wireshark-4.2.9-1.fc40
- wireshark-4.2.9-1.fc40
New version 4.2.9
New version 4.2.9
New version 4.4.2
The update to zlib-rs v0.4.0 also addresses CVE-2024-11249 (stack overflow during decompression with malicious input). This issue had no actual impact in Fedora, because no applications yet use the the zlib-rs feature of rustls and rustls is the only dependent package of zlib-rs.
The update to zlib-rs v0.4.0 also addresses CVE-2024-11249 (stack overflow during decompression with malicious input). This issue had no actual impact in Fedora, because no applications yet use the the zlib-rs feature of rustls and rustls is the only dependent package of zlib-rs.
The update to zlib-rs v0.4.0 also addresses CVE-2024-11249 (stack overflow during decompression with malicious input). This issue had no actual impact in Fedora, because no applications yet use the the zlib-rs feature of rustls and rustls is the only dependent package of zlib-rs.
The update to zlib-rs v0.4.0 also addresses CVE-2024-11249 (stack overflow during decompression with malicious input). This issue had no actual impact in Fedora, because no applications yet use the the zlib-rs feature of rustls and rustls is the only dependent package of zlib-rs.
The update to zlib-rs v0.4.0 also addresses CVE-2024-11249 (stack overflow during decompression with malicious input). This issue had no actual impact in Fedora, because no applications yet use the the zlib-rs feature of rustls and rustls is the only dependent package of zlib-rs.
1.37 - fix parsing of "use if ..." Fixes errors in PAR::Packer test t/90-rt59710.t - add test for _parse_libs()
1.36 - Fix CVE-2024-10224: Unsanitized input leads to LPE - use three-argument open() - replace 'eval "..."' constructs Note: this version was not released on CPAN because of Coordinated Release Date for CVE - README: add "Source Repository" and "Contact" info switch "Please submit bug reports to ..." to GitHub issues - add preload rule for MooX::HandlesVia cf. https://github.com/rschupp/PAR-Packer/issues/88
1.37 - fix parsing of "use if ..." Fixes errors in PAR::Packer test t/90-rt59710.t - add test for _parse_libs() 1.36 - Fix CVE-2024-10224: Unsanitized input leads to LPE - use three-argument open() - replace 'eval "..."' constructs Note: this version was not released on CPAN because of Coordinated Release Date for CVE - README: add "Source Repository" and "Contact" info switch "Please submit bug reports to ..." to GitHub issues - add preload rule for MooX::HandlesVia cf. https://github.com/rschupp/PAR-Packer/issues/88
PHP version 8.3.14 (21 Nov 2024)
CLI:
COM:
Core:
Curl:
Date:
DBA:
DOM:
EXIF:
FFI:
Filter:
FPM:
GD:
GMP:
LDAP:
MBstring:
MySQLnd:
Opcache:
OpenSSL:
PDO DBLIB:
PDO Firebird:
PDO ODBC:
Phar:
PHPDBG:
Reflection:
Session:
SOAP:
Sockets:
SPL:
Standard:
Streams:
SysVMsg:
SysVShm:
XMLReader:
Zlib:
PHP version 8.3.14 (21 Nov 2024)
CLI:
COM:
Core:
Curl:
Date:
DBA:
DOM:
EXIF:
FFI:
Filter:
FPM:
GD:
GMP:
LDAP:
MBstring:
MySQLnd:
Opcache:
OpenSSL:
PDO DBLIB:
PDO Firebird:
PDO ODBC:
Phar:
PHPDBG:
Reflection:
Session:
SOAP:
Sockets:
SPL:
Standard:
Streams:
SysVMsg:
SysVShm:
XMLReader:
Zlib:
Security fix for CVE-2024-52304
Update License field to SPDX.
Build and install the C extensions. Based on the history of security fixes in later releases, this may close some vulnerabilities and possibly open others, as both the C and Python HTTP parsing implementations have had their own distinct issues.
While this backports the fix for CVE-2024-52304, and the fix for CVE-2024-23334 was backported in a previous update, it is very likely that other unmitigated issues exist in this old release. Unfortunately, updating to a later version in EPEL8 is impractical at best.
Backport fixes for CVE-2024-49768 and CVE-2024-49769.
Security fix for CVE-2024-52304
Security fix for CVE-2024-52304
Security fix for CVE-2024-52304
Security fix for CVE-2024-52304
fix crash in in ogg vorbis (#2322326) (CVE-2024-50612)
Automatic update for libsndfile-1.2.2-5.fc42.
Changelog * Mon Nov 18 2024 Michal Hlavinka <mhlavink@redhat.com> - 1.2.2-5 - fix crash in in ogg vorbis (rhbz#2322326) (CVE-2024-50612)