FEDORA-2024-45df72afc6
Packages in this update:
edk2-20240813-2.fc40
Update description:
Security fix for CVE-2023-6237 (openssl: Excessive time spent checking invalid RSA public keys)
edk2-20240813-2.fc40
Security fix for CVE-2023-6237 (openssl: Excessive time spent checking invalid RSA public keys)
edk2-20240813-2.fc41
Security fix for CVE-2023-6237 (openssl: Excessive time spent checking invalid RSA public keys)
Marco Trevisan discovered that the Ubuntu Advantage Desktop Daemon leaked
the Pro token to unprivileged users by passing the token as an argument
in plaintext. An attacker could use this issue to gain unauthorized access
to an Ubuntu Pro subscription. (CVE-2024-6388)
glibc-2.38-19.fc39
Auto-sync with upstream branch release/2.38/master
Add BuildRequires:gzip for compressed character maps and info files.
Upstream commit: 4dd8641461463b667b5503ab0ea4abcf261378a9
Add crt1-2.0.o for glibc 2.0 compatibility tests
libio: Attempt wide backup free only for non-legacy code
nptl: Use <support/check.h> facilities in tst-setuid3
posix: Use <support/check.h> facilities in tst-truncate and tst-truncate64
ungetc: Fix backup buffer leak on program exit [BZ #27821]
ungetc: Fix uninitialized read when putting into unused streams [BZ #27821]
Make tst-ungetc use libsupport
stdio-common: Add test for vfscanf with matches longer than INT_MAX [BZ #27650]
support: Add FAIL test failure helper
x86: Fix bug in strchrnul-evex512 [BZ #32078]
Fix name space violation in fortify wrappers (bug 32052)
resolv: Fix tst-resolv-short-response for older GCC (bug 32042)
Update syscall lists for Linux 6.5
Add mremap tests
mremap: Update manual entry
linux: Update the mremap C implementation [BZ #31968]
resolv: Track single-request fallback via _res._flags (bug 31476)
resolv: Do not wait for non-existing second DNS response after error (bug 30081)
resolv: Allow short error responses to match any query (bug 31890)
Linux: Make __rseq_size useful for feature detection (bug 31965)
elf: Make dl-rseq-symbols Linux only
nptl: fix potential merge of __rseq_* relro symbols
s390x: Fix segfault in wcsncmp [BZ #31934]
misc: Add support for Linux uio.h RWF_NOAPPEND flag
i386: Disable Intel Xeon Phi tests for GCC 15 and above (BZ 31782)
Force DT_RPATH for –enable-hardcoded-path-in-tests
resolv: Fix some unaligned accesses in resolver [BZ #30750]
nscd: Use time_t for return type of addgetnetgrentX
elf: Also compile dl-misc.os with $(rtld-early-cflags)
CVE-2024-33601, CVE-2024-33602: nscd: netgroup: Use two buffers in addgetnetgrentX (bug 31680)
CVE-2024-33600: nscd: Avoid null pointer crashes after notfound response (bug 31678)
CVE-2024-33600: nscd: Do not send missing not-found response in addgetnetgrentX (bug 31678)
CVE-2024-33599: nscd: Stack-based buffer overflow in netgroup cache (bug 31677)
i386: ulp update for SSE2 –disable-multi-arch configurations
nptl: Fix tst-cancel30 on kernels without ppoll_time64 support
login: structs utmp, utmpx, lastlog _TIME_BITS independence (bug 30701)
login: Check default sizes of structs utmp, utmpx, lastlog
sparc: Remove 64 bit check on sparc32 wordsize (BZ 27574)
libgsf-1.14.53-1.fc39
Fixes for memory vulnerabilities.
libgsf-1.14.53-1.fc41
Fixes for memory vulnerabilities.
libgsf-1.14.53-1.fc40
Fixes for memory vulnerabilities.
chromium-129.0.6668.100-1.fc41
Update to 129.0.6668.100
* CVE-2024-9602: Type Confusion in V8
* CVE-2024-9603: Type Confusion in V
chromium-129.0.6668.100-1.el8
Update to 129.0.6668.100
* CVE-2024-9602: Type Confusion in V8
* CVE-2024-9603: Type Confusion in V
chromium-129.0.6668.100-1.fc39
Update to 129.0.6668.100
* CVE-2024-9602: Type Confusion in V8
* CVE-2024-9603: Type Confusion in V