[Forgot Password]
Login  Register Subscribe

30480

 
 

423868

 
 

251951

 
 

909

 
 

196667

 
 

282

 
 
Paid content will be excluded from the download.

Filter
Matches : 6352 Download | Alert*

gssdp [1.0.5-1] + gssdp-1.0.5-1 - Update to 1.0.5 - Fix SUBSCRIBE misbehaviour - Resolves: #1861928 gupnp [1.0.6-1] + gupnp-1.0.6-1 - Update to 1.0.6 - Fix SUBSCRIBE misbehaviour - Resolves: #1846589

ruby [3.1.4-143] - Upgrade to Ruby 3.1.4. Resolves: RHEL-5586 - Fix HTTP response splitting in CGI. Resolves: RHEL-5591 - Fix ReDos vulnerability in URI. Resolves: RHEL-28919 Resolves: RHEL-5612 - Fix ReDos vulnerability in Time. Resolves: RHEL-28920 - Make RDoc soft dependency in IRB. Resolves: RHEL-5613 [3.1.2-142] - Bypass git submodule test failure on Git gt;= 2.38.1. - Fix tests with Europe/A ...

[5.15.0-205.149.5.1.el9uek] - KVM: x86: Add BHI_NO [Orabug: 36384802] {CVE-2024-2201} - x86/bhi: Mitigate KVM by default [Orabug: 36384802] {CVE-2024-2201} - x86/bhi: Add BHI mitigation knob [Orabug: 36384802] {CVE-2024-2201} - x86/bhi: Enumerate Branch History Injection bug [Orabug: 36384802] {CVE-2024-2201} - x86/bhi: Define SPEC_CTRL_BHI_DIS_S [Orabug: 36384802] {CVE-2024-2201} - x86/bhi: ...

varnish [6.0.13-1] - new version 6.0.13 - Resolves: RHEL-30378 - varnish:6/varnish: HTTP/2 Broken Window Attack may result in denial of service varnish-modules

[5.15.0-205.149.5.1.el8uek] - KVM: x86: Add BHI_NO [Orabug: 36384802] {CVE-2024-2201} - x86/bhi: Mitigate KVM by default [Orabug: 36384802] {CVE-2024-2201} - x86/bhi: Add BHI mitigation knob [Orabug: 36384802] {CVE-2024-2201} - x86/bhi: Enumerate Branch History Injection bug [Orabug: 36384802] {CVE-2024-2201} - x86/bhi: Define SPEC_CTRL_BHI_DIS_S [Orabug: 36384802] {CVE-2024-2201} - x86/bhi: ...

[0.9.1-3.20211126git1ff6fe1f43] - Backport "tpm2: Check size of buffer before accessing it" Resolves: rhbz#2173960 Resolves: rhbz#2173967

* Fri Mar 27 2020 fjanus@redhat.com - 2.2.5-7 - Fix CVE-2018-14553 - Potential Null pointer dereference in gdImageClone Resolves: RHBZ#1811788 - Fixed heap based buffer overflow in gd_color_match.c:gdImageColorMatch in libgd as used in imagecolormatch Resolves: RHBZ#1678104 - Fixed potential double-free in gdImage*Ptr Resolves: RHBZ#1679002

[7.4p1-23.0.1] - enlarge format buffer size for certificate serial number so the log message can record any 64-bit integer without truncation [Orabug: 30448895] [7.4p1-23 + 0.10.3-2] - Avoid remote code execution in ssh-agent PKCS#11 support Resolves: CVE-2023-38408

[8.0p1-19] - Release bump [8.0p1-18] - Avoid remote code execution in ssh-agent PKCS#11 support Resolves: CVE-2023-38408

[8.7p1-30] - Avoid remote code execution in ssh-agent PKCS#11 support Resolves: CVE-2023-38408


Pages:      Start    187    188    189    190    191    192    193    194    195    196    197    198    199    200    ..   635

© SecPod Technologies