Fedora 34: mod_auth_mellon 2022-b18f01985a
New upstream version 0.18.0 Resolves: rhbz#1988235 CVE-2021-3639 mod_auth_mellon: Open Redirect vulnerability in logout URLs
New upstream version 0.18.0 Resolves: rhbz#1988235 CVE-2021-3639 mod_auth_mellon: Open Redirect vulnerability in logout URLs
Update to 2.9.1 to fix CVE-2021-45931.
This is the second service release to update the new stable version 1.5. It provides a bunch of small fixes and improvements to the OAuth feature as well as a security fix to a recently reported XSS vulnerability. See the full changelog in the [release notes](https://github.com/roundcube/roundcubemail/releases/tag/1.5.2) on the
Security fix for CVE-2020-16156
– Update to 2.16.12 Release notes: https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.12
– Update to 2.16.12 Release notes: https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.12
Security fix for CVE-2021-45463
https://www.mediawiki.org/wiki/Release_notes/1.36#MediaWiki_1.36.3
grub2 updates for boothole vulnerabilities in f31/f32.
– https://www.drupal.org/project/drupal/releases/7.72 – [Drupal core – Critical – Cross Site Request Forgery – SA- CORE-2020-004](https://www.drupal.org/sa-core-2020-004) / CVE-2020-13663 – https://www.drupal.org/project/drupal/releases/7.71 – https://www.drupal.org/project/drupal/releases/7.70 – [Drupal core –
– https://www.drupal.org/project/drupal/releases/7.72 – [Drupal core – Critical – Cross Site Request Forgery – SA- CORE-2020-004](https://www.drupal.org/sa-core-2020-004) / CVE-2020-13663 – https://www.drupal.org/project/drupal/releases/7.71 – https://www.drupal.org/project/drupal/releases/7.70 – [Drupal core –
https://lists.gnupg.org/pipermail/gnutls-help/2020-September/004669.html
update to 2.2.16, CVE-2020-24583, CVE-2020-24584
Update to upstream bugfix and security release 2.9.13.
Update built with the new CMake settings Number of files which should have been owned by the testsuite subpackage are now owned by it Started building MeCab plugin
8u265 update, disable LTO
libX11 1.6.12 (CVE-2020-14363, CVE 2020-14344)
QEMU: usb: out-of-bounds r/w access issue [XSA-335, CVE-2020-14364] (#1871850)
The 5.8.6 stable kernel update contains a number of important fixes across the tree.
The 5.8.6 stable kernel update contains a number of important fixes across the tree.
Update to upstream bugfix and security release 2.9.13. —- Update to 2.9.12 upstream bugfix and security update
Add patch for CVE-2020-24661: Handling of pinned, invalid TLS certificates.
The 5.8.6 stable kernel update contains a number of important fixes across the tree.
Update to the new upstream 3.6.15 release.
Update to Chromium 85.0.4183.83. Bugs fixed, security holes patched, and features added. Hold on to your butts. List of CVEs resolved with this update: CVE-2020-6532 CVE-2020-6537 CVE-2020-6538 CVE-2020-6539 CVE-2020-6540 CVE-2020-6541 CVE-2020-6542 CVE-2020-6543 CVE-2020-6544 CVE-2020-6545 CVE-2020-6546 CVE-2020-6547 CVE-2020-6548 CVE-2020-6549 CVE-2020-6550
Rebased to version 8.0.21
Squid version update to 4.13 and security fixes
Fix CVE-2020-24370 .
This release includes the latest stable version of Apache **httpd**, version **2.4.46**. A security issue is addressed in this update: * **CVE-2020-11984** mod_proxy_uwsgi: Malicious request may result in information disclosure or RCE of existing file on the server running under a malicious process environment. For the full list of changes in this release, see
Squid version update to 4.13 and security fixes
61 queries. 8.5 mb Memory usage. 1.483 seconds.