**MariaDB 10.5.18 & Galera 26.4.13** Release notes: https://mariadb.com/kb/en/mdb-10-5-18-rn/
Posts Tagged Fedora Linux Distribution – Security Advisories
Security fix for CVE-2022-44020
Security fix for CVE-2022-44020
– https://www.drupal.org/project/i18n/releases/7.x-1.31 – https://www.drupal.org/project/i18n/releases/7.x-1.30 – https://www.drupal.org/project/i18n/releases/7.x-1.29 – https://www.drupal.org/project/i18n/releases/7.x-1.28 – https://www.drupal.org/project/i18n/releases/7.x-1.27 – [SA-
– put the font back in /boot for now Yes, this bloats size by a couple meg. Hopefully this won’t cause problems for anyone and everyone can be okay with this CVE fix update. —- – Adjust the way we provide unicode.pf2 for post-CVE lockdown policy —- Two font-related CVE updates (CVE-2022-2601 and CVE-2022-3775). For more information, see [upstream’s
Security fix for CVE-2022-45197
– https://www.drupal.org/project/i18n/releases/7.x-1.31 – https://www.drupal.org/project/i18n/releases/7.x-1.30 – https://www.drupal.org/project/i18n/releases/7.x-1.29 – https://www.drupal.org/project/i18n/releases/7.x-1.28 – https://www.drupal.org/project/i18n/releases/7.x-1.27 – [SA-
– New upstream version (107.0)
Security fix for CVE-2022-3550, CVE-2022-3551
Security fix for CVE-2022-3550, CVE-2022-3551
– https://www.drupal.org/project/context/releases/7.x-3.11 – [SA- CONTRIB-2022-049](https://www.drupal.org/sa-contrib-2022-049)
– https://www.drupal.org/project/link/releases/7.x-1.11 – [SA- CONTRIB-2022-034](https://www.drupal.org/sa-contrib-2022-034) – https://www.drupal.org/project/link/releases/7.x-1.10 – https://www.drupal.org/project/link/releases/7.x-1.9 – https://www.drupal.org/project/link/releases/7.x-1.8
– https://www.drupal.org/project/context/releases/7.x-3.11 – [SA- CONTRIB-2022-049](https://www.drupal.org/sa-contrib-2022-049)
Rebase to version 375
Rebase to version 375
Security fix for CVE-2022-42898
Security fix for CVE-2022-42898
A flaw was found in the jquery-UI package. Affected versions of this package are vulnerable to Cross-site scripting (XSS) attack via the initialization of a check-box-radio widget on an input tag enclosed within a label, leading to the parent label contents being considered as the input label.
A flaw was found in the jquery-UI package. Affected versions of this package are vulnerable to Cross-site scripting (XSS) attack via the initialization of a check-box-radio widget on an input tag enclosed within a label, leading to the parent label contents being considered as the input label.
Rebase to version 375
This is the October 2022 monthly update for .NET 6. It updates the SDK to 6.0.110 and the Runtime to 6.0.10. This update includes a fix for CVE 2022-41032
Update to 102.5.0 ; https://www.mozilla.org/en- US/security/advisories/mfsa2022-49/ ; https://www.thunderbird.net/en- US/thunderbird/102.5.0/releasenotes/ ; https://www.thunderbird.net/en- US/thunderbird/102.4.2/releasenotes/
Two font-related CVE updates (CVE-2022-2601 and CVE-2022-3775). For more information, see [upstream’s disclosure](https://lists.gnu.org/archive/html/grub-devel/2022-11/msg00059.html) or the patches themselves.
Update to version 4.17.3
Update to 102.5.0 ; https://www.mozilla.org/en- US/security/advisories/mfsa2022-49/ ; https://www.thunderbird.net/en- US/thunderbird/102.5.0/releasenotes/ ; https://www.thunderbird.net/en- US/thunderbird/102.4.2/releasenotes/
Xenstore: Guests can crash xenstored [XSA-414, CVE-2022-42309] Xenstore: Guests can create orphaned Xenstore nodes [XSA-415, CVE-2022-42310] Xenstore: guests can let run xenstored out of memory [XSA-326, CVE-2022-42311, CVE-2022-42312, CVE-2022-42313, CVE-2022-42314, CVE-2022-42315, CVE-2022-42316, CVE-2022-42317, CVE-2022-42318] Xenstore: Guests can cause Xenstore to not free temporary memory
Rebase to 2.5.0 —- Rebase to 2.4.9
The 6.0.8 stable kernel update contains a number of important fixes across the tree.
The 6.0.8 stable kernel update contains a number of important fixes across the tree.
* Fix scrolling issues in some sites having fixed background. * Fix prolonged buffering during progressive live playback. * Fix several crashes and rendering issues. * Security fixes: CVE-2022-42799, CVE-2022-42823, CVE-2022-42824 —- * Make xdg-dbus-proxy work if host session bus address is an abstract socket. * Use a single xdg-dbus-proxy process when sandbox is enabled. * Fix high