FEDORA-2024-39913e097a
Packages in this update:
haproxy-2.9.10-1.fc40
Update description:
Update to 2.9.10 (CVE-2024-45506)
haproxy-2.9.10-1.fc40
Update to 2.9.10 (CVE-2024-45506)
haproxy-3.0.4-1.fc41
Update to 3.0.4 (CVE-2024-45506, #2309472)
Johannes Kuhn (DasBrain) discovered that znc incorrectly handled
user input under certain operations. An attacker could possibly
use this issue to execute arbitrary code on a user’s system if
the user was tricked into joining a malicious server.
python-django4.2-4.2.16-1.fc41
urlize and urlizetrunc were subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.
python-django4.2-4.2.16-1.fc40
urlize and urlizetrunc were subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.
python-django4.2-4.2.16-1.el9
urlize and urlizetrunc were subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.
python-django4.2-4.2.16-1.fc39
urlize and urlizetrunc were subject to a potential denial-of-service attack via very large inputs with a specific sequence of characters.
Dan Smith, Julia Kreger and Jay Faulkner discovered that in
image processing for Ironic, a specially crafted image
could be used by an authenticated user to exploit undesired behaviors
in qemu-img, including possible unauthorized access to potentially
sensitive data.
aardvark-dns-1.12.2-1.fc39
Security fix for CVE-2024-8418
aardvark-dns-1.12.2-1.fc40
Security fix for CVE-2024-8418