Fedora Security Advisories

trafficserver-9.2.6-2.fc41

1 week 1 day ago
FEDORA-2024-f4dc07db08 Packages in this update:
  • trafficserver-9.2.6-2.fc41
Update description:
  • Update to upstream 9.2.6
  • Backport fix for broken oubound TLS with OpenSSL 3.2+
  • Resolves CVE-2024-38479, CVE-2024-50305, CVE-2024-50306

trafficserver-9.2.6-2.el8

1 week 1 day ago
FEDORA-EPEL-2024-60dd7e7ad3 Packages in this update:
  • trafficserver-9.2.6-2.el8
Update description:
  • Update to upstream 9.2.6
  • Backport fix for broken oubound TLS with OpenSSL 3.2+
  • Resolves CVE-2024-38479, CVE-2024-50305, CVE-2024-50306

xen-4.18.3-3.fc40

1 week 1 day ago
FEDORA-2024-7c2cfa2fe5 Packages in this update:
  • xen-4.18.3-3.fc40
Update description:

Deadlock in x86 HVM standard VGA handling [XSA-463, CVE-2024-45818] libxl leaks data to PVH guests via ACPI tables [XSA-464, CVE-2024-45819]

microcode_ctl-2.1-67.fc41

1 week 1 day ago
FEDORA-2024-28ea86c8aa Packages in this update:
  • microcode_ctl-2.1-67.fc41
Update description:
  • Update to upstream 2.1-47. 20241112
  • Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in intel-ucode/06-8f-05) from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-05/0x87 (SPR-SP E2) microcode from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in intel-ucode/06-8f-05) from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in intel-ucode/06-8f-05) from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in intel-ucode/06-8f-05) from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in intel-ucode/06-8f-06) from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in intel-ucode/06-8f-06) from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-06/0x87 (SPR-SP E3) microcode from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in intel-ucode/06-8f-06) from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in intel-ucode/06-8f-06) from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in intel-ucode/06-8f-07) from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in intel-ucode/06-8f-07) from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in intel-ucode/06-8f-07) from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in intel-ucode/06-8f-07) from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in intel-ucode/06-8f-08) from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in intel-ucode/06-8f-08) from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in intel-ucode/06-8f-08) from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in intel-ucode/06-8f-08) from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode from revision 0x36 up to 0x37;
  • Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in intel-ucode/06-97-02) from revision 0x36 up to 0x37;
  • Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-02) from revision 0x36 up to 0x37;
  • Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-02) from revision 0x36 up to 0x37;
  • Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in intel-ucode/06-97-05) from revision 0x36 up to 0x37;
  • Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode from revision 0x36 up to 0x37;
  • Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-05) from revision 0x36 up to 0x37;
  • Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-05) from revision 0x36 up to 0x37;
  • Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode from revision 0x434 up to 0x435;
  • Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode (in intel-ucode/06-9a-03) from revision 0x434 up to 0x435;
  • Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in intel-ucode/06-9a-04) from revision 0x434 up to 0x435;
  • Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode from revision 0x434 up to 0x435;
  • Update of 06-aa-04/0xe6 (MTL-H/U C0) microcode from revision 0x1f up to 0x20;
  • Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode from revision 0x4122 up to 0x4123;
  • Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode (in intel-ucode/06-ba-02) from revision 0x4122 up to 0x4123;
  • Update of 06-ba-08/0xe0 microcode (in intel-ucode/06-ba-02) from revision 0x4122 up to 0x4123;
  • Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in intel-ucode/06-ba-03) from revision 0x4122 up to 0x4123;
  • Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode from revision 0x4122 up to 0x4123;
  • Update of 06-ba-08/0xe0 microcode (in intel-ucode/06-ba-03) from revision 0x4122 up to 0x4123;
  • Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in intel-ucode/06-ba-08) from revision 0x4122 up to 0x4123;
  • Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode (in intel-ucode/06-ba-08) from revision 0x4122 up to 0x4123;
  • Update of 06-ba-08/0xe0 microcode from revision 0x4122 up to 0x4123;
  • Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in intel-ucode/06-bf-02) from revision 0x36 up to 0x37;
  • Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in intel-ucode/06-bf-02) from revision 0x36 up to 0x37;
  • Update of 06-bf-02/0x07 (ADL C0) microcode from revision 0x36 up to 0x37;
  • Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-bf-02) from revision 0x36 up to 0x37;
  • Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in intel-ucode/06-bf-05) from revision 0x36 up to 0x37;
  • Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in intel-ucode/06-bf-05) from revision 0x36 up to 0x37;
  • Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-bf-05) from revision 0x36 up to 0x37;
  • Update of 06-bf-05/0x07 (ADL C0) microcode from revision 0x36 up to 0x37;
  • Update of 06-cf-01/0x87 (EMR-SP A0) microcode from revision 0x21000230 up to 0x21000283;
  • Update of 06-cf-02/0x87 (EMR-SP A1) microcode (in intel-ucode/06-cf-01) from revision 0x21000230 up to 0x21000283;
  • Update of 06-cf-01/0x87 (EMR-SP A0) microcode (in intel-ucode/06-cf-02) from revision 0x21000230 up to 0x21000283;
  • Update of 06-cf-02/0x87 (EMR-SP A1) microcode from revision 0x21000230 up to 0x21000283.
  • Addresses CVE-2024-21820, CVE-2024-21853, CVE-2024-23918, CVE-2024-23984

