FEDORA-2022-489ea47e69
Packages in this update:
trafficserver-9.1.4-1.fc36
Update description:
Update to 9.1.4, resolves CVE-2022-32749, CVE-2022-37392, CVE-2022-40743
trafficserver-9.1.4-1.fc36
Update to 9.1.4, resolves CVE-2022-32749, CVE-2022-37392, CVE-2022-40743
trafficserver-9.1.4-1.el7
Update to 9.1.4, resolves CVE-2022-32749, CVE-2022-37392, CVE-2022-40743
trafficserver-9.1.4-1.fc37
Update to 9.1.4, resolves CVE-2022-32749, CVE-2022-37392, CVE-2022-40743
trafficserver-9.1.4-1.el8
Update to 9.1.4, resolves CVE-2022-32749, CVE-2022-37392, CVE-2022-40743
trafficserver-9.1.4-1.el9
Update to 9.1.4, resolves CVE-2022-32749, CVE-2022-37392, CVE-2022-40743
Jan-Niklas Sohn discovered several vulnerabilities in X server extensions
in the X.Org X server, which may result in privilege escalation if the X
server is running privileged.
After tar_close(), libtar.c releases the memory pointed to by pointer t. After tar_close() is called in the list() function, it continues to use pointer t: free_longlink_longname(t->th_buf) . As a result, the released memory is used (use-after-free).
libtar-1.2.20-26.fc36
fix use-after-free bugs introduced by incorrect memleak fixes (CVE-2021-33640)
libtar-1.2.20-26.fc37
fix use-after-free bugs introduced by incorrect memleak fixes (CVE-2021-33640)
xorg-x11-server-Xwayland-22.1.7-1.fc36
xwayland 22.1.7