FEDORA-2024-c7b547bec5
Packages in this update:
mingw-expat-2.6.3-1.fc40
Update description:
Update to expat-2.6.3.
mingw-expat-2.6.3-1.fc40
Update to expat-2.6.3.
mingw-expat-2.6.3-1.fc39
Update to expat-2.6.3.
clamav-1.0.7-1.fc40
Update to 1.0.7
CVE-2024-20506: Changed the logging module to disable following symlinks on Linux and Unix systems so as to prevent an attacker with existing access to the ‘clamd’ or ‘freshclam’ services from using a symlink to corrupt system files.
CVE-2024-20505: Fixed a possible out-of-bounds read bug in the PDF file parser that could cause a denial-of-service (DoS) condition.
clamav-1.0.7-1.el9
Update to 1.0.7
CVE-2024-20506: Changed the logging module to disable following symlinks on Linux and Unix systems so as to prevent an attacker with existing access to the ‘clamd’ or ‘freshclam’ services from using a symlink to corrupt system files.
CVE-2024-20505: Fixed a possible out-of-bounds read bug in the PDF file parser that could cause a denial-of-service (DoS) condition.
clamav-1.0.7-1.fc41
Update to 1.0.7
CVE-2024-20506: Changed the logging module to disable following symlinks on Linux and Unix systems so as to prevent an attacker with existing access to the ‘clamd’ or ‘freshclam’ services from using a symlink to corrupt system files.
CVE-2024-20505: Fixed a possible out-of-bounds read bug in the PDF file parser that could cause a denial-of-service (DoS) condition.
Revival Hijack Python Package Index supply chain attack threatens 22,000 packages through malicious downloads
Despite rising threats researchers find a third of firms see flat or falling security budgets and hiring slows
Cicada (also known as Cicada3301) is a sophisticated ransomware, written in Rust, that has claimed more than 20 victims since its discovery in June 2024.
Read more in my article on the Tripwire State of Security blog.
The first legally binding international treaty on AI was adopted by all 46 Council of Europe member states in May 2024
Cisco has urged customers to apply software updates to fix the critical vulnerabilities, which could allow attackers to collect sensitive data or administer services