24.06.2024 17:30 * bsc#1226423 Cross-References: * CVE-2024-38394
24.06.2024 17:30 * bsc#1226423 Cross-References: * CVE-2024-38394
24.06.2024 17:30 * bsc#1225971 Cross-References: * CVE-2024-20696
24.06.2024 17:30 * bsc#1089090 Cross-References: * CVE-2018-9918
24.06.2024 17:30 * bsc#1226419 Cross-References: * CVE-2024-38428
24.06.2024 17:30 Update to 1.1.1 to fix CVE CVE-2024-36039
23.06.2024 20:15 This update includes a rebase from 9.0.83 to 9.0.89. #2269611 CVE-2024-24549 tomcat: CVE-2024-24549: Apache Tomcat: HTTP/2 header handling DoS #2269612 CVE-2024-23672 tomcat: Apache Tomcat: WebSocket DoS with incomplete closing handshake
23.06.2024 10:30 New emacs packages are available for Slackware 15.0 and -current to fix a security issue.
23.06.2024 10:30 Use-after-free in networking. Use-after-free in JavaScript object transplant. External protocol handlers leaked by timing attack. Sandboxed iframes were able to bypass sandbox restrictions to open a new window.
22.06.2024 23:47 Multiple vulnerabilities have been discovered in JHead, the worst of which may lead to arbitrary code execution.
22.06.2024 23:47 A vulnerability has been discovered in LZ4, which can lead to memory corruption.
22.06.2024 23:47 A vulnerability has been discovered in RDoc, which can lead to execution of arbitrary code.
22.06.2024 23:47 A vulnerability has been discovered in Flatpak, which can lead to a sandbox escape.
22.06.2024 23:47 A vulnerability has been discovered in GLib, which can lead to privilege escalation.
22.06.2024 13:30 Update to 2.44.2: Make gamepads visible on axis movements, and not only on button presses. Disable the gst-libav AAC decoder. Make user scripts and style sheets visible in the Web Inspector. Use the geolocation portal where available, with the existing geoclue as