Fedora Linux Distribution
Find the information you need for your favorite open source distribution .
Find the information you need for your favorite open source distribution .
Latest stable releases of libmspack and cabextract, includes security fixes for CVE-2018-14680, CVE-2018-14681, CVE-2018-14682, CVE-2018-18584, CVE-2018-18585
This update fixes a segfault in the SMTP parser. This bug is tracked as CVE-2018-18956. There are a number of other bugfixes and performance improvements.
- Update to 4.1.5 Release notes: /powerdns-authoritative-server-4-0-6-4-1-5-and-recursor-4-0-9-4-1-5-released/ PowerDNS Security Advisory 2018-03 (https://doc.powerdns.com/authoritative/ /security-advisories/powerdns-advisory-2018-03.html) (CVE-2018-10851) PowerDNS Security Advisory 2018-05 (-
**PHP version 7.2.12** (08 Nov 2018) **Core:** * Fixed bug php#76846 (Segfault in shutdown function after memory limit error). (Nikita) * Fixed bug php#76946 (Cyclic reference in generator not detected). (Nikita) * Fixed bug php#77035 (The phpize and ./configure create redundant .deps file). (Peter Kokot) * Fixed bug php#77041 (buildconf should output error messages to stderr) (Mizunashi
- Update to 4.1.5 Release notes: /powerdns-authoritative-server-4-0-6-4-1-5-and-recursor-4-0-9-4-1-5-released/ PowerDNS Security Advisory 2018-03 (https://doc.powerdns.com/authoritative/ /security-advisories/powerdns-advisory-2018-03.html) (CVE-2018-10851) PowerDNS Security Advisory 2018-05 (-
- Add upstream fix for improper sanitization of shell-escape codes when lldptool parses a mngAddr TLV (CVE-2018-10932). - Add upstream patch to support DSCP selectors in APP TLVs. This allows configuration of DSCP-based packet prioritization on capable network devices.
- Update to 4.1.5 Release notes: /powerdns-authoritative-server-4-0-6-4-1-5-and-recursor-4-0-9-4-1-5-released/ PowerDNS Security Advisory 2018-03 (https://doc.powerdns.com/authoritative/ /security-advisories/powerdns-advisory-2018-03.html) (CVE-2018-10851) PowerDNS Security Advisory 2018-05 (-
**PHP version 7.2.12** (08 Nov 2018) **Core:** * Fixed bug php#76846 (Segfault in shutdown function after memory limit error). (Nikita) * Fixed bug php#76946 (Cyclic reference in generator not detected). (Nikita) * Fixed bug php#77035 (The phpize and ./configure create redundant .deps file). (Peter Kokot) * Fixed bug php#77041 (buildconf should output error messages to stderr) (Mizunashi
This is a primarily maintenance update. Please see the attached bugs for more specific details on what has improved as far as stability is concerned. There is also a larger new feature which is being released in concert with work being done in Katello / Foreman. Subscription-manager has a concept of a package- profile. This contains information on all installed rpm packages for the system
Security fix release, Changes since 1.3.1: - [Security fix] Don't disable all modern SSH encryption algorithms. - Remote media player info didn't update under some circumstances. - Remove characters from commands UUIDs that aren't legal in URLs. - New notifications now appear on top and not in the bottom of the list in the plasmoid. - Dismiss notifications icon is now consistent with the one in
This is a primarily maintenance update. Please see the attached bugs for more specific details on what has improved as far as stability is concerned. There is also a larger new feature which is being released in concert with work being done in Katello / Foreman. Subscription-manager has a concept of a package- profile. This contains information on all installed rpm packages for the system
This is a primarily maintenance update. Please see the attached bugs for more specific details on what has improved as far as stability is concerned. There is also a larger new feature which is being released in concert with work being done in Katello / Foreman. Subscription-manager has a concept of a package- profile. This contains information on all installed rpm packages for the system
flatpak 1.0.5 release. There was a sandbox bug in the previous version where parts of the runtime /etc was not mounted read-only. In case the runtime was installed as the user (not the default) this means that the app could modify files on the runtime. Nothing in the host uses the runtime files, so this is not a direct sandbox escape, but it is possible that an app can confuse a different