FEDORA-2022-e674d52438
Packages in this update:
golang-github-vultr-govultr-2-2.17.2-1.fc36
vultr-cli-2.14.2-1.fc36
Update description:
Update govultr/vultr-cli
Update to latest
golang-github-vultr-govultr-2-2.17.2-1.fc36
vultr-cli-2.14.2-1.fc36
Update govultr/vultr-cli
Update to latest
Addressing security concerns associated with the growing momentum for edge computing, Microsoft is making its Edge Secured-core program for Windows-based IoT devices generally available.
Added as a new certification under the Azure Certified Device program, Edge Secured-core is for IoT devices running a full operating system, such as Windows 10 IoT or Linux. While support for Windows 10 IoT is generally available, it is still in preview for Linux.
chromium-102.0.5005.115-1.el8
Update to Chromium 102.0.5005.115 (yes, I know there is a newer one, but we need to get something out now).
This also adds the first build of Chromium for EPEL9, many thanks to all the folks who got the many dependencies built.
Fixes:
CVE-2022-1232 CVE-2022-1364 CVE-2022-1633 CVE-2022-1634 CVE-2022-1635 CVE-2022-1636 CVE-2022-1637 CVE-2022-1638 CVE-2022-1639 CVE-2022-1640 CVE-2022-1641 CVE-2022-1853 CVE-2022-1854 CVE-2022-1855 CVE-2022-1856 CVE-2022-1857 CVE-2022-1858 CVE-2022-1859 CVE-2022-1860 CVE-2022-1861 CVE-2022-1862 CVE-2022-1863 CVE-2022-1864 CVE-2022-1865 CVE-2022-1866 CVE-2022-1867 CVE-2022-1868 CVE-2022-1869 CVE-2022-1870 CVE-2022-1871 CVE-2022-1872 CVE-2022-1873 CVE-2022-1874 CVE-2022-1875 CVE-2022-1876
chromium-102.0.5005.115-2.el9
Update to Chromium 102.0.5005.115 (yes, I know there is a newer one, but we need to get something out now).
This also adds the first build of Chromium for EPEL9, many thanks to all the folks who got the many dependencies built.
Fixes:
CVE-2022-1232 CVE-2022-1364 CVE-2022-1633 CVE-2022-1634 CVE-2022-1635 CVE-2022-1636 CVE-2022-1637 CVE-2022-1638 CVE-2022-1639 CVE-2022-1640 CVE-2022-1641 CVE-2022-1853 CVE-2022-1854 CVE-2022-1855 CVE-2022-1856 CVE-2022-1857 CVE-2022-1858 CVE-2022-1859 CVE-2022-1860 CVE-2022-1861 CVE-2022-1862 CVE-2022-1863 CVE-2022-1864 CVE-2022-1865 CVE-2022-1866 CVE-2022-1867 CVE-2022-1868 CVE-2022-1869 CVE-2022-1870 CVE-2022-1871 CVE-2022-1872 CVE-2022-1873 CVE-2022-1874 CVE-2022-1875 CVE-2022-1876
chromium-102.0.5005.115-1.el7
Update to Chromium 102.0.5005.115 (yes, I know there is a newer one, but we need to get something out now).
This also adds the first build of Chromium for EPEL9, many thanks to all the folks who got the many dependencies built.
Fixes:
CVE-2022-1232 CVE-2022-1364 CVE-2022-1633 CVE-2022-1634 CVE-2022-1635 CVE-2022-1636 CVE-2022-1637 CVE-2022-1638 CVE-2022-1639 CVE-2022-1640 CVE-2022-1641 CVE-2022-1853 CVE-2022-1854 CVE-2022-1855 CVE-2022-1856 CVE-2022-1857 CVE-2022-1858 CVE-2022-1859 CVE-2022-1860 CVE-2022-1861 CVE-2022-1862 CVE-2022-1863 CVE-2022-1864 CVE-2022-1865 CVE-2022-1866 CVE-2022-1867 CVE-2022-1868 CVE-2022-1869 CVE-2022-1870 CVE-2022-1871 CVE-2022-1872 CVE-2022-1873 CVE-2022-1874 CVE-2022-1875 CVE-2022-1876
golang-1.16.15-2.fc35
Contains backports that fix the following CVEs:
– CVE-2022-24675
– CVE-2022-28327
The key to emphasizing security awareness training is making the most of what’s already available, including CIS’s partnership with SANS.
Joshua Rogers discovered that Squid incorrectly handled the Gopher
protocol. A remote attacker could possibly use this issue to cause Squid to
crash, resulting in a denial of service.
During a presentation, Keith Martin explained crucial ways we depend on cryptographic technology