
Update to 3.14. Security fix for CVE-2023-38403

Update to 3.14. Security fix for CVE-2023-38403

Security fix for [PUT CVEs HERE]

Backport fix for CVE-2023-38197.

fixes CVE-2008-2383

Backport fix for CVE-2023-38197.

Backport fix for CVE-2023-38197.

Update to 102.13.0 ; https://www.mozilla.org/en-US/security/advisories/mfsa2023-24/ ; https://www.thunderbird.net/en-US/thunderbird/102.13.0/releasenotes/

version 0.29.1 fixes CVE-2008-2383

The 6.4.4 stable kernel rebase contains additional hardware support, new features, and a number of important fixes across the tree.

The 6.4.4 stable kernel rebase contains additional hardware support, new features, and a number of important fixes across the tree.

The 6.4.4 stable kernel rebase contains additional hardware support, new features, and a number of important fixes across the tree.

Security fix for CVE-2023-38408

The 6.4.4 stable kernel rebase contains additional hardware support, new features, and a number of important fixes across the tree.

This update includes a security fix to the net/http package, as well as bug fixes to the compiler, cgo, the cover tool, the go command, the runtime, and the crypto/ecdsa, go/build, go/printer, net/mail, and text/template packages.

## 2023-06-20, Version 16.20.1 ‘Gallium’ (LTS), @RafaelGSS This is a security release. ### Notable Changes The following CVEs are fixed in this release: * [CVE-2023-30581](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30581): `mainModule.__proto__` Bypass Experimental Policy Mechanism (High) * [CVE-2023-30585](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30585):

Security fix for CVE-2023-33204

**Redis 7.0.12** – Released Mon July 10 12:00:00 IDT 2023 Upgrade urgency SECURITY: See security fixes below. Security Fixes: * (**CVE-2022-24834**) A specially crafted Lua script executing in Redis can trigger a heap overflow in the cjson and cmsgpack libraries, and result in heap corruption and potentially remote code execution. The problem exists in all versions of

## 2023-06-20, Version 18.16.1 ‘Hydrogen’ (LTS), @RafaelGSS This is a security release. ### Notable Changes The following CVEs are fixed in this release: * [CVE-2023-30581](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30581): `mainModule.__proto__` Bypass Experimental Policy Mechanism (High) * [CVE-2023-30585](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-30585):

**Redis 7.0.12** – Released Mon July 10 12:00:00 IDT 2023 Upgrade urgency SECURITY: See security fixes below. Security Fixes: * (**CVE-2022-24834**) A specially crafted Lua script executing in Redis can trigger a heap overflow in the cjson and cmsgpack libraries, and result in heap corruption and potentially remote code execution. The problem exists in all versions of

feature complete repack of jdk8 portable

feature complete repack of jdk8 portable

rebase to bugfix release 10.01.2 (rhbz#2182090)

Update to 3.09, fixes CVE-2023-37378.

Update to 3.09, fixes CVE-2023-37378.

Update to 102.13.0 ; https://www.mozilla.org/en- US/security/advisories/mfsa2023-24/ ; https://www.thunderbird.net/en- US/thunderbird/102.13.0/releasenotes/

rebase to rizin 0.5.2 and cutter 2.2.1

The 6.3.12 stable kernel update contains a number of important fixes across the tree. —- The 6.3.11 stable kernel update contains a number of important fixes across the tree. —- The 6.3.10 stable kernel update contains a number of important fixes across the tree.

rebase to rizin 0.5.2 and cutter 2.2.1

Update to 2023.07.06. Mitigates CVE-2023-35934 / GHSA-v8mc-9377-rwjj. —- Update to 2023.06.22. Fixes rhbz#2216612. —- Update to 2023.06.21. Fixes rhbz#2216612.
53 queries. 9 mb Memory usage. 0.304 seconds.