bpftool-7.5.0-1.fc40 kernel-6.12.4-100.fc40 kernel-headers-6.12.4-100.fc40
FEDORA-2024-811cffc4ef Packages in this update: bpftool-7.5.0-1.fc40 kernel-6.12.4-100.fc40 kernel-headers-6.12.4-100.fc40 Update description: The 6.12.4 stable kernel rebase contains new features, additional hardware support and a number of...
USN-7150-1: Tornado vulnerabilities
It was discovered that Tornado incorrectly handled a certain redirect. A remote attacker could possibly use this issue to redirect a user to an arbitrary...
linux-firmware-20241210-1.fc41
FEDORA-2024-516b214c25 Packages in this update: linux-firmware-20241210-1.fc41 Update description: Update to upstream 20241210 Update firmware file for Intel BlazarU core amdgpu: numerous firmware updates upstream amdnpu...
linux-firmware-20241210-1.fc40
FEDORA-2024-5f9b20882f Packages in this update: linux-firmware-20241210-1.fc40 Update description: Update to upstream 20241210 Update firmware file for Intel BlazarU core amdgpu: numerous firmware updates upstream amdnpu...
ZDI-24-1672: GFI Archiver Store Service Deserialization of Untrusted Data Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of GFI Archiver. Authentication is required to exploit this vulnerability. The ZDI has...
ZDI-24-1671: GFI Archiver Telerik Web UI Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of GFI Archiver. Authentication is not required to exploit this vulnerability. The ZDI...
ZDI-24-1670: GFI Archiver Core Service Deserialization of Untrusted Data Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of GFI Archiver. Authentication is required to exploit this vulnerability. The ZDI has...
ZDI-24-1669: Veritas Enterprise Vault MonitoringMiddleTier Deserialization of Untrusted Data Remote Code Execution Vulnerability
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Veritas Enterprise Vault. Authentication is required to exploit this vulnerability. The ZDI...
ZDI-24-1668: Veritas Enterprise Vault Deserialization of Untrusted Data Remote Code Execution Vulnerability
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Veritas Enterprise Vault. Authentication is required to exploit this vulnerability. The ZDI...
ZDI-24-1667: Veritas Enterprise Vault Deserialization of Untrusted Data Remote Code Execution Vulnerability
This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Veritas Enterprise Vault. Authentication is required to exploit this vulnerability. The ZDI...