microcode_ctl-2.1-61.5.fc40

1 week 1 day ago
FEDORA-2024-d20a106350 Packages in this update:
  • microcode_ctl-2.1-61.5.fc40
Update description:
  • Update to upstream 2.1-47. 20241112
  • Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in intel-ucode/06-8f-05) from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-05/0x87 (SPR-SP E2) microcode from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in intel-ucode/06-8f-05) from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in intel-ucode/06-8f-05) from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in intel-ucode/06-8f-05) from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in intel-ucode/06-8f-06) from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in intel-ucode/06-8f-06) from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-06/0x87 (SPR-SP E3) microcode from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in intel-ucode/06-8f-06) from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in intel-ucode/06-8f-06) from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in intel-ucode/06-8f-07) from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in intel-ucode/06-8f-07) from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in intel-ucode/06-8f-07) from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in intel-ucode/06-8f-07) from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in intel-ucode/06-8f-08) from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in intel-ucode/06-8f-08) from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in intel-ucode/06-8f-08) from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in intel-ucode/06-8f-08) from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode from revision 0x36 up to 0x37;
  • Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in intel-ucode/06-97-02) from revision 0x36 up to 0x37;
  • Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-02) from revision 0x36 up to 0x37;
  • Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-02) from revision 0x36 up to 0x37;
  • Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in intel-ucode/06-97-05) from revision 0x36 up to 0x37;
  • Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode from revision 0x36 up to 0x37;
  • Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-05) from revision 0x36 up to 0x37;
  • Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-05) from revision 0x36 up to 0x37;
  • Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode from revision 0x434 up to 0x435;
  • Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode (in intel-ucode/06-9a-03) from revision 0x434 up to 0x435;
  • Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in intel-ucode/06-9a-04) from revision 0x434 up to 0x435;
  • Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode from revision 0x434 up to 0x435;
  • Update of 06-aa-04/0xe6 (MTL-H/U C0) microcode from revision 0x1f up to 0x20;
  • Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode from revision 0x4122 up to 0x4123;
  • Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode (in intel-ucode/06-ba-02) from revision 0x4122 up to 0x4123;
  • Update of 06-ba-08/0xe0 microcode (in intel-ucode/06-ba-02) from revision 0x4122 up to 0x4123;
  • Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in intel-ucode/06-ba-03) from revision 0x4122 up to 0x4123;
  • Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode from revision 0x4122 up to 0x4123;
  • Update of 06-ba-08/0xe0 microcode (in intel-ucode/06-ba-03) from revision 0x4122 up to 0x4123;
  • Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in intel-ucode/06-ba-08) from revision 0x4122 up to 0x4123;
  • Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode (in intel-ucode/06-ba-08) from revision 0x4122 up to 0x4123;
  • Update of 06-ba-08/0xe0 microcode from revision 0x4122 up to 0x4123;
  • Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in intel-ucode/06-bf-02) from revision 0x36 up to 0x37;
  • Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in intel-ucode/06-bf-02) from revision 0x36 up to 0x37;
  • Update of 06-bf-02/0x07 (ADL C0) microcode from revision 0x36 up to 0x37;
  • Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-bf-02) from revision 0x36 up to 0x37;
  • Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in intel-ucode/06-bf-05) from revision 0x36 up to 0x37;
  • Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in intel-ucode/06-bf-05) from revision 0x36 up to 0x37;
  • Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-bf-05) from revision 0x36 up to 0x37;
  • Update of 06-bf-05/0x07 (ADL C0) microcode from revision 0x36 up to 0x37;
  • Update of 06-cf-01/0x87 (EMR-SP A0) microcode from revision 0x21000230 up to 0x21000283;
  • Update of 06-cf-02/0x87 (EMR-SP A1) microcode (in intel-ucode/06-cf-01) from revision 0x21000230 up to 0x21000283;
  • Update of 06-cf-01/0x87 (EMR-SP A0) microcode (in intel-ucode/06-cf-02) from revision 0x21000230 up to 0x21000283;
  • Update of 06-cf-02/0x87 (EMR-SP A1) microcode from revision 0x21000230 up to 0x21000283.
  • Addresses CVE-2024-21820, CVE-2024-21853, CVE-2024-23918, CVE-2024-23984
  • Update to upstream 2.1-46. 20241029
  • Update of 06-b7-01/0x32 (RPL-S B0) microcode from revision 0x129 up to 0x12b.

