update to 115.0.5790.110. Fixes the following security issue: CVE-2022-4908 CVE-2022-4909 CVE-2022-4910 CVE-2022-4908 CVE-2022-4909 CVE-2022-4910 CVE-2022-4906 CVE-2022-4907 CVE-2022-4906 CVE-2022-4907 CVE-2023-2311 CVE-2023-2313 CVE-2023-2311 CVE-2023-2313 CVE-2023-2929 CVE-2023-2929 CVE-2023-2314 CVE-2023-2314 CVE-2023-3598 CVE-2023-3598
Archive for Fedora Linux Distribution – Security Advisories
– Updated to latest upstream (116.0)
– Updated to latest upstream (116.0)
– fix fopen race condition (CVE-2023-32001)
Update to 3.14. Security fix for CVE-2023-38403
Update to 3.14. Security fix for CVE-2023-38403
Security fix for [PUT CVEs HERE]
Backport fix for CVE-2023-38197.
fixes CVE-2008-2383
Backport fix for CVE-2023-38197.
Backport fix for CVE-2023-38197.
Update to 102.13.0 ; https://www.mozilla.org/en-US/security/advisories/mfsa2023-24/ ; https://www.thunderbird.net/en-US/thunderbird/102.13.0/releasenotes/
version 0.29.1 fixes CVE-2008-2383
The 6.4.4 stable kernel rebase contains additional hardware support, new features, and a number of important fixes across the tree.
The 6.4.4 stable kernel rebase contains additional hardware support, new features, and a number of important fixes across the tree.
The 6.4.4 stable kernel rebase contains additional hardware support, new features, and a number of important fixes across the tree.
Security fix for CVE-2023-38408
The 6.4.4 stable kernel rebase contains additional hardware support, new features, and a number of important fixes across the tree.
This update includes a security fix to the net/http package, as well as bug fixes to the compiler, cgo, the cover tool, the go command, the runtime, and the crypto/ecdsa, go/build, go/printer, net/mail, and text/template packages.
## 2023-06-20, Version 16.20.1 ‘Gallium’ (LTS), @RafaelGSS This is a security release. ### Notable Changes The following CVEs are fixed in this release: * [CVE-2023-30581](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30581): `mainModule.__proto__` Bypass Experimental Policy Mechanism (High) * [CVE-2023-30585](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30585):
Security fix for CVE-2023-33204
**Redis 7.0.12** – Released Mon July 10 12:00:00 IDT 2023 Upgrade urgency SECURITY: See security fixes below. Security Fixes: * (**CVE-2022-24834**) A specially crafted Lua script executing in Redis can trigger a heap overflow in the cjson and cmsgpack libraries, and result in heap corruption and potentially remote code execution. The problem exists in all versions of
## 2023-06-20, Version 18.16.1 ‘Hydrogen’ (LTS), @RafaelGSS This is a security release. ### Notable Changes The following CVEs are fixed in this release: * [CVE-2023-30581](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30581): `mainModule.__proto__` Bypass Experimental Policy Mechanism (High) * [CVE-2023-30585](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30585):
**Redis 7.0.12** – Released Mon July 10 12:00:00 IDT 2023 Upgrade urgency SECURITY: See security fixes below. Security Fixes: * (**CVE-2022-24834**) A specially crafted Lua script executing in Redis can trigger a heap overflow in the cjson and cmsgpack libraries, and result in heap corruption and potentially remote code execution. The problem exists in all versions of
feature complete repack of jdk8 portable
feature complete repack of jdk8 portable
rebase to bugfix release 10.01.2 (rhbz#2182090)
Update to 3.09, fixes CVE-2023-37378.
Update to 3.09, fixes CVE-2023-37378.
Update to 102.13.0 ; https://www.mozilla.org/en- US/security/advisories/mfsa2023-24/ ; https://www.thunderbird.net/en- US/thunderbird/102.13.0/releasenotes/