ruby-3.0.4-152.fc35
FEDORA-2022-8cf0124add Packages in this update: ruby-3.0.4-152.fc35 Update description: Upgrade to Ruby 3.0.4. Read More
perl-App-cpanminus-1.7045-3420220414075222.f34
FEDORA-MODULAR-2022-3608f8903c Packages in this update: perl-App-cpanminus-1.7045-3420220414075222.f34 Update description: 1.7045 - [CVE-2020-16154] remove the functionality to verify CHECKSUMS signature Read More
perl-App-cpanminus-1.7045-3520220414075222.f35
FEDORA-MODULAR-2022-546fde32d6 Packages in this update: perl-App-cpanminus-1.7045-3520220414075222.f35 Update description: 1.7045 - [CVE-2020-16154] remove the functionality to verify CHECKSUMS signature Read More
perl-App-cpanminus-1.7045-3620220414075222.f36
FEDORA-MODULAR-2022-374f093c23 Packages in this update: perl-App-cpanminus-1.7045-3620220414075222.f36 Update description: 1.7045 - [CVE-2020-16154] remove the functionality to verify CHECKSUMS signature Read More
firefox-stable-3520220420085727.1 thunderbird-stable-3520220420101307.1
FEDORA-FLATPAK-2022-a5f56fc396 Packages in this update: firefox-stable-3520220420085727.1 thunderbird-stable-3520220420101307.1 Update description: Firefox 99 and Thunderbird 91.8 Flatpak updates Read More
USN-5385-1: Linux kernel vulnerabilities
Brendan Dolan-Gavitt discovered that the aQuantia AQtion Ethernet device driver in the Linux kernel did not properly validate meta-data coming from the device. A local...
CVE-2016-20014
In pam_tacplus.c in pam_tacplus before 1.4.1, pam_sm_acct_mgmt does not zero out the arep data structure. Read More
USN-5384-1: Linux kernel vulnerabilities
It was discovered that the UDF file system implementation in the Linux kernel could attempt to dereference a null pointer in some situations. An attacker...
USN-5383-1: Linux kernel vulnerabilities
David Bouman discovered that the netfilter subsystem in the Linux kernel did not properly validate passed user register indices. A local attacker could use this...
USN-5382-1: libinput vulnerability
Albin Eldstål-Ahrens and Lukas Lamster discovered libinput did not properly handle input devices with specially crafted names. A local attacker with physical access could use...