FEDORA-2025-5e5b0cc812
Packages in this update:
rust-hickory-proto-0.24.4-1.fc40
Update description:
Update to version 0.24.4.
Also contains fixes for RUSTSEC-2025-0006.
rust-hickory-proto-0.24.4-1.fc40
Update to version 0.24.4.
Also contains fixes for RUSTSEC-2025-0006.
rust-hickory-proto-0.24.4-1.fc41
Update to version 0.24.4.
Also contains fixes for RUSTSEC-2025-0006.
rust-hickory-proto-0.24.4-1.el9
Update to version 0.24.4.
Also contains fixes for RUSTSEC-2025-0006.
rust-hickory-proto-0.24.4-1.el10_1
Update to version 0.24.4.
Also contains fixes for RUSTSEC-2025-0006.
Fabien Potencier discovered that Twig did not run sandbox security checks
in some circumstances. An attacker could possibly use this issue to cause
a denial of service or execute arbitrary commands. This issue only affected
Ubuntu 22.04 LTS and Ubuntu 24.04 LTS. (CVE-2024-45411)
Jamie Schouten discovered that Twig could bypass the security policy for
an object call. An attacker could possibly use this issue to obtain
sensitive information. (CVE-2024-51754)
Jann Horn discovered that the watch_queue event notification subsystem in
the Linux kernel contained an out-of-bounds write vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
escalate their privileges. (CVE-2022-0995)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
– Network drivers;
– File systems infrastructure;
– NTFS3 file system;
– Ethernet bridge;
– Ethtool driver;
– IPv6 networking;
– Network traffic control;
– VMware vSockets driver;
(CVE-2024-56651, CVE-2025-21756, CVE-2024-26837, CVE-2025-21700,
CVE-2024-46826, CVE-2024-50256, CVE-2024-50248, CVE-2025-21993,
CVE-2025-21702, CVE-2025-21701, CVE-2025-21703)
ntpd-rs-1.5.0-1.fc41
Update to version 1.5.0 (for now, without PPS feature enabled due to potential correctness issues in the code).
Release notes: https://github.com/pendulum-project/ntpd-rs/releases/tag/v1.5.0
Also contains the fix for GHSA-v83q-83hj-rw38.
ntpd-rs-1.5.0-1.fc40
Update to version 1.5.0 (for now, without PPS feature enabled due to potential correctness issues in the code).
Release notes: https://github.com/pendulum-project/ntpd-rs/releases/tag/v1.5.0
Also contains the fix for GHSA-v83q-83hj-rw38.
ntpd-rs-1.5.0-1.fc42
Update to version 1.5.0 (for now, without PPS feature enabled due to potential correctness issues in the code).
Release notes: https://github.com/pendulum-project/ntpd-rs/releases/tag/v1.5.0
Also contains the fix for GHSA-v83q-83hj-rw38.
Jann Horn discovered that the watch_queue event notification subsystem in
the Linux kernel contained an out-of-bounds write vulnerability. A local
attacker could use this to cause a denial of service (system crash) or
escalate their privileges. (CVE-2022-0995)
Several security issues were discovered in the Linux kernel.
An attacker could possibly use these to compromise the system.
This update corrects flaws in the following subsystems:
– Network drivers;
– File systems infrastructure;
– NTFS3 file system;
– Ethernet bridge;
– Ethtool driver;
– IPv6 networking;
– Network traffic control;
– VMware vSockets driver;
(CVE-2024-26837, CVE-2025-21993, CVE-2025-21702, CVE-2025-21700,
CVE-2025-21701, CVE-2024-50248, CVE-2024-56651, CVE-2024-46826,
CVE-2024-50256, CVE-2025-21756, CVE-2025-21703)