FEDORA-2024-5bfa220621
Packages in this update:
unbound-1.19.3-1.fc38
Update description:
Use the origin (DNAME) TTL for synthesized CNAMEs as per RFC 6672.
Bug fixes
https://nlnetlabs.nl/projects/unbound/download/#unbound-1-19-3
unbound-1.19.3-1.fc38
Use the origin (DNAME) TTL for synthesized CNAMEs as per RFC 6672.
Bug fixes
https://nlnetlabs.nl/projects/unbound/download/#unbound-1-19-3
unbound-1.19.3-1.fc39
Use the origin (DNAME) TTL for synthesized CNAMEs as per RFC 6672.
Bug fixes
https://nlnetlabs.nl/projects/unbound/download/#unbound-1-19-3
unbound-1.19.3-1.fc40
Use the origin (DNAME) TTL for synthesized CNAMEs as per RFC 6672.
Bug fixes
https://nlnetlabs.nl/projects/unbound/download/#unbound-1-19-3
CVE-2024-1931 – Fix trim of EDE text from large udp responses from spinning cpu.
unbound-1.19.3-1.fc41
Automatic update for unbound-1.19.3-1.fc41.
* Fri Apr 12 2024 Petr Menšík <pemensik@redhat.com> – 1.19.3-1
– Update to 1.19.3 (rhbz#2268404)
– Fix CVE-2024-1931, Denial of service when trimming EDE text on positive
replies. (rhbz#2268419)
– Use the origin (DNAME) TTL for synthesized CNAMEs as per RFC 6672.
– Bug fixes
* Sat Mar 9 2024 Paul Wouters <paul.wouters@aiven.io> – 1.19.1-4
– Add spec file comment
chromium-123.0.6312.122-1.fc40
update to 123.0.6312.122
* High CVE-2024-3157: Out of bounds write in Compositing
* High CVE-2024-3516: Heap buffer overflow in ANGLE
* High CVE-2024-3515: Use after free in Dawn
chromium-123.0.6312.122-1.fc38
update to 123.0.6312.122
* High CVE-2024-3157: Out of bounds write in Compositing
* High CVE-2024-3516: Heap buffer overflow in ANGLE
* High CVE-2024-3515: Use after free in Dawn
chromium-123.0.6312.122-1.fc39
update to 123.0.6312.122
* High CVE-2024-3157: Out of bounds write in Compositing
* High CVE-2024-3516: Heap buffer overflow in ANGLE
* High CVE-2024-3515: Use after free in Dawn
A vulnerability has been discovered in PAN-OS that could allow for arbitrary code execution. PAN-OS is the software that runs all Palo Alto Networks next-generation firewalls. Successful exploitation of this vulnerability could allow for arbitrary code execution in the context of the root user. Depending on the privileges associated with the user, an attacker could then install programs; view, change, or delete data; or create new accounts with full user rights.
curl-8.2.1-5.fc39
fix Usage of disabled protocol (CVE-2024-2004)
fix HTTP/2 push headers memory-leak (CVE-2024-2398)
python-pycryptodomex-3.20.0-1.el9
CVE-2023-52323