FEDORA-2022-8095b23575
Packages in this update:
kernel-5.17.11-300.fc36
kernel-headers-5.17.11-300.fc36
kernel-tools-5.17.11-300.fc36
Update description:
The 5.17.11 stable kernel update contains a number of important fixes across the tree.
kernel-5.17.11-300.fc36
kernel-headers-5.17.11-300.fc36
kernel-tools-5.17.11-300.fc36
The 5.17.11 stable kernel update contains a number of important fixes across the tree.
kernel-5.17.11-100.fc34
kernel-headers-5.17.11-100.fc34
kernel-tools-5.17.11-100.fc34
The 5.17.11 stable kernel update contains a number of important fixes across the tree.
kernel-5.17.11-200.fc35
kernel-headers-5.17.11-200.fc35
kernel-tools-5.17.11-200.fc35
The 5.17.11 stable kernel update contains a number of important fixes across the tree.
Drupal uses the third-party Guzzle library for handling HTTP requests and responses to external services. Guzzle has released a security update which does not affect Drupal core, but may affect some contributed projects or custom code on Drupal sites.
We are issuing this security advisory outside our regular Drupal security release window schedule since Guzzle has already published information about the vulnerability, and vulnerabilities might exist in contributed modules or custom modules that use Guzzle for outgoing requests. Guzzle has rated this vulnerability as high-risk.
This advisory is not covered by Drupal Steward.
Install the latest version:
If you are using Drupal 9.3, update to Drupal 9.3.14.
If you are using Drupal 9.2, update to Drupal 9.2.20.
All versions of Drupal 9 prior to 9.2.x are end-of-life and do not receive security coverage. Note that Drupal 8 has reached its end of life.
Drupal 7 is not affected.
rubygem-nokogiri-1.13.6-1.el9
1.13.6 – CVE-2022-29181 and CVE-2022-24836
rubygem-nokogiri-1.6.1-1.el7.2
Backport CVE-2022-24836 (#2074347), Backport CVE-2022-29181 (#2088685)
User generated PPKG file for Bulk Enroll may have unencrypted sensitive information exposed.
VersionVault Express exposes sensitive information that an attacker can use to impersonate the server or eavesdrop on communications with the server.
logrotate-3.18.1-3.fc35
fix potential DoS from unprivileged users via the state file (CVE-2022-1348)
logrotate-3.20.1-1.fc36
fix potential DoS from unprivileged users via the state file (CVE-2022-1348)