dotnet6.0-6.0.127-2.fc39
FEDORA-2024-b02e95ce83 Packages in this update: dotnet6.0-6.0.127-2.fc39 Update description: This is the February 2024 update for .NET 6 Read More
chromium-122.0.6261.69-1.fc39
FEDORA-2024-ef56ea86fc Packages in this update: chromium-122.0.6261.69-1.fc39 Update description: Updated to 122.0.6261.69 Read More
kernel-6.7.6-100.fc38
FEDORA-2024-71f0f16533 Packages in this update: kernel-6.7.6-100.fc38 Update description: The 6.7.6 stable kernel update contains a number of important fixes across the tree. Read More
kernel-6.7.6-200.fc39
FEDORA-2024-d16d94b00d Packages in this update: kernel-6.7.6-200.fc39 Update description: The 6.7.6 stable kernel update contains a number of important fixes across the tree. Read More
USN-6653-1: Linux kernel vulnerabilities
It was discovered that a race condition existed in the ATM (Asynchronous Transfer Mode) subsystem of the Linux kernel, leading to a use-after-free vulnerability. A...
USN-6652-1: Linux kernel (Azure) vulnerabilities
Marek Marczykowski-Górecki discovered that the Xen event channel infrastructure implementation in the Linux kernel contained a race condition. An attacker in a guest VM could...
USN-6651-1: Linux kernel vulnerabilities
It was discovered that a race condition existed in the ATM (Asynchronous Transfer Mode) subsystem of the Linux kernel, leading to a use-after-free vulnerability. A...
USN-6650-1: Linux kernel (OEM) vulnerability
Zhenghan Wang discovered that the generic ID allocator implementation in the Linux kernel did not properly check for null bitmap when releasing IDs. A local...
A Vulnerability in Apache OFBiz Could Allow for Remote Code Execution
A vulnerability has been discovered in the Apache OFBiz, which could allow for remote code execution. Apache OFBiz is an open source product for the...
ZDI-24-202: PDF-XChange Editor EMF File Parsing Out-Of-Bounds Read Information Disclosure Vulnerability
This vulnerability allows remote attackers to disclose sensitive information on affected installations of PDF-XChange Editor. User interaction is required to exploit this vulnerability in that...