Rozšírené hľadanie
Nedeľa 28. Apríl 2024 |
meniny má Jarmila
Mageia 2024-0153: firefox Security Advisory Updates

27.04.2024 23:30 CVE-2024-3852: GetBoundName in the JIT returned the wrong object CVE-2024-3854: Out-of-bounds-read after mis-optimized switch statement CVE-2024-3857: Incorrect JITting of arguments led to use-after-free during garbage collection CVE-2024-2609: Permission prompt input delay could expire when not in

Debian LTS: DLA-3796-1: mediawiki Security Advisory Updates

27.04.2024 23:30 Security vulnerabilities were found in mediawiki, a website engine for collaborative work, that could lead to information disclosure, privilege escalation, or denial of service.

Mageia 2024-0150: chromium-browser-stable Security Advisory Updates

27.04.2024 13:01 The chromium-browser-stable package has been updated to the 124.0.6367.60 release. It includes 23 security fixes. Please, do note, only x86_64 is supported from now on. i586 support for linux was stopped some years ago and the community is not able to provide patches anymore for the latest Chromium code.

Fedora 39: chromium 2024-decb7e94a1 Security Advisory Updates

27.04.2024 13:01 update to 124.0.6367.78 * Critical CVE-2024-4058: Type Confusion in ANGLE * High CVE-2024-4059: Out of bounds read in V8 API * High CVE-2024-4060: Use after free in Dawn

Mageia 2024-0151: thunderbird Security Advisory Updates

27.04.2024 13:01 CVE-2024-3852: GetBoundName in the JIT returned the wrong object CVE-2024-3854: Out-of-bounds-read after mis-optimized switch statement CVE-2024-3857: Incorrect JITting of arguments led to use-after-free during garbage collection CVE-2024-2609: Permission prompt input delay could expire when not in

Debian: DSA-5675-1: chromium Security Advisory Updates

27.04.2024 02:15 Security issues were discovered in Chromium, which could result in the execution of arbitrary code, denial of service or information disclosure.

SUSE: 2024:1453-1 important: frr Security Advisory Updates

27.04.2024 02:15 * bsc#1220548 * bsc#1222518 Cross-References: * CVE-2024-27913

SUSE: 2024:1454-1 important: the Linux Kernel Security Advisory Updates

27.04.2024 02:15 * bsc#1186060 * bsc#1192145 * bsc#1194516 * bsc#1208995 * bsc#1209635

SUSE: 2024:1452-1 low: java-11-openjdk Security Advisory Updates

27.04.2024 02:15 * bsc#1213470 * bsc#1222979 * bsc#1222983 * bsc#1222984 * bsc#1222986

SUSE: 2024:1450-1 low: java-1_8_0-openjdk Security Advisory Updates

27.04.2024 02:15 * bsc#1213470 * bsc#1222979 * bsc#1222983 * bsc#1222984 * bsc#1222986

SUSE: 2024:1451-1 low: java-1_8_0-openjdk Security Advisory Updates

27.04.2024 02:15 * bsc#1213470 * bsc#1222979 * bsc#1222983 * bsc#1222984 * bsc#1222986

SUSE: 2024:1444-1 moderate: php7 Security Advisory Updates

26.04.2024 15:45 * bsc#1222857 * bsc#1222858 Cross-References: * CVE-2024-2756

SUSE: 2024:1439-1 moderate: python-idna Security Advisory Updates

26.04.2024 15:45 * bsc#1222842 Cross-References: * CVE-2024-3651

SUSE: 2024:1440-1 important: python-gunicorn Security Advisory Updates

26.04.2024 15:45 * bsc#1222950 Cross-References: * CVE-2024-1135

SUSE: 2024:1438-1 important: qemu Security Advisory Updates

26.04.2024 15:45 * bsc#1213269 * bsc#1218889 * bsc#1222843 * bsc#1222845

Následujúci mesiac