libopenmpt-0.7.8-1.fc39
FEDORA-2024-018a95fb38 Packages in this update: libopenmpt-0.7.8-1.fc39 Update description: Update from 0.7.6 to 0.7.8 for more bug-fixes. https://lib.openmpt.org/libopenmpt/2024/06/09/security-update-0.7.8-releases-0.6.17-0.5.31-0.4.43/ https://lib.openmpt.org/libopenmpt/2024/05/12/releases-0.7.7-0.6.16-0.5.30-0.4.42/ Read More
openvpn-2.6.11-1.fc40
FEDORA-2024-b611e122fb Packages in this update: openvpn-2.6.11-1.fc40 Update description: Update to upstream OpenVPN 2.6.11 CVE-2024-5594: control channel: refuse control channel messages with nonprintable characters in them...
US Bans Kaspersky Over Alleged Kremlin Links
Kaspersky “poses an undue or unacceptable risk to national security,” according to the US Commerce Department’s Bureau of Industry and Security Read More
Ross Anderson’s Memorial Service
The memorial service for Ross Anderson will be held on Saturday, at 2:00 PM BST. People can attend remotely on Zoom. (The passcode is “L3954FrrEF”.)...
Synnovis Attackers Publish NHS Patient Data Online
Ransomware group Qilin has reportedly published nearly 400GB of data stolen following the attack on NHS provider Synnovis in early June Read More
mingw-poppler-24.02.0-2.fc40
FEDORA-2024-94068499c9 Packages in this update: mingw-poppler-24.02.0-2.fc40 Update description: Backport fix for CVE-2024-6239. Read More
mingw-python-urllib3-1.26.19-1.fc40
FEDORA-2024-da86a4f061 Packages in this update: mingw-python-urllib3-1.26.19-1.fc40 Update description: Update to 1.26.19, fixes CVE-2024-0444. Read More
mingw-python-urllib3-1.26.19-1.fc39
FEDORA-2024-73f181db2a Packages in this update: mingw-python-urllib3-1.26.19-1.fc39 Update description: Update to 1.26.19, fixes CVE-2024-0444. Read More
Microsoft leak of PlayReady developer / Warbird libs
Posted by Security Explorations on Jun 21 Hello All, On Jun 11, 2024 Microsoft engineer posted on a public forum information about a crash experienced...
ZDI-24-862: (Pwn2Own) Phoenix Contact CHARX SEC-3100 MQTT Protocol JSON Parsing Buffer Overflow Remote Code Execution Vulnerability
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Phoenix Contact CHARX SEC-3100 devices. Authentication is not required to exploit this...