suricata-7.0.7-1.fc41
FEDORA-2024-b5da13e80a Packages in this update: suricata-7.0.7-1.fc41 Update description: Various security, performance, accuracy, and stability issues have been fixed. Read More
suricata-7.0.7-1.fc40
FEDORA-2024-8b08786765 Packages in this update: suricata-7.0.7-1.fc40 Update description: Various security, performance, accuracy, and stability issues have been fixed. Read More
Multiple Vulnerabilities in Palo Alto Network’s Expedition Could Allow for Arbitrary Code Execution
Multiple Vulnerabilities in Palo Alto Network’s Expedition have been discovered, the most severe of which could allow for arbitrary code execution on Palo Alto Firewalls....
USN-7040-2: ConfigObj vulnerability
USN-7040-1 fixed a vulnerability in ConfigObj. This update provides the corresponding update for Ubuntu 14.04 LTS. Original advisory details: It was discovered that ConfigObj contains...
USN-7014-3: nginx vulnerability
USN-7014-1 fixed a vulnerability in nginx. This update provides the corresponding update for Ubuntu 14.04 LTS. Original advisory details: It was discovered that the nginx...
USN-6968-3: PostgreSQL vulnerability
USN-6968-1 fixed CVE-2024-7348 in PostgreSQL-12, PostgreSQL-14, and PostgreSQL-16. This update provides the corresponding updates for PostgreSQL-9.3 in Ubuntu 14.04 LTS and PostgreSQL-10 in Ubuntu 18.04...
USN-7015-4: Python vulnerability
USN-7015-1 fixed several vulnerabilities in Python. This update provides the corresponding update for CVE-2023-27043 for python2.7 and python3.5 in Ubuntu 14.04 LTS. Original advisory details:...
USN-7067-1: HAProxy vulnerability
It was discovered that HAProxy did not properly limit the creation of new HTTP/2 streams. A remote attacker could possibly use this issue to cause...
wireshark-4.2.8-1.fc40
FEDORA-2024-1949806a59 Packages in this update: wireshark-4.2.8-1.fc40 Update description: New version 4.2.8 Fix for CVE-2024-9781 Read More
USN-7066-1: Thunderbird vulnerability
Damien Schaeffer discovered that Thunderbird did not properly manage certain memory operations when processing content in the Animation timelines. An attacker could potentially exploit this...