microcode_ctl-2.1-58.5.fc39

1 week 1 day ago
FEDORA-2024-7dfc167df4 Packages in this update:
  • microcode_ctl-2.1-58.5.fc39
Update description:
  • Update to upstream 2.1-47. 20241112
  • Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in intel-ucode/06-8f-05) from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-05/0x87 (SPR-SP E2) microcode from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in intel-ucode/06-8f-05) from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in intel-ucode/06-8f-05) from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in intel-ucode/06-8f-05) from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in intel-ucode/06-8f-06) from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in intel-ucode/06-8f-06) from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-06/0x87 (SPR-SP E3) microcode from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in intel-ucode/06-8f-06) from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in intel-ucode/06-8f-06) from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in intel-ucode/06-8f-07) from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in intel-ucode/06-8f-07) from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in intel-ucode/06-8f-07) from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode (in intel-ucode/06-8f-07) from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-04/0x87 (SPR-SP E0/S1) microcode (in intel-ucode/06-8f-08) from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-05/0x87 (SPR-SP E2) microcode (in intel-ucode/06-8f-08) from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-06/0x87 (SPR-SP E3) microcode (in intel-ucode/06-8f-08) from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-07/0x87 (SPR-SP E4/S2) microcode (in intel-ucode/06-8f-08) from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-8f-08/0x87 (SPR-SP E5/S3) microcode from revision 0x2b0005c0 up to 0x2b000603;
  • Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode from revision 0x36 up to 0x37;
  • Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in intel-ucode/06-97-02) from revision 0x36 up to 0x37;
  • Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-02) from revision 0x36 up to 0x37;
  • Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-02) from revision 0x36 up to 0x37;
  • Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in intel-ucode/06-97-05) from revision 0x36 up to 0x37;
  • Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode from revision 0x36 up to 0x37;
  • Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-97-05) from revision 0x36 up to 0x37;
  • Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-97-05) from revision 0x36 up to 0x37;
  • Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode from revision 0x434 up to 0x435;
  • Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode (in intel-ucode/06-9a-03) from revision 0x434 up to 0x435;
  • Update of 06-9a-03/0x80 (ADL-P 6+8/U 9W L0/R0) microcode (in intel-ucode/06-9a-04) from revision 0x434 up to 0x435;
  • Update of 06-9a-04/0x80 (ADL-P 2+8 R0) microcode from revision 0x434 up to 0x435;
  • Update of 06-aa-04/0xe6 (MTL-H/U C0) microcode from revision 0x1f up to 0x20;
  • Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode from revision 0x4122 up to 0x4123;
  • Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode (in intel-ucode/06-ba-02) from revision 0x4122 up to 0x4123;
  • Update of 06-ba-08/0xe0 microcode (in intel-ucode/06-ba-02) from revision 0x4122 up to 0x4123;
  • Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in intel-ucode/06-ba-03) from revision 0x4122 up to 0x4123;
  • Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode from revision 0x4122 up to 0x4123;
  • Update of 06-ba-08/0xe0 microcode (in intel-ucode/06-ba-03) from revision 0x4122 up to 0x4123;
  • Update of 06-ba-02/0xe0 (RPL-H 6+8/P 6+8 J0) microcode (in intel-ucode/06-ba-08) from revision 0x4122 up to 0x4123;
  • Update of 06-ba-03/0xe0 (RPL-U 2+8 Q0) microcode (in intel-ucode/06-ba-08) from revision 0x4122 up to 0x4123;
  • Update of 06-ba-08/0xe0 microcode from revision 0x4122 up to 0x4123;
  • Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in intel-ucode/06-bf-02) from revision 0x36 up to 0x37;
  • Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in intel-ucode/06-bf-02) from revision 0x36 up to 0x37;
  • Update of 06-bf-02/0x07 (ADL C0) microcode from revision 0x36 up to 0x37;
  • Update of 06-bf-05/0x07 (ADL C0) microcode (in intel-ucode/06-bf-02) from revision 0x36 up to 0x37;
  • Update of 06-97-02/0x07 (ADL-HX/S 8+8 C0) microcode (in intel-ucode/06-bf-05) from revision 0x36 up to 0x37;
  • Update of 06-97-05/0x07 (ADL-S 6+0 K0) microcode (in intel-ucode/06-bf-05) from revision 0x36 up to 0x37;
  • Update of 06-bf-02/0x07 (ADL C0) microcode (in intel-ucode/06-bf-05) from revision 0x36 up to 0x37;
  • Update of 06-bf-05/0x07 (ADL C0) microcode from revision 0x36 up to 0x37;
  • Update of 06-cf-01/0x87 (EMR-SP A0) microcode from revision 0x21000230 up to 0x21000283;
  • Update of 06-cf-02/0x87 (EMR-SP A1) microcode (in intel-ucode/06-cf-01) from revision 0x21000230 up to 0x21000283;
  • Update of 06-cf-01/0x87 (EMR-SP A0) microcode (in intel-ucode/06-cf-02) from revision 0x21000230 up to 0x21000283;
  • Update of 06-cf-02/0x87 (EMR-SP A1) microcode from revision 0x21000230 up to 0x21000283.
  • Addresses CVE-2024-21820, CVE-2024-21853, CVE-2024-23918, CVE-2024-23984
  • Update to upstream 2.1-46. 20241029
  • Update of 06-b7-01/0x32 (RPL-S B0) microcode from revision 0x129 up to 0x12b.

