FEDORA-2024-bed028af54
Packages in this update:
python3.11-3.11.9-5.fc40
Update description:
Security fix for CVE-2024-4032 (rhbz#2293391)
python3.11-3.11.9-5.fc40
Security fix for CVE-2024-4032 (rhbz#2293391)
python3.11-3.11.9-5.fc41
Automatic update for python3.11-3.11.9-5.fc41.
* Thu Aug 15 2024 Charalampos Stratakis <cstratak@redhat.com> – 3.11.9-5
– Security fix for CVE-2024-4032 (rhbz#2293391)
– Security fix for CVE-2024-6923 (rhbz#2303158)
python3.11-3.11.9-5.fc42
Automatic update for python3.11-3.11.9-5.fc42.
* Thu Aug 15 2024 Charalampos Stratakis <cstratak@redhat.com> – 3.11.9-5
– Security fix for CVE-2024-4032 (rhbz#2293391)
– Security fix for CVE-2024-6923 (rhbz#2303158)
How did I not know before now that there was a market for squid oil?
The squid oil market has experienced robust growth in recent years, expanding from $4.56 billion in 2023 to $4.94 billion in 2024 at a compound annual growth rate (CAGR) of 8.5%. The growth in the historic period can be attributed to global market growth, alternative to fish oil, cosmetics and skincare industry, sustainability practices, regulatory influence.
python3.11-3.11.9-5.fc39
Security fix for CVE-2024-4032 (rhbz#2293391)
webkitgtk-2.44.3-2.fc40
Fix web process cache suspend/resume when sandbox is enabled.
Fix accelerated images disappearing after scrolling.
Fix video flickering with DMA-BUF sink.
Fix pointer lock on X11.
Fix movement delta on mouse events in GTK3.
Undeprecate console message API and make it available in 2022 API.
Fix several crashes and rendering issues.
Two Congressmen fear that the Chinese government might use TP-Link Wi-Fi routers to deploy hacking and espionage campaigns in the US
Microsoft is mandating MFA for all Azure sign-ins, with customers given 60-day advance notices to start implementation
The press is reporting a critical Windows vulnerability affecting IPv6.
As Microsoft explained in its Tuesday advisory, unauthenticated attackers can exploit the flaw remotely in low-complexity attacks by repeatedly sending IPv6 packets that include specially crafted packets.
Microsoft also shared its exploitability assessment for this critical vulnerability, tagging it with an “exploitation more likely” label, which means that threat actors could create exploit code to “consistently exploit the flaw in attacks.”
Details are being withheld at the moment. Microsoft strongly recommends patching now.
The US data broker did not address the threat actor’s claim that the breach concerns 2.9 billion records