Category Archives: Advisories

libcaca-0.99-0.59.beta20.fc35

Read Time:15 Second

FEDORA-2022-fc6b53e7a2

Packages in this update:

libcaca-0.99-0.59.beta20.fc35

Update description:

Clean up SPEC file.
CVE-2018-20545, CVE-2018-20546, CVE-2018-20547, CVE-2018-20548, CVE-2018-20549 (#1687860).
CVE-2021-30498 (#1948677).
CVE-2021-30499 (#1948681).
CVE-2021-3410 (#1931971).

Read More

libcaca-0.99-0.59.beta20.fc34

Read Time:15 Second

FEDORA-2022-e3b9986722

Packages in this update:

libcaca-0.99-0.59.beta20.fc34

Update description:

Clean up SPEC file.
CVE-2018-20545, CVE-2018-20546, CVE-2018-20547, CVE-2018-20548, CVE-2018-20549 (#1687860).
CVE-2021-30498 (#1948677).
CVE-2021-30499 (#1948681).
CVE-2021-3410 (#1931971).

Read More

libcaca-0.99-0.59.beta20.fc36

Read Time:15 Second

FEDORA-2022-3d291845d8

Packages in this update:

libcaca-0.99-0.59.beta20.fc36

Update description:

Clean up SPEC file.
CVE-2018-20545, CVE-2018-20546, CVE-2018-20547, CVE-2018-20548, CVE-2018-20549 (#1687860).
CVE-2021-30498 (#1948677).
CVE-2021-30499 (#1948681).
CVE-2021-3410 (#1931971).

Read More

libcaca-0.99-0.40.beta20.el7

Read Time:16 Second

FEDORA-EPEL-2022-03421505cb

Packages in this update:

libcaca-0.99-0.40.beta20.el7

Update description:

Clean up SPEC file.
Update to beta20.
CVE-2018-20545, CVE-2018-20546, CVE-2018-20547, CVE-2018-20548, CVE-2018-20549 (#1687860).
CVE-2021-30498 (#1948677).
CVE-2021-30499 (#1948681).
CVE-2021-3410 (#1931971).

Read More

libcaca-0.99-0.59.beta20.el8

Read Time:16 Second

FEDORA-EPEL-2022-42af0c4375

Packages in this update:

libcaca-0.99-0.59.beta20.el8

Update description:

Clean up SPEC file.
Update to beta20.
CVE-2018-20545, CVE-2018-20546, CVE-2018-20547, CVE-2018-20548, CVE-2018-20549 (#1687860).
CVE-2021-30498 (#1948677).
CVE-2021-30499 (#1948681).
CVE-2021-3410 (#1931971).

Read More

Post Title

Read Time:23 Second

Multiple vulnerabilities have been discovered in Veeam Backup & Replication that could allow for remote code execution. Veeam Backup & Replication is a backup solutions for virtual environments. Successful exploitation of the most severe of these vulnerabilities could allow for remote code execution within the context of the application. Depending on the privileges associated with this application, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.

Read More