Security fix for CVE-2021-4122
Posts Tagged Fedora Linux Distribution – Security Advisories
Update to 0.9.6, see https://github.com/uriparser/uriparser/blob/uriparser-0.9.6/ChangeLog for details.
– kombu 5.2.3: https://github.com/celery/kombu/blob/master/Changelog.rst#523 – celery 5.2.3: https://github.com/celery/celery/blob/master/Changelog.rst#523
Update to 0.9.6, see https://github.com/uriparser/uriparser/blob/uriparser-0.9.6/ChangeLog for details.
The 5.15.14 stable kernel update contains a number of important fixes across the tree.
The 5.15.14 stable kernel update contains a number of important fixes across the tree.
Security fix for CVE-2021-41500. Upstream notes for version 1.2.7 read: “Bug fixes, Python 3.10 compatibility”.
Security fix for CVE-2021-46059, CVE-2022-0158, CVE-2022-0156
New upstream version 0.18.0 Resolves: rhbz#1988235 CVE-2021-3639 mod_auth_mellon: Open Redirect vulnerability in logout URLs
Update to 2.9.1 to fix CVE-2021-45931.
This is the second service release to update the new stable version 1.5. It provides a bunch of small fixes and improvements to the OAuth feature as well as a security fix to a recently reported XSS vulnerability. See the full changelog in the [release notes](https://github.com/roundcube/roundcubemail/releases/tag/1.5.2) on the
Security fix for CVE-2020-16156
– Update to 2.16.12 Release notes: https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.12
– Update to 2.16.12 Release notes: https://github.com/ARMmbed/mbedtls/releases/tag/v2.16.12
Security fix for CVE-2021-45463
https://www.mediawiki.org/wiki/Release_notes/1.36#MediaWiki_1.36.3
grub2 updates for boothole vulnerabilities in f31/f32.
– https://www.drupal.org/project/drupal/releases/7.72 – [Drupal core – Critical – Cross Site Request Forgery – SA- CORE-2020-004](https://www.drupal.org/sa-core-2020-004) / CVE-2020-13663 – https://www.drupal.org/project/drupal/releases/7.71 – https://www.drupal.org/project/drupal/releases/7.70 – [Drupal core –
– https://www.drupal.org/project/drupal/releases/7.72 – [Drupal core – Critical – Cross Site Request Forgery – SA- CORE-2020-004](https://www.drupal.org/sa-core-2020-004) / CVE-2020-13663 – https://www.drupal.org/project/drupal/releases/7.71 – https://www.drupal.org/project/drupal/releases/7.70 – [Drupal core –
https://lists.gnupg.org/pipermail/gnutls-help/2020-September/004669.html
update to 2.2.16, CVE-2020-24583, CVE-2020-24584
Update to upstream bugfix and security release 2.9.13.
Update built with the new CMake settings Number of files which should have been owned by the testsuite subpackage are now owned by it Started building MeCab plugin
8u265 update, disable LTO
libX11 1.6.12 (CVE-2020-14363, CVE 2020-14344)
QEMU: usb: out-of-bounds r/w access issue [XSA-335, CVE-2020-14364] (#1871850)
The 5.8.6 stable kernel update contains a number of important fixes across the tree.
The 5.8.6 stable kernel update contains a number of important fixes across the tree.
Update to upstream bugfix and security release 2.9.13. —- Update to 2.9.12 upstream bugfix and security update
Add patch for CVE-2020-24661: Handling of pinned, invalid TLS certificates.