FEDORA-EPEL-2022-59cdfb46c4
Packages in this update:
glances-3.2.5-1.el8
Update description:
Security fix for CVE-2021-23418
glances-3.2.5-1.el8
Security fix for CVE-2021-23418
bettercap-2.32.0-4.fc37
cadvisor-0.44.1-2.fc37
containerd-1.6.6-3.fc37
gobuster-3.1.0-3.fc37
golang-1.18.3-2.fc37
golang-gioui-0-8.20201225git18d4dbf.fc37
golang-github-cactus-statsd-client-5.0.0-5.fc37
golang-github-containerd-stargz-snapshotter-0.10.1-2.fc37
golang-github-containernetworking-cni-1.1.1-4.fc37
golang-github-crossdock-0-0.8.20190628git049aabb.fc37
golang-github-evanphx-json-patch-5.5.0-3.fc37
golang-github-hashicorp-serf-0.9.5-5.fc37
golang-github-oklog-ulid-2.0.2-10.fc37
golang-github-pact-foundation-1.5.1-6.fc37
golang-github-posener-complete-1.2.3-8.fc37
golang-github-prometheus-alertmanager-0.23.0-9.fc37
golang-github-shopify-sarama-1.27.2-5.fc37
golang-github-tdewolff-minify-2.11.10-3.fc37
golang-github-theupdateframework-notary-0.7.0-5.fc37
golang-nanomsg-mangos-3-3.2.1-6.fc37
grafana-7.5.15-3.fc37
graphviz-4.0.0-6.fc37
Rebuilt for CVE-2022-1996, CVE-2022-24675, CVE-2022-28327, CVE-2022-27191, CVE-2022-29526, CVE-2022-30629
golang-github-vultr-govultr-2-2.17.2-1.fc36
vultr-cli-2.14.2-1.fc36
Update govultr/vultr-cli
Update to latest
chromium-102.0.5005.115-1.el8
Update to Chromium 102.0.5005.115 (yes, I know there is a newer one, but we need to get something out now).
This also adds the first build of Chromium for EPEL9, many thanks to all the folks who got the many dependencies built.
Fixes:
CVE-2022-1232 CVE-2022-1364 CVE-2022-1633 CVE-2022-1634 CVE-2022-1635 CVE-2022-1636 CVE-2022-1637 CVE-2022-1638 CVE-2022-1639 CVE-2022-1640 CVE-2022-1641 CVE-2022-1853 CVE-2022-1854 CVE-2022-1855 CVE-2022-1856 CVE-2022-1857 CVE-2022-1858 CVE-2022-1859 CVE-2022-1860 CVE-2022-1861 CVE-2022-1862 CVE-2022-1863 CVE-2022-1864 CVE-2022-1865 CVE-2022-1866 CVE-2022-1867 CVE-2022-1868 CVE-2022-1869 CVE-2022-1870 CVE-2022-1871 CVE-2022-1872 CVE-2022-1873 CVE-2022-1874 CVE-2022-1875 CVE-2022-1876
chromium-102.0.5005.115-2.el9
Update to Chromium 102.0.5005.115 (yes, I know there is a newer one, but we need to get something out now).
This also adds the first build of Chromium for EPEL9, many thanks to all the folks who got the many dependencies built.
Fixes:
CVE-2022-1232 CVE-2022-1364 CVE-2022-1633 CVE-2022-1634 CVE-2022-1635 CVE-2022-1636 CVE-2022-1637 CVE-2022-1638 CVE-2022-1639 CVE-2022-1640 CVE-2022-1641 CVE-2022-1853 CVE-2022-1854 CVE-2022-1855 CVE-2022-1856 CVE-2022-1857 CVE-2022-1858 CVE-2022-1859 CVE-2022-1860 CVE-2022-1861 CVE-2022-1862 CVE-2022-1863 CVE-2022-1864 CVE-2022-1865 CVE-2022-1866 CVE-2022-1867 CVE-2022-1868 CVE-2022-1869 CVE-2022-1870 CVE-2022-1871 CVE-2022-1872 CVE-2022-1873 CVE-2022-1874 CVE-2022-1875 CVE-2022-1876
chromium-102.0.5005.115-1.el7
Update to Chromium 102.0.5005.115 (yes, I know there is a newer one, but we need to get something out now).
This also adds the first build of Chromium for EPEL9, many thanks to all the folks who got the many dependencies built.
Fixes:
CVE-2022-1232 CVE-2022-1364 CVE-2022-1633 CVE-2022-1634 CVE-2022-1635 CVE-2022-1636 CVE-2022-1637 CVE-2022-1638 CVE-2022-1639 CVE-2022-1640 CVE-2022-1641 CVE-2022-1853 CVE-2022-1854 CVE-2022-1855 CVE-2022-1856 CVE-2022-1857 CVE-2022-1858 CVE-2022-1859 CVE-2022-1860 CVE-2022-1861 CVE-2022-1862 CVE-2022-1863 CVE-2022-1864 CVE-2022-1865 CVE-2022-1866 CVE-2022-1867 CVE-2022-1868 CVE-2022-1869 CVE-2022-1870 CVE-2022-1871 CVE-2022-1872 CVE-2022-1873 CVE-2022-1874 CVE-2022-1875 CVE-2022-1876
golang-1.16.15-2.fc35
Contains backports that fix the following CVEs:
– CVE-2022-24675
– CVE-2022-28327
Joshua Rogers discovered that Squid incorrectly handled the Gopher
protocol. A remote attacker could possibly use this issue to cause Squid to
crash, resulting in a denial of service.
tor-0.4.7.8-1.fc36
Fix for CVE-2022-33903 (bz#2099227 / bz#2099228 / bz#2099229)
A vulnerability, which was classified as problematic, has been found in JUNG Smart Visu Server 1.0.804/1.0.830/1.0.832. This issue affects some unknown processing. The manipulation leads to backdoor. The attack needs to be approached locally. The exploit has been disclosed to the public and may be used. Upgrading to version 1.0.900 is able to address this issue. It is recommended to upgrade the affected component.