python3.11-3.11.9-5.fc41

Read Time:18 Second

FEDORA-2024-d3d904cb56

Packages in this update:

python3.11-3.11.9-5.fc41

Update description:

Automatic update for python3.11-3.11.9-5.fc41.

Changelog

* Thu Aug 15 2024 Charalampos Stratakis <cstratak@redhat.com> – 3.11.9-5
– Security fix for CVE-2024-4032 (rhbz#2293391)
– Security fix for CVE-2024-6923 (rhbz#2303158)

Read More

python3.11-3.11.9-5.fc42

Read Time:18 Second

FEDORA-2024-f247f05e2e

Packages in this update:

python3.11-3.11.9-5.fc42

Update description:

Automatic update for python3.11-3.11.9-5.fc42.

Changelog

* Thu Aug 15 2024 Charalampos Stratakis <cstratak@redhat.com> – 3.11.9-5
– Security fix for CVE-2024-4032 (rhbz#2293391)
– Security fix for CVE-2024-6923 (rhbz#2303158)

Read More

Friday Squid Blog: The Market for Squid Oil Is Growing

Read Time:23 Second

How did I not know before now that there was a market for squid oil?

The squid oil market has experienced robust growth in recent years, expanding from $4.56 billion in 2023 to $4.94 billion in 2024 at a compound annual growth rate (CAGR) of 8.5%. The growth in the historic period can be attributed to global market growth, alternative to fish oil, cosmetics and skincare industry, sustainability practices, regulatory influence.

Blog moderation policy.

Read More

webkitgtk-2.44.3-2.fc40

Read Time:21 Second

FEDORA-2024-6b8845e3f0

Packages in this update:

webkitgtk-2.44.3-2.fc40

Update description:

Fix web process cache suspend/resume when sandbox is enabled.
Fix accelerated images disappearing after scrolling.
Fix video flickering with DMA-BUF sink.
Fix pointer lock on X11.
Fix movement delta on mouse events in GTK3.
Undeprecate console message API and make it available in 2022 API.
Fix several crashes and rendering issues.

Read More

New Windows IPv6 Zero-Click Vulnerability

Read Time:25 Second

The press is reporting a critical Windows vulnerability affecting IPv6.

As Microsoft explained in its Tuesday advisory, unauthenticated attackers can exploit the flaw remotely in low-complexity attacks by repeatedly sending IPv6 packets that include specially crafted packets.

Microsoft also shared its exploitability assessment for this critical vulnerability, tagging it with an “exploitation more likely” label, which means that threat actors could create exploit code to “consistently exploit the flaw in attacks.”

Details are being withheld at the moment. Microsoft strongly recommends patching now.

Read More