USN-7039-1: Linux kernel vulnerabilities
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the...
aws-24.0.0-3.fc41
FEDORA-2024-7908ee39a9 Packages in this update: aws-24.0.0-3.fc41 Update description: CVE-2024-41708: Ada Web Server did not use a cryptographically secure pseudorandom number generator. AWS.Utils.Random and AWS.Utils.Random_String used...
USN-7021-3: Linux kernel vulnerabilities
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the...
aws-24.0.0-3.fc42
FEDORA-2024-b87003097a Packages in this update: aws-24.0.0-3.fc42 Update description: Automatic update for aws-24.0.0-3.fc42. Changelog * Thu Sep 26 2024 Björn Persson <Bjorn@Rombobjörn.se> - 2:24.0.0-3 - Fixed...
An Analysis of the EU’s Cyber Resilience Act
A good—long, complex—analysis of the EU’s new Cyber Resilience Act. Read More
cjson-1.7.18-1.el9
FEDORA-EPEL-2024-bd0299dfc8 Packages in this update: cjson-1.7.18-1.el9 Update description: Update to new upstream version (closes rhbz#2237124) Fix rhbz#2277268, closes rhbz#2277269 Read More
NIST Scraps Passwords Complexity and Mandatory Changes in New Guidelines
The institute no longer requires regular password changes unless the authenticator has been compromised Read More
USN-7020-3: Linux kernel vulnerabilities
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the...
USN-7034-2: ca-certificates update
USN-7034-1 updated ca-certificates. This update provides the corresponding update for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. Original advisory details: The ca-certificates package contained outdated...
USN-7003-4: Linux kernel vulnerabilities
It was discovered that the JFS file system contained an out-of-bounds read vulnerability when printing xattr debug information. A local attacker could use this to...