Fedora Linux Distribution - Page 464
Find the information you need for your favorite open source distribution .
Find the information you need for your favorite open source distribution .
Updates for security issues AST-2018-001 through AST-2018-002
Updates for security issues AST-2018-001 through AST-2018-002
Security fix for https://security.snyk.io/vuln/npm:base64url:20180511
New version 2.6.1, contains fixes for multiple CVEs. ---- Fixed undefined reference in tshark, corrected build flags usage
Security fix for https://security.snyk.io/vuln/npm:base64url:20180511
New version 2.6.1, contains fixes for multiple CVEs. ---- Fixed undefined reference in tshark, corrected build flags usage
The v4.16.12 update contains important fixes across the tree
The v4.16.12 update contains important fixes across the tree
The v4.16.11 kernel includes important fixes across the tree ---- The v4.16.9 stable update contains critical fixes across the tree
The v4.16.11 kernel includes important fixes across the tree ---- The v4.16.9 stable update contains critical fixes across the tree
Enigmail update to version 2.0.4, introduces fixes for the efail attack. Please check and modify your Thunderbird settings if required: https://enigmail.net/index.php/en/home/news/66-2018-05-16-efail-vulnerability-affects-encrypted-mails
Enigmail update to version 2.0.4, introduces fixes for the efail attack. Please check and modify your Thunderbird settings if required: https://enigmail.net/index.php/en/home/news/66-2018-05-16-efail-vulnerability-affects-encrypted-mails
This update ensures that valgrind works again without installing glibc debuginfo packages (RHBZ#1570246). It also addresses a security vulnerability in the `mempcpy` implementation for the Intel Xeon Phi processors (CVE-2018-11237, RHBZ#1581275). Furthermore, the switch to libidn2 uses the final upstream patches (RHBZ#1452750(.
Resolves rhbz#1581868 CVE-2018-5388 strongswan: buffer underflow in stroke_socket.c
This update ensures that valgrind works again without installing glibc debuginfo packages (RHBZ#1570246). It also addresses a security vulnerability in the `mempcpy` implementation for the Intel Xeon Phi processors (CVE-2018-11237, RHBZ#1581275). Furthermore, the switch to libidn2 uses the final upstream patches (RHBZ#1452750(.
Resolves rhbz#1581868 CVE-2018-5388 strongswan: buffer underflow in stroke_socket.c