Multiple security issues were discovered in Chromium, which could result
in the execution of arbitrary code, denial of service or information
disclosure.
Category Archives: Advisories
rust-ffsend-0.2.76-2.fc36
FEDORA-2022-163bcf190f
Packages in this update:
rust-ffsend-0.2.76-2.fc36
Update description:
Rebuild against websocket 0.26.5 for CVE-2022-35922 / RUSTSEC-2022-0035.
rust-ffsend-0.2.71-3.fc35
FEDORA-2022-dfa24fa7d4
Packages in this update:
rust-ffsend-0.2.71-3.fc35
Update description:
Rebuild against websocket 0.26.5 for CVE-2022-35922 / RUSTSEC-2022-0035.
firefox-103.0.1-2.fc35
FEDORA-2022-4279e6c668
Packages in this update:
firefox-103.0.1-2.fc35
Update description:
Enabled VA-API by default
Fixed arm builds by G. Hojda
Update to latest upstream (103.0.1)
DSA-5199 xorg-server – security update
Jan-Niklas Sohn discovered that multiple input validation failures in
the Xkb extension of the X.org X server may result in privilege
escalation if the X server is running privileged.
rubygem-rails-html-sanitizer-1.4.3-1.fc35
FEDORA-2022-ce4719993c
Packages in this update:
rubygem-rails-html-sanitizer-1.4.3-1.fc35
Update description:
Update to rails-html-sanitizer 1.4.3.
rubygem-rails-html-sanitizer-1.4.3-1.fc36
FEDORA-2022-974fffb418
Packages in this update:
rubygem-rails-html-sanitizer-1.4.3-1.fc36
Update description:
Update to rails-html-sanitizer 1.4.3.
CVE-2018-1076
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
CVE-2019-10204
** REJECT ** DO NOT USE THIS CANDIDATE NUMBER. ConsultIDs: none. Reason: This candidate was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
CVE-2021-28511
This advisory documents the impact of an internally found vulnerability in Arista EOS for security ACL bypass. The impact of this vulnerability is that the security ACL drop rule might be bypassed if a NAT ACL rule filter with permit action matches the packet flow. This could allow a host with an IP address in a range that matches the range allowed by a NAT ACL and a range denied by a Security ACL to be forwarded incorrectly as it should have been denied by the Security ACL. This can enable an ACL bypass.