Rozšírené hľadanie
Piatok 10. Január 2025 |
meniny má Dáša
Fedora 38: qemu 2023-68df3f4b02

29.08.2023 09:30 Rebase to qemu 7.2.5

RedHat: RHSA-2023-4780:01 Important: Red Hat OpenShift support for Windows

29.08.2023 09:30 The components for Red Hat OpenShift support for Windows Containers 6.0.2 are now available. This product release includes bug fixes and security updates for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle.

RedHat: RHSA-2023-4777:01 Important: Red Hat OpenShift support for Windows

29.08.2023 09:30 The components for Red Hat OpenShift support for Windows Containers 7.1.1 are now available. This product release includes bug fixes and security updates for the following packages: windows-machine-config-operator and windows-machine-config-operator-bundle.

SciLinux: SLSA-2023-4766-1 Important: cups on SL7.x x86_64

29.08.2023 09:30 cups: Information leak through Cups-Get-Document operation For more details about the security issue , including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE SL7 x86_64 cups-1.6.3-52.el7_9.x86_64.rpm cups-client-1.6.3-52.el7_9.x86_64.rpm cups-debuginfo-1.6.3-52.el7_9.i686.rpm cups-debuginfo-1.6.3-52.el7_9.x86_

openSUSE: 2023:0237-1 important: chromium

29.08.2023 09:30 An update that fixes 5 vulnerabilities is now available.

Rocky Linux: RLSA-2023:4706 subscription-manager security update

29.08.2023 09:30 Important: subscription-manager security update

Oracle9: ELSA-2023-4634: rust security Important Security Update

28.08.2023 23:00 The following updated rpms for Oracle Linux 9 have been uploaded to the Unbreakable Linux Network:

Oracle8: ELSA-2023-4635: rust-toolset:ol8 Important Security Update

28.08.2023 23:00 The following updated rpms for Oracle Linux 8 have been uploaded to the Unbreakable Linux Network:

RedHat: RHSA-2023-4767:01 Moderate: libxml2 security update

28.08.2023 23:00 An update for libxml2 is now available for Red Hat Enterprise Linux 8.6 Extended Update Support. Red Hat Product Security has rated this update as having a security impact of Moderate. A Common Vulnerability Scoring System base score, which

RedHat: RHSA-2023-4766:01 Important: cups security update

28.08.2023 23:00 An update for cups is now available for Red Hat Enterprise Linux 7. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System base score, which gives a detailed severity rating, is available for each vulnerability

RedHat: RHSA-2023-4771:01 Important: cups security update

28.08.2023 23:00 An update for cups is now available for Red Hat Enterprise Linux 8.2 Advanced Update Support, Red Hat Enterprise Linux 8.2 Telecommunications Update Service, and Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions.

RedHat: RHSA-2023-4765:01 Important: cups security update

28.08.2023 23:00 An update for cups is now available for Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions. Red Hat Product Security has rated this update as having a security impact of Important. A Common Vulnerability Scoring System base score,

Debian LTS: DLA-3544-1: clamav security update

28.08.2023 12:31 A vulnerability in the filesystem image parser for Hierarchical File System Plus of ClamAV, an anti-virus utility for Unix, could allow an unauthenticated, remote attacker to cause a denial of service condition on an affected device.

Debian: DSA-5484-1: librsvg security update

28.08.2023 02:45 Zac Sims discovered a directory traversal in the URL decoder of librsvg, a SAX-based renderer library for SVG files, which could result in read of arbitrary files when processing a specially crafted SVG file with an include element.

Debian LTS: DLA-3543-1: rar security update

27.08.2023 16:15 A specific flaw within the processing of recovery volumes exists in RAR, an archive program for rar files. It allows remote attackers to execute arbitrary code on affected installations. User interaction is required to exploit this vulnerability. The target must visit a malicious page or open a