25.12.2024 14:15 Update to 6.2.74, fix for CVE-2024-55919 Full changelog: https://github.com/sympa-community/sympa/releases/tag/6.2.74
25.12.2024 14:15 Automatic update for tomcat-9.0.98-1.fc40. Changelog for tomcat * Mon Dec 09 2024 Packit - 1:9.0.98-1 - Update to version 9.0.98 - Resolves: rhbz#2331168
25.12.2024 14:15 Automatic update for tomcat-9.0.98-1.fc41. Changelog for tomcat * Mon Dec 09 2024 Packit - 1:9.0.98-1 - Update to version 9.0.98 - Resolves: rhbz#2331168
25.12.2024 03:45
25.12.2024 03:45 * bsc#1129772 * bsc#1152803 * bsc#1154838 * bsc#1181400 * bsc#1230961
25.12.2024 03:45 * bsc#1234795 Cross-References: * CVE-2024-56378
25.12.2024 03:45
25.12.2024 03:45 * bsc#1234795 Cross-References: * CVE-2024-56378
25.12.2024 03:45
24.12.2024 17:00 Update to 3.12.8
24.12.2024 17:00 Update to 3.12.8
24.12.2024 17:00 In elisp-mode.el in GNU Emacs through 30.0.92, a user who chooses to invoke elisp-completion-at-point on untrusted Emacs Lisp source code can trigger unsafe Lisp macro expansion that allows attackers to execute arbitrary code. (This unsafe expansion also occurs if a user chooses to enable on-the-fly diagnosis that byte
24.12.2024 07:15
24.12.2024 07:15 * bsc#1220490 * jsc#PED-10258 * jsc#PED-10751 Cross-References:
24.12.2024 07:15 * bsc#1220490 * jsc#PED-10258 * jsc#PED-10751 Cross-References: