FEDORA-2023-5c6f32db6f
Packages in this update:
yarnpkg-1.22.19-2.fc36
Update description:
Update to 1.22.19. Backport patch for CVE-2021-35065 for bundled glob-parent.
yarnpkg-1.22.19-2.fc36
Update to 1.22.19. Backport patch for CVE-2021-35065 for bundled glob-parent.
viewvc-1.1.29-1.el7
Fix for CVE-2023-22456: https://github.com/viewvc/viewvc/releases/tag/1.1.29
pypy3.8-7.3.11-1.3.8.fc36
Update to 7.3.11. See https://doc.pypy.org/en/latest/release-v7.3.11.html
Security fix for CVE-2022-37454, CVE-2022-45061.
mingw-binutils-2.37-6.fc36
Backport fix for CVE-2022-4285.
mingw-binutils-2.38-6.fc37
Backport fix for CVE-2022-4285.
pypy3.9-7.3.11-1.3.9.fc37
Update to 7.3.11. See https://doc.pypy.org/en/latest/release-v7.3.11.html
Security fix for CVE-2022-37454, CVE-2022-45061, CVE-2022-42919.
pypy3.8-7.3.11-1.3.8.fc37
Update to 7.3.11. See https://doc.pypy.org/en/latest/release-v7.3.11.html
Security fix for CVE-2022-37454, CVE-2022-45061.
flatpak-runtime-f37-3720221117153339.5
flatpak-sdk-f37-3720221117153339.5
Updated flatpak runtime and SDK, including latest Fedora 37 security and bug-fix errata.
A vulnerability, which was classified as problematic, has been found in ahmyi RivetTracker. This issue affects some unknown processing. The manipulation of the argument $_SERVER[‘PHP_SELF’] leads to cross site scripting. The attack may be initiated remotely. The name of the patch is f053c5cc2bc44269b0496b5f275e349928a92ef9. It is recommended to apply a patch to fix this issue. The associated identifier of this vulnerability is VDB-217271.
qemu-6.2.0-17.fc36
ati-vga: out-of-bounds write in ati_2d_blt (CVE-2021-3638) (rhbz#1979882)
qxl: qxl_phys2virt unsafe address translation (CVE-2022-4144) (rhbz#2148542)
linux-user: default to -cpu max (rhbz#2121700)