You are here
Security
DSA-5936-1 libfile-find-rule-perl - security update
DSA-5935-1 chromium - security update
DSA-5934-1 roundcube - security update
DSA-5933-1 tcpdf - security update
DSA-5932-1 thunderbird - security update
DSA-5931-1 systemd - security update
Details can be found in the Qualys advisory at https://www.qualys.com/2025/05/29/apport-coredump/apport-coredump.txt
DSA-5930-1 libavif - security update
DSA-5929-1 chromium - security update
DSA-5923-2 net-tools - regression update
DSA-5928-1 libvpx - security update
DSA-5927-1 yelp - security update
DSA-5926-1 firefox-esr - security update
DSA-5925-1 linux - security update
For CPUs affected to ITS (Indirect Target Selection), to fully mitigate the vulnerability it is also necessary to update the intel-microcode packages released in DSA 5924-1.
For details on the Indirect Target Selection (ITS) vulnerability please refer to https://www.vusec.net/projects/training-solo/ and https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/indirect-target-selection.html .
DSA-5924-1 intel-microcode - security update
For CPUs affected to ITS (Indirect Target Selection), to fully mitigate the vulnerability it is also necessary to update the Linux kernel packages released in a separate, forthcoming DSA.
For details on the Indirect Target Selection (ITS) vulnerability please refer to https://www.vusec.net/projects/training-solo/ and https://www.intel.com/content/www/us/en/developer/articles/technical/software-security-guidance/advisory-guidance/indirect-target-selection.html .
For details on the Branch Privilege Injection vulnerability please refer to https://comsec.ethz.ch/research/microarch/branch-privilege-injection/
Pages
- « first
- ‹ previous
- 1
- 2
- 3
- 4
