Fedora 29: libmediainfo Security Update
Fix CVE-2019-11372
Fix CVE-2019-11372
Fix CVE-2019-11372
New version, fixes CVE-2019-6251 —- New version
Update to Samba 4.8.11, Security fixes for CVE-2019-3880
Fix Password leak for HTTP based authentication CVE-2019-3500 (rhbz #1663991 #1663992 #1663993)
Fix Password leak for HTTP based authentication CVE-2019-3500 (rhbz #1663991 #1663992 #1663993)
Security fix for CVE-2019-10906.
New version, fixes CVE-2019-6251
Security fix for CVE-2019-3885, CVE-2018-16877, CVE-2018-16878
Update to version 2.7 from upstream Security fix for CVE-2019-9494 (cache attack against SAE) Security fix for CVE-2019-9495 (cache attack against EAP-pwd) Security fix for CVE-2019-9496 (SAE confirm missing state validation in hostapd/AP) Security fix for CVE-2019-9497 (EAP-pwd server not checking for reflection attack) Security fix for CVE-2019-9498 (EAP-pwd server missing commit
**Version 9.3.4** This is a security release, upgrading is highly recommended * [security] Prevent external redirections This release also fix some minor issues.
– Fix an issue similar to CVE-2018-20060 where the authorization header was removed only when the case matched. – Fix an issue where the system CA bundle was loaded even when an alternate bundle was explicitly specified (https://www.openwall.com/lists/oss-security/2019/04/17/3) Full changelog at: https://github.com/urllib3/urllib3/blob/1.24.2/CHANGES.rst
This update fixes a [bug](https://github.com/mesonbuild/meson/issues/5268) in the Meson build system which caused binaries and libraries to incorrectly be marking as requiring an executable stack. This makes them more vulnerable to security issues, and also can result in errors caused by SELinux denials. This update also provides rebuilds of all the packages that were built with the buggy
This update fixes a [bug](https://github.com/mesonbuild/meson/issues/5268) in the Meson build system which caused binaries and libraries to incorrectly be marking as requiring an executable stack. This makes them more vulnerable to security issues, and also can result in errors caused by SELinux denials. This update also provides rebuilds of all the packages that were built with the buggy
This update fixes a [bug](https://github.com/mesonbuild/meson/issues/5268) in the Meson build system which caused binaries and libraries to incorrectly be marking as requiring an executable stack. This makes them more vulnerable to security issues, and also can result in errors caused by SELinux denials. This update also provides rebuilds of all the packages that were built with the buggy
This update fixes a [bug](https://github.com/mesonbuild/meson/issues/5268) in the Meson build system which caused binaries and libraries to incorrectly be marking as requiring an executable stack. This makes them more vulnerable to security issues, and also can result in errors caused by SELinux denials. This update also provides rebuilds of all the packages that were built with the buggy
Fixes for https://bugzilla.redhat.com/show_bug.cgi?id=1697217
Fixes for https://bugzilla.redhat.com/show_bug.cgi?id=1694523
This update fixes a [bug](https://github.com/mesonbuild/meson/issues/5268) in the Meson build system which caused binaries and libraries to incorrectly be marking as requiring an executable stack. This makes them more vulnerable to security issues, and also can result in errors caused by SELinux denials. This update also provides rebuilds of all the packages that were built with the buggy
This update fixes a [bug](https://github.com/mesonbuild/meson/issues/5268) in the Meson build system which caused binaries and libraries to incorrectly be marking as requiring an executable stack. This makes them more vulnerable to security issues, and also can result in errors caused by SELinux denials. This update also provides rebuilds of all the packages that were built with the buggy
This update fixes a [bug](https://github.com/mesonbuild/meson/issues/5268) in the Meson build system which caused binaries and libraries to incorrectly be marking as requiring an executable stack. This makes them more vulnerable to security issues, and also can result in errors caused by SELinux denials. This update also provides rebuilds of all the packages that were built with the buggy
This update fixes a [bug](https://github.com/mesonbuild/meson/issues/5268) in the Meson build system which caused binaries and libraries to incorrectly be marking as requiring an executable stack. This makes them more vulnerable to security issues, and also can result in errors caused by SELinux denials. This update also provides rebuilds of all the packages that were built with the buggy
This update fixes a [bug](https://github.com/mesonbuild/meson/issues/5268) in the Meson build system which caused binaries and libraries to incorrectly be marking as requiring an executable stack. This makes them more vulnerable to security issues, and also can result in errors caused by SELinux denials. This update also provides rebuilds of all the packages that were built with the buggy
This update fixes a [bug](https://github.com/mesonbuild/meson/issues/5268) in the Meson build system which caused binaries and libraries to incorrectly be marking as requiring an executable stack. This makes them more vulnerable to security issues, and also can result in errors caused by SELinux denials. This update also provides rebuilds of all the packages that were built with the buggy
Update to latest upstream release, fix CVE-2019-9844 (rhbz#1695304,
* Fix for CVE-2018-19840 CVE-2018-19841
* Do not allow changes in active URI before provisional load starts for non-API requests. * Stop the threaded compositor when the page is not visible or layer tree state is frozen. * Use WebKit HTTP source element again for adaptive streaming fragments downloading. * Properly handle empty resources in webkit_web_resource_get_data(). * Add quirk to ensure outlook.live.com uses the
The 5.0.7 update contains a number of important fixes across the tree
The 5.0.7 update contains a number of important fixes across the tree
This update fixes security vulnerability – Checkstyle loads external DTDs by default. Upstream issue: https://github.com/checkstyle/checkstyle/issues/6474 https://github.com/checkstyle/checkstyle/issues/6478 References: https://checkstyle.org/releasenotes.html#Release_8.18
61 queries. 8.75 mb Memory usage. 0.684 seconds.