ghostscript-10.02.1-13.fc40

1 week 2 days ago
FEDORA-2024-b1877232ce Packages in this update:
  • ghostscript-10.02.1-13.fc40
Update description:

CVE-2024-46951 ghostscript: Arbitrary Code Execution in Artifex Ghostscript Pattern Color Space (fedora#2325237)

2325240 - CVE-2024-46952 CVE-2024-46953 CVE-2024-46954 CVE-2024-46955 CVE-2024-46956 ghostscript: various flaws

ghostscript-10.03.1-4.fc41

1 week 2 days ago
FEDORA-2024-69af78a508 Packages in this update:
  • ghostscript-10.03.1-4.fc41
Update description:

CVE-2024-46951 ghostscript: Arbitrary Code Execution in Artifex Ghostscript Pattern Color Space (fedora#2325238)

2325241 - CVE-2024-46952 CVE-2024-46953 CVE-2024-46954 CVE-2024-46955 CVE-2024-46956 ghostscript: various flaws [fedora-41]

libsoup3-3.4.4-3.fc39

1 week 2 days ago
FEDORA-2024-a059ea1dfc Packages in this update:
  • libsoup3-3.4.4-3.fc39
Update description:

Add patches to fix:

  • CVE-2024-52530 libsoup3: HTTP request smuggling via stripping null bytes from the ends of header names (bug #2325358)
  • CVE-2024-52532 libsoup3: infinite loop while reading websocket data (bug #2325356)

libsoup3-3.4.4-5.fc40

1 week 2 days ago
FEDORA-2024-bd09057dd2 Packages in this update:
  • libsoup3-3.4.4-5.fc40
Update description:

Add patches to fix:

