
Update to 2.8.1 (CVE-2022-39282, CVE-2022-39283).

**MariaDB 10.5.18 & Galera 26.4.13** Release notes: https://mariadb.com/kb/en/mdb-10-5-18-rn/

**MariaDB 10.5.18 & Galera 26.4.13** Release notes: https://mariadb.com/kb/en/mdb-10-5-18-rn/

Security fix for CVE-2022-44020

Security fix for CVE-2022-44020

– https://www.drupal.org/project/i18n/releases/7.x-1.31 – https://www.drupal.org/project/i18n/releases/7.x-1.30 – https://www.drupal.org/project/i18n/releases/7.x-1.29 – https://www.drupal.org/project/i18n/releases/7.x-1.28 – https://www.drupal.org/project/i18n/releases/7.x-1.27 – [SA-

– put the font back in /boot for now Yes, this bloats size by a couple meg. Hopefully this won’t cause problems for anyone and everyone can be okay with this CVE fix update. —- – Adjust the way we provide unicode.pf2 for post-CVE lockdown policy —- Two font-related CVE updates (CVE-2022-2601 and CVE-2022-3775). For more information, see [upstream’s

Security fix for CVE-2022-45197

– https://www.drupal.org/project/i18n/releases/7.x-1.31 – https://www.drupal.org/project/i18n/releases/7.x-1.30 – https://www.drupal.org/project/i18n/releases/7.x-1.29 – https://www.drupal.org/project/i18n/releases/7.x-1.28 – https://www.drupal.org/project/i18n/releases/7.x-1.27 – [SA-

– New upstream version (107.0)

Security fix for CVE-2022-3550, CVE-2022-3551

Security fix for CVE-2022-3550, CVE-2022-3551

– https://www.drupal.org/project/context/releases/7.x-3.11 – [SA- CONTRIB-2022-049](https://www.drupal.org/sa-contrib-2022-049)

– https://www.drupal.org/project/link/releases/7.x-1.11 – [SA- CONTRIB-2022-034](https://www.drupal.org/sa-contrib-2022-034) – https://www.drupal.org/project/link/releases/7.x-1.10 – https://www.drupal.org/project/link/releases/7.x-1.9 – https://www.drupal.org/project/link/releases/7.x-1.8

– https://www.drupal.org/project/context/releases/7.x-3.11 – [SA- CONTRIB-2022-049](https://www.drupal.org/sa-contrib-2022-049)

Rebase to version 375

Rebase to version 375

Security fix for CVE-2022-42898

Security fix for CVE-2022-42898

A flaw was found in the jquery-UI package. Affected versions of this package are vulnerable to Cross-site scripting (XSS) attack via the initialization of a check-box-radio widget on an input tag enclosed within a label, leading to the parent label contents being considered as the input label.

A flaw was found in the jquery-UI package. Affected versions of this package are vulnerable to Cross-site scripting (XSS) attack via the initialization of a check-box-radio widget on an input tag enclosed within a label, leading to the parent label contents being considered as the input label.

Rebase to version 375

This is the October 2022 monthly update for .NET 6. It updates the SDK to 6.0.110 and the Runtime to 6.0.10. This update includes a fix for CVE 2022-41032

Update to 102.5.0 ; https://www.mozilla.org/en- US/security/advisories/mfsa2022-49/ ; https://www.thunderbird.net/en- US/thunderbird/102.5.0/releasenotes/ ; https://www.thunderbird.net/en- US/thunderbird/102.4.2/releasenotes/

Two font-related CVE updates (CVE-2022-2601 and CVE-2022-3775). For more information, see [upstream’s disclosure](https://lists.gnu.org/archive/html/grub-devel/2022-11/msg00059.html) or the patches themselves.

Update to version 4.17.3

Update to 102.5.0 ; https://www.mozilla.org/en- US/security/advisories/mfsa2022-49/ ; https://www.thunderbird.net/en- US/thunderbird/102.5.0/releasenotes/ ; https://www.thunderbird.net/en- US/thunderbird/102.4.2/releasenotes/

Xenstore: Guests can crash xenstored [XSA-414, CVE-2022-42309] Xenstore: Guests can create orphaned Xenstore nodes [XSA-415, CVE-2022-42310] Xenstore: guests can let run xenstored out of memory [XSA-326, CVE-2022-42311, CVE-2022-42312, CVE-2022-42313, CVE-2022-42314, CVE-2022-42315, CVE-2022-42316, CVE-2022-42317, CVE-2022-42318] Xenstore: Guests can cause Xenstore to not free temporary memory

Rebase to 2.5.0 —- Rebase to 2.4.9

The 6.0.8 stable kernel update contains a number of important fixes across the tree.
53 queries. 9 mb Memory usage. 0.418 seconds.