FEDORA-EPEL-2024-34c7addedb
Packages in this update:
chromium-121.0.6167.160-1.el8
Update description:
Update to 121.0.6167.160
High CVE-2024-1284: Use after free in Mojo
High CVE-2024-1283: Heap buffer overflow in Skia
chromium-121.0.6167.160-1.el8
Update to 121.0.6167.160
High CVE-2024-1284: Use after free in Mojo
High CVE-2024-1283: Heap buffer overflow in Skia
chromium-121.0.6167.160-1.el7
Update to 121.0.6167.160
High CVE-2024-1284: Use after free in Mojo
High CVE-2024-1283: Heap buffer overflow in Skia
update to 121.0.6167.139
High CVE-2024-1060: Use after free in Canvas
High CVE-2024-1059: Use after free in WebRTC
High CVE-2024-1077: Use after free in Network
chromium-121.0.6167.160-1.el9
Update to 121.0.6167.160
High CVE-2024-1284: Use after free in Mojo
High CVE-2024-1283: Heap buffer overflow in Skia
Multiple vulnerabilities have been discovered in FortiOS, the most severe of which could allow for remote code execution. FortiOS is Fortinet’s operating system used across many Fortinet devices. Successful exploitation of the most severe of these vulnerabilities could allow for remote code execution in the context of the system. Depending on the privileges associated with the service account, an attacker could then install programs; view, change, or delete data. Service accounts that are configured to have fewer user rights on the system could be less impacted than those who operate with administrative user rights.
caddy-2.7.6-1.fc39
Update to the latest upstream version, which includes a fix for CVE-2023-45142.
caddy-2.7.6-1.fc40
Automatic update for caddy-2.7.6-1.fc40.
* Fri Feb 9 2024 Carl George <carlwgeorge@fedoraproject.org> – 2.7.6-1
– Update to version 2.7.6 rhbz#2253698
– Includes fix for CVE-2023-45142 rhbz#2246587
This vulnerability allows local attackers to escalate privileges on affected installations of X.Org Server. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-6816.
This vulnerability allows local attackers to escalate privileges on affected installations of X.Org Server. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2023-6816.
This vulnerability allows local attackers to escalate privileges on affected installations of X.Org Server. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-0229.
This vulnerability allows local attackers to escalate privileges on affected installations of X.Org Server. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 7.8. The following CVEs are assigned: CVE-2024-21885.