  • CVE-2024-52530 libsoup3: HTTP request smuggling via stripping null bytes from the ends of header names (bug #2325358)
  • CVE-2024-52532 libsoup3: infinite loop while reading websocket data (bug #2325356)

microcode_ctl-2.1-66.fc41

1 week 3 days ago
FEDORA-2024-8b65ec8c46 Packages in this update:
  • microcode_ctl-2.1-66.fc41
Update description:
  • Update to upstream 2.1-46. 20241029
  • Update of 06-b7-01/0x32 (RPL-S B0) microcode from revision 0x129 up to 0x12b.

chromium-130.0.6723.116-1.el9 dav1d-1.5.0-2.el9 ffmpeg-5.1.4-3.el9 libavif-0.11.1-5.el9 libavif0.10-0.10.1-2.el9 libheif-1.16.1-2.el9 vlc-3.0.21-9.el9 xine-lib-1.2.13-4.el9

1 week 3 days ago
FEDORA-EPEL-2024-398707b664 Packages in this update:
  • chromium-130.0.6723.116-1.el9
  • dav1d-1.5.0-2.el9
  • ffmpeg-5.1.4-3.el9
  • libavif0.10-0.10.1-2.el9
  • libavif-0.11.1-5.el9
  • libheif-1.16.1-2.el9
  • vlc-3.0.21-9.el9
  • xine-lib-1.2.13-4.el9
Update description:

Update dav1d to version 1.5.0 to address previously unaddressed security issues that are not feasibly addressable by backporting upstream changes.

This contains an ABI change (in dav1d 1.3.0), for which all dependent packages were rebuilt.

EPEL Updates Policy Exception: https://pagure.io/epel/issue/299

Update chromium to version 130.0.6723.116.

lemonldap-ng-2.20.1-1.el9

1 week 4 days ago
FEDORA-EPEL-2024-18565c82f2 Packages in this update:
  • lemonldap-ng-2.20.1-1.el9
Update description:

Update to lemonldap-ng 2.20.1:

  • [Security] Adaptative Authentication Rules triggered by "Refresh my rights"
  • [Security] XSS in upgradeSession / forceUpgrade pages
  • downloadSamlMetadata missing from packages in 2.20.0
  • CDA request for id is not valid
  • "This application is not known" when trying to access a federation application with empty RelayState
  • SAML regression in 2.20.0
  • Internal error when captcha rule isn't validated

lemonldap-ng-2.20.1-1.el8

1 week 4 days ago
FEDORA-EPEL-2024-c35d90e5f2 Packages in this update:
  • lemonldap-ng-2.20.1-1.el8
Update description:

Update to lemonldap-ng 2.20.1:

  • [Security] Adaptative Authentication Rules triggered by "Refresh my rights"
  • [Security] XSS in upgradeSession / forceUpgrade pages
  • downloadSamlMetadata missing from packages in 2.20.0
  • CDA request for id is not valid
  • "This application is not known" when trying to access a federation application with empty RelayState
  • SAML regression in 2.20.0
  • Internal error when captcha rule isn't validated

lemonldap-ng-2.20.1-1.fc41

1 week 4 days ago
FEDORA-2024-7bc1df53fc Packages in this update:
  • lemonldap-ng-2.20.1-1.fc41
Update description:

Update to lemonldap-ng 2.20.1:

  • [Security] Adaptative Authentication Rules triggered by "Refresh my rights"
  • [Security] XSS in upgradeSession / forceUpgrade pages
  • downloadSamlMetadata missing from packages in 2.20.0
  • CDA request for id is not valid
  • "This application is not known" when trying to access a federation application with empty RelayState
  • SAML regression in 2.20.0
  • Internal error when captcha rule isn't validated

lemonldap-ng-2.20.1-1.fc39

1 week 4 days ago
FEDORA-2024-d0a6c4ac13 Packages in this update:
  • lemonldap-ng-2.20.1-1.fc39
Update description:

Update to lemonldap-ng 2.20.1:

  • [Security] Adaptative Authentication Rules triggered by "Refresh my rights"
  • [Security] XSS in upgradeSession / forceUpgrade pages
  • downloadSamlMetadata missing from packages in 2.20.0
  • CDA request for id is not valid
  • "This application is not known" when trying to access a federation application with empty RelayState
  • SAML regression in 2.20.0
  • Internal error when captcha rule isn't validated
Checked
46 minutes 42 seconds ago