perl-Crypt-PasswdMD5-1.4.3-1.el10_2
- perl-Crypt-PasswdMD5-1.4.3-1.el10_2
This update uses a cryptographically strong random number source rather than perl's rand() function to generate random salt values when required (CVE-2026-6659)
This update uses a cryptographically strong random number source rather than perl's rand() function to generate random salt values when required (CVE-2026-6659)
This update uses a cryptographically strong random number source rather than perl's rand() function to generate random salt values when required (CVE-2026-6659)
This update uses a cryptographically strong random number source rather than perl's rand() function to generate random salt values when required (CVE-2026-6659)
This update uses a cryptographically strong random number source rather than perl's rand() function to generate random salt values when required (CVE-2026-6659)
This update uses a cryptographically strong random number source rather than perl's rand() function to generate random salt values when required (CVE-2026-6659)
This update uses a cryptographically strong random number source rather than perl's rand() function to generate random salt values when required (CVE-2026-6659)
Automatic update for perl-Crypt-PasswdMD5-1.4.3-1.fc45.
Changelog * Sat May 23 2026 Paul Howarth <paul@city-fan.org> - 1.4.3-1 - Update to 1.43 - Replace use of the cryptographically weak rand() function with the much stronger Crypt::URandom::urandom() (GH#3, CVE-2026-6659, rhbz#2479575) - Add Encode, Exporter, ExtUtils::MakeMaker to Makefile.PL - Add files AI_POLICY.md and SECURITY.mdnginx-mod-brotli:
nginx-mod-fancyindex:
nginx-mod-naxsi:
nginx-mod-headers-more:
nginx-mod-vts:
nginx-mod-modsecurity:
nginx:
nginx-mod-headers-more:
nginx-mod-vts:
nginx-mod-fancyindex:
nginx-mod-brotli:
nginx-mod-naxsi:
nginx-mod-js-challenge:
nginx-mod-modsecurity:
nginx:
4.4.3 release
4.4.3 Release
4.4.3 Release
4.4.3 Release
This update addresses CVE-2026-7598, a potential heap buffer overflow, which could be triggered remotely by supplying very long username and/or password strings.
This update addresses CVE-2026-7598, a potential heap buffer overflow, which could be triggered remotely by supplying very long username and/or password strings.
This update addresses CVE-2026-7598, a potential heap buffer overflow, which could be triggered remotely by supplying very long username and/or password strings.
This update addresses CVE-2026-7598, a potential heap buffer overflow, which could be triggered remotely by supplying very long username and/or password strings.
This update addresses CVE-2026-7598, a potential heap buffer overflow, which could be triggered remotely by supplying very long username and/or password strings.
Latest bugfix release from 7.1 branch. Changelog: https://git.ffmpeg.org/gitweb/ffmpeg.git/blob/d9633e6e2cbea53927c02f9c8762712551591b6a:/Changelog
Fixes:
Latest bugfix release from 5.1 branch. Changelog: https://git.ffmpeg.org/gitweb/ffmpeg.git/blob/564e825f428c835670da3a9f31a4b49261481c25:/Changelog .
Fixes: