FEDORA-2023-bc61f7a145
Packages in this update:
mod_security-2.9.7-1.fc38
Update description:
new version 2.9.7
switch to PCRE2
mod_security-2.9.7-1.fc38
new version 2.9.7
switch to PCRE2
mod_security-2.9.7-1.fc36
new version 2.9.7
switch to PCRE2
mod_security-2.9.7-1.fc37
new version 2.9.7
switch to PCRE2
mingw-freeimage-3.19.0-0.14.svn1889.fc36
Backport proposed fix for CVE-2021-33367.
freeimage-3.19.0-0.16.svn1889.fc37
mingw-freeimage-3.19.0-0.14.svn1889.fc37
Backport proposed fix for CVE-2021-33367.
freeimage-3.19.0-0.16.svn1889.fc38
mingw-freeimage-3.19.0-0.14.svn1889.fc38
Backport proposed fix for CVE-2021-33367.
Fix FTBFS.
The Polish government warns that a cyberespionage group linked to Russia’s intelligence services is targeting diplomatic and foreign ministries from NATO and EU member states in an ongoing campaign that uses previously undocumented malware payloads. The group, known in the security industry as APT29, Cozy Bear, and NOBELIUM, is believed to be part of Russia’s Foreign Intelligence Service (SVR) and is the group behind the 2020 supply chain attack against software company SolarWinds that led to the compromise of thousands of organizations worldwide.
Chen Lu, Lei Wang, and YiQi Sun discovered a privilege escalation
vulnerability in apport-cli when viewing crash reports and unprivileged
users are allowed to run sudo less. A local attacker on a specially
configured system could use this to escalate their privilege.
It was discovered that Flask-CORS did not properly escape paths before
evaluating resource rules. An attacker could possibly use this to
expose sensitive information.
suricata-6.0.11-1.fc38
Various security, performance, accuracy, and stability issues have been fixed.