IRQ handling [XSA-458, CVE-2024-31143] x86: Native Branch History Injection [XSA-456 version 3, CVE-2024-2201]

The 6.9.12 stable kernel update contains a number of important fixes across the tree.

Security fix for CVE-2023-6349 & FTBFS fixes
50 queries. 9.25 mb Memory usage. 0.333 seconds.