29.04.2024 19:01 Update to 3.7 , security fix for CVE-2024-3651
29.04.2024 08:15 Potential DoS attacks have been fixed by rate limiting HTTP/2 CONTINUATION frames in Apache Traffic Server, an HTTP/1.1 and HTTP/2 compliant caching proxy server.
29.04.2024 08:15 Improper form input field validation has been fixed in Zabbix, a network monitoring solution. For Debian 10 buster, this problem has been fixed in version
28.04.2024 20:15 Several vulnerabilities have been found in frr, the FRRouting suite of internet protocols. An attacker could craft packages to trigger buffer overflows with the possibility to gain remote code execution, buffer overreads, crashes or trick the software to enter an infinite loop.
28.04.2024 20:15 Release 4.2.0
28.04.2024 20:15 update to 124.0.6367.78 * Critical CVE-2024-4058: Type Confusion in ANGLE * High CVE-2024-4059: Out of bounds read in V8 API * High CVE-2024-4060: Use after free in Dawn
28.04.2024 20:15 Release 4.2.0
27.04.2024 23:30 Security vulnerabilities were found in mediawiki, a website engine for collaborative work, that could lead to information disclosure, privilege escalation, or denial of service.
27.04.2024 23:30 CVE-2024-3852: GetBoundName in the JIT returned the wrong object CVE-2024-3854: Out-of-bounds-read after mis-optimized switch statement CVE-2024-3857: Incorrect JITting of arguments led to use-after-free during garbage collection CVE-2024-2609: Permission prompt input delay could expire when not in
27.04.2024 13:01 update to 124.0.6367.78 * Critical CVE-2024-4058: Type Confusion in ANGLE * High CVE-2024-4059: Out of bounds read in V8 API * High CVE-2024-4060: Use after free in Dawn
27.04.2024 13:01 CVE-2024-3852: GetBoundName in the JIT returned the wrong object CVE-2024-3854: Out-of-bounds-read after mis-optimized switch statement CVE-2024-3857: Incorrect JITting of arguments led to use-after-free during garbage collection CVE-2024-2609: Permission prompt input delay could expire when not in
27.04.2024 13:01 The chromium-browser-stable package has been updated to the 124.0.6367.60 release. It includes 23 security fixes. Please, do note, only x86_64 is supported from now on. i586 support for linux was stopped some years ago and the community is not able to provide patches anymore for the latest Chromium code.
27.04.2024 02:15 * bsc#1213470 * bsc#1222979 * bsc#1222983 * bsc#1222984 * bsc#1222986
27.04.2024 02:15 * bsc#1213470 * bsc#1222979 * bsc#1222983 * bsc#1222984 * bsc#1222986
27.04.2024 02:15 * bsc#1213470 * bsc#1222979 * bsc#1222983 * bsc#1222984 * bsc#1222986