– Updated to latest upstream (116.0)
Archive for Fedora Linux Distribution – Security Advisories
– fix fopen race condition (CVE-2023-32001)
Update to 3.14. Security fix for CVE-2023-38403
Update to 3.14. Security fix for CVE-2023-38403
Security fix for [PUT CVEs HERE]
Backport fix for CVE-2023-38197.
fixes CVE-2008-2383
Backport fix for CVE-2023-38197.
Backport fix for CVE-2023-38197.
Update to 102.13.0 ; https://www.mozilla.org/en-US/security/advisories/mfsa2023-24/ ; https://www.thunderbird.net/en-US/thunderbird/102.13.0/releasenotes/
version 0.29.1 fixes CVE-2008-2383
The 6.4.4 stable kernel rebase contains additional hardware support, new features, and a number of important fixes across the tree.
The 6.4.4 stable kernel rebase contains additional hardware support, new features, and a number of important fixes across the tree.
The 6.4.4 stable kernel rebase contains additional hardware support, new features, and a number of important fixes across the tree.
Security fix for CVE-2023-38408
The 6.4.4 stable kernel rebase contains additional hardware support, new features, and a number of important fixes across the tree.
This update includes a security fix to the net/http package, as well as bug fixes to the compiler, cgo, the cover tool, the go command, the runtime, and the crypto/ecdsa, go/build, go/printer, net/mail, and text/template packages.
## 2023-06-20, Version 16.20.1 ‘Gallium’ (LTS), @RafaelGSS This is a security release. ### Notable Changes The following CVEs are fixed in this release: * [CVE-2023-30581](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30581): `mainModule.__proto__` Bypass Experimental Policy Mechanism (High) * [CVE-2023-30585](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30585):
Security fix for CVE-2023-33204
**Redis 7.0.12** – Released Mon July 10 12:00:00 IDT 2023 Upgrade urgency SECURITY: See security fixes below. Security Fixes: * (**CVE-2022-24834**) A specially crafted Lua script executing in Redis can trigger a heap overflow in the cjson and cmsgpack libraries, and result in heap corruption and potentially remote code execution. The problem exists in all versions of
## 2023-06-20, Version 18.16.1 ‘Hydrogen’ (LTS), @RafaelGSS This is a security release. ### Notable Changes The following CVEs are fixed in this release: * [CVE-2023-30581](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30581): `mainModule.__proto__` Bypass Experimental Policy Mechanism (High) * [CVE-2023-30585](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30585):
**Redis 7.0.12** – Released Mon July 10 12:00:00 IDT 2023 Upgrade urgency SECURITY: See security fixes below. Security Fixes: * (**CVE-2022-24834**) A specially crafted Lua script executing in Redis can trigger a heap overflow in the cjson and cmsgpack libraries, and result in heap corruption and potentially remote code execution. The problem exists in all versions of
feature complete repack of jdk8 portable
feature complete repack of jdk8 portable
rebase to bugfix release 10.01.2 (rhbz#2182090)
Update to 3.09, fixes CVE-2023-37378.
Update to 3.09, fixes CVE-2023-37378.
Update to 102.13.0 ; https://www.mozilla.org/en- US/security/advisories/mfsa2023-24/ ; https://www.thunderbird.net/en- US/thunderbird/102.13.0/releasenotes/
rebase to rizin 0.5.2 and cutter 2.2.1
The 6.3.12 stable kernel update contains a number of important fixes across the tree. —- The 6.3.11 stable kernel update contains a number of important fixes across the tree. —- The 6.3.10 stable kernel update contains a number of important fixes across the tree.