FEDORA-2025-d4263ef3ef
Packages in this update:
zabbix-6.0.39-1.fc40
Update description:
Update to 6.0.39 (CVE-2024-45700, CVE-2024-36469, CVE-2024-42325, CVE-2024-45699)
zabbix-6.0.39-1.fc40
Update to 6.0.39 (CVE-2024-45700, CVE-2024-36469, CVE-2024-42325, CVE-2024-45699)
Multiple vulnerabilities have been discovered in IBM AIX, the most severe of which could allow for arbitrary code execution. IBM AIX is a secure and reliable Unix operating system designed for IBM’s Power Systems. It supports modern applications and provides strong security features, making it ideal for mission-critical business environments. Successful exploitation of these vulnerabilities could allow for arbitrary code execution in the context of the affected system. Depending on the privileges associated with the account, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights. Accounts with fewer privileges on the system could be less impacted than those with administrative user rights.
cri-o1.31-1.31.7-1.fc43
Automatic update for cri-o1.31-1.31.7-1.fc43.
* Wed Apr 2 2025 Bradley G Smith <bradley.g.smith@gmail.com> – 1.31.7-1
– Update to release v1.31.7
– Resolves FTBFS due to changes in license detector
– Upstream fix
* Fri Mar 21 2025 Bradley G Smith <bradley.g.smith@gmail.com> – 1.31.6-2
– Resolve CVE-2024-40635 and CVE-2025-22870 and CVE-2025-27144
– Resolves rhbz#2352147, rhbz#2353096, rhbz#2347476
– Update vendored go modules: golang.org/x/net v0.34.0 to
v0.36.0 github.com/containerd/containerd v1.7.24 to v1.7.27
github.com/go-jose/go-jose/v4 v4.0.2 to v4.0.5
zabbix-7.2.5-1.fc42
Update to 7.2.5 (CVE-2024-36469, CVE-2024-42325, CVE-2024-45700)
zabbix7.0-7.0.11-1.el8
Update to 7.0.11
CVE-2024-36465, CVE-2024-36469, CVE-2024-42325, CVE-2024-45699, CVE-2024-45700
Re-install SELinux module in %%posttrans to address “upgrade” from zabbixA.B to zabbixX.Y in one transaction
zabbix7.0-7.0.11-1.el9
Update to 7.0.11
CVE-2024-36465, CVE-2024-36469, CVE-2024-42325, CVE-2024-45699, CVE-2024-45700
Re-install SELinux module in %%posttrans to address “upgrade” from zabbixA.B to zabbixX.Y in one transaction
zabbix6.0-6.0.39-1.el8
Update to 6.0.39
CVE-2024-45700, CVE-2024-36469, CVE-2024-42325, CVE-2024-45699
Fix selinux module name in uninstall scriptlet
zabbix-7.0.11-1.fc41
Update to 7.0.11
CVE-2024-36465, CVE-2024-36469, CVE-2024-42325, CVE-2024-45699, CVE-2024-45700
It was discovered that ruby-saml did not correctly handle XML parsing.
An attacker could possibly use this issue to perform a signature
wrapping attack and bypass authentication. (CVE-2025-25291
and CVE-2025-25292)
It was discovered that ruby-saml did not correctly handle decompressing
SAML responses. An attacker could possibly use this issue to cause
a denial of service. (CVE-2025-25293)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
– SMB network file system;
– Network namespace;
– Networking core;
(CVE-2024-56658, CVE-2024-35864, CVE-2024-26928)