
Security issues were discovered in Chromium which could result in the execution of arbitrary code, denial of service, or information disclosure.

Security issues were discovered in Chromium which could result in the execution of arbitrary code, denial of service, or information disclosure.

New version 2.6.3 (rhbz#2368989) Fix for: CVE-2025-32801, CVE-2025-32802, CVE-2025-32803 kea.conf: Remove /tmp/ from socket-name for existing configurations kea.conf: Set pseudo-random password for default config to secure fresh install and allow CA startup without user intervention

Security fix for CVE-2025-47273

Fixes CVE-2025-32873: Denial-of-service possibility in strip_tags() Fixes CVE-2025-48432: Potential log injection via unescaped request path

New version 2.6.3 (rhbz#2368989) Fix for: CVE-2025-32801, CVE-2025-32802, CVE-2025-32803 kea.conf: Remove /tmp/ from socket-name for existing configurations kea.conf: Set pseudo-random password for default config to secure fresh install and allow CA startup without user intervention

Fixes CVE-2025-32873: Denial-of-service possibility in strip_tags() Fixes CVE-2025-48432: Potential log injection via unescaped request path

libblockdev could be made to run programs as an administrator.

Several security issues were fixed in Godot Engine.

Fixes CVE-2025-32873: Denial-of-service possibility in strip_tags() Fixes CVE-2025-48432: Potential log injection via unescaped request path

dwarfutils could be made to crash or run programs as your login if it opened a specially crafted file.

Several security issues were fixed in MuJS.

The Qualys Threat Research Unit (TRU) discovered a local privilege escalation vulnerability in libblockdev, a library for manipulating block devices. An “allow_active” user can exploit this flaw via the udisks daemon to obtain the full privileges of the root user.

Update to 128.11.1 https://www.mozilla.org/en-US/security/advisories/mfsa2025-49/

Fixes CVE-2025-32873: Denial-of-service possibility in strip_tags() Fixes CVE-2025-48432: Potential log injection via unescaped request path

Security issues were discovered in Chromium which could result in the execution of arbitrary code, denial of service, or information disclosure.

Several security issues were fixed in libsoup.

Several security issues were fixed in WebKitGTK.

Multiple vulnerabilities were discovered in the H.265 plugin for the GStreamer media framework, which may result in denial of service or potentially the execution of arbitrary code if a malformed media file is opened.

This is a security update to the stable version 1.6 of Roundcube Webmail. It provides fixes to recently reported security vulnerabilities: Fix Post-Auth RCE via PHP Object Deserialization reported by firs0v. This version is considered stable and we recommend to update all productive installations of Roundcube 1.6.x with it. Please do backup your data before

Qt 6.9.1 bugfix release.

Qt 6.9.1 bugfix release.

Qt 6.9.1 bugfix release.

Qt 6.9.1 bugfix release.

Qt 6.9.1 bugfix release.

Qt 6.9.1 bugfix release.

Qt 6.9.1 bugfix release.

Qt 6.9.1 bugfix release.

Qt 6.9.1 bugfix release.

Qt 6.9.1 bugfix release.

Qt 6.9.1 bugfix release.
50 queries. 9.25 mb Memory usage. 0.330 seconds.