audiofile-0.3.6-36.fc38
FEDORA-2023-07669abb35 Packages in this update: audiofile-0.3.6-36.fc38 Update description: Patch for CVE-2022-24599 Read More
audiofile-0.3.6-36.fc39
FEDORA-2023-47d4f575a3 Packages in this update: audiofile-0.3.6-36.fc39 Update description: Patch for CVE-2022-24599 Read More
audiofile-0.3.6-36.el9
FEDORA-EPEL-2023-c9409db037 Packages in this update: audiofile-0.3.6-36.el9 Update description: Patch for CVE-2022-24599 Read More
audiofile-0.3.6-36.fc37
FEDORA-2023-e23e432cb2 Packages in this update: audiofile-0.3.6-36.fc37 Update description: Patch for CVE-2022-24599 Read More
Information-Stealing Malware Escalates in Online Gaming
A report by Sekoia.io shed light on a targeted campaign using Discord and fake download websites Read More
Python Malware Poses DDoS Threat Via Docker API Misconfiguration
Cado Security Labs said the bot agent exhibited various methods for conducting DDoS attacks Read More
gst-devtools-1.22.7-1.fc38 gstreamer1-1.22.7-1.fc38 gstreamer1-doc-1.22.7-1.fc38 python-gstreamer1-1.22.7-1.fc38
FEDORA-2023-7bd66f219f Packages in this update: gst-devtools-1.22.7-1.fc38 gstreamer1-1.22.7-1.fc38 gstreamer1-doc-1.22.7-1.fc38 python-gstreamer1-1.22.7-1.fc38 Update description: Fixes for GStreamer-SA-2023-0010 (ZDI-CAN-22299) and GStreamer-SA-2023-0009 (ZDI-CAN-22226) (CVE-2023-44429) Read More
gst-devtools-1.22.7-1.fc39 gstreamer1-1.22.7-1.fc39 gstreamer1-doc-1.22.7-1.fc39 python-gstreamer1-1.22.7-1.fc39
FEDORA-2023-1661e0af22 Packages in this update: gst-devtools-1.22.7-1.fc39 gstreamer1-1.22.7-1.fc39 gstreamer1-doc-1.22.7-1.fc39 python-gstreamer1-1.22.7-1.fc39 Update description: Fixes for GStreamer-SA-2023-0010 (ZDI-CAN-22299) and GStreamer-SA-2023-0009 (ZDI-CAN-22226) (CVE-2023-44429) Read More
USN-6476-1: Memcached vulnerabilities
It was discovered that Memcached incorrectly handled certain multiget requests in proxy mode. A remote attacker could use this issue to cause Memcached to crash,...
USN-6475-1: Cobbler vulnerabilities
It was discovered that Cobbler did not properly handle user input, which could result in an absolute path traversal. An attacker could possibly use this...