USN-7088-5: Linux kernel vulnerabilities
Ziming Zhang discovered that the VMware Virtual GPU DRM driver in the Linux kernel contained an integer overflow vulnerability. A local attacker could use this...
USN-7089-5: Linux kernel vulnerabilities
Chenyuan Yang discovered that the USB Gadget subsystem in the Linux kernel did not properly check for the device to be enabled before writing. A...
USN-7071-2: Linux kernel vulnerability
A security issue was discovered in the Linux kernel. An attacker could possibly use this to compromise the system. This update corrects flaws in the...
USN-7110-1: Linux kernel vulnerabilities
Several security issues were discovered in the Linux kernel. An attacker could possibly use these to compromise the system. This update corrects flaws in the...
python3.6-3.6.15-39.fc41
FEDORA-2024-da1b7e1cc5 Packages in this update: python3.6-3.6.15-39.fc41 Update description: Security fix for CVE-2024-11168 Read More
USN-7049-2: PHP vulnerabilities
USN-7049-1 fixed vulnerabilities in PHP. This update provides the corresponding updates for Ubuntu 16.04 LTS and Ubuntu 18.04 LTS. Original advisory details: It was discovered...
dotnet9.0-9.0.100-1.fc41
FEDORA-2024-aab6aded81 Packages in this update: dotnet9.0-9.0.100-1.fc41 Update description: This is the .NET 9.0 GA release. It contains security fixes for CVE-2024-43498 and CVE-2024-43499 Announcement: https://devblogs.microsoft.com/dotnet/announcing-dotnet-9/...
USN-7109-1: Go vulnerabilities
Philippe Antoine discovered that Go incorrectly handled crafted HTTP/2 streams. An attacker could possibly use this issue to cause a denial of service. (CVE-2022-41723) Marten...
python3.6-3.6.15-39.fc40
FEDORA-2024-c16972785b Packages in this update: python3.6-3.6.15-39.fc40 Update description: Security fix for CVE-2024-11168 Read More
ZDI-24-1511: Microsoft Office PowerPoint PPTX File Parsing Use-After-Free Remote Code Execution Vulnerability
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Microsoft Office PowerPoint. User interaction is required to exploit this vulnerability in...