FEDORA-2024-89d685e856
Packages in this update:
wordpress-6.5.5-1.fc39
Update description:
WordPress 6.5.5 Maintenance & Security Release
Security updates included in this release
The security team would like to thank the following people for responsibly reporting vulnerabilities, and allowing them to be fixed in this release:
A cross-site scripting (XSS) vulnerability affecting the HTML API reported by Dennis Snell of the WordPress Core Team, along with Alex Concha and Grzegorz (Greg) Ziółkowski of the WordPress security team.
A cross-site scripting (XSS) vulnerability affecting the Template Part block reported independently by Rafie Muhammad of Patchstack and during a third party security audit.
A path traversal issue affecting sites hosted on Windows reported independently by Rafie M & Edouard L of Patchstack, David Fifield, x89, apple502j, and mishre.
See also the Upstream announcement
More Stories
OpenIPMI-2.0.36-1.fc41
FEDORA-2025-ae55d50be2 Packages in this update: OpenIPMI-2.0.36-1.fc41 Update description: Update to 2.0.36 Fixes CVE-2024-42934 Read More
DSA-5879-1 opensaml – security update
Alexander Tan discovered that the OpenSAML C++ library was susceptible to forging of signed SAML messages. For additional details please...
chromium-134.0.6998.88-3.fc42
FEDORA-2025-6b9cbdbdff Packages in this update: chromium-134.0.6998.88-3.fc42 Update description: Update to 134.0.6998.88 High CVE-2025-1920: Type Confusion in V8 High CVE-2025-2135: Type...
jupyterlab-4.3.6-1.fc41
FEDORA-2025-e50201543b Packages in this update: jupyterlab-4.3.6-1.fc41 Update description: Update to 4.3.6 (rhbz#2352545) Read More
jupyterlab-4.3.6-1.fc40
FEDORA-2025-1d68ba6806 Packages in this update: jupyterlab-4.3.6-1.fc40 Update description: Update to 4.3.6 (rhbz#2352545) Read More
MS-ISAC CYBERSECURITY ADVISORY – Multiple Vulnerabilities in Sante PACS Server Could Allow for Remote Code Execution – PATCH NOW – TLP: CLEAR
Multiple vulnerabilities have been discovered in Sante PACS Server, the most severe of which could allow for remote code execution....