FEDORA-2024-9f3765a04b
Packages in this update:
libxml2-2.12.9-1.fc40
Update description:
Update to 2.12.9
Fixes CVE-2024-40896
libxml2-2.12.9-1.fc40
Update to 2.12.9
Fixes CVE-2024-40896
libxml2-2.12.9-1.fc41
Update to 2.12.9
Fixes CVE-2024-40896.
iwd-3.3-1.fc40
libell-0.71-1.fc40
iwd 3.3:
Fix issue with handling External Authentication.
iwd 3.2:
Fix issue with GCC 15 and -std=c23 build errors.
Add support for using PMKSA over SAE if available.
Add support for HighUtilization/StationCount thresholds.
Add support for disabling Multicast RX option.
ell 0.71:
Fix issue with GCC 15 and -std=c23 build errors.
ell 0.70:
Add support for helper function for safe memcpy.
iwd-3.3-1.fc41
libell-0.71-1.fc41
iwd 3.3:
Fix issue with handling External Authentication.
iwd 3.2:
Fix issue with GCC 15 and -std=c23 build errors.
Add support for using PMKSA over SAE if available.
Add support for HighUtilization/StationCount thresholds.
Add support for disabling Multicast RX option.
ell 0.71:
Fix issue with GCC 15 and -std=c23 build errors.
ell 0.70:
Add support for helper function for safe memcpy.
The vulnerabilities, now patched, posed significant risks, including unauthorized file uploads, privilege escalation and SQL injection attacks
US healthcare giant Ascension revealed that 5.6 million individuals have had their personal, medical and financial information breached in a ransomware attack
The Justice Department has published the criminal complaint against Dmitry Khoroshev, for building and maintaining the LockBit ransomware.
Cryptomining malware hits popular npm packages rspack and vant, posing risks to open source tools
A vulnerability has been discovered in Apache Struts2, which could allow for remote code execution. Apache Struts2 is an open-source web application framework used for developing Java web applications. Successful exploitation of this vulnerability could allow for remote code execution in the context of the affected service account. Depending on the privileges associated with the service account, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Services whose accounts are configured to have less rights on the system could be less impacted than those who operate with administrative user rights.
A new digital operation has enabled Interpol to identify scores of human traffickers operating between South America and Europe