FEDORA-2022-163bcf190f
Packages in this update:
rust-ffsend-0.2.76-2.fc36
Update description:
Rebuild against websocket 0.26.5 for CVE-2022-35922 / RUSTSEC-2022-0035.
rust-ffsend-0.2.76-2.fc36
Rebuild against websocket 0.26.5 for CVE-2022-35922 / RUSTSEC-2022-0035.
rust-ffsend-0.2.71-3.fc35
Rebuild against websocket 0.26.5 for CVE-2022-35922 / RUSTSEC-2022-0035.
firefox-103.0.1-2.fc35
Enabled VA-API by default
Fixed arm builds by G. Hojda
Update to latest upstream (103.0.1)
Jan-Niklas Sohn discovered that multiple input validation failures in
the Xkb extension of the X.org X server may result in privilege
escalation if the X server is running privileged.
rubygem-rails-html-sanitizer-1.4.3-1.fc35
Update to rails-html-sanitizer 1.4.3.
rubygem-rails-html-sanitizer-1.4.3-1.fc36
Update to rails-html-sanitizer 1.4.3.
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
This advisory documents the impact of an internally found vulnerability in Arista EOS for security ACL bypass. The impact of this vulnerability is that the security ACL drop rule might be bypassed if a NAT ACL rule filter with permit action matches the packet flow. This could allow a host with an IP address in a range that matches the range allowed by a NAT ACL and a range denied by a Security ACL to be forwarded incorrectly as it should have been denied by the Security ACL. This can enable an ACL bypass.
Multiple vulnerabilities have been discovered in Oracle products, which could allow for remote code execution.