DSA-5175 thunderbird – security update
Multiple security issues were discovered in Thunderbird, which could result in denial of service or the execution of arbitrary code. Read More
DSA-5174 gnupg2 – security update
Demi Marie Obenour discovered a flaw in GnuPG, allowing for signature spoofing via arbitrary injection into the status line. An attacker who controls the secret...
DSA-5173 linux – security update
Several vulnerabilities have been discovered in the Linux kernel that may lead to a privilege escalation, denial of service or information leaks. Read More
podman-tui-0.5.0-1.fc36
FEDORA-2022-fb8ed17b4e Packages in this update: podman-tui-0.5.0-1.fc36 Update description: feature - image push feature - container commit using images.GetImage function for image inspect show confirmation dialog...
xen-4.15.3-1.fc35
FEDORA-2022-f5785fba8e Packages in this update: xen-4.15.3-1.fc35 Update description: update to xen-4.15.3 x86: MMIO Stale Data vulnerabilities (not applied in 4.15.2-5) x86: MMIO Stale Data vulnerabilities...
USN-5500-1: Linux kernel vulnerabilities
Eric Biederman discovered that the cgroup process migration implementation in the Linux kernel did not perform permission checks correctly in some situations. A local attacker...
CVE-2021-37524
Cross Site Scripting (XSS) vulnerability in FusionPBX 4.5.26 allows remote unauthenticated users to inject arbitrary web script or HTML via an unsanitized "path" parameter in...
CVE-2022-0167
An issue has been discovered in GitLab affecting all versions starting from 14.0 before 14.4.5, all versions starting from 14.5.0 before 14.5.3, all versions starting...
USN-5493-2: Linux kernel (HWE) vulnerability
It was discovered that the 8 Devices USB2CAN interface implementation in the Linux kernel did not properly handle certain error conditions, leading to a double-free....
USN-5485-2: Linux kernel (OEM) vulnerabilities
It was discovered that some Intel processors did not completely perform cleanup actions on multi-core shared buffers. A local attacker could possibly use this to...