FEDORA-EPEL-2022-6cfebbe90a
Packages in this update:
jhead-3.06.0.1-5.el8
Update description:
added patches to fix CVE-2022-41751
jhead-3.06.0.1-5.el8
added patches to fix CVE-2022-41751
jhead-3.06.0.1-5.el9
added patches to fix CVE-2022-41751
jhead-3.06.0.1-5.fc35
added patches to fix CVE-2022-41751
supybot-fedora implements the command ‘refresh’, that refreshes the cache of all users from FAS. This takes quite a while to run, and zodbot stops responding to requests during this time.
It was discovered that FRR incorrectly handled parsing certain BGP
messages. A remote attacker could possibly use this issue to cause FRR to
crash, resulting in a denial of service. (CVE-2022-37032)
It was discovered that FRR incorrectly handled processing certain BGP
messages. A remote attacker could possibly use this issue to cause FRR to
crash, resulting in a denial of service, obtain sensitive information,
or execute arbitrary code. (CVE-2022-37035)
jhead-3.06.0.1-5.fc36
added patches to fix CVE-2022-41751
Beijing Feishu Technology Co., Ltd Feishu v3.40.3 was discovered to contain an untrusted search path vulnerability.
libksba-1.6.2-1.fc35
New upstream release fixing CVE-2022-3515
jhead-3.06.0.1-5.fc37
added patches to fix CVE-2022-41751
wordpress-5.1.15-1.el7
WordPress 5.1.15 Security Release
Security updates included in this release
Media: Refactor search by filename within the admin,
REST API: Lockdown post parameter of the terms endpoint,
Customize: Escape blogname option in underscores templates,
Query: Validate relation in WP_Date_Query,
Posts, Post types: Apply KSES to post-by-email content,
General: Validate host on “Are you sure?” screen,
Posts, Post types: Remove emails from post-by-email logs,
Pings/trackbacks: Apply KSES to all trackbacks,
Mail: Reset PHPMailer properties between use,
Widgets: Escape RSS error messages for display.