unbound-1.16.2-3.fc35
FEDORA-2022-0a914d5c6b Packages in this update: unbound-1.16.2-3.fc35 Update description: sync up to upstream unbound.conf, Enable Extended DNS Error codes (RFC8914) Fixes CVE-2022-30698 and CVE-2022-30699 Start unbound-keygen.service...
unbound-1.16.2-3.fc36
FEDORA-2022-f89beb0640 Packages in this update: unbound-1.16.2-3.fc36 Update description: sync up to upstream unbound.conf, Enable Extended DNS Error codes (RFC8914) Fixes CVE-2022-30698 and CVE-2022-30699 Read More
freeciv-2.6.7-1.fc35
FEDORA-2022-3cbf2184bd Packages in this update: freeciv-2.6.7-1.fc35 Update description: 2.6.7 Read More
wpebackend-fdo-1.12.1-1.fc36
FEDORA-2022-f98ab9f311 Packages in this update: wpebackend-fdo-1.12.1-1.fc36 Update description: Fixed a crash caused by trying to deallocate already freed graphics buffers in certain situations. Read More
unbound-1.16.2-2.fc35
FEDORA-2022-28fbfb87ef Packages in this update: unbound-1.16.2-2.fc35 Update description: Fixes CVE-2022-30698 and CVE-2022-30699 Start unbound-keygen.service each time unbound starts if files are not already present. Read...
unbound-1.16.2-2.fc36
FEDORA-2022-e021f05d21 Packages in this update: unbound-1.16.2-2.fc36 Update description: Fixes CVE-2022-30698 and CVE-2022-30699 Read More
python-yara-4.2.0-5.fc36 yara-4.2.3-1.fc36
FEDORA-2022-21cf5402fc Packages in this update: python-yara-4.2.0-5.fc36 yara-4.2.3-1.fc36 Update description: Update to yara-4.2.3 Update to 4.2.0 Update to 4.2.2 Read More
Multiple Vulnerabilities in Exim Could Allow for Remote Code Execution
Multiple vulnerabilities have been discovered in Exim, the most severe of which could allow for remote code execution. Exim is a mail transfer agent used...
Multiple Vulnerabilities in Exim Could Allow for Remote Code Execution
Multiple vulnerabilities have been discovered in Exim, the most severe of which could allow for remote code execution. Exim is a mail transfer agent used...
Backdoor.Win32.Guptachar.20 / Insecure Credential Storage
Posted by malvuln on Aug 08 Discovery / credits: Malvuln (John Page aka hyp3rlinx) (c) 2022 Original source: https://malvuln.com/advisory/857999d2306f257b80d1b8f6a51ae8b0.txt Contact: malvuln13 () gmail com Media:...